Talos Rules 2021-11-10
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-ie and server-webapp rule sets to provide coverage for emerging threats from these technologies.

Change logs

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091800.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
 * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)

Modified Rules:


 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (snort3-server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (snort3-server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (snort3-server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (snort3-server-webapp.rules)
 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (snort3-server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (snort3-server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (snort3-server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (snort3-server-webapp.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (snort3-server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (snort3-server-webapp.rules)

Modified Rules:


 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (snort3-server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (snort3-server-webapp.rules)
 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (snort3-server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules)

2021-11-10 21:30:51 UTC

Snort Subscriber Rules Update

Date: 2021-11-10

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules)
 * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules)
 * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules)
 * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
 * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules)
 * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
 * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
 * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)

2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:09 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt


2021-11-10 21:39:10 UTC

Snort Subscriber Rules Update

Date: 2021-11-10-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt
* 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt
* 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt
* 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt
* 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt
* 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt
* 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability

Modified Rules:

* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt
* 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
* 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt