PHP.Windows.Shell.Escape.Functions.Command.Execution
|
|
|
|
MS.IIS.ISAPI.Extension.Buffer.Overflow
|
|
|
Sig Added
|
PHP.Windows.Shell.Escape.Functions.Remote.Command.Execution
|
|
|
Sig Added
|
3S-Smart.CODESYS.Web.Server.URI.Stack.Buffer.Overflow
|
|
|
Sig Added
|
MS.Windows.WMDMCESP.WMDMCESP.DLL.Loading.Code.Execution
|
|
|
Sig Added
|
MS.Office.RTF.File.OLE.autolink.Code.Execution
|
|
|
Sig Added
|
Obfuscated.Rich.Text.Format
|
|
|
Sig Added
|
MS.Office.EQNEDT32.EXE.Equation.Parsing.Memory.Corruption
|
|
|
Sig Added
|
Fallout.Exploit.Kit
|
|
|
Sig Added
|
Apple.XNU.icmp_error.Handling.Remote.Code.Execution
|
|
|
Default_action:pass:drop
|
Squid.Proxy.SNMP.Query.Rejection.DoS
|
|
|
Default_action:pass:drop
|
Microsoft.IIS.ShortName.Vulnerability.Scanner
|
|
|
Default_action:pass:drop
|
Adobe.ColdFusion.CKEditor.upload.cfm.Directory.Traversal
|
|
|
Default_action:pass:drop
|
Apache.Spark.Unauthen.Remote.Command.Execution
|
|
|
Default_action:pass:drop
|
WordPress.WP.GDPR.Compliance.Plugin.Privilege.Escalation
|
|
|
Default_action:pass:drop
|
Adobe.Flash.TVSDK.metadata.Use.After.Free
|
|
|
Default_action:pass:drop
|
IBM.WebSphere.MQ.Login.User.ID.Brute.Force.Check
|
|
|
Default_action:pass:drop
|
MS.Scripting.Engine.CVE-2018-8618.Memory.Corruption
|
|
|
Default_action:pass:drop
|
Adobe.Reader.PDF.CVE-2018-19703.Information.Disclosure
|
|
|
Default_action:pass:drop
|
Adobe.Acrobat.CVE-2018-15984.Memory.Corruption
|
|
|
Default_action:pass:drop
|
WordPress.Plugin.Snap.Creek.Duplicator.PHP.Code.Injection
|
|
|
Default_action:pass:drop
|
Unnamed_1989.Botnet
|
|
|
Default_action:pass:drop
|
LG.SuperSign.CMS.Remote.Code.Execution
|
|
|
Default_action:pass:drop
|
Hacker.Tools.Dr.Hex
|
|
|
Default_action:pass:drop
|
Secutech.Ris.Device.Remote.DNS.Change.Policy.Bypass
|
|
|
Default_action:pass:drop
|
Roundcube.Webmail.Attached.HTML.XSS
|
|
|
Default_action:pass:drop
|
Broadcom.UPnP.Stack.SetConnectionType.Function.Format.String
|
|
|
Default_action:pass:drop
|
Hashicorp.Consul.Rexec.Remote.Command.Execution
|
|
|
Default_action:pass:drop
|
Hashicorp.Consul.Services.API.Remote.Command.Execution
|
|
|
Default_action:pass:drop
|
Drobo.5N2.Command.Injection
|
|
|
|
MS.Windows.VCF.File.Remote.Code.Execution
|
|
|
|