This section describes the changes from VDB 338 (1:00:29 PM on September 24th, 2020 UTC)
to VDB 339 (9:41:10 PM on November 5th, 2020 UTC).
-
Xbox Live: Modified detection patterns.
(Updated)
-
GMX Mail: Modified detection patterns to
cover patterns for several geographical domains of GMX website. (Updated)
-
GMX: Free webmail and email service provider. (Removed)
-
Twitter: Updated patterns to fix false
positives from TwitPic traffic. (Updated)
-
Ybrant Digital: Updated patterns to fix
false positives from Lycos traffic. (Updated)
-
Apache Nutch: Updated
patterns to fix false positives from Tinder traffic. (Updated)
-
Amazon: Updated patterns to fix false
positives from AWS traffic. (Updated)
-
Aggregate Knowledge: Updated patterns to
fix false positives from Neustar Information Services traffic. (Updated)
-
Office 365: Updated patterns to fix false
positives from Microsoft Azure traffic. (Updated)
-
Microsoft CRM Dynamics:
Updated patterns to fix false positives from Office 365 traffic. (Updated)
-
Tencent Cloud: Updated patterns to fix
false positives from WeChat traffic. (Updated)
-
Webex Teams: Updated patterns to fix
false positives from Cisco Jabber traffic and cover other missed detection.
(Updated)
-
Taobao: Updated patterns to fix false
positives from Tmall traffic. (Updated)
-
Alisoft: Updated patterns to fix false
positives from Leadbolt traffic. (Updated)
-
Woopra: Updated patterns to fix false
positives from Disqus traffic. (Updated)
-
CNET TV: Updated patterns to fix false
positives from Cnet website traffic. (Updated)
-
Alibaba: Updated patterns to fix false
positives from Taobao website traffic. (Updated)
-
Google Ads: Updated patterns to fix false
positives from Doubleclick traffic. (Updated)
-
BBC iPlayer: Updated patterns to fix
false positives from BBC website traffic. (Updated)
-
Soso: Updated patterns to fix false positives from
Sogou website traffic. (Updated)
-
Lord & Taylor: Updated patterns to
fix false positives from Saks Fifth Avenue website traffic. (Updated)
-
People.com: Updated patterns to fix false
positives from TIME.com website traffic. (Updated)
-
Entertainment Weekly:
Updated patterns to fix false positives from TIME.com website traffic.
(Updated)
-
Aliwangwang: Updated patterns to fix
false positives from Taobao website traffic. (Updated)
-
ibVPN Login: Updated patterns to fix
false positives from ibVPN website traffic. (Updated)
-
GTA Online: Updated patterns to fix false
positives from Rockstar Games traffic. (Updated)
-
Myspace: Updated patterns to distinguish
detection between Myspace, Myspace Photos and Myspace Videos (Updated)
-
YiXin: Updated patterns to fix false positives from
Netease traffic. (Updated)
-
Crackle Video: Updated patterns to fix
false positives from Crackle website traffic. (Updated)
-
Hulu Video: Updated patterns to fix false
positives from Hulu website traffic. (Updated)
-
CC Studios: Updated patterns to fix false
positives from Comedy Central website traffic. (Updated)
-
Netflix Stream: Updated patterns to fix
false positives from Netflix website traffic. (Updated)
-
Zynga: Updated patterns to distinguish traffic from
Words With Friends. (Updated)
-
T Mobile: Updated patterns to fix false
positives from Advertising.com traffic. (Updated)
-
Facebook: Updated patterns to distinguish
detection between Facebook Video, Facebook Photos and Facebook (Updated)
-
Alibaba: Updated patterns to fix false
positives from Alipay traffic. (Updated)
-
F-secure: Updated patterns to avoid
causing false positives for Malwarebytes. (Updated)
-
Windows Live Skydrive:
Updated patterns to fix false positives from OneDrive traffic. (Updated)
-
Power BI: Updated description and
enhanced detection. (Updated)
-
Microsoft Teams: Enhanced coverage to
include UDP traffic (Updated)
-
Azure Service Bus: Azure Service Bus is a
multi-tenant cloud messaging service you can use to send information between
applications and services. (Added)
-
Fiserv: Fiserv is a provider of
technology solutions to the financial world, including banks, credit unions,
securities processing organizations, insurance companies, etc. (Added)
-
Jaspersoft: Jaspersoft embedded analytics
software is a BI platform to design, embed, and manage reports and analytics
with programmatic control. (Added)
-
QlikView: QlikView is a BI data discovery
product for creating guided analytics applications and dashboards tailor-made
for business challenges. (Added)
-
RingCentral: RingCentral is an American
publicly traded provider of cloud-based communications and collaboration
solutions for businesses. (Added)
-
Tableau: Tableau Software is an
interactive data visualization and data analytics software which provides
pictorial and graphical representations of data. (Added)
-
VPN Monster: VPN Monster is a
Russia-based VPN service provider that provides its users with a significant
degree of anonymity and security. (Added)
-
OneLogin: A cloud-based identity and
access management service. (Added)
-
Smartsheet: Corrected patterns for
detection (Updated)
-
Jira: Modified application name to lower case and added
patterns for detection. (Updated)
-
Box: Removed unused patterns (Updated)
-
Showbox: Removed unused patterns
(Updated)
-
ServiceNow: Updated patterns to fix false
positives from OneLogin traffic. (Updated)
-
QQ Games: Corrected patterns for
detection (Updated)
-
Google Hangouts: Updated detector to
classify flows properly (Updated)
-
Google: Updated patterns to fix false
positives from Facebook traffic. (Updated)
-
Imo.im: Detector updated as some SMTP and
SMB flows were getting classified as imo.im. (Updated)
-
CVE: 2010-1119 - Snort Reference ID 29623,18958,18957,56042 (Added)
-
CVE: 2015-6098 - Snort Reference ID 36745,36744,55198,55197 (Added)
-
CVE: 2017-6331 - Snort Reference ID 55814,55813 (Added)
-
CVE: 2018-15959 - Snort Reference ID 56151,56150 (Added)
-
CVE: 2018-4314 - Snort Reference ID 56044,56043 (Added)
-
CVE: 2018-4416 - Snort Reference ID 56009,56008 (Added)
-
CVE: 2018-4939 - Snort Reference ID 56151,56150 (Added)
-
CVE: 2018-9995 - Snort Reference ID 46826,46825,55840,55839 (Added)
-
CVE: 2019-0230 - Snort Reference ID 41923,41922 (Added)
-
CVE: 2019-0233 - Snort Reference ID 56001,56000,55999 (Added)
-
CVE: 2019-0604 - Snort Reference ID 51368,49861,50275,55862 (Added)
-
CVE: 2019-13372 - Snort Reference ID 55981 (Added)
-
CVE: 2019-13373 - Snort Reference ID 56002 (Added)
-
CVE: 2019-13374 - Snort Reference ID 56004 (Added)
-
CVE: 2019-13375 - Snort Reference ID 56007,56006,56005 (Added)
-
CVE: 2019-15283 - Snort Reference ID 52102,52103 (Added)
-
CVE: 2019-15285 - Snort Reference ID 52106,52107 (Added)
-
CVE: 2019-15287 - Snort Reference ID 52110,52111 (Added)
-
CVE: 2019-15957 - Snort Reference ID 52119,52120,52121,52122 (Added)
-
CVE: 2019-15993 - Snort Reference ID 52993,52994,52995,52996,52997 (Added)
-
CVE: 2019-16009 - Snort Reference ID 52559,52560 (Added)
-
CVE: 2019-16019 - Snort Reference ID 52633 (Added)
-
CVE: 2019-16021 - Snort Reference ID 52633 (Added)
-
CVE: 2019-16023 - Snort Reference ID 52633 (Added)
-
CVE: 2019-16028 - Snort Reference ID 52627,52628,52629,52630,52631 (Added)
-
CVE: 2019-1888 - Snort Reference ID 53168 (Added)
-
CVE: 2019-1983 - Snort Reference ID 53170 (Added)
-
CVE: 2019-8762 - Snort Reference ID 55799,55798 (Added)
-
CVE: 2019-9670 - Snort Reference ID 49865,49864 (Added)
-
CVE: 2020-0664 - Snort Reference ID 55140,55139 (Added)
-
CVE: 2020-0856 - Snort Reference ID 55206 (Added)
-
CVE: 2020-0941 - Snort Reference ID 55188,55187 (Added)
-
CVE: 2020-1115 - Snort Reference ID 55142,55141 (Added)
-
CVE: 2020-1152 - Snort Reference ID 55162,55161 (Added)
-
CVE: 2020-1170 - Snort Reference ID 55922 (Added)
-
CVE: 2020-1245 - Snort Reference ID 55144,55143 (Added)
-
CVE: 2020-1308 - Snort Reference ID 55146,55145 (Added)
-
CVE: 2020-13499 - Snort Reference ID 54478 (Added)
-
CVE: 2020-13500 - Snort Reference ID 54478 (Added)
-
CVE: 2020-13501 - Snort Reference ID 54478 (Added)
-
CVE: 2020-13504 - Snort Reference ID 54480 (Added)
-
CVE: 2020-13505 - Snort Reference ID 54480 (Added)
-
CVE: 2020-13699 - Snort Reference ID 54995,54994 (Added)
-
CVE: 2020-13934 - Snort Reference ID 55801,55800 (Added)
-
CVE: 2020-13935 - Snort Reference ID 56086 (Added)
-
CVE: 2020-14386 - Snort Reference ID 56052,56051 (Added)
-
CVE: 2020-14644 - Snort Reference ID 55933,55932 (Added)
-
CVE: 2020-1472 - Snort Reference ID 55704,55703,55802 (Added)
-
CVE: 2020-15363 - Snort Reference ID 55838,55837,55836 (Added)
-
CVE: 2020-15364 - Snort Reference ID 55835,55834 (Added)
-
CVE: 2020-15505 - Snort Reference ID 56155,56154 (Added)
-
CVE: 2020-16875 - Snort Reference ID 55826 (Added)
-
CVE: 2020-16896 - Snort Reference ID 55994 (Added)
-
CVE: 2020-16898 - Snort Reference ID 55984 (Added)
-
CVE: 2020-16899 - Snort Reference ID 55993 (Added)
-
CVE: 2020-16907 - Snort Reference ID 55943,55942 (Added)
-
CVE: 2020-16913 - Snort Reference ID 55990,55989 (Added)
-
CVE: 2020-16915 - Snort Reference ID 55980,55979 (Added)
-
CVE: 2020-16922 - Snort Reference ID 55983,55982 (Added)
-
CVE: 2020-16947 - Snort Reference ID 56157,56156 (Added)
-
CVE: 2020-16952 - Snort Reference ID 56136,56135,56134,56070,56069 (Added)
-
CVE: 2020-17496 - Snort Reference ID 51621,51620,51837,51836,51835 (Added)
-
CVE: 2020-25213 - Snort Reference ID 55778 (Added)
-
CVE: 2020-3141 - Snort Reference ID 55815,55816,55817 (Added)
-
CVE: 2020-3304 - Snort Reference ID 16195 (Added)
-
CVE: 2020-3359 - Snort Reference ID 55832 (Added)
-
CVE: 2020-3399 - Snort Reference ID 55830 (Added)
-
CVE: 2020-3425 - Snort Reference ID 55818 (Added)
-
CVE: 2020-3426 - Snort Reference ID 55808 (Added)
-
CVE: 2020-3430 - Snort Reference ID 55016,55017,55018,55035 (Added)
-
CVE: 2020-3436 - Snort Reference ID 56087 (Added)
-
CVE: 2020-3456 - Snort Reference ID 56084,56085 (Added)
-
CVE: 2020-3487 - Snort Reference ID 55831,55924,55925 (Added)
-
CVE: 2020-3488 - Snort Reference ID 55806 (Added)
-
CVE: 2020-3492 - Snort Reference ID 55820 (Added)
-
CVE: 2020-3494 - Snort Reference ID 55807 (Added)
-
CVE: 2020-3495 - Snort Reference ID 55035 (Added)
-
CVE: 2020-3510 - Snort Reference ID 55822 (Added)
-
CVE: 2020-3516 - Snort Reference ID 55833 (Added)
-
CVE: 2020-3526 - Snort Reference ID 55819 (Added)
-
CVE: 2020-3528 - Snort Reference ID 56090,56091 (Added)
-
CVE: 2020-3572 - Snort Reference ID 56089 (Added)
-
CVE: 2020-3894 - Snort Reference ID 55013,55012 (Added)
-
CVE: 2020-4211 - Snort Reference ID 55921,55920,55919,55918 (Added)
-
CVE: 2020-6083 - Snort Reference ID 53125 (Added)
-
CVE: 2020-6085 - Snort Reference ID 53049 (Added)
-
CVE: 2020-6086 - Snort Reference ID 53049,53127 (Added)
-
CVE: 2020-6087 - Snort Reference ID 53128 (Added)
-
CVE: 2020-6097 - Snort Reference ID 53565 (Added)
-
CVE: 2020-6104 - Snort Reference ID 53731,53732 (Added)
-
CVE: 2020-6105 - Snort Reference ID 53684,53685 (Added)
-
CVE: 2020-6106 - Snort Reference ID 53742,53743 (Added)
-
CVE: 2020-6107 - Snort Reference ID 53684,53685 (Added)
-
CVE: 2020-6108 - Snort Reference ID 53729,53730 (Added)
-
CVE: 2020-6112 - Snort Reference ID 53990,53991 (Added)
-
CVE: 2020-6113 - Snort Reference ID 53948,53949 (Added)
-
CVE: 2020-6115 - Snort Reference ID 53992,53993 (Added)
-
CVE: 2020-6116 - Snort Reference ID 54010,54011 (Added)
-
CVE: 2020-6117 - Snort Reference ID 54132,54133,54134 (Added)
-
CVE: 2020-6118 - Snort Reference ID 54132,54133,54134 (Added)
-
CVE: 2020-6119 - Snort Reference ID 54132,54133,54134 (Added)
-
CVE: 2020-6120 - Snort Reference ID 54132,54133,54134 (Added)
-
CVE: 2020-6121 - Snort Reference ID 54132,54133,54134 (Added)
-
CVE: 2020-6122 - Snort Reference ID 54132,54133,54134 (Added)
-
CVE: 2020-6123 - Snort Reference ID 54135,54136,54137 (Added)
-
CVE: 2020-6124 - Snort Reference ID 54135,54136,54137 (Added)
-
CVE: 2020-6125 - Snort Reference ID 54138 (Added)
-
CVE: 2020-6126 - Snort Reference ID 54139,54140,54141 (Added)
-
CVE: 2020-6127 - Snort Reference ID 54139,54140,54141 (Added)
-
CVE: 2020-6128 - Snort Reference ID 54139,54140,54141 (Added)
-
CVE: 2020-6129 - Snort Reference ID 54142,54143,54144 (Added)
-
CVE: 2020-6130 - Snort Reference ID 54142,54143,54144 (Added)
-
CVE: 2020-6131 - Snort Reference ID 54142,54143,54144 (Added)
-
CVE: 2020-6132 - Snort Reference ID 54123,54124,54125 (Added)
-
CVE: 2020-6133 - Snort Reference ID 54126,54127,54128 (Added)
-
CVE: 2020-6134 - Snort Reference ID 54129,54130,54131 (Added)
-
CVE: 2020-6135 - Snort Reference ID 54259,54260,54261 (Added)
-
CVE: 2020-6136 - Snort Reference ID 54262,54263,54264 (Added)
-
CVE: 2020-6137 - Snort Reference ID 54251,54252,54253 (Added)
-
CVE: 2020-6138 - Snort Reference ID 54251,54252,54253 (Added)
-
CVE: 2020-6139 - Snort Reference ID 54251,54252,54253 (Added)
-
CVE: 2020-6140 - Snort Reference ID 54251,54252,54253 (Added)
-
CVE: 2020-6141 - Snort Reference ID 54267,54268,54269 (Added)
-
CVE: 2020-6142 - Snort Reference ID 54254,54255,54256 (Added)
-
CVE: 2020-6143 - Snort Reference ID 54257,54258 (Added)
-
CVE: 2020-6144 - Snort Reference ID 54257,54258 (Added)
-
CVE: 2020-6146 - Snort Reference ID 54047,54048 (Added)
-
CVE: 2020-6151 - Snort Reference ID 54411,54412,54413,54414 (Added)
-
CVE: 2020-6152 - Snort Reference ID 54390,54391 (Added)
-
CVE: 2020-6388 - Snort Reference ID 55810,55809 (Added)
-
CVE: 2020-6967 - Snort Reference ID 55743 (Added)
-
CVE: 2020-7047 - Snort Reference ID 55797 (Added)
-
CVE: 2020-7048 - Snort Reference ID 55797 (Added)
-
CVE: 2020-8163 - Snort Reference ID 55821 (Added)
-
CVE: 2020-8193 - Snort Reference ID 56138 (Added)
-
CVE: 2020-8195 - Snort Reference ID 56138,56162 (Added)
-
CVE: 2020-8218 - Snort Reference ID 55640,55639,55638,55637 (Added)
-
CVE: 2020-8758 - Snort Reference ID 55210,55209,55208,55207 (Added)
-
CVE: 2020-8844 - Snort Reference ID 55742,55741 (Added)
-
CVE: 2020-9496 - Snort Reference ID 55978 (Added)
-
CVE: 2020-9609 - Snort Reference ID 53563,53564 (Added)