Talos has added and modified multiple rules in the browser-ie and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091800.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 3:58553 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules) * 3:58554 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt (file-pdf.rules)
* 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (snort3-server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (snort3-server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (snort3-server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (snort3-server-webapp.rules) * 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (snort3-server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (snort3-server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (snort3-server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (snort3-server-webapp.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (snort3-server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (snort3-server-webapp.rules)
* 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (snort3-server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (snort3-server-webapp.rules) * 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (snort3-server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (snort3-browser-ie.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:58546 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt (server-webapp.rules) * 1:58545 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt (server-webapp.rules) * 1:58547 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58555 <-> DISABLED <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability (server-webapp.rules) * 1:58542 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58552 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58551 <-> DISABLED <-> SERVER-WEBAPP Micro Focus OBR command injection attempt (server-webapp.rules) * 1:58549 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58544 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules) * 1:58548 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58550 <-> DISABLED <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt (server-webapp.rules) * 1:58543 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt (server-webapp.rules)
* 1:58472 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57269 <-> ENABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58473 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules) * 1:57268 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt (browser-ie.rules) * 1:58471 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58545 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_LeftWindow XML external entity injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58547 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58548 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58549 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58550 <-> SERVER-WEBAPP Unraid Operating System PHP code injection attempt * 1:58551 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 1:58552 <-> SERVER-WEBAPP Micro Focus OBR command injection attempt * 3:58553 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 3:58554 <-> FILE-PDF TRUFFLEHUNTER TALOS-2021-1410 attack attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability
* 1:57268 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:57269 <-> BROWSER-IE Microsoft Internet Explorer memory corruption attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt