This update package improves the detection capabilities of the Forcepoint LLM system.
Risk |
Vulnerability/Situation |
References |
Related Fingerprint |
Situation Type |
Change Description |
High |
Geutebruck-Multiple-RCE-CVE-2021-335xx |
CVE-2021-33543 |
HTTP_CRL-Geutebruck-Multiple-RCE-CVE-2021-335xx |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Roundcube-Webmail-RCE-Via-Config-Setting-CVE-2020-12641 |
CVE-2020-12641 |
HTTP_CRL-Roundcube-Webmail-ECE-Via-Config-Setting-CVE-2020-12641 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839 |
CVE-2018-14839 |
HTTP_CRL-LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Sunhillo-Sureline-Command-Injection-CVE-2021-36380 |
CVE-2021-36380 |
HTTP_CRL-Sunhillo-Sureline-Command-Injection-CVE-2021-36380 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Korenix-Jetwave-Command-Injection-CVE-2023-23294 |
CVE-2023-23294 |
HTTP_CRL-Korenix-Jetwave-Command-Injection-CVE-2023-23294 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961 |
CVE-2018-6961 |
HTTP_CRL-VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Netgate-Pfsense-Command-Injection-CVE-2023-42326 |
CVE-2023-42326 |
HTTP_CRL-Netgate-Pfsense-Command-Injection-CVE-2023-42326 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897 |
CVE-2023-49897 |
HTTP_CRL-FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
LB-Link-Command-Injection-CVE-2023-26801 |
CVE-2023-26801 |
HTTP_CRL-LB-Link-Command-Injection-CVE-2023-26801 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029 |
CVE-2024-7029 |
HTTP_CRL-Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities |
No CVE/CAN |
HTTP_CRL-Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464 |
CVE-2024-9464 |
HTTP_CRL-Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957 |
CVE-2024-8957 |
HTTP_CRL-VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474 |
CVE-2024-9474 |
HTTP_CRL-Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
LibreNMS-Authenticated-Command-Injection-CVE-2024-51092 |
CVE-2024-51092 |
HTTP_CRL-LibreNMS-Authenticated-Command-Injection-CVE-2024-51092 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Digiever-DS2105-Pro-Remote-Code-Execution |
No CVE/CAN |
HTTP_CRL-Digiever-DS2105-Pro-Remote-Code-Execution |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532 |
CVE-2018-17532 |
HTTP_CRL-Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856 |
CVE-2024-12856 |
HTTP_CRL-Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404 |
CVE-2024-37404 |
HTTP_CRL-Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404 |
Suspected Compromise |
Detection mechanism updated |
|
High |
D-Link-TRENDnet-NCC-Service-Command-Injection |
CVE-2015-1187 |
HTTP_CRL-D-Link-TRENDnet-NCC-Service-Command-Injection |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
Pfsense-Post-Auth-Group-Member-Command-Execution |
No CVE/CAN |
HTTP_CRL-Pfsense-Post-Auth-Group-Member-Command-Execution |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579 |
CVE-2019-1579 |
HTTP_CRL-PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579 |
Suspected Compromise |
Fingerprint regexp changed |
|
Type |
Name |
Changes |
IPList |
TOR exit nodes IP Address List |
|
IPList |
Akamai Servers |
|
IPList |
TOR relay nodes IP Address List |
|
IPList |
Malicious Site IP Address List |
|
IPList |
NordVPN Servers IP Address List |
|
Situation |
HTTP_CSU-Shared-Variables |
|
Situation |
HTTP_CS-Cyberpanel-Incorrect-Default-Permissions-Vulnerability |
Description has changed |
Attacker: connection_source->none |
Victim: connection_destination->none |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag application CyberPanel removed |
Category tag group CVE2024 removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag situation Potential Compromise removed |
Category tag group HTTP Correlation Dependency Group removed |
Category tag group TCP Correlation Dependency Group removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
Category tag group TCP Client Traffic removed |
|
Situation |
HTTP_CS-Shared-Variables-For-Client-Stream-Context |
Fingerprint regexp changed |
|
Situation |
E-Mail_HCS-Shared-Variables |
Fingerprint regexp changed |
|
Situation |
File-Text_Shared-Variables |
Fingerprint regexp changed |
|
Application |
Akamai-Infrastructure |
|
Application |
TOR |
|
Application |
Manoto |
|
Application |
NordVPN |
|