Neueste Nachrichten zu Sicherheitslücken
- * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1009490* - Block Administrative Share - 1 (ATT&CK T1077,T1105)
1009703* - Identified Domain-Level Groups/Accounts Enumeration Over SMB (ATT&CK T1069, T1087, T1018)
1010317* - Microsoft Windows SMB Remote Code Execution Vulnerability (CVE-2020-1301)
1005448* - SMB Null Session Detected - 1
DCERPC Services - Client
1010106* - Identify Downloading Of PowerShell Scripts Through SMB Share (ATT&CK T1086)
DNS Client
1003328* - Disallow Intra-Site Automatic Tunnel Addressing Protocol
IBM WebSphere Application Server IIOP protocol
1010348* - IBM WebSphere Application Server IIOP Deserialization Vulnerabilities (CVE-2020-4449 and CVE-2020-4450)
Oracle E-Business Suite Web Interface
1010325* - Oracle E-Business Suite Advanced Outbound Telephony Calendar Cross Site Scripting Vulnerability (CVE-2020-2852)
1010360 - Oracle E-Business Suite Advanced Outbound Telephony Cross Site Scripting Vulnerability (CVE-2020-2871)
1010367 - Oracle E-Business Suite Advanced Outbound Telephony Cross-Site Scripting Vulnerability (CVE-2020-2854)
1010383 - Oracle E-Business Suite Advanced Outbound Telephony Cross-Site Scripting Vulnerability (CVE-2020-2856)
SSL/TLS Server
1010312* - Identified Suspicious TLS Request (ATT&CK T1190)
1010316* - Identified Suspicious TLS Request - 1 (ATT&CK T1190)
Suspicious Client Application Activity
1010327* - Identified Potential Malicious Client Traffic (ATT&CK T1105)
1010307* - Identified Reverse Shell Communication Over HTTPS (ATT&CK T1071)
1010306* - Identified Reverse Shell Communication Over HTTPS - 1 (ATT&CK T1071)
1010364 - Identified Reverse Shell Communication Over HTTPS - 2 (ATT&CK T1071)
1010365 - Identified Reverse Shell Communication Over HTTPS - 3 (ATT&CK T1071)
1010370 - Identified Reverse Shell Communication Over HTTPS - 4 (ATT&CK T1071)
Suspicious Server Application Activity
1010328* - Identified Potential Malicious Server Traffic (ATT&CK T1105)
Web Application Common
1010377 - Centreon 'RRDdatabase_status_path' Command Injection Vulnerability (CVE-2020-13252)
1010372 - Opmantek Open-AudIT Cross Site Scripting Vulnerability (CVE-2020-12261)
1010354 - Pandora FMS Ping Authenticated Remote Code Execution Vulnerability
1010282* - Sonatype Nexus Repository Manager Java EL Injection Remote Code Execution Vulnerability (CVE-2020-10199)
1010334* - Telerik UI For ASP.NET AJAX Insecure Deserialization Vulnerability (CVE-2019-18935)
Web Application PHP Based
1010338* - PHP-Fusion Administration Banner Stored Cross-Site Scripting Vulnerability (CVE-2020-12438)
1010359 - WordPress 'bbPress' Plugin Unauthenticated Privilege Escalation Vulnerability (CVE-2020-13693)
1010341 - Wordpress Drag and Drop Multi File Uploader Remote Code Execution Vulnerability (CVE-2020-12800)
Web Application Ruby Based
1010384 - Lodash Node Module Modification Of Assumed-Immutable Data (MAID) Vulnerability (CVE-2018-3721)
Web Client Common
1010381 - Microsoft Windows Cabinet File Remote Code Execution Vulnerability (CVE-2020-1300)
1010380 - Microsoft Windows Codecs Library Remote Code Execution Vulnerability (CVE-2020-1425)
1010379 - Microsoft Windows Codecs Library Remote Code Execution Vulnerability (CVE-2020-1457)
Web Server Common
1010162* - Cisco Data Center Network Manager Directory Traversal Vulnerability (CVE-2019-15980)
1010336 - Disallow Upload Of Linux Executable File (ATT&CK T1105)
1010388 - F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902)
1010323* - Gila CMS Image Upload Remote Code Execution Vulnerability (CVE-2020-5514)
1010283* - Microsoft .NET Framework Remote Code Execution Injection Vulnerability (CVE-2020-0646)
1010376 - Opmantek Open-AudIT Command Injection Vulnerability (CVE-2020-11941)
1010322* - Oracle Business Intelligence AMF Deserialization Remote Code Execution Vulnerability (CVE-2020-2950)
1010351* - vBulletin Improper Access Control Vulnerability (CVE-2020-12720)
Windows Services RPC Server DCERPC
1009615* - Identified Initialization Of WMI - Server (ATT&CK T1047)
Integrity Monitoring Rules:
1010382 - CommandLine (ATT&CK T1059)
1002779* - Microsoft Windows - System File Modified
1009618* - PowerShell (ATT&CK T1086)
1010373 - Systemd Service (ATT&CK T1501)
1010389 - Unix - Process Monitor in /tmp and /var/tmp location
Log Inspection Rules:
1002828* - Application - Secure Shell Daemon (SSHD)
1002815* - Authentication Module - Unix Pluggable Authentication Module
1002831* - Unix - Syslog - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Apache JServ Protocol
1010361 - Apache Tomcat Local File Inclusion Vulnerability (CVE-2020-1938)
1010184* - Identified Apache JServ Protocol (AJP) Traffic
DCERPC Services
1001839* - Restrict Attempt To Enumerate Windows User Accounts (ATT&CK T1087)
MQTT Server
1010357 - Eclipse Mosquitto Improper Authentication Vulnerability (CVE-2017-7650)
Suspicious Server Application Activity
1009549* - Detected Terminal Services (RDP) Server Traffic - 1 (ATT&CK T1015,T1043,T1076,T1048,T1032,T1071)
Universal Plug And Play Service
1010358 - Identified CallStranger Vulnerability in UPNP Devices (CVE-2020-12695)
Unix SSH
1008313* - Identified Many SSH Client Key Exchange Requests (ATT&CK T1110)
Web Application Common
1010252 - Sonatype Nexus Repository Manager Stored Cross-Site Scripting Vulnerability (CVE-2020-10203)
Web Client Mozilla Firefox
1010355 - Mozilla Firefox Memory Corruption Vulnerability (CVE-2017-5400)
1010356 - Mozilla Firefox Sensitive Information Disclosure Vulnerability (CVE-2017-5407)
Web Server Common
1005728* - Parameter Value Length Restriction
1010362 - VMware Cloud Director Code Injection Vulnerability (CVE-2020-3956)
1010366 - vBulletin 'widgetConfig' Unauthenticated Remote Code Execution Vulnerability (CVE-2019-16759)
Windows Remote Management Client
1010073* - WinRM Service Detected & Powershell RCE Over HTTP - Client (ATT&CK T1028)
Windows Services RPC Client DCERPC
1008477* - Identified Usage Of WMI Execute Methods - Client (ATT&CK T1047)
Integrity Monitoring Rules:
1002859* - Local Security Authority (LSA) Authentication Packages modified (ATT&CK T1174)
1010353 - Local Security Authority (LSA) Notification Packages modified (ATT&CK T1131)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Apache Zookeeper
1010756 - Apache Zookeeper Denial Of Service Vulnerability (CVE-2017-5637)
DCERPC Services
1007596* - Identified Possible Ransomware File Extension Rename Activity Over Network Share
DNS Client
1010766 - Identified Non Existing DNS Resource Record (RR) Types In DNS Traffic
Directory Server LDAP
1010754 - Microsoft Windows NTLM Elevation Of Privilege Vulnerability Over LDAP (CVE-2019-1040)
Memcached
1010745* - Memcached 'process_bin_sasl_auth' Integer Overflow Vulnerability (CVE-2016-8706)
Suspicious Client Application Activity
1010770 - Identified UDP Trojan SSHDoor C&C Traffic
Suspicious Client Ransomware Activity
1010767 - Identified HTTP Backdoor Kobalos C&C Traffic
Suspicious Server Ransomware Activity
1010749 - Radmin Server Remote Control Session Setup (ATT&CK T1219)
Web Application Common
1010750* - Zend Framework Deserialization Remote Code Execution Vulnerability (CVE-2021-3007)
Web Client Common
1010760 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB21-09) - 1
1010765 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB21-09) - 2
1010757 - Microsoft Windows Denial Of Service Vulnerability (CVE-2006-7210)
1010768 - Microsoft Windows Embedded NTFS '$i30' Attribute Vulnerability
1010758 - Microsoft Windows Group Convertor DLL Hijacking Vulnerability (CVE-2010-3139)
Web Server Apache
1010670* - Apache Struts2 Remote Code Execution Vulnerability (CVE-2020-17530)
Web Server Common
1010737 - CMS Made Simple 'Showtime2' Reflected Cross Site Scripting Vulnerability (CVE-2020-20138)
1010736 - Cisco Data Center Network Manager Authentication Bypass Vulnerability (CVE-2019-15977)
1010762 - Identified Kubernetes API Server LoadBalancer Status Patch Request
1007185* - Java Unserialize Remote Code Execution Vulnerability
1010725* - Pi-Hole Remote Command Execution Vulnerability (CVE-2020-8816)
Web Server HTTPS
1010712* - WordPress 'Contact Form 7' Plugin Arbitrary File Upload Vulnerability (CVE-2020-35489)
Web Server Oracle
1010752* - Oracle Coherence Server T3 Protocol Insecure Deserialization Vulnerability (CVE-2020-14756)
Web Server SharePoint
1010747 - Identified Microsoft SharePoint GetRolesAndPermissionsForSite Request (ATT&CK T1589.002, T1589.003, T1087)
1010746 - Identified Microsoft SharePoint GetUserInfo Request (ATT&CK T1589.002, T1589.003, T1087)
1010764 - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-24072)
Integrity Monitoring Rules:
1009626* - Windows Accessibility Features - ImageFileExecution (ATT&CK T1015,T1183)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DNS Client
1010744 - DNS Request To Ngrok Domain Detected
1010740 - DNSmasq DNSSEC Heap Based Buffer Overflow Vulnerability (CVE-2020-25681)
DNS Server
1004747* - DNS Invalid Compression Denial Of Service
Directory Server LDAP
1010667* - Microsoft Windows Active Directory IntegratedDNS Remote Code Execution Vulnerability (CVE-2020-0761)
1010321* - OpenLDAP slapd Nested Filter Stack Overflow Vulnerability (CVE-2020-12243)
FTP Server IIS
1004553* - Microsoft IIS FTPSVC Unspecified Remote Denial Of Service
Java RMI
1009390* - Apache Commons FileUpload DiskFileItem File Manipulation Remote Code Execution Vulnerability (CVE-2016-1000031)
Memcached
1010745 - Memcached 'process_bin_sasl_auth' Integer Overflow Vulnerability (CVE-2016-8706)
Suspicious Client Application Activity
1010741* - Identified HTTP Backdoor Python FreakOut A Runtime Detection
Unix Samba
1008847* - Samba Information Disclosure Vulnerability (CVE-2017-15275)
Web Application Common
1010750 - Zend Framework Deserialization Remote Code Execution Vulnerability (CVE-2021-3007)
Web Client Common
1008753 - GNU Wget 'fd_read_body' Heap Buffer Overflow Vulnerability (CVE-2017-13090)
1008750 - GNU Wget 'skip_short_body' Stack Buffer Overflow Vulnerability (CVE-2017-13089)
Web Server Apache
1010461* - Apache Struts2 Remote Code Execution Vulnerability (CVE-2019-0230)
Web Server Common
1010725 - Pi-Hole Remote Command Execution Vulnerability (CVE-2020-8816)
1010755 - SAP Solution Manager Remote Code Execution Vulnerability (CVE-2020-6207)
Web Server Miscellaneous
1010753 - Atlassian Jira Server-Side Request Forgery Vulnerability (CVE-2019-8451)
Web Server Oracle
1010752 - Oracle Coherence Server T3 Protocol Insecure Deserialization Vulnerability (CVE-2020-14756)
1010739* - Oracle WebLogic Console JNDI Injection Vulnerability (CVE-2021-2109)
Web Server SharePoint
1010738 - Restrict Attempt To Enumerate Microsoft SharePoint For User Accounts (ATT&CK T1087)
Integrity Monitoring Rules:
1010055* - AntiVirus - Trend Micro ApexOne Server
1003744* - AntiVirus - Trend Micro OfficeScan Server
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
CA ARCserve D2D Administration Interface
1010699* - Arcserve D2D External Entity Injection Vulnerability (CVE-2020-27858)
DNS Server
1004747* - DNS Invalid Compression Denial Of Service
Directory Server LDAP
1010724* - Microsoft Windows Active Directory IntegratedDNS Remote Code Execution Vulnerability (CVE-2020-0718)
1010321* - OpenLDAP slapd Nested Filter Stack Overflow Vulnerability (CVE-2020-12243)
FTP Server IIS
1004553* - Microsoft IIS FTPSVC Unspecified Remote Denial Of Service
OpenSSL
1010280* - OpenSSL SSL_check_chain NULL Pointer Dereference Vulnerability (CVE-2020-1967) - Server
Remote Desktop Protocol Over UDP
1010125* - Microsoft Windows RDP Gateway Server Remote Code Execution Vulnerabilities (CVE-2020-0609 and CVE-2020-0610)
Suspicious Client Application Activity
1010741 - Identified HTTP Backdoor Python FreakOut A Runtime Detection
Suspicious Client Ransomware Activity
1010732 - Identified FlawedGrace Checkin Request - Client
Suspicious Server Ransomware Activity
1010733 - Identified FlawedGrace Checkin Request - Server
1010616* - Identified HTTP Backdoor.Shell.Powertrick.A Runtime Detection
1010731 - Identified HTTP Redhat Webshell C&C Traffic
1010610* - Identified HTTP Trojan.Win64.BazarTrickbot Traffic
Web Application Common
1010727* - Mongo-Express Remote Code Execution Vulnerability (CVE-2019-10758)
Web Client Common
1004288* - Identified Suspicious Shellcode In HTML Documents
Web Server HTTPS
1010718* - Joomla CMS 'mod_random_image' Stored Cross-Site Scripting Vulnerability (CVE-2020-15696)
1010712* - WordPress 'Contact Form 7' Plugin Arbitrary File Upload Vulnerability (CVE-2020-35489)
Web Server Miscellaneous
1010729 - Atlassian Jira Information Disclosure Vulnerability (CVE-2020-14179)
1010679* - SolarWinds Network Performance Monitor 'ExportToPDF' Information Disclosure Vulnerability (CVE-2020-27870)
1010678* - SolarWinds Network Performance Monitor 'VulnerabilitySettings' Directory Traversal Vulnerability (CVE-2020-27871)
1010677* - SolarWinds Network Performance Monitor 'WriteToFile' SQL Injection Vulnerability (CVE-2020-27869)
1010691* - SolarWinds Orion Remote Code Execution Vulnerability (CVE-2020-14005)
1010580* - Spring Security OAuth Open Redirect Vulnerability (CVE-2019-3778)
Web Server Oracle
1010739 - Oracle WebLogic Console JNDI Injection Vulnerability (CVE-2021-2109)
Web Server RealVNC
1010726* - LibVNCServer Denial Of Service Vulnerability (CVE-2020-25708)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
CA ARCserve D2D Administration Interface
1010699 - Arcserve D2D External Entity Injection Vulnerability (CVE-2020-27858)
DNS Server
1010633* - Identified DNS Trojan.Linux.Anchor.A Traffic
1010632* - Identified DNS Trojan.Win64.Anchor.A Traffic
Directory Server LDAP
1010301* - Samba LDAP Server Denial Of Service Vulnerability (CVE-2020-10704)
Suspicious Client Ransomware Activity
1010597* - Identified HTTP Cobalt Strike Malleable C&C Traffic Response (Office 365 Calendar Profile)
1010596* - Identified HTTP Cobalt Strike Malleable C&C Traffic Response (YouTube Profile)
1010617* - Identified TLS Cobalt Strike Beacon (Certificate)
Suspicious Server Ransomware Activity
1010638* - Identified FTP Backdoor.Win32.Qbot.JINX Runtime Detection
Trend Micro OfficeScan
1010708* - Trend Micro OfficeScan Multiple Information Disclosure Vulnerabilities (CVE-2020-28582 and CVE-2020-28583)
Web Application Common
1000552* - Generic Cross Site Scripting(XSS) Prevention
1010727 - Mongo-Express Remote Code Execution Vulnerability (CVE-2019-10758)
Web Application Tomcat
1010688* - Apache Tomcat Remote Code Execution Vulnerability (CVE-2017-12617)
Web Client Common
1009779* - Microsoft Windows Multiple Security Vulnerabilities (June-2019)
1010716 - XStream Library Insecure Deserialization Vulnerability (CVE-2020-26217)
Web Server Apache
1010400* - Apache Httpd Mod Rewrite Open Redirects Vulnerability (CVE-2019-10098)
1010670* - Apache Struts2 Remote Code Execution Vulnerability (CVE-2020-17530)
Web Server Common
1010734 - Identified BumbleBee Webshell Traffic Over HTTP
1010477* - Java Unserialize Remote Code Execution Vulnerability - 1
Web Server HTTPS
1010718 - Joomla CMS 'mod_random_image' Stored Cross-Site Scripting Vulnerability (CVE-2020-15696)
1009968* - Multiple HTTP/2 Server Denial Of Service Vulnerability (CVE-2019-9513)
1009998* - Multiple HTTP/2 Server Denial Of Service Vulnerability (CVE-2019-9511)
1009944* - Multiple HTTP/2 Server Denial Of Service Vulnerability (CVE-2019-9512)
1010712 - WordPress 'Contact Form 7' Plugin Arbitrary File Upload Vulnerability (CVE-2020-35489)
Web Server Miscellaneous
1010662* - Atlassian Jira Information Disclosure Vulnerability (CVE-2020-14181)
1010679 - SolarWinds Network Performance Monitor 'ExportToPDF' Information Disclosure Vulnerability (CVE-2020-27870)
1010678 - SolarWinds Network Performance Monitor 'VulnerabilitySettings' Directory Traversal Vulnerability (CVE-2020-27871)
1010677 - SolarWinds Network Performance Monitor 'WriteToFile' SQL Injection Vulnerability (CVE-2020-27869)
1010717* - SolarWinds Orion Platform Authentication Bypass Vulnerability (CVE-2020-10148)
Web Server Nagios
1010696* - Nagios XI SNMP Trap SQL Injection Vulnerability
Web Server RealVNC
1010726 - LibVNCServer Denial Of Service Vulnerability (CVE-2020-25708)
Web Server SharePoint
1010702* - Microsoft SharePoint Authenticated Remote Code Execution Vulnerability (CVE-2021-1707)
1010707* - Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2020-0971)
Webmin
1010704* - Webmin Arbitrary Remote Command Execution Vulnerability (CVE-2020-35606)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Directory Server LDAP
1010724 - Microsoft Windows Active Directory IntegratedDNS Remote Code Execution Vulnerability (CVE-2020-0718)
HP LoadRunner Agent Protocol
1010690* - HP LoadRunner 'launcher.dll' Stack Buffer Overflow Vulnerability (CVE-2015-2110)
IBM WebSphere Application Server
1010343* - IBM WebSphere UploadFileArgument Deserialization Vulnerability (CVE-2020-4448)
Microsoft Office
1010719 - Microsoft Excel Remote Code Execution Vulnerability (CVE-2021-1713)
1010720 - Microsoft Word Remote Code Execution Vulnerability (CVE-2021-1715)
Suspicious Client Ransomware Activity
1010714 - Identified HTTP Trojan-Downloader.Win32.Cometer.bfc C&C Traffic Request
Trend Micro OfficeScan
1010709 - Trend Micro Apex One Multiple Information Disclosure Vulnerabilities (CVE-2020-28573 and CVE-2020-28576)
1010708 - Trend Micro OfficeScan Multiple Information Disclosure Vulnerabilities (CVE-2020-28582 and CVE-2020-28583)
Web Application Common
1010661* - BlackCat CMS Cross-Site Request Forgery Bypass Vulnerability (CVE-2020-25453)
1010663* - Bludit CMS Brute Force Bypass Vulnerability (CVE-2019-17240)
1010668* - FUEL CMS Remote Code Execution Vulnerability (CVE-2018-16763)
1010654* - Opmantek Open-AuditIT Professional Cross Site Request Forgery Vulnerability (CVE-2018-8979)
Web Application PHP Based
1010705* - WordPress 'Canto' Plugin Multiple Server-Side Request Forgery Vulnerabilities
Web Client Common
1010711 - Google Chrome Buffer Overflow Vulnerability (CVE-2019-5782)
1010706 - Microsoft 3D Builder GLB File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability (ZDI-CAN-11486)
1010700 - Microsoft Windows Defender Remote Code Execution Vulnerability (CVE-2021-1647)
Web Server Common
1010692* - CentOS Web Panel Arbitrary File Write Remote Code Execution Vulnerability (CVE-2020-15623)
1010687* - Oracle ADF Faces Deserialization of Untrusted Data Vulnerability (CVE-2019-2904)
1010697* - Trend Micro InterScan Messaging Security Virtual Appliance Widget Information Disclosure Vulnerability (CVE-2020-27019)
Web Server HTTPS
1010723 - Identified Generic PHP Webshell Payload Over HTTP
Web Server Miscellaneous
1010717 - SolarWinds Orion Platform Authentication Bypass Vulnerability (CVE-2020-10148)
1010691* - SolarWinds Orion Remote Code Execution Vulnerability (CVE-2020-14005)
Web Server Nagios
1010598* - Nagios XI 'admin_views.inc.php' Arbitrary File Overwrite Vulnerability
1010696 - Nagios XI SNMP Trap SQL Injection Vulnerability
Web Server SharePoint
1010702 - Microsoft SharePoint Authenticated Remote Code Execution Vulnerability (CVE-2021-1707)
1010707 - Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2020-0971)
Webmin
1010704 - Webmin Arbitrary Remote Command Execution Vulnerability (CVE-2020-35606)
Windows SMB Client
1010701 - Microsoft Windows Defender Remote Code Execution Vulnerability Over SMB (CVE-2021-1647)
Zoho ManageEngine
1010698* - Zoho ManageEngine Applications Manager 'showMonitorGroupView' SQL Injection Vulnerability
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1001852* - Identified Attempt To Brute Force Windows Login Credentials (ATT&CK T1110)
DCERPC Services - Client
1010594* - Google Chrome FreeType Font File Buffer Overflow Vulnerability Over SMB (CVE-2020-15999)
Web Application Common
1010663 - Bludit CMS Brute Force Bypass Vulnerability (CVE-2019-17240)
1010668 - FUEL CMS Remote Code Execution Vulnerability (CVE-2018-16763)
Web Application PHP Based
1010705 - WordPress 'Canto' Plugin Multiple Server-Side Request Forgery Vulnerabilities
1010683 - WordPress 'Ultimate Member' Plugin Multiple Privilege Escalation Vulnerabilities
Web Client Common
1010584* - Google Chrome FreeType Font File Buffer Overflow Vulnerability Over HTTP (CVE-2020-15999)
1010710 - Microsoft Windows DirectWrite Information Disclosure Vulnerability (CVE-2019-1244)
1010703 - Microsoft Windows DirectWrite Information Disclosure Vulnerability (CVE-2019-1245)
Web Server Apache
1010670* - Apache Struts2 Remote Code Execution Vulnerability (CVE-2020-17530)
Web Server Common
1010173* - Cisco Data Center Network Manager REST API SQL Injection Vulnerability (CVE-2019-15984)
1010196* - Identified Suspicious .NET Serialized Object
1010687 - Oracle ADF Faces Deserialization of Untrusted Data Vulnerability (CVE-2019-2904)
1010697 - Trend Micro InterScan Messaging Security Virtual Appliance Widget Information Disclosure Vulnerability (CVE-2020-27019)
Web Server HTTPS
1010694* - Identified HTTP Backdoor.MSIL.Supernova.A Traffic Request
Zoho ManageEngine
1010698 - Zoho ManageEngine Applications Manager 'showMonitorGroupView' SQL Injection Vulnerability
Integrity Monitoring Rules:
1002776* - Microsoft Windows - Startup Programs Modified (ATT&CK T1112, T1060)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DNS Server
1010633* - Identified DNS Trojan.Linux.Anchor.A Traffic
1010613* - Identified DNS Trojan.Win32.Trickbot.Dns Traffic
1010632* - Identified DNS Trojan.Win64.Anchor.A Traffic
Directory Server LDAP
1010667* - Microsoft Windows Active Directory IntegratedDNS Remote Code Execution Vulnerability (CVE-2020-0761)
HP LoadRunner Agent Protocol
1010690 - HP LoadRunner 'launcher.dll' Stack Buffer Overflow Vulnerability (CVE-2015-2110)
SSL Client
1010410* - OpenSSL Large DH Parameter Denial Of Service Vulnerability (CVE-2018-0732)
Suspicious Client Ransomware Activity
1010675* - Identified HTTP Backdoor Win32.Beaconsolar.A Runtime Detection
1010597* - Identified HTTP Cobalt Strike Malleable C&C Traffic Response (Office 365 Calendar Profile)
1010596* - Identified HTTP Cobalt Strike Malleable C&C Traffic Response (YouTube Profile)
1010617* - Identified TLS Cobalt Strike Beacon (Certificate)
Suspicious Server Ransomware Activity
1010638* - Identified FTP Backdoor.Win32.Qbot.JINX Runtime Detection
1010616* - Identified HTTP Backdoor.Shell.Powertrick.A Runtime Detection
1010647* - Identified HTTP Backdoor.Win32.Cobalt.SMHP C&C Traffic Request
1010608* - Identified HTTP Cobalt Strike Malleable C&C Traffic Request (Amazon Profile)
1010637* - Identified HTTP Cobalt Strike Malleable C&C Traffic Request (Google Safe Browsing Profile)
1010609* - Identified HTTP Cobalt Strike Malleable C&C Traffic Request (Office 365 Calendar Profile)
1010636* - Identified HTTP Cobalt Strike Malleable C&C Traffic Request (Pandora GET Profile)
1010639* - Identified HTTP Cobalt Strike Malleable C&C Traffic Request (Pandora POST Profile)
1010462* - Identified HTTP Drovorub Command And Control Traffic
1010614* - Identified HTTP Trickbot Data Exfiltration (Card Payment)
1010615* - Identified HTTP Trickbot Data Exfiltration (Network Module)
1010634* - Identified HTTP Trickbot Data Exfiltration - (Application Credentials Grabber)
1010644* - Identified HTTP Trojan-Downloader.Shell.Lightbot.A C&C Traffic Request
1010610* - Identified HTTP Trojan.Win64.BazarTrickbot Traffic
1010611* - Identified HTTP TrojanDownloader.Win64.BazarLoader Traffic
1010607* - Identified TCP Meterpreter Payload
Trend Micro InterScan Web Security Virtual Appliance
1010665* - Trend Micro InterScan Web Security Virtual Appliance Multiple Security Vulnerabilities
Web Application Common
1010661 - BlackCat CMS Cross-Site Request Forgery Bypass Vulnerability (CVE-2020-25453)
1010654 - Opmantek Open-AuditIT Professional Cross Site Request Forgery Vulnerability (CVE-2018-8979)
1010660* - Zoho ManageEngine ServiceDesk Plus Arbitrary File Upload Vulnerability (CVE-2019-8394)
Web Application Tomcat
1010686 - Apache Tomcat HTTP PUT Windows Remote Code Execution Vulnerability (CVE-2017-12615)
1010688 - Apache Tomcat Remote Code Execution Vulnerability (CVE-2017-12617)
Web Client Common
1010583* - Google Chrome CSP Bypass Vulnerability (CVE-2020-6519)
Web Client HTTPS
1010676* - Identified HTTP Trojan.MSIL.Sunburst.A Traffic Request
1010693 - Identified HTTP Trojan.MSIL.Sunburst.A Traffic Request - 1
Web Server Apache
1010400* - Apache Httpd Mod Rewrite Open Redirects Vulnerability (CVE-2019-10098)
Web Server Common
1010692 - CentOS Web Panel Arbitrary File Write Remote Code Execution Vulnerability (CVE-2020-15623)
1010650* - SaltStack Salt 'rest_cherrypy' Command Injection Remote Code Execution Vulnerability (CVE-2020-16846)
Web Server HTTPS
1010694 - Identified HTTP Backdoor.MSIL.Supernova.A Traffic Request
1010479* - Identified HTTP Ngioweb Command And Control Traffic
1010649* - Microsoft Exchange Memory Corruption Vulnerability (CVE-2020-17144)
Web Server Miscellaneous
1010691 - SolarWinds Orion Remote Code Execution Vulnerability (CVE-2020-14005)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1010652* - Microsoft Windows SMB2 Server Information Disclosure Vulnerability (CVE-2020-17140)
1010653* - Microsoft Windows SMB2 Server Remote Code Execution Vulnerability (CVE-2020-17096)
DCERPC Services - Client
1003123* - Windows Common AVI Parsing Overflow
DNS Client
1010669 - Identified Malicious Domain - SolarWinds
DNS Server
1010633* - Identified DNS Trojan.Linux.Anchor.A Traffic
1010632* - Identified DNS Trojan.Win64.Anchor.A Traffic
Directory Server LDAP
1010667 - Microsoft Windows Active Directory IntegratedDNS Remote Code Execution Vulnerability (CVE-2020-0761)
Dynamics 365 Client Services
1010656* - Microsoft Dynamics 365 Commerce Remote Code Execution Vulnerabilities (CVE-2020-17152 and CVE-2020-17158)
FTP Server IIS
1004553* - Microsoft IIS FTPSVC Unspecified Remote Denial Of Service
HP Intelligent Management Center (IMC)
1009962* - HPE Intelligent Management Center 'IctTableExportToCSVBean' Expression Language Injection Vulnerability (CVE-2019-5370)
1008969* - HPE Intelligent Management Center Multiple Expression Language Injection Vulnerabilities
IBM WebSphere Application Server
1010343* - IBM WebSphere UploadFileArgument Deserialization Vulnerability (CVE-2020-4448)
Mail Server Over SSL/TLS
1009977* - Exim Mail Server Remote Code Execution Vulnerability (CVE-2019-15846)
Microsoft Office
1010673 - Microsoft Excel Remote Code Execution Vulnerability (CVE-2020-17125)
1010674 - Microsoft Excel Remote Code Execution Vulnerability (CVE-2020-17128)
1010672 - Microsoft PowerPoint Remote Code Execution Vulnerability (CVE-2020-17124)
NFS Server
1010605* - Microsoft Windows Network File System NLM RPC Message Information Disclosure Vulnerability (CVE-2020-17056)
Port Mapper RPC
1010606* - Identified Out-Of-Sync RPCSEC_GSS_CONTINUE_INIT RPC Message
Remote Desktop Protocol Server
1009958* - Microsoft Windows RDP Remote Code Execution Vulnerability (CVE-2019-1181)
1009961* - Microsoft Windows RDP Remote Code Execution Vulnerability (CVE-2019-1182)
Suspicious Client Application Activity
1010675 - Identified HTTP Backdoor Win32.Beaconsolar.A Runtime Detection
1010676 - Identified HTTP Trojan.MSIL.Sunburst.A Traffic Request
Suspicious Server Application Activity
1010462* - Identified HTTP Drovorub Command And Control Traffic
Trend Micro InterScan Web Security Virtual Appliance
1010665 - Trend Micro InterScan Web Security Virtual Appliance Multiple Security Vulnerabilities
Web Application Common
1009966* - ImageMagick Out-Of-Bounds Access Vulnerability (CVE-2019-10714) - 1
1009496* - Microsoft Exchange Server Multiple Elevation Of Privilege Vulnerabilities
1010648* - Wordpress Woody Ad Snippets Plugin Remote Code Execution Vulnerability (CVE-2019-15858)
1009979* - XStream Library ReflectionConverter Insecure Deserialization Remote Command Execution Vulnerability (CVE-2019-10173) - Server
1010660 - Zoho ManageEngine ServiceDesk Plus Arbitrary File Upload Vulnerability (CVE-2019-8394)
Web Application PHP Based
1009545* - PHP 'phar_tar_writeheaders()' Function Stack Buffer Overflow Vulnerability (CVE-2016-2554)
1009776* - WordPress Comment Field Remote Code Execution Vulnerability (CVE-2019-9787)
1009544* - WordPress Image Remote Code Execution Vulnerability (CVE-2019-8942)
Web Application Tomcat
1009697* - Apache Tomcat Remote Code Execution Vulnerability (CVE-2019-0232)
Web Client Common
1010659 - Adobe Acrobat and Acrobat Reader Information Disclosure Vulnerability (CVE-2020-29075)
1009483* - Linux APT Remote Code Execution Vulnerability (CVE-2019-3462)
1002377* - Microsoft Windows GDI Multiply By Zero Code Execution
1010651 - Microsoft Windows WebM Video Parsing Uninitialized Pointer Remote Code Execution Vulnerability (CVE-2020-1319)
1010586 - SAP 3D Visual Enterprise Viewer SVG File XML External Entity Processing Information Disclosure Vulnerability (CVE-2020-6315)
1004956* - VideoLAN VLC Media Player MMS Plugin Stack Buffer Overflow Vulnerability
Web Client Internet Explorer/Edge
1010671 - Microsoft Edge Chakra LinearScan Memory Corruption Remote Code Execution Vulnerability (CVE-2020-17131)
1010602* - Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2020-17053)
Web Server Apache
1010461* - Apache Struts2 Remote Code Execution Vulnerability (CVE-2019-0230)
1010670 - Apache Struts2 Remote Code Execution Vulnerability (CVE-2020-17530)
Web Server Common
1010650 - SaltStack Salt 'rest_cherrypy' Command Injection Remote Code Execution Vulnerability (CVE-2020-16846)
Web Server HTTPS
1010479* - Identified HTTP Ngioweb Command And Control Traffic
Web Server Miscellaneous
1010662 - Atlassian Jira Information Disclosure Vulnerability (CVE-2020-14181)
1010649* - Microsoft Windows Exchange Memory Corruption Vulnerability (CVE-2020-17144)
Web Server Oracle
1010587* - Oracle WebLogic Server IIOP Protocol Remote Code Execution Vulnerability (CVE-2020-14841)
Web Server SharePoint
1009971* - Microsoft SharePoint Multiple Remote Code Execution Vulnerabilities (Sep-2019)
1009974* - Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2019-1295)
1010655* - Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2020-17121)
Zoho ManageEngine
1009957* - Zoho ManageEngine Application Manager Remote Command Execution Vulnerability (CVE-2019-15105)
1009960* - Zoho ManageEngine OpManager Remote Command Execution Vulnerability (CVE-2019-15104)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.