All Vulnerabilities

  • 23-039 (September 12, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    IPSec-IKE
    1011801* - Microsoft Windows Internet Key Exchange (IKE) Protocol Extensions Denial Of Service Vulnerability (CVE-2023-21758)


    SNMP Server
    1011647* - Net-SNMP NULL Pointer Dereference Vulnerability (CVE-2022-44792)


    SolarWinds Orion Platform
    1011851 - SolarWinds Orion Platform Incorrect Comparison Vulnerability (CVE-2023-23843)


    Web Application PHP Based
    1011845 - GLPI SQL Injection Vulnerability (CVE-2023-36808)
    1011826* - Roundcube Webmail Command Injection Vulnerability (CVE-2020-12641)


    Web Client Common
    1011852 - Foxit PDF Reader and Editor Out-Of-Bounds Read Remote Code Execution Vulnerability (CVE-2023-38119)


    Web Server Common
    1011791* - JetBrains TeamCity Cross-Site Scripting Vulnerability (CVE-2022-48343)


    Web Server HTTPS
    1011794* - Contec CONPROSYS HMI System SQL Injection Vulnerability (CVE-2023-29154)


    Web Server Miscellaneous
    1011759* - Ivanti Avalanche Arbitrary File Upload Vulnerability (CVE-2023-28128)


    Zoho ManageEngine ADSelfService Plus
    1011793* - Zoho ManageEngine ADSelfService Plus Denial Of Service Vulnerability (CVE-2023-28342)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    1004488* - Database Server - Microsoft SQL
  • 23-040 (September 19, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    Advanced Message Queuing Protocol (AMQP)
    1011834* - SolarWinds Network Performance Monitor Insecure Deserialization Vulnerability (CVE-2022-38111)


    Apache RocketMQ
    1011831* - Apache RocketMQ Command Injection Vulnerability (CVE-2023-33246)


    Web Application Common
    1011836* - Progress MOVEit Transfer SQL Injection Vulnerability (CVE-2023-36932) - 1


    Web Application PHP Based
    1011862 - WordPress 'Ultimate Member' Plugin Privilege Escalation Vulnerability (CVE-2023-3460)


    Web Server HTTPS
    1011823* - Contec CONPROSYS HMI System Cross-Site Scripting Vulnerability (CVE-2023-28651)


    Web Server Miscellaneous
    1011863 - Ivanti Avalanche Authentication Bypass Vulnerability (CVE-2023-32566)
    1011825* - Jenkins 'File Parameter' Plugin Arbitrary File Write Vulnerability (CVE-2023-32986)
    1011835* - XWiki Code Injection Vulnerability (CVE-2023-29524)
    1011838* - XWiki Code Injection Vulnerability (CVE-2023-35150)
    1011833* - XWiki Code Injection Vulnerability (CVE-2023-36469)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-041 (September 26, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    Django Server
    1011843* - Django Denial of Service Vulnerability (CVE-2023-23969)


    Eclipse Jetty
    1011378* - Eclipse Jetty Unauthenticated Information Disclosure Vulnerability (CVE-2021-28169)


    MinIO Server
    1011830* - MinIO Information Disclosure Vulnerability (CVE-2023-28432)


    PaperCut
    1011731* - PaperCut NG And MF Authentication Bypass Vulnerability (CVE-2023-27350)


    SolarWinds Orion Platform
    1011854 - SolarWinds Orion Platform Deserialization of Untrusted Data Vulnerability (CVE-2023-33225)
    1011856 - SolarWinds Orion Platform Incomplete List of Disallowed Inputs Vulnerability (CVE-2023-23844)


    Splunk Enterprise
    1011817* - Splunk 'Lookup File Editing' App Directory Traversal Vulnerability (CVE-2023-32714)


    Web Application Common
    1011839* - Progress MOVEit Transfer SQL Injection Vulnerability (CVE-2023-36932) - 2


    Web Application PHP Based
    1011870 - WordPress 'Media Library Assistant' Plugin Remote Code Execution Vulnerability (CVE-2023-4634)


    Web Server Adobe ColdFusion
    1011857 - Adobe ColdFusion Directory Traversal Vulnerability (CVE-2023-26361)
    1011846* - Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2023-38204)


    Web Server Miscellaneous
    1011869 - Citrix ShareFile Storage Zones Controller Directory Traversal Vulnerability (CVE-2023-24489)
    1011858 - XWiki Code Injection Vulnerability (CVE-2023-35166)
    1011860 - XWiki Code Injection Vulnerability (CVE-2023-37462)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-045 (October 17, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    Web Server HTTPS
    1011878 - Cacti SQL Injection Vulnerability (CVE-2023-39361)


    Web Server Miscellaneous
    1011882 - Atlassian Confluence Data Center and Server Privilege Escalation Vulnerability (CVE-2023-22515)


    Web Server SharePoint BDC
    1011814* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2023-24955)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-046 (October 24, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    Ivanti Avalanche
    1011871 - Ivanti Avalanche XML External Entity Processing Vulnerability (CVE-2023-32567)


    Port Mapper Windows
    1001033* - Windows Port Mapper Decoder


    Unix Samba
    1011796* - Linux Kernel KSMBD Denial of Service Vulnerability (CVE-2023-32247)


    Web Server HTTPS
    1011876 - Progress WS_FTP Server Insecure Deserialization Vulnerability (CVE-2023-40044)


    Windows Services RPC Server DCERPC
    1010539* - Identified NTLM Brute Force Attempt (ZeroLogon) (CVE-2020-1472)
    1010519* - Netlogon Elevation Of Privilege Vulnerability (Zerologon) (CVE-2020-1472)


    Zoho ManageEngine AssetExplorer_SupportCenter Plus_ADManager Plus
    1011879 - Zoho ManageEngine ADManager Plus Directory Traversal Vulnerability (CVE-2023-39912)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-047 (October 31, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    IPSec-IKE
    1011669* - Microsoft Windows Internet Key Exchange (IKE) Protocol Extensions Denial Of Service Vulnerability (CVE-2023-21547)


    JetBrains TeamCity
    1011873* - JetBrains TeamCity Authentication Bypass Vulnerability (CVE-2023-42793)


    SolarWinds Orion Platform
    1011854* - SolarWinds Orion Platform Deserialization of Untrusted Data Vulnerability (CVE-2023-33225)
    1011856* - SolarWinds Orion Platform Incomplete List of Disallowed Inputs Vulnerability (CVE-2023-23844)


    Web Client Common
    1011822 - Adobe Acrobat And Reader Remote Code Execution Vulnerability (CVE-2023-26408)


    Web Server Adobe ColdFusion
    1011857* - Adobe ColdFusion Directory Traversal Vulnerability (CVE-2023-26361)
    1011885 - Adobe ColdFusion Improper Access Control Vulnerability (CVE-2023-38205)


    Web Server HTTPS
    1011884 - Qlik Sense Enterprise Directory Traversal Vulnerability (CVE-2023-41266)


    Web Server Miscellaneous
    1011869* - Citrix ShareFile Storage Zones Controller Directory Traversal Vulnerability (CVE-2023-24489)
    1011860* - XWiki Code Injection Vulnerability (CVE-2023-37462)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-048 (November 3, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    Web Server HTTPS
    1011893 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22090)
    1011895 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22090) - 1
    1011894 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22100)
    1011896 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22100) - 1
    1011892 - Microsoft Exchange Server-Side Request Forgery Vulnerability (ZDI-CAN-22101)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-049 (November 7, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    Ivanti Avalanche Remote Control Server
    1011864* - Ivanti Avalanche Directory Traversal Vulnerability (CVE-2023-32563)


    Mail Server Exim
    1011874* - Exim Remote Code Execution Vulnerability (CVE-2023-42117)


    Parse Server
    1011868* - Parse Server Remote Code Execution Vulnerability (CVE-2023-36475)


    SolarWinds Access Rights Manager
    1011890 - SolarWinds Access Rights Manager Directory Traversal Vulnerability (CVE-2023-35185)
    1011891 - SolarWinds Access Rights Manager Directory Traversal Vulnerability (CVE-2023-35187)


    Web Server Common
    1011887 - Control Web Panel Command Injection Remote Code Execution Vulnerability (CVE-2023-42123)


    Web Server HTTPS
    1011888 - Cacti SQL Injection Vulnerability (CVE-2023-39365)
    1011889 - SolarWinds Access Rights Manager Insecure Deserialization Vulnerability (CVE-2023-35186)


    Web Server Miscellaneous
    1011858* - XWiki Code Injection Vulnerability (CVE-2023-35166)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-050 (November 8, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    Web Server Miscellaneous
    1011899 - Atlassian Confluence Data Center and Server Improper Authorization Vulnerability (CVE-2023-22518)


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • 23-051 (November 14, 2023)
     Publish Date:  24 gennaio 2024
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    ActiveMQ OpenWire
    1011897 - Apache ActiveMQ Deserialization of Untrusted Data Vulnerability (CVE-2023-46604)


    CentOS Web Panel
    1011900 - Control Web Panel Command Injection Remote Code Execution Vulnerability (CVE-2023-42120)
    1011887* - Control Web Panel Command Injection Remote Code Execution Vulnerability (CVE-2023-42123)


    JetBrains TeamCity
    1011877* - JetBrains TeamCity Cross-Site Scripting Vulnerability (CVE-2023-41249)


    SolarWinds Information Service
    1011872* - SolarWinds Orion Platform Incorrect Comparison Vulnerability (CVE-2023-23840)


    Web Application PHP Based
    1011866 - LibreNMS Cross-Site Scripting Vulnerability (CVE-2023-4347)


    Web Server HTTPS
    1011881 - GitLab Stored Cross-Site Scripting Vulnerability (CVE-2023-2164)
    1011886 - Qlik Sense Enterprise HTTP Request Smuggling Vulnerability (CVE-2023-41265)


    Web Server Miscellaneous
    1011759* - Ivanti Avalanche Multiple Arbitrary File Upload Vulnerabilities


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.