Talos Rules 2026-02-12
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-other, file-flash, file-pdf, os-windows, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2026-02-12 13:33:22 UTC

Snort Subscriber Rules Update

Date: 2026-02-12

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65925 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65926 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65927 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65928 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65929 <-> DISABLED <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt (browser-other.rules)
 * 1:65930 <-> DISABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65931 <-> DISABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65932 <-> ENABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65933 <-> ENABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65934 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt (server-webapp.rules)
 * 1:65935 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt (server-webapp.rules)
 * 1:65936 <-> ENABLED <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt (os-windows.rules)
 * 1:65937 <-> ENABLED <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt (os-windows.rules)

Modified Rules:


 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65904 <-> DISABLED <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt (server-webapp.rules)
 * 1:25549 <-> DISABLED <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt (server-other.rules)
 * 1:25550 <-> DISABLED <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt (server-other.rules)
 * 1:48566 <-> DISABLED <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt (file-flash.rules)
 * 1:48567 <-> DISABLED <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt (file-flash.rules)
 * 1:50862 <-> DISABLED <-> FILE-PDF Soda PDF denial of service attempt (file-pdf.rules)
 * 1:50863 <-> DISABLED <-> FILE-PDF Soda PDF denial of service attempt (file-pdf.rules)
 * 1:59017 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)
 * 1:64374 <-> DISABLED <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt (policy-other.rules)

2026-02-12 13:33:22 UTC

Snort Subscriber Rules Update

Date: 2026-02-12

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65926 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65934 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt (server-webapp.rules)
 * 1:65936 <-> ENABLED <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt (os-windows.rules)
 * 1:65925 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65935 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt (server-webapp.rules)
 * 1:65937 <-> ENABLED <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt (os-windows.rules)
 * 1:65927 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65929 <-> DISABLED <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt (browser-other.rules)
 * 1:65933 <-> ENABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65930 <-> DISABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65931 <-> DISABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65928 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65932 <-> ENABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)

Modified Rules:


 * 1:65904 <-> DISABLED <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt (server-webapp.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:50862 <-> DISABLED <-> FILE-PDF Soda PDF denial of service attempt (file-pdf.rules)
 * 1:48566 <-> DISABLED <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt (file-flash.rules)
 * 1:64374 <-> DISABLED <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt (policy-other.rules)
 * 1:48567 <-> DISABLED <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt (file-flash.rules)
 * 1:50863 <-> DISABLED <-> FILE-PDF Soda PDF denial of service attempt (file-pdf.rules)
 * 1:59017 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)
 * 1:25550 <-> DISABLED <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt (server-other.rules)
 * 1:25549 <-> DISABLED <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt (server-other.rules)

2026-02-12 13:33:22 UTC

Snort Subscriber Rules Update

Date: 2026-02-12

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65931 <-> DISABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65925 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65930 <-> DISABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65933 <-> ENABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65935 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt (server-webapp.rules)
 * 1:65934 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt (server-webapp.rules)
 * 1:65937 <-> ENABLED <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt (os-windows.rules)
 * 1:65936 <-> ENABLED <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt (os-windows.rules)
 * 1:65932 <-> ENABLED <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt (server-webapp.rules)
 * 1:65928 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65929 <-> DISABLED <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt (browser-other.rules)
 * 1:65927 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)
 * 1:65926 <-> DISABLED <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:25550 <-> DISABLED <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt (server-other.rules)
 * 1:50863 <-> DISABLED <-> FILE-PDF Soda PDF denial of service attempt (file-pdf.rules)
 * 1:65904 <-> DISABLED <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt (server-webapp.rules)
 * 1:25549 <-> DISABLED <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt (server-other.rules)
 * 1:50862 <-> DISABLED <-> FILE-PDF Soda PDF denial of service attempt (file-pdf.rules)
 * 1:48567 <-> DISABLED <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt (file-flash.rules)
 * 1:59017 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:64374 <-> DISABLED <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt (policy-other.rules)
 * 1:48566 <-> DISABLED <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt (file-flash.rules)

2026-02-12 13:41:15 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:15 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:15 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:15 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt


2026-02-12 13:41:16 UTC

Snort Subscriber Rules Update

Date: 2026-02-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301404 <-> OS-WINDOWS Microsoft Windows MSHTML Framework security feature bypass attempt
* 1:65925 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65926 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65927 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65928 <-> SERVER-WEBAPP Sangoma FreePBX command injection attempt
* 1:65929 <-> BROWSER-OTHER Cisco Webex Teams URI scheme remote code execution attempt
* 1:65930 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65931 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65932 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65933 <-> SERVER-WEBAPP Vite Vitejs arbitrary file read attempt
* 1:65934 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt
* 1:65935 <-> SERVER-WEBAPP Sangoma FreePBX authentication bypass attempt

Modified Rules:

* 1:25549 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:25550 <-> SERVER-OTHER Novell eDirectory NCP stack buffer overflow attempt
* 1:48491 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48492 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48493 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48494 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48495 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48496 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:48567 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50534 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50535 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50536 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50537 <-> FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
* 1:50862 <-> FILE-PDF Soda PDF denial of service attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:64374 <-> POLICY-OTHER WordPress Really Simple Security plugin potential authentication bypass attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65904 <-> SERVER-WEBAPP Gaizhenbiao Chuanhuchatgpt queue_join absolute path directory traversal attempt