Update #3819 - (06/25/2025)
New Signatures
Signature Name |
Severity |
Description |
|---|---|---|
major |
This signature detects attempts to exploit a known cross-site scripting vulnerability against NodeBB. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks. |
|
major |
This signature detects attempts to exploit a known vulnerability against ISC Bind. A successful attack can result in a denial-of-service condition. |
|
major |
This signature detects attempts to exploit a known vulnerability against Progress. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Adobe Coldfusion. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Adobe ColdFusion. A successful attack can lead to security bypass. |
|
major |
This signature detects attempts to exploit a known vulnerability against Adobe ColdFusion. A successful attack can lead to arbitrary code execution. |
|
critical |
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can lead to sensitive information disclosure. |
Updated Signatures
Signature Name |
Severity |
Description |
|---|---|---|
major |
This signature detects attempts to exploit a known vulnerability against Coder code-server. A successful attack can lead to access control bypass, spoofing conditions, or the attacker obtaining the victim's session token.
|
|
major |
This signature detects attempts to exploit a known vulnerability against GNU Image Manipulation Program. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user. |
|
major |
This signature detects attempts to exploit a known vulnerability against Ivanti. A successful attack can lead to sensitive information disclosure. |
|
major |
This signature detects attempts to exploit a known vulnerability against Django. A successful attack can result in a denial-of-service condition. |
|
major |
This signature detects attempts to exploit a known vulnerability against Microsoft SharePoint Server. A successful attack can lead to command injection and arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Fortinet. A successful attack can lead to command injection and arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Delta Electronics CNCSoft-G2 DOPSoft DPAX File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Delta Electronics. |
|
major |
This signature detects attempts to exploit a known vulnerability against Ivanti. A successful attack can lead to directory traversal and arbitrary code execution. |
|
minor |
This signature detects Web pages containing dangerous script . A malicious Web site can exploit a known vulnerability in MyBB visual editor and gain control of the client browser. |
|
major |
This signature detects attempts to exploit a known vulnerability against Ivanti Avalanche. A successful attack can lead to sensitive information disclosure. |
|
major |
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can lead to arbitrary code execution. |
|
minor |
This signature detects attempts to exploit a known cross-site scripting vulnerability against JetBrains TeamCity. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks. |
|
major |
This signature detects attempts to exploit a known vulnerability against Allegra. A successful attack can lead to directory traversal and arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Progress Kemp. A successful attack can lead to command injection and arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Apple macOS. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Fortinet FortiWeb. A successful attack can lead to directory traversal and arbitrary code execution. |
|
warning |
This signature detects attempts to exploit a known vulnerability against Ruby on Rails Dynamic Render. A successful attack can lead to directory traversal and arbitrary code execution. |
|
warning |
This signature detects attempts to exploit a known vulnerability against Apache Airflow. A successful attack can lead to security bypass. |
|
major |
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. A successful attack can result in hijack sessions with third-party web sites and could launch further attacks. |
|
warning |
This signature detects attempts to exploit a known vulnerability in the Multiple Webservers. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Webserver. |
|
major |
This signature detects attempts to exploit a known vulnerability against BIND DNS package bind9. A successful exploit can lead to denial of service. |
|
major |
This signature detects attempts to exploit a known vulnerability against Liferay Portal. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempts to exploit a known vulnerability against Cacti. A successful attack can lead to arbitrary code execution. |
|
major |
This signature detects attempt to exploit a directory traversal and remote code execution vulnerability exists in Advantech WebAccess software. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the remote service. Successful exploitation could lead to remote code execution on the target server with privileges of the application process. |