Intrusion Prevention

Name Status Update
Tautulli.Shutdown.DoS
Add
TrixBox.CE.endpointcfg.php.AUTH.Remote.Command.Execution
Add
SysAid.On-Premise.UploadIcon.Arbitrary.File.Upload
Add
Zoho.ManageEngine.ServiceDesk.Plus.Arbitrary.File.Upload
Add
Nagios.XI.utils-rrdexport.inc.get_rrd_data.Command.Injection
Add
Kentico.CMS.Staging.SyncServer.Remote.Command.Execution
Add
RA.FactoryTalk.RNADiagnosticsSrv.Insecure.Deserialization
Add
IBM.i2.Analyst.Notebook.CVE-2020-4467.Memory.Corruption
Add
IBM.i2.Analyst.Notebook.CVE-2020-4468.Memory.Corruption
Add
IBM.i2.Analyst.Notebook.CVE-2020-4257.Memory.Corruption
Add
IBM.i2.Analyst.Notebook.CVE-2020-4262.Memory.Corruption
Add
IBM.i2.Analyst.Notebook.CVE-2020-4287.Memory.Corruption
Add
IBM.i2.Analyst.Notebook.CVE-2020-4343.Memory.Corruption
Add
IBM.i2.Analyst.Notebook.CVE-2020-4422.Memory.Corruption
Add
SafeNet.HASP.SL.ActiveX.Control.ChooseFilePath.Buffer.Overflow
Mod
Added Signature
D-Link.Devices.HNAP.SOAPAction-Header.Command.Execution
Mod
Added Signature
Oracle.Java.ZIP.File.Parsing.Stack.Overflow.DoS
Mod
Added Signature
Novell.GroupWise.Internet.Agent.SMTP.Command.Buffer.Overflow
Mod
Added Signature
Adobe.Reader.CVE-2020-3805.Use.After.Free
Mod
Added Signature
WordPress.MailPoet.Newsletters.Unauthenticated.File.Upload
Mod
Added Signature
MS.Visual.Studio.Code.Python.Extension.Remote.Code.Execution
Mod
Added Signature
MS.SQL.Server.Reporting.Service.Remote.Code.Execution
Mod
Added Signature
IBM.i2.Analyst.Notebook.CVE-2020-4288.Memory.Corruption
Mod
Name set to IBM.i2.Analyst.Notebook.CVE-2020-4288.Memory.Corruption
Apache.Tomcat.Windows.Installer.Password.Authentication.Bypass
Mod
Default_action set to drop
IBM.Data.Risk.Manager.Nmap.Scan.Command.Execution
Mod
Default_action set to drop
TerraMaster.TOS.ajaxdata.System.Command.Injection
Mod
Default_action set to drop
Netsweeper.Webadmin.Unixlogin.Command.Injection
Mod
Default_action set to drop
MS.IE.VBScript.Engine.SafeArrayDestroy.Remote.Code.Execution
Mod
Default_action set to drop
MS.IE.JScript.Engine.JsObjPropertyIsEnumerable.Use.After.Free
Mod
Default_action set to drop
MS.IE.VBScript.Engine.RegExp.Replace.Handling.Use.After.Free
Mod
Default_action set to drop
MS.Graphics.Components.CVE-2020-1153.Remote.Code.Execution
Mod
Default_action set to drop
MS.IE.VBScript.Engine.SafeArrayLock.Use.After.Free
Mod
Default_action set to drop
MS.Windows.CVE-2020-1135.Privilege.Elevation
Mod
Default_action set to drop
MS.Windows.CVE-2020-1143.Privilege.Elevation
Mod
Default_action set to drop
MS.Windows.CVE-2020-1054.Privilege.Elevation
Mod
Default_action set to drop
FG-VD-20-060_Fooplugins.0day
Mod
Default_action set to drop
IBM.i2.Analyst.Notebook.CVE-2020-4288.Memory.Corruption
Mod
Severity set to high