Intrusion Prevention

Name Status Update
Digium.Asterisk.Chan.skinny.SCCP.Memory.Exhaustion.DoS
Add
*
Nmap.Script.Scanner
Add
*
Wordpress.CM.Download.Manager.Code.Injection
Add
*
MS.Office.EQNEDT32.EXE.Equation.Parsing.Memory.Corruption
Mod
*Sig Added
Backdoor.Cobalt.Strike.Beacon
Mod
*Sig Added
MS.IE.CDisplayPointer.Object.Handling.Memory.Corruption
Mod
*Sig Added
Obfuscated.Rich.Text.Format
Mod
*Sig Added
Exim.BDAT.Data.Header.Parsing.DoS
Mod
*Sig Added
IBM.Lotus.Quickr.qp2.ActiveX.Control.Stack.Buffer.Overflow
Mod
*Sig Added
Adobe.Flash.Primetime.SDK.TVSDK.Objects.Memory.Corruption
Attr
Default_action updated to 'drop' from 'pass'
Honeywell.IPCam.Information.Disclosure
Attr
Default_action updated to 'drop' from 'pass'
Netsys.systemTool.Multiple.Remote.Command.Execution
Attr
Default_action updated to 'drop' from 'pass'
Netgear.macAddress.Remote.Command.Execution
Attr
Default_action updated to 'drop' from 'pass'
Ysoserial.JSP.Webshell
Attr
Default_action updated to 'drop' from 'pass'
MS.Edge.Chakra.Engine.CVE-2017-11911.Memory.Corruption
Attr
Default_action updated to 'drop' from 'pass'
VBulletin.PHP.Routestring.Remote.Code.Execution
Attr
Default_action updated to 'drop' from 'pass'