Intrusion Prevention
Name | Status | Update |
---|---|---|
Mida.Solutions.eFramework.ajaxreq.OS.Command.Injection |
Add
|
|
Adobe.Reader.CVE-2020-24432.Memory.Corruption |
Add
|
|
Oracle.GlassFish.Server.ThemeServlet.Directory.Traversal |
Mod
|
Added Signature |
Apache.Struts.2.OGNL.Script.Injection |
Mod
|
Added Signature |
Adobe.Illustrator.CVE-2020-24415.Memory.Corruption |
Mod
|
Added Signature |
MS.SharePoint.AppRelativeVirtualPath.Remote.Code.Execution |
Mod
|
Default_action set to drop |
MS.SharePoint.tagPrefixRegex.Parsing.Remote.Code.Execution |
Mod
|
Default_action set to drop |
Nette.Framework.Callback.Parameter.Remote.Code.Execution |
Mod
|
Default_action set to drop |
Adobe.Acrobat.stringFromStream.Information.Disclosure |
Mod
|
Default_action set to drop |
IBM.i2.Analyst.Notebook.CVE-2020-4724.Memory.Corruption |
Mod
|
Default_action set to drop |
Oracle.Weblogic.LockVersionExtractor.Insecure.Deserialization |
Mod
|
Default_action set to drop |
Apache.OpenMeetings.NetTest.Web.Service.DoS |
Mod
|
Default_action set to drop |