Talos has added and modified multiple rules in the and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:66354 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66355 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66356 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66357 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66358 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66359 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66360 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66361 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66362 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66363 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66364 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66365 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66366 <-> DISABLED <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt (server-webapp.rules) * 1:66367 <-> DISABLED <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt (server-webapp.rules) * 1:66368 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66369 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66370 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66371 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66372 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66373 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66374 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66375 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66376 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 3:66377 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66378 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66379 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66380 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-other.rules)
* 1:66336 <-> DISABLED <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:66369 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66368 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66370 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66375 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66376 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66356 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66354 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66357 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66358 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66359 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66360 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66361 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66362 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66363 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66364 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66365 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66366 <-> DISABLED <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt (server-webapp.rules) * 1:66367 <-> DISABLED <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt (server-webapp.rules) * 1:66372 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66371 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66373 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66374 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66355 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 3:66377 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66378 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66379 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66380 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-other.rules)
* 1:66336 <-> DISABLED <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:66369 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66370 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66371 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66356 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66373 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66374 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66375 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66357 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66376 <-> DISABLED <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt (server-webapp.rules) * 1:66372 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt (server-webapp.rules) * 1:66361 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66354 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66367 <-> DISABLED <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt (server-webapp.rules) * 1:66368 <-> DISABLED <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt (server-webapp.rules) * 1:66366 <-> DISABLED <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt (server-webapp.rules) * 1:66359 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66355 <-> DISABLED <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt (server-webapp.rules) * 1:66358 <-> DISABLED <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt (server-webapp.rules) * 1:66362 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 1:66364 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66363 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66365 <-> DISABLED <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt (server-webapp.rules) * 1:66360 <-> DISABLED <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt (server-webapp.rules) * 3:66378 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66379 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules) * 3:66380 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-other.rules) * 3:66377 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt (server-webapp.rules)
* 1:66336 <-> DISABLED <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.
The format of the file is:
gid:sid <-> Message
* 1:66354 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66355 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66356 <-> SERVER-WEBAPP WordPress SEO Plugin SQL injection attempt * 1:66357 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66358 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66359 <-> SERVER-WEBAPP WordPress My Calendar Plugin SQL injection attempt * 1:66360 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66361 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66362 <-> SERVER-WEBAPP WordPress WP Statistics Plugin SQL injection attempt * 1:66363 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66364 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66365 <-> SERVER-WEBAPP WordPress Photo Gallery Plugin SQL injection attempt * 1:66366 <-> SERVER-WEBAPP Arcserve UDP ASNative.dll denial of service attempt * 1:66367 <-> SERVER-WEBAPP Kentico Xperience webshell upload attempt * 1:66368 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66369 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66370 <-> SERVER-WEBAPP SonicWall GMS SQL injection attempt * 1:66371 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66372 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66373 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 SQL injection attempt * 1:66374 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66375 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 1:66376 <-> SERVER-WEBAPP Yawave WordPress Plugin SQL injection attempt * 3:66377 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66378 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66379 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2379 attack attempt * 3:66380 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2026-2379 attack attempt
* 1:53688 <-> SERVER-WEBAPP Adobe Experience Manager server side request forgery attempt * 1:53733 <-> SERVER-WEBAPP IBM Data Risk Manager directory traversal attempt * 1:53734 <-> SERVER-WEBAPP IBM Data Risk Manager nmap scan command execution attempt * 1:53857 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53858 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53859 <-> SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt * 1:53860 <-> SERVER-WEBAPP Centurylink router unauthenticated administrator account disable attempt * 1:53967 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53968 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53969 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:53970 <-> SERVER-WEBAPP TerraMaster NAS user and group creation command injection attempt * 1:54003 <-> SERVER-WEBAPP Axway SecureTransport XML external entity injection attempt * 1:54012 <-> SERVER-WEBAPP ASUS ASUSWRT appGet.cgi command injection attempt * 1:54195 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54196 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54197 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54198 <-> SERVER-WEBAPP TP-LINK Cloud Cameras NCXXX Bonjour command injection attempt * 1:54272 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54273 <-> SERVER-WEBAPP Centreon Monitoring tool command injection attempt * 1:54405 <-> SERVER-WEBAPP PHP php_strip_tags_ex function out-of-bounds read attempt * 1:54462 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54484 <-> SERVER-WEBAPP F5 BIG-IP Traffic Management User Interface remote code execution attempt * 1:54511 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54556 <-> SERVER-WEBAPP BSA Radar local file inclusion attempt * 1:54558 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54559 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54565 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54566 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54567 <-> SERVER-WEBAPP Park Ticketing Management System SQL injection attempt * 1:54569 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54570 <-> SERVER-WEBAPP Barangay Management System SQL injection attempt * 1:54596 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54597 <-> SERVER-WEBAPP WordPress bbPress plugin unauthenticated privilege escalation attempt * 1:54602 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54603 <-> SERVER-WEBAPP Laravel Framework PendingCommand arbitrary command execution attempt * 1:54617 <-> SERVER-WEBAPP GeoVision Door Access Control hidden url access attempt * 1:54629 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54649 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54650 <-> SERVER-WEBAPP Apache Kylin REST API migrate command injection attempt * 1:54670 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project list disclosure attempt * 1:54671 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE project information disclosure attempt * 1:54672 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote code execution attempt * 1:54674 <-> SERVER-WEBAPP Rockwell FactoryTalk View SE remote project copy attempt * 1:54684 <-> SERVER-WEBAPP Microsoft Windows .NET API XML unsafe deserialization attempt * 1:54767 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54768 <-> SERVER-WEBAPP vBulletin template rendering arbitrary PHP code execution attempt * 1:54794 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54795 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54796 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54797 <-> SERVER-WEBAPP Zeroshell Linux Router command injection attempt * 1:54824 <-> SERVER-WEBAPP Intellian Aptus Web arbitrary command execution attempt * 1:55778 <-> SERVER-WEBAPP Wordpress File Manager plugin elFinder remote code execution attempt * 1:55797 <-> SERVER-WEBAPP Wordpress plugin WP Database Reset database reset attempt * 1:55823 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55824 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55825 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:55826 <-> SERVER-WEBAPP Microsoft Exchange Server DlpUtils remote code execution attempt * 1:55827 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55828 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55829 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet multiple functions SQL injection attempt * 1:55834 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55835 <-> SERVER-WEBAPP Wordpress Nexos theme cross site scripting attempt * 1:55836 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55837 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55838 <-> SERVER-WEBAPP Wordpress Nexos theme SQL injection attempt * 1:55839 <-> SERVER-WEBAPP Multiple products DVR admin password leak attempt * 1:55918 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55919 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55920 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55921 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:55981 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 command injection attempt * 1:56005 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56006 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56007 <-> SERVER-WEBAPP D-Link Central WiFi Manager CWM 100 SQL injection attempt * 1:56082 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56083 <-> SERVER-WEBAPP Wordpress WP Database Backup plug-in command injection attempt * 1:56135 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56136 <-> SERVER-WEBAPP Microsoft Sharepoint DataFormWebPart remote code execution attempt * 1:56138 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56154 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56155 <-> SERVER-WEBAPP MobileIron Core & Connector remote code execution attempt * 1:56162 <-> SERVER-WEBAPP Citrix ADC and Gateway information disclosure attempt * 1:56200 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56201 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56202 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56203 <-> SERVER-WEBAPP Oracle WebLogic Server command injection attempt * 1:56304 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56305 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:56404 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet arbitrary JSP file upload attempt * 1:56405 <-> SERVER-WEBAPP Cisco Security Manager XmpFileUploadServlet directory traversal attempt * 1:56414 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56415 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56416 <-> SERVER-WEBAPP Cisco Security Manager XmpFileDownloadServlet directory traversal attempt * 1:56417 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56418 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56419 <-> SERVER-WEBAPP Cisco Security Manager SampleFileDownloadServlet directory traversal attempt * 1:56420 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56421 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56422 <-> SERVER-WEBAPP Cisco Security Manager resultsFrame directory traversal attempt * 1:56423 <-> SERVER-WEBAPP Cisco Security Manager xdmProxy directory traversal attempt * 1:56432 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56433 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56434 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56435 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:56497 <-> SERVER-WEBAPP Multiple Products Java Faces ViewState deserialization remote code execution attempt * 1:56519 <-> SERVER-WEBAPP WordPress plugin Autoptimize arbitrary PHP file upload attempt * 1:56520 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56521 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56522 <-> SERVER-WEBAPP QNAP QTS and Photo Station directory traversal attempt * 1:56523 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56524 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56525 <-> SERVER-WEBAPP Joomla Core Featured Article SQL injection attempt * 1:56532 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56533 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56534 <-> SERVER-WEBAPP Advantech WebAccess NMS directory traversal attempt * 1:56545 <-> SERVER-WEBAPP rConfig commands.inc.php SQL injection attempt * 1:56550 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI authentication bypass attempt * 1:56551 <-> SERVER-WEBAPP Ruckus IoT Controller Web UI OS username command injection attempt * 1:56557 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56558 <-> SERVER-WEBAPP Microsoft Dynamics365 Finance and Operations remote code execution attempt * 1:56586 <-> SERVER-WEBAPP Zoho ManageEngine ServiceDesk Plus arbitrary JSP file upload attempt * 1:56604 <-> SERVER-WEBAPP Microsoft Dynamics NAV remote code execution attempt * 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt * 1:56799 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56800 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:56823 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56824 <-> SERVER-WEBAPP Citrix CakePHP command injection attempt * 1:56826 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56827 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56828 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56829 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56830 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56831 <-> SERVER-WEBAPP WordPress Adning Advertising plugin arbitrary PHP file upload attempt * 1:56877 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56878 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56879 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56880 <-> SERVER-WEBAPP Nagios XI mibs.php remote command injection attempt * 1:56916 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56917 <-> SERVER-WEBAPP SolarWinds Orion authentication bypass attempt * 1:56934 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56935 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56936 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56937 <-> SERVER-WEBAPP Nagios XI ajaxhelper command injection attempt * 1:56990 <-> SERVER-WEBAPP Apache Unomi OGNL MVEL2 remote command execution attempt * 1:57002 <-> SERVER-WEBAPP Belkin Wemo UPnP cross site scripting attempt * 1:57048 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57049 <-> SERVER-WEBAPP SaltStack Salt API SSH Client command injection attempt * 1:57072 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57074 <-> SERVER-WEBAPP Cisco RV Series Routers directory traversal attempt * 1:57075 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57076 <-> SERVER-WEBAPP Cisco RV Series Routers command injection attempt * 1:57078 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57079 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57080 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57081 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57082 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57084 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57085 <-> SERVER-WEBAPP Cisco RV series routers command injection attempt * 1:57086 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57088 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57089 <-> SERVER-WEBAPP Cisco Small Business RV Series routers command injection attempt * 1:57095 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57096 <-> SERVER-WEBAPP Cisco RV Series routers command injection attempt * 1:57098 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57099 <-> SERVER-WEBAPP Cisco RV Series Routers stack buffer overflow attempt * 1:57100 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57101 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57102 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57105 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57109 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57110 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57113 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57114 <-> SERVER-WEBAPP Cisco RV Series routers stack overflow attempt * 1:57126 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57127 <-> SERVER-WEBAPP Monstra CMS cross-site scripting attempt * 1:57158 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57159 <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt * 1:57176 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57177 <-> SERVER-WEBAPP MikroTik RouterOS buffer overflow attempt * 1:57178 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57179 <-> SERVER-WEBAPP Monstra CMS registration form cross site scripting attempt * 1:57182 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57183 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57184 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57185 <-> SERVER-WEBAPP VMware administrative configurator component command injection attempt * 1:57188 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center arbitrary Java object deserialization attempt * 1:57224 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57225 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57226 <-> SERVER-WEBAPP Trend Micro Control Manager directory traversal attempt * 1:57229 <-> SERVER-WEBAPP VMware vSphere Client vROPs plugin remote code execution attempt * 1:57241 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57242 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57243 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57244 <-> SERVER-WEBAPP Microsoft Exchange Server server side request forgery attempt * 1:57245 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57246 <-> SERVER-WEBAPP Microsoft Exchange Server arbitrary file write attempt * 1:57275 <-> SERVER-WEBAPP ysoserial TypeConfuseDelegate deserialization exploit attempt * 1:57276 <-> SERVER-WEBAPP Microsoft SharePoint potential deserialization attempt * 1:57283 <-> SERVER-WEBAPP Liferay arbitrary Java object deserialization attempt * 1:57298 <-> SERVER-WEBAPP F5 iControl REST interface command injection attempt * 1:57324 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57325 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57326 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57327 <-> SERVER-WEBAPP Netis WF2419 router command injection attempt * 1:57328 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57329 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57330 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57331 <-> SERVER-WEBAPP D-Link DNS-320 Firewall command injection attempt * 1:57332 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57333 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57334 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57335 <-> SERVER-WEBAPP Netgear ProSAFE Plus unauthenticated command injection attempt * 1:57337 <-> SERVER-WEBAPP F5 iControl REST interface ssrf attempt * 1:57389 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57390 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57391 <-> SERVER-WEBAPP Advantech iView DeviceTreeTable directory traversal attempt * 1:57406 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57407 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57408 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57409 <-> SERVER-WEBAPP Palo Alto Networks management interface command injection attempt * 1:57412 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57413 <-> SERVER-WEBAPP Nagios XI do_update_user SQL injection attempt * 1:57426 <-> SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt * 1:57434 <-> SERVER-WEBAPP VMware vRealize Operations Manager directory traversal attempt * 1:57435 <-> SERVER-WEBAPP VMware vRealize Operations Manager SSRF attempt * 1:57436 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57437 <-> SERVER-WEBAPP VMware View Planner logupload directory traversal attempt * 1:57438 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57439 <-> SERVER-WEBAPP VMware View Planner logupload arbitrary file upload attempt * 1:57442 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57443 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57444 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57445 <-> SERVER-WEBAPP Terramaster TOS command injection attempt * 1:57449 <-> SERVER-WEBAPP F5 TMM crafted IPv6 URI buffer overflow attempt * 1:57453 <-> SERVER-WEBAPP Pulse Connect Secure remote code execution attempt * 1:57481 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57482 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57483 <-> SERVER-WEBAPP ManageEngine OpManager directory traversal attempt * 1:57487 <-> SERVER-WEBAPP Microsoft Exchange MeetingHandler remote code execution attempt * 1:57490 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57491 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57492 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57493 <-> SERVER-WEBAPP Klog Server authenticate.php user command injection attempt * 1:57494 <-> SERVER-WEBAPP Micro Focus Operations Bridge Manager remote code execution attempt * 1:57500 <-> SERVER-WEBAPP HPE Intelligent Management Center IccSelectDevTypeBean Expression Language Injection Java expression language injection attempt * 1:57511 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57512 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57513 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57514 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57515 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57516 <-> SERVER-WEBAPP Sinapsi eSolar Light Photovoltaic System Monitor SQL injection attempt * 1:57517 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57518 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57519 <-> SERVER-WEBAPP Serendipity index.php SQL injection attempt * 1:57548 <-> SERVER-WEBAPP Microsoft SharePoint authenticated remote code execution attempt * 1:57570 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57571 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57572 <-> SERVER-WEBAPP WordPRess DZS Video Gallery directory traversal attempt * 1:57573 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57574 <-> SERVER-WEBAPP WordPress DZS Video Gallery remote file include attempt * 1:57720 <-> SERVER-WEBAPP VMWare vSphere Client remote code execution attempt * 1:57761 <-> SERVER-WEBAPP TP-Link WiFi router authenticated PingIframeRpm stack buffer overflow attempt * 1:57762 <-> SERVER-WEBAPP TP-Link WiFi router authenticated WanStaticIpV6CfgRpm stack buffer overflow attempt * 1:57809 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57810 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57811 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57812 <-> SERVER-WEBAPP Nagios XI autodiscovery_component_update_cron command injection attempt * 1:57834 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center remote code execution attempt * 1:57841 <-> SERVER-WEBAPP Nagios Fusion command injection attempt * 1:57856 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57857 <-> SERVER-WEBAPP Cisco ASA cross site scripting attempt * 1:57860 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57861 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57862 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57863 <-> SERVER-WEBAPP Trend Micro SafeSync for Enterprise command injection attempt * 1:57872 <-> SERVER-WEBAPP Facade Ignition remote code execution attempt * 1:57902 <-> SERVER-WEBAPP HPE Systems Insight Manager remote code execution attempt * 1:57906 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57907 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57908 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57909 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:57910 <-> SERVER-WEBAPP Microsoft SharePoint Server authenticated remote code execution attempt * 1:57911 <-> SERVER-WEBAPP Nagios XI monitoringplugins.php command injection attempt * 1:57912 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57913 <-> SERVER-WEBAPP ForgeRock Open Access Manager remote code execution attempt * 1:57954 <-> SERVER-WEBAPP Velocloud VMware SD-WAN Orchestrator SQL injection attempt * 1:57983 <-> SERVER-WEBAPP Microsoft Exchange autodiscover server side request forgery attempt * 1:58018 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58019 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58020 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58021 <-> SERVER-WEBAPP Fortinet FortiWeb SAML server configuration page command injection attempt * 1:58026 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58027 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58028 <-> SERVER-WEBAPP Zoho ManageEngine OpManager OPMDeviceDetailsServlet SQL injection attempt * 1:58042 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58043 <-> SERVER-WEBAPP Serv-U FTP Server stored cross site scripting attempt * 1:58052 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58053 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58054 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58055 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58056 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58057 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58058 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58059 <-> SERVER-WEBAPP Realtek Jungle SDK command injection attempt * 1:58063 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58064 <-> SERVER-WEBAPP Kentico CMS unsafe deserialization remote code execution attempt * 1:58067 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58068 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58069 <-> SERVER-WEBAPP Apache Flink FileUploadHandler directory traversal attempt * 1:58093 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58094 <-> SERVER-WEBAPP Atlassian Confluence OGNL injection remote code execution attempt * 1:58111 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58112 <-> SERVER-WEBAPP Microsoft SharePoint remote code execution attempt * 1:58113 <-> SERVER-WEBAPP Microsoft SharePoint machinekey information disclosure attempt * 1:58169 <-> SERVER-WEBAPP Microsoft Windows Open Management Infrastructure remote code execution attempt * 1:58170 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58171 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58172 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58173 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector command injection attempt * 1:58201 <-> SERVER-WEBAPP Zoho ManageEngine ADSelfService Plus RestAPI authentication bypass attempt * 1:58217 <-> SERVER-WEBAPP VMware vCenter Server remote code execution attempt * 1:58218 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58219 <-> SERVER-WEBAPP VMware vCenter Server file upload attempt * 1:58224 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58225 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58226 <-> SERVER-WEBAPP SonicWall SMA100 SQL injection attempt * 1:58227 <-> SERVER-WEBAPP Dell EMC Virtual Appliance Manager undocumented credential use attempt * 1:58230 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58231 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58232 <-> SERVER-WEBAPP QNAP NAS Malware Remover directory traversal attempt * 1:58242 <-> SERVER-WEBAPP Sophos XG Firewall SQL injection attempt * 1:58245 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58246 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58247 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58248 <-> SERVER-WEBAPP UDP Technology IP Camera command injection attempt * 1:58249 <-> SERVER-WEBAPP Microsoft Exchange server security feature bypass attempt * 1:58260 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58261 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58262 <-> SERVER-WEBAPP AlienVault Unified Security Management SQL injection attempt * 1:58263 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58264 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58265 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58266 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58267 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58268 <-> SERVER-WEBAPP MailEnable Enterprise Premium directory traversal attempt * 1:58269 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58270 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58271 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58272 <-> SERVER-WEBAPP IBM Spectrum Protect Plus command injection attempt * 1:58273 <-> SERVER-WEBAPP QNAP HBS 3 authorization bypass attempt * 1:58274 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58275 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet expression language injection attempt * 1:58282 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfAddFormServer Java expression language injection attempt * 1:58283 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfSelItemServer Java expression language injection attempt * 1:58284 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center FileUploadServlet Unrestricted arbitrary JSP file upload attempt * 1:58285 <-> SERVER-WEBAPP Trend Micro Control Manager ProductTree_RightWindow XML external entity injection attempt * 1:58290 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58291 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58292 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58293 <-> SERVER-WEBAPP Trend Micro Encryption for Email Gateway registration command injection attempt * 1:58315 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58316 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58318 <-> SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt * 1:58320 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58321 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58322 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formChangePass username SQL injection attempt * 1:58323 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58324 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58325 <-> SERVER-WEBAPP Advantech WebAccess Node Quality ItemGroupIdAry SQL injection attempt * 1:58326 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58327 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58328 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58329 <-> SERVER-WEBAPP ARRIS VAP2500 list_mac_address macaddr command injection attempt * 1:58330 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58331 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58332 <-> SERVER-WEBAPP Advantech WebAccess Node controlNode bnid SQL injection attempt * 1:58333 <-> SERVER-WEBAPP Trend Micro Control Manager DeploymentPlan_Event_Handler XML external entity injection attempt * 1:58337 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58338 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58339 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58340 <-> SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt * 1:58341 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58342 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58343 <-> SERVER-WEBAPP PHPMyAdmin SearchController SQL injection attempt * 1:58352 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet UpdateProblemTickets XML external entity injection attempt * 1:58353 <-> SERVER-WEBAPP Advantech WebAccess Node Quality_Reg ItemIdAry SQL injection attempt * 1:58355 <-> SERVER-WEBAPP GE MDS PulseNET HealthCheck arbitrary Java object deserialization attempt * 1:58362 <-> SERVER-WEBAPP Advantech WebAccess Node BWSCADASoap ProjectName SQL injection attempt * 1:58375 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58376 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center iccSelectCommand expression language injection attempt * 1:58377 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58378 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center eventInfo_content expression language injection attempt * 1:58379 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58380 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt * 1:58381 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58382 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58383 <-> SERVER-WEBAPP Trend Micro Encryption Email Gateway formConfiguration saveValue SQL injection attempt * 1:58384 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58385 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt * 1:58388 <-> SERVER-WEBAPP ARRIS VAP2500 config_wds command injection attempt * 1:58396 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58397 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58398 <-> SERVER-WEBAPP Nagios XI PHP file injection attempt * 1:58399 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58400 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58401 <-> SERVER-WEBAPP Nagios XI directory traversal attempt * 1:58403 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58404 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58405 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58406 <-> SERVER-WEBAPP Nagios XI Watchguard wizard command injection attempt * 1:58407 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58408 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58409 <-> SERVER-WEBAPP Nagios XI bulk modification tool SQL injection attempt * 1:58410 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58411 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58412 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58413 <-> SERVER-WEBAPP IBM Spectrum Protect Plus changeAdministratorPassword command injection attempt * 1:58418 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58419 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58420 <-> SERVER-WEBAPP ReadyDesk 9.1 OpenAttach2 directory traversal attempt * 1:58421 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58422 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58423 <-> SERVER-WEBAPP BillQuick Web Suite SQL injection attempt * 1:58424 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58425 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58426 <-> SERVER-WEBAPP Schneider Electric Umotion Builder Virtual Appliance Css directory traversal attempt * 1:58427 <-> SERVER-WEBAPP Trend Micro Control Manager widget_old_SP1 dlp_policy directory traversal attempt * 1:58428 <-> SERVER-WEBAPP Trend Micro Control Manager Widget modDLPViolationCntdrildown.php directory traversal attempt * 1:58454 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58455 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58456 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58457 <-> SERVER-WEBAPP ARRIS VAP2500 assoc_table command injection attempt * 1:58464 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58465 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58466 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance File Deletion directory traversal attempt * 1:58467 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58468 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58469 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance directory traversal attempt * 1:58470 <-> SERVER-WEBAPP Trend Micro Deep Discovery Email Inspector Virtual Appliance policy_setting arbitrary PHP file upload attempt * 1:58471 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58472 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58473 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet SQL injection attempt * 1:58475 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58476 <-> SERVER-WEBAPP Oracle WebLogic Server DeploymentService directory traversal attempt * 1:58487 <-> SERVER-WEBAPP WordPress Snap Creek Duplicator and Duplicator Pro plugins directory traversal attempt * 1:58499 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58500 <-> SERVER-WEBAPP Zyxel Unified Security Gateway undocumented administrator account login attempt * 1:58502 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58503 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58504 <-> SERVER-WEBAPP SonicWall Email Security directory traversal attempt * 1:58505 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58506 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58507 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58508 <-> SERVER-WEBAPP Tenda Router command injection attempt * 1:58509 <-> SERVER-WEBAPP Accellion File Transfer Appliance SQL injection attempt * 1:58510 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58511 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58512 <-> SERVER-WEBAPP EyesOfNetwork SQL injection attempt * 1:58513 <-> SERVER-WEBAPP Advantech WebAccess updateTemplate SQL injection attempt * 1:58514 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58515 <-> SERVER-WEBAPP EyesOfNetwork autodiscovery command injection attempt * 1:58517 <-> SERVER-WEBAPP GE MDS PulseNET IntegrationXMLProcessorServlet AlarmActions XML external entity injection attempt * 1:58521 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center perfInsListServer Java expression language injection attempt * 1:58522 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58523 <-> SERVER-WEBAPP rConfig ajaxAddTemplate.php command injection attempt * 1:58525 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center directory traversal attempt * 1:58529 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58530 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58531 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58532 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58533 <-> SERVER-WEBAPP Buffalo WSR router configuration injection attempt * 1:58538 <-> SERVER-WEBAPP Arcadyan routers path traversal attempt * 1:58542 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58543 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58544 <-> SERVER-WEBAPP Trend Micro Control Manager CCGIServlet EmailMessageDetected SQL injection attempt * 1:58546 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet arbitrary Java object deserialization attempt * 1:58555 <-> SERVER-WEBAPP Hikvision webLanguage command injection vulnerability * 1:58562 <-> SERVER-WEBAPP Oracle WebLogic Server remote code execution attempt * 1:58563 <-> SERVER-WEBAPP GE MDS PulseNET foglight service arbitrary Java object deserialization attempt * 1:58567 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58568 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58569 <-> SERVER-WEBAPP Roundcube Webmail file disclosure attempt * 1:58576 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58577 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58578 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58579 <-> SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt * 1:58588 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58589 <-> SERVER-WEBAPP SolarWinds Network Configuration Manager remote file include attempt * 1:58592 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58593 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58594 <-> SERVER-WEBAPP SaltStack pillar_roots directory traversal attempt * 1:58595 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58596 <-> SERVER-WEBAPP OpenEMR backup.php command injection attempt * 1:58605 <-> SERVER-WEBAPP Citrix StoreFront Server XML external entity injection attempt * 1:58606 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58607 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:58608 <-> SERVER-WEBAPP SAP NetWeaver AS JAVA CRM log injection attempt * 1:66336 <-> SERVER-WEBAPP FlowiseAI Flowise arbitrary code execution attempt