Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1-50185
Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015.
1-50184
This event is generated when an attacker attempts to exploit a sandbox escape vulnerability in Microsoft Windows.
1-50183
This event is generated when an attacker attempts to exploit a sandbox escape vulnerability in Microsoft Windows.
1-50182
This event is generated when the Peppa Pig botnet scans a potentially vulnerable php endpoint to determine if a backdoor has been previously installed.
1-50181
Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "HTTP Redirect Memory Corruption Vulnerability."
1-50180
This event is generated when malicious Buckeye family executable download attempt is made