Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:65454
This rule looks for inbound requests to the "/OA.jsp" endpoint on Oracle E-Business Suite web applications that attempt to invoke the Template Preview functionality. Attackers have been observed targeting this functionality to execute previously uploaded malicious XSL or XML files.
1:65455
This rule looks for inbound requests to the "/OA_HTML/SyncServlet" endpoint on Oracle E-Business Suite web applications. Attackers have been observed targeting this endpoint with an authentication bypass exploit to enable subsequent attacks that allow for remote code execution.
1:65456
This rule looks for requests to the /OA_HTML/OA.jsp endpoint of Oracle E-Business Suite web applications. Malicious XSLT documents may be uploaded using this endpoint and later triggered by attempting to preview the file. This can lead to remote code execution by an unauthenticated attacker.
1:65452
This rule looks for specially crafted inbound HTTP requests to the "/adminui/" endpoint on Adobe Experience Manager web applications that attempt to invoke the Struts2 devMode feature to execute arbitrary OGNL expressions. Attackers have been observed exploiting an authentication bypass vulnerability (CVE-2025-54253) to be able to invoke devMode functionality.
1:65451
Revolution PiCtory is vulnerable to a stored cross site scripting attack in the `fn` parameter on the `saveProject` endpoint. Attackers who abuse this can execute code on the victims browser in the context of the user. This can be used to steal credentials, send the user to unwanted websites, or abuse other access on the application.
1:65453
This rule looks for attempts to bypass authentication in Adobe Experience Manager by including "login." as a path parameter.