Talos Rules 2025-02-11
Talos is aware of vulnerabilities affecting products from Microsoft Corporation.

Microsoft Vulnerability CVE-2025-21184: A coding deficiency exists in Microsoft Windows Core Messaging Elevation of Privileges Vulnerability that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64529 through 64530, Snort 3: GID 1, SID 301136.

Microsoft Vulnerability CVE-2025-21358: A coding deficiency exists in Microsoft Windows Core Messaging Elevation of Privileges Vulnerability that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64531 through 64532, Snort 3: GID 1, SID 301137.

Microsoft Vulnerability CVE-2025-21376: A coding deficiency exists in Microsoft Windows Lightweight Directory Access Protocol (LDAP) that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 64545, Snort 3: GID 1, SID 64545.

Microsoft Vulnerability CVE-2025-21377: A coding deficiency exists in Microsoft NTLM Hash Disclosure that may lead to spoofing.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 62022 through 62023, Snort 3: GID 1, SID 300612.

Microsoft Vulnerability CVE-2025-21391: A coding deficiency exists in Microsoft Windows Storage that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64541 through 64542, Snort 3: GID 1, SID 301140.

Microsoft Vulnerability CVE-2025-21400: A coding deficiency exists in Microsoft SharePoint Server that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 58316 through 58317, 64537, Snort 3: GID 1, SIDs 58316 through 58317, 64537.

Microsoft Vulnerability CVE-2025-21414: A coding deficiency exists in Microsoft Windows Core Messaging Elevation of Privileges Vulnerability that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64539 through 64540, Snort 3: GID 1, SID 301139.

Talos has added and modified multiple rules in the file-office, os-windows, server-apache and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)

Modified Rules:


 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)

Modified Rules:


 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)

Modified Rules:


 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)

Modified Rules:


 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)

2025-02-11 18:33:41 UTC

Snort Subscriber Rules Update

Date: 2025-02-11

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64537 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:64533 <-> DISABLED <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt (server-webapp.rules)
 * 1:64535 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64539 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64542 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64543 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64544 <-> DISABLED <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt (os-windows.rules)
 * 1:64540 <-> DISABLED <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt (os-windows.rules)
 * 1:64545 <-> DISABLED <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt (os-windows.rules)
 * 1:64525 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64526 <-> DISABLED <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt (server-webapp.rules)
 * 1:64527 <-> DISABLED <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt (server-other.rules)
 * 1:64528 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt (server-webapp.rules)
 * 1:64529 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64541 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt (os-windows.rules)
 * 1:64530 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64536 <-> DISABLED <-> FILE-OFFICE Microsoft Office Excel type confusion attempt (file-office.rules)
 * 1:64531 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64532 <-> DISABLED <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt (os-windows.rules)
 * 1:64538 <-> ENABLED <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt (server-webapp.rules)
 * 1:64534 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt (server-other.rules)

Modified Rules:


 * 1:29966 <-> DISABLED <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt (server-other.rules)
 * 1:62022 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:50880 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:13843 <-> DISABLED <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt (server-other.rules)
 * 1:62023 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt (os-windows.rules)
 * 1:54162 <-> DISABLED <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt (server-webapp.rules)
 * 1:50882 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:17387 <-> DISABLED <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt (server-apache.rules)
 * 1:50881 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:58316 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:3813 <-> DISABLED <-> SERVER-WEBAPP awstats.pl configdir command injection attempt (server-webapp.rules)
 * 1:51961 <-> DISABLED <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt (server-webapp.rules)
 * 1:58317 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt (server-webapp.rules)
 * 1:46791 <-> DISABLED <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt (server-webapp.rules)
 * 1:59077 <-> ENABLED <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt (server-other.rules)
 * 1:51287 <-> DISABLED <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt (server-webapp.rules)
 * 1:10135 <-> DISABLED <-> SERVER-OTHER Squid proxy FTP denial of service attempt (server-other.rules)

2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:43 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt


2025-02-11 18:45:44 UTC

Snort Subscriber Rules Update

Date: 2025-02-10-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301135 <-> SERVER-WEBAPP AXON PBX Agent cross site scripting attempt
* 1:301136 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301137 <-> OS-WINDOWS Microsoft Windows CoreMessaging elevation of privilege attempt
* 1:301138 <-> FILE-OFFICE Microsoft Office Excel type confusion attempt
* 1:301139 <-> OS-WINDOWS Microsoft Windows DWM Core Library elevation of privilege attempt
* 1:301140 <-> OS-WINDOWS Microsoft Windows Storage storesvc elevation of privilege attempt
* 1:301141 <-> OS-WINDOWS Microsoft Windows ADDS elevation of privilege attempt
* 1:64527 <-> SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt
* 1:64528 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt
* 1:64533 <-> SERVER-WEBAPP NullSoft Shoutcast Server cross site scripting attempt
* 1:64534 <-> SERVER-OTHER Oracle WebLogic WLNamingManager T3 code execution attempt
* 1:64537 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:64538 <-> SERVER-WEBAPP Microsoft .NET Framework information disclosure attempt
* 1:64545 <-> OS-WINDOWS Microsoft Windows LDAP protocol remote code execution attempt

Modified Rules:

* 1:10135 <-> SERVER-OTHER Squid proxy FTP denial of service attempt
* 1:13843 <-> SERVER-OTHER MaxDB WebDBM DB name buffer overflow attempt
* 1:16052 <-> SERVER-OTHER Novell iManager Tree parameter denial of service attempt
* 1:17387 <-> SERVER-APACHE Apache Tomcat allowLinking URIencoding directory traversal attempt
* 1:29966 <-> SERVER-OTHER Ubiquiti airCam RTSP service buffer overflow attempt
* 1:300612 <-> OS-WINDOWS Microsoft Windows MSHTML platform elevation of privilege attempt
* 1:46791 <-> SERVER-WEBAPP Ruby Net FTP library command injection attempt
* 1:51287 <-> SERVER-WEBAPP Apache CouchDB _config command injection attempt
* 1:51961 <-> SERVER-WEBAPP Jenkins CLI arbitrary Java object deserialization attempt
* 1:54162 <-> SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
* 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:58317 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
* 1:59077 <-> SERVER-OTHER SAP Internet Communication Manager HTTP request smuggling attempt