Intrusion Protection

Name Status Update
FreeSWITCH.Event.Socket.Remote.Command.Execution
Add
*
FusionPBX.Command.exec.php.Remote.Command.Execution
Add
*
FusionPBX.Operator.Panel.exec.php.Command.Execution
Add
*
Apple.WebKit.WebAssembly.Compilation.Information.Disclosure
Add
*
TightVNC.vncviewer.rfbServerCutText.Handler.Integer.Overflow
Add
*
Generic.DNS.Tunnel.Detection.Variant.A
Mod
*Sig Added
Advantech.WebAccess.SCADA.Bwgetval.Arbitrary.File.Deletion
Mod
Default_action:pass:drop
HiSilicon.DVR.Devices.Remote.Code.Execution
Mod
Default_action:pass:drop
Harbor.Project.Harbor.user.API.Privilege.Escalation
Mod
Default_action:pass:drop
Apache.Traffic.Server.HTTP2.Settings.Flood.DoS
Mod
Default_action:pass:drop
Cisco.IOS.XE.REST.API.Authentication.Bypass
Mod
Default_action:pass:drop
ActivePDF.Toolkit.Multiple.File.Memory.Corruption
Mod
Default_action:pass:drop
MS.Win32k.CVE-2019-1362.Privilege.Elevation
Mod
Default_action:pass:drop
MS.CVE-2019-1333.Remote.Code.Execution
Mod
Default_action:pass:drop
MS.Windows.Power.Service.CVE-2019-1341.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Win32k.CVE-2019-1364.Privilege.Elevation
Mod
Default_action:pass:drop
Pulse.Secure.Platform.Stack-Based.Buffer.Overflow
Mod
Default_action:pass:drop
MS.Windows.Jet.Database.var_table.Remote.Code.Execution
Mod
Default_action:pass:drop
HPE.IMC.ByteMessageResource.Insecure.Deserialization
Mod
Default_action:pass:drop
MS.IE.VBScript.Use.After.Free
Mod
Default_action:pass:drop
OpenEMR.C_Document.class.php.patient_id.XSS
Mod
Default_action:pass:drop
D-Link.DIR-850L.Wireless.AC1200.Route.Authentication.Bypass
Mod
Default_action:pass:drop
Inteno.IOPSYS.p910nd.Printer.Server.Remote.Command.Execution
Mod
Default_action:pass:drop
Shenzhen.TVT.DVR.HTTP.Header.Buffer.Overflow
Mod
Default_action:pass:drop
YouPHPTube.Encoder.getImage.php.Command.Injection
Mod
Default_action:pass:drop
Envoy.HTTP.Headers.DoS
Mod
Default_action:pass:drop