Talos has added and modified multiple rules in the browser-webkit and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091900.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 3:60124 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt (server-other.rules) * 3:60152 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60134 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60150 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60146 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60143 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60151 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60140 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60131 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60135 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60153 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60132 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60130 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60125 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt (server-other.rules) * 3:60136 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60128 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt (server-other.rules) * 3:60138 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60137 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60145 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60144 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60129 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt (server-webapp.rules) * 3:60139 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules) * 3:60142 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt (server-webapp.rules) * 3:60126 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt (server-other.rules) * 3:60127 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt (server-other.rules) * 3:60149 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60133 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-other.rules) * 3:60123 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt (server-other.rules) * 3:60147 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60148 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt (server-webapp.rules) * 3:60141 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60113 <-> ENABLED <-> SERVER-WEBAPP SAP NetWeaver directory traversal attempt (snort3-server-webapp.rules) * 1:60161 <-> ENABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (snort3-server-webapp.rules) * 1:60114 <-> ENABLED <-> SERVER-WEBAPP SAP NetWeaver directory traversal attempt (snort3-server-webapp.rules) * 1:60121 <-> ENABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (snort3-server-webapp.rules) * 1:60122 <-> ENABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (snort3-server-webapp.rules) * 1:60111 <-> ENABLED <-> SERVER-WEBAPP SAP NetWeaver arbitrary JSP file upload attempt (snort3-server-webapp.rules) * 1:60158 <-> ENABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (snort3-server-webapp.rules) * 1:60112 <-> ENABLED <-> SERVER-WEBAPP SAP NetWeaver directory traversal attempt (snort3-server-webapp.rules) * 1:60156 <-> ENABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (snort3-server-webapp.rules) * 1:60157 <-> ENABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (snort3-server-webapp.rules) * 1:60117 <-> ENABLED <-> SERVER-WEBAPP Microsoft SharePoint Workflow XOML injection attempt (snort3-server-webapp.rules) * 1:60162 <-> ENABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (snort3-server-webapp.rules) * 1:60159 <-> ENABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (snort3-server-webapp.rules) * 1:60160 <-> ENABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (snort3-server-webapp.rules) * 1:60118 <-> ENABLED <-> SERVER-WEBAPP Kaseya VSA XML external entity injection attempt (snort3-server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60163 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60122 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60156 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60159 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60155 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60162 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60161 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60158 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules) * 1:60160 <-> DISABLED <-> SERVER-WEBAPP Joomla Core directory traversal attempt (server-webapp.rules) * 1:60121 <-> DISABLED <-> SERVER-WEBAPP MiVoice Connect command injection attempt (server-webapp.rules) * 1:60164 <-> DISABLED <-> SERVER-WEBAPP DLINK HNAP command injection attempt (server-webapp.rules) * 1:60154 <-> ENABLED <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt (browser-webkit.rules) * 1:60157 <-> DISABLED <-> SERVER-WEBAPP Tenda Router formPing command injection attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.20.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:300209 <-> BROWSER-WEBKIT Apple Safari WebKit loadInSameDocument use-after-free attempt * 1:60121 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 1:60122 <-> SERVER-WEBAPP MiVoice Connect command injection attempt * 3:60123 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1556 attack attempt * 3:60124 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1558 attack attempt * 3:60125 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1557 attack attempt * 3:60126 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1561 attack attempt * 3:60127 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1560 attack attempt * 3:60128 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1555 attack attempt * 3:60129 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60130 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60131 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60132 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1568 attack attempt * 3:60133 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60134 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60135 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60136 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60137 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60138 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60139 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60140 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60141 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1559 attack attempt * 3:60142 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60143 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60144 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1529 attack attempt * 3:60145 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60146 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60147 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60148 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60149 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60150 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60151 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60152 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 3:60153 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1551 attack attempt * 1:60156 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60157 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60158 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60159 <-> SERVER-WEBAPP Tenda Router formPing command injection attempt * 1:60160 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60161 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60162 <-> SERVER-WEBAPP Joomla Core directory traversal attempt * 1:60163 <-> SERVER-WEBAPP DLINK HNAP command injection attempt * 1:60164 <-> SERVER-WEBAPP DLINK HNAP command injection attempt