New WAF Objects: [total: 14] ================================== Signature: ID: '708484' Name: 'CVE-2025-55184 : React function DoS' Attack: Remote Command Execution - Blocking Attack Class: Remote Command Execution Dictionary: Recommended for Blocking for Web Applications Pattern: part="resolved_model", rgxp="\d{1,3}\.value\.then\=\$\d{1,3}\:then" Policy: Recommended Signatures Policy for Web Applications Search In: - parameters Policy: name: 'CVE-2025-20393: Cisco AsyncOS Unsafe Deserialization RCE' id: '20000343' minimum version: '10.0' predicates: - type: HTTP Request Method operation: At Least One values: - POST - type: HTTP Request operation: Match All match values: - part: parameter name: auth operation: MatchRegExp value: (\[\[#\d{1,5}\]\]){10,} - part: url operation: includes value: search Policy: name: 'CVE-2025-37164 : HPE Oneview : Unauthenticated RCE' id: '20000342' minimum version: '10.0' predicates: - type: HTTP Request Method operation: At Least One values: - PUT - type: HTTP Request operation: Match All match values: - part: parameter name: cmd operation: MatchRegExp value: . - part: url operation: includes value: /rest/id-pools/executeCommand Signature: ID: '708483' Name: DOM based XSS using frames Attack: Cross-Site Scripting - Blocking Attack Class: Cross-Site Scripting Dictionary: Recommended for Blocking for Web Applications Pattern: part="frames", rgxp="frames\s?\[(\/|\'|\"|\(|\`|\d)[\s\S]{1,100}" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708482' Name: DOM based XSS using parent Attack: Cross-Site Scripting - Blocking Attack Class: Cross-Site Scripting Dictionary: Recommended for Blocking for Web Applications Pattern: part="parent", rgxp="(?