*** NK8 RELS 3319 Release *** Total number of signatures: 3202 Description ================================================================== In this signature, we addressed the exploits/vulnerabilities and applications as below: Added 10 rule(s): --------------- 1133528 WEB Apache Struts 2 Remote Code Execution -1 (CVE-2017-5638) 1133529 WEB Apache Struts 2 Remote Code Execution -2 (CVE-2017-5638) 1133530 WEB Apache Struts 2 Remote Code Execution -3 (CVE-2017-5638) 1133534 MALWARE Suspicious IoT Worm TELNET Activity -2 1133545 WEB PHP zend_hash_destroy Uninitialized Pointer Code Execution -1 (CVE-2017-5340) 1160068 MEDIA Periscope access via SSL -1 1160069 MEDIA Periscope access via SSL -2 1160175 VOIP LINE communicate via UDP -3 1160176 VOIP LINE communicate via UDP -4 1160177 MEDIA Periscope access via SSL -3 Modified 13 rule(s): --------------- 1054840 WEB SQL injection attempt -6 1056085 EXPLOIT Remote Command Execution via Perl -2 1056153 WEB SQL injection select from attempt -3.u 1058039 WEB SQL injection attempt -2.b 1058470 WEB SQL injection attempt -17.a 1058626 WEB Generic XXE Information Disclosure -1 1058627 WEB Generic XXE Information Disclosure -2 1080006 SG - TUNNEL Tor connect via TCP 1132543 WEB Apache Struts Dynamic Method Invocation Remote Code Execution -1.a 1133148 MALWARE Suspicious IoT Worm TELNET Activity -1 1133211 WEB-CLIENT Microsoft Edge Chakra Array.shift Type Confusion -2 (CVE-2016-7201) 1133524 WEB-CLIENT Multiple Browser WebKit Exploit Remote Code Execution -1 (CVE-2016-4657) 1133525 WEB-CLIENT Multiple Browser WebKit Exploit Remote Code Execution -2 (CVE-2016-4657) Deleted 0 rule(s): ---------------