Update #3244 (01/16/2020)
16 new signatures:
MEDIUM | TFTP:CURL-LIBCURL-OF | TFTP: cURL and libcurl TFTP blksize Heap Buffer Overflow |
HIGH | HTTP:CTS:YOUPHPTUBE-ENC-CE | HTTP: YouPHPTube Encoder getSpiritsFromVideo Command Injection |
MEDIUM | HTTP:STC:DL:WHATSAPP-GIF-RCE | HTTP: Whatsapp Remote Code Execution |
HIGH | HTTP:DIR:CITRIX-ADC-GW-RCE | HTTP: Citrix ADC & Gateway Remote Code Execution |
MEDIUM | APP:ORACLE:WEBLOGIC-EJBTAG-INJ | APP: Oracle Weblogic EJBTaglibDescriptor External Entity Injection |
HIGH | SMTP:OVERFLOW:EXIM-STRING-BO | SMTP: Exim string_vformat Heap-based Buffer Overflow |
MEDIUM | SSL:VULN:CVE-2020-0601-INFO-DIS | SSL: Microsoft ECDSA Certification Information Disclosure |
MEDIUM | HTTP:STC:CVE-2020-0601-INFO-DIS | HTTP: Microsoft ECDSA Certification Information Disclosure |
CRITICAL | HTTP:CTS:OPENEMR-NEWPHP-CMD-INJ | HTTP: OpenEMR New.php Command Injection |
HIGH | HTTP:CTS:FUSIONPBX-EXECPHP-CI | HTTP: FusionPBX Operator Panel exec.php Command Injection |
HIGH | HTTP:CTS:EMBEDTHIS-GO-FILE-UPL | HTTP: EmbedThis GoAhead Web Server File Upload Use After Free |
MEDIUM | HTTP:PHP:WP-CVE-2019-8942-CE | HTTP: WordPress CVE-2019-8942 Remote Code Execution |
HIGH | HTTP:DIR:NOSTROMO-NHTTPD-TRAV | HTTP: Nostromo nhttpd http_verify Directory Traversal |
CRITICAL | HTTP:STC:DL:MICROSOFT-JETDB-RCE | HTTP: Microsoft Windows Jet Database CVE-2019-1359 Out of Bounds Write |
HIGH | MS-RPC:OF:ADV-WEBBWP-RCE | MS-RPC: Advantech WebAccess SCADA BwPAlarm Buffer Overflow |
HIGH | VNC:TURBOVNC-FENCE-OF | VNC: TurboVNC Fence Message Stack-based Buffer Overflow |
1 updated signature:
HIGH | HTTP:EXPLOIT:CVE-2019-0604-RCE1 | HTTP: Microsoft Share Point CVE-2019-0604 Remote Code Execution 1 |
Details of the signatures included within this bulletin:
TFTP:CURL-LIBCURL-OF - TFTP: cURL and libcurl TFTP blksize Heap Buffer Overflow
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against cURL and libcurl. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Haxx libcurl 7.24.0
- Haxx libcurl 7.23.0
- Haxx libcurl 7.19.6
- Haxx libcurl 7.27.0
- Haxx libcurl 7.21.6
- Haxx libcurl 7.39
- Haxx libcurl 7.21.1
- Haxx libcurl 7.19.7
- Haxx libcurl 7.21.0
- Haxx libcurl 7.20.0
- Haxx libcurl 7.33.0
- Haxx libcurl 7.49.1
- Haxx libcurl 7.51.0
- Haxx libcurl 7.37.0
- Haxx libcurl 7.45.0
- Haxx libcurl 7.47.0
- Haxx libcurl 7.49.0
- Haxx libcurl 7.37.1
- Haxx libcurl 7.46.0
- Haxx libcurl 7.21.3
- Haxx libcurl 7.41.0
- Haxx libcurl 7.20.1
- Haxx libcurl 7.61.1
- Haxx libcurl 7.21.2
- Haxx libcurl 7.61.0
- Haxx libcurl 7.55.0
- Haxx libcurl 7.48.0
- Haxx libcurl 7.29.0
- Haxx libcurl 7.40.0
- Haxx libcurl 7.42.0
- Haxx libcurl 7.44.0
- Haxx libcurl 7.59.0
- Haxx libcurl 7.58.0
- Haxx libcurl 7.42.1
- Haxx libcurl 7.60.0
- Haxx libcurl 7.64.0
- Haxx libcurl 7.25.0
- Haxx libcurl 7.53.0
- Haxx libcurl 7.63.0
- Haxx libcurl 7.52.0
- Haxx libcurl 7.64.1
- Haxx libcurl 7.26.0
- Haxx libcurl 7.56.1
- Haxx libcurl 7.54.1
- Haxx libcurl 7.43.0
- Haxx libcurl 7.28.0
- Haxx libcurl 7.56.0
- Haxx libcurl 7.50.0
- Haxx libcurl 7.54.0
- Haxx libcurl 7.23.1
- Haxx libcurl 7.30.0
- Haxx libcurl 7.52.1
- Haxx libcurl 7.28.1
- Haxx libcurl 7.50.1
- Haxx libcurl 7.62.0
- Haxx libcurl 7.22.0
- Haxx libcurl 7.38.0
- Haxx libcurl 7.55.1
- Haxx libcurl 7.47.1
- Haxx libcurl 7.32.0
- Haxx libcurl 7.50.3
- Haxx libcurl 7.42
- Haxx libcurl 7.34.0
- Haxx libcurl 7.31.0
- Haxx libcurl 7.36.0
- Haxx libcurl 7.35.0
- Haxx libcurl 7.50.2
- Haxx libcurl 7.21.5
- Haxx libcurl 7.39.0
- Haxx libcurl 7.19.4
- Haxx libcurl 7.21.7
- Haxx libcurl 7.57.0
- Haxx libcurl 7.21.4
- Haxx libcurl 7.53.1
- Haxx libcurl 7.19.5
HTTP:CTS:YOUPHPTUBE-ENC-CE - HTTP: YouPHPTube Encoder getSpiritsFromVideo Command Injection
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against YouPHPTube. A successful attack can lead to command injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Youphptube youphptube_encoder 2.3
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Whatsapp. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Whatsapp whatsapp 2.19.145
- Whatsapp whatsapp 2.19.185
- Whatsapp whatsapp 2.19.158
- Whatsapp whatsapp 2.19.108
- Whatsapp whatsapp 2.18.32
- Whatsapp whatsapp 2.19.147
- Whatsapp whatsapp 2.19.187
- Whatsapp whatsapp 2.18.306
- Whatsapp whatsapp 2.19.196
- Whatsapp whatsapp 2.19.113
- Whatsapp whatsapp 2.19.69
- Whatsapp whatsapp 2.19.178
- Whatsapp whatsapp 2.16.310
- Whatsapp whatsapp 2.19.194
- Whatsapp whatsapp 2.17.395
- Whatsapp whatsapp 2.19.106
- Whatsapp whatsapp 2.19.81
- Whatsapp whatsapp 2.18.38
- Whatsapp whatsapp 2.19.129
- Whatsapp whatsapp 2.19.19
- Whatsapp whatsapp 2.19.61
- Whatsapp whatsapp 2.17.223
- Whatsapp whatsapp 2.19.87
- Whatsapp whatsapp 2.19.115
- Whatsapp whatsapp 2.19.184
- Whatsapp whatsapp 2.19.63
- Whatsapp whatsapp 2.19.102
- Whatsapp whatsapp 2.16.95
- Whatsapp whatsapp 2.19.189
- Whatsapp whatsapp 2.19.170
- Whatsapp whatsapp 2.16.275
- Whatsapp whatsapp 2.12.250
- Whatsapp whatsapp 2.19.119
- Whatsapp whatsapp 2.16.396
- Whatsapp whatsapp 2.19.67
- Whatsapp whatsapp 2.19.172
- Whatsapp whatsapp 2.19.34
- Whatsapp whatsapp 2.18.105
- Whatsapp whatsapp 2.19.230
- Whatsapp whatsapp 2.19.169
- Whatsapp whatsapp 2.19.79
- Whatsapp whatsapp 2.19.174
- Whatsapp whatsapp 2.16.392
- Whatsapp whatsapp 2.19.89
- Whatsapp whatsapp 2.17.351
- Whatsapp whatsapp 2.19.176
- Whatsapp whatsapp 2.19.203
- Whatsapp whatsapp 2.18.361
- Whatsapp whatsapp 2.11.561
- Whatsapp whatsapp 2.19.75
- Whatsapp whatsapp 2.19.45
- Whatsapp whatsapp 2.18.28
- Whatsapp whatsapp 2.19.28
- Whatsapp whatsapp 2.9.243
- Whatsapp whatsapp 2.19.163
- Whatsapp whatsapp 2.19.17
- Whatsapp whatsapp 2.19.73
- Whatsapp whatsapp 2.17.107
- Whatsapp whatsapp 2.19.9
- Whatsapp whatsapp 2.18.293
- Whatsapp whatsapp 2.19.157
- Whatsapp whatsapp 2.19.71
- Whatsapp whatsapp 2.19.92
- Whatsapp whatsapp 2.19.24
- Whatsapp whatsapp 2.18.248
- Whatsapp whatsapp 2.19.131
- Whatsapp whatsapp 2.19.167
- Whatsapp whatsapp 2.19.155
- Whatsapp whatsapp 2.19.65
- Whatsapp whatsapp 2.12.331
- Whatsapp whatsapp 2.16.306
- Whatsapp whatsapp 2.16.352
- Whatsapp whatsapp 2.18.373
- Whatsapp whatsapp 2.19.133
- Whatsapp whatsapp 2.19.165
- Whatsapp whatsapp 2.19.55
- Whatsapp whatsapp 2.19.57
- Whatsapp whatsapp 2.19.168
- Whatsapp whatsapp 2.19.126
- Whatsapp whatsapp 2.19.83
- Whatsapp whatsapp 2.18.36
- Whatsapp whatsapp 2.19.51
- Whatsapp whatsapp 2.19.7
- Whatsapp whatsapp 2.17.323
- Whatsapp whatsapp 2.19.142
- Whatsapp whatsapp 2.19.5
- Whatsapp whatsapp 2.19.175
- Whatsapp whatsapp 2.19.216
- Whatsapp whatsapp 2.19.120
- Whatsapp whatsapp 2.19.179
- Whatsapp whatsapp 2.19.144
- Whatsapp whatsapp 2.16.207
- Whatsapp whatsapp 2.17.146
- Whatsapp whatsapp 2.19.159
- Whatsapp whatsapp 2.12.367
- Whatsapp whatsapp 2.19.191
- Whatsapp whatsapp 2.19.186
- Whatsapp whatsapp 2.18.37
- Whatsapp whatsapp 2.19.59
- Whatsapp whatsapp 2.19.110
- Whatsapp whatsapp 2.19.148
- Whatsapp whatsapp 2.19.82
- Whatsapp whatsapp 2.19.195
- Whatsapp whatsapp 2.19.116
- Whatsapp whatsapp 2.17.190
- Whatsapp whatsapp 2.19.80
- Whatsapp whatsapp 2.16.323
- Whatsapp whatsapp 2.19.18
- Whatsapp whatsapp 2.19.128
- Whatsapp whatsapp 2.12.50
- Whatsapp whatsapp 2.19.98
- Whatsapp whatsapp 2.19.103
- Whatsapp whatsapp 2.19.86
- Whatsapp whatsapp 2.19.33
- Whatsapp whatsapp 2.12.304
- Whatsapp whatsapp 2.19.31
- Whatsapp whatsapp 2.19.118
- Whatsapp whatsapp 2.18.380
- Whatsapp whatsapp 2.19.171
- Whatsapp whatsapp 2.19.39
- Whatsapp whatsapp 2.19.78
- Whatsapp whatsapp 2.17.296
- Whatsapp whatsapp 2.19.6
- Whatsapp whatsapp 2.19.35
- Whatsapp whatsapp 2.19.93
- Whatsapp whatsapp 2.12.14
- Whatsapp whatsapp 2.17.254
- Whatsapp whatsapp 2.19.95
- Whatsapp whatsapp 2.19.14
- Whatsapp whatsapp 2.12.453
- Whatsapp whatsapp 2.19.74
- Whatsapp whatsapp 2.19.46
- Whatsapp whatsapp 2.19.177
- Whatsapp whatsapp 2.19.29
- Whatsapp whatsapp 2.12.556
- Whatsapp whatsapp 2.19.134
- Whatsapp whatsapp 2.19.97
- Whatsapp whatsapp 2.17.79
- Whatsapp whatsapp 2.18.29
- Whatsapp whatsapp 2.19.139
- Whatsapp whatsapp 2.19.8
- Whatsapp whatsapp 2.19.99
- Whatsapp whatsapp 2.19.156
- Whatsapp whatsapp 2.19.42
- Whatsapp whatsapp 2.16.382
- Whatsapp whatsapp 2.12.48
- Whatsapp whatsapp 2.19.25
- Whatsapp whatsapp 2.17.427
- Whatsapp whatsapp 2.19.130
- Whatsapp whatsapp 2.19.160
- Whatsapp whatsapp 2.19.154
- Whatsapp whatsapp 2.19.27
- Whatsapp whatsapp 2.18.341
- Whatsapp whatsapp 2.19.166
- Whatsapp whatsapp 2.19.152
- Whatsapp whatsapp 2.16.225
- Whatsapp whatsapp 2.19.54
- Whatsapp whatsapp 2.19.164
- Whatsapp whatsapp 2.19.150
- Whatsapp whatsapp 2.19.136
- Whatsapp whatsapp 2.18.327
- Whatsapp whatsapp 2.19.56
- Whatsapp whatsapp 2.19.127
- Whatsapp whatsapp 2.12.30
- Whatsapp whatsapp 2.17.24
- Whatsapp whatsapp 2.19.50
- Whatsapp whatsapp 2.19.138
- Whatsapp whatsapp 2.18.132
- Whatsapp whatsapp 2.19.48
- Whatsapp whatsapp 2.19.52
- Whatsapp whatsapp 2.19.123
- Whatsapp whatsapp 2.19.143
- Whatsapp whatsapp 2.11.544
- Whatsapp whatsapp 2.19.4
- Whatsapp whatsapp 2.18.30
- Whatsapp whatsapp 2.19.192
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Citrix ADC & Gateway. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Citrix application_delivery_controller_firmware 12.1
- Citrix netscaler_gateway_firmware 12.0
- Citrix netscaler_gateway_firmware 10.5
- Citrix application_delivery_controller_firmware 13.0
- Citrix netscaler_gateway_firmware 12.1
- Citrix gateway_firmware 13.0
- Citrix netscaler_gateway_firmware 11.1
- Citrix application_delivery_controller_firmware 12.0
- Citrix application_delivery_controller_firmware 10.5
- Citrix application_delivery_controller_firmware 11.1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft. A successful attack can lead to sensitive information disclosure.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft windows_10 1607
- Microsoft windows_server_2016 1903
- Microsoft windows_10 1709
- Microsoft windows_10 1803
- Microsoft windows_10 1909
- Microsoft windows_10 1809
- Microsoft windows_server_2019 -
- Microsoft windows_server_2016 1909
- Microsoft windows_10 1903
- Microsoft windows_server_2016 1803
- Microsoft windows_10 -
- Microsoft windows_server_2016 -
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft. A successful attack can lead to sensitive information disclosure.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft windows_10 1607
- Microsoft windows_server_2016 1903
- Microsoft windows_10 1709
- Microsoft windows_10 1803
- Microsoft windows_10 1909
- Microsoft windows_10 1809
- Microsoft windows_server_2019 -
- Microsoft windows_server_2016 1909
- Microsoft windows_10 1903
- Microsoft windows_server_2016 1803
- Microsoft windows_10 -
- Microsoft windows_server_2016 -
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against OpenEMR. A successful attack can lead to command injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
HTTP:CTS:EMBEDTHIS-GO-FILE-UPL - HTTP: EmbedThis GoAhead Web Server File Upload Use After Free
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against EmbedThis GoAhead Web Server. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Embedthis goahead 5.0.1
- Embedthis goahead 4.1.1
- Embedthis goahead 3.6.5
MS-RPC:OF:ADV-WEBBWP-RCE - MS-RPC: Advantech WebAccess SCADA BwPAlarm Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Advantech WebAccess. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, j-series-9.5, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, idp-5.0.110121210, srx-12.1, srx-branch-12.1, idp-5.0.110130325, vsrx-12.1, vsrx-15.1
References:
Affected Products:
- Advantech webaccess 6.0-2008.04.08
- Advantech webaccess 6.0-2009.04.02
- Advantech webaccess 7.0-2012.03.29
- Advantech webaccess 7.0-2009.11.16
- Advantech webaccess 7.0-2010.07.02
- Advantech webaccess 6.0-2007.11.12
- Advantech webaccess 7.2-2013.08.05
- Advantech webaccess 8.1_20160519
- Advantech webaccess 6.0-2008.09.12
- Advantech webaccess 7.0-2011.12.20
- Advantech webaccess 6.0-2007.10.18
- Advantech webaccess 7.0-2012.09.12
- Advantech webaccess 6.0-2008.08.26
- Advantech webaccess 7.1
- Advantech webaccess 8.4.0
- Advantech webaccess 6.0-2008.09.23
- Advantech webaccess 7.2_20140606
- Advantech webaccess 6.0-2009.3.10
- Advantech webaccess 8.4.2
- Advantech webaccess 6.0
- Advantech webaccess 7.2-2013.12.15
- Advantech webaccess 7.0-2010.06.08
- Advantech webaccess 6.0-2008.04.29
- Advantech webaccess 7.2-2013.09.24
- Advantech webaccess 7.0-2012.03.18
- Advantech webaccess 6.0-2008.11.06
- Advantech webaccess 6.0-2008.09.29
- Advantech webaccess 6.0-2007.10.05
- Advantech webaccess 6.0-2007.07.24
- Advantech webaccess 7.0-2013.01.21
- Advantech webaccess 8.3.1
- Advantech webaccess 6.0-2008.05.15
- Advantech webaccess 7.2-2013.10.28
- Advantech webaccess 8.2_20170817
- Advantech webaccess 6.0-2009.06.03
- Advantech webaccess 7.2-2013.07.01
- Advantech webaccess 6.0-2008.08.03
- Advantech webaccess 8.3.0
- Advantech webaccess 6.0-2007.12.06
- Advantech webaccess 6.0-2007.10.16
- Advantech webaccess 6.0-2009.04.12
- Advantech webaccess 8.2
- Advantech webaccess 7.0-2011.08.27
- Advantech webaccess 6.0-2008.06.03
- Advantech webaccess 8.3.5
- Advantech webaccess 6.0-2008.01.17
- Advantech webaccess 7.0-2009.08.03
- Advantech webaccess 7.2-2013.10.24
- Advantech webaccess 6.0-2008.03.05
- Advantech webaccess 7.0-2009.08.14
- Advantech webaccess 7.2-2013.08.18
- Advantech webaccess 7.2-2013.10.22
- Advantech webaccess 7.1-2013.04.01
- Advantech webaccess 7.0-2009.07.21
- Advantech webaccess 7.2-2013.11.01
- Advantech webaccess 6.0-2009.1.06
- Advantech webaccess 6.0-2009.2.18
- Advantech webaccess 6.0-2007.06.18
- Advantech webaccess 8.2_20161121
- Advantech webaccess 7.0-2010.05.10
- Advantech webaccess 8.0
- Advantech webaccess 7.0-2010.09.02
- Advantech webaccess 6.0-2007.08.09
- Advantech webaccess 6.0-2007.11.27
- Advantech webaccess 6.0-2008.02.14
- Advantech webaccess 6.0-2009.06.09
- Advantech webaccess 6.0-2008.01.14
- Advantech webaccess 6.0-2009.04.09
- Advantech webaccess 6.0-2009.3.24
- Advantech webaccess 6.0-2008.07.29
- Advantech webaccess 8.4
- Advantech webaccess 8.1_20151230
- Advantech webaccess 6.0-2007.06.12
- Advantech webaccess 6.0-2007.09.10
- Advantech webaccess 6.0-2007.11.29
- Advantech webaccess 6.0-2008.06.23
- Advantech webaccess 6.0-2009.3.29
- Advantech webaccess 6.0-2007.09.16
- Advantech webaccess 7.0-2009.06.29
- Advantech webaccess 6.0-2007.08.01
- Advantech webaccess 7.0-2011.05.23
- Advantech webaccess 6.0-2008.06.25
- Advantech webaccess 7.2-2013.10.02
- Advantech webaccess 7.0-2011.01.11
- Advantech webaccess 7.0-2010.07.16
- Advantech webaccess 7-2009.10.13
- Advantech webaccess 6.0-2007.07.12
- Advantech webaccess 7.0-2010.08.17
- Advantech webaccess 6.0-2007.10.30
- Advantech webaccess 7.2_20140730
- Advantech webaccess 6.0-2009.05.14
- Advantech webaccess 7.2-2013.10.17
- Advantech webaccess 7.0-2011.01.26
- Advantech webaccess 7.0-2012.06.29
- Advantech webaccess 6.0-2007.06.05
- Advantech webaccess 7.2-2013.09.12
- Advantech webaccess 7.2
- Advantech webaccess 7.2-2014.01.20
- Advantech webaccess 7.0
- Advantech webaccess 8.4.1
- Advantech webaccess 8.0-2014.10.31
- Advantech webaccess 7.0-2012.06.02
- Advantech webaccess 6.0-2007.11.08
- Advantech webaccess 7.0-2010.11.10
- Advantech webaccess 6.0-2009.05.27
- Advantech webaccess 6.0-2008.05.21
- Advantech webaccess 7.2-2014.01.24
- Advantech webaccess 7.0-2010.09.30
- Advantech webaccess 6.0-2009.04.27
- Advantech webaccess 7.0-2012.10.31
- Advantech webaccess 6.0-2008.11.07
- Advantech webaccess 7.0-2012.05.21
- Advantech webaccess 7.2-2014.02.10
- Advantech webaccess 7.2-2013.07.26
- Advantech webaccess 6.0-2009.2.10
- Advantech webaccess 6.0-2008.04.28
- Advantech webaccess 7.2-2013.09.27
- Advantech webaccess 8.3.2
- Advantech webaccess 7.0-2012.03.02
- Advantech webaccess 6.0-2007.09.26
- Advantech webaccess 6.0-2007.07.27
- Advantech webaccess 6.0-2008.11.03
- Advantech webaccess 6.0-2008.05.29
- Advantech webaccess 7.2-2013.08.25
- Advantech webaccess 6.0-2007.07.09
- Advantech webaccess 6.0-2008.11.14
- Advantech webaccess 6.0-2008.05.14
- Advantech webaccess 8.0_20150816
- Advantech webaccess 6.0-2008.01.21
- Advantech webaccess 7.2-2013.10.30
- Advantech webaccess 6.0-2007.06.25
- Advantech webaccess 8.3.4
- Advantech webaccess 7.0-2012.12.05
- Advantech webaccess 7.2_20140303
- Advantech webaccess 6.0-2008.03.04
- Advantech webaccess 7.0-2012.12.10
- Advantech webaccess 6.0-2008.11.12
- Advantech webaccess 7.0-2009.08.13
- Advantech webaccess 6.0-2008.03.06
- Advantech webaccess 7.0-2010.08.10
- Advantech webaccess 7.2-2013.11.14
- Advantech webaccess 7.2-2014.01.10
- Advantech webaccess 6.0-2009.2.3
- Advantech webaccess 7.0-2012.03.08
- Advantech webaccess 8.1
- Advantech webaccess 6.0-2008.06.06
- Advantech webaccess 7.0-2013.01.02
- Advantech webaccess 6.0-2009.06.08
- Advantech webaccess 7.0-2010.02.24
- Advantech webaccess 8.0_20150412
- Advantech webaccess 6.0-2007.09.06
- Advantech webaccess 7.0-2013.01.17
- Advantech webaccess 6.0-2009.1.14
- Advantech webaccess 7.0-2012.11.29
- Advantech webaccess 6.0-2008.07.18
- Advantech webaccess 6.0-2007.12.10
- Advantech webaccess 6.0-2008.09.30
- Advantech webaccess 7.0-2013.01.08
- Advantech webaccess 6.0-2008.05.12
- Advantech webaccess 6.0-2009.4.01
- Advantech webaccess 6.0-2008.07.01
- Advantech webaccess 6.0-2008.12.30
- Advantech webaccess 6.0-2007.09.05
- Advantech webaccess 6.0-2007.11.05
- Advantech webaccess 7.0-2012.09.13
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Nostromo nhttpd server. A successful attack can lead to directory traversal and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Nazgul nostromo_nhttpd 1.9.6
APP:ORACLE:WEBLOGIC-EJBTAG-INJ - APP: Oracle Weblogic EJBTaglibDescriptor External Entity Injection
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Weblogic. A successful attack can lead to command injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, isg-3.1.134269, vsrx-15.1
References:
Affected Products:
- Oracle weblogic_server 12.2.1.3.0
- Oracle weblogic_server 10.3.6.0.0
- Oracle weblogic_server 12.1.3.0.0
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Exim SMTP server. A successful attack can lead to a arbitrary remote code execution or a denial of service condition on the target server.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Debian debian_linux 10
- Exim exim 4.92.2
- Canonical ubuntu_linux 19.04
- Exim exim 4.92.1
- Exim exim 4.92
HTTP:CTS:FUSIONPBX-EXECPHP-CI - HTTP: FusionPBX Operator Panel exec.php Command Injection
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against FusionPBX Web Application. A successful attack can lead to command injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Fusionpbx fusionpbx 4.4.3
HTTP:EXPLOIT:CVE-2019-0604-RCE1 - HTTP: Microsoft Share Point CVE-2019-0604 Remote Code Execution 1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Share Point. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft sharepoint_server 2019
- Microsoft sharepoint_server 2010
- Microsoft sharepoint_enterprise_server 2016
- Microsoft sharepoint_foundation 2013
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against WordPress. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Wordpress wordpress 4.0.10
- Wordpress wordpress 4.2.12
- Wordpress wordpress 2.1.1
- Wordpress wordpress 4.5
- Wordpress wordpress 4.0.21
- Wordpress wordpress 2.7
- Wordpress wordpress 4.7.1
- Wordpress wordpress 4.4.7
- Wordpress wordpress 3.7.5
- Wordpress wordpress 1.6.2
- Wordpress wordpress 4.0.17
- Wordpress wordpress 2.3.1
- Wordpress wordpress 3.9.15
- Wordpress wordpress 4.3.10
- Wordpress wordpress 3.0.4
- Wordpress wordpress 4.1.3
- Wordpress wordpress 4.9.6
- Wordpress wordpress 4.0.13
- Wordpress wordpress 4.7.9
- Wordpress wordpress 4.1.16
- Wordpress wordpress 4.4.12
- Wordpress wordpress 2.2.1
- Wordpress wordpress 4.5.2
- Wordpress wordpress -
- Wordpress wordpress 3.8.12
- Wordpress wordpress 3.8.28
- Wordpress wordpress 4.5.11
- Wordpress wordpress 4.0.1
- Wordpress wordpress 2.8.5
- Wordpress wordpress 1.2.2
- Wordpress wordpress 3.9.21
- Wordpress wordpress 4.1.10
- Wordpress wordpress 4.2.8
- Wordpress wordpress 3.8.6
- Wordpress wordpress 1.5.1
- Wordpress wordpress 4.0.9
- Wordpress wordpress 3.8.22
- Wordpress wordpress 4.7.12
- Wordpress wordpress 2.0.3
- Wordpress wordpress 4.8.2
- Wordpress wordpress 4.2.11
- Wordpress wordpress 3.4.2
- Wordpress wordpress 4.6.3
- Wordpress wordpress 3.5
- Wordpress wordpress 3.3.1
- Wordpress wordpress 3.7.26
- Wordpress wordpress 4.0.12
- Wordpress wordpress 4.3.15
- Wordpress wordpress 4.3.5
- Wordpress wordpress 4.1.26
- Wordpress wordpress 4.2.19
- Wordpress wordpress 1.5.1.1
- Wordpress wordpress 4.1.4
- Wordpress wordpress 4.4
- Wordpress wordpress 4.0.22
- Wordpress wordpress 2.6
- Wordpress wordpress 4.7.6
- Wordpress wordpress 4.4.6
- Wordpress wordpress 3.7.4
- Wordpress wordpress 4.4.15
- Wordpress wordpress 2.3.2
- Wordpress wordpress 3.9.14
- Wordpress wordpress 3.9.2
- Wordpress wordpress 3.0.5
- Wordpress wordpress 0.711
- Wordpress wordpress 4.9.7
- Wordpress wordpress 3.7.14
- Wordpress wordpress 1.2
- Wordpress wordpress 4.6.14
- Wordpress wordpress 3.6.1
- Wordpress wordpress 3.8.13
- Wordpress wordpress 4.2.7
- Wordpress wordpress 4.5.16
- Wordpress wordpress 2.6.3
- Wordpress wordpress 3.8.25
- Wordpress wordpress 2.8.4
- Wordpress wordpress 1.2.3
- Wordpress wordpress 3.9.26
- Wordpress wordpress 4.1.11
- Wordpress wordpress 4.5.3
- Wordpress wordpress 3.8.7
- Wordpress wordpress 2.0.11
- Wordpress wordpress 4.5.9
- Wordpress wordpress 4.0.8
- Wordpress wordpress 4.7.13
- Wordpress wordpress 2.0.2
- Wordpress wordpress 4.8.5
- Wordpress wordpress 4.2.10
- Wordpress wordpress 4.0.19
- Wordpress wordpress 4.6.2
- Wordpress wordpress 3.2
- Wordpress wordpress 2.9.1
- Wordpress wordpress 3.7.27
- Wordpress wordpress 4.4.9
- Wordpress wordpress 4.3.16
- Wordpress wordpress 4.3.2
- Wordpress wordpress 4.1.25
- Wordpress wordpress 3.9.13
- Wordpress wordpress 3.7.16
- Wordpress wordpress 3.9.9
- Wordpress wordpress 5.0
- Wordpress wordpress 1.5.1.2
- Wordpress wordpress 4.1.5
- Wordpress wordpress 4.0.14
- Wordpress wordpress 4.9.8
- Wordpress wordpress 4.7
- Wordpress wordpress 4.0.23
- Wordpress wordpress 2.5
- Wordpress wordpress 4.7.7
- Wordpress wordpress 4.4.1
- Wordpress wordpress 3.7.7
- Wordpress wordpress 4.4.14
- Wordpress wordpress 2.3.3
- Wordpress wordpress 3.9.1
- Wordpress wordpress 3.0.2
- Wordpress wordpress 4.6.10
- Wordpress wordpress 1.3
- Wordpress wordpress 2.2.3
- Wordpress wordpress 4.5.4
- Wordpress wordpress 3.8.14
- Wordpress wordpress 3.7.28
- Wordpress wordpress 4.2.6
- Wordpress wordpress 4.5.17
- Wordpress wordpress 2.6.2
- Wordpress wordpress 4.0.3
- Wordpress wordpress 3.8.24
- Wordpress wordpress 2.8.3
- Wordpress wordpress 3.9.3
- Wordpress wordpress 2.8.5.1
- Wordpress wordpress 4.6.9
- Wordpress wordpress 3.9.27
- Wordpress wordpress 3.7.20
- Wordpress wordpress 3.8.4
- Wordpress wordpress 2.0.10
- Wordpress wordpress 2.0.1
- Wordpress wordpress 4.8.4
- Wordpress wordpress 4.2.17
- Wordpress wordpress 3.4.0
- Wordpress wordpress 4.6.1
- Wordpress wordpress 3.3
- Wordpress wordpress 3.3.3
- Wordpress wordpress 4.0.24
- Wordpress wordpress 4.4.8
- Wordpress wordpress 4.3.17
- Wordpress wordpress 4.3.3
- Wordpress wordpress 4.2.22
- Wordpress wordpress 4.1.24
- Wordpress wordpress 3.9.12
- Wordpress wordpress 2.0.9
- Wordpress wordpress 3.7.11
- Wordpress wordpress 3.9.8
- Wordpress wordpress 1.5.1.3
- Wordpress wordpress 4.1.6
- Wordpress wordpress 4.6
- Wordpress wordpress 3.7.15
- Wordpress wordpress 4.7.4
- Wordpress wordpress 4.4.0
- Wordpress wordpress 3.7.6
- Wordpress wordpress 4.4.17
- Wordpress wordpress 3.9.0
- Wordpress wordpress 3.0.3
- Wordpress wordpress 4.9.1
- Wordpress wordpress 2.9.1.1
- Wordpress wordpress 2.2.2
- Wordpress wordpress 4.6.12
- Wordpress wordpress 3.8.15
- Wordpress wordpress 4.1.17
- Wordpress wordpress 4.2.5
- Wordpress wordpress 4.5.14
- Wordpress wordpress 2.6.5
- Wordpress wordpress 4.0.2
- Wordpress wordpress 3.8.27
- Wordpress wordpress 2.8.2
- Wordpress wordpress 4.6.8
- Wordpress wordpress 3.9.24
- Wordpress wordpress 3.7.21
- Wordpress wordpress 3.8.5
- Wordpress wordpress 4.0.15
- Wordpress wordpress 1.5.2
- Wordpress wordpress 3.9.19
- Wordpress wordpress 4.8.7
- Wordpress wordpress 3.7.18
- Wordpress wordpress 3.4.1
- Wordpress wordpress 3.0
- Wordpress wordpress 3.3.2
- Wordpress wordpress 4.0.25
- Wordpress wordpress 2.3
- Wordpress wordpress 3.7.9
- Wordpress wordpress 1.3.3
- Wordpress wordpress 4.3.18
- Wordpress wordpress 4.3.0
- Wordpress wordpress 4.2.23
- Wordpress wordpress 4.1.23
- Wordpress wordpress 3.9.11
- Wordpress wordpress 2.0.8
- Wordpress wordpress 3.7.10
- Wordpress wordpress 3.8
- Wordpress wordpress 4.1.7
- Wordpress wordpress 4.1
- Wordpress wordpress 4.7.5
- Wordpress wordpress 4.4.3
- Wordpress wordpress 3.7.1
- Wordpress wordpress 1.5
- Wordpress wordpress 4.4.16
- Wordpress wordpress 4.3.8
- Wordpress wordpress 3.9.7
- Wordpress wordpress 4.9.2
- Wordpress wordpress 4.9
- Wordpress wordpress 4.6.11
- Wordpress wordpress 3.8.16
- Wordpress wordpress 4.1.14
- Wordpress wordpress 4.2.4
- Wordpress wordpress 4.5.15
- Wordpress wordpress 4.0.5
- Wordpress wordpress 3.8.26
- Wordpress wordpress 2.0.7
- Wordpress wordpress 2.8.1
- Wordpress wordpress 4.6.7
- Wordpress wordpress 3.9.25
- Wordpress wordpress 3.7.22
- Wordpress wordpress 4.1.19
- Wordpress wordpress 1.0.1
- Wordpress wordpress 3.8.2
- Wordpress wordpress 4.3.11
- Wordpress wordpress 3.1.4
- Wordpress wordpress 3.9.18
- Wordpress wordpress 4.8.6
- Wordpress wordpress 4.2.15
- Wordpress wordpress 3.1
- Wordpress wordpress 2.1.2
- Wordpress wordpress 4.0.26
- Wordpress wordpress 2.2
- Wordpress wordpress 4.7.2
- Wordpress wordpress 3.7.8
- Wordpress wordpress 1.3.2
- Wordpress wordpress 4.3.19
- Wordpress wordpress 4.3.1
- Wordpress wordpress 4.2.20
- Wordpress wordpress 4.1.22
- Wordpress wordpress 3.9.10
- Wordpress wordpress 3.7.13
- Wordpress wordpress 3.9
- Wordpress wordpress 2.7.1
- Wordpress wordpress 4.0
- Wordpress wordpress 4.4.2
- Wordpress wordpress 4.4.11
- Wordpress wordpress 4.3.9
- Wordpress wordpress 3.9.6
- Wordpress wordpress 4.2.3
- Wordpress wordpress 3.0.1
- Wordpress wordpress 4.1.8
- Wordpress wordpress 4.9.3
- Wordpress wordpress 4.8
- Wordpress wordpress 4.5.12
- Wordpress wordpress 3.8.29
- Wordpress wordpress 4.8.9
- Wordpress wordpress 4.5.7
- Wordpress wordpress 3.8.17
- Wordpress wordpress 3.9.22
- Wordpress wordpress 4.1.15
- Wordpress wordpress 4.2.18
- Wordpress wordpress 3.5.2
- Wordpress wordpress 3.1.3
- Wordpress wordpress 4.0.4
- Wordpress wordpress 3.8.21
- Wordpress wordpress 2.0.6
- Wordpress wordpress 4.8.1
- Wordpress wordpress 4.6.6
- Wordpress wordpress 3.6
- Wordpress wordpress 3.7.23
- Wordpress wordpress 2.9
- Wordpress wordpress 1.0.2
- Wordpress wordpress 3.8.3
- Wordpress wordpress 4.3.12
- Wordpress wordpress 4.3.6
- Wordpress wordpress 2.5.1
- Wordpress wordpress 4.2.14
- Wordpress wordpress 2.1.3
- Wordpress wordpress 2.1
- Wordpress wordpress 4.7.3
- Wordpress wordpress 4.4.5
- Wordpress wordpress 4.5.5
- Wordpress wordpress 4.4.18
- Wordpress wordpress 4.2.21
- Wordpress wordpress 3.8.18
- Wordpress wordpress 4.1.21
- Wordpress wordpress 3.9.17
- Wordpress wordpress 4.0.16
- Wordpress wordpress 3.0.6
- Wordpress wordpress 4.1.1
- Wordpress wordpress 4.9.4
- Wordpress wordpress 4.3
- Wordpress wordpress 3.7.3
- Wordpress wordpress 4.2.16
- Wordpress wordpress 4.4.10
- Wordpress wordpress 3.7.12
- Wordpress wordpress 3.8.10
- Wordpress wordpress 3.9.5
- Wordpress wordpress 4.2.2
- Wordpress wordpress 4.1.9
- Wordpress wordpress 4.5.13
- Wordpress wordpress 0.72
- Wordpress wordpress 3.2.1
- Wordpress wordpress 4.8.8
- Wordpress wordpress 4.5.8
- Wordpress wordpress 1.2.4
- Wordpress wordpress 3.9.23
- Wordpress wordpress 4.1.12
- Wordpress wordpress 4.1.18
- Debian debian_linux 9.0
- Wordpress wordpress 3.8.8
- Wordpress wordpress 3.5.1
- Wordpress wordpress 3.1.2
- Wordpress wordpress 4.0.7
- Wordpress wordpress 3.8.20
- Wordpress wordpress 3.1.1
- Wordpress wordpress 4.0.6
- Wordpress wordpress 3.8.23
- Wordpress wordpress 4.7.11
- Wordpress wordpress 2.0.4
- Wordpress wordpress 4.8.3
- Wordpress wordpress 4.0.18
- Wordpress wordpress 4.6.4
- Wordpress wordpress 3.4
- Wordpress wordpress 3.7.25
- Wordpress wordpress 4.6.13
- Wordpress wordpress 3.8.1
- Wordpress wordpress 4.3.14
- Wordpress wordpress 3.7.19
- Wordpress wordpress 4.3.4
- Wordpress wordpress 3.7.29
- Wordpress wordpress 4.5.6
- Wordpress wordpress 4.7.10
- Wordpress wordpress 2.0.5
- Wordpress wordpress 4.2.13
- Wordpress wordpress 4.6.5
- Wordpress wordpress 3.7
- Wordpress wordpress 2.9.2
- Wordpress wordpress 3.7.24
- Wordpress wordpress 2.8
- Wordpress wordpress 4.3.13
- Wordpress wordpress 4.3.7
- Wordpress wordpress 4.0.11
- Wordpress wordpress 4.0.20
- Wordpress wordpress 2.0
- Wordpress wordpress 4.4.4
- Wordpress wordpress 3.8.19
- Wordpress wordpress 4.1.20
- Wordpress wordpress 3.9.16
- Wordpress wordpress 1.1.1
- Wordpress wordpress 4.1.2
- Wordpress wordpress 4.9.5
- Wordpress wordpress 4.2
- Wordpress wordpress 4.7.8
- Wordpress wordpress 3.7.2
- Wordpress wordpress 1.0
- Wordpress wordpress 4.4.13
- Wordpress wordpress 0.71
- Wordpress wordpress 4.5.1
- Wordpress wordpress 3.8.11
- Wordpress wordpress 3.9.4
- Wordpress wordpress 4.2.1
- Wordpress wordpress 3.7.17
- Wordpress wordpress 1.2.1
- Wordpress wordpress 4.5.10
- Wordpress wordpress 2.6.1
- Wordpress wordpress 2.8.6
- Wordpress wordpress 2.8.5.2
- Wordpress wordpress 1.2.5
- Wordpress wordpress 3.9.20
- Wordpress wordpress 4.1.13
- Wordpress wordpress 4.2.9
- Wordpress wordpress 3.8.9
- Wordpress wordpress 3.5.0
HTTP:STC:DL:MICROSOFT-JETDB-RCE - HTTP: Microsoft Windows Jet Database CVE-2019-1359 Out of Bounds Write
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows jet Database. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft windows_10 1607
- Microsoft windows_server_2016 1903
- Microsoft windows_rt_8.1 -
- Microsoft windows_10 1803
- Microsoft windows_10 1809
- Microsoft windows_server_2019 -
- Microsoft windows_server_2016 1803
- Microsoft windows_10 1903
- Microsoft windows_8.1 -
- Microsoft windows_server_2008 r2
- Microsoft windows_server_2012 -
- Microsoft windows_10 1709
- Microsoft windows_7 -
- Microsoft windows_10 -
- Microsoft windows_10 1703
- Microsoft windows_server_2016 -
- Microsoft windows_server_2008 -
- Microsoft windows_server_2012 r2
VNC:TURBOVNC-FENCE-OF - VNC: TurboVNC Fence Message Stack-based Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against TurboVNC. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Turbovnc turbovnc 1.2.3
- Turbovnc turbovnc 0.3.1
- Turbovnc turbovnc 0.6
- Turbovnc turbovnc 2.1.1
- Turbovnc turbovnc 2.1
- Turbovnc turbovnc 0.5
- Turbovnc turbovnc 0.3.3
- Turbovnc turbovnc 2.0
- Turbovnc turbovnc 0.4
- Turbovnc turbovnc 2.1.2
- Turbovnc turbovnc 0.3
- Turbovnc turbovnc 2.2
- Turbovnc turbovnc 0.2
- Turbovnc turbovnc 0.1
- Turbovnc turbovnc 2.2.2
- Turbovnc turbovnc 2.2.1
- Turbovnc turbovnc 2.0.1
- Turbovnc turbovnc 1.2
- Turbovnc turbovnc 1.0
- Turbovnc turbovnc 1.0.1
- Turbovnc turbovnc 0.3.2
- Turbovnc turbovnc 2.0.2
- Turbovnc turbovnc 0.1.1
- Turbovnc turbovnc 0.5.1
- Turbovnc turbovnc 1.1
- Turbovnc turbovnc 1.0.2
- Turbovnc turbovnc 1.2.1
- Turbovnc turbovnc 1.2.2