New Filters:
42571: HTTP: NETGEAR Orbi 760 SOAP API Authentication Bypass Vulnerability (ZDI-23-1283)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit an authentication bypass vulnerability in NETGEAR Orbi 760.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-41183 CVSS 8.8
- Zero Day Initiative: ZDI-23-1283
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: September 05, 2023
43182: HTTP: SonicWall GMS and Analytics detectInjection SQL Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a SQL injection vulnerability in SonicWall GMS and Analytics.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-34133 CVSS 8.7
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Client Application
- Release Date: September 05, 2023
43183: HTTP: LibreNMS Ports list.inc.php Reflected Cross-Site Scripting Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a reflected cross-site scripting vulnerability in LibreNMS.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-4347 CVSS 8.6
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: September 05, 2023
43189: HTTP: Tenda AX3 Dual band WiFi Router Command Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a command injection vulnerability affecting Tenda AX3 Dual band WiFi router.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-27240 CVSS 9.8
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: September 05, 2023
43190: HTTP: D-Link DIR820LA1_FW105B03 Command Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a directory traversal vulnerability in D-Link DIR820LA1_FW105B03.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-25280 CVSS 9.8
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: September 05, 2023
43191: HTTP: Arris TR3300 ddns function Command Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a command injection vulnerability in Arris TR3300.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2022-27002 CVSS 9.8
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: September 05, 2023
43195: SIP: Digium Asterisk res_pjsip_pubsub Out-of-Bounds Write Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: High
- Description: This filter detects an attempt to exploit an out-of-bounds write vulnerability in Digium Asterisk.
- Deployments:
- Deployment: Performance-Optimized (Block / Notify)
- References:
- Bugtraq ID: 103151
- Common Vulnerabilities and Exposures: CVE-2018-7284
- Classification: Vulnerability - Other
- Protocol: SIP (VOIP)
- Platform: Multi-Platform Server Application or Service
- Release Date: September 05, 2023
43196: HTTP: Juniper Networks Junos OS webauth_operation.php Unauthenticated File Upload
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Security Policy
- Severity: Moderate
- Description: This filter detects any file upload request to webauth_operation.php for Juniper Networks Junos OS.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2023-36846
- Classification: Security Policy - Authentication Failure (telnet login failed, brute force, etc.)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: September 05, 2023
43200: HTTP: Juniper Networks Junos OS webauth_operation.php PHPRC Variable Modification Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Exploits
- Severity: High
- Description: This filter detects an attempt to exploit an external variable modification vulnerability in Juniper Networks Junos OS.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-36845
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: September 05, 2023
43204: ZDI-CAN-21958: Zero Day Initiative Vulnerability (Microsoft Exchange)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against exploitation of a zero-day vulnerability affecting Microsoft Exchange.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: September 05, 2023
Modified Filters (logic changes):
* = Enabled in Default deployments
11968: HTTP: Novell GroupWise Internet Agent HTTP Interface Stack Buffer Overflow
- IPS Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: January 17, 2012
- Last Modified Date: September 05, 2023
* 12889: UDP: Digium Asterisk SIP SDP Header Parsing Stack Buffer Overflow
- IPS Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: May 14, 2013
- Last Modified Date: September 05, 2023
* 13033: HTTP: Ruby on Rails YAML Deserialization Memory Corruption Vulnerability
- IPS Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Description updated.
- Detection logic updated.
- Release Date: July 16, 2013
- Last Modified Date: September 05, 2023
* 19862: LDAP: OpenLDAP slapd Deref Overlay Null Pointer Dereference Vulnerability
- IPS Version: 3.1.3 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: May 26, 2015
- Last Modified Date: September 05, 2023
35498: TCP: YSoSerial.Net Deserialization Tool Usage
- IPS Version: 3.6.2 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: June 18, 2019
- Last Modified Date: September 05, 2023
40700: HTTP: Microsoft HTTP.sys Protocol Stack Memory Corruption Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category changed from "Exploits" to "Vulnerabilities".
- Detection logic updated.
- Vulnerability references updated.
- Release Date: January 18, 2022
- Last Modified Date: September 05, 2023
42235: HTTP: D-Link DIR-2640 DestNetwork Command Injection Vulnerability (ZDI-23-542, ZDI-23-543)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: January 31, 2023
- Last Modified Date: September 05, 2023
42704: HTTP: Ivanti Avalanche FileStoreConfig Arbitrary File Upload Vulnerability (ZDI-23-1117)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: May 16, 2023
- Last Modified Date: September 05, 2023
Modified Filters (metadata changes only):
* = Enabled in Default deployments
41953: HTTP: Delta Electronics CNCSoft-B DOPSoft DPA Buffer Overflow Vulnerability (ZDI-23-787)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "41953: HTTP: Delta Electronics CNCSoft-B DOPSoft DPA File Parsing Buffer Overflow Vulnerability (ZDI-23-78)".
- Release Date: November 15, 2022
- Last Modified Date: September 05, 2023
42530: HTTP: LG LED Assistant setThumbnailRc Directory Traversal Vulnerability (ZDI-23-1222)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42530: ZDI-CAN-20210: Zero Day Initiative Vulnerability (LG LED Assistant)".
- Description updated.
- Vulnerability references updated.
- Release Date: April 04, 2023
- Last Modified Date: September 05, 2023
42531: HTTP: LG LED Assistant thumbnail Directory Traversal Vulnerability (ZDI-23-1223)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42531: ZDI-CAN-20269: Zero Day Initiative Vulnerability (LG LED Assistant)".
- Severity changed from "Critical" to "High".
- Description updated.
- Vulnerability references updated.
- Release Date: April 04, 2023
- Last Modified Date: September 05, 2023
42532: HTTP: LG LED Assistant updateFile Directory Traversal Vulnerability (ZDI-23-1224)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42532: ZDI-CAN-20270: Zero Day Initiative Vulnerability (LG LED Assistant)".
- Severity changed from "Critical" to "High".
- Description updated.
- Vulnerability references updated.
- Release Date: April 04, 2023
- Last Modified Date: September 05, 2023
42533: HTTP: LG LED Assistant upload Directory Traversal Vulnerability (ZDI-23-1221)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42533: ZDI-CAN-20271: Zero Day Initiative Vulnerability (LG LED Assistant)".
- Description updated.
- Vulnerability references updated.
- Release Date: April 04, 2023
- Last Modified Date: September 05, 2023
43164: HTTP: SonicWall GMS and Analytics detectInjection SQL Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Description updated.
- Release Date: August 29, 2023
- Last Modified Date: September 05, 2023
43165: HTTP: SonicWall GMS and Analytics detectInjection SQL Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Description updated.
- Release Date: August 29, 2023
- Last Modified Date: September 05, 2023
Removed Filters: None
|