Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1:65923
This rule looks for specific bytes included in the malicious file used to exploit the vulnerability. Successful exploitation could allow an attacker to elevate privileges.
1:65924
This rule looks for specific bytes included in the malicious file used to exploit the vulnerability. Successful exploitation could allow an attacker to elevate privileges.
1:65925
This rule looks for command injection metacharacters present in the following parameters in HTTP requests sent to the /admin/ajax.php endpoint on Sangoma FreePBX web applications: host, port, user, key, path.
1:65926
This rule looks for command injection metacharacters present in the following parameters in HTTP requests sent to the /admin/ajax.php endpoint on Sangoma FreePBX web applications: host, port, user, key, path.
1:65927
This rule looks for command injection metacharacters present in the following parameters in HTTP requests sent to the /admin/ajax.php endpoint on Sangoma FreePBX web applications: host, port, user, key, path.
1:65928
This rule looks for command injection metacharacters present in the following parameters in HTTP requests sent to the /admin/ajax.php endpoint on Sangoma FreePBX web applications: host, port, user, key, path.