Intrusion Protection

Name Status Update
QNAP.NAS.HBS.3.Authentication.Bypass
Add
*
OpenSSL.SM2.Decryption.sm2_plaintext_size.Buffer.Overflow
Add
*
Apache.Tomcat.H2C.Memory.Exhaustion.DoS
Add
*
GitLab.Community.and.Enterprise.Edition.Branch.Name.Stored.XSS
Add
*
SolarWinds.Serv-U.FTP.Unauthorized.User.Creation
Mod
*Sig Added
MS.Exchange.Server.CVE-2021-34473.Remote.Code.Execution
Mod
*Sig Added
MS.Exchange.Server.ProxyOracle.XSS
Mod
Default_action:pass:drop
Centreon.metaService.php.meta_id.SQL.Injection
Mod
Default_action:pass:drop
MS.Windows.CVE-2021-36963.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Win32k.Kernel.CVE-2021-36975.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Win32k.Kernel.CVE-2021-38639.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Windows.Kernel.CVE-2021-38633.Privilege.Elevation
Mod
Default_action:pass:drop
MS.Exchange.MailboxExportRequest.Arbitrary.File.Write
Mod
Default_action:pass:drop
Adobe.Reader.CVE-2021-39845.Buffer.Overflow
Mod
Default_action:pass:drop
Adobe.Reader.CVE-2021-39846.Buffer.Overflow
Mod
Default_action:pass:drop
Adobe.Reader.CVE-2021-39841.DocMedia.Type.Confusion
Mod
Default_action:pass:drop
Adobe.Reader.AcroForm.listBox.Delete.Use.After.Free
Mod
Default_action:pass:drop
Adobe.Acrobat.Reader.listBox.getItemAt.Use.After.Free
Mod
Default_action:pass:drop
Adobe.Reader.CVE-2021-39842.Use.After.Free
Mod
Default_action:pass:drop
Adobe.Reader.XObject.Height.Out.of.Bounds.Write
Mod
Default_action:pass:drop
Adobe.Reader.CVE-2021-39844.Out.of.Bounds.Read
Mod
Default_action:pass:drop
Adobe.Acrobat.Reader.CVE-2021-39840.Use.After.Free
Mod
Default_action:pass:drop