Update #3265 (03/24/2020)
19 new signatures:
MEDIUM | HTTP:STC:DL:NITROPRO-JS-API-RCE | HTTP: Nitro Pro PDF Reader Javascript API Remote Code Execution |
MEDIUM | HTTP:STC:ADOBE:XPS-MUL-ID | HTTP: Adobe XPS Multiple Information Disclosure |
HIGH | HTTP:CTS:CVE-2017-8046-RCE | HTTP: Spring Data REST CVE-2017-8046 Remote Code Execution |
MEDIUM | HTTP:SUSP-HDR-REDRCT-VUL-107 | HTTP: SUSP-HDR-REDRCT Infection-107 |
CRITICAL | HTTP:CTS:CNTREON-SRVRCONCONF-CI | HTTP: Centreon ServerConnectionConfigurationService.php Command Injection |
CRITICAL | HTTP:STC:SCRIPT:CVE-2017-8540 | HTTP: Microsoft Malware Protection Engine CVE-2017-8540 Remote Code Execution |
HIGH | HTTP:STC:IE:CVE-2017-8747-CE | HTTP: Microsoft Internet Explorer CVE-2017-8747 Remote Code Execution |
HIGH | HTTP:CTS:HASHICORP-CONSUL-RCE | HTTP: Hashicorp Consul Rexec Remote Command Execution |
LOW | HTTP:XSS:WRDPRS-PHOTOGLRY-SXSS | HTTP: WordPress 10Web Photo Gallery Plugin Two Stored Cross-Site Scripting |
MEDIUM | HTTP:STC:ADOBE:CVE-2018-4981-CE | HTTP: Adobe Flash Player EMF File CVE-2018-4981 Remote Code Execution |
LOW | HTTP:XSS:MS-SP-DISPLAYNAME-SXSS | HTTP: Microsoft SharePoint Server Stored Cross-Site Scripting |
MEDIUM | HTTP:STC:ADOBE:CVE-2018-4973-ID | HTTP: Adobe Acrobat Malformed JPEG CVE-2018-4973 Information Disclosure |
HIGH | HTTP:STC:FASTERXML-JACKSON-CE | HTTP: FasterXML Jackson Databind Remote Code Execution |
MEDIUM | MISC:OPEN-BGP-RAND-AS-ID-DOS | MISC: Open BGP Random AS ID Denial of Service |
HIGH | APP:ORACLE:WL-LIMFILTER-INS-DES | APP: Oracle Weblogic LimitFilter Insecure Deserialization |
HIGH | HTTP:STC:ADOBE:CVE-2020-3805-CE | HTTP: Adobe Acrobat Reader CVE-2020-3805 Remote Code Execution |
MEDIUM | HTTP:STC:SWF:CVE-2018-15978-ID | HTTP: Adobe Flash CVE-2018-15978 Information Disclosure |
HIGH | HTTP:CTS:JIRA-JAR-RCE | HTTP: Atlassian JIRA Plugin Jar Upload Remote Code Execution |
HIGH | HTTP:STC:SWF:MUL-RCE | HTTP: Adobe Flash Player Multiple Remote Code Execution |
4 updated signatures:
CRITICAL | CHAT:ICQ:ISS-BLACKICE-OF | ICQ: ISS BlackIce ICQ Decoder META_USER Buffer Overflow |
HIGH | NFS:LINUX-NFS-DOS | NFS: Linux Kernel NFSv4 nfsd PNFS Denial of Service |
HIGH | SMB:MS-CVE-2020-0796-RCE | SMB: Microsoft Windows CVE-2020-0796 SMBv3 Client/Server Remote Code Execution |
MEDIUM | HTTP:MAL-REDIRECT-VUL-106 | HTTP: MAL-REDIRECT Infection-106 |
Details of the signatures included within this bulletin:
HTTP:CTS:CVE-2017-8046-RCE - HTTP: Spring Data REST CVE-2017-8046 Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Spring Data REST. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Pivotal_software spring_data_rest 2.6
- Pivotal_software spring_boot 1.1.4
- Pivotal_software spring_boot 1.3.0
- Pivotal_software spring_data_rest 2.1.4
- Pivotal_software spring_data_rest 2.5.8
- Pivotal_software spring_data_rest 2.6.4
- Pivotal_software spring_data_rest 2.1.2
- Pivotal_software spring_data_rest 2.6.6
- Pivotal_software spring_boot 1.2.4
- Pivotal_software spring_data_rest 2.1.0
- Pivotal_software spring_data_rest 2.6.0
- Pivotal_software spring_boot 1.2.6
- Pivotal_software spring_data_rest 2.5.2
- Pivotal_software spring_data_rest 2.6.2
- Pivotal_software spring_boot 1.2.0
- Pivotal_software spring_boot 1.5.8
- Pivotal_software spring_data_rest 2.5.0
- Pivotal_software spring_data_rest 2.2.0
- Pivotal_software spring_boot 1.2.2
- Pivotal_software spring_boot 1.5.6
- Pivotal_software spring_data_rest 2.5.6
- Pivotal_software spring_data_rest 2.2.2
- Pivotal_software spring_boot 1.5.4
- Pivotal_software spring_data_rest 2.5.4
- Pivotal_software spring_data_rest 2.2.4
- Pivotal_software spring_boot 1.5.2
- Pivotal_software spring_boot 1.0.2
- Pivotal_software spring_boot 2.0.0
- Pivotal_software spring_boot 1.2.8
- Pivotal_software spring_boot 1.5.0
- Pivotal_software spring_boot 1.0.0
- Pivotal_software spring_data_rest 2.5.11
- Pivotal_software spring_boot 1.1.12
- Pivotal_software spring_boot 1.1.10
- Pivotal_software spring_boot 1.4.2
- Pivotal_software spring_boot 1.1.9
- Pivotal_software spring_boot 1.4.0
- Pivotal_software spring_boot 1.3.1
- Pivotal_software spring_boot 1.4.6
- Pivotal_software spring_boot 1.3.3
- Pivotal_software spring_data_rest 1.0.0
- Pivotal_software spring_data_rest 2.0.2
- Pivotal_software spring_boot 1.4.4
- Pivotal_software spring_boot 1.3.5
- Pivotal_software spring_data_rest 2.4.6
- Pivotal_software spring_data_rest 2.3.0
- Pivotal_software spring_data_rest 2.0.0
- Pivotal_software spring_boot 1.1.8
- Pivotal_software spring_boot 1.3.7
- Pivotal_software spring_data_rest 2.4.4
- Pivotal_software spring_boot 1.1.3
- Pivotal_software spring_data_rest 2.3.2
- Pivotal_software spring_data_rest 2.4.2
- Pivotal_software spring_boot 1.1.1
- Pivotal_software spring_data_rest 2.4.0
- Pivotal_software spring_boot 1.1.7
- Pivotal_software spring_boot 1.1.5
- Pivotal_software spring_data_rest 2.6.5
- Pivotal_software spring_data_rest 2.1.5
- Pivotal_software spring_data_rest 2.5.9
- Pivotal_software spring_data_rest 2.6.7
- Pivotal_software spring_data_rest 2.6.1
- Pivotal_software spring_boot 1.2.5
- Pivotal_software spring_data_rest 2.1.1
- Pivotal_software spring_data_rest 2.6.3
- Pivotal_software spring_boot 1.2.7
- Pivotal_software spring_data_rest 3.0.0
- Pivotal_software spring_data_rest 2.5.3
- Pivotal_software spring_data_rest 2.2.1
- Pivotal_software spring_boot 1.2.1
- Pivotal_software spring_boot 1.5.7
- Pivotal_software spring_data_rest 2.5.1
- Pivotal_software spring_data_rest 2.2.3
- Pivotal_software spring_boot 1.2.3
- Pivotal_software spring_data_rest 1.1.0
- Pivotal_software spring_boot 1.5.5
- Pivotal_software spring_data_rest 2.5.7
- Pivotal_software spring_boot 1.5.3
- Pivotal_software spring_data_rest 2.5.5
- Pivotal_software spring_boot 1.5.1
- Pivotal_software spring_data_rest 2.5.10
- Pivotal_software spring_boot 1.0.1
- Pivotal_software spring_boot 1.1.11
- Pivotal_software spring_boot 1.4.3
- Pivotal_software spring_boot 1.4.1
- Pivotal_software spring_data_rest 2.4.1
- Pivotal_software spring_data_rest 2.0.3
- Pivotal_software spring_boot 1.4.7
- Pivotal_software spring_boot 1.3.2
- Pivotal_software spring_data_rest 2.0.1
- Pivotal_software spring_boot 1.4.5
- Pivotal_software spring_boot 1.3.4
- Pivotal_software spring_data_rest 2.4.5
- Pivotal_software spring_data_rest 2.6.8
- Pivotal_software spring_data_rest 2.3.1
- Pivotal_software spring_boot 1.3.6
- Pivotal_software spring_boot 1.1.2
- Pivotal_software spring_boot 1.3.8
- Pivotal_software spring_boot 0.5.0
- Pivotal_software spring_boot 1.1.0
- Pivotal_software spring_boot 1.1.6
- Pivotal_software spring_data_rest 2.1.6
HTTP:XSS:MS-SP-DISPLAYNAME-SXSS - HTTP: Microsoft SharePoint Server Stored Cross-Site Scripting
Severity: LOW
Description:
This signature detects attempts to exploit a known cross-site scripting vulnerability against Microsoft SharePoint Server. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft sharepoint_enterprise_server 2013
- Microsoft sharepoint_enterprise_server 2016
- Microsoft sharepoint_enterprise_server 2019
HTTP:STC:SCRIPT:CVE-2017-8540 - HTTP: Microsoft Malware Protection Engine CVE-2017-8540 Remote Code Execution
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Malware Protection Engine. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft windows_defender -
- Microsoft forefront_security -
- Microsoft malware_protection_engine 1.1.13704.0
HTTP:STC:IE:CVE-2017-8747-CE - HTTP: Microsoft Internet Explorer CVE-2017-8747 Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft IE. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft internet_explorer 11
- Microsoft internet_explorer 10
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Hashicorp Consul. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
HTTP:XSS:WRDPRS-PHOTOGLRY-SXSS - HTTP: WordPress 10Web Photo Gallery Plugin Two Stored Cross-Site Scripting
Severity: LOW
Description:
This signature detects attempts to exploit a known cross-site scripting vulnerability against 10Web Photo Gallery Plugin for WordPress. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- 10web photo_gallery 1.3.7
- 10web photo_gallery 1.2.107
- 10web photo_gallery 1.3.54
- 10web photo_gallery 1.2.92
- 10web photo_gallery 1.2.42
- 10web photo_gallery 1.4.8
- 10web photo_gallery 1.5.18
- 10web photo_gallery 1.2.101
- 10web photo_gallery 1.3.57
- 10web photo_gallery 1.3.39
- 10web photo_gallery 1.2.94
- 10web photo_gallery 1.2.40
- 10web photo_gallery 1.0.5
- 10web photo_gallery 1.2.103
- 10web photo_gallery 1.2.59
- 10web photo_gallery 1.3.21
- 10web photo_gallery 1.4.7
- 10web photo_gallery 1.2.21
- 10web photo_gallery 1.2.96
- 10web photo_gallery 1.2.46
- 10web photo_gallery 1.0.7
- 10web photo_gallery 1.2.20
- 10web photo_gallery 1.3.27
- 10web photo_gallery 1.5.35
- 10web photo_gallery 1.1.24
- 10web photo_gallery 1.2.44
- 10web photo_gallery 1.3.68
- 10web photo_gallery 1.0.1
- 10web photo_gallery 1.1.22
- 10web photo_gallery 1.5.19
- 10web photo_gallery 1.4.12
- 10web photo_gallery 1.3.25
- 10web photo_gallery 1.5.33
- 10web photo_gallery 1.1.26
- 10web photo_gallery 1.0.3
- 10web photo_gallery 1.5.3
- 10web photo_gallery 1.4.10
- 10web photo_gallery 1.3.31
- 10web photo_gallery 1.5.31
- 10web photo_gallery 1.3.42
- 10web photo_gallery 1.2.48
- 10web photo_gallery 1.4.1
- 10web photo_gallery 1.2.36
- 10web photo_gallery 1.4.4
- 10web photo_gallery 1.4.16
- 10web photo_gallery 1.3.33
- 10web photo_gallery 1.3.41
- 10web photo_gallery 1.3.66
- 10web photo_gallery 1.2.34
- 10web photo_gallery 1.1.17
- 10web photo_gallery 1.5.42
- 10web photo_gallery 1.4.14
- 10web photo_gallery 1.3.35
- 10web photo_gallery 1.3.43
- 10web photo_gallery 1.2.7
- 10web photo_gallery 1.5.15
- 10web photo_gallery 1.3.50
- 10web photo_gallery 1.0.9
- 10web photo_gallery 1.5.9
- 10web photo_gallery 1.2.75
- 10web photo_gallery 1.2.87
- 10web photo_gallery 1.2.19
- 10web photo_gallery 1.3.45
- 10web photo_gallery 1.2.23
- 10web photo_gallery 1.2.5
- 10web photo_gallery 1.5.17
- 10web photo_gallery 1.2.30
- 10web photo_gallery 1.2.85
- 10web photo_gallery 1.3.13
- 10web photo_gallery 1.3.47
- 10web photo_gallery 1.2.3
- 10web photo_gallery 1.5.11
- 10web photo_gallery 1.2.79
- 10web photo_gallery 1.1.20
- 10web photo_gallery 1.5.5
- 10web photo_gallery 1.5.44
- 10web photo_gallery 1.2.83
- 10web photo_gallery 1.3.11
- 10web photo_gallery 1.3.49
- 10web photo_gallery 1.2.69
- 10web photo_gallery 1.2.1
- 10web photo_gallery 1.5.13
- 10web photo_gallery 1.5.7
- 10web photo_gallery 1.2.24
- 10web photo_gallery 1.2.81
- 10web photo_gallery 1.3.17
- 10web photo_gallery 1.2.71
- 10web photo_gallery 1.1.6
- 10web photo_gallery 1.2.32
- 10web photo_gallery 1.5.1
- 10web photo_gallery 1.1.2
- 10web photo_gallery 1.5.20
- 10web photo_gallery 1.3.15
- 10web photo_gallery 1.2.77
- 10web photo_gallery 1.5.40
- 10web photo_gallery 1.2.38
- 10web photo_gallery 1.1.4
- 10web photo_gallery 1.5.22
- 10web photo_gallery 1.1.11
- 10web photo_gallery 1.2.13
- 10web photo_gallery 1.3.59
- 10web photo_gallery 1.3.19
- 10web photo_gallery 1.2.54
- 10web photo_gallery 1.2.22
- 10web photo_gallery 1.5.24
- 10web photo_gallery 1.1.13
- 10web photo_gallery 1.2.99
- 10web photo_gallery 1.2.61
- 10web photo_gallery 1.2.9
- 10web photo_gallery 1.5.8
- 10web photo_gallery 1.3.56
- 10web photo_gallery 1.2.56
- 10web photo_gallery 1.1.8
- 10web photo_gallery 1.5.26
- 10web photo_gallery 1.1.15
- 10web photo_gallery 1.3.55
- 10web photo_gallery 1.3.67
- 10web photo_gallery 1.2.50
- 10web photo_gallery 1.3.28
- 10web photo_gallery 1.5.29
- 10web photo_gallery 1.3.53
- 10web photo_gallery 1.3.65
- 10web photo_gallery 1.3.18
- 10web photo_gallery 1.3.2
- 10web photo_gallery 1.2.52
- 10web photo_gallery 1.2.28
- 10web photo_gallery 1.4.5
- 10web photo_gallery 1.3.26
- 10web photo_gallery 1.3.51
- 10web photo_gallery 1.3.63
- 10web photo_gallery 1.3.0
- 10web photo_gallery 1.3.37
- 10web photo_gallery 1.2.104
- 10web photo_gallery 1.4.0
- 10web photo_gallery 1.3.9
- 10web photo_gallery 1.2.91
- 10web photo_gallery 1.2.43
- 10web photo_gallery 1.2.17
- 10web photo_gallery 1.3.6
- 10web photo_gallery 1.2.89
- 10web photo_gallery 1.2.106
- 10web photo_gallery 1.3.22
- 10web photo_gallery 1.1.31
- 10web photo_gallery 1.2.93
- 10web photo_gallery 1.2.41
- 10web photo_gallery 1.4.9
- 10web photo_gallery 1.0.4
- 10web photo_gallery 1.3.4
- 10web photo_gallery 1.2.100
- 10web photo_gallery 1.2.58
- 10web photo_gallery 1.3.20
- 10web photo_gallery 1.3.38
- 10web photo_gallery 1.1.19
- 10web photo_gallery 1.2.95
- 10web photo_gallery 1.2.47
- 10web photo_gallery 1.0.6
- 10web photo_gallery 1.4.2
- 10web photo_gallery 1.2.102
- 10web photo_gallery 1.2.11
- 10web photo_gallery 1.4.6
- 10web photo_gallery 1.2.45
- 10web photo_gallery 1.3.8
- 10web photo_gallery 1.5.27
- 10web photo_gallery 1.1.28
- 10web photo_gallery 1.3.24
- 10web photo_gallery 1.5.34
- 10web photo_gallery 1.2.84
- 10web photo_gallery 1.1.25
- 10web photo_gallery 1.3.69
- 10web photo_gallery 1.0.2
- 10web photo_gallery 1.4.13
- 10web photo_gallery 1.3.12
- 10web photo_gallery 1.5.32
- 10web photo_gallery 1.1.27
- 10web photo_gallery 1.2.49
- 10web photo_gallery 1.3.48
- 10web photo_gallery 1.2.108
- 10web photo_gallery 1.3.64
- 10web photo_gallery 1.4.11
- 10web photo_gallery 1.3.30
- 10web photo_gallery 1.3.40
- 10web photo_gallery 1.5.30
- 10web photo_gallery 1.1.21
- 10web photo_gallery 1.5.28
- 10web photo_gallery 1.2.37
- 10web photo_gallery 1.5.10
- 10web photo_gallery 1.4.17
- 10web photo_gallery 1.3.32
- 10web photo_gallery 1.2.78
- 10web photo_gallery 1.2.6
- 10web photo_gallery 1.1.23
- 10web photo_gallery 1.0.8
- 10web photo_gallery 1.2.35
- 10web photo_gallery 1.5.43
- 10web photo_gallery 1.4.15
- 10web photo_gallery 1.3.34
- 10web photo_gallery 1.3.44
- 10web photo_gallery 1.2.4
- 10web photo_gallery 1.5.14
- 10web photo_gallery 1.2.65
- 10web photo_gallery 1.2.73
- 10web photo_gallery 1.2.33
- 10web photo_gallery 1.5.41
- 10web photo_gallery 1.4.3
- 10web photo_gallery 1.2.86
- 10web photo_gallery 1.2.25
- 10web photo_gallery 1.3.36
- 10web photo_gallery 1.3.46
- 10web photo_gallery 1.2.2
- 10web photo_gallery 1.5.16
- 10web photo_gallery 1.2.31
- 10web photo_gallery 1.1.30
- 10web photo_gallery 1.1.18
- 10web photo_gallery 1.2.72
- 10web photo_gallery 1.2.0
- 10web photo_gallery 1.1.29
- 10web photo_gallery 1.5.4
- 10web photo_gallery 1.1.1
- 10web photo_gallery 1.5.45
- 10web photo_gallery 1.2.82
- 10web photo_gallery 1.3.10
- 10web photo_gallery 1.2.70
- 10web photo_gallery 1.2.68
- 10web photo_gallery 1.5.12
- 10web photo_gallery 1.3.52
- 10web photo_gallery 1.5.6
- 10web photo_gallery 1.1.3
- 10web photo_gallery 1.3.62
- 10web photo_gallery 1.2.80
- 10web photo_gallery 1.1.0
- 10web photo_gallery 1.3.16
- 10web photo_gallery 1.2.76
- 10web photo_gallery 1.3.61
- 10web photo_gallery 1.5.0
- 10web photo_gallery 1.1.5
- 10web photo_gallery 1.5.21
- 10web photo_gallery 1.3.14
- 10web photo_gallery 1.2.74
- 10web photo_gallery 1.2.26
- 10web photo_gallery 1.2.39
- 10web photo_gallery 1.1.7
- 10web photo_gallery 1.2.18
- 10web photo_gallery 1.5.23
- 10web photo_gallery 1.1.10
- 10web photo_gallery 1.2.98
- 10web photo_gallery 1.3.58
- 10web photo_gallery 1.2.8
- 10web photo_gallery 1.2.67
- 10web photo_gallery 1.2.55
- 10web photo_gallery 1.1.9
- 10web photo_gallery 1.2.15
- 10web photo_gallery 1.5.25
- 10web photo_gallery 1.2.27
- 10web photo_gallery 1.1.12
- 10web photo_gallery 1.3.23
- 10web photo_gallery 1.2.60
- 10web photo_gallery 1.2.10
- 10web photo_gallery 1.2.57
- 10web photo_gallery 1.2.88
- 10web photo_gallery 1.1.14
- 10web photo_gallery 1.2.62
- 10web photo_gallery 1.2.12
- 10web photo_gallery 1.3.3
- 10web photo_gallery 1.2.51
- 10web photo_gallery 1.2.29
- 10web photo_gallery 1.3.29
- 10web photo_gallery 1.3.5
- 10web photo_gallery 1.1.16
- 10web photo_gallery 1.2.64
- 10web photo_gallery 1.2.14
- 10web photo_gallery 1.3.1
- 10web photo_gallery 1.2.105
- 10web photo_gallery 1.2.53
- 10web photo_gallery 1.3.60
- 10web photo_gallery 1.2.63
- 10web photo_gallery 1.5.2
- 10web photo_gallery 1.2.90
- 10web photo_gallery 1.2.66
- 10web photo_gallery 1.2.16
HTTP:CTS:JIRA-JAR-RCE - HTTP: Atlassian JIRA Plugin Jar Upload Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Atlassian JIRA. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
NFS:LINUX-NFS-DOS - NFS: Linux Kernel NFSv4 nfsd PNFS Denial of Service
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the NFSv4 component of the Linux Kernel. Successful exploitation will result in a denial-of-service condition.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, j-series-9.5, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, idp-5.0.0, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Linux linux_kernel 4.11.2
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Weblogic. Successful exploitation could result in code execution on the target machine.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, isg-3.1.134269, vsrx-15.1
References:
Affected Products:
- Oracle fusion_middleware 12.2.3.0.0
- Oracle fusion_middleware 12.2.1.4.0
- Oracle fusion_middleware 12.2.1.3.0
SMB:MS-CVE-2020-0796-RCE - SMB: Microsoft Windows CVE-2020-0796 SMBv3 Client/Server Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows SMBv3 Client/Server. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, idp-5.0.0, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, isg-3.1.134269, vsrx-15.1
References:
Affected Products:
- Microsoft windows_server_2016 1903
- Microsoft windows_server_2016 1909
- Microsoft windows_10 1909
- Microsoft windows_10 1903
HTTP:STC:ADOBE:CVE-2020-3805-CE - HTTP: Adobe Acrobat Reader CVE-2020-3805 Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
References:
Affected Products:
- Adobe acrobat_reader_dc 17.012.20093
- Adobe acrobat_reader_dc 15.016.20041
- Adobe acrobat_reader_dc 15.006.30504
- Adobe acrobat_reader_dc 15.006.30434
- Adobe acrobat_dc 15.016.20041
- Adobe acrobat_reader_dc 15.006.30416
- Adobe acrobat_reader_dc 17.000.0000
- Adobe acrobat_reader_dc 17.011.30078
- Adobe acrobat_reader_dc 17.011.30102
- Adobe acrobat_reader_dc 19.008.20074
- Adobe acrobat_reader_dc 15.006.30173
- Adobe acrobat_dc 17.011.30106
- Adobe acrobat_dc 15.010.20059
- Adobe acrobat_reader_dc 15.016.20045
- Adobe acrobat_reader_dc 15.017.20050
- Adobe acrobat_dc 15.006.30413
- Adobe acrobat_reader_dc 15.006.30418
- Adobe acrobat_reader_dc 17.011.30059
- Adobe acrobat_dc 15.006.30198
- Adobe acrobat_dc 15.006.30498
- Adobe acrobat_dc 19.008.20074
- Adobe acrobat_reader_dc 17.011.30106
- Adobe acrobat_dc 17.011.30110
- Adobe acrobat_dc 17.011.30102
- Adobe acrobat_reader_dc 18.011.20038
- Adobe acrobat_dc 19.008.20081
- Adobe acrobat_dc 15.006.30417
- Adobe acrobat_reader_dc 15.010.20059
- Adobe acrobat_dc 18.011.20058
- Adobe acrobat_reader_dc 15.006.30094
- Adobe acrobat_reader_dc 18.009.20050
- Adobe acrobat_reader_dc 15.006.30448
- Adobe acrobat_dc 15.017.20050
- Adobe acrobat_dc 17.009.20058
- Adobe acrobat_reader_dc 15.006.30198
- Adobe acrobat_dc 15.006.30464
- Adobe acrobat_reader_dc 15.006.30475
- Adobe acrobat_dc 17.011.30059
- Adobe acrobat_reader_dc 15.009.20069
- Adobe acrobat_reader_dc 15.010.20060
- Adobe acrobat_dc 18.009.20044
- Adobe acrobat_dc 15.006.30508
- Adobe acrobat_dc 19.010.20099
- Adobe acrobat_dc 15.006.30201
- Adobe acrobat_reader_dc 15.006.30498
- Adobe acrobat_dc 18.011.20038
- Adobe acrobat_dc 15.006.30243
- Adobe acrobat_dc 17.011.30140
- Adobe acrobat_dc 19.010.20100
- Adobe acrobat_reader_dc 15.006.30508
- Adobe acrobat_reader_dc 17.011.30066
- Adobe acrobat_dc 18.009.20050
- Adobe acrobat_reader_dc 15.006.30464
- Adobe acrobat_reader_dc 15.006.30243
- Adobe acrobat_dc 15.016.20039
- Adobe acrobat_reader_dc 17.009.20058
- Adobe acrobat_reader_dc 19.010.20099
- Adobe acrobat_reader_dc 19.010.20100
- Adobe acrobat_reader_dc 19.012.20034
- Adobe acrobat_dc 15.006.30121
- Adobe acrobat_reader_dc 15.020.20042
- Adobe acrobat_reader_dc 17.011.30142
- Adobe acrobat_dc 19.012.20034
- Adobe acrobat_reader_dc 17.012.20098
- Adobe acrobat_reader_dc 17.011.30080
- Adobe acrobat_reader_dc 15.023.20056
- Adobe acrobat_dc 19.010.20091
- Adobe acrobat_reader_dc 17.011.30140
- Adobe acrobat_dc 15.023.20056
- Adobe acrobat_dc 15.006.30097
- Adobe acrobat_reader_dc 17.011.30127
- Adobe acrobat_reader_dc 15.016.20039
- Adobe acrobat_dc 17.011.30080
- Adobe acrobat_reader_dc 15.006.30097
- Adobe acrobat_reader_dc 15.006.30121
- Adobe acrobat_reader_dc 18.011.20040
- Adobe acrobat_dc 17.011.30127
- Adobe acrobat_dc 17.011.30142
- Adobe acrobat_dc 17.011.30068
- Adobe acrobat_dc 15.008.20082
- Adobe acrobat_reader_dc 19.010.20091
- Adobe acrobat_reader_dc 17.011.30068
- Adobe acrobat_dc 15.006.30482
- Adobe acrobat_dc 15.006.30280
- Adobe acrobat_reader_dc 15.006.30355
- Adobe acrobat_dc 15.006.30173
- Adobe acrobat_reader_dc 15.008.20082
- Adobe acrobat_dc 17.012.20095
- Adobe acrobat_reader_dc 17.011.30110
- Adobe acrobat_dc 17.011.30099
- Adobe acrobat_reader_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30099
- Adobe acrobat_reader_dc 15.006.30482
- Adobe acrobat_dc 17.011.30079
- Adobe acrobat_dc 19.008.20071
- Adobe acrobat_dc 15.006.30355
- Adobe acrobat_dc 15.006.30457
- Adobe acrobat_dc 15.010.20060
- Adobe acrobat_reader_dc 15.006.30457
- Adobe acrobat_reader_dc 19.008.20080
- Adobe acrobat_reader_dc 15.006.30497
- Adobe acrobat_dc 19.008.20080
- Adobe acrobat_reader_dc 18.011.20063
- Adobe acrobat_dc 15.006.30418
- Adobe acrobat_dc 15.006.30448
- Adobe acrobat_dc 17.011.30066
- Adobe acrobat_reader_dc 19.010.20069
- Adobe acrobat_reader_dc 15.006.30495
- Adobe acrobat_dc 15.017.20053
- Adobe acrobat_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30079
- Adobe acrobat_dc 19.010.20069
- Adobe acrobat_dc 15.006.30493
- Adobe acrobat_dc 15.006.30279
- Adobe acrobat_dc 17.012.20096
- Adobe acrobat_reader_dc 15.006.30493
- Adobe acrobat_reader_dc 15.023.20070
- Adobe acrobat_reader_dc 15.006.30172
- Adobe acrobat_dc 17.011.30105
- Adobe acrobat_reader_dc 15.006.30505
- Adobe acrobat_reader_dc 19.008.20071
- Adobe acrobat_dc 15.006.30495
- Adobe acrobat_dc 15.023.20070
- Adobe acrobat_dc 15.006.30174
- Adobe acrobat_dc 17.012.20098
- Adobe acrobat_dc 18.011.20063
- Adobe acrobat_reader_dc 15.006.30174
- Adobe acrobat_dc 15.006.30475
- Adobe acrobat_reader_dc 17.012.20095
- Adobe acrobat_dc 15.006.30497
- Adobe acrobat_dc 15.006.30172
- Adobe acrobat_dc 17.011.30152
- Adobe acrobat_reader_dc 15.006.30279
- Adobe acrobat_reader_dc 17.011.30156
- Adobe acrobat_reader_dc 15.017.20053
- Adobe acrobat_dc 15.006.30416
- Adobe acrobat_dc 17.011.30150
- Adobe acrobat_reader_dc 17.011.30150
- Adobe acrobat_dc 17.011.30156
- Adobe acrobat_reader_dc 17.011.30105
- Adobe acrobat_reader_dc 17.011.30113
- Adobe acrobat_dc 18.011.20040
- Adobe acrobat_reader_dc 17.011.30152
- Adobe acrobat_reader_dc 15.010.20056
- Adobe acrobat_dc 19.010.20098
- Adobe acrobat_reader_dc 15.006.30461
- Adobe acrobat_reader_dc 15.006.30244
- Adobe acrobat_dc 18.011.20055
- Adobe acrobat_reader_dc 15.006.30201
- Adobe acrobat_reader_dc 17.011.30065
- Adobe acrobat_reader_dc 15.006.30417
- Adobe acrobat_dc 17.000.0000
- Adobe acrobat_dc 17.011.30113
- Adobe acrobat_dc 15.010.20056
- Adobe acrobat_dc 15.006.30244
- Adobe acrobat_dc 15.006.30504
- Adobe acrobat_dc 17.011.30143
- Adobe acrobat_dc 15.009.20079
- Adobe acrobat_reader_dc 19.008.20081
- Adobe acrobat_dc 15.023.20053
- Adobe acrobat_dc 15.006.30094
- Adobe acrobat_reader_dc 19.010.20098
- Adobe acrobat_reader_dc 18.011.20055
- Adobe acrobat_dc 17.011.30065
- Adobe acrobat_dc 15.009.20069
- Adobe acrobat_dc 15.006.30096
- Adobe acrobat_dc 19.021.20058
- Adobe acrobat_reader_dc 17.011.30096
- Adobe acrobat_dc 17.011.30120
- Adobe acrobat_reader_dc 15.009.20079
- Adobe acrobat_dc 17.011.30096
- Adobe acrobat_reader_dc 19.021.20047
- Adobe acrobat_dc 15.020.20039
- Adobe acrobat_dc 15.006.30060
- Adobe acrobat_dc 17.011.30070
- Adobe acrobat_reader_dc 15.023.20053
- Adobe acrobat_reader_dc 15.006.30096
- Adobe acrobat_dc 19.021.20047
- Adobe acrobat_reader_dc 15.009.20077
- Adobe acrobat_reader_dc 17.011.30120
- Adobe acrobat_reader_dc 15.006.30280
- Adobe acrobat_dc 15.009.20071
- Adobe acrobat_reader_dc 18.009.20044
- Adobe acrobat_reader_dc 15.020.20039
- Adobe acrobat_dc 19.010.20064
- Adobe acrobat_reader_dc 15.006.30354
- Adobe acrobat_dc 15.006.30352
- Adobe acrobat_reader_dc 19.021.20058
- Adobe acrobat_reader_dc 15.006.30060
- Adobe acrobat_dc 15.006.30119
- Adobe acrobat_dc 15.006.30306
- Adobe acrobat_reader_dc 19.021.20056
- Adobe acrobat_reader_dc 17.011.30070
- Adobe acrobat_reader_dc 15.009.20071
- Adobe acrobat_dc 17.011.30155
- Adobe acrobat_reader_dc 15.006.30392
- Adobe acrobat_reader_dc 15.006.30452
- Adobe acrobat_dc 17.011.30078
- Adobe acrobat_dc 15.009.20077
- Adobe acrobat_reader_dc 19.010.20064
- Adobe acrobat_dc 15.006.30394
- Adobe acrobat_dc 15.006.30456
- Adobe acrobat_reader_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30306
- Adobe acrobat_reader_dc 15.006.30394
- Adobe acrobat_reader_dc 17.011.30138
- Adobe acrobat_dc 15.016.20045
- Adobe acrobat_dc 15.006.30354
- Adobe acrobat_dc 15.006.30392
- Adobe acrobat_dc 15.006.30434
- Adobe acrobat_dc 19.021.20056
- Adobe acrobat_reader_dc 15.006.30456
- Adobe acrobat_dc 17.012.20093
- Adobe acrobat_dc 15.020.20042
- Adobe acrobat_reader_dc 15.006.30119
- Adobe acrobat_dc 15.006.30452
- Adobe acrobat_dc 17.011.30138
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to sensitive information disclosure.
Supported On:
idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
References:
Affected Products:
- Redhat enterprise_linux_server 6.0
- Adobe flash_player_desktop_runtime 31.0.0.122
- Redhat enterprise_linux_workstation 6.0
- Redhat enterprise_linux_desktop 6.0
- Adobe flash_player 31.0.0.122
Severity: MEDIUM
Description:
This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.
Supported On:
srx-17.3, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, vsrx-19.2, srx-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, vsrx-19.4, vsrx-15.1, srx-12.1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Open BGP. A successful attack can lead to directory traversal and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1
HTTP:STC:DL:NITROPRO-JS-API-RCE - HTTP: Nitro Pro PDF Reader Javascript API Remote Code Execution
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Nitro Pro. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
References:
Affected Products:
- Nitro nitro_pro 11.0.3.173
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe XPS. A successful attack can lead to Information Disclosure.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Adobe acrobat_reader_dc 17.012.20093
- Adobe acrobat_reader_dc 15.016.20041
- Adobe acrobat_dc 15.006.30280
- Adobe acrobat_dc 15.016.20041
- Adobe acrobat_reader_dc 17.000.0000
- Adobe acrobat_reader_dc 17.011.30078
- Adobe acrobat_dc 15.017.20050
- Adobe acrobat_dc 15.010.20059
- Adobe acrobat_reader_dc 15.016.20045
- Adobe acrobat_reader_dc 15.017.20050
- Adobe acrobat_dc 15.006.30413
- Adobe acrobat_reader_dc 17.011.30059
- Adobe acrobat_dc 15.006.30198
- Adobe acrobat_dc 17.012.20095
- Adobe acrobat_reader_dc 18.011.20038
- Adobe acrobat_dc 15.006.30417
- Adobe acrobat_reader_dc 15.010.20059
- Adobe acrobat_reader_dc 15.006.30094
- Adobe acrobat_reader_dc 18.009.20050
- Adobe acrobat_dc 17.009.20058
- Adobe acrobat_reader_dc 15.006.30198
- Adobe acrobat_dc 15.020.20042
- Adobe acrobat_dc 17.011.30059
- Adobe acrobat_reader_dc 15.009.20069
- Adobe acrobat_reader_dc 15.010.20060
- Adobe acrobat_dc 18.011.20038
- Adobe acrobat_dc 15.006.30243
- Adobe acrobat_reader_dc 17.011.30066
- Adobe acrobat_dc 18.009.20050
- Adobe acrobat_reader_dc 15.006.30243
- Adobe acrobat_dc 15.016.20039
- Adobe acrobat_reader_dc 17.009.20058
- Adobe acrobat_dc 15.006.30121
- Adobe acrobat_reader_dc 15.020.20042
- Adobe acrobat_dc 17.011.30066
- Adobe acrobat_reader_dc 15.006.30201
- Adobe acrobat_dc 15.006.30201
- Adobe acrobat_dc 15.006.30097
- Adobe acrobat_reader_dc 15.006.30173
- Adobe acrobat_reader_dc 15.016.20039
- Adobe acrobat_reader_dc 15.006.30097
- Adobe acrobat_reader_dc 15.006.30121
- Adobe acrobat_dc 17.011.30068
- Adobe acrobat_dc 15.008.20082
- Adobe acrobat_reader_dc 17.011.30068
- Adobe acrobat_reader_dc 15.006.30355
- Adobe acrobat_dc 15.006.30173
- Adobe acrobat_reader_dc 15.008.20082
- Adobe acrobat_reader_dc 17.009.20044
- Adobe acrobat_dc 17.011.30079
- Adobe acrobat_dc 15.006.30355
- Adobe acrobat_dc 15.010.20060
- Adobe acrobat_dc 15.017.20053
- Adobe acrobat_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30079
- Adobe acrobat_dc 15.006.30279
- Adobe acrobat_dc 17.012.20096
- Adobe acrobat_reader_dc 15.023.20070
- Adobe acrobat_reader_dc 15.006.30172
- Adobe acrobat_reader_dc 15.006.30416
- Adobe acrobat_dc 15.023.20070
- Adobe acrobat_dc 15.006.30174
- Adobe acrobat_dc 17.012.20098
- Adobe acrobat_reader_dc 15.006.30174
- Adobe acrobat_dc 15.006.30172
- Adobe acrobat_reader_dc 15.006.30279
- Adobe acrobat_reader_dc 15.017.20053
- Adobe acrobat_dc 15.006.30416
- Adobe acrobat_reader_dc 17.012.20098
- Adobe acrobat_reader_dc 15.010.20056
- Adobe acrobat_reader_dc 15.006.30244
- Adobe acrobat_reader_dc 15.023.20056
- Adobe acrobat_reader_dc 17.011.30065
- Adobe acrobat_reader_dc 15.006.30417
- Adobe acrobat_dc 17.000.0000
- Adobe acrobat_dc 15.010.20056
- Adobe acrobat_dc 15.006.30244
- Adobe acrobat_dc 15.009.20079
- Adobe acrobat_dc 15.023.20053
- Adobe acrobat_dc 18.009.20044
- Adobe acrobat_dc 15.006.30094
- Adobe acrobat_dc 17.011.30065
- Adobe acrobat_dc 15.009.20069
- Adobe acrobat_dc 15.006.30096
- Adobe acrobat_dc 15.023.20056
- Adobe acrobat_reader_dc 15.009.20079
- Adobe acrobat_dc 15.020.20039
- Adobe acrobat_dc 15.006.30060
- Adobe acrobat_dc 17.011.30070
- Adobe acrobat_reader_dc 15.023.20053
- Adobe acrobat_reader_dc 15.006.30096
- Adobe acrobat_reader_dc 15.009.20077
- Adobe acrobat_reader_dc 17.012.20095
- Adobe acrobat_dc 15.009.20071
- Adobe acrobat_reader_dc 18.009.20044
- Adobe acrobat_reader_dc 15.020.20039
- Adobe acrobat_reader_dc 15.006.30354
- Adobe acrobat_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30060
- Adobe acrobat_dc 15.006.30119
- Adobe acrobat_dc 15.006.30306
- Adobe acrobat_reader_dc 17.011.30070
- Adobe acrobat_reader_dc 15.009.20071
- Adobe acrobat_reader_dc 15.006.30392
- Adobe acrobat_dc 17.011.30078
- Adobe acrobat_dc 15.009.20077
- Adobe acrobat_dc 15.006.30394
- Adobe acrobat_reader_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30306
- Adobe acrobat_reader_dc 15.006.30394
- Adobe acrobat_dc 15.016.20045
- Adobe acrobat_dc 15.006.30354
- Adobe acrobat_dc 15.006.30392
- Adobe acrobat_reader_dc 15.006.30280
- Adobe acrobat_dc 17.012.20093
- Adobe acrobat_reader_dc 15.006.30119
HTTP:STC:ADOBE:CVE-2018-4973-ID - HTTP: Adobe Acrobat Malformed JPEG CVE-2018-4973 Information Disclosure
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat JPEG. A successful attack can lead to information disclosure.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Adobe acrobat_reader_dc 17.012.20093
- Adobe acrobat_reader_dc 15.016.20041
- Adobe acrobat_dc 15.006.30280
- Adobe acrobat_dc 15.016.20041
- Adobe acrobat_reader_dc 17.000.0000
- Adobe acrobat_reader_dc 17.011.30078
- Adobe acrobat_dc 15.017.20050
- Adobe acrobat_dc 15.010.20059
- Adobe acrobat_reader_dc 15.016.20045
- Adobe acrobat_reader_dc 15.017.20050
- Adobe acrobat_dc 15.006.30413
- Adobe acrobat_reader_dc 17.011.30059
- Adobe acrobat_dc 15.006.30198
- Adobe acrobat_dc 17.012.20095
- Adobe acrobat_reader_dc 18.011.20038
- Adobe acrobat_dc 15.006.30417
- Adobe acrobat_reader_dc 15.010.20059
- Adobe acrobat_reader_dc 15.006.30094
- Adobe acrobat_reader_dc 18.009.20050
- Adobe acrobat_dc 17.009.20058
- Adobe acrobat_reader_dc 15.006.30198
- Adobe acrobat_dc 15.020.20042
- Adobe acrobat_dc 17.011.30059
- Adobe acrobat_reader_dc 15.009.20069
- Adobe acrobat_reader_dc 15.010.20060
- Adobe acrobat_dc 18.011.20038
- Adobe acrobat_dc 15.006.30243
- Adobe acrobat_reader_dc 17.011.30066
- Adobe acrobat_dc 18.009.20050
- Adobe acrobat_reader_dc 15.006.30243
- Adobe acrobat_dc 15.016.20039
- Adobe acrobat_reader_dc 17.009.20058
- Adobe acrobat_dc 15.006.30121
- Adobe acrobat_reader_dc 15.020.20042
- Adobe acrobat_dc 17.011.30066
- Adobe acrobat_reader_dc 15.006.30201
- Adobe acrobat_dc 15.006.30201
- Adobe acrobat_dc 15.006.30097
- Adobe acrobat_reader_dc 15.006.30173
- Adobe acrobat_reader_dc 15.016.20039
- Adobe acrobat_reader_dc 15.006.30097
- Adobe acrobat_reader_dc 15.006.30121
- Adobe acrobat_dc 17.011.30068
- Adobe acrobat_dc 15.008.20082
- Adobe acrobat_reader_dc 17.011.30068
- Adobe acrobat_reader_dc 15.006.30355
- Adobe acrobat_dc 15.006.30173
- Adobe acrobat_reader_dc 15.008.20082
- Adobe acrobat_reader_dc 17.009.20044
- Adobe acrobat_dc 17.011.30079
- Adobe acrobat_dc 15.006.30355
- Adobe acrobat_dc 15.010.20060
- Adobe acrobat_dc 15.017.20053
- Adobe acrobat_dc 17.009.20044
- Adobe acrobat_reader_dc 17.011.30079
- Adobe acrobat_dc 15.006.30279
- Adobe acrobat_dc 17.012.20096
- Adobe acrobat_reader_dc 15.023.20070
- Adobe acrobat_reader_dc 15.006.30172
- Adobe acrobat_reader_dc 15.006.30416
- Adobe acrobat_dc 15.023.20070
- Adobe acrobat_dc 15.006.30174
- Adobe acrobat_dc 17.012.20098
- Adobe acrobat_reader_dc 15.006.30174
- Adobe acrobat_dc 15.006.30172
- Adobe acrobat_reader_dc 15.006.30279
- Adobe acrobat_reader_dc 15.017.20053
- Adobe acrobat_dc 15.006.30416
- Adobe acrobat_reader_dc 17.012.20098
- Adobe acrobat_reader_dc 15.010.20056
- Adobe acrobat_reader_dc 15.006.30244
- Adobe acrobat_reader_dc 15.023.20056
- Adobe acrobat_reader_dc 17.011.30065
- Adobe acrobat_reader_dc 15.006.30417
- Adobe acrobat_dc 17.000.0000
- Adobe acrobat_dc 15.010.20056
- Adobe acrobat_dc 15.006.30244
- Adobe acrobat_dc 15.009.20079
- Adobe acrobat_dc 15.023.20053
- Adobe acrobat_dc 18.009.20044
- Adobe acrobat_dc 15.006.30094
- Adobe acrobat_dc 17.011.30065
- Adobe acrobat_dc 15.009.20069
- Adobe acrobat_dc 15.006.30096
- Adobe acrobat_dc 15.023.20056
- Adobe acrobat_reader_dc 15.009.20079
- Adobe acrobat_dc 15.020.20039
- Adobe acrobat_dc 15.006.30060
- Adobe acrobat_dc 17.011.30070
- Adobe acrobat_reader_dc 15.023.20053
- Adobe acrobat_reader_dc 15.006.30096
- Adobe acrobat_reader_dc 15.009.20077
- Adobe acrobat_reader_dc 17.012.20095
- Adobe acrobat_dc 15.009.20071
- Adobe acrobat_reader_dc 18.009.20044
- Adobe acrobat_reader_dc 15.020.20039
- Adobe acrobat_reader_dc 15.006.30354
- Adobe acrobat_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30060
- Adobe acrobat_dc 15.006.30119
- Adobe acrobat_dc 15.006.30306
- Adobe acrobat_reader_dc 17.011.30070
- Adobe acrobat_reader_dc 15.009.20071
- Adobe acrobat_reader_dc 15.006.30392
- Adobe acrobat_dc 17.011.30078
- Adobe acrobat_dc 15.009.20077
- Adobe acrobat_dc 15.006.30394
- Adobe acrobat_reader_dc 15.006.30352
- Adobe acrobat_reader_dc 15.006.30306
- Adobe acrobat_reader_dc 15.006.30394
- Adobe acrobat_dc 15.016.20045
- Adobe acrobat_dc 15.006.30354
- Adobe acrobat_dc 15.006.30392
- Adobe acrobat_reader_dc 15.006.30280
- Adobe acrobat_dc 17.012.20093
- Adobe acrobat_reader_dc 15.006.30119
HTTP:CTS:CNTREON-SRVRCONCONF-CI - HTTP: Centreon ServerConnectionConfigurationService.php Command Injection
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against Centreon Web Application. A successful attack can lead to command injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
HTTP:STC:ADOBE:CVE-2018-4981-CE - HTTP: Adobe Flash Player EMF File CVE-2018-4981 Remote Code Execution
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player EMF File. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Adobe acrobat_dc 17.011.30079
- Adobe acrobat_reader_dc 17.011.30079
- Adobe acrobat_reader_dc 15.006.30417
- Adobe acrobat_reader_dc 18.011.20038
- Adobe acrobat_dc 15.006.30417
- Adobe acrobat_dc 18.011.20038
Severity: MEDIUM
Description:
This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.
Supported On:
srx-17.3, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, vsrx-19.2, srx-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, vsrx-19.4, vsrx-15.1, srx-12.1
CHAT:ICQ:ISS-BLACKICE-OF - ICQ: ISS BlackIce ICQ Decoder META_USER Buffer Overflow
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability in the ICQ decoder on ISS BlackIce network devices. Attackers can remotely execute arbitrary code.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Ibm realsecure_server_sensor 6.0.1 Win SR1.1
- Ibm realsecure_server_sensor 6.5.0 Win SR3.1
- Ibm realsecure_sentry 3.6.0 ecb
- Ibm realsecure_server_sensor 5.0.0 Win
- Ibm realsecure_server_sensor 5.5.0 Win
- Ibm realsecure_server_sensor 5.5.2 Win
- Ibm realsecure_server_sensor 6.0.0 Win
- Ibm realsecure_server_sensor 6.0.1 Win
- Ibm realsecure_server_sensor 5.5.1 Win
- Ibm blackice_agent_for_server 3.6.0 eca
- Ibm blackice_server_protection 3.6.0 cbz
- Ibm realsecure_desktop 3.6.0 eca
- Ibm realsecure_desktop 7.0.0 ebg
- Ibm blackice_agent_for_server 3.6.0 ecb
- Ibm realsecure_desktop 7.0.0 ebh
- Ibm realsecure_desktop 3.6.0 ecb
- Ibm blackice_server_protection 3.6.0 ccb
- Ibm blackice_pc_protection 3.6.0 ccb
- Ibm realsecure_network_sensor 7.0.0 XPU 20.11
- Ibm proventia_g_series XPU 22.4
- Ibm realsecure_server_sensor 7.0.0 XPU 22.9
- Ibm realsecure_desktop 7.0.0 eba
- Ibm proventia_a_series XPU 22.9
- Ibm realsecure_server_sensor 7.0.0 XPU 22.11
- Ibm proventia_a_series XPU 20.11
- Ibm proventia_g_series XPU 22.11
- Ibm realsecure_server_sensor 7.0.0 XPU 22.8
- Ibm realsecure_server_sensor 7.0.0 XPU 22.7
- Ibm realsecure_server_sensor 7.0.0 XPU 22.6
- Ibm realsecure_server_sensor 7.0.0 XPU 22.5
- Ibm proventia_a_series XPU 22.8
- Ibm realsecure_server_sensor 7.0.0 XPU 22.4
- Ibm realsecure_server_sensor 7.0.0 XPU 22.3
- Ibm realsecure_server_sensor 7.0.0 XPU 22.2
- Ibm realsecure_server_sensor 7.0.0 XPU 22.1
- Ibm proventia_a_series XPU 22.7
- Ibm proventia_a_series XPU 22.6
- Ibm proventia_a_series XPU 22.5
- Ibm proventia_a_series XPU 22.4
- Ibm proventia_a_series XPU 22.3
- Ibm proventia_a_series XPU 22.2
- Ibm proventia_a_series XPU 22.1
- Ibm proventia_g_series XPU 22.8
- Ibm proventia_g_series XPU 22.7
- Ibm proventia_g_series XPU 22.6
- Ibm proventia_g_series XPU 22.5
- Ibm realsecure_desktop 3.6.0 ece
- Ibm proventia_g_series XPU 22.2
- Ibm proventia_g_series XPU 22.1
- Ibm proventia_m_series XPU 1.6
- Ibm proventia_m_series XPU 1.5
- Ibm proventia_m_series XPU 1.4
- Ibm realsecure_network_sensor 7.0.0 XPU 22.9
- Ibm proventia_m_series XPU 1.1
- Ibm proventia_m_series XPU 1.9
- Ibm realsecure_desktop 7.0.0 ebk
- Ibm realsecure_desktop 7.0.0 ebl
- Ibm realsecure_guard 3.6.0 ecb
- Ibm realsecure_desktop 3.6.0 ecf
- Ibm realsecure_guard 3.6.0 eca
- Ibm realsecure_guard 3.6.0 ecc
- Ibm proventia_g_series XPU 22.3
- Ibm realsecure_guard 3.6.0 ecf
- Ibm proventia_m_series XPU 1.3
- Ibm proventia_m_series XPU 1.7
- Ibm realsecure_sentry 3.6.0 ecc
- Ibm realsecure_sentry 3.6.0 ece
- Ibm realsecure_desktop 7.0.0 ebj
- Ibm realsecure_desktop 3.6.0 ecd
- Ibm realsecure_guard 3.6.0 ecd
- Ibm realsecure_sentry 3.6.0 ecd
- Ibm realsecure_sentry 3.6.0 eca
- Ibm blackice_server_protection 3.6.0 ccd
- Ibm proventia_a_series XPU 22.10
- Ibm proventia_g_series XPU 22.10
- Ibm proventia_m_series XPU 1.8
- Ibm realsecure_server_sensor 6.5.0 Win SR3.9
- Ibm realsecure_network_sensor 7.0.0 XPU 22.10
- Ibm realsecure_server_sensor 6.5.0 Win SR3.8
- Ibm realsecure_server_sensor 6.5.0 Win SR3.7
- Ibm realsecure_server_sensor 6.5.0 Win SR3.6
- Ibm realsecure_server_sensor 6.5.0 Win SR3.5
- Ibm realsecure_server_sensor 7.0.0 XPU 22.10
- Ibm realsecure_server_sensor 6.5.0 Win SR3.2
- Ibm blackice_pc_protection 3.6.0 cca
- Ibm blackice_pc_protection 3.6.0 ccc
- Ibm blackice_pc_protection 3.6.0 ccf
- Ibm blackice_pc_protection 3.6.0 cce
- Ibm realsecure_sentry 3.6.0 ecf
- Ibm blackice_server_protection 3.6.0 cca
- Ibm blackice_server_protection 3.6.0 ccc
- Ibm blackice_server_protection 3.6.0 cce
- Ibm blackice_server_protection 3.6.0 ccf
- Ibm blackice_agent_for_server 3.6.0 ecc
- Ibm blackice_agent_for_server 3.6.0 ecd
- Ibm blackice_pc_protection 3.6.0 ccd
- Ibm blackice_agent_for_server 3.6.0 ecf
- Ibm realsecure_server_sensor 6.5.0 Win SR3.10
- Ibm blackice_agent_for_server 3.6.0 ebz
- Ibm realsecure_network_sensor 7.0.0 XPU 22.4
- Ibm realsecure_desktop 7.0.0 ebf
- Ibm realsecure_desktop 3.6.0 ebz
- Ibm realsecure_guard 3.6.0 ebz
- Ibm realsecure_sentry 3.6.0 ebz
- Ibm realsecure_server_sensor 6.5.0 Win SR3.4
- Ibm realsecure_network_sensor 7.0.0
- Ibm realsecure_server_sensor 6.5.0 Win SR3.3
- Ibm proventia_m_series XPU 1.2
- Ibm realsecure_guard 3.6.0 ece
- Ibm blackice_pc_protection 3.6.0 .cbz
- Ibm blackice_agent_for_server 3.6.0 ece
- Ibm blackice_agent 3.1.0
- Ibm realsecure_server_sensor 6.5.0 Win
- Ibm proventia_g_series XPU 22.9
HTTP:STC:SWF:MUL-RCE - HTTP: Adobe Flash Player Multiple Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
References:
Affected Products:
- Redhat enterprise_linux_server 6.0
- Redhat enterprise_linux_desktop 6.0
- Adobe flash_player 29.0.0.140
- Redhat enterprise_linux_workstation 6.0
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against FasterXML Jackson. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Fasterxml jackson-databind 2.9.1
- Fasterxml jackson-databind 2.8.3
- Redhat jboss_enterprise_application_platform 7.1.0
- Fasterxml jackson 1.0.0
- Fasterxml jackson-databind 2.8.2
- Fasterxml jackson 1.7
- Fasterxml jackson 1.1.2
- Redhat jboss_enterprise_application_platform 6.4.19
- Fasterxml jackson-databind 2.8.1
- Fasterxml jackson 1.6
- Redhat jboss_bpm_suite 6.4.11
- Fasterxml jackson 1.1.0
- Redhat jboss_operations_network 3.3.10
- Fasterxml jackson-databind 2.8.6
- Fasterxml jackson 1.2.0
- Redhat jboss_brms 6.4.10
- Redhat jboss_enterprise_application_platform 6.0.0
- Fasterxml jackson-databind 2.8.10
- Fasterxml jackson-databind 2.8.4
- Redhat jboss_enterprise_application_platform 6.4.0
- Fasterxml jackson 1.4.6
- Fasterxml jackson-databind 2.8.5
- Fasterxml jackson-databind 2.8.0
- Fasterxml jackson-databind 2.8.7
- Fasterxml jackson 1.9
- Fasterxml jackson 1.8
- Fasterxml jackson-databind 2.8.8.1
- Fasterxml jackson-databind 2.8.9
- Fasterxml jackson 1.5
- Fasterxml jackson-databind 2.8.8
- Debian debian_linux 9.0
- Fasterxml jackson 1.4.0
- Fasterxml jackson-databind 2.9.2
- Debian debian_linux 8.0
- Fasterxml jackson-databind 2.9.3
- Fasterxml jackson 1.3