Skip to content

Commit e738380

Browse files
committed
Release-Dec-16-2024
1 parent d4ece39 commit e738380

File tree

2 files changed

+164
-43
lines changed

2 files changed

+164
-43
lines changed

src/content/changelogs/waf.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ productLink: "/waf/"
55
productArea: Application security
66
productAreaLink: /fundamentals/reference/changelog/security/
77
entries:
8-
- publish_date: "2024-12-09"
9-
scheduled_date: "2024-12-16"
8+
- publish_date: "2024-12-16"
9+
scheduled_date: "2025-01-06"
1010
individual_page: true
1111
scheduled: true
1212
link: "/waf/change-log/scheduled-changes/"

src/content/docs/waf/change-log/scheduled-changes.mdx

Lines changed: 162 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -24,29 +24,29 @@ import { RuleID } from "~/components";
2424
<tbody>
2525
<tr>
2626
<td>2024-12-09</td>
27-
<td>2024-12-16</td>
27+
<td>2025-01-06</td>
2828
<td>Block</td>
29-
<td>100683</td>
29+
<td>100678</td>
3030
<td>
31-
<RuleID id="945f41b48be9485f953116015054c752" />
31+
<RuleID id="3a321b10270b42549ac201009da08beb" />
3232
</td>
33-
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51567</td>
33+
<td>Pandora FMS - Remote Code Execution - CVE:CVE-2024-11320</td>
3434
<td>This is a New Detection</td>
3535
</tr>
3636
<tr>
3737
<td>2024-12-09</td>
38-
<td>2024-12-16</td>
38+
<td>2025-01-06</td>
3939
<td>Block</td>
40-
<td>100685</td>
40+
<td>100679</td>
4141
<td>
42-
<RuleID id="e614dd46c1ce404da1909e841454c856" />
42+
<RuleID id="1fe510368b4a47dda90363c2ecdf3d02" />
4343
</td>
44-
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51568</td>
44+
<td>Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474</td>
4545
<td>This is a New Detection</td>
4646
</tr>
4747
<tr>
4848
<td>2024-12-09</td>
49-
<td>2024-12-16</td>
49+
<td>2025-01-06</td>
5050
<td>Block</td>
5151
<td>100680</td>
5252
<td>
@@ -57,91 +57,212 @@ import { RuleID } from "~/components";
5757
</tr>
5858
<tr>
5959
<td>2024-12-09</td>
60-
<td>2024-12-16</td>
60+
<td>2025-01-06</td>
6161
<td>Block</td>
62-
<td>100682</td>
62+
<td>100681</td>
6363
<td>
64-
<RuleID id="c86e79e15a4a4307870f6f77e37f2da6" />
64+
<RuleID id="6bd9b07c8acc4beeb17c8bee58ae3c89" />
6565
</td>
66-
<td>Magento - XXE - CVE:CVE-2024-34102</td>
66+
<td>Really Simple Security - Auth Bypass - CVE:CVE-2024-10924</td>
6767
<td>This is a New Detection</td>
6868
</tr>
6969
<tr>
7070
<td>2024-12-09</td>
71-
<td>2024-12-16</td>
71+
<td>2025-01-06</td>
7272
<td>Block</td>
73-
<td>100684</td>
73+
<td>100682</td>
7474
<td>
75-
<RuleID id="aec9a2e554a34a8fa547d069dfe93d7b" />
75+
<RuleID id="c86e79e15a4a4307870f6f77e37f2da6" />
7676
</td>
77-
<td>Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023</td>
77+
<td>Magento - XXE - CVE:CVE-2024-34102</td>
7878
<td>This is a New Detection</td>
7979
</tr>
8080
<tr>
8181
<td>2024-12-09</td>
82-
<td>2024-12-16</td>
82+
<td>2025-01-06</td>
8383
<td>Block</td>
84-
<td>100679</td>
84+
<td>100683</td>
8585
<td>
86-
<RuleID id="1fe510368b4a47dda90363c2ecdf3d02" />
86+
<RuleID id="945f41b48be9485f953116015054c752" />
8787
</td>
88-
<td>Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474</td>
88+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51567</td>
8989
<td>This is a New Detection</td>
9090
</tr>
9191
<tr>
9292
<td>2024-12-09</td>
93-
<td>2024-12-16</td>
93+
<td>2025-01-06</td>
9494
<td>Block</td>
95-
<td>100678</td>
95+
<td>100684</td>
9696
<td>
97-
<RuleID id="3a321b10270b42549ac201009da08beb" />
97+
<RuleID id="aec9a2e554a34a8fa547d069dfe93d7b" />
9898
</td>
99-
<td>Pandora FMS - Remote Code Execution - CVE:CVE-2024-11320</td>
99+
<td>Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023</td>
100100
<td>This is a New Detection</td>
101101
</tr>
102102
<tr>
103103
<td>2024-12-09</td>
104-
<td>2024-12-16</td>
104+
<td>2025-01-06</td>
105105
<td>Block</td>
106-
<td>100688</td>
106+
<td>100685</td>
107107
<td>
108-
<RuleID id="19587024724e49329d5b482d0d7ca374" />
108+
<RuleID id="e614dd46c1ce404da1909e841454c856" />
109109
</td>
110-
<td>ProjectSend - Remote Code Execution - CVE:CVE-2024-11680</td>
110+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51568</td>
111111
<td>This is a New Detection</td>
112112
</tr>
113113
<tr>
114114
<td>2024-12-09</td>
115-
<td>2024-12-16</td>
115+
<td>2025-01-06</td>
116116
<td>Block</td>
117-
<td>100681</td>
117+
<td>100686</td>
118118
<td>
119-
<RuleID id="6bd9b07c8acc4beeb17c8bee58ae3c89" />
119+
<RuleID id="685a4edf68f740b4a2c80d45e92362e5" />
120120
</td>
121-
<td>Really Simple Security - Auth Bypass - CVE:CVE-2024-10924</td>
121+
<td>Seeyon - Remote Code Execution</td>
122122
<td>This is a New Detection</td>
123123
</tr>
124124
<tr>
125125
<td>2024-12-09</td>
126-
<td>2024-12-16</td>
126+
<td>2025-01-06</td>
127127
<td>Block</td>
128-
<td>100686</td>
128+
<td>100687</td>
129129
<td>
130-
<RuleID id="685a4edf68f740b4a2c80d45e92362e5" />
130+
<RuleID id="204f9d948a124829acb86555b9f1c9f8" />
131131
</td>
132-
<td>Seeyon - Remote Code Execution</td>
132+
<td>WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542</td>
133133
<td>This is a New Detection</td>
134134
</tr>
135135
<tr>
136136
<td>2024-12-09</td>
137-
<td>2024-12-16</td>
137+
<td>2025-01-06</td>
138138
<td>Block</td>
139-
<td>100687</td>
139+
<td>100688</td>
140140
<td>
141-
<RuleID id="204f9d948a124829acb86555b9f1c9f8" />
141+
<RuleID id="19587024724e49329d5b482d0d7ca374" />
142142
</td>
143-
<td>WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542</td>
143+
<td>ProjectSend - Remote Code Execution - CVE:CVE-2024-11680</td>
144144
<td>This is a New Detection</td>
145145
</tr>
146+
<tr>
147+
<td>2024-12-16</td>
148+
<td>2025-01-06</td>
149+
<td>Block</td>
150+
<td>100689</td>
151+
<td>
152+
<RuleID id="fa49213e55484f6c824e0682a5260b70" />
153+
</td>
154+
<td>Palo Alto GlobalProtect - Remote Code Execution - CVE:CVE-2024-5921</td>
155+
<td>This is a New Detection</td>
156+
</tr>
157+
<tr>
158+
<td>2024-12-16</td>
159+
<td>2025-01-06</td>
160+
<td>Block</td>
161+
<td>100690</td>
162+
<td>
163+
<RuleID id="11b5fc23e85b41ca90316bddd007118b" />
164+
</td>
165+
<td>Ivanti - Remote Code Execution - CVE:CVE-2024-37404</td>
166+
<td>This is a New Detection</td>
167+
</tr>
168+
<tr>
169+
<td>2024-12-16</td>
170+
<td>2025-01-06</td>
171+
<td>Block</td>
172+
<td>100691</td>
173+
<td>
174+
<RuleID id="aaeada52bcc840598515de6cc3e49f64" />
175+
</td>
176+
<td>Array Networks - Remote Code Execution - CVE:CVE-2023-28461</td>
177+
<td>This is a New Detection</td>
178+
</tr>
179+
<tr>
180+
<td>2024-12-16</td>
181+
<td>2025-01-06</td>
182+
<td>Block</td>
183+
<td>100692</td>
184+
<td>
185+
<RuleID id="e2c7ce1ecd6847219f8d9aedfcc6f5bb" />
186+
</td>
187+
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51378</td>
188+
<td>This is a New Detection</td>
189+
</tr>
190+
<tr>
191+
<td>2024-12-16</td>
192+
<td>2025-01-06</td>
193+
<td>Block</td>
194+
<td>100693</td>
195+
<td>
196+
<RuleID id="84d481b1f49c4735afa2fb2bb615335e" />
197+
</td>
198+
<td>Symfony Profiler - Auth Bypass - CVE:CVE-2024-50340</td>
199+
<td>This is a New Detection</td>
200+
</tr>
201+
<tr>
202+
<td>2024-12-16</td>
203+
<td>2025-01-06</td>
204+
<td>Block</td>
205+
<td>100694</td>
206+
<td>
207+
<RuleID id="9f258f463f9f4b26ad07e3c209d08c8a" />
208+
</td>
209+
<td>Citrix Virtual Apps - Remote Code Execution - CVE:CVE-2024-8069</td>
210+
<td>This is a New Detection</td>
211+
</tr>
212+
<tr>
213+
<td>2024-12-16</td>
214+
<td>2025-01-06</td>
215+
<td>Block</td>
216+
<td>100695</td>
217+
<td>
218+
<RuleID id="b490d6edcfec4028aef45cf08aafb2f5" />
219+
</td>
220+
<td>MSMQ Service - Remote Code Execution - CVE:CVE-2023-21554</td>
221+
<td>This is a New Detection</td>
222+
</tr>
223+
<tr>
224+
<td>2024-12-16</td>
225+
<td>2025-01-06</td>
226+
<td>Block</td>
227+
<td>100696</td>
228+
<td>
229+
<RuleID id="c8f65bc9eeef4665820ecfe411b7a8c7" />
230+
</td>
231+
<td>Nginxui - Remote Code Execution - CVE:CVE-2024-49368</td>
232+
<td>This is a New Detection</td>
233+
</tr>
234+
<tr>
235+
<td>2024-12-16</td>
236+
<td>2025-01-06</td>
237+
<td>Block</td>
238+
<td>100697</td>
239+
<td>
240+
<RuleID id="d5f2e133e34640198d06d7b345954c7e" />
241+
</td>
242+
<td>Apache ShardingSphere - Remote Code Execution - CVE:CVE-2022-22733</td>
243+
<td>This is a New Detection</td>
244+
</tr>
245+
<tr>
246+
<td>2024-12-16</td>
247+
<td>2025-01-06</td>
248+
<td>Block</td>
249+
<td>100698</td>
250+
<td>
251+
<RuleID id="c34432e257074cffa9fa15f3f5311209" />
252+
</td>
253+
<td>Mitel MiCollab - Auth Bypass - CVE:CVE-2024-41713</td>
254+
<td>This is a New Detection</td>
255+
</tr>
256+
<tr>
257+
<td>2024-12-16</td>
258+
<td>2025-01-06</td>
259+
<td>Block</td>
260+
<td>100699</td>
261+
<td>
262+
<RuleID id="3bda15acd73a4b55a5f60cd2b3e5e46e" />
263+
</td>
264+
<td>Apache Solr - Auth Bypass - CVE:CVE-2024-45216</td>
265+
<td>This is a New Detection</td>
266+
</tr>
146267
</tbody>
147268
</table>

0 commit comments

Comments
 (0)