Intrusion Protection

Name Status Update
PHP.Quot.Print.Encode.Heap.Buffer.Overflow
Mod
*Sig Added
IBM.WebSphere.AS.Console.Buffer.Overflow
Mod
Name:IBM.WebSphere.Application.Server.Console.Buffer.Overflow:IBM.WebSphere.AS.Console.Buffer.Overflow
IBM.WebSphere.AS.Webcontainer.XSS
Mod
Name:IBM.WebSphere.Application.Server.Webcontainer.XSS:IBM.WebSphere.AS.Webcontainer.XSS
IBM.WebSphere.AS.console.URI.XSS
Mod
Name:IBM.WebSphere.Application.Server.XSS:IBM.WebSphere.AS.console.URI.XSS
IBM.WebSphere.AS.Malformed.Serialized.Object.DOS
Mod
Name:IBM.WebSphere.Application.Malformed.Serialized.Object.DOS:IBM.WebSphere.AS.Malformed.Serialized.Object.DOS
Oracle.WebLogic.Server.resolveProxyClass.Deserialization
Mod
Name:Oracle.WebLogic.Server.resolveProxyClass.Deserializatiion:Oracle.WebLogic.Server.resolveProxyClass.Deserialization
Ruckus.IoT.Controller.Web.UI.Authentication.Bypass
Mod
Default_action:pass:drop
MS.Windows.Kernel.Local.CVE-2020-17087.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Windows.CVE-2020-17088.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Windows.Win32k.Driver.CVE-2020-17057.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Windows.CVE-2020-17038.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Windows.CVE-2020-17010.Privilege.Elevation
Mod
Default_action:pass:drop
MS.DirectX.CVE-2020-16998.Privilege.Elevation
Mod
Default_action:pass:drop
MS.IE.jscript9.dll.convFunc.Memory.Corruption
Mod
Default_action:pass:drop
MS.Windows.NFS.Server.NfsSymLink.Path.Memory.Corruption
Mod
Default_action:pass:drop
MS.Windows.NFS.Server.NfsReadEx.Memory.Corruption
Mod
Default_action:pass:drop
MS.Windows.Network.File.System.RPCSEC_GSS.Handling.DoS
Mod
Default_action:pass:drop