New WAF Objects: [total: 7] ================================== Signature: ID: '708526' Name: 'CVE-2026-33017: Langflow - Code Injection' Attack: Remote Command Execution - Blocking Attack Class: Remote Command Execution Dictionary: Recommended for Blocking for Web Applications Pattern: part="/api/v1/build_public_tmp/", part="/flow", part="data" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708525' Name: Blocking gjq.io domain for OOB attacks Attack: Automation Attack - Blocking Attack Class: Automation Attack Dictionary: Recommended for Blocking for Web Applications Pattern: part=".gjq.io", rgxp="\w{1,60}\.gjq\.io" Policy: Recommended Signatures Policy for Web Applications Search In: - parameters - headers Signature: ID: '708524' Name: 'IbWebAdmin - Unauthenticated RCE #2' Attack: Illegal Resource Access - Blocking Attack Class: Illegal Resource Access Dictionary: Recommended for Blocking for Web Applications Pattern: part="/admin.php", part="adm_gfix_housekeeping", rgxp="adm_housekeeping\=[\s\S]{1,100}hawktrace" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708523' Name: IbWebAdmin - Unauthenticated RCE Attack: Illegal Resource Access - Blocking Attack Class: Illegal Resource Access Dictionary: Recommended for Blocking for Web Applications Pattern: part="/toggle_fold_panel.php", part="a=admin", part="p=3", part="d=open" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708522' Name: 'CVE-2026-20127: Cisco-SD-WAN - RCE' Attack: Remote Command Execution - Blocking Attack Class: Remote Command Execution Dictionary: Recommended for Blocking for Web Applications Pattern: part="/dataservice/smartLicensing/uploadAck", rgxp="(gz.war|\/var\/lib\/wildfly\/standalone\/deployments\/)" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708521' Name: 'CVE-2026-21902: Juniper Junos Evolved - Pre-Auth RCE 2' Attack: Remote Command Execution - Blocking Attack Class: Remote Command Execution Dictionary: Recommended for Blocking for Web Applications Pattern: part="/config/dag-instance/", part="dag", part="target.type=RE", part="schedule.start" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters Signature: ID: '708520' Name: 'CVE-2026-21902: Juniper Junos Evolved - Pre-Auth RCE' Attack: Remote Command Execution - Blocking Attack Class: Remote Command Execution Dictionary: Recommended for Blocking for Web Applications Pattern: part="/config/command/", part="syntax", part="type=RE-SHELL" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters