Intrusion Protection
Name | Severity | Status | Update |
---|---|---|---|
Backdoor.Cobalt.Strike.Beacon |
|
Mod
|
Sig Added |
Tomato.Router.Default.Credentials |
|
Mod
|
Severity:high:critical |
SAP.Netweaver.publicinfo.HTTP.Request.Smuggling |
|
Mod
|
Sig Added |
MS.Windows.Point-to-Point.Tunneling.Protocol.Use.After.Free |
|
Mod
|
Sig Added |
MS.Windows.Advanced.Local.Procedure.Call.Privilege.Elevation |
|
Mod
|
Default_action:pass:drop |
MS.Windows.Installer.CVE-2022-30147.Privilege.Elevation |
|
Mod
|
Default_action:pass:drop |
SoPlanning.rechercheProjet.Reflected.XSS |
|
Mod
|
Default_action:pass:drop |
Foxit.PDF.Reader.and.Editor.CVE-2021-21831.Use.After.Free |
|
Mod
|
Default_action:pass:drop |
MS.Windows.DirectWrite.DLL.Font.File.Memory.Corruption |
|
Mod
|
Default_action:pass:drop |
Apache.Druid.Loaddata.Arbitrary.File.Read |
|
Add
|
|
Moodle.h5p.Activity.Web.Service.SQL.Injection |
|
Mod
|
Default_action:pass:drop |
Ivanti.Avalanche.ES.getDisplayableTreeData.SQL.Injection |
|
Add
|
|
Acquia.Mautic.Tracking.Pixel.Stored.XSS |
|
Add
|
|
Apache.Airflow.Example.DAG.Command.Injection |
|
Add
|