Update #3265 (03/24/2020)
   
   
    
   
   
   
   19 new signatures:
   
    
    | MEDIUM | HTTP:STC:DL:NITROPRO-JS-API-RCE | HTTP: Nitro Pro PDF Reader Javascript API Remote Code Execution | 
    
    | MEDIUM | HTTP:STC:ADOBE:XPS-MUL-ID | HTTP: Adobe XPS Multiple Information Disclosure | 
    
    | HIGH | HTTP:CTS:CVE-2017-8046-RCE | HTTP: Spring Data REST CVE-2017-8046 Remote Code Execution | 
    
    | MEDIUM | HTTP:SUSP-HDR-REDRCT-VUL-107 | HTTP: SUSP-HDR-REDRCT Infection-107 | 
    
    | CRITICAL | HTTP:CTS:CNTREON-SRVRCONCONF-CI | HTTP: Centreon ServerConnectionConfigurationService.php Command Injection | 
    
    | CRITICAL | HTTP:STC:SCRIPT:CVE-2017-8540 | HTTP: Microsoft Malware Protection Engine CVE-2017-8540 Remote Code Execution | 
    
    | HIGH | HTTP:STC:IE:CVE-2017-8747-CE | HTTP: Microsoft Internet Explorer CVE-2017-8747 Remote Code Execution | 
    
    | HIGH | HTTP:CTS:HASHICORP-CONSUL-RCE | HTTP: Hashicorp Consul Rexec Remote Command Execution | 
    
    | LOW | HTTP:XSS:WRDPRS-PHOTOGLRY-SXSS | HTTP: WordPress 10Web Photo Gallery Plugin Two Stored Cross-Site Scripting | 
    
    | MEDIUM | HTTP:STC:ADOBE:CVE-2018-4981-CE | HTTP: Adobe Flash Player EMF File CVE-2018-4981 Remote Code Execution | 
    
    | LOW | HTTP:XSS:MS-SP-DISPLAYNAME-SXSS | HTTP: Microsoft SharePoint Server Stored Cross-Site Scripting | 
    
    | MEDIUM | HTTP:STC:ADOBE:CVE-2018-4973-ID | HTTP:  Adobe Acrobat Malformed JPEG CVE-2018-4973 Information Disclosure | 
    
    | HIGH | HTTP:STC:FASTERXML-JACKSON-CE | HTTP: FasterXML Jackson Databind Remote Code Execution | 
    
    | MEDIUM | MISC:OPEN-BGP-RAND-AS-ID-DOS | MISC: Open BGP Random AS ID Denial of Service | 
    
    | HIGH | APP:ORACLE:WL-LIMFILTER-INS-DES | APP: Oracle Weblogic LimitFilter Insecure Deserialization | 
    
    | HIGH | HTTP:STC:ADOBE:CVE-2020-3805-CE | HTTP: Adobe Acrobat Reader CVE-2020-3805 Remote Code Execution | 
    
    | MEDIUM | HTTP:STC:SWF:CVE-2018-15978-ID | HTTP: Adobe Flash CVE-2018-15978 Information Disclosure | 
    
    | HIGH | HTTP:CTS:JIRA-JAR-RCE | HTTP: Atlassian JIRA Plugin Jar Upload Remote Code Execution | 
    
    | HIGH | HTTP:STC:SWF:MUL-RCE | HTTP: Adobe Flash Player Multiple Remote Code Execution | 
    
   
   
   
   
   
   
   4 updated signatures:
   
    
    | CRITICAL | CHAT:ICQ:ISS-BLACKICE-OF | ICQ: ISS BlackIce ICQ Decoder META_USER Buffer Overflow | 
    
    | HIGH | NFS:LINUX-NFS-DOS | NFS: Linux Kernel NFSv4 nfsd PNFS Denial of Service | 
    
    | HIGH | SMB:MS-CVE-2020-0796-RCE | SMB: Microsoft Windows CVE-2020-0796 SMBv3 Client/Server Remote Code Execution | 
    
    | MEDIUM | HTTP:MAL-REDIRECT-VUL-106 | HTTP: MAL-REDIRECT Infection-106 | 
    
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   Details of the signatures included within this bulletin:
   
   
   HTTP:CTS:CVE-2017-8046-RCE - HTTP: Spring Data REST CVE-2017-8046 Remote Code Execution
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Spring Data REST. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Pivotal_software spring_data_rest 2.6
 
    
    - Pivotal_software spring_boot 1.1.4
 
    
    - Pivotal_software spring_boot 1.3.0
 
    
    - Pivotal_software spring_data_rest 2.1.4
 
    
    - Pivotal_software spring_data_rest 2.5.8
 
    
    - Pivotal_software spring_data_rest 2.6.4
 
    
    - Pivotal_software spring_data_rest 2.1.2
 
    
    - Pivotal_software spring_data_rest 2.6.6
 
    
    - Pivotal_software spring_boot 1.2.4
 
    
    - Pivotal_software spring_data_rest 2.1.0
 
    
    - Pivotal_software spring_data_rest 2.6.0
 
    
    - Pivotal_software spring_boot 1.2.6
 
    
    - Pivotal_software spring_data_rest 2.5.2
 
    
    - Pivotal_software spring_data_rest 2.6.2
 
    
    - Pivotal_software spring_boot 1.2.0
 
    
    - Pivotal_software spring_boot 1.5.8
 
    
    - Pivotal_software spring_data_rest 2.5.0
 
    
    - Pivotal_software spring_data_rest 2.2.0
 
    
    - Pivotal_software spring_boot 1.2.2
 
    
    - Pivotal_software spring_boot 1.5.6
 
    
    - Pivotal_software spring_data_rest 2.5.6
 
    
    - Pivotal_software spring_data_rest 2.2.2
 
    
    - Pivotal_software spring_boot 1.5.4
 
    
    - Pivotal_software spring_data_rest 2.5.4
 
    
    - Pivotal_software spring_data_rest 2.2.4
 
    
    - Pivotal_software spring_boot 1.5.2
 
    
    - Pivotal_software spring_boot 1.0.2
 
    
    - Pivotal_software spring_boot 2.0.0
 
    
    - Pivotal_software spring_boot 1.2.8
 
    
    - Pivotal_software spring_boot 1.5.0
 
    
    - Pivotal_software spring_boot 1.0.0
 
    
    - Pivotal_software spring_data_rest 2.5.11
 
    
    - Pivotal_software spring_boot 1.1.12
 
    
    - Pivotal_software spring_boot 1.1.10
 
    
    - Pivotal_software spring_boot 1.4.2
 
    
    - Pivotal_software spring_boot 1.1.9
 
    
    - Pivotal_software spring_boot 1.4.0
 
    
    - Pivotal_software spring_boot 1.3.1
 
    
    - Pivotal_software spring_boot 1.4.6
 
    
    - Pivotal_software spring_boot 1.3.3
 
    
    - Pivotal_software spring_data_rest 1.0.0
 
    
    - Pivotal_software spring_data_rest 2.0.2
 
    
    - Pivotal_software spring_boot 1.4.4
 
    
    - Pivotal_software spring_boot 1.3.5
 
    
    - Pivotal_software spring_data_rest 2.4.6
 
    
    - Pivotal_software spring_data_rest 2.3.0
 
    
    - Pivotal_software spring_data_rest 2.0.0
 
    
    - Pivotal_software spring_boot 1.1.8
 
    
    - Pivotal_software spring_boot 1.3.7
 
    
    - Pivotal_software spring_data_rest 2.4.4
 
    
    - Pivotal_software spring_boot 1.1.3
 
    
    - Pivotal_software spring_data_rest 2.3.2
 
    
    - Pivotal_software spring_data_rest 2.4.2
 
    
    - Pivotal_software spring_boot 1.1.1
 
    
    - Pivotal_software spring_data_rest 2.4.0
 
    
    - Pivotal_software spring_boot 1.1.7
 
    
    - Pivotal_software spring_boot 1.1.5
 
    
    - Pivotal_software spring_data_rest 2.6.5
 
    
    - Pivotal_software spring_data_rest 2.1.5
 
    
    - Pivotal_software spring_data_rest 2.5.9
 
    
    - Pivotal_software spring_data_rest 2.6.7
 
    
    - Pivotal_software spring_data_rest 2.6.1
 
    
    - Pivotal_software spring_boot 1.2.5
 
    
    - Pivotal_software spring_data_rest 2.1.1
 
    
    - Pivotal_software spring_data_rest 2.6.3
 
    
    - Pivotal_software spring_boot 1.2.7
 
    
    - Pivotal_software spring_data_rest 3.0.0
 
    
    - Pivotal_software spring_data_rest 2.5.3
 
    
    - Pivotal_software spring_data_rest 2.2.1
 
    
    - Pivotal_software spring_boot 1.2.1
 
    
    - Pivotal_software spring_boot 1.5.7
 
    
    - Pivotal_software spring_data_rest 2.5.1
 
    
    - Pivotal_software spring_data_rest 2.2.3
 
    
    - Pivotal_software spring_boot 1.2.3
 
    
    - Pivotal_software spring_data_rest 1.1.0
 
    
    - Pivotal_software spring_boot 1.5.5
 
    
    - Pivotal_software spring_data_rest 2.5.7
 
    
    - Pivotal_software spring_boot 1.5.3
 
    
    - Pivotal_software spring_data_rest 2.5.5
 
    
    - Pivotal_software spring_boot 1.5.1
 
    
    - Pivotal_software spring_data_rest 2.5.10
 
    
    - Pivotal_software spring_boot 1.0.1
 
    
    - Pivotal_software spring_boot 1.1.11
 
    
    - Pivotal_software spring_boot 1.4.3
 
    
    - Pivotal_software spring_boot 1.4.1
 
    
    - Pivotal_software spring_data_rest 2.4.1
 
    
    - Pivotal_software spring_data_rest 2.0.3
 
    
    - Pivotal_software spring_boot 1.4.7
 
    
    - Pivotal_software spring_boot 1.3.2
 
    
    - Pivotal_software spring_data_rest 2.0.1
 
    
    - Pivotal_software spring_boot 1.4.5
 
    
    - Pivotal_software spring_boot 1.3.4
 
    
    - Pivotal_software spring_data_rest 2.4.5
 
    
    - Pivotal_software spring_data_rest 2.6.8
 
    
    - Pivotal_software spring_data_rest 2.3.1
 
    
    - Pivotal_software spring_boot 1.3.6
 
    
    - Pivotal_software spring_boot 1.1.2
 
    
    - Pivotal_software spring_boot 1.3.8
 
    
    - Pivotal_software spring_boot 0.5.0
 
    
    - Pivotal_software spring_boot 1.1.0
 
    
    - Pivotal_software spring_boot 1.1.6
 
    
    - Pivotal_software spring_data_rest 2.1.6
 
    
   
   
   
   
   
   HTTP:XSS:MS-SP-DISPLAYNAME-SXSS - HTTP: Microsoft SharePoint Server Stored Cross-Site Scripting
   
   Severity: LOW
   
   Description:
   This signature detects attempts to exploit a known cross-site scripting vulnerability against Microsoft SharePoint Server. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Microsoft sharepoint_enterprise_server 2013
 
    
    - Microsoft sharepoint_enterprise_server 2016
 
    
    - Microsoft sharepoint_enterprise_server 2019
 
    
   
   
   
   
   
   HTTP:STC:SCRIPT:CVE-2017-8540 - HTTP: Microsoft Malware Protection Engine CVE-2017-8540 Remote Code Execution
   
   Severity: CRITICAL
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Microsoft Malware Protection Engine. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Microsoft windows_defender -
 
    
    - Microsoft forefront_security -
 
    
    - Microsoft malware_protection_engine 1.1.13704.0
 
    
   
   
   
   
   
   HTTP:STC:IE:CVE-2017-8747-CE - HTTP: Microsoft Internet Explorer CVE-2017-8747 Remote Code Execution
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Microsoft IE. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Microsoft internet_explorer 11
 
    
    - Microsoft internet_explorer 10
 
    
   
   
   
   
   
   
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Hashicorp Consul. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   
   HTTP:XSS:WRDPRS-PHOTOGLRY-SXSS - HTTP: WordPress 10Web Photo Gallery Plugin Two Stored Cross-Site Scripting
   
   Severity: LOW
   
   Description:
   This signature detects attempts to exploit a known cross-site scripting vulnerability against 10Web Photo Gallery Plugin for WordPress. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks. 
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - 10web photo_gallery 1.3.7
 
    
    - 10web photo_gallery 1.2.107
 
    
    - 10web photo_gallery 1.3.54
 
    
    - 10web photo_gallery 1.2.92
 
    
    - 10web photo_gallery 1.2.42
 
    
    - 10web photo_gallery 1.4.8
 
    
    - 10web photo_gallery 1.5.18
 
    
    - 10web photo_gallery 1.2.101
 
    
    - 10web photo_gallery 1.3.57
 
    
    - 10web photo_gallery 1.3.39
 
    
    - 10web photo_gallery 1.2.94
 
    
    - 10web photo_gallery 1.2.40
 
    
    - 10web photo_gallery 1.0.5
 
    
    - 10web photo_gallery 1.2.103
 
    
    - 10web photo_gallery 1.2.59
 
    
    - 10web photo_gallery 1.3.21
 
    
    - 10web photo_gallery 1.4.7
 
    
    - 10web photo_gallery 1.2.21
 
    
    - 10web photo_gallery 1.2.96
 
    
    - 10web photo_gallery 1.2.46
 
    
    - 10web photo_gallery 1.0.7
 
    
    - 10web photo_gallery 1.2.20
 
    
    - 10web photo_gallery 1.3.27
 
    
    - 10web photo_gallery 1.5.35
 
    
    - 10web photo_gallery 1.1.24
 
    
    - 10web photo_gallery 1.2.44
 
    
    - 10web photo_gallery 1.3.68
 
    
    - 10web photo_gallery 1.0.1
 
    
    - 10web photo_gallery 1.1.22
 
    
    - 10web photo_gallery 1.5.19
 
    
    - 10web photo_gallery 1.4.12
 
    
    - 10web photo_gallery 1.3.25
 
    
    - 10web photo_gallery 1.5.33
 
    
    - 10web photo_gallery 1.1.26
 
    
    - 10web photo_gallery 1.0.3
 
    
    - 10web photo_gallery 1.5.3
 
    
    - 10web photo_gallery 1.4.10
 
    
    - 10web photo_gallery 1.3.31
 
    
    - 10web photo_gallery 1.5.31
 
    
    - 10web photo_gallery 1.3.42
 
    
    - 10web photo_gallery 1.2.48
 
    
    - 10web photo_gallery 1.4.1
 
    
    - 10web photo_gallery 1.2.36
 
    
    - 10web photo_gallery 1.4.4
 
    
    - 10web photo_gallery 1.4.16
 
    
    - 10web photo_gallery 1.3.33
 
    
    - 10web photo_gallery 1.3.41
 
    
    - 10web photo_gallery 1.3.66
 
    
    - 10web photo_gallery 1.2.34
 
    
    - 10web photo_gallery 1.1.17
 
    
    - 10web photo_gallery 1.5.42
 
    
    - 10web photo_gallery 1.4.14
 
    
    - 10web photo_gallery 1.3.35
 
    
    - 10web photo_gallery 1.3.43
 
    
    - 10web photo_gallery 1.2.7
 
    
    - 10web photo_gallery 1.5.15
 
    
    - 10web photo_gallery 1.3.50
 
    
    - 10web photo_gallery 1.0.9
 
    
    - 10web photo_gallery 1.5.9
 
    
    - 10web photo_gallery 1.2.75
 
    
    - 10web photo_gallery 1.2.87
 
    
    - 10web photo_gallery 1.2.19
 
    
    - 10web photo_gallery 1.3.45
 
    
    - 10web photo_gallery 1.2.23
 
    
    - 10web photo_gallery 1.2.5
 
    
    - 10web photo_gallery 1.5.17
 
    
    - 10web photo_gallery 1.2.30
 
    
    - 10web photo_gallery 1.2.85
 
    
    - 10web photo_gallery 1.3.13
 
    
    - 10web photo_gallery 1.3.47
 
    
    - 10web photo_gallery 1.2.3
 
    
    - 10web photo_gallery 1.5.11
 
    
    - 10web photo_gallery 1.2.79
 
    
    - 10web photo_gallery 1.1.20
 
    
    - 10web photo_gallery 1.5.5
 
    
    - 10web photo_gallery 1.5.44
 
    
    - 10web photo_gallery 1.2.83
 
    
    - 10web photo_gallery 1.3.11
 
    
    - 10web photo_gallery 1.3.49
 
    
    - 10web photo_gallery 1.2.69
 
    
    - 10web photo_gallery 1.2.1
 
    
    - 10web photo_gallery 1.5.13
 
    
    - 10web photo_gallery 1.5.7
 
    
    - 10web photo_gallery 1.2.24
 
    
    - 10web photo_gallery 1.2.81
 
    
    - 10web photo_gallery 1.3.17
 
    
    - 10web photo_gallery 1.2.71
 
    
    - 10web photo_gallery 1.1.6
 
    
    - 10web photo_gallery 1.2.32
 
    
    - 10web photo_gallery 1.5.1
 
    
    - 10web photo_gallery 1.1.2
 
    
    - 10web photo_gallery 1.5.20
 
    
    - 10web photo_gallery 1.3.15
 
    
    - 10web photo_gallery 1.2.77
 
    
    - 10web photo_gallery 1.5.40
 
    
    - 10web photo_gallery 1.2.38
 
    
    - 10web photo_gallery 1.1.4
 
    
    - 10web photo_gallery 1.5.22
 
    
    - 10web photo_gallery 1.1.11
 
    
    - 10web photo_gallery 1.2.13
 
    
    - 10web photo_gallery 1.3.59
 
    
    - 10web photo_gallery 1.3.19
 
    
    - 10web photo_gallery 1.2.54
 
    
    - 10web photo_gallery 1.2.22
 
    
    - 10web photo_gallery 1.5.24
 
    
    - 10web photo_gallery 1.1.13
 
    
    - 10web photo_gallery 1.2.99
 
    
    - 10web photo_gallery 1.2.61
 
    
    - 10web photo_gallery 1.2.9
 
    
    - 10web photo_gallery 1.5.8
 
    
    - 10web photo_gallery 1.3.56
 
    
    - 10web photo_gallery 1.2.56
 
    
    - 10web photo_gallery 1.1.8
 
    
    - 10web photo_gallery 1.5.26
 
    
    - 10web photo_gallery 1.1.15
 
    
    - 10web photo_gallery 1.3.55
 
    
    - 10web photo_gallery 1.3.67
 
    
    - 10web photo_gallery 1.2.50
 
    
    - 10web photo_gallery 1.3.28
 
    
    - 10web photo_gallery 1.5.29
 
    
    - 10web photo_gallery 1.3.53
 
    
    - 10web photo_gallery 1.3.65
 
    
    - 10web photo_gallery 1.3.18
 
    
    - 10web photo_gallery 1.3.2
 
    
    - 10web photo_gallery 1.2.52
 
    
    - 10web photo_gallery 1.2.28
 
    
    - 10web photo_gallery 1.4.5
 
    
    - 10web photo_gallery 1.3.26
 
    
    - 10web photo_gallery 1.3.51
 
    
    - 10web photo_gallery 1.3.63
 
    
    - 10web photo_gallery 1.3.0
 
    
    - 10web photo_gallery 1.3.37
 
    
    - 10web photo_gallery 1.2.104
 
    
    - 10web photo_gallery 1.4.0
 
    
    - 10web photo_gallery 1.3.9
 
    
    - 10web photo_gallery 1.2.91
 
    
    - 10web photo_gallery 1.2.43
 
    
    - 10web photo_gallery 1.2.17
 
    
    - 10web photo_gallery 1.3.6
 
    
    - 10web photo_gallery 1.2.89
 
    
    - 10web photo_gallery 1.2.106
 
    
    - 10web photo_gallery 1.3.22
 
    
    - 10web photo_gallery 1.1.31
 
    
    - 10web photo_gallery 1.2.93
 
    
    - 10web photo_gallery 1.2.41
 
    
    - 10web photo_gallery 1.4.9
 
    
    - 10web photo_gallery 1.0.4
 
    
    - 10web photo_gallery 1.3.4
 
    
    - 10web photo_gallery 1.2.100
 
    
    - 10web photo_gallery 1.2.58
 
    
    - 10web photo_gallery 1.3.20
 
    
    - 10web photo_gallery 1.3.38
 
    
    - 10web photo_gallery 1.1.19
 
    
    - 10web photo_gallery 1.2.95
 
    
    - 10web photo_gallery 1.2.47
 
    
    - 10web photo_gallery 1.0.6
 
    
    - 10web photo_gallery 1.4.2
 
    
    - 10web photo_gallery 1.2.102
 
    
    - 10web photo_gallery 1.2.11
 
    
    - 10web photo_gallery 1.4.6
 
    
    - 10web photo_gallery 1.2.45
 
    
    - 10web photo_gallery 1.3.8
 
    
    - 10web photo_gallery 1.5.27
 
    
    - 10web photo_gallery 1.1.28
 
    
    - 10web photo_gallery 1.3.24
 
    
    - 10web photo_gallery 1.5.34
 
    
    - 10web photo_gallery 1.2.84
 
    
    - 10web photo_gallery 1.1.25
 
    
    - 10web photo_gallery 1.3.69
 
    
    - 10web photo_gallery 1.0.2
 
    
    - 10web photo_gallery 1.4.13
 
    
    - 10web photo_gallery 1.3.12
 
    
    - 10web photo_gallery 1.5.32
 
    
    - 10web photo_gallery 1.1.27
 
    
    - 10web photo_gallery 1.2.49
 
    
    - 10web photo_gallery 1.3.48
 
    
    - 10web photo_gallery 1.2.108
 
    
    - 10web photo_gallery 1.3.64
 
    
    - 10web photo_gallery 1.4.11
 
    
    - 10web photo_gallery 1.3.30
 
    
    - 10web photo_gallery 1.3.40
 
    
    - 10web photo_gallery 1.5.30
 
    
    - 10web photo_gallery 1.1.21
 
    
    - 10web photo_gallery 1.5.28
 
    
    - 10web photo_gallery 1.2.37
 
    
    - 10web photo_gallery 1.5.10
 
    
    - 10web photo_gallery 1.4.17
 
    
    - 10web photo_gallery 1.3.32
 
    
    - 10web photo_gallery 1.2.78
 
    
    - 10web photo_gallery 1.2.6
 
    
    - 10web photo_gallery 1.1.23
 
    
    - 10web photo_gallery 1.0.8
 
    
    - 10web photo_gallery 1.2.35
 
    
    - 10web photo_gallery 1.5.43
 
    
    - 10web photo_gallery 1.4.15
 
    
    - 10web photo_gallery 1.3.34
 
    
    - 10web photo_gallery 1.3.44
 
    
    - 10web photo_gallery 1.2.4
 
    
    - 10web photo_gallery 1.5.14
 
    
    - 10web photo_gallery 1.2.65
 
    
    - 10web photo_gallery 1.2.73
 
    
    - 10web photo_gallery 1.2.33
 
    
    - 10web photo_gallery 1.5.41
 
    
    - 10web photo_gallery 1.4.3
 
    
    - 10web photo_gallery 1.2.86
 
    
    - 10web photo_gallery 1.2.25
 
    
    - 10web photo_gallery 1.3.36
 
    
    - 10web photo_gallery 1.3.46
 
    
    - 10web photo_gallery 1.2.2
 
    
    - 10web photo_gallery 1.5.16
 
    
    - 10web photo_gallery 1.2.31
 
    
    - 10web photo_gallery 1.1.30
 
    
    - 10web photo_gallery 1.1.18
 
    
    - 10web photo_gallery 1.2.72
 
    
    - 10web photo_gallery 1.2.0
 
    
    - 10web photo_gallery 1.1.29
 
    
    - 10web photo_gallery 1.5.4
 
    
    - 10web photo_gallery 1.1.1
 
    
    - 10web photo_gallery 1.5.45
 
    
    - 10web photo_gallery 1.2.82
 
    
    - 10web photo_gallery 1.3.10
 
    
    - 10web photo_gallery 1.2.70
 
    
    - 10web photo_gallery 1.2.68
 
    
    - 10web photo_gallery 1.5.12
 
    
    - 10web photo_gallery 1.3.52
 
    
    - 10web photo_gallery 1.5.6
 
    
    - 10web photo_gallery 1.1.3
 
    
    - 10web photo_gallery 1.3.62
 
    
    - 10web photo_gallery 1.2.80
 
    
    - 10web photo_gallery 1.1.0
 
    
    - 10web photo_gallery 1.3.16
 
    
    - 10web photo_gallery 1.2.76
 
    
    - 10web photo_gallery 1.3.61
 
    
    - 10web photo_gallery 1.5.0
 
    
    - 10web photo_gallery 1.1.5
 
    
    - 10web photo_gallery 1.5.21
 
    
    - 10web photo_gallery 1.3.14
 
    
    - 10web photo_gallery 1.2.74
 
    
    - 10web photo_gallery 1.2.26
 
    
    - 10web photo_gallery 1.2.39
 
    
    - 10web photo_gallery 1.1.7
 
    
    - 10web photo_gallery 1.2.18
 
    
    - 10web photo_gallery 1.5.23
 
    
    - 10web photo_gallery 1.1.10
 
    
    - 10web photo_gallery 1.2.98
 
    
    - 10web photo_gallery 1.3.58
 
    
    - 10web photo_gallery 1.2.8
 
    
    - 10web photo_gallery 1.2.67
 
    
    - 10web photo_gallery 1.2.55
 
    
    - 10web photo_gallery 1.1.9
 
    
    - 10web photo_gallery 1.2.15
 
    
    - 10web photo_gallery 1.5.25
 
    
    - 10web photo_gallery 1.2.27
 
    
    - 10web photo_gallery 1.1.12
 
    
    - 10web photo_gallery 1.3.23
 
    
    - 10web photo_gallery 1.2.60
 
    
    - 10web photo_gallery 1.2.10
 
    
    - 10web photo_gallery 1.2.57
 
    
    - 10web photo_gallery 1.2.88
 
    
    - 10web photo_gallery 1.1.14
 
    
    - 10web photo_gallery 1.2.62
 
    
    - 10web photo_gallery 1.2.12
 
    
    - 10web photo_gallery 1.3.3
 
    
    - 10web photo_gallery 1.2.51
 
    
    - 10web photo_gallery 1.2.29
 
    
    - 10web photo_gallery 1.3.29
 
    
    - 10web photo_gallery 1.3.5
 
    
    - 10web photo_gallery 1.1.16
 
    
    - 10web photo_gallery 1.2.64
 
    
    - 10web photo_gallery 1.2.14
 
    
    - 10web photo_gallery 1.3.1
 
    
    - 10web photo_gallery 1.2.105
 
    
    - 10web photo_gallery 1.2.53
 
    
    - 10web photo_gallery 1.3.60
 
    
    - 10web photo_gallery 1.2.63
 
    
    - 10web photo_gallery 1.5.2
 
    
    - 10web photo_gallery 1.2.90
 
    
    - 10web photo_gallery 1.2.66
 
    
    - 10web photo_gallery 1.2.16
 
    
   
   
   
   
   
   HTTP:CTS:JIRA-JAR-RCE - HTTP: Atlassian JIRA Plugin Jar Upload Remote Code Execution
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Atlassian JIRA. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   
   NFS:LINUX-NFS-DOS - NFS: Linux Kernel NFSv4 nfsd PNFS Denial of Service
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability in the NFSv4 component of the Linux Kernel. Successful exploitation will result in a denial-of-service condition.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, j-series-9.5, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, idp-5.0.0, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Linux linux_kernel 4.11.2
 
    
   
   
   
   
   
   
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Oracle Weblogic. Successful exploitation could result in code execution on the target machine. 
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, isg-3.1.134269, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Oracle fusion_middleware 12.2.3.0.0
 
    
    - Oracle fusion_middleware 12.2.1.4.0
 
    
    - Oracle fusion_middleware 12.2.1.3.0
 
    
   
   
   
   
   
   SMB:MS-CVE-2020-0796-RCE - SMB: Microsoft Windows CVE-2020-0796 SMBv3 Client/Server Remote Code Execution
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Microsoft Windows SMBv3 Client/Server. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, idp-5.0.0, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, isg-3.1.134269, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Microsoft windows_server_2016 1903
 
    
    - Microsoft windows_server_2016 1909
 
    
    - Microsoft windows_10 1909
 
    
    - Microsoft windows_10 1903
 
    
   
   
   
   
   
   HTTP:STC:ADOBE:CVE-2020-3805-CE - HTTP: Adobe Acrobat Reader CVE-2020-3805 Remote Code Execution
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Adobe acrobat_reader_dc 17.012.20093
 
    
    - Adobe acrobat_reader_dc 15.016.20041
 
    
    - Adobe acrobat_reader_dc 15.006.30504
 
    
    - Adobe acrobat_reader_dc 15.006.30434
 
    
    - Adobe acrobat_dc 15.016.20041
 
    
    - Adobe acrobat_reader_dc 15.006.30416
 
    
    - Adobe acrobat_reader_dc 17.000.0000
 
    
    - Adobe acrobat_reader_dc 17.011.30078
 
    
    - Adobe acrobat_reader_dc 17.011.30102
 
    
    - Adobe acrobat_reader_dc 19.008.20074
 
    
    - Adobe acrobat_reader_dc 15.006.30173
 
    
    - Adobe acrobat_dc 17.011.30106
 
    
    - Adobe acrobat_dc 15.010.20059
 
    
    - Adobe acrobat_reader_dc 15.016.20045
 
    
    - Adobe acrobat_reader_dc 15.017.20050
 
    
    - Adobe acrobat_dc 15.006.30413
 
    
    - Adobe acrobat_reader_dc 15.006.30418
 
    
    - Adobe acrobat_reader_dc 17.011.30059
 
    
    - Adobe acrobat_dc 15.006.30198
 
    
    - Adobe acrobat_dc 15.006.30498
 
    
    - Adobe acrobat_dc 19.008.20074
 
    
    - Adobe acrobat_reader_dc 17.011.30106
 
    
    - Adobe acrobat_dc 17.011.30110
 
    
    - Adobe acrobat_dc 17.011.30102
 
    
    - Adobe acrobat_reader_dc 18.011.20038
 
    
    - Adobe acrobat_dc 19.008.20081
 
    
    - Adobe acrobat_dc 15.006.30417
 
    
    - Adobe acrobat_reader_dc 15.010.20059
 
    
    - Adobe acrobat_dc 18.011.20058
 
    
    - Adobe acrobat_reader_dc 15.006.30094
 
    
    - Adobe acrobat_reader_dc 18.009.20050
 
    
    - Adobe acrobat_reader_dc 15.006.30448
 
    
    - Adobe acrobat_dc 15.017.20050
 
    
    - Adobe acrobat_dc 17.009.20058
 
    
    - Adobe acrobat_reader_dc 15.006.30198
 
    
    - Adobe acrobat_dc 15.006.30464
 
    
    - Adobe acrobat_reader_dc 15.006.30475
 
    
    - Adobe acrobat_dc 17.011.30059
 
    
    - Adobe acrobat_reader_dc 15.009.20069
 
    
    - Adobe acrobat_reader_dc 15.010.20060
 
    
    - Adobe acrobat_dc 18.009.20044
 
    
    - Adobe acrobat_dc 15.006.30508
 
    
    - Adobe acrobat_dc 19.010.20099
 
    
    - Adobe acrobat_dc 15.006.30201
 
    
    - Adobe acrobat_reader_dc 15.006.30498
 
    
    - Adobe acrobat_dc 18.011.20038
 
    
    - Adobe acrobat_dc 15.006.30243
 
    
    - Adobe acrobat_dc 17.011.30140
 
    
    - Adobe acrobat_dc 19.010.20100
 
    
    - Adobe acrobat_reader_dc 15.006.30508
 
    
    - Adobe acrobat_reader_dc 17.011.30066
 
    
    - Adobe acrobat_dc 18.009.20050
 
    
    - Adobe acrobat_reader_dc 15.006.30464
 
    
    - Adobe acrobat_reader_dc 15.006.30243
 
    
    - Adobe acrobat_dc 15.016.20039
 
    
    - Adobe acrobat_reader_dc 17.009.20058
 
    
    - Adobe acrobat_reader_dc 19.010.20099
 
    
    - Adobe acrobat_reader_dc 19.010.20100
 
    
    - Adobe acrobat_reader_dc 19.012.20034
 
    
    - Adobe acrobat_dc 15.006.30121
 
    
    - Adobe acrobat_reader_dc 15.020.20042
 
    
    - Adobe acrobat_reader_dc 17.011.30142
 
    
    - Adobe acrobat_dc 19.012.20034
 
    
    - Adobe acrobat_reader_dc 17.012.20098
 
    
    - Adobe acrobat_reader_dc 17.011.30080
 
    
    - Adobe acrobat_reader_dc 15.023.20056
 
    
    - Adobe acrobat_dc 19.010.20091
 
    
    - Adobe acrobat_reader_dc 17.011.30140
 
    
    - Adobe acrobat_dc 15.023.20056
 
    
    - Adobe acrobat_dc 15.006.30097
 
    
    - Adobe acrobat_reader_dc 17.011.30127
 
    
    - Adobe acrobat_reader_dc 15.016.20039
 
    
    - Adobe acrobat_dc 17.011.30080
 
    
    - Adobe acrobat_reader_dc 15.006.30097
 
    
    - Adobe acrobat_reader_dc 15.006.30121
 
    
    - Adobe acrobat_reader_dc 18.011.20040
 
    
    - Adobe acrobat_dc 17.011.30127
 
    
    - Adobe acrobat_dc 17.011.30142
 
    
    - Adobe acrobat_dc 17.011.30068
 
    
    - Adobe acrobat_dc 15.008.20082
 
    
    - Adobe acrobat_reader_dc 19.010.20091
 
    
    - Adobe acrobat_reader_dc 17.011.30068
 
    
    - Adobe acrobat_dc 15.006.30482
 
    
    - Adobe acrobat_dc 15.006.30280
 
    
    - Adobe acrobat_reader_dc 15.006.30355
 
    
    - Adobe acrobat_dc 15.006.30173
 
    
    - Adobe acrobat_reader_dc 15.008.20082
 
    
    - Adobe acrobat_dc 17.012.20095
 
    
    - Adobe acrobat_reader_dc 17.011.30110
 
    
    - Adobe acrobat_dc 17.011.30099
 
    
    - Adobe acrobat_reader_dc 17.009.20044
 
    
    - Adobe acrobat_reader_dc 17.011.30099
 
    
    - Adobe acrobat_reader_dc 15.006.30482
 
    
    - Adobe acrobat_dc 17.011.30079
 
    
    - Adobe acrobat_dc 19.008.20071
 
    
    - Adobe acrobat_dc 15.006.30355
 
    
    - Adobe acrobat_dc 15.006.30457
 
    
    - Adobe acrobat_dc 15.010.20060
 
    
    - Adobe acrobat_reader_dc 15.006.30457
 
    
    - Adobe acrobat_reader_dc 19.008.20080
 
    
    - Adobe acrobat_reader_dc 15.006.30497
 
    
    - Adobe acrobat_dc 19.008.20080
 
    
    - Adobe acrobat_reader_dc 18.011.20063
 
    
    - Adobe acrobat_dc 15.006.30418
 
    
    - Adobe acrobat_dc 15.006.30448
 
    
    - Adobe acrobat_dc 17.011.30066
 
    
    - Adobe acrobat_reader_dc 19.010.20069
 
    
    - Adobe acrobat_reader_dc 15.006.30495
 
    
    - Adobe acrobat_dc 15.017.20053
 
    
    - Adobe acrobat_dc 17.009.20044
 
    
    - Adobe acrobat_reader_dc 17.011.30079
 
    
    - Adobe acrobat_dc 19.010.20069
 
    
    - Adobe acrobat_dc 15.006.30493
 
    
    - Adobe acrobat_dc 15.006.30279
 
    
    - Adobe acrobat_dc 17.012.20096
 
    
    - Adobe acrobat_reader_dc 15.006.30493
 
    
    - Adobe acrobat_reader_dc 15.023.20070
 
    
    - Adobe acrobat_reader_dc 15.006.30172
 
    
    - Adobe acrobat_dc 17.011.30105
 
    
    - Adobe acrobat_reader_dc 15.006.30505
 
    
    - Adobe acrobat_reader_dc 19.008.20071
 
    
    - Adobe acrobat_dc 15.006.30495
 
    
    - Adobe acrobat_dc 15.023.20070
 
    
    - Adobe acrobat_dc 15.006.30174
 
    
    - Adobe acrobat_dc 17.012.20098
 
    
    - Adobe acrobat_dc 18.011.20063
 
    
    - Adobe acrobat_reader_dc 15.006.30174
 
    
    - Adobe acrobat_dc 15.006.30475
 
    
    - Adobe acrobat_reader_dc 17.012.20095
 
    
    - Adobe acrobat_dc 15.006.30497
 
    
    - Adobe acrobat_dc 15.006.30172
 
    
    - Adobe acrobat_dc 17.011.30152
 
    
    - Adobe acrobat_reader_dc 15.006.30279
 
    
    - Adobe acrobat_reader_dc 17.011.30156
 
    
    - Adobe acrobat_reader_dc 15.017.20053
 
    
    - Adobe acrobat_dc 15.006.30416
 
    
    - Adobe acrobat_dc 17.011.30150
 
    
    - Adobe acrobat_reader_dc 17.011.30150
 
    
    - Adobe acrobat_dc 17.011.30156
 
    
    - Adobe acrobat_reader_dc 17.011.30105
 
    
    - Adobe acrobat_reader_dc 17.011.30113
 
    
    - Adobe acrobat_dc 18.011.20040
 
    
    - Adobe acrobat_reader_dc 17.011.30152
 
    
    - Adobe acrobat_reader_dc 15.010.20056
 
    
    - Adobe acrobat_dc 19.010.20098
 
    
    - Adobe acrobat_reader_dc 15.006.30461
 
    
    - Adobe acrobat_reader_dc 15.006.30244
 
    
    - Adobe acrobat_dc 18.011.20055
 
    
    - Adobe acrobat_reader_dc 15.006.30201
 
    
    - Adobe acrobat_reader_dc 17.011.30065
 
    
    - Adobe acrobat_reader_dc 15.006.30417
 
    
    - Adobe acrobat_dc 17.000.0000
 
    
    - Adobe acrobat_dc 17.011.30113
 
    
    - Adobe acrobat_dc 15.010.20056
 
    
    - Adobe acrobat_dc 15.006.30244
 
    
    - Adobe acrobat_dc 15.006.30504
 
    
    - Adobe acrobat_dc 17.011.30143
 
    
    - Adobe acrobat_dc 15.009.20079
 
    
    - Adobe acrobat_reader_dc 19.008.20081
 
    
    - Adobe acrobat_dc 15.023.20053
 
    
    - Adobe acrobat_dc 15.006.30094
 
    
    - Adobe acrobat_reader_dc 19.010.20098
 
    
    - Adobe acrobat_reader_dc 18.011.20055
 
    
    - Adobe acrobat_dc 17.011.30065
 
    
    - Adobe acrobat_dc 15.009.20069
 
    
    - Adobe acrobat_dc 15.006.30096
 
    
    - Adobe acrobat_dc 19.021.20058
 
    
    - Adobe acrobat_reader_dc 17.011.30096
 
    
    - Adobe acrobat_dc 17.011.30120
 
    
    - Adobe acrobat_reader_dc 15.009.20079
 
    
    - Adobe acrobat_dc 17.011.30096
 
    
    - Adobe acrobat_reader_dc 19.021.20047
 
    
    - Adobe acrobat_dc 15.020.20039
 
    
    - Adobe acrobat_dc 15.006.30060
 
    
    - Adobe acrobat_dc 17.011.30070
 
    
    - Adobe acrobat_reader_dc 15.023.20053
 
    
    - Adobe acrobat_reader_dc 15.006.30096
 
    
    - Adobe acrobat_dc 19.021.20047
 
    
    - Adobe acrobat_reader_dc 15.009.20077
 
    
    - Adobe acrobat_reader_dc 17.011.30120
 
    
    - Adobe acrobat_reader_dc 15.006.30280
 
    
    - Adobe acrobat_dc 15.009.20071
 
    
    - Adobe acrobat_reader_dc 18.009.20044
 
    
    - Adobe acrobat_reader_dc 15.020.20039
 
    
    - Adobe acrobat_dc 19.010.20064
 
    
    - Adobe acrobat_reader_dc 15.006.30354
 
    
    - Adobe acrobat_dc 15.006.30352
 
    
    - Adobe acrobat_reader_dc 19.021.20058
 
    
    - Adobe acrobat_reader_dc 15.006.30060
 
    
    - Adobe acrobat_dc 15.006.30119
 
    
    - Adobe acrobat_dc 15.006.30306
 
    
    - Adobe acrobat_reader_dc 19.021.20056
 
    
    - Adobe acrobat_reader_dc 17.011.30070
 
    
    - Adobe acrobat_reader_dc 15.009.20071
 
    
    - Adobe acrobat_dc 17.011.30155
 
    
    - Adobe acrobat_reader_dc 15.006.30392
 
    
    - Adobe acrobat_reader_dc 15.006.30452
 
    
    - Adobe acrobat_dc 17.011.30078
 
    
    - Adobe acrobat_dc 15.009.20077
 
    
    - Adobe acrobat_reader_dc 19.010.20064
 
    
    - Adobe acrobat_dc 15.006.30394
 
    
    - Adobe acrobat_dc 15.006.30456
 
    
    - Adobe acrobat_reader_dc 15.006.30352
 
    
    - Adobe acrobat_reader_dc 15.006.30306
 
    
    - Adobe acrobat_reader_dc 15.006.30394
 
    
    - Adobe acrobat_reader_dc 17.011.30138
 
    
    - Adobe acrobat_dc 15.016.20045
 
    
    - Adobe acrobat_dc 15.006.30354
 
    
    - Adobe acrobat_dc 15.006.30392
 
    
    - Adobe acrobat_dc 15.006.30434
 
    
    - Adobe acrobat_dc 19.021.20056
 
    
    - Adobe acrobat_reader_dc 15.006.30456
 
    
    - Adobe acrobat_dc 17.012.20093
 
    
    - Adobe acrobat_dc 15.020.20042
 
    
    - Adobe acrobat_reader_dc 15.006.30119
 
    
    - Adobe acrobat_dc 15.006.30452
 
    
    - Adobe acrobat_dc 17.011.30138
 
    
   
   
   
   
   
   
   
   Severity: MEDIUM
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to sensitive information disclosure.
   Supported On:
   idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Redhat enterprise_linux_server 6.0
 
    
    - Adobe flash_player_desktop_runtime 31.0.0.122
 
    
    - Redhat enterprise_linux_workstation 6.0
 
    
    - Redhat enterprise_linux_desktop 6.0
 
    
    - Adobe flash_player 31.0.0.122
 
    
   
   
   
   
   
   
   
   Severity: MEDIUM
   
   Description:
   This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.
   Supported On:
   srx-17.3, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, vsrx-19.2, srx-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, vsrx-19.4, vsrx-15.1, srx-12.1
   
   
   
   
   
   
   Severity: MEDIUM
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Open BGP. A successful attack can lead to directory traversal and arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1
   
   
   
   
   HTTP:STC:DL:NITROPRO-JS-API-RCE - HTTP: Nitro Pro PDF Reader Javascript API Remote Code Execution
   
   Severity: MEDIUM
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Nitro Pro. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Nitro nitro_pro 11.0.3.173
 
    
   
   
   
   
   
   
   
   Severity: MEDIUM
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Adobe XPS. A successful attack can lead to Information Disclosure.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Adobe acrobat_reader_dc 17.012.20093
 
    
    - Adobe acrobat_reader_dc 15.016.20041
 
    
    - Adobe acrobat_dc 15.006.30280
 
    
    - Adobe acrobat_dc 15.016.20041
 
    
    - Adobe acrobat_reader_dc 17.000.0000
 
    
    - Adobe acrobat_reader_dc 17.011.30078
 
    
    - Adobe acrobat_dc 15.017.20050
 
    
    - Adobe acrobat_dc 15.010.20059
 
    
    - Adobe acrobat_reader_dc 15.016.20045
 
    
    - Adobe acrobat_reader_dc 15.017.20050
 
    
    - Adobe acrobat_dc 15.006.30413
 
    
    - Adobe acrobat_reader_dc 17.011.30059
 
    
    - Adobe acrobat_dc 15.006.30198
 
    
    - Adobe acrobat_dc 17.012.20095
 
    
    - Adobe acrobat_reader_dc 18.011.20038
 
    
    - Adobe acrobat_dc 15.006.30417
 
    
    - Adobe acrobat_reader_dc 15.010.20059
 
    
    - Adobe acrobat_reader_dc 15.006.30094
 
    
    - Adobe acrobat_reader_dc 18.009.20050
 
    
    - Adobe acrobat_dc 17.009.20058
 
    
    - Adobe acrobat_reader_dc 15.006.30198
 
    
    - Adobe acrobat_dc 15.020.20042
 
    
    - Adobe acrobat_dc 17.011.30059
 
    
    - Adobe acrobat_reader_dc 15.009.20069
 
    
    - Adobe acrobat_reader_dc 15.010.20060
 
    
    - Adobe acrobat_dc 18.011.20038
 
    
    - Adobe acrobat_dc 15.006.30243
 
    
    - Adobe acrobat_reader_dc 17.011.30066
 
    
    - Adobe acrobat_dc 18.009.20050
 
    
    - Adobe acrobat_reader_dc 15.006.30243
 
    
    - Adobe acrobat_dc 15.016.20039
 
    
    - Adobe acrobat_reader_dc 17.009.20058
 
    
    - Adobe acrobat_dc 15.006.30121
 
    
    - Adobe acrobat_reader_dc 15.020.20042
 
    
    - Adobe acrobat_dc 17.011.30066
 
    
    - Adobe acrobat_reader_dc 15.006.30201
 
    
    - Adobe acrobat_dc 15.006.30201
 
    
    - Adobe acrobat_dc 15.006.30097
 
    
    - Adobe acrobat_reader_dc 15.006.30173
 
    
    - Adobe acrobat_reader_dc 15.016.20039
 
    
    - Adobe acrobat_reader_dc 15.006.30097
 
    
    - Adobe acrobat_reader_dc 15.006.30121
 
    
    - Adobe acrobat_dc 17.011.30068
 
    
    - Adobe acrobat_dc 15.008.20082
 
    
    - Adobe acrobat_reader_dc 17.011.30068
 
    
    - Adobe acrobat_reader_dc 15.006.30355
 
    
    - Adobe acrobat_dc 15.006.30173
 
    
    - Adobe acrobat_reader_dc 15.008.20082
 
    
    - Adobe acrobat_reader_dc 17.009.20044
 
    
    - Adobe acrobat_dc 17.011.30079
 
    
    - Adobe acrobat_dc 15.006.30355
 
    
    - Adobe acrobat_dc 15.010.20060
 
    
    - Adobe acrobat_dc 15.017.20053
 
    
    - Adobe acrobat_dc 17.009.20044
 
    
    - Adobe acrobat_reader_dc 17.011.30079
 
    
    - Adobe acrobat_dc 15.006.30279
 
    
    - Adobe acrobat_dc 17.012.20096
 
    
    - Adobe acrobat_reader_dc 15.023.20070
 
    
    - Adobe acrobat_reader_dc 15.006.30172
 
    
    - Adobe acrobat_reader_dc 15.006.30416
 
    
    - Adobe acrobat_dc 15.023.20070
 
    
    - Adobe acrobat_dc 15.006.30174
 
    
    - Adobe acrobat_dc 17.012.20098
 
    
    - Adobe acrobat_reader_dc 15.006.30174
 
    
    - Adobe acrobat_dc 15.006.30172
 
    
    - Adobe acrobat_reader_dc 15.006.30279
 
    
    - Adobe acrobat_reader_dc 15.017.20053
 
    
    - Adobe acrobat_dc 15.006.30416
 
    
    - Adobe acrobat_reader_dc 17.012.20098
 
    
    - Adobe acrobat_reader_dc 15.010.20056
 
    
    - Adobe acrobat_reader_dc 15.006.30244
 
    
    - Adobe acrobat_reader_dc 15.023.20056
 
    
    - Adobe acrobat_reader_dc 17.011.30065
 
    
    - Adobe acrobat_reader_dc 15.006.30417
 
    
    - Adobe acrobat_dc 17.000.0000
 
    
    - Adobe acrobat_dc 15.010.20056
 
    
    - Adobe acrobat_dc 15.006.30244
 
    
    - Adobe acrobat_dc 15.009.20079
 
    
    - Adobe acrobat_dc 15.023.20053
 
    
    - Adobe acrobat_dc 18.009.20044
 
    
    - Adobe acrobat_dc 15.006.30094
 
    
    - Adobe acrobat_dc 17.011.30065
 
    
    - Adobe acrobat_dc 15.009.20069
 
    
    - Adobe acrobat_dc 15.006.30096
 
    
    - Adobe acrobat_dc 15.023.20056
 
    
    - Adobe acrobat_reader_dc 15.009.20079
 
    
    - Adobe acrobat_dc 15.020.20039
 
    
    - Adobe acrobat_dc 15.006.30060
 
    
    - Adobe acrobat_dc 17.011.30070
 
    
    - Adobe acrobat_reader_dc 15.023.20053
 
    
    - Adobe acrobat_reader_dc 15.006.30096
 
    
    - Adobe acrobat_reader_dc 15.009.20077
 
    
    - Adobe acrobat_reader_dc 17.012.20095
 
    
    - Adobe acrobat_dc 15.009.20071
 
    
    - Adobe acrobat_reader_dc 18.009.20044
 
    
    - Adobe acrobat_reader_dc 15.020.20039
 
    
    - Adobe acrobat_reader_dc 15.006.30354
 
    
    - Adobe acrobat_dc 15.006.30352
 
    
    - Adobe acrobat_reader_dc 15.006.30060
 
    
    - Adobe acrobat_dc 15.006.30119
 
    
    - Adobe acrobat_dc 15.006.30306
 
    
    - Adobe acrobat_reader_dc 17.011.30070
 
    
    - Adobe acrobat_reader_dc 15.009.20071
 
    
    - Adobe acrobat_reader_dc 15.006.30392
 
    
    - Adobe acrobat_dc 17.011.30078
 
    
    - Adobe acrobat_dc 15.009.20077
 
    
    - Adobe acrobat_dc 15.006.30394
 
    
    - Adobe acrobat_reader_dc 15.006.30352
 
    
    - Adobe acrobat_reader_dc 15.006.30306
 
    
    - Adobe acrobat_reader_dc 15.006.30394
 
    
    - Adobe acrobat_dc 15.016.20045
 
    
    - Adobe acrobat_dc 15.006.30354
 
    
    - Adobe acrobat_dc 15.006.30392
 
    
    - Adobe acrobat_reader_dc 15.006.30280
 
    
    - Adobe acrobat_dc 17.012.20093
 
    
    - Adobe acrobat_reader_dc 15.006.30119
 
    
   
   
   
   
   
   HTTP:STC:ADOBE:CVE-2018-4973-ID - HTTP:  Adobe Acrobat Malformed JPEG CVE-2018-4973 Information Disclosure
   
   Severity: MEDIUM
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Adobe Acrobat JPEG. A successful attack can lead to information disclosure.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Adobe acrobat_reader_dc 17.012.20093
 
    
    - Adobe acrobat_reader_dc 15.016.20041
 
    
    - Adobe acrobat_dc 15.006.30280
 
    
    - Adobe acrobat_dc 15.016.20041
 
    
    - Adobe acrobat_reader_dc 17.000.0000
 
    
    - Adobe acrobat_reader_dc 17.011.30078
 
    
    - Adobe acrobat_dc 15.017.20050
 
    
    - Adobe acrobat_dc 15.010.20059
 
    
    - Adobe acrobat_reader_dc 15.016.20045
 
    
    - Adobe acrobat_reader_dc 15.017.20050
 
    
    - Adobe acrobat_dc 15.006.30413
 
    
    - Adobe acrobat_reader_dc 17.011.30059
 
    
    - Adobe acrobat_dc 15.006.30198
 
    
    - Adobe acrobat_dc 17.012.20095
 
    
    - Adobe acrobat_reader_dc 18.011.20038
 
    
    - Adobe acrobat_dc 15.006.30417
 
    
    - Adobe acrobat_reader_dc 15.010.20059
 
    
    - Adobe acrobat_reader_dc 15.006.30094
 
    
    - Adobe acrobat_reader_dc 18.009.20050
 
    
    - Adobe acrobat_dc 17.009.20058
 
    
    - Adobe acrobat_reader_dc 15.006.30198
 
    
    - Adobe acrobat_dc 15.020.20042
 
    
    - Adobe acrobat_dc 17.011.30059
 
    
    - Adobe acrobat_reader_dc 15.009.20069
 
    
    - Adobe acrobat_reader_dc 15.010.20060
 
    
    - Adobe acrobat_dc 18.011.20038
 
    
    - Adobe acrobat_dc 15.006.30243
 
    
    - Adobe acrobat_reader_dc 17.011.30066
 
    
    - Adobe acrobat_dc 18.009.20050
 
    
    - Adobe acrobat_reader_dc 15.006.30243
 
    
    - Adobe acrobat_dc 15.016.20039
 
    
    - Adobe acrobat_reader_dc 17.009.20058
 
    
    - Adobe acrobat_dc 15.006.30121
 
    
    - Adobe acrobat_reader_dc 15.020.20042
 
    
    - Adobe acrobat_dc 17.011.30066
 
    
    - Adobe acrobat_reader_dc 15.006.30201
 
    
    - Adobe acrobat_dc 15.006.30201
 
    
    - Adobe acrobat_dc 15.006.30097
 
    
    - Adobe acrobat_reader_dc 15.006.30173
 
    
    - Adobe acrobat_reader_dc 15.016.20039
 
    
    - Adobe acrobat_reader_dc 15.006.30097
 
    
    - Adobe acrobat_reader_dc 15.006.30121
 
    
    - Adobe acrobat_dc 17.011.30068
 
    
    - Adobe acrobat_dc 15.008.20082
 
    
    - Adobe acrobat_reader_dc 17.011.30068
 
    
    - Adobe acrobat_reader_dc 15.006.30355
 
    
    - Adobe acrobat_dc 15.006.30173
 
    
    - Adobe acrobat_reader_dc 15.008.20082
 
    
    - Adobe acrobat_reader_dc 17.009.20044
 
    
    - Adobe acrobat_dc 17.011.30079
 
    
    - Adobe acrobat_dc 15.006.30355
 
    
    - Adobe acrobat_dc 15.010.20060
 
    
    - Adobe acrobat_dc 15.017.20053
 
    
    - Adobe acrobat_dc 17.009.20044
 
    
    - Adobe acrobat_reader_dc 17.011.30079
 
    
    - Adobe acrobat_dc 15.006.30279
 
    
    - Adobe acrobat_dc 17.012.20096
 
    
    - Adobe acrobat_reader_dc 15.023.20070
 
    
    - Adobe acrobat_reader_dc 15.006.30172
 
    
    - Adobe acrobat_reader_dc 15.006.30416
 
    
    - Adobe acrobat_dc 15.023.20070
 
    
    - Adobe acrobat_dc 15.006.30174
 
    
    - Adobe acrobat_dc 17.012.20098
 
    
    - Adobe acrobat_reader_dc 15.006.30174
 
    
    - Adobe acrobat_dc 15.006.30172
 
    
    - Adobe acrobat_reader_dc 15.006.30279
 
    
    - Adobe acrobat_reader_dc 15.017.20053
 
    
    - Adobe acrobat_dc 15.006.30416
 
    
    - Adobe acrobat_reader_dc 17.012.20098
 
    
    - Adobe acrobat_reader_dc 15.010.20056
 
    
    - Adobe acrobat_reader_dc 15.006.30244
 
    
    - Adobe acrobat_reader_dc 15.023.20056
 
    
    - Adobe acrobat_reader_dc 17.011.30065
 
    
    - Adobe acrobat_reader_dc 15.006.30417
 
    
    - Adobe acrobat_dc 17.000.0000
 
    
    - Adobe acrobat_dc 15.010.20056
 
    
    - Adobe acrobat_dc 15.006.30244
 
    
    - Adobe acrobat_dc 15.009.20079
 
    
    - Adobe acrobat_dc 15.023.20053
 
    
    - Adobe acrobat_dc 18.009.20044
 
    
    - Adobe acrobat_dc 15.006.30094
 
    
    - Adobe acrobat_dc 17.011.30065
 
    
    - Adobe acrobat_dc 15.009.20069
 
    
    - Adobe acrobat_dc 15.006.30096
 
    
    - Adobe acrobat_dc 15.023.20056
 
    
    - Adobe acrobat_reader_dc 15.009.20079
 
    
    - Adobe acrobat_dc 15.020.20039
 
    
    - Adobe acrobat_dc 15.006.30060
 
    
    - Adobe acrobat_dc 17.011.30070
 
    
    - Adobe acrobat_reader_dc 15.023.20053
 
    
    - Adobe acrobat_reader_dc 15.006.30096
 
    
    - Adobe acrobat_reader_dc 15.009.20077
 
    
    - Adobe acrobat_reader_dc 17.012.20095
 
    
    - Adobe acrobat_dc 15.009.20071
 
    
    - Adobe acrobat_reader_dc 18.009.20044
 
    
    - Adobe acrobat_reader_dc 15.020.20039
 
    
    - Adobe acrobat_reader_dc 15.006.30354
 
    
    - Adobe acrobat_dc 15.006.30352
 
    
    - Adobe acrobat_reader_dc 15.006.30060
 
    
    - Adobe acrobat_dc 15.006.30119
 
    
    - Adobe acrobat_dc 15.006.30306
 
    
    - Adobe acrobat_reader_dc 17.011.30070
 
    
    - Adobe acrobat_reader_dc 15.009.20071
 
    
    - Adobe acrobat_reader_dc 15.006.30392
 
    
    - Adobe acrobat_dc 17.011.30078
 
    
    - Adobe acrobat_dc 15.009.20077
 
    
    - Adobe acrobat_dc 15.006.30394
 
    
    - Adobe acrobat_reader_dc 15.006.30352
 
    
    - Adobe acrobat_reader_dc 15.006.30306
 
    
    - Adobe acrobat_reader_dc 15.006.30394
 
    
    - Adobe acrobat_dc 15.016.20045
 
    
    - Adobe acrobat_dc 15.006.30354
 
    
    - Adobe acrobat_dc 15.006.30392
 
    
    - Adobe acrobat_reader_dc 15.006.30280
 
    
    - Adobe acrobat_dc 17.012.20093
 
    
    - Adobe acrobat_reader_dc 15.006.30119
 
    
   
   
   
   
   
   HTTP:CTS:CNTREON-SRVRCONCONF-CI - HTTP: Centreon ServerConnectionConfigurationService.php Command Injection
   
   Severity: CRITICAL
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Centreon Web Application. A successful attack can lead to command injection and arbitrary code execution. 
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
   
   
   
   
   HTTP:STC:ADOBE:CVE-2018-4981-CE - HTTP: Adobe Flash Player EMF File CVE-2018-4981 Remote Code Execution
   
   Severity: MEDIUM
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Adobe Flash Player EMF File. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Adobe acrobat_dc 17.011.30079
 
    
    - Adobe acrobat_reader_dc 17.011.30079
 
    
    - Adobe acrobat_reader_dc 15.006.30417
 
    
    - Adobe acrobat_reader_dc 18.011.20038
 
    
    - Adobe acrobat_dc 15.006.30417
 
    
    - Adobe acrobat_dc 18.011.20038
 
    
   
   
   
   
   
   
   
   Severity: MEDIUM
   
   Description:
   This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.
   Supported On:
   srx-17.3, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, vsrx-19.2, srx-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, vsrx-19.4, vsrx-15.1, srx-12.1
   
   
   
   
   CHAT:ICQ:ISS-BLACKICE-OF - ICQ: ISS BlackIce ICQ Decoder META_USER Buffer Overflow
   
   Severity: CRITICAL
   
   Description:
   This signature detects attempts to exploit a known vulnerability in the ICQ decoder on ISS BlackIce network devices. Attackers can remotely execute arbitrary code.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Ibm realsecure_server_sensor 6.0.1  Win SR1.1
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.1
 
    
    - Ibm realsecure_sentry 3.6.0  ecb
 
    
    - Ibm realsecure_server_sensor 5.0.0  Win
 
    
    - Ibm realsecure_server_sensor 5.5.0  Win
 
    
    - Ibm realsecure_server_sensor 5.5.2  Win
 
    
    - Ibm realsecure_server_sensor 6.0.0  Win
 
    
    - Ibm realsecure_server_sensor 6.0.1  Win
 
    
    - Ibm realsecure_server_sensor 5.5.1  Win
 
    
    - Ibm blackice_agent_for_server 3.6.0 eca
 
    
    - Ibm blackice_server_protection 3.6.0 cbz
 
    
    - Ibm realsecure_desktop 3.6.0 eca
 
    
    - Ibm realsecure_desktop 7.0.0 ebg
 
    
    - Ibm blackice_agent_for_server 3.6.0 ecb
 
    
    - Ibm realsecure_desktop 7.0.0 ebh
 
    
    - Ibm realsecure_desktop 3.6.0 ecb
 
    
    - Ibm blackice_server_protection 3.6.0 ccb
 
    
    - Ibm blackice_pc_protection 3.6.0 ccb
 
    
    - Ibm realsecure_network_sensor 7.0.0  XPU 20.11
 
    
    - Ibm proventia_g_series XPU 22.4
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.9
 
    
    - Ibm realsecure_desktop 7.0.0 eba
 
    
    - Ibm proventia_a_series XPU 22.9
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.11
 
    
    - Ibm proventia_a_series XPU 20.11
 
    
    - Ibm proventia_g_series XPU 22.11
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.8
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.7
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.6
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.5
 
    
    - Ibm proventia_a_series XPU 22.8
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.4
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.3
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.2
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.1
 
    
    - Ibm proventia_a_series XPU 22.7
 
    
    - Ibm proventia_a_series XPU 22.6
 
    
    - Ibm proventia_a_series XPU 22.5
 
    
    - Ibm proventia_a_series XPU 22.4
 
    
    - Ibm proventia_a_series XPU 22.3
 
    
    - Ibm proventia_a_series XPU 22.2
 
    
    - Ibm proventia_a_series XPU 22.1
 
    
    - Ibm proventia_g_series XPU 22.8
 
    
    - Ibm proventia_g_series XPU 22.7
 
    
    - Ibm proventia_g_series XPU 22.6
 
    
    - Ibm proventia_g_series XPU 22.5
 
    
    - Ibm realsecure_desktop 3.6.0 ece
 
    
    - Ibm proventia_g_series XPU 22.2
 
    
    - Ibm proventia_g_series XPU 22.1
 
    
    - Ibm proventia_m_series XPU 1.6
 
    
    - Ibm proventia_m_series XPU 1.5
 
    
    - Ibm proventia_m_series XPU 1.4
 
    
    - Ibm realsecure_network_sensor 7.0.0  XPU 22.9
 
    
    - Ibm proventia_m_series XPU 1.1
 
    
    - Ibm proventia_m_series XPU 1.9
 
    
    - Ibm realsecure_desktop 7.0.0 ebk
 
    
    - Ibm realsecure_desktop 7.0.0 ebl
 
    
    - Ibm realsecure_guard 3.6.0  ecb
 
    
    - Ibm realsecure_desktop 3.6.0 ecf
 
    
    - Ibm realsecure_guard 3.6.0  eca
 
    
    - Ibm realsecure_guard 3.6.0  ecc
 
    
    - Ibm proventia_g_series XPU 22.3
 
    
    - Ibm realsecure_guard 3.6.0  ecf
 
    
    - Ibm proventia_m_series XPU 1.3
 
    
    - Ibm proventia_m_series XPU 1.7
 
    
    - Ibm realsecure_sentry 3.6.0  ecc
 
    
    - Ibm realsecure_sentry 3.6.0  ece
 
    
    - Ibm realsecure_desktop 7.0.0 ebj
 
    
    - Ibm realsecure_desktop 3.6.0 ecd
 
    
    - Ibm realsecure_guard 3.6.0 ecd
 
    
    - Ibm realsecure_sentry 3.6.0 ecd
 
    
    - Ibm realsecure_sentry 3.6.0  eca
 
    
    - Ibm blackice_server_protection 3.6.0 ccd
 
    
    - Ibm proventia_a_series XPU 22.10
 
    
    - Ibm proventia_g_series XPU 22.10
 
    
    - Ibm proventia_m_series XPU 1.8
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.9
 
    
    - Ibm realsecure_network_sensor 7.0.0  XPU 22.10
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.8
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.7
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.6
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.5
 
    
    - Ibm realsecure_server_sensor 7.0.0  XPU 22.10
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.2
 
    
    - Ibm blackice_pc_protection 3.6.0 cca
 
    
    - Ibm blackice_pc_protection 3.6.0 ccc
 
    
    - Ibm blackice_pc_protection 3.6.0 ccf
 
    
    - Ibm blackice_pc_protection 3.6.0 cce
 
    
    - Ibm realsecure_sentry 3.6.0  ecf
 
    
    - Ibm blackice_server_protection 3.6.0 cca
 
    
    - Ibm blackice_server_protection 3.6.0 ccc
 
    
    - Ibm blackice_server_protection 3.6.0 cce
 
    
    - Ibm blackice_server_protection 3.6.0 ccf
 
    
    - Ibm blackice_agent_for_server 3.6.0 ecc
 
    
    - Ibm blackice_agent_for_server 3.6.0 ecd
 
    
    - Ibm blackice_pc_protection 3.6.0 ccd
 
    
    - Ibm blackice_agent_for_server 3.6.0 ecf
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.10
 
    
    - Ibm blackice_agent_for_server 3.6.0 ebz
 
    
    - Ibm realsecure_network_sensor 7.0.0 XPU 22.4
 
    
    - Ibm realsecure_desktop 7.0.0 ebf
 
    
    - Ibm realsecure_desktop 3.6.0 ebz
 
    
    - Ibm realsecure_guard 3.6.0  ebz
 
    
    - Ibm realsecure_sentry 3.6.0  ebz
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.4
 
    
    - Ibm realsecure_network_sensor 7.0.0
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win SR3.3
 
    
    - Ibm proventia_m_series XPU 1.2
 
    
    - Ibm realsecure_guard 3.6.0  ece
 
    
    - Ibm blackice_pc_protection 3.6.0 .cbz
 
    
    - Ibm blackice_agent_for_server 3.6.0 ece
 
    
    - Ibm blackice_agent 3.1.0
 
    
    - Ibm realsecure_server_sensor 6.5.0  Win
 
    
    - Ibm proventia_g_series XPU 22.9
 
    
   
   
   
   
   
   HTTP:STC:SWF:MUL-RCE - HTTP: Adobe Flash Player Multiple Remote Code Execution
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Redhat enterprise_linux_server 6.0
 
    
    - Redhat enterprise_linux_desktop 6.0
 
    
    - Adobe flash_player 29.0.0.140
 
    
    - Redhat enterprise_linux_workstation 6.0
 
    
   
   
   
   
   
   
   
   Severity: HIGH
   
   Description:
   This signature detects attempts to exploit a known vulnerability against FasterXML Jackson. A successful attack can lead to arbitrary code execution.
   Supported On:
   idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
   
   References:
   
   
   
   
   Affected Products:
   
    
    - Fasterxml jackson-databind 2.9.1
 
    
    - Fasterxml jackson-databind 2.8.3
 
    
    - Redhat jboss_enterprise_application_platform 7.1.0
 
    
    - Fasterxml jackson 1.0.0
 
    
    - Fasterxml jackson-databind 2.8.2
 
    
    - Fasterxml jackson 1.7
 
    
    - Fasterxml jackson 1.1.2
 
    
    - Redhat jboss_enterprise_application_platform 6.4.19
 
    
    - Fasterxml jackson-databind 2.8.1
 
    
    - Fasterxml jackson 1.6
 
    
    - Redhat jboss_bpm_suite 6.4.11
 
    
    - Fasterxml jackson 1.1.0
 
    
    - Redhat jboss_operations_network 3.3.10
 
    
    - Fasterxml jackson-databind 2.8.6
 
    
    - Fasterxml jackson 1.2.0
 
    
    - Redhat jboss_brms 6.4.10
 
    
    - Redhat jboss_enterprise_application_platform 6.0.0
 
    
    - Fasterxml jackson-databind 2.8.10
 
    
    - Fasterxml jackson-databind 2.8.4
 
    
    - Redhat jboss_enterprise_application_platform 6.4.0
 
    
    - Fasterxml jackson 1.4.6
 
    
    - Fasterxml jackson-databind 2.8.5
 
    
    - Fasterxml jackson-databind 2.8.0
 
    
    - Fasterxml jackson-databind 2.8.7
 
    
    - Fasterxml jackson 1.9
 
    
    - Fasterxml jackson 1.8
 
    
    - Fasterxml jackson-databind 2.8.8.1
 
    
    - Fasterxml jackson-databind 2.8.9
 
    
    - Fasterxml jackson 1.5
 
    
    - Fasterxml jackson-databind 2.8.8
 
    
    - Debian debian_linux 9.0
 
    
    - Fasterxml jackson 1.4.0
 
    
    - Fasterxml jackson-databind 2.9.2
 
    
    - Debian debian_linux 8.0
 
    
    - Fasterxml jackson-databind 2.9.3
 
    
    - Fasterxml jackson 1.3