@@ -24,29 +24,29 @@ import { RuleID } from "~/components";
2424 <tbody >
2525 <tr >
2626 <td >2024-12-09</td >
27- <td >2024-12-16 </td >
27+ <td >2025-01-06 </td >
2828 <td >Block</td >
29- <td >100683 </td >
29+ <td >100678 </td >
3030 <td >
31- <RuleID id = " 945f41b48be9485f953116015054c752 " />
31+ <RuleID id = " 3a321b10270b42549ac201009da08beb " />
3232 </td >
33- <td >CyberPanel - Remote Code Execution - CVE:CVE-2024 -51567 </td >
33+ <td >Pandora FMS - Remote Code Execution - CVE:CVE-2024 -11320 </td >
3434 <td >This is a New Detection</td >
3535 </tr >
3636 <tr >
3737 <td >2024-12-09</td >
38- <td >2024-12-16 </td >
38+ <td >2025-01-06 </td >
3939 <td >Block</td >
40- <td >100685 </td >
40+ <td >100679 </td >
4141 <td >
42- <RuleID id = " e614dd46c1ce404da1909e841454c856 " />
42+ <RuleID id = " 1fe510368b4a47dda90363c2ecdf3d02 " />
4343 </td >
44- <td >CyberPanel - Remote Code Execution - CVE:CVE-2024 -51568 </td >
44+ <td >Palo Alto Networks - Remote Code Execution - CVE:CVE-2024 -0012, CVE: CVE- 2024 -9474 </td >
4545 <td >This is a New Detection</td >
4646 </tr >
4747 <tr >
4848 <td >2024-12-09</td >
49- <td >2024-12-16 </td >
49+ <td >2025-01-06 </td >
5050 <td >Block</td >
5151 <td >100680</td >
5252 <td >
@@ -57,91 +57,212 @@ import { RuleID } from "~/components";
5757 </tr >
5858 <tr >
5959 <td >2024-12-09</td >
60- <td >2024-12-16 </td >
60+ <td >2025-01-06 </td >
6161 <td >Block</td >
62- <td >100682 </td >
62+ <td >100681 </td >
6363 <td >
64- <RuleID id = " c86e79e15a4a4307870f6f77e37f2da6 " />
64+ <RuleID id = " 6bd9b07c8acc4beeb17c8bee58ae3c89 " />
6565 </td >
66- <td >Magento - XXE - CVE:CVE-2024 -34102 </td >
66+ <td >Really Simple Security - Auth Bypass - CVE:CVE-2024 -10924 </td >
6767 <td >This is a New Detection</td >
6868 </tr >
6969 <tr >
7070 <td >2024-12-09</td >
71- <td >2024-12-16 </td >
71+ <td >2025-01-06 </td >
7272 <td >Block</td >
73- <td >100684 </td >
73+ <td >100682 </td >
7474 <td >
75- <RuleID id = " aec9a2e554a34a8fa547d069dfe93d7b " />
75+ <RuleID id = " c86e79e15a4a4307870f6f77e37f2da6 " />
7676 </td >
77- <td >Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024 -38094, CVE: CVE- 2024 -38024, CVE: CVE- 2024 -38023 </td >
77+ <td >Magento - XXE - CVE:CVE-2024 -34102 </td >
7878 <td >This is a New Detection</td >
7979 </tr >
8080 <tr >
8181 <td >2024-12-09</td >
82- <td >2024-12-16 </td >
82+ <td >2025-01-06 </td >
8383 <td >Block</td >
84- <td >100679 </td >
84+ <td >100683 </td >
8585 <td >
86- <RuleID id = " 1fe510368b4a47dda90363c2ecdf3d02 " />
86+ <RuleID id = " 945f41b48be9485f953116015054c752 " />
8787 </td >
88- <td >Palo Alto Networks - Remote Code Execution - CVE:CVE-2024 -0012, CVE: CVE- 2024 -9474 </td >
88+ <td >CyberPanel - Remote Code Execution - CVE:CVE-2024 -51567 </td >
8989 <td >This is a New Detection</td >
9090 </tr >
9191 <tr >
9292 <td >2024-12-09</td >
93- <td >2024-12-16 </td >
93+ <td >2025-01-06 </td >
9494 <td >Block</td >
95- <td >100678 </td >
95+ <td >100684 </td >
9696 <td >
97- <RuleID id = " 3a321b10270b42549ac201009da08beb " />
97+ <RuleID id = " aec9a2e554a34a8fa547d069dfe93d7b " />
9898 </td >
99- <td >Pandora FMS - Remote Code Execution - CVE:CVE-2024 -11320 </td >
99+ <td >Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024 -38094, CVE: CVE- 2024 -38024, CVE: CVE- 2024 -38023 </td >
100100 <td >This is a New Detection</td >
101101 </tr >
102102 <tr >
103103 <td >2024-12-09</td >
104- <td >2024-12-16 </td >
104+ <td >2025-01-06 </td >
105105 <td >Block</td >
106- <td >100688 </td >
106+ <td >100685 </td >
107107 <td >
108- <RuleID id = " 19587024724e49329d5b482d0d7ca374 " />
108+ <RuleID id = " e614dd46c1ce404da1909e841454c856 " />
109109 </td >
110- <td >ProjectSend - Remote Code Execution - CVE:CVE-2024 -11680 </td >
110+ <td >CyberPanel - Remote Code Execution - CVE:CVE-2024 -51568 </td >
111111 <td >This is a New Detection</td >
112112 </tr >
113113 <tr >
114114 <td >2024-12-09</td >
115- <td >2024-12-16 </td >
115+ <td >2025-01-06 </td >
116116 <td >Block</td >
117- <td >100681 </td >
117+ <td >100686 </td >
118118 <td >
119- <RuleID id = " 6bd9b07c8acc4beeb17c8bee58ae3c89 " />
119+ <RuleID id = " 685a4edf68f740b4a2c80d45e92362e5 " />
120120 </td >
121- <td >Really Simple Security - Auth Bypass - CVE: CVE- 2024 -10924 </td >
121+ <td >Seeyon - Remote Code Execution </td >
122122 <td >This is a New Detection</td >
123123 </tr >
124124 <tr >
125125 <td >2024-12-09</td >
126- <td >2024-12-16 </td >
126+ <td >2025-01-06 </td >
127127 <td >Block</td >
128- <td >100686 </td >
128+ <td >100687 </td >
129129 <td >
130- <RuleID id = " 685a4edf68f740b4a2c80d45e92362e5 " />
130+ <RuleID id = " 204f9d948a124829acb86555b9f1c9f8 " />
131131 </td >
132- <td >Seeyon - Remote Code Execution</td >
132+ <td >WordPress - Remote Code Execution - CVE: CVE- 2024 -10781, CVE: CVE- 2024 -10542 </td >
133133 <td >This is a New Detection</td >
134134 </tr >
135135 <tr >
136136 <td >2024-12-09</td >
137- <td >2024-12-16 </td >
137+ <td >2025-01-06 </td >
138138 <td >Block</td >
139- <td >100687 </td >
139+ <td >100688 </td >
140140 <td >
141- <RuleID id = " 204f9d948a124829acb86555b9f1c9f8 " />
141+ <RuleID id = " 19587024724e49329d5b482d0d7ca374 " />
142142 </td >
143- <td >WordPress - Remote Code Execution - CVE:CVE-2024 -10781, CVE: CVE- 2024 -10542 </td >
143+ <td >ProjectSend - Remote Code Execution - CVE:CVE-2024 -11680 </td >
144144 <td >This is a New Detection</td >
145145 </tr >
146+ <tr >
147+ <td >2024-12-16</td >
148+ <td >2025-01-06</td >
149+ <td >Block</td >
150+ <td >100689</td >
151+ <td >
152+ <RuleID id = " fa49213e55484f6c824e0682a5260b70" />
153+ </td >
154+ <td >Palo Alto GlobalProtect - Remote Code Execution - CVE:CVE-2024 -5921</td >
155+ <td >This is a New Detection</td >
156+ </tr >
157+ <tr >
158+ <td >2024-12-16</td >
159+ <td >2025-01-06</td >
160+ <td >Block</td >
161+ <td >100690</td >
162+ <td >
163+ <RuleID id = " 11b5fc23e85b41ca90316bddd007118b" />
164+ </td >
165+ <td >Ivanti - Remote Code Execution - CVE:CVE-2024 -37404</td >
166+ <td >This is a New Detection</td >
167+ </tr >
168+ <tr >
169+ <td >2024-12-16</td >
170+ <td >2025-01-06</td >
171+ <td >Block</td >
172+ <td >100691</td >
173+ <td >
174+ <RuleID id = " aaeada52bcc840598515de6cc3e49f64" />
175+ </td >
176+ <td >Array Networks - Remote Code Execution - CVE:CVE-2023 -28461</td >
177+ <td >This is a New Detection</td >
178+ </tr >
179+ <tr >
180+ <td >2024-12-16</td >
181+ <td >2025-01-06</td >
182+ <td >Block</td >
183+ <td >100692</td >
184+ <td >
185+ <RuleID id = " e2c7ce1ecd6847219f8d9aedfcc6f5bb" />
186+ </td >
187+ <td >CyberPanel - Remote Code Execution - CVE:CVE-2024 -51378</td >
188+ <td >This is a New Detection</td >
189+ </tr >
190+ <tr >
191+ <td >2024-12-16</td >
192+ <td >2025-01-06</td >
193+ <td >Block</td >
194+ <td >100693</td >
195+ <td >
196+ <RuleID id = " 84d481b1f49c4735afa2fb2bb615335e" />
197+ </td >
198+ <td >Symfony Profiler - Auth Bypass - CVE:CVE-2024 -50340</td >
199+ <td >This is a New Detection</td >
200+ </tr >
201+ <tr >
202+ <td >2024-12-16</td >
203+ <td >2025-01-06</td >
204+ <td >Block</td >
205+ <td >100694</td >
206+ <td >
207+ <RuleID id = " 9f258f463f9f4b26ad07e3c209d08c8a" />
208+ </td >
209+ <td >Citrix Virtual Apps - Remote Code Execution - CVE:CVE-2024 -8069</td >
210+ <td >This is a New Detection</td >
211+ </tr >
212+ <tr >
213+ <td >2024-12-16</td >
214+ <td >2025-01-06</td >
215+ <td >Block</td >
216+ <td >100695</td >
217+ <td >
218+ <RuleID id = " b490d6edcfec4028aef45cf08aafb2f5" />
219+ </td >
220+ <td >MSMQ Service - Remote Code Execution - CVE:CVE-2023 -21554</td >
221+ <td >This is a New Detection</td >
222+ </tr >
223+ <tr >
224+ <td >2024-12-16</td >
225+ <td >2025-01-06</td >
226+ <td >Block</td >
227+ <td >100696</td >
228+ <td >
229+ <RuleID id = " c8f65bc9eeef4665820ecfe411b7a8c7" />
230+ </td >
231+ <td >Nginxui - Remote Code Execution - CVE:CVE-2024 -49368</td >
232+ <td >This is a New Detection</td >
233+ </tr >
234+ <tr >
235+ <td >2024-12-16</td >
236+ <td >2025-01-06</td >
237+ <td >Block</td >
238+ <td >100697</td >
239+ <td >
240+ <RuleID id = " d5f2e133e34640198d06d7b345954c7e" />
241+ </td >
242+ <td >Apache ShardingSphere - Remote Code Execution - CVE:CVE-2022 -22733</td >
243+ <td >This is a New Detection</td >
244+ </tr >
245+ <tr >
246+ <td >2024-12-16</td >
247+ <td >2025-01-06</td >
248+ <td >Block</td >
249+ <td >100698</td >
250+ <td >
251+ <RuleID id = " c34432e257074cffa9fa15f3f5311209" />
252+ </td >
253+ <td >Mitel MiCollab - Auth Bypass - CVE:CVE-2024 -41713</td >
254+ <td >This is a New Detection</td >
255+ </tr >
256+ <tr >
257+ <td >2024-12-16</td >
258+ <td >2025-01-06</td >
259+ <td >Block</td >
260+ <td >100699</td >
261+ <td >
262+ <RuleID id = " 3bda15acd73a4b55a5f60cd2b3e5e46e" />
263+ </td >
264+ <td >Apache Solr - Auth Bypass - CVE:CVE-2024 -45216</td >
265+ <td >This is a New Detection</td >
266+ </tr >
146267 </tbody >
147268</table >
0 commit comments