Intrusion Protection

Name Status Update
Multiple.Vendors.getconfig.Information.Disclosure
Add
*
Multiple.Vendors.IP-Camera.Information.Disclosure
Add
*
Brickcom.Corp.Network.Camera.Conf.Information.Disclosure
Add
*
MS.Windows.NTFS.CVE-2021-31956.Privilege.Elevation
Add
*
MS.Windows.Kernel.CVE-2021-31955.Information.Disclosure
Add
*
MS.Windows.CVE-2021-31954.Privilege.Elevation
Add
*
MS.Windows.CVE-2021-31952.Privilege.Elevation
Add
*
MS.Windows.Kernel.CVE-2021-31199.Privilege.Elevation
Add
*
MS.Windows.Kernel.CVE-2021-31951.Privilege.Elevation
Add
*
MS.Windows.CVE-2021-33739.Privilege.Elevation
Add
*
MS.IE.Scripting.Engine.EmitScopeObjectInit.Memory.Corruption
Add
*
Malicious.Shellcode.Detection
Mod
*Sig Added
D-Link.Realtek.SDK.Miniigd.UPnP.SOAP.Command.Execution
Mod
*Sig Added
MS.Windows.HTTP.sys.UlpParseAcceptEncoding.Use.After.Free
Mod
*Sig Added
Zebrocy.Go.Backdoor
Mod
*Sig Added
WordPress.HTTP.Path.Traversal
Mod
*Sig Added
Atlassian.Jira.Server.ViewUserHover.jspa.Information.Disclosure
Mod
Default_action:pass:drop
MS.Windows.SMB.Smb2UpdateLeaseFileName.Information.Disclosure
Mod
Default_action:pass:drop
XStream.URLDataSource.SSRF
Mod
Default_action:pass:drop
XStream.FileStream.Arbitrary.File.Deletion
Mod
Default_action:pass:drop
Trend.Micro.InterScan.Messaging.Widget.Information.Disclosure
Mod
Default_action:pass:drop
XStream.Library.CVE-2020-26217.Insecure.Deserialization
Mod
Default_action:pass:drop
SolarWinds.NCM.VulnerabilitySettings.Arbitrary.File.Write
Mod
Default_action:pass:drop
PEAR.Archive.Tar.Symbolic.Link.Arbitrary.File.Overwrite
Mod
Default_action:pass:drop
IoT.SDK.goform.login.Java.Code.Injection
Mod
Default_action:pass:drop
Apache.Tomcat.JK.ISAPI.Connector.Directory.Traversal
Mod
Default_action:pass:drop
VMware.vCenter.vROps.Directory.Traversal
Mod
Default_action:pass:drop
Apache.Shiro.CVE-2020-17523.Authentication.Bypass
Mod
Default_action:pass:drop
Jenkins.Credentials.Plugin.Reflected.XSS
Mod
Default_action:pass:drop