Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release-Dec-16-2024 #18744

Open
wants to merge 1 commit into
base: production
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions src/content/changelogs/waf.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@ productLink: "/waf/"
productArea: Application security
productAreaLink: /fundamentals/reference/changelog/security/
entries:
- publish_date: "2024-12-09"
scheduled_date: "2024-12-16"
- publish_date: "2024-12-16"
scheduled_date: "2025-01-06"
individual_page: true
scheduled: true
link: "/waf/change-log/scheduled-changes/"
Expand Down
203 changes: 162 additions & 41 deletions src/content/docs/waf/change-log/scheduled-changes.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -24,29 +24,29 @@ import { RuleID } from "~/components";
<tbody>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100683</td>
<td>100678</td>
<td>
<RuleID id="945f41b48be9485f953116015054c752" />
<RuleID id="3a321b10270b42549ac201009da08beb" />
</td>
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51567</td>
<td>Pandora FMS - Remote Code Execution - CVE:CVE-2024-11320</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100685</td>
<td>100679</td>
<td>
<RuleID id="e614dd46c1ce404da1909e841454c856" />
<RuleID id="1fe510368b4a47dda90363c2ecdf3d02" />
</td>
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51568</td>
<td>Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100680</td>
<td>
Expand All @@ -57,91 +57,212 @@ import { RuleID } from "~/components";
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100682</td>
<td>100681</td>
<td>
<RuleID id="c86e79e15a4a4307870f6f77e37f2da6" />
<RuleID id="6bd9b07c8acc4beeb17c8bee58ae3c89" />
</td>
<td>Magento - XXE - CVE:CVE-2024-34102</td>
<td>Really Simple Security - Auth Bypass - CVE:CVE-2024-10924</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100684</td>
<td>100682</td>
<td>
<RuleID id="aec9a2e554a34a8fa547d069dfe93d7b" />
<RuleID id="c86e79e15a4a4307870f6f77e37f2da6" />
</td>
<td>Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023</td>
<td>Magento - XXE - CVE:CVE-2024-34102</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100679</td>
<td>100683</td>
<td>
<RuleID id="1fe510368b4a47dda90363c2ecdf3d02" />
<RuleID id="945f41b48be9485f953116015054c752" />
</td>
<td>Palo Alto Networks - Remote Code Execution - CVE:CVE-2024-0012, CVE:CVE-2024-9474</td>
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51567</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100678</td>
<td>100684</td>
<td>
<RuleID id="3a321b10270b42549ac201009da08beb" />
<RuleID id="aec9a2e554a34a8fa547d069dfe93d7b" />
</td>
<td>Pandora FMS - Remote Code Execution - CVE:CVE-2024-11320</td>
<td>Microsoft SharePoint - Remote Code Execution - CVE:CVE-2024-38094, CVE:CVE-2024-38024, CVE:CVE-2024-38023</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100688</td>
<td>100685</td>
<td>
<RuleID id="19587024724e49329d5b482d0d7ca374" />
<RuleID id="e614dd46c1ce404da1909e841454c856" />
</td>
<td>ProjectSend - Remote Code Execution - CVE:CVE-2024-11680</td>
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51568</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100681</td>
<td>100686</td>
<td>
<RuleID id="6bd9b07c8acc4beeb17c8bee58ae3c89" />
<RuleID id="685a4edf68f740b4a2c80d45e92362e5" />
</td>
<td>Really Simple Security - Auth Bypass - CVE:CVE-2024-10924</td>
<td>Seeyon - Remote Code Execution</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100686</td>
<td>100687</td>
<td>
<RuleID id="685a4edf68f740b4a2c80d45e92362e5" />
<RuleID id="204f9d948a124829acb86555b9f1c9f8" />
</td>
<td>Seeyon - Remote Code Execution</td>
<td>WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-09</td>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100687</td>
<td>100688</td>
<td>
<RuleID id="204f9d948a124829acb86555b9f1c9f8" />
<RuleID id="19587024724e49329d5b482d0d7ca374" />
</td>
<td>WordPress - Remote Code Execution - CVE:CVE-2024-10781, CVE:CVE-2024-10542</td>
<td>ProjectSend - Remote Code Execution - CVE:CVE-2024-11680</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100689</td>
<td>
<RuleID id="fa49213e55484f6c824e0682a5260b70" />
</td>
<td>Palo Alto GlobalProtect - Remote Code Execution - CVE:CVE-2024-5921</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100690</td>
<td>
<RuleID id="11b5fc23e85b41ca90316bddd007118b" />
</td>
<td>Ivanti - Remote Code Execution - CVE:CVE-2024-37404</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100691</td>
<td>
<RuleID id="aaeada52bcc840598515de6cc3e49f64" />
</td>
<td>Array Networks - Remote Code Execution - CVE:CVE-2023-28461</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100692</td>
<td>
<RuleID id="e2c7ce1ecd6847219f8d9aedfcc6f5bb" />
</td>
<td>CyberPanel - Remote Code Execution - CVE:CVE-2024-51378</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100693</td>
<td>
<RuleID id="84d481b1f49c4735afa2fb2bb615335e" />
</td>
<td>Symfony Profiler - Auth Bypass - CVE:CVE-2024-50340</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100694</td>
<td>
<RuleID id="9f258f463f9f4b26ad07e3c209d08c8a" />
</td>
<td>Citrix Virtual Apps - Remote Code Execution - CVE:CVE-2024-8069</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100695</td>
<td>
<RuleID id="b490d6edcfec4028aef45cf08aafb2f5" />
</td>
<td>MSMQ Service - Remote Code Execution - CVE:CVE-2023-21554</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100696</td>
<td>
<RuleID id="c8f65bc9eeef4665820ecfe411b7a8c7" />
</td>
<td>Nginxui - Remote Code Execution - CVE:CVE-2024-49368</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100697</td>
<td>
<RuleID id="d5f2e133e34640198d06d7b345954c7e" />
</td>
<td>Apache ShardingSphere - Remote Code Execution - CVE:CVE-2022-22733</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100698</td>
<td>
<RuleID id="c34432e257074cffa9fa15f3f5311209" />
</td>
<td>Mitel MiCollab - Auth Bypass - CVE:CVE-2024-41713</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>2025-01-06</td>
<td>Block</td>
<td>100699</td>
<td>
<RuleID id="3bda15acd73a4b55a5f60cd2b3e5e46e" />
</td>
<td>Apache Solr - Auth Bypass - CVE:CVE-2024-45216</td>
<td>This is a New Detection</td>
</tr>
</tbody>
</table>
Loading