Intrusion Prevention

Name Status Update
MS.Office.OpenXML.ActiveX.Directory.CFB.Information.Disclosure
Add
Foxit.Reader.JavaScript.popUpMenu.Use.After.Free
Add
RIG.Exploit.Kit
Mod
Added Signature
Embedded.Linux.Malicious.Script
Mod
Added Signature
Microsoft.Windows.DHCP.Server.Vendor.Options.Code.Execution
Mod
Added Signature
HTTP.Host.Header.Buffer.Overflow
Mod
Added Signature
OpenBSD.DHCP.Remote.DoS
Mod
Added Signature
HTTP.Invalid.Response.Status.Code.DoS
Mod
Added Signature
MS.IE.saveHistory.Remote.Code.Execution
Mod
Added Signature
Symfony.HTTP.request.header.Security.Bypass
Mod
Name set to Symfony.HTTP.request.header.Security.Bypass
Nexus.Repository.Manager.Unauthorized.Remote.Code.Execution
Mod
Default_action set to drop
ReGeorg.HTTP.Tunnel
Mod
Default_action set to drop
SQL.Malicious.Statements
Mod
Default_action set to drop
OpenMRS.webservices.rest.Insecure.Deserialization
Mod
Default_action set to drop
PHP.Diescan
Mod
Default_action set to drop
OSX.Shlayer
Mod
Default_action set to drop
Symfony.HTTP.request.header.Security.Bypass
Mod
Severity set to medium
MS.DNS.WINS.Server.Information.Spoofing
Del