Update #3817 - (06/18/2025)

New Signatures

Signature Name
Severity
Description
major
This signature detects attempts to exploit a known vulnerability against GNU Image Manipulation Program. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
major
This signature detects attempts to exploit a known vulnerability against Delta Electronics CNCSoft-G2 DOPSoft DPAX File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Delta Electronics.
major
This signature detects attempts to exploit a known vulnerability against Coder code-server. A successful attack can lead to access control bypass, spoofing conditions, or the attacker obtaining the victim's session token.
major
This signature detects attempts to exploit a known vulnerability against Django. A successful attack can result in a denial-of-service condition.
major
This signature detects attempts to exploit a known vulnerability against Microsoft SharePoint Server. A successful attack can lead to command injection and arbitrary code execution.
major
This signature detects attempts to exploit a known vulnerability against Fortinet. A successful attack can lead to command injection and arbitrary code execution.
major
This signature detects attempts to exploit a known vulnerability against Ivanti. A successful attack can lead to sensitive information disclosure.

Updated Signatures

Signature Name
Severity
Description
major
This signature detects attempts to exploit a known vulnerability against Ivanti. A successful attack can lead to directory traversal and arbitrary code execution.
minor
This signature detects Web pages containing dangerous script . A malicious Web site can exploit a known vulnerability in MyBB visual editor and gain control of the client browser.
major
This signature detects attempts to exploit a known vulnerability against BIND DNS package bind9. A successful exploit can lead to denial of service.
major
This signature detects attempts to exploit a known vulnerability against Ivanti Avalanche. A successful attack can lead to sensitive information disclosure.