Deep Security Center
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
JetBrains TeamCity
1012035* - JetBrains TeamCity Authentication Bypass Vulnerability (CVE-2024-23917)
Progress Telerik Reporting
1012072* - Progress Telerik Report Server Authentication Bypass Vulnerability (CVE-2024-4358)
1012039* - Progress Telerik Reporting Insecure Deserialization Vulnerability (CVE-2024-1856 and CVE-2024-1801)
Ray Framework
1012150 - Ray Command Injection Vulnerability (CVE-2023-6019)
Unix CUPS Client
1012160* - CUPS Command Injection Vulnerability (CVE-2024-47176)
Web Application Common
1011998* - Kafka UI Remote Code Execution Vulnerability (CVE-2023-52251)
Web Application PHP Based
1012159 - WordPress 'Business Directory' Plugin SQL Injection Vulnerability (CVE-2024-4443)
1012161 - WordPress 'Country State City Dropdown CF7' Plugin SQL Injection Vulnerability (CVE-2024-3495)
1012158 - WordPress 'Email Subscribers' Plugin SQL Injection Vulnerability (CVE-2024-2876)
1012162 - WordPress 'Formidable Forms' Plugin Remote Code Execution Vulnerability (CVE-2023-2877)
Web Server Apache
1012168 - Apache Httpd Server-Side Request Forgery Vulnerability (CVE-2024-38472)
Web Server HTTPS
1012170 - Centreon SQL Injection Vulnerability (CVE-2024-39842 and CVE-2024-39843)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
JetBrains TeamCity
1012035* - JetBrains TeamCity Authentication Bypass Vulnerability (CVE-2024-23917)
Progress Telerik Reporting
1012072* - Progress Telerik Report Server Authentication Bypass Vulnerability (CVE-2024-4358)
1012039* - Progress Telerik Reporting Insecure Deserialization Vulnerability (CVE-2024-1856 and CVE-2024-1801)
Ray Framework
1012150 - Ray Command Injection Vulnerability (CVE-2023-6019)
Unix CUPS Client
1012160* - CUPS Command Injection Vulnerability (CVE-2024-47176)
Web Application Common
1011998* - Kafka UI Remote Code Execution Vulnerability (CVE-2023-52251)
Web Application PHP Based
1012159 - WordPress 'Business Directory' Plugin SQL Injection Vulnerability (CVE-2024-4443)
1012161 - WordPress 'Country State City Dropdown CF7' Plugin SQL Injection Vulnerability (CVE-2024-3495)
1012158 - WordPress 'Email Subscribers' Plugin SQL Injection Vulnerability (CVE-2024-2876)
1012162 - WordPress 'Formidable Forms' Plugin Remote Code Execution Vulnerability (CVE-2023-2877)
Web Server Apache
1012168 - Apache Httpd Server-Side Request Forgery Vulnerability (CVE-2024-38472)
Web Server HTTPS
1012170 - Centreon SQL Injection Vulnerability (CVE-2024-39842 and CVE-2024-39843)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Advanced Message Queuing Protocol (AMQP)
1012050* - SolarWinds Access Rights Manager Remote Code Execution Vulnerability (CVE-2024-28075)
Ivanti Endpoint Manager
1012156* - Ivanti Endpoint Manager XML External Entity Information Disclosure Vulnerability (CVE-2024-37397)
Progress WhatsUp Gold WCF service
1012129* - Progress WhatsUp Gold Directory Traversal Vulnerability (CVE-2024-4885)
Web Server Apache
1012166 - Apache Httpd 'mod_cgi Handler' Improper Input Validation Vulnerability (CVE-2024-38476)
Web Server HTTPS
1012065* - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-29827)
Windows Server DCERPC
1012163 - Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability (CVE-2024-38077)
Zabbix Server
1012090* - Zabbix SQL Injection Vulnerability (CVE-2024-22120)
Zoho ManageEngine ADAuditPlus
1012164 - Zoho ManageEngine ADAudit Plus SQL Injection Vulnerability (CVE-2024-5467)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
Advanced Message Queuing Protocol (AMQP)
1012050* - SolarWinds Access Rights Manager Remote Code Execution Vulnerability (CVE-2024-28075)
Ivanti Endpoint Manager
1012156* - Ivanti Endpoint Manager XML External Entity Information Disclosure Vulnerability (CVE-2024-37397)
Progress WhatsUp Gold WCF service
1012129* - Progress WhatsUp Gold Directory Traversal Vulnerability (CVE-2024-4885)
Web Server Apache
1012166 - Apache Httpd 'mod_cgi Handler' Improper Input Validation Vulnerability (CVE-2024-38476)
Web Server HTTPS
1012065* - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-29827)
Windows Server DCERPC
1012163 - Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability (CVE-2024-38077)
Zabbix Server
1012090* - Zabbix SQL Injection Vulnerability (CVE-2024-22120)
Zoho ManageEngine ADAuditPlus
1012164 - Zoho ManageEngine ADAudit Plus SQL Injection Vulnerability (CVE-2024-5467)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services - Client
1012075* - Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability Over SMB (CVE-2024-38112)
Ivanti Avalanche
1012053* - Ivanti Avalanche Directory Traversal Vulnerability (CVE-2024-24994)
Ivanti Endpoint Manager
1012149 - Ivanti Endpoint Manager Multiple SQL Injection Vulnerabilities - 1
Kubernetes API Server
1012151 - Kubernetes Ingress-Nginx Command Injection Vulnerability (CVE-2024-7646)
PaperCut
1012041* - PaperCut NG And MF Reflected Cross-Site Scripting Vulnerability (CVE-2024-1883)
SAP NetWeaver Java Application Server
1012085* - SAP NetWeaver AS JAVA SQL Injection Vulnerability (CVE-2016-2386)
SolarWinds Dameware Web Help Desk
1012127* - SolarWinds Dameware Web Help Desk Deserialization Remote Code Execution Vulnerability (CVE-2024-28986)
Web Server HTTPS
1011980* - Centreon SQL Injection Vulnerability (CVE-2024-23119)
1012081* - Centreon SQL Injection Vulnerability (CVE-2024-32501 and CVE-2024-5723)
1012092* - Progress WhatsUp Gold Path Traversal Vulnerability (CVE-2024-5018)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
DCERPC Services - Client
1012075* - Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability Over SMB (CVE-2024-38112)
Ivanti Avalanche
1012053* - Ivanti Avalanche Directory Traversal Vulnerability (CVE-2024-24994)
Ivanti Endpoint Manager
1012149 - Ivanti Endpoint Manager Multiple SQL Injection Vulnerabilities - 1
Kubernetes API Server
1012151 - Kubernetes Ingress-Nginx Command Injection Vulnerability (CVE-2024-7646)
PaperCut
1012041* - PaperCut NG And MF Reflected Cross-Site Scripting Vulnerability (CVE-2024-1883)
SAP NetWeaver Java Application Server
1012085* - SAP NetWeaver AS JAVA SQL Injection Vulnerability (CVE-2016-2386)
SolarWinds Dameware Web Help Desk
1012127* - SolarWinds Dameware Web Help Desk Deserialization Remote Code Execution Vulnerability (CVE-2024-28986)
Web Server HTTPS
1011980* - Centreon SQL Injection Vulnerability (CVE-2024-23119)
1012081* - Centreon SQL Injection Vulnerability (CVE-2024-32501 and CVE-2024-5723)
1012092* - Progress WhatsUp Gold Path Traversal Vulnerability (CVE-2024-5018)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Arcserve Unified Data Protection
1012077* - Arcserve Unified Data Protection Remote Code Execution Vulnerability (CVE-2023-26258)
Ivanti Endpoint Manager
1012154 - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-32842)
1012155 - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-32845)
1012156 - Ivanti Endpoint Manager XML External Entity Information Disclosure Vulnerability (CVE-2024-37397)
SolarWinds Access Rights Manager
1012124 - SolarWinds Access Rights Manager Directory Traversal Vulnerability (CVE-2024-28992)
Web Application PHP Based
1012125* - OpenCart Directory Traversal Vulnerability (CVE-2024-21518)
Web Server HTTPS
1012068* - Ivanti Endpoint Manager Multiple SQL Injection Vulnerabilities (CVE-2024-29828 & CVE-2024-29829)
1012049* - SolarWinds Access Rights Manager Insecure Deserialization Vulnerability (CVE-2024-23478)
Web Server Oracle
1012098* - Oracle WebLogic Server Information Disclosure Vulnerability (CVE-2024-21006)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
Arcserve Unified Data Protection
1012077* - Arcserve Unified Data Protection Remote Code Execution Vulnerability (CVE-2023-26258)
Ivanti Endpoint Manager
1012154 - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-32842)
1012155 - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-32845)
1012156 - Ivanti Endpoint Manager XML External Entity Information Disclosure Vulnerability (CVE-2024-37397)
SolarWinds Access Rights Manager
1012124 - SolarWinds Access Rights Manager Directory Traversal Vulnerability (CVE-2024-28992)
Web Application PHP Based
1012125* - OpenCart Directory Traversal Vulnerability (CVE-2024-21518)
Web Server HTTPS
1012068* - Ivanti Endpoint Manager Multiple SQL Injection Vulnerabilities (CVE-2024-29828 & CVE-2024-29829)
1012049* - SolarWinds Access Rights Manager Insecure Deserialization Vulnerability (CVE-2024-23478)
Web Server Oracle
1012098* - Oracle WebLogic Server Information Disclosure Vulnerability (CVE-2024-21006)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Unix CUPS Client
1012160 - CUPS Remote Code Execution Vulnerability (CVE-2024-47076)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
Unix CUPS Client
1012160 - CUPS Remote Code Execution Vulnerability (CVE-2024-47076)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Apache Nifi
1012122* - Apache NiFi Stored Cross-Site Scripting Vulnerability (CVE-2024-37389)
Progress WhatsUp Gold WCF service
1012129 - Progress WhatsUp Gold Directory Traversal Vulnerability (CVE-2024-4885)
Web Application PHP Based
1012148 - SPIP Remote Code Execution Vulnerability (CVE-2024-7954)
1012126* - WordPress 'SEO' Plugin SQL Injection Vulnerability (CVE-2024-6497)
1012104* - phpMyAdmin SQL Injection Vulnerability (CVE-2019-11768)
Web Server HTTPS
1012130 - Cacti Stored Cross-Site Scripting Vulnerability (CVE-2024-31444)
1012116* - Progress WhatsUp Gold Remote Code Execution Vulnerability (CVE-2024-5008)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
Apache Nifi
1012122* - Apache NiFi Stored Cross-Site Scripting Vulnerability (CVE-2024-37389)
Progress WhatsUp Gold WCF service
1012129 - Progress WhatsUp Gold Directory Traversal Vulnerability (CVE-2024-4885)
Web Application PHP Based
1012148 - SPIP Remote Code Execution Vulnerability (CVE-2024-7954)
1012126* - WordPress 'SEO' Plugin SQL Injection Vulnerability (CVE-2024-6497)
1012104* - phpMyAdmin SQL Injection Vulnerability (CVE-2019-11768)
Web Server HTTPS
1012130 - Cacti Stored Cross-Site Scripting Vulnerability (CVE-2024-31444)
1012116* - Progress WhatsUp Gold Remote Code Execution Vulnerability (CVE-2024-5008)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
SolarWinds Dameware Web Help Desk
1012127* - SolarWinds Dameware Web Help Desk Deserialization Remote Code Execution Vulnerability (CVE-2024-28986)
Web Application PHP Based
1012121* - LibreNMS SQL Injection Vulnerability (CVE-2024-32480)
1012106 - WordPress 'Hash Form' Plugin Arbitrary File Upload Vulnerability (CVE-2024-5084)
1012146 - WordPress 'Porto' Theme Local File Inclusion Vulnerability (CVE-2024-3806 and CVE-2024-3807)
Web Server HTTPS
1012131 - Dolibarr ERP And CRM Reflected Cross-Site Scripting Vulnerability (CVE-2024-34051)
1012139 - Progress WhatsUp Gold SQL Injection Vulnerability (CVE-2024-6672)
Web Server Miscellaneous
1012132* - XWiki Cross-Site Scripting Vulnerability (CVE-2024-37900)
1012138 - XWiki Server-Side Template Injection Vulnerability (CVE-2024-37901)
Web Server SharePoint BDC
1012113* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2024-38023)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
SolarWinds Dameware Web Help Desk
1012127* - SolarWinds Dameware Web Help Desk Deserialization Remote Code Execution Vulnerability (CVE-2024-28986)
Web Application PHP Based
1012121* - LibreNMS SQL Injection Vulnerability (CVE-2024-32480)
1012106 - WordPress 'Hash Form' Plugin Arbitrary File Upload Vulnerability (CVE-2024-5084)
1012146 - WordPress 'Porto' Theme Local File Inclusion Vulnerability (CVE-2024-3806 and CVE-2024-3807)
Web Server HTTPS
1012131 - Dolibarr ERP And CRM Reflected Cross-Site Scripting Vulnerability (CVE-2024-34051)
1012139 - Progress WhatsUp Gold SQL Injection Vulnerability (CVE-2024-6672)
Web Server Miscellaneous
1012132* - XWiki Cross-Site Scripting Vulnerability (CVE-2024-37900)
1012138 - XWiki Server-Side Template Injection Vulnerability (CVE-2024-37901)
Web Server SharePoint BDC
1012113* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2024-38023)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Web Client Common
1012141 - Microsoft Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461)
1012142 - Microsoft Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461) - 1
Web Server Adobe ColdFusion
1012140 - Adobe ColdFusion Deserialization Of Untrusted Data Vulnerability (CVE-2024-41874)
Web Server HTTPS
1012093* - Cacti SQL Injection Vulnerability (CVE-2024-31445)
1012107* - Cacti SQL Injection Vulnerability (CVE-2024-31458)
1012099* - Progress WhatsUp Gold Directory Traversal Vulnerability (CVE-2024-5019)
1012079* - SolarWinds Serv-U Directory Traversal Vulnerability (CVE-2024-28995)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
Web Client Common
1012141 - Microsoft Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461)
1012142 - Microsoft Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461) - 1
Web Server Adobe ColdFusion
1012140 - Adobe ColdFusion Deserialization Of Untrusted Data Vulnerability (CVE-2024-41874)
Web Server HTTPS
1012093* - Cacti SQL Injection Vulnerability (CVE-2024-31445)
1012107* - Cacti SQL Injection Vulnerability (CVE-2024-31458)
1012099* - Progress WhatsUp Gold Directory Traversal Vulnerability (CVE-2024-5019)
1012079* - SolarWinds Serv-U Directory Traversal Vulnerability (CVE-2024-28995)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Apache Nifi
1012122 - Apache NiFi Stored Cross-Site Scripting Vulnerability (CVE-2024-37389)
DHCP Failover Protocol Server
1012136 - Microsoft Windows DHCP Server Denial of Service Vulnerability (CVE-2024-30070)
Openfire Jabber Server
1011841* - Openfire Authentication Bypass Vulnerability (CVE-2023-32315)
Progress Telerik Reporting
1012042* - Progress Telerik Report Server Insecure Deserialization Vulnerability (CVE-2024-1800)
Web Application PHP Based
1012104 - phpMyAdmin SQL Injection Vulnerability (CVE-2019-11768)
Web Client Common
1012109* - Microsoft Windows LNK NTLM Spoofing Vulnerability Over HTTP (CVE-2024-30081)
Web Server HTTPS
1012128 - GitLab Denial of Service Vulnerability (CVE-2024-2874)
1012119 - Progress WhatsUp Gold Denial Of Service Vulnerability (CVE-2024-5011)
Web Server Miscellaneous
1012055* - Atlassian Confluence Data Center and Server Remote Code Execution Vulnerability (CVE-2024-21683)
1012033* - XWiki Code Injection Vulnerability (CVE-2024-31465)
Web Server Oracle
1010171* - Oracle Weblogic Server Insecure Deserialization Vulnerability (CVE-2020-2551)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
Apache Nifi
1012122 - Apache NiFi Stored Cross-Site Scripting Vulnerability (CVE-2024-37389)
DHCP Failover Protocol Server
1012136 - Microsoft Windows DHCP Server Denial of Service Vulnerability (CVE-2024-30070)
Openfire Jabber Server
1011841* - Openfire Authentication Bypass Vulnerability (CVE-2023-32315)
Progress Telerik Reporting
1012042* - Progress Telerik Report Server Insecure Deserialization Vulnerability (CVE-2024-1800)
Web Application PHP Based
1012104 - phpMyAdmin SQL Injection Vulnerability (CVE-2019-11768)
Web Client Common
1012109* - Microsoft Windows LNK NTLM Spoofing Vulnerability Over HTTP (CVE-2024-30081)
Web Server HTTPS
1012128 - GitLab Denial of Service Vulnerability (CVE-2024-2874)
1012119 - Progress WhatsUp Gold Denial Of Service Vulnerability (CVE-2024-5011)
Web Server Miscellaneous
1012055* - Atlassian Confluence Data Center and Server Remote Code Execution Vulnerability (CVE-2024-21683)
1012033* - XWiki Code Injection Vulnerability (CVE-2024-31465)
Web Server Oracle
1010171* - Oracle Weblogic Server Insecure Deserialization Vulnerability (CVE-2020-2551)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
MLflow
1012096 - MLflow Path Traversal Vulnerability (CVE-2023-6909)
Progress WhatsUp Gold WCF service
1012123 - Progress WhatsUp Gold Information Disclosure Vulnerability (CVE-2024-5015)
Web Client Common
1012114 - Microsoft Windows Themes Spoofing Vulnerability (CVE-2024-38030)
Web Server HTTPS
1012083* - GitLab Stored Cross-Site Scripting Vulnerability (CVE-2023-6371)
1012100* - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-29823)
1012116 - Progress WhatsUp Gold Remote Code Execution Vulnerability (CVE-2024-5008)
1012118 - Progress WhatsUp Gold Unrestricted File Upload Vulnerability (CVE-2024-4884)
Web Server Miscellaneous
1012047* - XWiki Code Injection Vulnerability (CVE-2024-31997)
1012132 - XWiki Cross-Site Scripting Vulnerability (CVE-2024-37900)
Web Server SharePoint BDC
1012135 - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2024-38024)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
MLflow
1012096 - MLflow Path Traversal Vulnerability (CVE-2023-6909)
Progress WhatsUp Gold WCF service
1012123 - Progress WhatsUp Gold Information Disclosure Vulnerability (CVE-2024-5015)
Web Client Common
1012114 - Microsoft Windows Themes Spoofing Vulnerability (CVE-2024-38030)
Web Server HTTPS
1012083* - GitLab Stored Cross-Site Scripting Vulnerability (CVE-2023-6371)
1012100* - Ivanti Endpoint Manager SQL Injection Vulnerability (CVE-2024-29823)
1012116 - Progress WhatsUp Gold Remote Code Execution Vulnerability (CVE-2024-5008)
1012118 - Progress WhatsUp Gold Unrestricted File Upload Vulnerability (CVE-2024-4884)
Web Server Miscellaneous
1012047* - XWiki Code Injection Vulnerability (CVE-2024-31997)
1012132 - XWiki Cross-Site Scripting Vulnerability (CVE-2024-37900)
Web Server SharePoint BDC
1012135 - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2024-38024)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more