Release notes for update package 1906-5242

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Thursday July 24, 2025
MD5 CHECKSUM:     143866547548231ca8f96638a3ff8721
SHA1 CHECKSUM:     c87acf3c3e9b47c643b32d6937020f8642876fca
SHA256 CHECKSUM:     acd4df93bea684430788bb4218c24a256a8e32d0a2f9b516d64d6dd5d9a0432c


UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An indicator-of-compromise for a Microsoft Sharepoint vulnerability detected     CVE-2025-49704     Microsoft-SharePoint-Remote-Code-Execution-Vulnerability-CVE-2025-49704
High     An attempt to exploit a vulnerability in Adobe ColdFusion detected     CVE-2025-43562     Adobe-ColdFusion-System-Probes-Command-Injection-CVE-2025-43562
High     An attempt to exploit a vulnerability in Adobe ColdFusion detected     CVE-2025-43562     Adobe-ColdFusion-System-Probes-Command-Injection-CVE-2025-43562
High     An attempt to exploit a vulnerability in Lighthouse Studio detected     CVE-2025-34300     Lighthouse-Studio-Template-Injection-CVE-2025-34300
High     Possible SQL injection detected     No CVE/CAN SQL-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Adobe-ColdFusion-System-Probes-Command-Injection-CVE-2025-43562 CVE-2025-43562 HTTP_CS-Adobe-ColdFusion-System-Probes-Command-Injection-CVE-2025-43562 Suspected Compromise

HTTP Request URI

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Microsoft-SharePoint-Remote-Code-Execution-Vulnerability-CVE-2025-49704 CVE-2025-49704 HTTP_CRL-IoC-Microsoft-SharePoint-Remote-Code-Execution-CVE-2025-49704 Suspected Compromise
High Lighthouse-Studio-Template-Injection-CVE-2025-34300 CVE-2025-34300 HTTP_CSU-Lighthouse-Studio-Template-Injection-CVE-2025-34300 Suspected Compromise

HTTP Request Header Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High SQL-Injection No CVE/CAN HTTP_CSH-Possible-SQL-Syntax-In-Client-Header Potential Compromise

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Adobe-ColdFusion-System-Probes-Command-Injection-CVE-2025-43562 CVE-2025-43562 HTTP_CRL-Adobe-ColdFusion-System-Probes-Command-Injection-CVE-2025-43562 Suspected Compromise

Updated detected attacks:

TCP Client Stream Unknown

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Windows-Connected-Devices-Platform-Service-Remote-Code-Execution-CVE-2025-49724 CVE-2025-49724 Generic_CS-Windows-Connected-Devices-Platform-Service-Remote-Code-Execution-CVE-2025-49724 Potential Compromise
Name: Generic_CS-Windows-Connected-Devices-Platform-Service-Remote-Code-Execution-CVE-2025-49704->Generic_CS-Windows-Connected-Devices-Platform-Service-Remote-Code-Execution-CVE-2025-49724
Comment has changed
Description has changed
Category tag group MS2025-07 added

HTTP Request Header Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
Critical SQL-Injection No CVE/CAN HTTP_CSH-SQL-Union-Select-In-Client-Referer-Header Compromise
Name: HTTP_CSH-SQL-Union-Select->HTTP_CSH-SQL-Union-Select-In-Client-Referer-Header
Description has changed
High Generic-HTTP-Exploit No CVE/CAN HTTP_CHS-Suspicious-Host Suspected Compromise
Detection mechanism updated
High SQL-Injection No CVE/CAN HTTP_CSH-SQL-Select-In-Client-Header Suspected Compromise
Name: HTTP_CSH-Possible-SQL-Injection->HTTP_CSH-SQL-Select-In-Client-Header
Comment has changed
Description has changed
Fingerprint regexp changed
High Versa-Concerto-Traefik-Header-Handling-Authentication-Bypass-CVE-2025-34026 CVE-2025-34026 HTTP_CSH-Versa-Concerto-Traefik-Header-Handling-Authentication-Bypass-CVE-2025-34026 Suspected Compromise
Description has changed

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Microsoft-SharePoint-Remote-Code-Execution-Vulnerability-CVE-2025-49704 CVE-2025-49704 HTTP_CRL-Microsoft-SharePoint-Remote-Code-Execution-CVE-2025-49704 Suspected Compromise
Name: HTTP_CRL-Microsoft-SharePoint-Remote-Code-Execution-Vulnerability-CVE-2025-49704->HTTP_CRL-Microsoft-SharePoint-Remote-Code-Execution-CVE-2025-49704
Category tag group MS2025-07 added

SMB Client Header Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Microsoft-Windows-SMB-Negoex-Buffer-Overflow-CVE-2022-37958 CVE-2022-37958 SMB-TCP_CHS-Microsoft-Windows-Negoex-Buffer-Overflow-CVE-2022-37958 Suspected Compromise
Name: SMB-TCP_CHS-Microsoft-Windows-Negoex-Buffer-Overflow->SMB-TCP_CHS-Microsoft-Windows-Negoex-Buffer-Overflow-CVE-2022-37958

Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High HTTP-Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption CVE-2006-4495 File-Text_Outdated-Browser-Accessing-ActiveX-Object-In-HTML Potential Compromise
Description has changed
Category tag group MS2007-05 added
High Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption CVE-2010-0046 File-Text_Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption Potential Compromise
Fingerprint regexp changed

Identified Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 CVE-2025-21400 File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 Suspected Compromise
Detection mechanism updated
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794 CVE-2025-29794 File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794 Suspected Compromise
Description has changed
Category tag group MS2025-07 added

Executable File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
Low File-Type-Identification No CVE/CAN File-Exe_Portable-Executable Protocol Information
Detection mechanism updated
High SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880 CVE-2023-24880 File-Exe_SmartScreen-Security-warning-Bypass-For-PE-Files-CVE-2023-24880 Suspected Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

Type Name
Category Lighthouse Studio
IPList Amazon WORKSPACES_GATEWAYS ap-southeast-5
IPList Amazon WORKSPACES_GATEWAYS eu-south-1
IPList Amazon WORKSPACES_GATEWAYS eu-south-2
IPList Amazon WORKSPACES_GATEWAYS me-central-1

Updated objects:

Type Name Changes
Category ColdFusion
Situation File_Malware-MD5
Detection mechanism updated
Situation URL_List-Known-Hostile-URL
Detection mechanism updated
Situation URL_List-Wcry-Botnet
Situation obsoleted
IPList Iraq
IPList Saudi Arabia
IPList Iran
IPList Cyprus
IPList Armenia
IPList Kenya
IPList DR Congo
IPList Seychelles
IPList Jordan
IPList Lebanon
IPList Kuwait
IPList Qatar
IPList Bahrain
IPList United Arab Emirates
IPList Israel
IPList Türkiye
IPList Egypt
IPList Greece
IPList Estonia
IPList Latvia
IPList Azerbaijan
IPList Lithuania
IPList Georgia
IPList Moldova
IPList Belarus
IPList Finland
IPList Åland Islands
IPList Ukraine
IPList Hungary
IPList Bulgaria
IPList Albania
IPList Poland
IPList Romania
IPList Kosovo
IPList Zambia
IPList Botswana
IPList Mauritius
IPList Réunion
IPList South Africa
IPList Afghanistan
IPList Pakistan
IPList Bangladesh
IPList Sri Lanka
IPList India
IPList Myanmar
IPList Uzbekistan
IPList Kazakhstan
IPList Kyrgyzstan
IPList Vietnam
IPList Thailand
IPList Indonesia
IPList Laos
IPList Taiwan
IPList Philippines
IPList Malaysia
IPList China
IPList Hong Kong
IPList Macao
IPList Cambodia
IPList South Korea
IPList Japan
IPList North Korea
IPList Singapore
IPList Russia
IPList Mongolia
IPList Australia
IPList Christmas Island
IPList New Zealand
IPList Portugal
IPList Ivory Coast
IPList Ghana
IPList Nigeria
IPList Mauritania
IPList Gibraltar
IPList Spain
IPList Morocco
IPList Malta
IPList Algeria
IPList Denmark
IPList Iceland
IPList United Kingdom
IPList Switzerland
IPList Sweden
IPList The Netherlands
IPList Austria
IPList Belgium
IPList Germany
IPList Luxembourg
IPList Ireland
IPList France
IPList Andorra
IPList Liechtenstein
IPList Isle of Man
IPList Slovakia
IPList Czechia
IPList Norway
IPList Italy
IPList Croatia
IPList Bosnia and Herzegovina
IPList Angola
IPList Namibia
IPList Saint Helena
IPList Paraguay
IPList Brazil
IPList South Georgia and the South Sandwich Islands
IPList Jamaica
IPList Dominican Republic
IPList Martinique
IPList Bahamas
IPList Anguilla
IPList Trinidad and Tobago
IPList St Kitts and Nevis
IPList Antigua and Barbuda
IPList Saint Lucia
IPList Turks and Caicos Islands
IPList Aruba
IPList British Virgin Islands
IPList St Vincent and Grenadines
IPList Saint Martin
IPList Guadeloupe
IPList Grenada
IPList Cayman Islands
IPList El Salvador
IPList Guatemala
IPList Honduras
IPList Costa Rica
IPList Venezuela
IPList Ecuador
IPList Colombia
IPList Panama
IPList Argentina
IPList Chile
IPList Peru
IPList Mexico
IPList Northern Mariana Islands
IPList Guam
IPList Puerto Rico
IPList U.S. Virgin Islands
IPList Canada
IPList United States
IPList Antarctica
IPList Sint Maarten
IPList Curaçao
IPList Your-Freedom Servers IP Address List
IPList TOR exit nodes IP Address List
IPList Amazon AMAZON
IPList Amazon EC2
IPList Facebook Servers
IPList Amazon CLOUDFRONT
IPList Microsoft Azure datacenter for australiaeast
IPList Microsoft Azure datacenter for australiasoutheast
IPList Microsoft Azure datacenter for brazilsouth
IPList Microsoft Azure datacenter for canadacentral
IPList TOR relay nodes IP Address List
IPList Microsoft Azure datacenter for canadaeast
IPList Microsoft Azure datacenter for centralus
IPList Microsoft Azure datacenter for eastasia
IPList Microsoft Azure datacenter for eastus2
IPList Microsoft Azure datacenter for eastus
IPList Microsoft Azure datacenter for japaneast
IPList Microsoft Azure datacenter for northcentralus
IPList Microsoft Azure datacenter for northeurope
IPList Microsoft Azure datacenter for southcentralus
IPList Microsoft Azure datacenter for westeurope
IPList Microsoft Azure datacenter for westus2
IPList Microsoft Azure datacenter for westus
IPList Microsoft Azure service for AzureActiveDirectory
IPList Microsoft Azure datacenter
IPList Amazon DYNAMODB
IPList Amazon WORKSPACES_GATEWAYS
IPList Amazon EC2 eu-south-2
IPList Microsoft Azure service for AzureHealthcareAPIs
IPList Malicious Site IP Address List
IPList Amazon AMAZON ap-southeast-6
IPList Microsoft Azure datacenter for malaysiasouth
IPList Microsoft Azure datacenter for indonesiacentral
IPList NordVPN Servers IP Address List
IPList Microsoft Azure service for AzureSpringCloud
IPList Microsoft Azure service for CognitiveServicesFrontend
IPList Amazon AMAZON cn-north-1
IPList Amazon EC2 cn-north-1
IPList Amazon AMAZON cn-northwest-1
IPList Amazon EC2 cn-northwest-1
IPList Microsoft Azure service for KustoAnalytics
IPList Microsoft Azure service for AzureMachineLearningInference
IPList Microsoft Azure service for VideoIndexer
IPList Amazon AMAZON eusc-de-east-1
IPList Amazon EC2 eusc-de-east-1
IPList Forcepoint Drop IP Address List
IPList Microsoft Azure service for Scuba
IPList Microsoft Azure service for SerialConsole
IPList Amazon AMAZON us-west-2
IPList Amazon EC2 us-west-2
IPList Amazon DYNAMODB eusc-de-east-1
IPList Microsoft Azure datacenter for brazilse
IPList Microsoft Azure service for ActionGroup
IPList Microsoft Azure service for ApiManagement
IPList GitHub Actions IP Address List
IPList Yealink Meeting IP Address List
IPList Microsoft Azure service for AppConfiguration
IPList Microsoft Azure service for AppService
IPList Microsoft Azure service for AppServiceManagement
IPList Microsoft Azure service for AzureActiveDirectoryDomainServices
IPList Microsoft Azure service for AzureActiveDirectory_ServiceEndpoint
IPList Microsoft Azure service for AzureAdvancedThreatProtection
IPList Microsoft Azure service for AzureArcInfrastructure
IPList Microsoft Azure service for AzureBackup
IPList Microsoft Azure service for AzureBotService
IPList Microsoft Azure service for AzureCloud
IPList Microsoft Azure service for AzureCognitiveSearch
IPList Microsoft Azure service for AzureConnectors
IPList Microsoft Azure service for AzureContainerRegistry
IPList Microsoft Azure service for AzureCosmosDB
IPList Microsoft Azure service for AzureDatabricks
IPList Microsoft Azure service for AzureDataExplorerManagement
IPList Microsoft Azure service for AzureDigitalTwins
IPList Microsoft Azure service for AzureEventGrid
IPList Microsoft Azure service for AzureInformationProtection
IPList Microsoft Azure service for AzureIoTHub
IPList Microsoft Azure service for AzureKeyVault
IPList Microsoft Azure service for AzureMachineLearning
IPList Microsoft Azure service for AzureMonitor
IPList Microsoft Azure service for AzureMonitor_Core
IPList Microsoft Azure service for AzurePortal
IPList Microsoft Azure service for AzureResourceManager
IPList Microsoft Azure service for AzureSiteRecovery
IPList Microsoft Azure service for BatchNodeManagement
IPList Microsoft Azure service for CognitiveServicesManagement
IPList Microsoft Azure service for DataFactory
IPList Microsoft Azure service for DataFactoryManagement
IPList Microsoft Azure service for EventHub
IPList Microsoft Azure service for GatewayManager
IPList Microsoft Azure service for GuestAndHybridManagement
IPList Microsoft Azure service for HDInsight
IPList Microsoft Azure service for LogicApps
IPList Microsoft Azure service for LogicAppsManagement
IPList Microsoft Azure service for MicrosoftContainerRegistry
IPList Microsoft Azure service for PowerBI
IPList Microsoft Azure service for PowerQueryOnline
IPList Microsoft Azure service for ServiceBus
IPList Microsoft Azure service for ServiceFabric
IPList Microsoft Azure service for Sql
IPList Microsoft Azure service for SqlManagement
IPList Microsoft Azure service for Storage
IPList Microsoft Azure service for StorageSyncService
IPList Microsoft Azure datacenter for swedencentral
IPList Microsoft Azure datacenter for westus3
IPList Oracle Cloud Infrastructure af-johannesburg-1
IPList Oracle Cloud Infrastructure ap-chuncheon-1
IPList Oracle Cloud Infrastructure ap-melbourne-1
IPList Microsoft Azure service for AzureSecurityCenter
IPList Microsoft Azure service for AzureAttestation
IPList Microsoft Azure service for OneDsCollector
IPList Microsoft Azure service for WindowsAdminCenter
IPList Microsoft Azure service for M365ManagementActivityApiWebhook
IPList Oracle Services Network us-phoenix-1
IPList Oracle Cloud Infrastructure ap-mumbai-1
IPList Oracle Cloud Infrastructure ap-osaka-1
IPList Oracle Cloud Infrastructure ap-seoul-1
IPList Oracle Cloud Infrastructure ap-singapore-1
IPList Oracle Cloud Infrastructure ap-sydney-1
IPList Oracle Cloud Infrastructure ap-tokyo-1
IPList Oracle Cloud Infrastructure ca-montreal-1
IPList Microsoft Azure service for AzureSentinel
IPList Oracle Cloud Infrastructure ca-toronto-1
IPList Oracle Cloud Infrastructure eu-amsterdam-1
IPList Oracle Cloud Infrastructure eu-frankfurt-1
IPList Oracle Cloud Infrastructure eu-madrid-1
IPList Oracle Cloud Infrastructure eu-milan-1
IPList Oracle Cloud Infrastructure eu-paris-1
IPList Oracle Cloud Infrastructure eu-stockholm-1
IPList Oracle Cloud Infrastructure il-jerusalem-1
IPList Oracle Cloud Infrastructure me-dubai-1
IPList Oracle Cloud Infrastructure me-jeddah-1
IPList Oracle Cloud Infrastructure me-riyadh-1
IPList Oracle Cloud Infrastructure mx-monterrey-1
IPList Oracle Cloud Infrastructure mx-queretaro-1
IPList Oracle Cloud Infrastructure sa-bogota-1
IPList Oracle Cloud Infrastructure sa-santiago-1
IPList Oracle Cloud Infrastructure sa-saopaulo-1
IPList Oracle Cloud Infrastructure sa-valparaiso-1
IPList Oracle Cloud Infrastructure sa-vinhedo-1
IPList Oracle Cloud Infrastructure uk-london-1
IPList Oracle Cloud Infrastructure us-ashburn-1
IPList Oracle Cloud Infrastructure us-chicago-1
IPList Oracle Cloud Infrastructure us-phoenix-1
IPList Oracle Cloud Infrastructure us-sanjose-1
IPList WeChat IP Address List
Situation HTTP_CS-Microsoft-Sharepoint-Workflow-MsiManager-Deserialization-Remote-Code-Execution
Situation obsoleted
Situation HTTP_CRL-Shared-Variables
Situation HTTP_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
Situation obsoleted
Situation HTTP_SS-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution
Situation obsoleted
Situation HTTP_CSH-HTTP2-Upgrade-Header
Description has changed
Situation File-Text_VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
Situation obsoleted
Situation File-Text_Shared-Variables
Fingerprint regexp changed
Situation File-Text_Microsoft-Windows-Media-Player-1-CVE-2010-2745
Situation obsoleted
Situation File-Text_RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
Situation obsoleted
Situation File-Text_VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2530
Situation obsoleted
Situation File-Text_Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2531
Situation obsoleted
Situation File-Text_Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
Situation obsoleted
Situation File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
Situation obsoleted
Situation File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog
Situation obsoleted
Situation File-Text_Microsoft-Windows-Media-Player-2-CVE-2010-2745
Situation obsoleted
Situation File-Text_Mozilla-Firefox-Unicode-Data-Denial-Of-Service
Situation obsoleted
Situation File-Text_Mozilla-Firefox-Browser-Engine-Memory-Corruption
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-History.go-Method-Memory-Corruption
Situation obsoleted
Situation File-Text_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
Situation obsoleted
Situation File-Text_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
Situation obsoleted
Situation File-Text_Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
Situation obsoleted
Situation File-Text_WinZip-FileView-ActiveX-Control-Buffer-Overflow
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
Situation obsoleted
Situation File-Text_Adobe-Acrobat-And-Reader-Plugin-Object-Reloading-Memory-Corruption
Situation obsoleted
Situation File-Text_VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
Situation obsoleted
Situation File-Text_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
Situation obsoleted
Situation File-Text_WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
Situation obsoleted
Situation File-Text_Microsoft-Ie-ActiveX-IObjectsafety-Implementation-Code-Execution
Situation obsoleted
Situation File-Text_Microsoft-Ie-Memory-Corruption-CVE-2010-0267
Situation obsoleted
Situation File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-2
Situation obsoleted
Situation File-Text_Apple-Safari-Webkit-Attribute-Child-Removal-Code-Execution
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-HTML-Time-Element-CVE-2010-3346-2
Situation obsoleted
Situation File-Text_Chrome-Safari-Floating-Styles-Use-After-Free-Code-Execution
Situation obsoleted
Situation File-Text_Mozilla-Firefox-Iframe-Style-Change-Handling-Code-Execution
Situation obsoleted
Situation File-Text_Mozilla-Firefox-SVG-Element-Processing-Memory-Corruption
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011
Situation obsoleted
Situation File-Text_Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030-2
Situation obsoleted
Situation File-Text_Siemens-SIMATIC-WinCC-RegReader-ActiveX-Control-Buffer-Overflow
Situation obsoleted
Situation File-Text_MSIE-Memory-Corruption-Vulnarability-CVE-2013-3193
Situation obsoleted
Situation File-Text_ActiveX-Shared-Variables
Situation File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5052
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049-2
Situation obsoleted
Situation File-Text_Internet-Explorer-Sysmon-ActiveX-Denial-Of-Service
Situation obsoleted
Situation File-Text_Samsung-Ipolis-Device-Manager-Findconfigchildekeylist-Buffer-Overflow
Situation obsoleted
Situation File-Text_HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption
Situation obsoleted
Situation File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328-2
Situation obsoleted
Application Facebook
Application TOR
Application Your-Freedom
Application NordVPN
Application Yealink
Application Azure IoT Hub
Application Azure Security Center
Situation URL_List-Wcry-Botnet
Situation obsoleted

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.