Intrusion Protection

Name Status Update
Micro.Focus.Secure.Messaging.Gateway.Command.Injection
Add
*
Apache.Flink.JobManager.Arbitrary.Path.Traversal
Add
*
SolarWinds.Orion.Platform.Authentication.Bypass
Add
*
Trend.Micro.InterScan.WS.VA.DecryptPasswd.Buffer.Overflow
Add
*
Wordpress.Plugin.Autoptimize.Arbitrary.File.Upload
Add
*
LDAP.Kerberos.SPN.Query
Add
*
SAP.Solution.Manager.SMDAgent.Remote.Code.Execution
Add
*
MS.Windows.NTFS.File.System.i30.Malformed.Path.DoS
Add
*
Accellion.FTA.wmProgressval.SSRF
Add
*
Accellion.FTA.auth_params.CRLF.Injection
Add
*
Accellion.FTA.LDAP.Injection
Add
*
Accellion.FTA.display.parameter.CRLF.Injection
Add
*
Google.Chrome.V8.ArgumentsLength.Type.Confusion
Add
*
Google.Chrome.V8.TypeInductionVariablePhi.Type.Confusion
Add
*
ZIP.File.Document.Filename.Buffer.Overflow
Mod
*Sig Added
Cisco.Security.Manager.SecretService.Insecure.Deserialization
Mod
*Sig Added
SolarWinds.SUNBURST.Backdoor
Mod
*Sig Added
Andariel.Botnet
Mod
*Sig Added
Backdoor.Cobalt.Strike.Beacon
Mod
*Sig Added
Oracle.WebLogic.JtaTransactionManager.Insecure.Deserialization
Mod
*Sig Added
SaltStack.Salt.API.SSH.Client.Command.Injection
Mod
*Sig Added
MS.Windows.TCP.IP.Ipv6pUpdateRDNSS.Remote.Code.Execution
Mod
*Sig Added
Adobe.Reader.MSI.DLL.Insecure.Library.Loading
Del
*
Malware.Drovorub
Mod
Default_action:pass:drop
MS.Windows.MF.H265.Stream.Parsing.Memory.Corruption
Mod
Default_action:pass:drop
Apple.Safari.in.Operator.Side.Effect.Memory.Corruption
Mod
Default_action:pass:drop
Acrobat.Reader.Acrobat.CVE-2020-24433.Arbitrary.File.Creation
Mod
Default_action:pass:drop
phpMyAdmin.scripts.setup.php.Insecure.Deserialization
Mod
Default_action:pass:drop
Oracle.WebLogic.Fusion.Middleware.UDDIexplorer.SSRF
Mod
Default_action:pass:drop
MS.Windows.PE.File.Signature.Spoofing
Mod
Default_action:pass:drop
Rails.MemCacheStore.RedisCacheStore.Remote.Code.Execution
Mod
Default_action:pass:drop
Cisco.Security.Manager.SecretService.Insecure.Deserialization
Mod
Default_action:pass:drop
Zabbix.Dashboard.URL.Widget.Stored.XSS
Mod
Default_action:pass:drop
HPE.SIM.AmfMessageDeserializer.Insecure.Deserialization
Mod
Default_action:pass:drop
Joomla!.ACL.Security.Privilege.Escalation
Mod
Default_action:pass:drop
Nagios.XI.autodiscovery_component_update_cron.Command.Injection
Mod
Default_action:pass:drop
MS.Defender.CVE-2021-1647.Remote.Code.Execution
Mod
Default_action:pass:drop
MS.SharePoint.Server.CVE-2021-1707.Security.Bypass
Mod
Default_action:pass:drop
MS.Windows.Kernel.CVE-2021-1709.Privilege.Elevation
Mod
Default_action:pass:drop
Joomla!.CMS.mod_random_image.link.Stored.XSS
Mod
Default_action:pass:drop