*** EX RELS 03485 Release *** Total number of signatures: 6017 Description ================================================================== In this signature, we addressed the exploits/vulnerabilities and applications as below: Added 13 rule(s): --------------- 1137033 EXPLOIT SaltStack Salt ClearFuncs Directory Traversal -1 (CVE-2020-11652) 1137036 WEB Cisco UCS Director MyCallable call Directory Traversal -1.1 (CVE-2020-3251) 1137041 FILE Microsoft Adobe Font Manager Library Type 1 BlendDesignPositions Handling Buffer Overflow (CVE-2020-0938) 1137043 FILE Adobe Acrobat and Reader EScript Out of Bounds Read -1.1 (CVE-2020-3804) 1137047 FILE Microsoft Media Foundation GetKeyForIndex Out-of-Bounds Read (CVE-2020-0939) 1137049 WEB-CLIENT Microsoft Internet Explorer Scripting Engine CVE-2020-0674 Use After Free -1 1137051 WEB EyesOfNetwork 5.1-5.3 AutoDiscovery Target Command Execution (CVE-2020-8654) 1137052 WEB EyesOfNetwork 5.1-5.3 AutoDiscovery Target Command Execution (CVE-2020-8656) 1137053 WEB EyesOfNetwork 5.1-5.3 AutoDiscovery Target Command Execution (CVE-2020-9465) 1137057 FILE Adobe Acrobat and Reader AcroForm Use After Free (CVE-2020-3805) 1137058 DB PostgreSQL COPY FROM PROGRAM Command Execution -1.1 (CVE-2019-9193) 1137059 DB PostgreSQL COPY FROM PROGRAM Command Execution -1.2 (CVE-2019-9193) 1137061 EXPLOIT IBM TM1 / Planning Analytics Unauthenticated Remote Code Execution (CVE-2019-4716) Modified 5 rule(s): --------------- 1069037 IM WhatsApp access via SSL -1.1 1069733 IM WhatsApp access via TCP -1.1 1069734 IM WhatsApp access via TCP -1.2 1133081 WEB-CLIENT Microsoft Edge Array.join Type Confusion (CVE-2016-7189) 1160742 IM WhatsApp access via SSL -1.2 Deleted 2 rule(s): --------------- 1064015 IM WhatsApp login via SSL -1 (old rule) 1068766 IM WhatsApp login via SSL -2 (old rule)