Intrusion Prevention

Name Status Update
MS.SharePoint.Workflows.XOML.Remote.Code.Injection
Add
Axis.SSI.camnbr.Remote.Command.Execution
Add
TerraMaster.TOS.User.Creation.System.Command.Injection
Add
Netsweeper.Webadmin.Unixlogin.Command.Injection
Add
MS.IE.VBScript.Engine.SafeArrayDestroy.Remote.Code.Execution
Add
MS.IE.JScript.Engine.JsObjPropertyIsEnumerable.Use.After.Free
Add
MS.IE.VBScript.Engine.RegExp.Replace.Handling.Use.After.Free
Add
MS.Graphics.Components.CVE-2020-1153.Remote.Code.Execution
Add
MS.IE.VBScript.Engine.SafeArrayLock.Use.After.Free
Add
MS.Windows.CVE-2020-1135.Privilege.Elevation
Add
MS.Windows.CVE-2020-1143.Privilege.Elevation
Add
MS.Windows.CVE-2020-1054.Privilege.Elevation
Add
FG-VD-20-060_Fooplugins.0day
Add
FG-VD-20-063_WPFormsLite.0day
Add
Adobe.Reader.CVE-2020-3804.Information.Disclosure
Mod
Added Signature
LibreNMS.addhost.Authentication.Remote.Command.Injection
Mod
Added Signature
MS.Adobe.Font.Driver.VToHOrigin.Remote.Code.Execution
Mod
Added Signature
Generic.JavaScript.Cryptocurrency.Mining.Script
Mod
Added Signature
MS.Windows.Media.Foundation.mfasfsrcsnk.dll.Type.Confusion
Mod
Added Signature
GrandSoft.Exploit.Kit
Mod
Default_action set to drop
Fallout.Exploit.Kit
Mod
Default_action set to drop
Spelevo.Exploit.Kit
Mod
Default_action set to drop
FG-VD-19-040_Plex.Web.Client.0day
Mod
Default_action set to drop
Sweetscape.010.Editor.CtrlA.Memory.Corruption
Mod
Default_action set to drop
Apple.WebKit.WebCore.FormSubmission.Create.Use.After.Free
Mod
Default_action set to drop
VMware.vCenter.VmDirLegacyAccessCheck.Authentication.Bypass
Mod
Default_action set to drop
Apple.WebKit.WebCore.RenderObj.PreviousSibling.Use.After.Free
Mod
Default_action set to drop
Cisco.SD-WAN.Solution.vManage.SQL.Injection
Mod
Default_action set to drop