- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-07-2014 11:35 PM
Each ID handle different type of traffic that can exploit this vulnerability and thus will be hit when that traffic tries to exploit it.
36729 (for HTTP request header), 36730 (for DHCP), 36731 (HTTP request parameters), 36732 (SMTP), 36736 (FTP), 36737(SIP)
Threatvault links:
https://threatvault.paloaltonetworks.com/Home/ThreatDetail/36729
https://threatvault.paloaltonetworks.com/Home/ThreatDetail/36730
https://threatvault.paloaltonetworks.com/Home/ThreatDetail/36731
https://threatvault.paloaltonetworks.com/Home/ThreatDetail/36732
https://threatvault.paloaltonetworks.com/Home/ThreatDetail/36736
https://threatvault.paloaltonetworks.com/Home/ThreatDetail/36737
Hope it helps !
10-08-2014 12:10 AM
csharma. Thank You Very Much
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!