Rule Update
22-035 (July 19, 2022)
Publish date: July 19, 2022
DESCRIPTION
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
NFS Server
1011492 - Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2022-30136)
Sante PACS Server
1011485 - Sante PACS Server SQL Injection Authentication Bypass Vulnerability (CVE-2022-2272)
Web Application Common
1000552* - Generic Cross Site Scripting(XSS) Prevention
1011490 - Zoho ManageEngine ADAudit Plus XML External Entity Injection Vulnerability (CVE-2022-28219)
Web Application PHP Based
1011481* - WordPress 'Events Made Easy' Plugin SQL Injection Vulnerability (CVE-2022-1905)
1011489 - WordPress 'Random Banner' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-0210)
Web Client Common
1011486 - Foxit PDF Reader And Editor Information Disclosure Vulnerability (CVE-2022-34874)
1011445 - Microsoft Windows Media Foundation Memory Corruption Vulnerability (CVE-2020-0807)
Web Server HTTPS
1011488 - Centreon 'Poller Resource' SQL Injection Vulnerability (CVE-2022-34871)
1011487 - Centreon 'Virtual Metrics' SQL Injection Vulnerability (CVE-2022-34872)
1011491 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2022-23277)
1011479* - OpenSSL 'c_rehash' Script Command Injection Vulnerability (CVE-2022-2068)
Web Server Miscellaneous
1011483* - Jenkins 'JUnit' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-34176)
Integrity Monitoring Rules:
1006683* - TMTR-0016: Suspicious Running Processes Detected (ATT&CK T1560.001)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
NFS Server
1011492 - Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2022-30136)
Sante PACS Server
1011485 - Sante PACS Server SQL Injection Authentication Bypass Vulnerability (CVE-2022-2272)
Web Application Common
1000552* - Generic Cross Site Scripting(XSS) Prevention
1011490 - Zoho ManageEngine ADAudit Plus XML External Entity Injection Vulnerability (CVE-2022-28219)
Web Application PHP Based
1011481* - WordPress 'Events Made Easy' Plugin SQL Injection Vulnerability (CVE-2022-1905)
1011489 - WordPress 'Random Banner' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-0210)
Web Client Common
1011486 - Foxit PDF Reader And Editor Information Disclosure Vulnerability (CVE-2022-34874)
1011445 - Microsoft Windows Media Foundation Memory Corruption Vulnerability (CVE-2020-0807)
Web Server HTTPS
1011488 - Centreon 'Poller Resource' SQL Injection Vulnerability (CVE-2022-34871)
1011487 - Centreon 'Virtual Metrics' SQL Injection Vulnerability (CVE-2022-34872)
1011491 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2022-23277)
1011479* - OpenSSL 'c_rehash' Script Command Injection Vulnerability (CVE-2022-2068)
Web Server Miscellaneous
1011483* - Jenkins 'JUnit' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-34176)
Integrity Monitoring Rules:
1006683* - TMTR-0016: Suspicious Running Processes Detected (ATT&CK T1560.001)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more