Rule Update

22-035 (July 19, 2022)


* indicates a new version of an existing rule

Deep Packet Inspection Rules:

NFS Server
1011492 - Microsoft Windows Network File System Remote Code Execution Vulnerability (CVE-2022-30136)

Sante PACS Server
1011485 - Sante PACS Server SQL Injection Authentication Bypass Vulnerability (CVE-2022-2272)

Web Application Common
1000552* - Generic Cross Site Scripting(XSS) Prevention
1011490 - Zoho ManageEngine ADAudit Plus XML External Entity Injection Vulnerability (CVE-2022-28219)

Web Application PHP Based
1011481* - WordPress 'Events Made Easy' Plugin SQL Injection Vulnerability (CVE-2022-1905)
1011489 - WordPress 'Random Banner' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-0210)

Web Client Common
1011486 - Foxit PDF Reader And Editor Information Disclosure Vulnerability (CVE-2022-34874)
1011445 - Microsoft Windows Media Foundation Memory Corruption Vulnerability (CVE-2020-0807)

Web Server HTTPS
1011488 - Centreon 'Poller Resource' SQL Injection Vulnerability (CVE-2022-34871)
1011487 - Centreon 'Virtual Metrics' SQL Injection Vulnerability (CVE-2022-34872)
1011491 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2022-23277)
1011479* - OpenSSL 'c_rehash' Script Command Injection Vulnerability (CVE-2022-2068)

Web Server Miscellaneous
1011483* - Jenkins 'JUnit' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-34176)

Integrity Monitoring Rules:

1006683* - TMTR-0016: Suspicious Running Processes Detected (ATT&CK T1560.001)

Log Inspection Rules:

There are no new or updated Log Inspection Rules in this Security Update.