This update package improves the detection capabilities of the Forcepoint NGFW system.
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description |
High |
Novell-Remote-Manager-Off-By-One-Denial-Of-Service |
No CVE/CAN |
HTTP_CSH-Novell-Remote-Manager-Off-By-One-Denial-Of-Service |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion |
CVE-2012-5643 |
HTTP_CSH-Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow |
CVE-2012-5976 |
HTTP_CSH-Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
HTTP-ColdFusion-Admin-Password-DoS |
CVE-2000-0538 |
HTTP_CSH-ColdFusion-Admin-Password-DoS |
Denial of Service |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Firefox-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-6.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-5.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-4.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-3.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Netscape-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Opera-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
High |
HTTP-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow |
CVE-2005-1929 |
HTTP_CSH-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Opera-Mini-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-2.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
High |
HTTP-Apache-Host-Header-Default-Error-Page-XSS |
CVE-2002-0840 |
HTTP_CSH-Script-In-Host-Header |
Attack Related Anomalies |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-7.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-9.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Unknown-Browser |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Safari-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Chrome-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
IP-Address-As-HTTP-Host |
No CVE/CAN |
HTTP_CSH-IP-Address-As-HTTP-Host |
Protocol Information |
Fingerprint regexp changed |
|
High |
HTTP-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability |
CVE-2003-0245 |
HTTP_CSH-Oversized-Host-Header-Field |
Attack Related Anomalies |
Fingerprint regexp changed |
|
Low |
HTTP-Oracle-Bea-WebLogic-Transfer-Encoding-BOF |
CVE-2008-4008 |
HTTP_CSH-Transfer-Encoding-Invalid |
Protocol Violations |
Fingerprint regexp changed |
|
High |
Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion |
CVE-2013-2686 |
HTTP_CSH-Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-8.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-10.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-11.x-Browser-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service |
CVE-2014-0098 |
HTTP_CSH-Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
High |
Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass |
CVE-2014-0113 |
HTTP_CHS-Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
Valve-Steam-Usage |
No CVE/CAN |
HTTP_CSH-Valve-Steam-Usage |
Online Gaming Protocols |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Windows-Phone-8.1 |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Windows-Phone-8 |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Windows-Phone-7.8 |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Windows-Phone-7.5 |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Windows-Phone-7 |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Windows-Phone |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-iPad |
Browser Platforms |
Fingerprint regexp changed |
|
High |
Free-Download-Manager-Remote-Control-Authorization-Header-Buffer-Overflow |
CVE-2009-0183 |
HTTP_CSH-Excessively-Long-Basic-Authorization-Header |
Potential Compromise |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-iPhone |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-5.1-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-5.0-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.4-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.3-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.2-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.1-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.0-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-3-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-2-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-1-Tablet |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-5.1-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-5.0-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.4-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.3-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.2-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.1-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-4.0-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-3-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-2-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Browser-User-Agent-Android-1-Mobile |
Browser Platforms |
Fingerprint regexp changed |
|
High |
PhpFileManager-Cmd-Parameter-Command-Execution |
No CVE/CAN |
HTTP_CSH-PhpFileManager-Cmd-Parameter-Command-Execution |
Suspected Compromise |
Fingerprint regexp changed |
|
Critical |
Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability |
CVE-2015-7937 |
HTTP_CSH-Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Apache-Subversion-Mod_Dav_SVN-Integer-Overflow |
CVE-2015-5343 |
HTTP_CSH-Apache-Subversion-Mod_Dav_SVN-Integer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-8.x-Browser-Compatibility-Mode-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-10.x-Browser-Compatibility-Mode-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-11.x-Browser-Compatibility-Mode-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Internet-Explorer-9.x-Browser-Compatibility-Mode-Usage |
Major Browser Versions |
Fingerprint regexp changed |
|
High |
Apache-Activemq-Fileserver-Move-Directory-Traversal |
CVE-2016-3088 |
HTTP_CSH-Apache-Activemq-Fileserver-Move-Directory-Traversal |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
ABB-Pb610-Panel-Builder-600-Idal-HTTP-Host-Stack-Buffer-Overflow |
CVE-2019-7232 |
HTTP_CRH-ABB-Pb610-Panel-Builder-600-Idal-HTTP-Host-Stack-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Edge-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Samsung-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
High |
Cobalt-Strike-C2-HTTP-Traffic |
No CVE/CAN |
HTTP_CSH-Cobalt-Strike-C2-HTTP-Traffic |
Suspected Botnet |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Up-To-Date-Firefox-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Obsolete-Firefox-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Unidentified-Firefox-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Up-To-Date-Chrome-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Obsolete-Chrome-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Unidentified-Chrome-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Up-To-Date-Edge-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Obsolete-Edge-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Low |
HTTP-Browser-Usage |
No CVE/CAN |
HTTP_CSH-Unidentified-Edge-Browser-Usage |
Browsers |
Fingerprint regexp changed |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description |
High |
HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow |
CVE-2011-0262 |
HTTP_CRL-HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
HTTP-Novell-Groupwise-Messenger-HTTP-POST-Request-Invalid-Memory-Access |
CVE-2006-4511 |
HTTP_CRL-Novell-Groupwise-Messenger-HTTP-POST-Request-Memory-Access-Violation |
Potential Denial of Service |
Fingerprint regexp changed |
|
High |
Wordpress-W3-Total-Cache-PHP-Code-Execution |
CVE-2013-2010 |
HTTP_CRL-Wordpress-W3-Total-Cache-PHP-Code-Execution |
Suspected Compromise |
Name: HTTP_CS-Wordpress-W3-Total-Cache-PHP-Code-Execution->HTTP_CRL-Wordpress-W3-Total-Cache-PHP-Code-Execution |
Category tag group TCP Correlation Dependency Group removed |
Context has changed from HTTP Client Stream to HTTP Normalized Request-Line |
|
High |
Oracle-WebLogic-Server-CVE-2020-14882 |
CVE-2020-14882 |
HTTP_CRL-Oracle-WebLogic-Server-CVE-2020-14882 |
Suspected Compromise |
|
High |
HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String |
CVE-2010-1550 |
HTTP_CRL-HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String |
Suspected Compromise |
Fingerprint regexp changed |
|
Critical |
HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow |
CVE-2010-1960 |
HTTP_CRL-HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow |
Compromise |
Fingerprint regexp changed |
|
High |
HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow |
CVE-2010-1964 |
HTTP_CRL-HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
HP-OpenView-Network-Node-Manager-Nnmrptconfig-Schdparams-And-Nameparams-BOF |
CVE-2011-0267 |
HTTP_CRL-HP-OpenView-Nnmrptconfig-Network-Node-Manager-Schd-And-Nameparams-BOF-2 |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Possible-Cross-Site-Scripting |
No CVE/CAN |
HTTP_CRL-Script-In-Get-Request |
Potential Compromise |
Fingerprint regexp changed |
|
Low |
HTTP-Possible-Cross-Site-Scripting |
No CVE/CAN |
HTTP_CRL-Possible-Script-In-Get-Request |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
High |
Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure |
CVE-2015-0785 |
HTTP_CRL-Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
PhpFileManager-Cmd-Parameter-Command-Execution |
No CVE/CAN |
HTTP_CRL-PhpFileManager-Cmd-Parameter-Command-Execution |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Novell-ZENworks-Mobile-Management-Cross-Site-Scripting |
No CVE/CAN |
HTTP_CRL-Novell-ZENworks-Mobile-Management-Cross-Site-Scripting |
Suspected Compromise |
Fingerprint regexp changed |
|
Critical |
Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal |
CVE-2016-0482 |
HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal |
Compromise |
Fingerprint regexp changed |
|
High |
Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal |
CVE-2016-0486 |
HTTP_CRL-Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal |
CVE-2016-0480 |
HTTP_CRL-Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal |
CVE-2016-0855 |
HTTP_CRL-Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Unraid-Auth-Bypass-PHP-RCE |
CVE-2020-5847 |
HTTP_CRL-Unraid-Auth-Bypass-PHP-RCE |
Suspected Compromise |
|
High |
Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting |
CVE-2021-21616 |
HTTP_CRL-Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting |
Suspected Compromise |
Fingerprint regexp changed |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description |
High |
Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow |
No CVE/CAN |
File-Text_Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
GhostDNS |
No CVE/CAN |
File-Text_DNSChanger-Injected-Iframe |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
JavaScript-Obfuscation |
No CVE/CAN |
File-Text_JS-Obfuscator-Obfuscated-JavaScript-Detected |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Apple-Safari-Webkit-Floating-Point-Buffer-Overflow |
CVE-2009-2195 |
File-Text_Apple-Safari-Webkit-Floating-Point-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt |
CVE-2011-2217 |
File-Text_Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution |
CVE-2011-0926 |
File-Text_Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption |
CVE-2010-1881 |
File-Text_Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption |
Suspected Compromise |
Fingerprint regexp changed |
|
Critical |
Ie-Object-Type-Property-BOF |
CVE-2003-0344 |
File-Text_Microsoft-Internet-Explorer-Object-Tag-Slash-Buffer-Overflow |
Compromise |
Fingerprint regexp changed |
|
Critical |
Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow |
CVE-2008-0015 |
File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow |
Compromise |
Fingerprint regexp changed |
|
Low |
Embedded-Object-In-HTML |
No CVE/CAN |
File-Text_Embedded-ActiveX-Object-In-HTML |
Protocol Information |
Fingerprint regexp changed |
|
High |
Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow |
CVE-2008-3364 |
File-Text_Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Internet-Explorer-Com-Object-System-Compromise |
CVE-2005-2087 |
File-Text_Internet-Explorer-Com-Object-System-Compromise |
Potential Compromise |
Fingerprint regexp changed |
|
Critical |
HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution |
CVE-2008-0236 |
File-Text_Microsoft-Visual-Foxpro-Vfp6r-Docmd-ActiveX-Control-Command-Execution |
Compromise |
Fingerprint regexp changed |
|
High |
Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037 |
CVE-2008-0015 |
File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037 |
Suspected Compromise |
Fingerprint regexp changed |
|
Critical |
Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution |
CVE-2007-5660 |
File-Text_Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution |
Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption |
CVE-2006-4495 |
File-Text_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption |
CVE-2007-0218 |
File-Text_Microsoft-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation |
Potential Compromise |
Fingerprint regexp changed |
|
High |
JavaScript-Obfuscation |
No CVE/CAN |
File-Text_JavaScript-Xor-One-Time-Pad-Obfuscation-Method |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Konqueror-Same-Origin-Policy-Bypass |
CVE-2002-1151 |
File-Text_Same-Origin-Policy-Bypass |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-McAfee-Subscription-Manager-ActiveX-Buffer-Overflow |
CVE-2006-3961 |
File-Text_McAfee-Subscription-Manager-ActiveX-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
Critical |
HTTP-Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Code-Execution |
CVE-2006-4704 |
File-Text_Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Control-Usage |
Compromise |
Fingerprint regexp changed |
|
High |
HTTP_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption |
CVE-2007-0219 |
File-Text_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption |
CVE-2007-3041 |
File-Text_Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability |
CVE-2006-4193 |
File-Text_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption |
CVE-2008-1086 |
File-Text_Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption |
CVE-2006-1303 |
File-Text_Internet-Explorer-Com-Object-Instantiation-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability |
CVE-2007-0940 |
File-Text_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption |
CVE-2006-4697 |
File-Text_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow |
CVE-2007-2239 |
File-Text_Axis-Communications-Camera-Control-ActiveX-Object |
Potential Compromise |
Fingerprint regexp changed |
|
High |
HTTP-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution |
CVE-2007-2216 |
File-Text_Microsoft-Ie-ActiveX-IObjectsafety-Implementation-Code-Execution |
Potential Compromise |
Fingerprint regexp changed |
|
High |
SAPGUI-AddTab-Method-ActiveX-Control-Buffer-Overflow |
CVE-2008-4827 |
File-Text_SAP-GUI-ActiveX-Control-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
Critical |
Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow |
CVE-2007-4607 |
File-Text_Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow |
Compromise |
Fingerprint regexp changed |
|
High |
HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal |
CVE-2011-2404 |
File-Text_HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal |
Potential Compromise |
Fingerprint regexp changed |
|
Low |
Microsoft-Windows-XP-Large-Image-Resize-DoS |
No CVE/CAN |
File-Text_Microsoft-Windows-XP-Large-Image-Resize-DoS |
Potential Denial of Service |
Fingerprint regexp changed |
|
Low |
Mozilla-Non-Ascii-Hostname-BOF |
CVE-2004-0902 |
File-Text_Mozilla-Non-Ascii-Hostname-BOF |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
High |
RealNetworks-RealPlayer-Ivr-Handling-Heap-Buffer-Overflow |
No CVE/CAN |
File-Text_RealPlayer-Vulnerable-Embedded-ActiveX-Control |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Apple-Safari-HTML-Image-Element-Handling-Use-After-Free |
CVE-2010-0054 |
File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-3 |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Internet-Explorer-Security-Zone-Bypass-Url-Spoofing |
No CVE/CAN |
File-Text_Internet-Explorer-Security-Zone-Bypass-Url-Spoofing |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation |
No CVE/CAN |
File-Text_Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation |
No CVE/CAN |
File-Text_Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite |
CVE-2005-3657 |
File-Text_McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal |
CVE-2011-4786 |
File-Text_HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Microsoft-Windows-Win32k.sys-Memory-Corruption |
CVE-2011-5046 |
File-Text_Microsoft-Windows-Win32k.sys-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities |
CVE-2011-1388 |
File-Text_IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow |
CVE-2012-2176 |
File-Text_IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow |
CVE-2012-0549 |
File-Text_Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-Buffer-Overflow |
CVE-2011-4187 |
File-Text_Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-BOF-2 |
Potential Compromise |
Fingerprint regexp changed |
|
High |
GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution |
CVE-2012-2516 |
File-Text_GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Cisco-AnyConnect-VPN-Client-Software-Downgrade |
CVE-2012-2494 |
File-Text_Cisco-AnyConnect-VPN-Client-Software-Downgrade |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Samsung-Kies-Arbitrary-Command-Execution |
CVE-2012-3807 |
File-Text_Samsung-Kies-Arbitrary-Command-Execution |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
CYME-Multiple-Products-Chartfx.clientserver.core.dll-Remote-Code-Execution |
No CVE/CAN |
File-Text_CYME-Multiple-Products-Chartfx-Remote-Code-Execution |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow |
No CVE/CAN |
File-Text_Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error |
CVE-2013-2416 |
File-Text_Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
IBM-iNotes-ActiveX-Control-Integer-Overflow |
CVE-2013-3027 |
File-Text_IBM-iNotes-ActiveX-Control-Integer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow |
CVE-2013-6040 |
File-Text_MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow |
CVE-2013-6040 |
File-Text_MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow |
CVE-2013-6040 |
File-Text_MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability |
CVE-2006-4219 |
File-Text_Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption |
CVE-2014-2635 |
File-Text_HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Advantech-WebAccess-SCADA-Webeye.ocx-IP_Addr-Parameter-Buffer-Overflow |
CVE-2014-8388 |
File-Text_Advantech-WebAccess-SCADA-Webeye.ocx-Obsolete-ActiveX-Control-Usage |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow |
CVE-2014-8269 |
File-Text_Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow |
CVE-2014-8269 |
File-Text_Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Out-Of-Bounds-Indexing |
CVE-2015-8040 |
File-Text_Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Vulnerabilities |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow |
CVE-2014-8511 |
File-Text_Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Schneider-Electric-Proclima-Metadraw-Arrangeobjects-Memory-Corruption |
CVE-2014-9188 |
File-Text_Schneider-Electric-Proclima-Metadraw-Several-Vulnerabilities |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow |
CVE-2014-9200 |
File-Text_Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Oracle-Data-Quality-Trillium-Based-Setentities-Type-Confusion |
CVE-2015-0444 |
File-Text_Oracle-Data-Quality-Loaderwizard-Multiple-Type-Confusion-Vulnerabilities |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow |
CVE-2015-4648 |
File-Text_Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
High |
NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow |
CVE-2015-0795 |
File-Text_NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
JavaScript-Obfuscation |
No CVE/CAN |
File-Text_JavaScript-ActiveX-Obfuscation |
Suspected Attack Related Anomalies |
Fingerprint regexp changed |
|
High |
Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption |
CVE-2015-8039 |
File-Text_Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Samsung-Smartviewer-Stwaxconfig-Memory-Corruption |
CVE-2015-8039 |
File-Text_Samsung-Smartviewer-Stwaxconfig-Memory-Corruption |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Unitronics-VisiLogic-OPLC-ActiveX-Control-Memory-Corruption |
CVE-2015-6478 |
File-Text_Unitronics-VisiLogic-OPLC-TeeCommander-ChartLink-ActiveX-Control-Memory-Corruption |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Schneider-Electric-Proclima-F1bookview-Copyall-Memory-Corruption |
CVE-2015-8561 |
File-Text_Schneider-Electric-Proclima-Multiple-Methods-Memory-Corruption |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption |
CVE-2015-6478 |
File-Text_Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption |
Suspected Compromise |
Fingerprint regexp changed |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description |
Low |
Conflicting-Content-Type-Header |
No CVE/CAN |
File-Binary_Conflicting-Content-Type-JPEG |
Protocol Violations |
Fingerprint regexp changed |
|
High |
Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF |
CVE-2020-16199 |
File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
Google-Chrome-Extension-Package |
No CVE/CAN |
File-Binary_Google-Chrome-CRX-Extension-Package |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
High |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Word-For-Macintosh-Version-5-Document |
Potential Compromise |
Fingerprint regexp changed |
|
Low |
BZip2-Compressed-File |
No CVE/CAN |
File-Binary_BZip2-Compressed-File-Download |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Windows-Media-HTTP-Stream |
Streaming Protocols |
Fingerprint regexp changed |
|
Low |
Conflicting-Content-Type-Header |
No CVE/CAN |
File-Binary_Conflicting-Content-Type-Text |
Protocol Information |
Fingerprint regexp changed |
|
Low |
Conflicting-Content-Type-Header |
No CVE/CAN |
File-Binary_Conflicting-Content-Type-Text-HTML |
Protocol Information |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Standard-MIDI-Download |
Streaming Protocols |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Mp3-Download |
Streaming Protocols |
Fingerprint regexp changed |
|
High |
Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow |
CVE-2012-1336 |
File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
Java-Related-File-Transfers |
No CVE/CAN |
File-Binary_Java-Class-File |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Rar-File |
Protocol Information |
Fingerprint regexp changed |
|
High |
Windows-Shell-Shortcut-Arbitrary-Code-Execution |
CVE-2010-2568 |
File-Binary_Windows-LNK-File-Transfer |
Suspected Attack Related Anomalies |
Fingerprint regexp changed |
|
Low |
Windows-Shell-Shortcut-Arbitrary-Code-Execution |
CVE-2010-2568 |
File-Binary_Windows-Control-Panel-Applet-Shortcut-File-Transfer |
Other Suspicious Traffic |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_TIFF-File |
Protocol Information |
Fingerprint regexp changed |
|
High |
Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2 |
CVE-2013-5879 |
File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2 |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
XAR-Archive-File-Transfer |
No CVE/CAN |
File-Binary_XAR-Archive |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Cabinet-Transfer |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
Executable-File-Transfer |
No CVE/CAN |
File-Binary_ELF-Executable-File-Transfer |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
Executable-File-Transfer |
No CVE/CAN |
File-Binary_Mach-O-Executable-File-Transfer |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Critical |
IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow |
CVE-2015-1903 |
File-Binary_IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_LhArc-Archive |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Ar-Archive |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Windows-Compiled-Help |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_ACE-Archive |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_StuffIt-Archive |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Blizzard-MPQ-Archive |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Matroska-Media-Container |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Windows-Memory-Dump |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Romfs-Disk-Image |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_VMware-Virtual-Disk-Image |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Oracle-VirtualBox-Virtual-Disk-Image |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Hyper-V-Disk-Image |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_CD-ROM-Disk-Image |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Windows-Metafile |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Autodesk-Animation-Flic-Video |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-ASF-Container |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Word-Perfect-Document |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Windows-Fax-Cover-Sheet |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_RealMedia-Video |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_RealNetworks-Internet-Video |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Lotus-1-2-3-Spreadsheet |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Excel-Legacy-Spreadsheet |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Word-Legacy-Document |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Autodesk-Autocad-DWG |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Autodesk-Autocad-FAS |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Autodesk-Autocad-DWF |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-Binary_Microsoft-Windows-Help-Document |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
High |
McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection |
CVE-2016-8027 |
File-Binary_McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection |
Suspected Compromise |
Fingerprint regexp changed |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description |
High |
OpenOffice-OLE-File-Stream-Buffer-Overflow |
CVE-2008-0320 |
File-OLE_OpenOffice-OLE-File-Stream-Buffer-Overflow |
Potential Compromise |
Fingerprint regexp changed |
|
High |
Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption |
No CVE/CAN |
File-OLE_Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption |
Suspected Compromise |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Excel-95-Workbook |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
High |
Microsoft-OLE-Structured-Storage-File-Transfer |
No CVE/CAN |
File-OLE_Unusual-Directory-Structure |
Potential Compromise |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-PowerPoint-Presentation |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Null-Class-Id |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Unknown-Class-Id |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Word-Document |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Installer-Database |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Installer-Transform |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Installer-Patch |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-PowerPoint-Slide |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Excel-Workbook |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Generic-OLE-Package |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Word-6-Document |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Adobe-Photoshop-7-Image |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Outlook-Message |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Equation-2.0-Document |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Equation-3.0-Document |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-PowerPoint-95-Presentation |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-PowerPoint-Add-In |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Low |
File-Type-Identification |
No CVE/CAN |
File-OLE_Microsoft-Visio-Drawing |
Possibly Unwanted Content |
Fingerprint regexp changed |
|
Type | Name | Changes |
IPList | Rwanda |
|
IPList | Iraq |
|
IPList | Saudi Arabia |
|
IPList | Iran |
|
IPList | Cyprus |
|
IPList | Tanzania |
|
IPList | Armenia |
|
IPList | Kenya |
|
IPList | Seychelles |
|
IPList | Jordan |
|
IPList | Lebanon |
|
IPList | Kuwait |
|
IPList | Oman |
|
IPList | United Arab Emirates |
|
IPList | Israel |
|
IPList | Turkey |
|
IPList | Egypt |
|
IPList | Greece |
|
IPList | Estonia |
|
IPList | Latvia |
|
IPList | Lithuania |
|
IPList | Georgia |
|
IPList | Moldova |
|
IPList | Belarus |
|
IPList | Finland |
|
IPList | Åland |
|
IPList | Ukraine |
|
IPList | North Macedonia |
|
IPList | Hungary |
|
IPList | Bulgaria |
|
IPList | Albania |
|
IPList | Poland |
|
IPList | Romania |
|
IPList | Kosovo |
|
IPList | Zimbabwe |
|
IPList | Mauritius |
|
IPList | Réunion |
|
IPList | South Africa |
|
IPList | Mayotte |
|
IPList | Afghanistan |
|
IPList | Pakistan |
|
IPList | Bangladesh |
|
IPList | Sri Lanka |
|
IPList | Bhutan |
|
IPList | India |
|
IPList | Nepal |
|
IPList | Myanmar |
|
IPList | Uzbekistan |
|
IPList | Kazakhstan |
|
IPList | Kyrgyzstan |
|
IPList | Vietnam |
|
IPList | Thailand |
|
IPList | Indonesia |
|
IPList | Laos |
|
IPList | Taiwan |
|
IPList | Philippines |
|
IPList | Malaysia |
|
IPList | China |
|
IPList | Hong Kong |
|
IPList | Brunei |
|
IPList | Macao |
|
IPList | Cambodia |
|
IPList | South Korea |
|
IPList | Japan |
|
IPList | Singapore |
|
IPList | Russia |
|
IPList | Mongolia |
|
IPList | Australia |
|
IPList | Christmas Island |
|
IPList | Papua New Guinea |
|
IPList | New Zealand |
|
IPList | Cameroon |
|
IPList | Congo Republic |
|
IPList | Portugal |
|
IPList | Ghana |
|
IPList | Equatorial Guinea |
|
IPList | Nigeria |
|
IPList | Guinea |
|
IPList | Mali |
|
IPList | Spain |
|
IPList | Morocco |
|
IPList | Malta |
|
IPList | Algeria |
|
IPList | Denmark |
|
IPList | Iceland |
|
IPList | United Kingdom |
|
IPList | Switzerland |
|
IPList | Sweden |
|
IPList | Netherlands |
|
IPList | Austria |
|
IPList | Belgium |
|
IPList | Germany |
|
IPList | Luxembourg |
|
IPList | Ireland |
|
IPList | Monaco |
|
IPList | France |
|
IPList | Andorra |
|
IPList | Liechtenstein |
|
IPList | Jersey |
|
IPList | Isle of Man |
|
IPList | Slovakia |
|
IPList | Czechia |
|
IPList | Norway |
|
IPList | San Marino |
|
IPList | Italy |
|
IPList | Slovenia |
|
IPList | Montenegro |
|
IPList | Croatia |
|
IPList | Angola |
|
IPList | Greenland |
|
IPList | Paraguay |
|
IPList | Uruguay |
|
IPList | Brazil |
|
IPList | Dominican Republic |
|
IPList | Bahamas |
|
IPList | Antigua and Barbuda |
|
IPList | Saint Lucia |
|
IPList | British Virgin Islands |
|
IPList | Saint Martin |
|
IPList | Saint Barthélemy |
|
IPList | Cayman Islands |
|
IPList | Belize |
|
IPList | El Salvador |
|
IPList | Guatemala |
|
IPList | Honduras |
|
IPList | Venezuela |
|
IPList | Ecuador |
|
IPList | Colombia |
|
IPList | Panama |
|
IPList | Argentina |
|
IPList | Chile |
|
IPList | Bolivia |
|
IPList | Peru |
|
IPList | Mexico |
|
IPList | French Polynesia |
|
IPList | Puerto Rico |
|
IPList | U.S. Virgin Islands |
|
IPList | Canada |
|
IPList | United States |
|
IPList | Serbia |
|
IPList | Antarctica |
|
IPList | TOR exit nodes IP Address List |
|
IPList | Amazon AMAZON |
|
IPList | Amazon CLOUDFRONT |
|
IPList | Microsoft Azure datacenter for australiaeast |
|
IPList | Microsoft Azure datacenter for canadacentral |
|
IPList | TOR relay nodes IP Address List |
|
IPList | Microsoft Azure datacenter for centralus |
|
IPList | Microsoft Azure datacenter for southeastasia |
|
IPList | Microsoft Azure datacenter for westus2 |
|
IPList | Microsoft Azure datacenter |
|
IPList | Botnet IP Address List |
|
IPList | Malicious Site IP Address List |
|
IPList | Amazon AMAZON sa-east-1 |
|
IPList | Amazon AMAZON us-east-1 |
|
IPList | Microsoft Azure datacenter for norwaye |
|
IPList | Microsoft Azure datacenter for switzerlandn |
|
IPList | Microsoft Azure service for AzureArcInfrastructure |
|
IPList | Microsoft Azure service for AzureCloud |
|
IPList | Microsoft Azure service for AzureSignalR |
|
IPList | Microsoft Azure service for AzureTrafficManager |
|
IPList | Microsoft Azure datacenter for swedencentral |
|
IPList | Microsoft Azure datacenter for westus3 |
|
IPList | Microsoft Azure datacenter for qatarcentral |
|
Situation | DNS-TCP_Standard-Query-Request-Type-AAAA |
Fingerprint regexp changed |
|
Situation | DNS-TCP_Standard-Query-Request-Type-WKS |
Fingerprint regexp changed |
|
Situation | DNS-TCP_Standard-Query-Request-Type-Null |
Fingerprint regexp changed |
|
Situation | DNS-TCP_Standard-Query-Request-Type-A |
Fingerprint regexp changed |
|
Situation | DNS-TCP_Standard-Query-Request-Type-CNAME |
Fingerprint regexp changed |
|
Situation | DNS-TCP_Standard-Query-Request-Type-MX |
Fingerprint regexp changed |
|
Situation | DNS-TCP_Standard-Query-Request-Type-SRV |
Fingerprint regexp changed |
|
Situation | DNS-TCP_Standard-Query-Request-Type-TXT |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-Null |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-WKS |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-TXT |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-A |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-CNAME |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-MX |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-SRV |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Request-Type-AAAA |
Fingerprint regexp changed |
|
Situation | DNS-UDP_ISC-BIND-DNS-Key-Record-Too-Short-1 |
Description has changed |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag application ISC BIND removed |
Category tag group CVE2020 removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag situation Suspected Compromise removed |
Category tag group UDP Correlation Dependency Group removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
|
Situation | DNS-UDP_Standard-Query-Reply-Type-Null |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Reply-Type-KEY |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Reply-Type-A |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Reply-Type-CNAME |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Reply-Type-MX |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Standard-Query-Reply-Type-SRV |
Fingerprint regexp changed |
|
Situation | DNS-UDP_Suspiciously-Long-TXT-Reply-Content |
Fingerprint regexp changed |
|
Situation | DNS-UDP_ISC-BIND-DNS-Key-Record-Too-Short-2 |
Description has changed |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag application ISC BIND removed |
Category tag group CVE2020 removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag situation Suspected Compromise removed |
Category tag group UDP Correlation Dependency Group removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
|
Situation | HTTP_CS-Multiple-Host-Headers |
Fingerprint regexp changed |
|
Situation | HTTP_CSU-Shared-Variables |
|
Situation | HTTP_CSU-Known-Exploit-Kit-Parameter-Pattern |
Description has changed |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag situation Potential Compromise removed |
Category tag group HTTP Correlation Dependency Group removed |
Category tag group TCP Correlation Dependency Group removed |
Category tag group HTTP URI Correlation Dependency Group removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
Category tag group TCP Client Traffic removed |
|
Situation | HTTP_CSH-Browser-Usage-Variables-Setter |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag application Generic browser removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag application_not_specific Generic browser not specific removed |
Category tag situation Browsers removed |
Category tag group TCP Client Traffic removed |
|
Situation | HTTP_CSH-GoogleEarth-Usage |
Fingerprint regexp changed |
|
Situation | HTTP_CSH-Shared-Variables |
Fingerprint regexp changed |
|
Situation | HTTP_CSH-Long-Range-Or-Range-Request-Header |
Fingerprint regexp changed |
|
Situation | HTTP_SHS-Transfer-Encoding-Invalid |
Fingerprint regexp changed |
|
Situation | HTTP_SHS-Transfer-Encoding-Chunked |
Fingerprint regexp changed |
|
Situation | HTTP_SHS-Transfer-Encoding-Deflate |
Fingerprint regexp changed |
|
Situation | HTTP_SHS-Transfer-Encoding-Compress |
Fingerprint regexp changed |
|
Situation | HTTP_SHS-Transfer-Encoding-Gzip |
Fingerprint regexp changed |
|
Situation | HTTP_SHS-Transfer-Encoding-Identity |
Fingerprint regexp changed |
|
Situation | SMTP_Shared-Variables-For-Client-Command-Stream-Context |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag situation System Inspections removed |
Category tag group TCP Client Traffic removed |
|
Situation | HTTP_Vulnerable-HTML-Help-ActiveX-Control-Access |
Description has changed |
Category tag situation Obsolete added |
Category tag os Windows XP removed |
Category tag os Windows 2000 removed |
Category tag os Windows 2003 removed |
Category tag hardware Any Hardware removed |
Category tag group MS2007-02 removed |
Category tag group CVE2007 removed |
Category tag os_not_specific Windows XP not specific removed |
Category tag os_not_specific Windows 2000 not specific removed |
Category tag os_not_specific Windows 2003 not specific removed |
Category tag situation Potential Compromise removed |
Category tag group HTTP Correlation Dependency Group removed |
Category tag group TCP Correlation Dependency Group removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
Category tag group TCP Server Traffic removed |
|
Situation | HTTP_Authentium-Command-AntiVirus-odapi.dll-Multiple-Buffer-Overflows |
Description has changed |
Category tag situation Obsolete added |
Category tag os Windows removed |
Category tag hardware Any Hardware removed |
Category tag application Authentium Command Antivirus removed |
Category tag group CVE2007 removed |
Category tag os_not_specific Windows not specific removed |
Category tag situation Potential Compromise removed |
Category tag group HTTP Correlation Dependency Group removed |
Category tag group TCP Correlation Dependency Group removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
Category tag group TCP Server Traffic removed |
|
Situation | FTP_CS-Shared-Variables-For-Client-Stream-Context |
Fingerprint regexp changed |
|
Situation | SMB-TCP_SC-Remote-Delete-Service |
Fingerprint regexp changed |
|
Situation | SMB-TCP_SC-Remote-Start-Service |
Fingerprint regexp changed |
|
Situation | SMB-TCP_SC-Remote-Stop-Service |
Fingerprint regexp changed |
|
Situation | SMB-TCP_SC-At-Scheduler-JobAdd |
Fingerprint regexp changed |
|
Situation | SMB-TCP_SC-At-Scheduler-JobDelete |
Fingerprint regexp changed |
|
Situation | SMB-TCP_CHS-SMB3-Negotiate-Chained-Compression-Unsupported |
Fingerprint regexp changed |
|
Situation | HTTP_SLS-Unknown-Informal-Status-Code |
Fingerprint regexp changed |
|
Situation | HTTP_SLS-Unknown-Success-Status-Code |
Fingerprint regexp changed |
|
Situation | HTTP_SLS-Unknown-Redirection-Status-Code |
Fingerprint regexp changed |
|
Situation | HTTP_SLS-Unknown-Client-Error-Status-Code |
Fingerprint regexp changed |
|
Situation | HTTP_SLS-Unknown-Server-Error-Status-Code |
Fingerprint regexp changed |
|
Situation | File-Text_JavaScript-Comment-Split |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag application Generic HTTP client removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag application_not_specific Generic HTTP client not specific removed |
Category tag situation Potential Compromise removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
|
Situation | File-OLE_Microsoft-PowerPoint-95-Slide |
Category tag situation Obsolete added |
Category tag os Windows removed |
Category tag hardware Any Hardware removed |
Category tag application Microsoft PowerPoint removed |
Category tag os_not_specific Windows not specific removed |
Category tag application_not_specific Microsoft PowerPoint not specific removed |
Category tag situation Possibly Unwanted Content removed |
|
Situation | File-Binary_Disk-Image-Transfer |
Fingerprint regexp changed |
|
Situation | HTTP_SHS-Icecast-Not-Audio |
Fingerprint regexp changed |
|
Situation | File-Text_Base64-Encoded-HTML-Object |
Fingerprint regexp changed |
|
Situation | File-Text_Vulnerable-HTML-Help-ActiveX-Control-Access |
Description has changed |
Category tag situation Obsolete added |
Category tag os Windows XP removed |
Category tag os Windows 2000 removed |
Category tag os Windows 2003 removed |
Category tag hardware Any Hardware removed |
Category tag group MS2007-02 removed |
Category tag group CVE2007 removed |
Category tag os_not_specific Windows XP not specific removed |
Category tag os_not_specific Windows 2000 not specific removed |
Category tag os_not_specific Windows 2003 not specific removed |
Category tag situation Potential Compromise removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
|
Situation | File-Text_Authentium-Command-AntiVirus-odapi.dll-Multiple-Buffer-Overflows |
Description has changed |
Category tag situation Obsolete added |
Category tag os Windows removed |
Category tag hardware Any Hardware removed |
Category tag application Authentium Command Antivirus removed |
Category tag group CVE2007 removed |
Category tag os_not_specific Windows not specific removed |
Category tag situation Potential Compromise removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
|
Situation | File-TextId_Script-In-SVG |
Fingerprint regexp changed |
|
Situation | File-Text_Internet-Explorer-AxDebugger-Document-ActiveX-Vulnerability |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-64-Bit |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-32-Bit |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Nonstandard-Optional-Header-Size |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Dynamic-Link-Libary |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Unknown-Architecture |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-x86-64 |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-x86 |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Header-Overlap |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Windows-Unknown-Subsystem |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Windows-POSIX-Subsystem |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Windows-OS2-Subsystem |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Windows-Console-Application |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Windows-GUI-Application |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Windows-Native-Subsystem |
Fingerprint regexp changed |
|
Situation | File-Exe_Portable-Executable-Nonstandard-Optional-Header-Signature |
Fingerprint regexp changed |
|
Situation | File-Text_Internet-Explorer-Sysmon-ActiveX-Denial-Of-Service |
Fingerprint regexp changed |
|