Talos has added and modified multiple rules in the app-detect, blacklist, browser-plugins, file-flash, file-other, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2962.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules) * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules) * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
* 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules) * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules) * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules) * 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules) * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2975.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules) * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules) * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
* 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules) * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules) * 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules) * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules) * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2976.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules) * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules) * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
* 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules) * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules) * 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules) * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules) * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2980.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules) * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules) * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules) * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules) * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules) * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules) * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules) * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules) * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules) * 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules) * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules) * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules) * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
* 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules) * 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules) * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules) * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules) * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)