Todas as vulnerabilidades
- * indicates a new version of an existing rule
Deep Packet Inspection Rules:
JetBrains TeamCity
1011815 - JetBrains TeamCity Cross-Site Scripting Vulnerability (CVE-2023-34220)
PaperCut
1011855 - PaperCut NG Remote Code Execution Vulnerability (CVE-2023-39469)
Web Client Common
1011821 - Adobe Acrobat And Reader Remote Code Execution Vulnerability (CVE-2023-26406)
Web Server Apache
1011750* - Apache HTTP Server Request Smuggling Vulnerability (CVE-2023-25690)
Web Server HTTPS
1011837 - GLPI SQL Injection Vulnerability (CVE-2023-35924)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1011853 - PaperCut NG/MF Authentication Bypass Vulnerability (CVE-2023-27350) - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
IPSec-IKE
1011801* - Microsoft Windows Internet Key Exchange (IKE) Protocol Extensions Denial Of Service Vulnerability (CVE-2023-21758)
SNMP Server
1011647* - Net-SNMP NULL Pointer Dereference Vulnerability (CVE-2022-44792)
SolarWinds Orion Platform
1011851 - SolarWinds Orion Platform Incorrect Comparison Vulnerability (CVE-2023-23843)
Web Application PHP Based
1011845 - GLPI SQL Injection Vulnerability (CVE-2023-36808)
1011826* - Roundcube Webmail Command Injection Vulnerability (CVE-2020-12641)
Web Client Common
1011852 - Foxit PDF Reader and Editor Out-Of-Bounds Read Remote Code Execution Vulnerability (CVE-2023-38119)
Web Server Common
1011791* - JetBrains TeamCity Cross-Site Scripting Vulnerability (CVE-2022-48343)
Web Server HTTPS
1011794* - Contec CONPROSYS HMI System SQL Injection Vulnerability (CVE-2023-29154)
Web Server Miscellaneous
1011759* - Ivanti Avalanche Arbitrary File Upload Vulnerability (CVE-2023-28128)
Zoho ManageEngine ADSelfService Plus
1011793* - Zoho ManageEngine ADSelfService Plus Denial Of Service Vulnerability (CVE-2023-28342)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1004488* - Database Server - Microsoft SQL - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Advanced Message Queuing Protocol (AMQP)
1011834* - SolarWinds Network Performance Monitor Insecure Deserialization Vulnerability (CVE-2022-38111)
Apache RocketMQ
1011831* - Apache RocketMQ Command Injection Vulnerability (CVE-2023-33246)
Web Application Common
1011836* - Progress MOVEit Transfer SQL Injection Vulnerability (CVE-2023-36932) - 1
Web Application PHP Based
1011862 - WordPress 'Ultimate Member' Plugin Privilege Escalation Vulnerability (CVE-2023-3460)
Web Server HTTPS
1011823* - Contec CONPROSYS HMI System Cross-Site Scripting Vulnerability (CVE-2023-28651)
Web Server Miscellaneous
1011863 - Ivanti Avalanche Authentication Bypass Vulnerability (CVE-2023-32566)
1011825* - Jenkins 'File Parameter' Plugin Arbitrary File Write Vulnerability (CVE-2023-32986)
1011835* - XWiki Code Injection Vulnerability (CVE-2023-29524)
1011838* - XWiki Code Injection Vulnerability (CVE-2023-35150)
1011833* - XWiki Code Injection Vulnerability (CVE-2023-36469)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Django Server
1011843* - Django Denial of Service Vulnerability (CVE-2023-23969)
Eclipse Jetty
1011378* - Eclipse Jetty Unauthenticated Information Disclosure Vulnerability (CVE-2021-28169)
MinIO Server
1011830* - MinIO Information Disclosure Vulnerability (CVE-2023-28432)
PaperCut
1011731* - PaperCut NG And MF Authentication Bypass Vulnerability (CVE-2023-27350)
SolarWinds Orion Platform
1011854 - SolarWinds Orion Platform Deserialization of Untrusted Data Vulnerability (CVE-2023-33225)
1011856 - SolarWinds Orion Platform Incomplete List of Disallowed Inputs Vulnerability (CVE-2023-23844)
Splunk Enterprise
1011817* - Splunk 'Lookup File Editing' App Directory Traversal Vulnerability (CVE-2023-32714)
Web Application Common
1011839* - Progress MOVEit Transfer SQL Injection Vulnerability (CVE-2023-36932) - 2
Web Application PHP Based
1011870 - WordPress 'Media Library Assistant' Plugin Remote Code Execution Vulnerability (CVE-2023-4634)
Web Server Adobe ColdFusion
1011857 - Adobe ColdFusion Directory Traversal Vulnerability (CVE-2023-26361)
1011846* - Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2023-38204)
Web Server Miscellaneous
1011869 - Citrix ShareFile Storage Zones Controller Directory Traversal Vulnerability (CVE-2023-24489)
1011858 - XWiki Code Injection Vulnerability (CVE-2023-35166)
1011860 - XWiki Code Injection Vulnerability (CVE-2023-37462)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Web Server HTTPS
1011878 - Cacti SQL Injection Vulnerability (CVE-2023-39361)
Web Server Miscellaneous
1011882 - Atlassian Confluence Data Center and Server Privilege Escalation Vulnerability (CVE-2023-22515)
Web Server SharePoint BDC
1011814* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2023-24955)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Ivanti Avalanche
1011871 - Ivanti Avalanche XML External Entity Processing Vulnerability (CVE-2023-32567)
Port Mapper Windows
1001033* - Windows Port Mapper Decoder
Unix Samba
1011796* - Linux Kernel KSMBD Denial of Service Vulnerability (CVE-2023-32247)
Web Server HTTPS
1011876 - Progress WS_FTP Server Insecure Deserialization Vulnerability (CVE-2023-40044)
Windows Services RPC Server DCERPC
1010539* - Identified NTLM Brute Force Attempt (ZeroLogon) (CVE-2020-1472)
1010519* - Netlogon Elevation Of Privilege Vulnerability (Zerologon) (CVE-2020-1472)
Zoho ManageEngine AssetExplorer_SupportCenter Plus_ADManager Plus
1011879 - Zoho ManageEngine ADManager Plus Directory Traversal Vulnerability (CVE-2023-39912)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
IPSec-IKE
1011669* - Microsoft Windows Internet Key Exchange (IKE) Protocol Extensions Denial Of Service Vulnerability (CVE-2023-21547)
JetBrains TeamCity
1011873* - JetBrains TeamCity Authentication Bypass Vulnerability (CVE-2023-42793)
SolarWinds Orion Platform
1011854* - SolarWinds Orion Platform Deserialization of Untrusted Data Vulnerability (CVE-2023-33225)
1011856* - SolarWinds Orion Platform Incomplete List of Disallowed Inputs Vulnerability (CVE-2023-23844)
Web Client Common
1011822 - Adobe Acrobat And Reader Remote Code Execution Vulnerability (CVE-2023-26408)
Web Server Adobe ColdFusion
1011857* - Adobe ColdFusion Directory Traversal Vulnerability (CVE-2023-26361)
1011885 - Adobe ColdFusion Improper Access Control Vulnerability (CVE-2023-38205)
Web Server HTTPS
1011884 - Qlik Sense Enterprise Directory Traversal Vulnerability (CVE-2023-41266)
Web Server Miscellaneous
1011869* - Citrix ShareFile Storage Zones Controller Directory Traversal Vulnerability (CVE-2023-24489)
1011860* - XWiki Code Injection Vulnerability (CVE-2023-37462)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Web Server HTTPS
1011893 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22090)
1011895 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22090) - 1
1011894 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22100)
1011896 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22100) - 1
1011892 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22101)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Ivanti Avalanche Remote Control Server
1011864* - Ivanti Avalanche Directory Traversal Vulnerability (CVE-2023-32563)
Mail Server Exim
1011874* - Exim Remote Code Execution Vulnerability (CVE-2023-42117)
Parse Server
1011868* - Parse Server Remote Code Execution Vulnerability (CVE-2023-36475)
SolarWinds Access Rights Manager
1011890 - SolarWinds Access Rights Manager Directory Traversal Vulnerability (CVE-2023-35185)
1011891 - SolarWinds Access Rights Manager Directory Traversal Vulnerability (CVE-2023-35187)
Web Server Common
1011887 - Control Web Panel Command Injection Remote Code Execution Vulnerability (CVE-2023-42123)
Web Server HTTPS
1011888 - Cacti SQL Injection Vulnerability (CVE-2023-39365)
1011889 - SolarWinds Access Rights Manager Insecure Deserialization Vulnerability (CVE-2023-35186)
Web Server Miscellaneous
1011858* - XWiki Code Injection Vulnerability (CVE-2023-35166)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Web Server Miscellaneous
1011899 - Atlassian Confluence Data Center and Server Improper Authorization Vulnerability (CVE-2023-22518)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.