Intrusion Protection

Name Status Update
FG-VD-19-078_Logitech.0day
Add
*
Symantec.Endpoint.Protection.Manager.Secar.DLL.Buffer.Overflow
Add
*
Webmin.Package.Updates.Authenticated.Remote.Command.Execution
Add
*
Oracle.WebLogic.Server.wls9_async.Method.Code.Injection
Add
*
NTLM.Authentication.Brute.Force
Mod
*Sig Added
HPE.FlexNetwork.JG411A.DiagnosticExport.Local.File.Inclusion
Mod
Default_action:pass:drop
Belkin.Wemo.UPnP.Remote.Code.Execution
Mod
Default_action:pass:drop
elFinder.PHP.Connector.exiftran.Command.Injection
Mod
Default_action:pass:drop
Google.Chrome.FileReader.Remote.Code.Execution
Mod
Default_action:pass:drop
ThunderDNS.Tunnel
Mod
Default_action:pass:drop
NEC.Univerge.WebPro.V6.Clear.Text.Password.Disclosure
Mod
Default_action:pass:drop
WordPress.Anti-Malware.SBF.Firewall.Local.File.Inclusion
Mod
Default_action:pass:drop
Dell.EMC.Avamar.Server.LDLS.Privilege.Elevation
Mod
Default_action:pass:drop
PostgreSQL.COPY.FROM.PROGRAM.Authenticated.Command.Injection
Mod
Default_action:pass:drop
MS.SMB.Non-paged.Pool.Allocation.Remote.Code.Execution
Mod
Default_action:pass:drop
Apple.Safari.Webkit.updateReferencedText.Use.After.Free
Mod
Default_action:pass:drop
MS.Windows.DHCP.Server.Remote.Code.Execution
Mod
Default_action:pass:drop
LANDesk.Management.Agent.Local.DoS
Mod
Default_action:pass:drop
LANDesk.Management.Remote.Control.DoS
Mod
Default_action:pass:drop
Advantech.WebAccess.DBVisitor.DLL.SQL.Injection
Mod
Default_action:pass:drop
Plixer.Scrutinizer.Authentication.Bypass
Mod
Default_action:pass:drop
vBulletin.Administrator.Account.Authentication.Bypass
Mod
Default_action:pass:drop
NETGEAR.WNR2000v5.Credential.Account.Information.Disclosure
Mod
Default_action:pass:drop
Ivanti.ManagementEndpoint.GetTaskXml.Path.Traversal
Mod
Default_action:pass:drop
Ivanti.ManagementEndpoint.LDTest.DoS
Mod
Default_action:pass:drop