Talos Rules 2022-03-29
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-ie, malware-cnc, malware-other, policy-social, policy-spam, protocol-scada, protocol-telnet and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)

Modified Rules:


 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)

Modified Rules:


 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)

Modified Rules:


 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)

Modified Rules:


 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 3:30933 <-> ENABLED <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt (server-other.rules)
 * 3:32114 <-> ENABLED <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt (server-other.rules)
 * 3:36649 <-> ENABLED <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt (server-other.rules)
 * 3:44419 <-> ENABLED <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt (protocol-scada.rules)
 * 3:46126 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46127 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:46128 <-> ENABLED <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt (server-other.rules)
 * 3:50320 <-> ENABLED <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt  (server-other.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (snort3-server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (snort3-server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (snort3-server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (snort3-server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (snort3-server-webapp.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (snort3-malware-other.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (snort3-server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (snort3-server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (snort3-server-webapp.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (snort3-server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (snort3-server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (snort3-server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (snort3-server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (snort3-server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (snort3-server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (snort3-server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (snort3-server-webapp.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (snort3-server-webapp.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (snort3-malware-other.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (snort3-server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (snort3-server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (snort3-malware-other.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (snort3-server-webapp.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (snort3-server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (snort3-server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (snort3-server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (snort3-server-webapp.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (snort3-server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (snort3-server-webapp.rules)
 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (snort3-server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (snort3-server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (snort3-server-webapp.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (snort3-server-webapp.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (snort3-server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (snort3-server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (snort3-server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (snort3-server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (snort3-server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (snort3-server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (snort3-server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (snort3-server-webapp.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (snort3-server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (snort3-server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (snort3-server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (snort3-malware-other.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (snort3-malware-other.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (snort3-malware-other.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (snort3-malware-other.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (snort3-malware-other.rules)

Modified Rules:


 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (snort3-protocol-telnet.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (snort3-policy-spam.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (snort3-protocol-telnet.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (snort3-policy-spam.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (snort3-protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (snort3-browser-ie.rules)
 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (snort3-policy-spam.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (snort3-policy-spam.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (snort3-server-webapp.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (snort3-protocol-telnet.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (snort3-protocol-telnet.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (snort3-server-webapp.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (snort3-server-webapp.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (snort3-policy-social.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (snort3-server-webapp.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (snort3-malware-cnc.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (snort3-protocol-telnet.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (snort3-protocol-telnet.rules)

2022-03-29 12:38:36 UTC

Snort Subscriber Rules Update

Date: 2022-03-29

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:59334 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59323 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59333 <-> DISABLED <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt (server-webapp.rules)
 * 1:59353 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59325 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59308 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59330 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59356 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59360 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59340 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59326 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59357 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59350 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59358 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59324 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt (server-webapp.rules)
 * 1:59336 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59359 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt (server-webapp.rules)
 * 1:59361 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59332 <-> DISABLED <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt (server-webapp.rules)
 * 1:59309 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59347 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59317 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59316 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59354 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59338 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59351 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt (malware-other.rules)
 * 1:59310 <-> DISABLED <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt (server-webapp.rules)
 * 1:59322 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:59320 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59312 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59313 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59314 <-> DISABLED <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt (server-webapp.rules)
 * 1:59349 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt (malware-other.rules)
 * 1:59329 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59307 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59337 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59321 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59352 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt (malware-other.rules)
 * 1:59311 <-> DISABLED <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt (server-webapp.rules)
 * 1:59328 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59306 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59331 <-> DISABLED <-> SERVER-WEBAPP rConfig snippets SQL injection attempt (server-webapp.rules)
 * 1:59362 <-> DISABLED <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt (server-webapp.rules)
 * 1:59346 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)
 * 1:59315 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59339 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59318 <-> DISABLED <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt (server-webapp.rules)
 * 1:59355 <-> DISABLED <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt (server-webapp.rules)
 * 1:59348 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt (malware-other.rules)
 * 1:59319 <-> DISABLED <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt (server-webapp.rules)
 * 1:59341 <-> DISABLED <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt (server-webapp.rules)
 * 1:59327 <-> DISABLED <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt (server-webapp.rules)
 * 1:59335 <-> DISABLED <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt (server-webapp.rules)
 * 1:59305 <-> DISABLED <-> SERVER-WEBAPP OCS Inventory NG command injection attempt (server-webapp.rules)
 * 1:59342 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59343 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59344 <-> DISABLED <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt (server-webapp.rules)
 * 1:59345 <-> DISABLED <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt (server-webapp.rules)

Modified Rules:


 * 1:29398 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:20812 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt  (protocol-telnet.rules)
 * 1:3533 <-> DISABLED <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt  (protocol-telnet.rules)
 * 1:56627 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:20813 <-> DISABLED <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt  (protocol-telnet.rules)
 * 1:56626 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:28088 <-> DISABLED <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt  (policy-social.rules)
 * 1:3537 <-> DISABLED <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt  (protocol-telnet.rules)
 * 1:3274 <-> ENABLED <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt  (protocol-telnet.rules)
 * 1:28112 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt  (browser-ie.rules)
 * 1:25856 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:56624 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:17269 <-> DISABLED <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt  (protocol-telnet.rules)
 * 1:29396 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29399 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:29397 <-> DISABLED <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same  (policy-spam.rules)
 * 1:56625 <-> DISABLED <-> SERVER-WEBAPP rConfig command injection attempt (server-webapp.rules)
 * 1:53264 <-> DISABLED <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt  (malware-cnc.rules)

2022-03-29 12:41:59 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:41:59 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:41:59 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:41:59 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:41:59 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:00 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:00 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:00 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:00 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:00 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:00 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:00 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:01 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:01 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt


2022-03-29 12:42:01 UTC

Snort Subscriber Rules Update

Date: 2022-03-28-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:59305 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59306 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59307 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59308 <-> SERVER-WEBAPP OCS Inventory NG command injection attempt
* 1:59309 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59310 <-> SERVER-WEBAPP Symantec Web Gateway cross site scripting attempt
* 1:59311 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59312 <-> SERVER-WEBAPP NagiosQL txtSearch cross site scripting attempt
* 1:59313 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59314 <-> SERVER-WEBAPP HPE Intelligent Management Center PlatNavigationToBean URL Java expression language injection attempt
* 1:59315 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59316 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59317 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59318 <-> SERVER-WEBAPP IPFire ids cgi OINKCODE command injection attempt
* 1:59319 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59320 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59321 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota directory traversal attempt
* 1:59322 <-> SERVER-WEBAPP Advantech WISE-PaaS RMM UpgradeMgmt upload_ota arbitrary JSP file upload attempt
* 1:59323 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59324 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59325 <-> SERVER-WEBAPP Trend Micro Apex One and OfficeScan directory traversal attempt
* 1:59326 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59327 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59328 <-> SERVER-WEBAPP rConfig compliance policies SQL injection attempt
* 1:59329 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59330 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59331 <-> SERVER-WEBAPP rConfig snippets SQL injection attempt
* 1:59332 <-> SERVER-WEBAPP Car Rental Management System local file inclusion attempt
* 1:59333 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59334 <-> SERVER-WEBAPP Apache Kylin REST API DiagnosisService command injection attempt
* 1:59335 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59336 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59337 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59338 <-> SERVER-WEBAPP Micro Focus GroupWise Admin Console cross site scripting attempt
* 1:59339 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59340 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59341 <-> SERVER-WEBAPP Trend Micro Control Manager AdHocQuery_Processor GetProductCategory SQL injection attempt
* 1:59342 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59343 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59344 <-> SERVER-WEBAPP Multi Restaurant Table Reservation System 1.0 table_id unauthenticated SQL injection attempt
* 1:59345 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59346 <-> SERVER-WEBAPP Oracle E-Business Suite Common Applications Calendar cross site scripting attempt
* 1:59347 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59348 <-> MALWARE-OTHER Php.Webshell.CWShell outbound connection attempt
* 1:59349 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59350 <-> MALWARE-OTHER Php.Webshell.CWShell inbound connection attempt
* 1:59351 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59352 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59353 <-> MALWARE-OTHER Php.Webshell.SmallShell download attempt
* 1:59354 <-> MALWARE-OTHER Php.Webshell.SmallShell upload attempt
* 1:59355 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59356 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59357 <-> SERVER-WEBAPP Zoho ManageEngine Desktop Central directory traversal attempt
* 1:59358 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59359 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59360 <-> SERVER-WEBAPP Zoho ManageEngine Applications Manager AlertRes_Mtrgrp jsp sid SQL injection attempt
* 1:59361 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt
* 1:59362 <-> SERVER-WEBAPP YouPHPTube checkConfiguration php PHP code injection attempt

Modified Rules:

* 1:17269 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:20812 <-> PROTOCOL-TELNET FreeBSD telnetd enc_keyid overflow attempt 
* 1:20813 <-> PROTOCOL-TELNET FreeBSD telnetd dec_keyid overflow attempt 
* 1:25856 <-> PROTOCOL-TELNET Client env_opt_add Buffer Overflow attempt 
* 1:28088 <-> POLICY-SOCIAL Pidgin MXIT emoticon integer overflow attempt 
* 1:28112 <-> BROWSER-IE Microsoft Internet Explorer 9 null character in string information disclosure attempt 
* 1:29396 <-> POLICY-SPAM Potential phishing attack - .zip receipt filename download with .exe name within .zip the same 
* 1:29397 <-> POLICY-SPAM Potential phishing attack - .zip shipping filename download with .exe name within .zip the same 
* 1:29398 <-> POLICY-SPAM Potential phishing attack - .zip voicemail filename download with .exe name within .zip the same 
* 1:29399 <-> POLICY-SPAM Potential phishing attack - .zip statement filename download with .exe name within .zip the same 
* 3:30933 <-> SERVER-OTHER Cisco RV180 VPN remote code execution attempt
* 3:32114 <-> SERVER-OTHER Cisco ASA SunRPC inspection engine denial of service attempt
* 1:3274 <-> PROTOCOL-TELNET login buffer non-evasive overflow attempt 
* 1:3533 <-> PROTOCOL-TELNET client LINEMODE SLC overflow attempt 
* 1:3537 <-> PROTOCOL-TELNET client ENV OPT escape overflow attempt 
* 3:36649 <-> SERVER-OTHER Cisco Web Security Appliance range request memory leak denial of service attempt
* 3:44419 <-> PROTOCOL-SCADA TRUFFLEHUNTER TALOS-2017-0445 attack attempt
* 3:46126 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46127 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:46128 <-> SERVER-OTHER Cisco IOS XE IGMP denial of service attempt
* 3:50320 <-> SERVER-OTHER Cisco Unified Communications Manager denial of service attempt 
* 1:53264 <-> MALWARE-CNC Win.Trojan.DarkVision initial outbound CNC connection attempt 
* 1:56624 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56625 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56626 <-> SERVER-WEBAPP rConfig command injection attempt
* 1:56627 <-> SERVER-WEBAPP rConfig command injection attempt