|
Microsoft Security Bulletins This DV includes coverage for the Microsoft vulnerabilities released on or before February 11, 2020. The following table maps TippingPoint filters to the Microsoft CVEs. |
||
| CVE | Filter | Status |
| CVE-2020-0618 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0655 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0657 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0658 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0659 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0660 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0661 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0662 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0663 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0665 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0666 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0667 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0668 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0669 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0670 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0671 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0672 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0673 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0674 | 36973 | |
| CVE-2020-0675 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0676 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0677 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0678 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0679 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0680 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0681 | 37093 | |
| CVE-2020-0682 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0683 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0685 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0686 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0688 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0689 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0691 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0692 | 37063 | |
| CVE-2020-0693 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0694 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0695 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0696 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0697 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0698 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0701 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0702 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0703 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0704 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0705 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0706 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0707 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0708 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0709 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0710 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0711 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0712 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0713 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0714 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0715 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0716 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0717 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0719 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0720 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0721 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0722 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0723 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0724 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0725 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0726 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0727 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0728 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0729 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0730 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0731 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0732 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0733 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0734 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0735 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0736 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0737 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0738 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0739 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0740 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0741 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0742 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0743 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0744 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0745 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0746 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0747 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0748 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0749 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0750 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0751 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0752 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0753 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0754 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0755 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0756 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0759 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0767 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| CVE-2020-0792 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
| Filters marked with * shipped prior to this DV, providing zero-day protection. | ||
|
Adobe Security Bulletins This DV includes coverage for the Adobe vulnerabilities released on or before February 11, 2020. The following table maps TippingPoint filters to the Adobe CVEs. |
||
| Bulletin | CVE | Filter |
| APSB20-05 | CVE-2020-3741 | 37078 |
| APSB20-05 | CVE-2020-3742 | 37079 |
| APSB20-05 | CVE-2020-3743 | 37080 |
| APSB20-05 | CVE-2020-3744 | 37081 |
| APSB20-05 | CVE-2020-3745 | 37082 |
| APSB20-05 | CVE-2020-3746 | 37083 |
| APSB20-05 | CVE-2020-3747 | 37084 |
| APSB20-05 | CVE-2020-3748 | 36943 |
| APSB20-05 | CVE-2020-3749 | 37086 |
| APSB20-05 | CVE-2020-3750 | 37087 |
| APSB20-05 | CVE-2020-3751 | 37088 |
| APSB20-05 | CVE-2020-3752 | 37089 |
| APSB20-05 | CVE-2020-3754 | 37090 |
| APSB20-05 | CVE-2020-3755 | 37091 |
| APSB20-06 | CVE-2020-3757 | 37092 |
| Filters marked with * shipped prior to this DV, providing zero-day protection. | ||
Table of Contents
--------------------------
Filters
New Filters - 36
Modified Filters (logic changes) - 13
Modified Filters (metadata changes only) - 46
Removed Filters - 0
Filters
----------------
New Filters:
36892: ZDI-CAN-9471: Zero Day Initiative Vulnerability (DLink DIR-882)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Vulnerabilities
- Severity: High
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting DLink DIR-882.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Performance-Optimized (Disabled)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
36943: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3748
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37019: ZDI-CAN-9997: Zero Day Initiative Vulnerability (Advantech WebAccess/SCADA)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Advantech WebAccess/SCADA.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37020: MQTT: Cesanta Mongoose parse_mqtt Server Denial-of-Service Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Vulnerabilities
- Severity: High
- Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Cesanta Mongoose.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2019-19307
- Classification: Vulnerability - Denial of Service (Crash/Reboot)
- Protocol: TCP (Generic)
- Platform: Multi-Platform Server Application or Service
37021: MQTT: Cesanta Mongoose parse_mqtt Client Denial-of-Service Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Vulnerabilities
- Severity: High
- Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Cesanta Mongoose.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2019-19307
- Classification: Vulnerability - Denial of Service (Crash/Reboot)
- Protocol: TCP (Generic)
- Platform: Multi-Platform Client Application
37023: HTTP: Nagios XI nocscreenapi.php Cross-Site Scripting Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in Nagios XI.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2019-20139 CVSS 3.5
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
37024: ZDI-CAN-10402: Zero Day Initiative Vulnerability (Microsoft Windows)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft Windows.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37025: ZDI-CAN-10378: Zero Day Initiative Vulnerability (Microsoft Windows)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft Windows.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37033: HTTP: Cacti Group Cacti graphs.php SQL Injection Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a SQL Injection vulnerability in Cacti.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2019-17357 CVSS 4.0
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
37034: ZDI-CAN-10376: Zero Day Initiative Vulnerability (Microsoft Windows)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft Windows.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37036: ZDI-CAN-10120: Zero Day Initiative Vulnerability (Fuji Electric V-Server Lite)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Fuji Electric V-Server Lite.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37037: ZDI-CAN-10119: Zero Day Initiative Vulnerability (Fuji Electric V-Server Lite)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Fuji Electric V-Server Lite.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37049: ZDI-CAN-10073: Zero Day Initiative Vulnerability (Trend Micro Worry-Free Business Security)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Trend Micro Worry-Free Business Security.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37050: ZDI-CAN-10054: Zero Day Initiative Vulnerability (Microsoft JET Database)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft JET Database.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37051: ZDI-CAN-10039: Zero Day Initiative Vulnerability (Microsoft JET Database)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Exploits
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft JET Database.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37063: HTTP: HTTP X-JsonProxySecurityContext Header Usage
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Security Policy
- Severity: Moderate
- Description: This filter detects the use of the X-JsonProxySecurityContext HTTP header in an HTTP request.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2020-0692
- Classification: Security Policy - Other
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
37067: ZDI-CAN-9692: Zero Day Initiative Vulnerability (Advantech WebAccess/SCADA)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Advantech WebAccess/SCADA.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37068: ZDI-CAN-9693: Zero Day Initiative Vulnerability (Advantech WebAccess/SCADA)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Advantech WebAccess/SCADA.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37069: ZDI-CAN-9699: Zero Day Initiative Vulnerability (Advantech WebAccess/SCADA)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Advantech WebAccess/SCADA.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37070: HTTP: ELOG Project ELOG retrieve_url Information Disclosure Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit an information disclosure vulnerability in the ELOG Server.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2019-3993 CVSS 5.0
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
37071: ZDI-CAN-9700: Zero Day Initiative Vulnerability (Advantech WebAccess/SCADA)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: N/NX-Platform, NGFW, or TPS devices
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Advantech WebAccess/SCADA.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
37078: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3741
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37079: HTTP: Adobe Acrobat Reader Buffer Overflow Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3742
- Classification: Vulnerability - Buffer/Heap Overflow
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37080: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3743
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37081: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: High
- Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3744
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37082: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3745
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37083: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3746
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37084: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: High
- Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Performance-Optimized (Disabled)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3747
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37086: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3749
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37087: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3750
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37088: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3751
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37089: HTTP: Adobe Acrobat Reader Buffer Overflow Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3752
- Classification: Vulnerability - Buffer/Heap Overflow
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37090: HTTP: Adobe Acrobat Reader Buffer Overflow Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3754
- Classification: Vulnerability - Buffer/Heap Overflow
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37091: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: High
- Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3755
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37092: HTTP: Adobe Flash Player Type Confusion Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a type confusion vulnerability in Adobe Flash Player.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Performance-Optimized (Disabled)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-3757
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
37093: RDP: Microsoft Remote Desktop Services serverMultiTransportData Usage
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Category: Security Policy
- Severity: Moderate
- Description: This filter detects an attempt to use serverMultiTransportData during a remote desktop session.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2020-0681
- Classification: Security Policy - Other
- Protocol: TCP (Generic)
- Platform: Windows Client Application
Modified Filters (logic changes):
* = Enabled in Default deployments
4560: HTTP: HTTP Request Smuggling
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4560: HTTP: Apache Request Smuggling".
- Description updated.
- Detection logic updated.
* 21913: TCP: Oracle Java Apache Commons Collection Library Command Execution Vulnerability
- IPS Version: 3.1.3 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
35414: HTTP: Apple Safari FrameDestructionObserver Use-After-Free Vulnerability (ZDI-19-920)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "35414: ZDI-CAN-8574: Zero Day Initiative Vulnerability (Apple Safari)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
35822: HTTP: Apple macOS AudioToolbox MP4 Parsing Integer Overflow Vulnerability (ZDI-19-1027)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "35822: ZDI-CAN-8806: Zero Day Initiative Vulnerability (Apple macOS)".
- Severity changed from "Critical" to "High".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
* 36020: HTTP: Adobe Media Encoder CC MP4 File Parsing Out-Of-Bounds Read Vulnerability (ZDI-19-907)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36020: ZDI-CAN-8804: Zero Day Initiative Vulnerability (Adobe Media Encoder CC)".
- Severity changed from "Critical" to "High".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
36186: HTTP: Cisco Data Center Network Manager SQL Injection Vulnerability (ZDI-20-055)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36186: ZDI-CAN-9134: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
36273: HTTP: Cisco Data Center Network Manager getHostEnclList SQL Injection Vulnerability (ZDI-20-034)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36273: ZDI-CAN-9067,9072: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
36519: HTTP: Cisco Data Center Network Manager createSite SQL Injection Vulnerability (ZDI-20-095)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36519: ZDI-CAN-9267: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
36585: HTTP: Cisco Data Center Network Manager getSanIslStatJoinList SQL Injection (ZDI-20-072)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36585: ZDI-CAN-9192: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
36609: HTTP: Cisco Data Center Network Manager getPortGroupStatList SQL Injection (ZDI-20-078)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36609: ZDI-CAN-9198: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
36691: HTTP: Cisco Data Center Network Manager createSite getIp SQL Injection Vulnerability (ZDI-20-094)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36691: ZDI-CAN-9266: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
36876: HTTP: Citrix Application Delivery Controller (ADC) Directory Traversal Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
* 36973: HTTP: Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
Modified Filters (metadata changes only):
* = Enabled in Default deployments
2349: MS-RPC: DCOM ISystemActivator Request (ATT&CK T1175)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2349: MS-RPC: DCOM ISystemActivator Request".
2350: MS-RPC: DCOM IRemoteActivation Request (ATT&CK T1175)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2350: MS-RPC: DCOM IRemoteActivation Request".
2351: MS-RPC: DCOM IRemoteActivation Request (ATT&CK T1175)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2351: MS-RPC: DCOM IRemoteActivation Request".
2352: MS-RPC: DCOM ISystemActivator Request (ATT&CK T1175)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2352: MS-RPC: DCOM ISystemActivator Request".
2353: MS-RPC: DCOM ISystemActivator Request (ATT&CK T1175)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2353: MS-RPC: DCOM ISystemActivator Request".
2354: MS-RPC: DCOM IRemoteActivation Request (ATT&CK T1175)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2354: MS-RPC: DCOM IRemoteActivation Request".
2460: SMTP: Zip Attachment Containing .scr File (ATT&CK T1180)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2460: SMTP: Zip Attachment Containing .scr File".
2462: POP/IMAP: Zip Attachment Containing .scr File (ATT&CK T1180)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2462: POP/IMAP: Zip Attachment Containing .scr File".
2558: HTTP: HTTP CONNECT TCP Tunnel to other than http ports (ATT&CK T1071)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2558: HTTP: HTTP CONNECT TCP Tunnel to other than http ports".
2559: HTTP: HTTP CONNECT TCP Tunnel (ATT&CK T1071)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2559: HTTP: HTTP CONNECT TCP Tunnel".
2620: SMTP: Zip Attachment (ATT&CK T1002)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2620: SMTP: Zip Attachment".
2714: SMTP: Rar Attachment Containing .scr File (ATT&CK T1180)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2714: SMTP: Rar Attachment Containing .scr File".
2715: POP/IMAP: Rar Attachment Containing .scr File (ATT&CK T1180)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2715: POP/IMAP: Rar Attachment Containing .scr File".
2796: SMB: Windows Repeated Logon Failure (Possible Brute Force) (ATT&CK T1110)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "2796: SMB: Windows Repeated Logon Failure (Possible Brute Force)".
3039: HTTP: Suspicious UNC HREF (ATT&CK T1129)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3039: HTTP: Suspicious UNC HREF".
3040: SMTP: Suspicious UNC HREF (ATT&CK T1129)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3040: SMTP: Suspicious UNC HREF".
3041: POP/IMAP: Suspicious UNC HREF (ATT&CK T1129)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3041: POP/IMAP: Suspicious UNC HREF".
3258: HTTP: Possible ASP.Net Authentication Bypass (ATT&CK T1212)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3258: HTTP: Possible ASP.Net Authentication Bypass".
3314: HTTP: Obfuscated JScript/VBScript Code (ATT&CK T1027)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3314: HTTP: Obfuscated JScript/VBScript Code".
3436: Tunneling: LogMeIn Remote Control SSL Connection (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3436: Tunneling: LogMeIn Remote Control SSL Connection".
3573: PPTP: VPN Session Startup (ATT&CK T1133)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3573: PPTP: VPN Session Startup".
3576: ISAKMP: IPSec VPN Session Startup (TCP) (ATT&CK T1133)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3576: ISAKMP: IPSec VPN Session Startup (TCP)".
3584: ISAKMP: IPSec VPN Session Startup (UDP) (ATT&CK T1133)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3584: ISAKMP: IPSec VPN Session Startup (UDP)".
3892: SSL: SSLv2 Negotiation (ATT&CK T1032)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3892: SSL: SSLv2 Negotiation".
3975: SMTP: UPX Compressed Binary Attachment (ATT&CK T1045)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "3975: SMTP: UPX Compressed Binary Attachment".
4020: VPN: SoftEther VPN Connection Attempt (ATT&CK T1133)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4020: VPN: SoftEther VPN Connection Attempt".
4079: SMTP: gzip Compressed Attachment (ATT&CK T1002)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4079: SMTP: gzip Compressed Attachment".
4111: HTTP: UPX Compressed Binary Download (ATT&CK T1045)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4111: HTTP: UPX Compressed Binary Download".
4151: VPN: SoftEther VPN Connection Attempt (ATT&CK T1133)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4151: VPN: SoftEther VPN Connection Attempt".
4405: RADMIN: Famtech Remote Administrator (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4405: RADMIN: Famtech Remote Administrator".
4410: RFB: VNC NULL Authentication Method Request (ATT&CK T1133,T1076,T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4410: RFB: VNC NULL Authentication Method Request".
4652: HTTP: BBProxy Download (ATT&CK T1090)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4652: HTTP: BBProxy Download".
4658: VPN: Hamachi VPN Connection (ATT&CK T1133)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4658: VPN: Hamachi VPN Connection".
4704: ICMP: Ping Tunnel Proxy Reply (ATT&CK T1090)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4704: ICMP: Ping Tunnel Proxy Reply".
4815: Tunneling: RemotelyAnywhere SSL Connection (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4815: Tunneling: RemotelyAnywhere SSL Connection".
4816: Tunneling: RemotelyAnywhere SSL Connection (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4816: Tunneling: RemotelyAnywhere SSL Connection".
4817: Tunneling: RemotelyAnywhere Cleartext Connection (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4817: Tunneling: RemotelyAnywhere Cleartext Connection".
4818: Tunneling: RemotelyAnywhere Cleartext Connection (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4818: Tunneling: RemotelyAnywhere Cleartext Connection".
4837: HTTP: GhostSurf Proxy HTTP Access (ATT&CK T1090)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4837: HTTP: GhostSurf Proxy HTTP Access".
4887: Tunneling: GetByMail SMTP Remote Control (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4887: Tunneling: GetByMail SMTP Remote Control".
4945: HTTP: JBoss jmx-console Remote Command Execution (ATT&CK T1210)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "4945: HTTP: JBoss jmx-console Remote Command Execution".
5097: Tunneling: GoToMyPC Software (ATT&CK T1219)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "5097: Tunneling: GoToMyPC Software".
5195: HTTP: PHProxy Online Web Proxy Attempt (ATT&CK T1090)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "5195: HTTP: PHProxy Online Web Proxy Attempt".
5199: HTTP: CGIProxy Online Web Proxy Request (ATT&CK T1090)
- IPS Version: 1.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "5199: HTTP: CGIProxy Online Web Proxy Request".
9896: IP: IP Protocol 0 (IPv6 hop-by-hop option)
- IPS Version: 3.0.0 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Deployments updated and are now:
- No Deployments.
36021: HTTP: Oracle ADF Faces Remote Regions Insecure Deserialization Vulnerability (ZDI-19-1024)
- IPS Version: 3.6.2 and after.
- NGFW Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Name changed from "36021: ZDI-CAN-8823: Zero Day Initiative Vulnerability (Oracle ADF Faces)".
- Description updated.
- Vulnerability references updated.
Removed Filters: None
Top of the Page
