New WAF Objects: [total: 8] ================================== Signature: ID: '708425' Name: OOB attack using .cb.apprandom.net Attack: Automation Attack - Blocking Attack Class: Automation Attack Dictionary: Recommended for Blocking for Web Applications Pattern: part=".cb.apprandom.net" Policy: Recommended Signatures Policy for Web Applications Search In: - parameters - headers Signature: ID: '708424' Name: OOB attack using .ptt-logger.net Attack: Automation Attack - Blocking Attack Class: Automation Attack Dictionary: Recommended for Blocking for Web Applications Pattern: part=".ptt-logger.net" Policy: Recommended Signatures Policy for Web Applications Search In: - parameters - headers Signature: ID: '708423' Name: OOB attack using .dns.watchtowr-oob.com Attack: Automation Attack - Blocking Attack Class: Automation Attack Dictionary: Recommended for Blocking for Web Applications Pattern: part=".dns.watchtowr-oob.com" Policy: Recommended Signatures Policy for Web Applications Search In: - parameters - headers Signature: ID: '708422' Name: OOB attack using .canary.assetnotessrf.com Attack: Automation Attack - Blocking Attack Class: Automation Attack Dictionary: Recommended for Blocking for Web Applications Pattern: part=".canary.assetnotessrf.com" Policy: Recommended Signatures Policy for Web Applications Search In: - parameters - headers Signature: ID: '708421' Name: 'CVE-2025-36604: Dell UnityVSA Pre-Auth Command Injection' Attack: Remote Command Execution - Blocking Attack Class: Remote Command Execution Dictionary: Recommended for Blocking for Web Applications Pattern: part="/misc/`", part="IFS", part="/index.html" Policy: Recommended Signatures Policy for Web Applications Search In: - url Signature: ID: '708420' Name: 'CVE-2021-32648: OctoberCMS - Account Takeover' Attack: Account Takeover - Blocking Attack Class: Account Takeover Dictionary: Recommended for Blocking for Web Applications Pattern: part="/backend/backend/auth/reset/1/", part="id=1", part="code=true" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708419' Name: 'CVE-2025-8085: Ditty WordPress plugin - SSRF' Attack: Illegal Resource Access - Blocking Attack Class: Illegal Resource Access Dictionary: Recommended for Blocking for Web Applications Pattern: part="/wp-json/dittyeditor/v1/displayItems", part="apiData.layouts.html=", rgxp="apiData.layouts.html=.{0,100}(http|https|ftp|ftps|file):\/\/" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708418' Name: CVE-2025-10035 Fortra GoAnywhere RCE Pattern: part="/goanywhere/license/Unlicensed.xhtml/", part="javax.faces.ViewState", part="GARequestAction=activate" Attack: Remote Command Execution - Blocking Attack Class: Remote Command Execution Dictionary: Recommended for Blocking for Web Applications Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters