9 new signatures:
HTTP: Supermicro Onboard IPMI close_window.cgi Buffer OverflowHTTP: Google Chrome ExecCommand Heap Use After FreeHTTP: Apache Roller OGNL Injection Remote Code ExecutionHTTP: Apache Solr SolrResourceLoader Arbitrary File DisclosureAPP: RealNetworks RealPlayer RMP File Buffer OverflowHTTP:DLINK-DIR605L-CAPTCHA-BOFHTTP: Dlink D-Link DIR-605L Improper Variable Parsing Buffer OverflowHTTP:STC:FIREFOX-LOOKUP-GETTERHTTP: Mozilla Firefox Lookupgetter Dangling Pointer Memory CorruptionHTTP: cPanel 'fileop' Parameter Cross Site ScriptingAPP: IBM Forms Viewer XFDL Form Fontname Tag Parsing Buffer Overflow
4 updated signatures:
HTTP: Parameter Directory TraversalIRC: mIRC PRIVMSG Buffer OverflowHTTP: Internet Explorer JavaScript Integer Overflow Remote Code ExecutionHTTP: Microsoft Windows WinVerifyTrust Signature Validation Vulnerability
1 renamed application signature:
Web:Applications:OFFICE365-SSL
This signature detects attempts to exploit a known vulnerability against Supermicro. A successful attack allows the attacker to execute arbitrary code within the context of the server.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
supermicro intelligent_platform_management_firmware 2.24 (-:~-~-~-~x9_generation_motherboards~)supermicro intelligent_platform_management_firmware up to 2.26 (-:~-~-~-~x9_generation_motherboards~)
This signature detects attempts to exploit a known vulnerability against Google Chrome Web Browser. A successful attack can lead to arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
This signature detects attempts to exploit a known vulnerability against Apache Roller OGNL. A successful attack can lead to arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
apache roller 5.0apache roller up to 5.0.1apache roller 4.0.1apache roller 4.0
This signature detects attempts to exploit a known vulnerability against Apache Solr SolrResourceLoader. A successful attack can lead to arbitrary file disclosure.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
apache solr 4.5.0apache solr 4.3.0apache solr 4.4.0apache solr 4.1.0apache solr 4.0.0 (beta)apache solr 4.3.1apache solr 4.0.0 (alpha)apache solr up to 4.5.1apache solr 4.2.0apache solr 4.2.1
This signature detects attempts to exploit a known vulnerability in RealPlayer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
realnetworks realplayer 16.0.3.51realnetworks realplayer 16.0.2.32
This signature detects attempts to exploit a known vulnerability in D-Link DIR-605L Wireless N300 Cloud Router. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted service.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
This signature detects attempts to exploit a known vulnerability against Mozilla Firefox Browser. A successful attack can lead to arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
Mozilla Firefox 3.5.12Mozilla Thunderbird 3.0.1Mozilla Thunderbird 3.1.3Mozilla Thunderbird 3.0.7Mozilla SeaMonkey 2.0.7Red Hat Enterprise Linux Desktop Optional 6Red Hat Enterprise Linux HPC Node Optional 6Red Hat Enterprise Linux Desktop 5 ClientRed Hat Enterprise Linux Server Optional 6Red Hat Enterprise Linux Workstation 6Mozilla Firefox 3.5.6Mozilla SeaMonkey 2.0.1Sun OpenSolaris snv_151aSun OpenSolaris Build Snv 101ASun OpenSolaris Build Snv 119Debian Linux 5.0 MipselSlackware Linux X86 64 -CurrentMozilla Firefox 3.6.2Sun OpenSolaris Build Snv 57Ubuntu Ubuntu Linux 10.10 i386Sun OpenSolaris Build Snv 121Mozilla Firefox 3.6.5Sun OpenSolaris Build Snv 28Mozilla Firefox 3.6.6Mozilla Thunderbird 3.0.4Mozilla Firefox 3.6.6Ubuntu Ubuntu Linux 8.04 LTS Amd64Ubuntu Ubuntu Linux 8.04 LTS I386Ubuntu Ubuntu Linux 8.04 LTS LpiaUbuntu Ubuntu Linux 8.04 LTS PowerpcUbuntu Ubuntu Linux 8.04 LTS SparcSun OpenSolaris Build Snv 48Mozilla Thunderbird 3.1.2Avaya Aura System Platform 6.0Avaya Aura Communication Manager 6.0Mozilla Firefox 3.5.7Avaya Aura System Manager 6.0 SP1Red Hat Enterprise Linux Desktop 6Mozilla Firefox 3.6.9Sun OpenSolaris Build Snv 122Avaya Messaging Storage Server 5.2Mozilla Firefox 3.5.5Sun OpenSolaris Build Snv 71Sun OpenSolaris Build Snv 112Sun OpenSolaris Build Snv 99Avaya Aura Presence Services 6.0Sun OpenSolaris Build Snv 49Red Hat Enterprise Linux Server 6Avaya Aura Conferencing 6.0 StandardUbuntu Ubuntu Linux 9.10 Amd64Ubuntu Ubuntu Linux 9.10 I386Slackware Linux 13.0 X86 64Ubuntu Ubuntu Linux 9.10 PowerpcUbuntu Ubuntu Linux 9.10 SparcMozilla Firefox 3.5.11Mozilla Firefox 3.6.7Mozilla Thunderbird 3.0.6Mozilla Thunderbird 3.1.1Mozilla SeaMonkey 2.0.6Sun OpenSolaris snv_111bSun OpenSolaris Build Snv 67Avaya Aura Session Manager 1.1Avaya Voice Portal 5.0 SP2Sun OpenSolaris Build Snv 39Mandriva Linux Mandrake 2010.0 X86 64Mozilla Firefox 3.5.10Sun OpenSolaris Build Snv 80Sun OpenSolaris Build Snv 134Sun OpenSolaris build snv_151aMozilla SeaMonkey 2.0.5Mozilla Firefox 3.6.4Mozilla Firefox 3.5.10Mozilla Thunderbird 3.0.5Sun OpenSolaris Build Snv 134ASlackware Linux 13.0Sun OpenSolaris build snv_151Sun OpenSolaris build snv_151aUbuntu Ubuntu Linux 9.10 LpiaSun OpenSolaris Build Snv 22Avaya Message Networking 3.1Avaya Voice Portal 4.1 SP1Avaya Voice Portal 4.1 SP2Avaya Voice Portal 5.1Avaya Voice Portal 5.0Mandriva Enterprise Server 5 X86 64SuSE SUSE Linux Enterprise Server 11Avaya Messaging Storage Server 5.2 SP1Sun OpenSolaris Build Snv 64Sun OpenSolaris Build Snv 13Sun OpenSolaris Build Snv 91SuSE SUSE Linux Enterprise Desktop 11Sun OpenSolaris Build Snv 127Sun OpenSolaris Build Snv 110Sun OpenSolaris Build Snv 111Avaya Intuity AUDIX LX 2.0 SP1Avaya Intuity AUDIX LX 2.0 SP2Mozilla Firefox 3.5.0Ubuntu Ubuntu Linux 10.10 amd64Mandriva Linux Mandrake 2010.0Sun OpenSolaris Build Snv 133Sun Solaris 10 SparcAvaya Intuity AUDIX LX 2.0Sun OpenSolaris Build Snv 68Sun OpenSolaris Build Snv 36Sun OpenSolaris Build Snv 136Sun OpenSolaris Build Snv 54Sun OpenSolaris Build Snv 118Sun OpenSolaris Build Snv 74Sun OpenSolaris Build Snv 51SuSE SUSE Linux Enterprise SDK 10 SP3SuSE SUSE Linux Enterprise Desktop 10 SP3SuSE SUSE Linux Enterprise Server 10 SP3Mozilla Firefox 3.6.8Sun OpenSolaris Build Snv 123Red Hat Fedora 12SuSE SUSE Linux Enterprise Server 11 SP1Avaya Voice Portal 5.0 SP1SuSE SUSE Linux Enterprise SDK 11 SP1Sun OpenSolaris Build Snv 116Sun OpenSolaris Build Snv 117Avaya Messaging Storage Server 5.0Avaya Aura Application Enablement Services 5.2Sun OpenSolaris Build Snv 135Ubuntu Ubuntu Linux 9.04 Amd64Sun OpenSolaris Build Snv 100Avaya Voice Portal 5.1Sun OpenSolaris Build Snv 130Avaya Message Networking 5.2Debian Linux 5.0Debian Linux 5.0 AlphaSun OpenSolaris Build Snv 129Debian Linux 5.0 ArmDebian Linux 5.0 HppaDebian Linux 5.0 Ia-32Debian Linux 5.0 Ia-64Debian Linux 5.0 M68kDebian Linux 5.0 MipsSun Solaris 10 X86Debian Linux 5.0 PowerpcDebian Linux 5.0 S/390Debian Linux 5.0 SparcMozilla SeaMonkey 2.0.4Avaya Aura Session Manager 6.0Sun OpenSolaris Build Snv 108Red Hat Fedora 14Avaya Message Networking 5.2.1Mozilla Firefox 3.6.2Avaya Aura System Platform 1.1Avaya Aura System Manager 5.2Sun OpenSolaris Build Snv 01Sun OpenSolaris Build Snv 93Sun OpenSolaris Build Snv 94Mozilla Thunderbird 3.1.2Slackware Linux 13.1 X86 64Mandriva Enterprise Server 5Mandriva Linux Mandrake 2009.0Mandriva Linux Mandrake 2009.0 X86 64Ubuntu Ubuntu Linux 9.04 I386Ubuntu Ubuntu Linux 9.04 LpiaUbuntu Ubuntu Linux 9.04 PowerpcUbuntu Ubuntu Linux 9.04 SparcAvaya IQ 5Sun OpenSolaris Build Snv 88Avaya Communication Server 1000E 7.0Avaya Communication Server 1000M 7.0Avaya Communication Server 1000M Signaling Server 7.0Avaya Communication Server 1000E Signaling Server 7.0Sun OpenSolaris Build Snv 02Red Hat Enterprise Linux 5 ServerCometBird 3.6.7Sun OpenSolaris Build Snv 103Debian Linux 5.0 ArmelSun OpenSolaris Build Snv 95Ubuntu Ubuntu Linux 10.04 Amd64Mozilla Firefox 3.5.3Sun OpenSolaris Build Snv 50Sun OpenSolaris Build Snv 37Mozilla Firefox 3.6.3Avaya Aura Application Enablement Services 5.2.1Sun OpenSolaris Build Snv 87Sun OpenSolaris Build Snv 89Slackware Linux -CurrentSun OpenSolaris Build Snv 59Sun OpenSolaris Build Snv 124Red Hat Enterprise Linux Desktop Workstation 5 ClientSun OpenSolaris Build Snv 35Sun OpenSolaris Build Snv 56Ubuntu Ubuntu Linux 10.04 SparcAvaya Messaging Storage Server 5.1Mozilla Firefox 3.6.10Mozilla Thunderbird 3.1.4Sun OpenSolaris Build Snv 45Mozilla Firefox 3.5.8Sun OpenSolaris Build Snv 111AMozilla SeaMonkey 2.0.3Mozilla Thunderbird 3.0.2Mozilla Firefox 3.6Sun OpenSolaris Build Snv 109Sun OpenSolaris Build Snv 132Sun OpenSolaris Build Snv 41Sun OpenSolaris Build Snv 96Sun OpenSolaris Build Snv 85Sun OpenSolaris Build Snv 90Mozilla Firefox 3.5.9Sun OpenSolaris Build Snv 137Sun OpenSolaris Build Snv 126CometBird 3.6.8SuSE SUSE Linux Enterprise SDK 11Red Hat Fedora 13Red Hat Enterprise Linux Workstation Optional 6Sun OpenSolaris Build Snv 128Avaya Aura Session Manager 5.2Mozilla Firefox 3.5.4Sun OpenSolaris Build Snv 81Mozilla Thunderbird 3.0Avaya Aura Communication Manager 6.0.1Ubuntu Ubuntu Linux 10.04 I386Ubuntu Ubuntu Linux 10.04 PowerpcSun OpenSolaris Build Snv 47Sun OpenSolaris Build Snv 83Sun OpenSolaris Build Snv 82Sun OpenSolaris Build Snv 113Sun OpenSolaris Build Snv 114Avaya Aura Conferencing 6.0Mozilla Firefox 3.5.2Sun OpenSolaris Build Snv 98Sun OpenSolaris Build Snv 131Sun OpenSolaris Build Snv 120CometBird 3.6.10Red Hat Enterprise Linux AS 4Red Hat Enterprise Linux ES 4Red Hat Enterprise Linux WS 4Red Hat Enterprise Linux Desktop Version 4Ubuntu Ubuntu Linux 10.10 powerpcSun OpenSolaris Build Snv 101Avaya Voice Portal 4.0Avaya Voice Portal 4.1Mandriva Linux Mandrake 2010.1 X86 64Mandriva Linux Mandrake 2010.1Mozilla Firefox 3.5.1Sun OpenSolaris Svn 126Avaya Message Networking MN 3.1Sun OpenSolaris Build Snv 111BSun OpenSolaris Build Snv 102Mozilla SeaMonkey 2.0.2Sun OpenSolaris Build Snv 92Sun OpenSolaris Build Snv 76Sun OpenSolaris Build Snv 77Sun OpenSolaris Build Snv 19Sun OpenSolaris Build Snv 78Sun OpenSolaris Build Snv 84Sun OpenSolaris Build Snv 38Sun OpenSolaris Build Snv 115SuSE openSUSE 11.3Sun OpenSolaris Build Snv 125Avaya Messaging Storage Server 4.0Slackware Linux 13.1SuSE SUSE Linux Enterprise Desktop 11 SP1Sun OpenSolaris Build Snv 104Sun OpenSolaris Build Snv 105SuSE openSUSE 11.2Slackware Linux 12.2Avaya IQ 5.1Sun OpenSolaris Build Snv 58Sun OpenSolaris Build Snv 86Sun OpenSolaris Build Snv 29Sun Solaris 11 ExpressDebian Linux 5.0 Amd64Sun OpenSolaris Build Snv 61Sun OpenSolaris Build Snv 106Sun OpenSolaris Build Snv 107SuSE openSUSE 11.1
This signature detects SSL access to Microsoft Office servers. Microsoft Office 365 is the suite of familiar Microsoft Office collaboration and productivity tools delivered as a cloud-based service.
srx-branch-11.4, srx-branch-12.1, srx-11.4, mx-11.4, srx-12.1
This signature detects attempts to exploit a known vulnerability in the mIRC client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
This signature detects attempts to exploit a known cross-site scripting vulnerability against cPanel. It is due to insufficient validation of user-supplied input. Attackers can inject arbitrary web script or HTML content within the context of the current user.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
cPanel 11.4.19cPanel 11.18.3cPanel 11 betacPanel 11.18.3-R21703cPanel 11.0.0cPanel 11.18.4cPanel 11.24.4cPanel 11.24.7cPanel 11cPanel 11.21.0-BETA
This signature detects attempts to exploit a known vulnerability against Microsoft Windows. The vulnerability is due to an error in the way WinVerifyTrust validates PE files signed with Windows Authenticode. The error allows signed PE files to be modified without impacting the signature's validation. A successful attack can allow untrusted attacker-controlled code to be copied and executed on a target machine within the context of the currently logged in user.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
microsoft windows_xp - (sp2:x64)microsoft windows_8 - (-:x86)microsoft windows_server_2008 r2 (sp1:itanium)microsoft windows_8.1 - (-:~-~-~-~x86~)microsoft windows_8 - (-:x64)microsoft windows_rt_8.1 -microsoft windows_server_2012 r2 (-:~-~datacenter~~~)microsoft windows_xp (sp3)microsoft windows_server_2003 (sp2:x64)microsoft windows_rt -microsoft windows_server_2012 r2 (-:~-~standard~~~)microsoft windows_server_2012 -microsoft windows_7 (sp1:x64)microsoft windows_server_2008 (sp2:x64)microsoft windows_vista (sp2:x64)microsoft windows_server_2012 r2 (-:~-~essentials~~~)microsoft windows_server_2008 r2 (sp1:x64)microsoft windows_7 (sp1:x86)microsoft windows_server_2008 (sp2:x86)microsoft windows_server_2008 (sp2:itanium)microsoft windows_server_2003 (sp2:itanium)microsoft windows_8.1 - (-:~-~-~-~x64~)
This signature detects attempts to exploit a known vulnerability in the IBM Forms Viewer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
ibm forms_viewer 4.0.0.1ibm forms_viewer 4.0.0ibm forms_viewer 4.0.0.2ibm forms_viewer 8.0.1ibm forms_viewer 8.0.0
This signature detects directory traversal attempts within HTTP GET or POST form parameters. Attackers can exploit a poorly-written CGI program to access or modify private files.
DI-Base, DI-Server, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
MidiCMS Software MidiCMS Website Builder 2011
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122
Microsoft Internet Explorer 9Microsoft VBScript 5.6Microsoft JScript 5.7Microsoft JScript 5.8Microsoft Internet Explorer 8Microsoft JScript 5.6Microsoft VBScript 5.7Microsoft VBScript 5.8
View the original article here