Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1-57430
This rule looks for attempts to exploit a memory corruption vulnerability in Google Chrome's GetWord32RepresentationFor function.
1-57429
This rule looks for attempts to exploit a memory corruption vulnerability in Google Chrome's GetWord32RepresentationFor function.
1-57426
This rule looks for PHP object injection attacks in Zend.Http.Response.Stream requests to Zend and laminas-http frameworks that can lead to arbitrary code execution.
1-57425
This rule detects a parameter name from the GET request.
1-57424
This rule is looking for an attempt to exploit a memory corruption vulnerability that is in Chrome V8 browser.
1-57423
This rule is looking for an attempt to exploit a memory corruption vulnerability that is in Chrome V8 browser.