Juniper signatures

Subscribe to Juniper signatures hírcsatorna Juniper signatures
Juniper RSS Feed
Frissítve: 7 perc 57 másodperc
2019. január 18.

Signature Update #3135

Signature Update #3135

4 new signatures:

HIGH HTTP:STC:CVE-2018-17682-RCEHTTP: Foxit Reader CVE-2018-17682 Remote Code ExecutionMEDIUM SNMP:DOS:SQUID-PROXYSNMP: Squid Proxy SNMP Query Rejection Denial of ServiceHIGH MS-RPC:OF:ADVANTECH-WEB-SCADAMS-RPC: Advantech WebAccess SCADA bwnodeip Stack-based Buffer OverflowHIGH TFTP:CISCO-PRIM-FILE-UPLOADTFTP: Cisco Prime Infrastructure swimtemp TFTP Arbitrary File Upload

1 updated signature.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. január 16.

Top to Bottom Success in the Enterprise WAN

Top to Bottom Success in the Enterprise WAN

Multicloud has changed the world, and as much as the transition is impacting the inside of the modern data center, it is reshaping the networks between them. In championing the migration to multicloud through 2018, Juniper Networks saw growing momentum for our Contrail Enterprise Multicloud and Contrail SD-WAN solutions. Given the heavy focus in the industry on automation and overlay (commonly known as SD-WAN), the underlying network (commonly known as Enterprise WAN) is often overlooked. Juniper has been delivering solutions for Enterprise WAN across private and leased networks that enables a secure, reliable and scalable network underneath SD-WAN.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. január 15.

Signature Update #3134

Signature Update #3134

3 new signatures:

MEDIUM HTTP:STC:ADOBE:CVE-2018-15979IDHTTP: Adobe Acrobat and Reader PDF GoToE Information DisclosureHIGH HTTP:SQL:INJ:ZOHO-CVE-2018-9087HTTP: Zoho ManageEngine OpManagerDBUtil getProbeNATDetails SQL InjectionMEDIUM HTTP:ORACLE:CVE-2018-2914-DOSHTTP: Oracle GoldenGate Manager Command Report Denial of Service

10 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. január 10.

Signature Update #3133

Signature Update #3133

2 new signatures:

HIGH APP:REMOTE:CVE-2018-15381-RCEAPP: Cisco Unity Express RMI Insecure Deserialization Remote Code ExecutionHIGH HTTP:ORACLE:CVE-2018-3252-RCEHTTP: Oracle WebLogic Server DeploymentServiceServlet Insecure Deserialization Remote Code Execution

3 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. január 8.

Signature Update #3132

Signature Update #3132

6 new signatures:

HIGH HTTP:STC:DL:CVE-2019-0566-PEHTTP: Microsoft Edge CVE-2019-0566 Elevation of PrivilegeHIGH HTTP:STC:CVE-2019-0565-MCHTTP: Microsoft Edge CVE-2019-0565 Remote Code ExecutionHIGH HTTP:STC:CVE-2019-0539-MCHTTP: Microsoft Edge Chakra Scripting Engine CVE-2019-0539 Memory CorruptionMEDIUM HTTP:STC:DL:CVE-2019-0569-IDHTTP: Windows Kernel CVE-2019-0569 Information DisclosureHIGH HTTP:STC:IE:CVE-2019-0568-CEHTTP: Microsoft Edge CVE-2019-0568 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2019-0567-CEHTTP: Microsoft Edge CVE-2019-0567 Remote Code Execution

1 deleted signature:

MEDIUMHTTP:MS-WINDOWS-TLS-BYPASS HTTP: Microsoft Windows SSL and TLS Security Feature Bypass

51 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. január 3.

Signature Update #3131

Signature Update #3131

71 new signatures:

HIGH HTTP:STC:ADOBE:CVE-2018-19719OBHTTP: Acrobat Reader CVE-2018-19719 Information DisclosureHIGH HTTP:STC:ADOBE:CVE2018-15982RCEHTTP: Adobe Flash Player CVE-2018-15982 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-15990CEHTTP: Adobe Acrobat Reader CVE-2018-15990 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-15999CEHTTP: Adobe Acrobat Reader CVE-2018-15999 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-15998CEHTTP: Adobe Acrobat Reader CVE-2018-15998 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16032IDHTTP: Adobe Reader CVE-2018-16032 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16040CEHTTP: Adobe Pdf CVE-2018-16040 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16023IDHTTP: Adobe Acrobat Reader CVE-2018-16023 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16046CEHTTP: Adobe Reader CVE-2018-16046 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16009IDHTTP: Adobe Acrobat Reader CVE-2018-16009 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16006IDHTTP: Adobe Acrobat Reader CVE-2018-16006 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16007IDHTTP: Adobe Reader CVE-2018-16007 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16004CEHTTP: Adobe Pdf CVE-2018-16004 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16005IDHTTP: Adobe Reader CVE-2018-16005 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16002IDHTTP: Adobe Acrobat Reader CVE-2018-16002 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16003CEHTTP: Adobe Acrobat Reader CVE-2018-16003 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-19707CEHTTP: Adobe Reader CVE-2018-19707 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-16021CEHTTP: Adobe Acrobat Reader CVE-2018-16021 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-19717IDHTTP: Adobe Reader CVE-2018-19717 Information DIsclosureHIGH HTTP:STC:ADOBE:CVE-2018-15987CEHTTP: Adobe CVE-2018-15987 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-15984IDHTTP: Adobe PDF CVE-2018-15984 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-19714IDHTTP: Adobe Reader CVE-2018-19714 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16045PEHTTP: Adobe Reader CVE-2018-16045 Privilege EscalationHIGH HTTP:STC:ADOBE:CVE-2018-19702CEHTTP: Adobe Reader CVE-2018-19702 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16024IDHTTP: Adobe Reader CVE-2018-16024 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-19704IDHTTP: Adobe Acrobat Reader CVE-2018-19704 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-19703IDHTTP: Adobe Acrobat Reader CVE-2018-19703 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16025CEHTTP: Adobe Reader CVE-2018-16025 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-15986IDHTTP: Adobe Reader CVE-2018-15986 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-15985IDHTTP: Adobe Acrobat Reader CVE-2018-15985 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-19700CEHTTP: Adobe Reader CVE-2018-19700 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-16044PEHTTP: Adobe Reader CVE-2018-16044 Privilage EsclationMEDIUM HTTP:STC:ADOBE:CVE-2018-16041IDHTTP: Adobe Pdf CVE-2018-16041 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16027CEHTTP: Adobe Acrobat Reader CVE-2018-16027 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-19708CEHTTP: Adobe Pdf CVE-2018-19708 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-19709IDHTTP: Adobe Acrobat Reader CVE-2018-19709 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-15988CEHTTP: Adobe Reader CVE-2018-15988 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-15989IDHTTP: Adobe Acrobat Reader CVE-2018-15989 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16037CEHTTP: Adobe Acrobat Reader CVE-2018-16037 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-16036CEHTTP: Adobe Reader CVE-2018-16036 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16035IDHTTP: Adobe Reader CVE-2018-16035 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16034IDHTTP: Adobe Pdf CVE-2018-16034 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16019IDHTTP: Adobe Acrobat Reader CVE-2018-16019 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16018IDHTTP: Adobe Acrobat Reader CVE-2018-16018 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16031IDHTTP: Adobe Reader CVE-2018-16031 Inforamtion DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16030IDHTTP: Adobe Acrobat Reader CVE-2018-16030 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16014CEHTTP: Adobe Acrobat Reader CVE-2018-16014 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16017IDHTTP: Adobe Acrobat Reader CVE-2018-16017 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16016CEHTTP: Adobe Reader CVE-2018-16016 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-16011CEHTTP: Adobe Pdf CVE-2018-16011 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16013IDHTTP: Adobe Reader CVE-2018-16013 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16012IDHTTP: Adobe Reader CVE-2018-16012 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-19713CEHTTP: Adobe Reader CVE-2018-19713 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-19711IDHTTP: Adobe Acrobat Reader CVE-2018-19711 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-19715CEHTTP: Adobe Acrobat Reader CVE-2018-19715 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-19699IDHTTP: Adobe Reader CVE-2018-19699 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16042SBHTTP: Adobe Reader CVE-2018-16042 Security BypassMEDIUM HTTP:STC:ADOBE:CVE-2018-16043IDHTTP: Adobe Acrobat Reader CVE-2018-16043 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-19710IDHTTP: Adobe Acrobat Reader CVE-2018-19710 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16047IDHTTP: Adobe Reader CVE-2018-16047 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-19712IDHTTP: Adobe Acrobat Reader CVE-2018-19712 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16008CEHTTP: Adobe Reader CVE-2018-16008 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-15992CEHTTP: Adobe Reader CVE-2018-15992 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-15995IDHTTP: Adobe Pdf CVE-2018-15995 Information DisclosureHIGH HTTP:STC:IE:CVE-2018-8653-RCEHTTP: Microsoft Internet Explorer CVE-2018-8653 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-15993CEHTTP: Adobe Acrobat Reader CVE-2018-15993 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-15994CEHTTP: Adobe Acrobat Reader CVE-2018-15994 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-16026CEHTTP: Adobe Reader CVE-2018-16026 Use After FreeMEDIUM HTTP:STC:ADOBE:CVE-2018-15997IDHTTP: Adobe Reader CVE-2018-15997 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-19705IDHTTP: Adobe Reader CVE-2018-19705 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16000CEHTTP: Adobe Reader CVE-2018-16000 Remote Code Execution

2 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. január 1.

Signature Update #3130

Signature Update #3130

2 new signatures:

MEDIUM HTTP:STC:ADOBE:CVE-2018-16015IDHTTP: Adobe Acrobat Reader CVE-2018-16015 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16010IDHTTP: Adobe Reader CVE-2018-16010 Information Disclosure Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 27.

Signature Update #3129

Signature Update #3129

10 new signatures:

HIGH HTTP:STC:ADOBE:CVE-2018-19698CEHTTP: Adobe Reader CVE-2018-19698 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-16039CEHTTP: Adobe Reader CVE-2018-16039 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-15996IDHTTP: Adobe TTF CVE-2018-15996 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16033IDHTTP: Adobe Pdf CVE-2018-16033 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-19706IDHTTP: Adobe Acrobat Reader CVE-2018-19706 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-19716CEHTTP: Adobe Reader CVE-2018-19716 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16028IDHTTP: Adobe TTF CVE-2018-16028 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2018-16029CEHTTP: Adobe Reader CVE-2018-16029 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2018-15991CEHTTP: Adobe Reader CVE-2018-15991 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2018-16020IDHTTP: Adobe Acrobat Reader CVE-2018-16020 Information Disclosure

2 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 26.

Signature Update #3128

Signature Update #3128

3 new signatures:

MEDIUM HTTP:STC:ADOBE:CVE-2018-16038IDHTTP: Adobe Pdf CVE-2018-16038 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16001IDHTTP: Adobe Xps CVE-2018-16001 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2018-16022IDHTTP: Adobe Emf CVE-2018-16022 Information Disclosure Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 21.

Accelerate the Automation Journey with Juniper EngNet

Accelerate the Automation Journey with Juniper EngNet

The speed of current technological breakthroughs is disrupting almost every industry fundamentally altering the way we live, work and communicate with each other. 

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 20.

Signature Update #3127

Signature Update #3127

2 new signatures:

MEDIUM HTTP:STC:ADOBE:CVE-2018-19701IDHTTP: Adobe Reader CVE-2018-19701 Information DisclosureHIGH HTTP:NAGIOS-MAG-CND-INJHTTP: Nagios XI Magpie cURL Argument Injection

2 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 19.

Signature Update #3126

Signature Update #3126

2 new signatures:

HIGH HTTP:SQL:INJ:CVE-2018-9088-RCEHTTP: Zoho ManageEngine OpManager OpManagerFailoverUtil customerName SQL InjectionHIGH HTTP:MICROSOFT-CVE-2018-8582-IOHTTP: Microsoft Outlook RWZ Integer Overflow Remote Code Execution

535 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 18.

Safeguarding Kubernetes with Defense in Depth

Safeguarding Kubernetes with Defense in Depth

These days, security is top-of-mind for everyone involved in IT. It seems increasingly difficult to string together more than a few days without a major incident. If it’s not a massive data breach, it’s a major flaw in popular software. A couple weeks ago, the Marriott breach was revealed and just last week we witnessed the first major security vulnerability tied to Kubernetes.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 13.

Signature Update #3125

Signature Update #3125

14 new signatures:

HIGH HTTP:STC:CVE-2018-8628-RCEHTTP: Microsoft Powerpoint CVE-2018-8628-RCEHIGH HTTP:STC:IE:CVE-2018-8617-RCEHTTP: Chakra Scripting Engine CVE-2018-8617 Memory CorruptionHIGH HTTP:STC:IE:CVE-2018-8643-RCEHTTP: Microsoft Internet Explorer CVE-2018-8643 Remote Code ExecutionHIGH HTTP:STC:CVE-2018-8611-UAFHTTP: Microsoft Windows CVE-2018-8611 Elevation of PrivilegesHIGH HTTP:STC:IE:CVE-2018-8625-RCEHTTP: Windows VBScript Engine CVE-2018-8625 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2018-8634-RCEHTTP: Microsoft Edge CVE-2018-8634 Buffer OverflowHIGH HTTP:STC:IE:CVE-2018-8631-RCEHTTP: Microsoft Internet Explorer CVE-2018-8631 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2018-8629-MCHTTP: Chakra Scripting Engine CVE-2018-8629 Memory CorruptionHIGH HTTP:STC:IE:CVE-2018-8618-RCEHTTP: Microsoft Edge CVE-2018-8618 Remote Code ExecutionHIGH HTTP:STC:OUTLOOK:CVE2018-8587CEHTTP: Microsoft Outlook CVE-2018-8587 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2018-8583-RCEHTTP: Microsoft Edge CVE-2018-8583 Remote Code ExecutionMEDIUM HTTP:STC:IE:CVE-2018-8619-PBHTTP: Microsoft Internet Explorer CVE-2018-8619 Policy BypassHIGH HTTP:STC:IE:CVE-2018-8624-RCEHTTP: Chakra Scripting Engine CVE-2018-8624 Memory CorruptionHIGH HTTP:STC:DL:CVE-2018-8639-EOPHTTP: Microsoft Windows CVE-2018-8639 Elevation of Privileges

3 new application2 signatures:

AZURE-RMSAVAMARMS-AD-RMS Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 12.

Juniper Networks and IoT Institute Survey: As IoT Deployments Collide with Multicloud Ecosystems, Where Does Security Stand?

Juniper Networks and IoT Institute Survey: As IoT Deployments Collide with Multicloud Ecosystems, Where Does Security Stand?

According to Gartner, “by 2020, 75% of organizations will have deployed a multicloud or hybrid cloud model for their IT needs.”1 While we’ve known for some time that the future is multicloud, ensuring cybersecurity across diverse and non-traditional environments has mostly been an afterthought. Despite organizations weaving cloud-based ecosystems and Internet of Things (IoT) devices and applications into the fabric of their networks, they have not emphasized security at the same level. To learn more about what organizations are – and are not – doing to prepare and fortify their security postures, Juniper Networks partnered with the Internet of Things Institute to survey organizations implementing IoT projects.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 11.

Signature Update #3124

Signature Update #3124

1 new signature:

CRITICAL HTTP:KUBERNETS-CVE-2018-1002105HTTP: Kubernets apiserver Remote Privilege Escalation

1 updated signature.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 10.

Deploying Containers More Securely and at Scale with Multicloud Enabler Powered by Red Hat and Juniper Networks

Deploying Containers More Securely and at Scale with Multicloud Enabler Powered by Red Hat and Juniper Networks

Multicloud should be accessible for more than the world’s largest cloud providers. Here’s how Juniper Networks and Red Hat can make that happen.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 10.

Deploying Containers Securely and at Scale with Multicloud Enabler Powered by Red Hat and Juniper Networks

Deploying Containers Securely and at Scale with Multicloud Enabler Powered by Red Hat and Juniper Networks

Multicloud should be accessible for more than the world’s largest cloud providers. Here’s how Juniper Networks and Red Hat can make that happen.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 6.

Signature Update #3123

Signature Update #3123

6 new signatures:

HIGH HTTP:STC:CVE-2018-14295-RCEHTTP: Foxit Reader PDF Parsing Shading Pattern Integer Overflow Remote Code ExecutionMEDIUM HTTP:XSS:ZOHO-OPM-BUSINESS-IMGHTTP: Zoho ManageEngine OpManager Business View Background Image Cross Site ScriptingHIGH APP:ORACLE:WEBLOGIC-ABSPLAT-RCEAPP: Oracle WebLogic Server AbstractPlatformTransactionManager Insecure Deserialization Remote Code ExecutionMEDIUM HTTP:STC:IMG:FOXIT-BMP-OOBHTTP: Foxit Reader ConvertToPDF BMP Out-of-Bounds ReadHIGH DB:MYSQL:CVE-2018-15768-CEDB: Dell OpenManage Network Manager MySQL Improper Access Control Command ExecutionMEDIUM HTTP:STC:DL:GDI-WMF-IDHTTP: Microsoft Graphics Component CVE-2018-8472 Information Disclosure

3 updated signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2018. december 4.

Signature Update #3122

Signature Update #3122

10 new signatures:

HIGH APP:MISC:DSKB-CVE-2018-5262-RCEAPP: DiskBoss 8.8.16 Unauthenticated Remote Code ExecutionHIGH HTTP:MISC:CVE-2018-7297-RCEHTTP: HomeMatic CCU2 CVE-2018-7297 Remote Code ExecutionHIGH HTTP:MISC:EIR-D1000-RCEHTTP: Eir D1000 Wireless Router WAN Side Remote Command InjectionHIGH PORTMAPPER:NOVELL-PM-CALLIT-BOPORTMAPPER: Novell Netware Portmapper CALLIT Buffer OverflowHIGH HTTP:PHP:WP-PLUGIN-MARKET-RCEHTTP: Wordpress Plugin Marketplace CVE 2014 9013 Remote Code ExecutionHIGH SMB:ENTROPY-NEGO-AUTH-BYPSMB: Microsoft Windows Smb Insufficent Entropy CVE-2010-0231 Authentication BypassHIGH SSH:MISC:CVE-2018-1909-BACKDOORSSH: CVE-2018-1909 BackdoorMEDIUM APP:MISC:MANGO-REMOTE-SBAPP: Mongodb Remote Unauthenticated Security BypassHIGH APP:MISC:REDIS-SSHKEY-UNAUTH-OWAPP: Redis SSH Key Unauthorized OverwriteHIGH SMB:NETBIOS:WIN-SMB3-TREE-DOSSMB: Windows SMBv3 Tree Connect Denial of Service

1 deleted signature:

HIGHIKE:DOS:SWAN-FIPS IKE: strongSwan OpenSSL Plugin FIPS Mode Denial-of-Service

17 updated signatures.

4 renamed signatures.

Copyright © 1996-2016 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences