27 new signatures:
HIGH | APP:ASUS-WRT-INFOSVR-COMND-EXEC | APP: Asus Write Infosvr Service Remote Command Execution |
HIGH | SSL:VULN:CVE-2015-0208-DOS | SSL: OpenSSL Invalid PSS Parameters Denial of Service |
MEDIUM | SSL:OPENSSL-DHE-DOS | SSL: OpenSSL DHE Client Key Exchange Denial of Service |
MEDIUM | HTTP:IIS:WEB-CONFIG-INFO-LEAK | HTTP: Microsoft IIS Web.config Information Disclosure Attempt |
HIGH | HTTP:STC:ADOBE:CVE-2015-0356-CE | HTTP: Adobe Flash CVE-2015-0356 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-3042-CE | HTTP: Adobe Flash Player CVE-2015-3042 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0357-CE | HTTP: Adobe Flash CVE-2015-0357 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-3041-CE | HTTP: Adobe Flash CVE-2015-3041 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0347-CE | HTTP: Adobe Flash CVE-2015-0347 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0349-CE | HTTP: Adobe Flash CVE-2015-0349 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0348-CE | HTTP: Adobe Flash CVE-2015-0348 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0358-CE | HTTP: Adobe Flash Player CVE-2015-0358 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0353-CE | HTTP: Adobe Flash Player CVE-2015-0353 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0359-MC | HTTP: Adobe Flash CVE-2015-0359 Memory Corruption |
MEDIUM | HTTP:STC:ADOBE:CVE-2015-3044-ID | HTTP: Adobe Flash Player CVE-2015-3044 Information Disclosure |
HIGH | HTTP:STC:ADOBE:CVE-2015-0360-MC | HTTP: Adobe Flash CVE-2015-0360 Memory Corruption |
HIGH | HTTP:STC:ADOBE:CVE-2015-0346-CE | HTTP: Adobe Flash Player CVE-2015-0346 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2015-0350-MC | HTTP: Adobe Flash CVE-2015-0350 Memory Corruption |
HIGH | HTTP:STC:ADOBE:CVE-2015-3038-MC | HTTP: Adobe Flash Player CVE-2015-3038 Memory Corruption |
HIGH | HTTP:STC:ADOBE:CVE-2015-0352-MC | HTTP: Adobe Flash Player CVE-2015-0352 Memory Corruption |
HIGH | HTTP:STC:ADOBE:CVE-2015-0355-MC | HTTP: Adobe Flash Player CVE-2015-0355 Memory Corruption |
CRITICAL | TROJAN:TESLACRYPT-CNC | TROJAN: TeslaCrypt C&C Communication Detected |
HIGH | HTTP:STC:DL:WNDPROC-INFO-DISC | HTTP: Microsoft wndproc Credentials Disclosure |
MEDIUM | HTTP:STC:ADOBE:CVE-2015-3040-ID | HTTP: Adobe Flash Player CVE-2015-3040 Information Disclosure |
HIGH | HTTP:STC:ADOBE:CVE-2015-0354-MC | HTTP: Adobe Flash Player CVE-2015-0354 Memory Corruption |
HIGH | HTTP:STC:ADOBE:CVE-2015-0351-MC | HTTP: Adobe Flash Player CVE-2015-0351 Use After Free |
MEDIUM | SCAN:OPENVAS-UA | SCAN: OpenVAS Scanner User Agent |
3 updated signatures:
HIGH | HTTP:IIS:INT-OVERFLOW-DOS | HTTP: IIS Webserver Denial of Service |
HIGH | SSL:VULN:CVE-2015-0291-DOS | SSL: OpenSSL Signature Algorithm CVE-2015-0291 DOS |
HIGH | SMB:EXPLOIT:CVE-2015-0240-RCE | SMB: Samba CVE-2015-0240 ServerPasswordSet Remote Code Execution |
3 renamed signatures:
HTTP:STC:IE:CVE-2015-1667-CE | -> | HTTP:STC:IE:CQUOTES-OBJECT-CE |
HTTP:STC:IE:CVE-2015-1665-RCE | -> | HTTP:STC:IE:OBJECT-HANDLNG-RCE |
HTTP:STC:DL:MS-CRFTD-RTF-DOC-RCE | -> | HTTP:STC:DL:MS-CRFTD-RTF-DOC-MC |
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to memory corruption.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful exploit can lead to remote code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Asus. A successful exploit can lead to remote command execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to memory corruption.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects the Command and Control traffic for the TeslaCrypt ransomware. The source IP host is infected and should be removed from the network for analysis.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against Microsoft wndproc. A successful attack can result in credentials disclosure and thereafter arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can result in unauthorized information disclosure.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects probes from the OpenVAS Scanner. If you have not authorized such a scan, an attacker may be using this tool to probe your network for vulnerable targets to attack.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to memory corruption.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against OpenSSL while performing signature algorithm extension communication. A successful attack can result in a denial-of-service condition.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability in Samba server. A remote, unauthenticated attacker could exploit this vulnerability by sending malicious request to the target Samba user.
srx-branch-11.4, idp-4.1.110110719, mx-11.4, mx-9.4, idp-5.0.110130325, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, isg-3.4.140032, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140842, idp-5.0.110121210, isg-3.5.140773, idp-5.1.110140626, isg-3.4.139899, idp-5.1.110140822, vsrx-15.1, idp-4.1.110110609, srx-11.4
This signature detects attempts to exploit a known vulnerability against Microsoft Office Docx file. A successful attack can lead to denial of service or arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability in the Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against OpenSSL while performing signature algorithm extension communication. A successful attack can result in a denial-of-service condition.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against OpenSSL. A successful exploit can lead to denial of service in the context of the application.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against Microsoft IIS Server. Attackers can send a maliciously crafted HTTP headers to the server to create a denial-of-service (DoS) condition.
DI-Base, DI-Server, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability in Microsoft IIS. Attacker can access device information without authentication.
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful exploit can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful exploit can lead to remote code execution.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to memory corruption.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful exploit can lead to Information Disclosure.
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, isg-3.5.140773, idp-5.1.110140626, isg-3.5.140842, idp-5.1.110140822, vsrx-15.1, srx-11.4