Intrusion Protection

Name Status Update
WordPress.Plugin.Social.Warfare.XSS
Add
*
CMS.Made.Simple.Showtime2.Arbitrary.File.Upload
Add
*
Schneider.Electric.IIoT.Monitor.downloadCSV.Directory.Traversal
Add
*
FreeBSD.NFS.Server.nfsm_advance.DoS
Add
*
MS.IE.Scroll.Memory.Corruption
Mod
*Sig Added
Google.Chrome.FileReader.Remote.Code.Execution
Mod
*Sig Added
CA.ARCserve.Backup.Server.LGServer.Buffer.Overflow
Mod
*Sig Added
MS.Edge.Chakra.Scripting.Engine.Array.Type.Confusion
Mod
Name:MS.Edge.Scripting.Engine.CVE-2019-0773.Type.Confusion:MS.Edge.Chakra.Scripting.Engine.Array.Type.Confusion
HTPasswd.Access
Mod
Status:disable:enable
HTTP.If.Modified.Since.Header.Too.Long
Mod
Status:disable:enable
MS.RPC.AppXSvc.Privilege.Escalation
Mod
Default_action:pass:drop
Microsoft.GDI.OffBmiSrc.Information.Disclosure
Mod
Default_action:pass:drop
Cisco.Routers.Management.Interface.Remote.Command.Execution
Mod
Default_action:pass:drop
PHP.dns_get_record.Out.of.Bounds.Read
Mod
Default_action:pass:drop
Microsoft.GDI.DoGdiCommentMultiFormats.Information.Disclosure
Mod
Default_action:pass:drop
Webmin.Upload.Authenticated.Remote.Code.Execution
Mod
Default_action:pass:drop
SolarWinds.Orion.NPM.OrionModuleEngine.Remote.Code.Execution
Mod
Default_action:pass:drop
Microsoft.Windows.Deployment.Service.TFTP.Remote.Code.Execution
Mod
Default_action:pass:drop
Responsive.File.Manager.ajax_calls.get_file.Directory.Traversal
Mod
Default_action:pass:drop
MS.Windows.CVE-2019-0797.Privilege.Escalation
Mod
Default_action:pass:drop
MS.Windows.CVE-2019-0808.Privilege.Escalation
Mod
Default_action:pass:drop
HPE.IMC.TopoDebugServlet.Insecure.Deserialization
Mod
Default_action:pass:drop