Intrusion Protection

Name Status Update
MS.Office.OpenXML.ActiveX.Directory.CFB.Information.Disclosure
Add
*
Foxit.Reader.JavaScript.popUpMenu.Use.After.Free
Add
*
RIG.Exploit.Kit
Mod
*Sig Added
Embedded.Linux.Malicious.Script
Mod
*Sig Added
Microsoft.Windows.DHCP.Server.Vendor.Options.Code.Execution
Mod
*Sig Added
HTTP.Host.Header.Buffer.Overflow
Mod
*Sig Added
OpenBSD.DHCP.Remote.DoS
Mod
*Sig Added
HTTP.Invalid.Response.Status.Code.DoS
Mod
*Sig Added
MS.IE.saveHistory.Remote.Code.Execution
Mod
*Sig Added
Symfony.HTTP.request.header.Security.Bypass
Mod
Name:X-Rewrite-URL.HTTP.Request.Header.SQL.Injection:Symfony.HTTP.request.header.Security.Bypass
MS.DNS.WINS.Server.Information.Spoofing
Del
*
Nexus.Repository.Manager.Unauthorized.Remote.Code.Execution
Mod
Default_action:pass:drop
ReGeorg.HTTP.Tunnel
Mod
Default_action:pass:drop
SQL.Malicious.Statements
Mod
Default_action:pass:drop
OpenMRS.webservices.rest.Insecure.Deserialization
Mod
Default_action:pass:drop
PHP.Diescan
Mod
Default_action:pass:drop
OSX.Shlayer
Mod
Default_action:pass:drop
Symfony.HTTP.request.header.Security.Bypass
Mod
Severity:high:medium