Talos has added and modified multiple rules in the file-other, file-pdf, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:66487 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66488 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66489 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66490 <-> DISABLED <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt (server-webapp.rules) * 1:66491 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Agent variant communication (malware-cnc.rules) * 1:66501 <-> ENABLED <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt (server-webapp.rules) * 1:66502 <-> DISABLED <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt (server-webapp.rules) * 3:66498 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt (file-other.rules) * 3:66496 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt (file-other.rules) * 3:66495 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt (file-other.rules) * 3:66499 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt (file-other.rules) * 3:66492 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt (server-webapp.rules) * 3:66493 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt (file-pdf.rules) * 3:66497 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt (file-other.rules) * 3:66500 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt (file-other.rules) * 3:66494 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt (file-pdf.rules)
* 1:66437 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt (server-webapp.rules) * 3:66482 <-> ENABLED <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:66489 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66501 <-> ENABLED <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt (server-webapp.rules) * 1:66502 <-> DISABLED <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt (server-webapp.rules) * 1:66488 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66487 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66491 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Agent variant communication (malware-cnc.rules) * 1:66490 <-> DISABLED <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt (server-webapp.rules) * 3:66495 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt (file-other.rules) * 3:66496 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt (file-other.rules) * 3:66498 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt (file-other.rules) * 3:66499 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt (file-other.rules) * 3:66497 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt (file-other.rules) * 3:66494 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt (file-pdf.rules) * 3:66500 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt (file-other.rules) * 3:66492 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt (server-webapp.rules) * 3:66493 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt (file-pdf.rules)
* 1:66437 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt (server-webapp.rules) * 3:66482 <-> ENABLED <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:66490 <-> DISABLED <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt (server-webapp.rules) * 1:66488 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66487 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66501 <-> ENABLED <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt (server-webapp.rules) * 1:66502 <-> DISABLED <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt (server-webapp.rules) * 1:66489 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt (server-webapp.rules) * 1:66491 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Agent variant communication (malware-cnc.rules) * 3:66498 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt (file-other.rules) * 3:66496 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt (file-other.rules) * 3:66497 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt (file-other.rules) * 3:66499 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt (file-other.rules) * 3:66500 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt (file-other.rules) * 3:66493 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt (file-pdf.rules) * 3:66494 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt (file-pdf.rules) * 3:66492 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt (server-webapp.rules) * 3:66495 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt (file-other.rules)
* 1:66437 <-> DISABLED <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt (server-webapp.rules) * 3:66482 <-> ENABLED <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301508 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66487 <-> SERVER-WEBAPP Netgear ProSAFE NMS300 directory traversal attempt * 1:66490 <-> SERVER-WEBAPP Fortinet FortiWeb ApacheCookie_parse authentication bypass attempt * 1:66501 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 1:66502 <-> SERVER-WEBAPP NGINX rewrite module remote code execution attempt * 3:66492 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2392 attack attempt * 3:66493 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66494 <-> FILE-PDF TRUFFLEHUNTER TALOS-2026-2420 attack attempt * 3:66495 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66496 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2384 attack attempt * 3:66497 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66498 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2385 attack attempt * 3:66499 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt * 3:66500 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2386 attack attempt
* 1:66437 <-> SERVER-WEBAPP Netgear ProSafe NMS arbitrary JSP file upload attempt * 3:66482 <-> SERVER-OTHER Cisco SD-WAN self-signed DTLS client certificate connection attempt