Rule Update
22-056 (November 15, 2022)
Publish date: November 15, 2022
DESCRIPTION
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1011037* - Identified Remote System Discovery Over SMB - 1 (ATT&CK T1018)
1011027* - Identified Session Enumeration Request Over SMB (ATT&CK T1049)
Directory Server LDAP
1004656* - IBM Tivoli Directory Server Remote Code Execution Vulnerability (CVE-2011-1206)
Web Application PHP Based
1011601 - WordPress 'GSEOR' Plugin SQL Injection Vulnerability (CVE-2021-24396)
1011602 - WordPress 'MicroCopy' Plugin SQL Injection Vulnerability (CVE-2021-24397)
1011599 - WordPress 'Nevma Adaptive Images' Plugin Directory Traversal Vulnerability (CVE-2019-14205)
1011603 - WordPress 'OMGF' Plugin Directory Traversal Vulnerability (CVE-2021-24638)
1011600 - WordPress 'WP Statistics' Plugin SQL Injection Vulnerability (CVE-2021-24340)
Web Server Common
1011466* - Apache HTTP Server 'mod_sed' Denial Of Service Vulnerability (CVE-2022-30522)
Web Server HTTPS
1011550* - Centreon 'Poller Resource' SQL Injection Vulnerability (CVE-2022-41142)
1011519* - Node.js HTTP Request Smuggling Attack (CVE-2022-32214)
Web Server IIS
1000101* - Microsoft IIS Malformed HTTP Request DoS Vulnerability
Web Server Miscellaneous
1011598 - XWiki Cross-Site Scripting Vulnerability (CVE-2022-36097)
Web Server SharePoint
1011541* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2022-35823)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1002835* - Web Server - Web Access Events
Deep Packet Inspection Rules:
DCERPC Services
1011037* - Identified Remote System Discovery Over SMB - 1 (ATT&CK T1018)
1011027* - Identified Session Enumeration Request Over SMB (ATT&CK T1049)
Directory Server LDAP
1004656* - IBM Tivoli Directory Server Remote Code Execution Vulnerability (CVE-2011-1206)
Web Application PHP Based
1011601 - WordPress 'GSEOR' Plugin SQL Injection Vulnerability (CVE-2021-24396)
1011602 - WordPress 'MicroCopy' Plugin SQL Injection Vulnerability (CVE-2021-24397)
1011599 - WordPress 'Nevma Adaptive Images' Plugin Directory Traversal Vulnerability (CVE-2019-14205)
1011603 - WordPress 'OMGF' Plugin Directory Traversal Vulnerability (CVE-2021-24638)
1011600 - WordPress 'WP Statistics' Plugin SQL Injection Vulnerability (CVE-2021-24340)
Web Server Common
1011466* - Apache HTTP Server 'mod_sed' Denial Of Service Vulnerability (CVE-2022-30522)
Web Server HTTPS
1011550* - Centreon 'Poller Resource' SQL Injection Vulnerability (CVE-2022-41142)
1011519* - Node.js HTTP Request Smuggling Attack (CVE-2022-32214)
Web Server IIS
1000101* - Microsoft IIS Malformed HTTP Request DoS Vulnerability
Web Server Miscellaneous
1011598 - XWiki Cross-Site Scripting Vulnerability (CVE-2022-36097)
Web Server SharePoint
1011541* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2022-35823)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1002835* - Web Server - Web Access Events
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more