Descrizione

* indicates a new version of an existing rule

Deep Packet Inspection Rules:

Web Application PHP Based
1011481 - WordPress 'Events Made Easy' Plugin SQL Injection Vulnerability (CVE-2022-1905)
1011431* - WordPress 'LayerSlider' Plugin Cross-Site Scripting Vulnerability (CVE-2022-1153)
1011473* - WordPress 'WP Statistics' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-25305)


Web Client Common
1011482 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB22-32)
1011480 - RARLAB UnRAR Directory Traversal Vulnerability (CVE-2022-30333)


Web Server HTTPS
1011476 - Identified Usage of MASSCAN Tool
1011472* - OpenSSL 'c_rehash' Script Command Injection Vulnerability (CVE-2022-1292)
1011479 - OpenSSL 'c_rehash' Script Command Injection Vulnerability (CVE-2022-2068)


Web Server Miscellaneous
1011483 - Jenkins 'JUnit' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-34176)
1011474* - Jenkins 'Rundeck' Plugin Stored Cross-Site Scripting Vulnerability (CVE-2022-30956)


Web Server SharePoint
1011478* - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2022-30157)


Integrity Monitoring Rules:

There are no new or updated Integrity Monitoring Rules in this Security Update.


Log Inspection Rules:

1010595* - Microsoft LDAP Query Execution
1008670* - Microsoft Windows Security Events - 3
1011453* - Microsoft Windows WMI Events - 1