Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:59657
This rule looks for traffic that exploits the vulnerability outlined in CVE-2018-10935.
1:59609
Exponent CMS eaasController is vulnerable to a SQL injection attack. When contacting the eaasController API, an attacker could provide a base64 encoded malicious payload in the "apikey" HTTP parameter.
1:47103
This event is generated when an attacker attempts to exploit a type confusion vulnerability in Microsoft Edge, or CVE-2018-8298. Impact: Attempted User Privilege Gain Details: Ease of Attack:
1:46791
Rule checks for attempts to exploit a command injection vulnerability present in the Ruby NET::FTP library.
1:29966
Buffer overflow in the ubnt-streamer RTSP service on the Ubiquiti UBNT AirCam with airVision firmware before 1.1.6 allows remote attackers to execute arbitrary code via a long rtsp: URI in a DESCRIBE request.
1:63728
This rule alerts on network communications from the Earthworm network proxy tool. This rule may alert on any of the subcommands involved in the client-server handshake of custom TCP protocol used by Earthworm, including the establishment of a reverse socks5 tunnel from the server to the client.