New Filters: 44623: HTTP: Microsoft Windows Scripting Engine JIT Out-of-Bounds Write Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit an out-of-bounds write vulnerability in the Microsoft Windows scripting engine. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-30397 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Windows Client Application - Release Date: May 13, 2025 45727: HTTP: Vite Arbitrary File Read Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects an attempt to exploit an arbitrary file read vulnerability in Vite. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-31125 - Classification: Vulnerability - Access Validation - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45821: TCP: Microsoft Windows Web Threat Defense Denial-of-Service Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Microsoft Windows Web Threat Defense. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-29971 - Classification: Vulnerability - Denial of Service (Crash/Reboot) - Protocol: TCP (Generic) - Platform: Windows Server Application or Service - Release Date: May 13, 2025 45836: ZDI-CAN-26018: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Fuji Electric Smart Editor. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45837: ZDI-CAN-26963: Zero Day Initiative Vulnerability (Autodesk Revit) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Autodesk Revit. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45838: ZDI-CAN-26631: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45839: ZDI-CAN-26718: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45840: ZDI-CAN-26719: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45841: HTTP: Ivanti Endpoint Manager Extensions DecodeBase64Object Insecure Deserialization (ZDI-25-040) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Ivanti Endpoint Manager. - Deployments: - Deployment: Security-Optimized (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2024-13163 CVSS 7.7 - Zero Day Initiative: ZDI-25-040 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45842: ZDI-CAN-26720: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45843: HTTP: CyberPanel filemanager.py upload Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in CyberPanel. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2024-51568 CVSS 8.6 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45844: HTTP: Apple Safari/Webkit loadInSameDocument Use-After-Free Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Apple WebKit. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2022-22620 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application - Release Date: May 13, 2025 45845: ZDI-CAN-26901: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45846: ZDI-CAN-26895: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45847: ZDI-CAN-26520: Zero Day Initiative Vulnerability (Samsung MagicINFO 9 Server) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Samsung MagicINFO 9 Server. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45848: ZDI-CAN-26842: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45849: ZDI-CAN-25717: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45850: ZDI-CAN-25718: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45851: ZDI-CAN-25719: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus) - IPS Version: 3.9.5 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45852: ZDI-CAN-25720: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45853: HTTP: Microsoft Windows .NET RemoteApplicationMetadata Request - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects RemoteApplicationMetadata HTTP response. - Deployment: Not enabled by default in any deployment. - References: - Common Vulnerabilities and Exposures: CVE-2024-29059 - Classification: Security Policy - Other - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45855: MQTT: Connect Command Request Using cURL Client ID - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects a connect command request to a MQTT broker with a client ID of curl. - Deployment: Not enabled by default in any deployment. - References: - Common Vulnerabilities and Exposures: CVE-2021-22945 CVSS 9.1 - Classification: Security Policy - Other - Protocol: TCP (Generic) - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45858: ZDI-CAN-26626: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45859: ZDI-CAN-26628: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45860: HTTP: SysAid On-Premise Multiple External Entity Injection Vulnerabilities - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects attempts to exploit an external entity injection vulnerability in SysAid On-Premise. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-2775, CVE-2025-2776 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45861: HTTP: SysAid On-Premise lshw External Entity Injection Vulnerability - Name (3.2 DV): 45861: HTTP: SysAid On-Premise lshw External Entity Injection Vulnerabilities - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects attempts to exploit an external entity injection vulnerability in SysAid On-Premise. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-2777 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45862: HTTP: SysAid On-Premise Remote Code Execution Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects attempts to exploit a remote code execution vulnerability in SysAid On-Premise. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-2778 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45863: ZDI-CAN-26971: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45864: ZDI-CAN-26975: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45865: HTTP: Commvault Command Center deployWebpackage.do Directory Traversal Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Commvault Command Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-34028 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45866: HTTP: WonderCMS Module Installation - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects a module installation request in WonderCMS. - Deployment: Not enabled by default in any deployment. - References: - Common Vulnerabilities and Exposures: CVE-2023-41425 - Classification: Security Policy - Other - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: May 13, 2025 45867: ZDI-CAN-26747: Zero Day Initiative Vulnerability (Siemens Simcenter Femap) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45868: ZDI-CAN-26744: Zero Day Initiative Vulnerability (Siemens Simcenter Femap) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45869: TCP: Redis NOAUTH Response - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects NOAUTH responses from Redis. - Deployment: Not enabled by default in any deployment. - Classification: Security Policy - Forbidden Application Access or Service Request - Protocol: TCP (Generic) - Platform: UNIX/Linux Server Application or Service - Release Date: May 13, 2025 45870: ZDI-CAN-26748: Zero Day Initiative Vulnerability (Siemens Simcenter Femap) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45871: ZDI-CAN-26755: Zero Day Initiative Vulnerability (Siemens Simcenter Femap) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 45872: ZDI-CAN-26692: Zero Day Initiative Vulnerability (Siemens Simcenter Femap) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: May 13, 2025 Modified Filters (logic changes): * = Enabled in Default deployments 32773: HTTP: Horner Automation Cscape Untrusted Pointer Dereference Vulnerability (ZDI-18-1440) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "32773: ZDI-CAN-6413: Zero Day Initiative Vulnerability (Horner Automation Cscape)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: August 07, 2018 - Last Modified Date: May 13, 2025 33551: HTTP: Microsoft Windows JET Database Engine Out-of-Bounds Read Vulnerability (ZDI-19-220) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33551: ZDI-CAN-7312: Zero Day Initiative Vulnerability (Microsoft Windows)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: November 27, 2018 - Last Modified Date: May 13, 2025 37605: HTTP: Fuji Electric Tellus Lite V-Simulator 6 V9 Buffer Overflow Vulnerability (ZDI-20-1116) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "37605: ZDI-CAN-10736: Zero Day Initiative Vulnerability (Fuji Electric Tellus Lite V-Simulator 6)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 14, 2020 - Last Modified Date: May 13, 2025 37622: HTTP: Microhard Bullet-LTE Ping Command Injection Vulnerability (ZDI-20-1205) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "37622: ZDI-CAN-10595: Zero Day Initiative Vulnerability (Microhard Bullet-LTE)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 21, 2020 - Last Modified Date: May 13, 2025 39268: HTTP: QNAP NAS Malware Remover Command Injection Vulnerability (ZDI-21-592) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39268: ZDI-CAN-12891: Zero Day Initiative Vulnerability (QNAP NAS)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: March 23, 2021 - Last Modified Date: May 13, 2025 39477: HTTP: Autodesk Design Review PDF File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-749) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39477: ZDI-CAN-13004: Zero Day Initiative Vulnerability (AutoDesk Design Review)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 06, 2021 - Last Modified Date: May 13, 2025 39735: HTTP: Microsoft Excel XLS File Parsing Use-After-Free Vulnerability (ZDI-21-670) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39735: ZDI-CAN-13681: Zero Day Initiative Vulnerability (Microsoft Excel)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 25, 2021 - Last Modified Date: May 13, 2025 39737: HTTP: Schneider Electric IGSS WSP and CGF Directory Traversal Vulnerability (ZDI-21-675) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39737: ZDI-CAN-13657: Zero Day Initiative Vulnerability (Schneider Electric IGSS)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 25, 2021 - Last Modified Date: May 13, 2025 39738: HTTP: Schneider Electric IGSS CGF File Parsing Memory Corruption Vulnerability (ZDI-21-676) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39738: ZDI-CAN-13663: Zero Day Initiative Vulnerability (Schneider Electric IGSS)". - Category changed from "Vulnerabilities" to "Exploits". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 25, 2021 - Last Modified Date: May 13, 2025 41867: HTTP: D-Link DAP-1325 HNAP SetHostIPv6StaticSettings Command Injection (ZDI-23-1308,1314-1319) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41867: ZDI-CAN-18820,18832-18837: Zero Day Initiative Vulnerability (D-Link DAP-1325)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 25, 2022 - Last Modified Date: May 13, 2025 41869: HTTP: D-Link DAP-1325 SetTriggerAPValidate Key Stack-based Buffer Overflow (ZDI-23-1320) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41869: ZDI-CAN-18839: Zero Day Initiative Vulnerability (D-Link DAP-1325)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 25, 2022 - Last Modified Date: May 13, 2025 42123: HTTP: D-Link DIR-825/EE xupnpd YouTube Plugin Command Injection (ZDI-22-1701,1702,1703,1704,1705) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42123: ZDI-CAN-19222,19460-19463: Zero Day Initiative Vulnerability (D-Link DIR-825)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: January 03, 2023 - Last Modified Date: May 13, 2025 42128: HTTP: D-Link DIR-825/EE xupnpd Upload Command Injection Vulnerability (ZDI-22-1706) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42128: ZDI-CAN-19464: Zero Day Initiative Vulnerability (D-Link DIR-825)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: January 03, 2023 - Last Modified Date: May 13, 2025 * 42212: HTTP: Trend Micro Apex Central Cross-Site Scripting Vulnerability (ZDI-24-023) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42212: ZDI-CAN-18873: Zero Day Initiative Vulnerability (Trend Micro Apex Central)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: January 31, 2023 - Last Modified Date: May 13, 2025 * 42214: HTTP: Trend Micro Apex Central Cross-Site Scripting Vulnerability (ZDI-23-726) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42214: ZDI-CAN-18876: Zero Day Initiative Vulnerability (Trend Micro Apex Central)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: January 31, 2023 - Last Modified Date: May 13, 2025 42334: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-583) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42334: ZDI-CAN-20170: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 43013: HTTP: D-Link DIR-3040 prog.cgi SetDynamicDNSSettings Buffer Overflow Vulnerability (ZDI-23-1324) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43013: ZDI-CAN-21616: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: July 25, 2023 - Last Modified Date: May 13, 2025 43014: HTTP: D-Link DIR-3040 prog.cgi SetQuickVPNSettings Password Buffer Overflow (ZDI-23-1325) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43014: ZDI-CAN-21617: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: July 25, 2023 - Last Modified Date: May 13, 2025 43022: HTTP: D-Link DIR-3040 prog.cgi SetWan3Settings Buffer Overflow Vulnerability (ZDI-23-1326,1327,1330) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43022: ZDI-CAN-21618,21619,21622: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: July 25, 2023 - Last Modified Date: May 13, 2025 43023: HTTP: D-Link DIR-3040 prog.cgi SetSysEmailSettings Buffer Overflow Vulnerability (ZDI-23-1328) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43023: ZDI-CAN-21620: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: July 25, 2023 - Last Modified Date: May 13, 2025 43024: HTTP: D-Link DIR-3040 prog.cgi SetQuickVPNSettings PSK Buffer Overflow Vulnerability (ZDI-23-1331) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43024: ZDI-CAN-21623: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: July 25, 2023 - Last Modified Date: May 13, 2025 43026: HTTP: D-Link DIR-3040 prog.cgi SetWLanRadioSecurity Buffer Overflow Vulnerability (ZDI-23-1329) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43026: ZDI-CAN-21621: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: July 25, 2023 - Last Modified Date: May 13, 2025 43030: HTTP: D-Link DIR-3040 prog.cgi SetMyDLinkRegistration Buffer Overflow Vulnerability (ZDI-23-1334) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43030: ZDI-CAN-21652: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: August 08, 2023 - Last Modified Date: May 13, 2025 43031: HTTP: D-Link DIR-3040 prog.cgi SetDeviceSettings Buffer Overflow Vulnerability (ZDI-23-1332) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43031: ZDI-CAN-21650: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: August 01, 2023 - Last Modified Date: May 13, 2025 43032: HTTP: D-Link DIR-3040 prog.cgi SetUsersSettings Buffer Overflow Vulnerability (ZDI-23-1336) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43032: ZDI-CAN-21654: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: August 01, 2023 - Last Modified Date: May 13, 2025 43038: HTTP: D-Link DIR-3040 prog.cgi SetIPv6PppoeSettings Buffer Overflow Vulnerability (ZDI-23-1333) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43038: ZDI-CAN-21651: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: August 01, 2023 - Last Modified Date: May 13, 2025 43039: HTTP: D-Link DIR-3040 prog.cgi SetTriggerPPPoEValidate Buffer Overflow Vulnerability (ZDI-23-1335) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43039: ZDI-CAN-21653: Zero Day Initiative Vulnerability (D-Link DIR-3040)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: August 01, 2023 - Last Modified Date: May 13, 2025 44664: HTTP: Delta Electronics CNCSoft-G2 DOPSoft Stack-based Buffer Overflow Vulnerability (ZDI-24-1402) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Detection logic updated. - Vulnerability references updated. - Release Date: August 20, 2024 - Last Modified Date: May 13, 2025 44947: HTTP: Cisco IOS XE SNMP GET-NEXT cilmCurrentImageLevel Buffer Overflow Vulnerability (ZDI-25-276) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44947: ZDI-CAN-25019: Zero Day Initiative Vulnerability (Cisco IOS)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 22, 2024 - Last Modified Date: May 13, 2025 44948: HTTP: Cisco IOS XE SNMP GET-NEXT cContextMappingBridgeDomainIdentifier Buffer Overflow (ZDI-25-279) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44948: ZDI-CAN-25022: Zero Day Initiative Vulnerability (Cisco IOS)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 22, 2024 - Last Modified Date: May 13, 2025 44949: HTTP: Cisco IOS XE SNMP SET cewProxyClass Stack-based Buffer Overflow Vulnerability (ZDI-25-281) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44949: ZDI-CAN-25017: Zero Day Initiative Vulnerability (Cisco IOS)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 22, 2024 - Last Modified Date: May 13, 2025 44957: HTTP: Cisco IOS XE SNMP GET-NEXT ciscoFlashChipCode Unexpected Sign Extension (ZDI-25-280) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44957: ZDI-CAN-25024: Zero Day Initiative Vulnerability (Cisco IOS)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 22, 2024 - Last Modified Date: May 13, 2025 44959: HTTP: Cisco IOS XE SNMP GET-NEXT callHomeUserDefCmdName Unexpected Sign Extension (ZDI-25-275) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44959: ZDI-CAN-25018: Zero Day Initiative Vulnerability (Cisco IOS)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 22, 2024 - Last Modified Date: May 13, 2025 44960: HTTP: Cisco IOS XE SNMP SET cewEventTime Stack-based Buffer Overflow Vulnerability (ZDI-25-277) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44960: ZDI-CAN-25020: Zero Day Initiative Vulnerability (Cisco IOS)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 22, 2024 - Last Modified Date: May 13, 2025 44961: HTTP: Cisco IOS XE SNMP GET-NEXT ctspIpSgtValue Buffer Overflow Vulnerability (ZDI-25-278) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44961: ZDI-CAN-25021: Zero Day Initiative Vulnerability (Cisco IOS)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 22, 2024 - Last Modified Date: May 13, 2025 44986: HTTP: Cisco IOS XE SNMP GET-NEXT ciscoFlashFileSize Unexpected Sign Extension (ZDI-25-270) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44986: ZDI-CAN-25030: Zero Day Initiative Vulnerability (Cisco IOS)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: October 29, 2024 - Last Modified Date: May 13, 2025 44998: HTTP: Cisco IOS XE SNMP OID Handling Out-Of-Bounds Read Vulnerability (ZDI-25-273) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "44998: ZDI-CAN-25023: Zero Day Initiative Vulnerability (Cisco IOS)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: November 26, 2024 - Last Modified Date: May 13, 2025 45174: HTTP: Ivanti Avalanche SecureFilter Authentication Bypass Vulnerability (ZDI-25-044) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Detection logic updated. - Vulnerability references updated. - Release Date: December 17, 2024 - Last Modified Date: May 13, 2025 45803: HTTP: Suspicious Number of Encoding Headers - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Detection logic updated. - Release Date: May 06, 2025 - Last Modified Date: May 13, 2025 Modified Filters (metadata changes only): * = Enabled in Default deployments * 31875: HTTP: Adobe Acrobat Pro DC ImageConversion EMF GIF Buffer Overflow Vulnerability (ZDI-18-597) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "31875: ZDI-CAN-5760: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Vulnerability references updated. - Release Date: May 29, 2018 - Last Modified Date: May 13, 2025 32810: HTTP: Foxit Reader TextBox Validate Use-After-Free Vulnerability (ZDI-18-1181) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "32810: ZDI-CAN-6439: Zero Day Initiative Vulnerability (ABB Panel Builder 800)". - Description updated. - Vulnerability references updated. - Release Date: August 07, 2018 - Last Modified Date: May 13, 2025 * 33164: HTTP: Foxit Reader XFA isPropertySpecified Use-After-Free Vulnerability (ZDI-18-1214) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33164: ZDI-CAN-6470: Zero Day Initiative Vulnerability (Foxit Reader)". - Description updated. - Vulnerability references updated. - Release Date: October 16, 2018 - Last Modified Date: May 13, 2025 33320: HTTP: OMRON CX-Supervisor sr3 File Parsing Script API Use-After-Free Vulnerability (ZDI-18-1446) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33320: ZDI-CAN-6657: Zero Day Initiative Vulnerability (OMRON CX-Supervisor)". - Description updated. - Vulnerability references updated. - Release Date: October 23, 2018 - Last Modified Date: May 13, 2025 * 33327: HTTP: Foxit Reader array Use-After-Free Vulnerability (ZDI-18-1159) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. - Release Date: November 06, 2018 - Last Modified Date: May 13, 2025 * 33486: HTTP: Adobe Acrobat Pro DC ImageConversion XPS Out-Of-Bounds Read Vulnerability (ZDI-18-1390) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33486: ZDI-CAN-7165: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: November 13, 2018 - Last Modified Date: May 13, 2025 33741: HTTP: Adobe Acrobat Reader HTML2PDF Use-After-Free Vulnerability (ZDI-18-1385) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. - Release Date: December 18, 2018 - Last Modified Date: May 13, 2025 35111: HTTP: Trend Micro OfficeScan ServerMigrationTool Out-Of-Bounds Read Vulnerability (ZDI-20-1225) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35111: ZDI-CAN-11108: Zero Day Initiative Vulnerability (Trend Micro OfficeScan)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: June 16, 2020 - Last Modified Date: May 13, 2025 36070: HTTP: HP Enterprise IMC Language Injection Vulnerability (ZDI-19-1039,1040,1042,1043,1044,1045) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36070: ZDI-CAN-8963,8964,8968,8969,8970,8971: Zero Day Initiative Vulnerability (HPE IMC)". - Description updated. - Vulnerability references updated. - Release Date: August 27, 2019 - Last Modified Date: May 13, 2025 36312: HTTP: Advantech WISE-PaaS/RMM AccountMgmt activateAccount XML Information Disclosure (ZDI-19-953) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. - Release Date: October 15, 2019 - Last Modified Date: May 13, 2025 37860: HTTP: D-Link DAP-1860 HNAP Authorization Command Injection Vulnerability (ZDI-20-1428) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. - Release Date: July 21, 2020 - Last Modified Date: May 13, 2025 37861: HTTP: D-Link DAP-1860 uHTTPd Authentication Bypass Vulnerability (ZDI-20-1429) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. - Release Date: July 21, 2020 - Last Modified Date: May 13, 2025 38061: HTTP: NETGEAR Multiple Routers mini_httpd Authentication Bypass Vulnerability (ZDI-20-1451) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "38061: ZDI-CAN-11559: Zero Day Initiative Vulnerability (NETGEAR R7450)". - Description updated. - Vulnerability references updated. - Release Date: September 22, 2020 - Last Modified Date: May 13, 2025 38817: HTTP: QNAP NAS MusicStation Directory Traversal Arbitrary Vulnerability (ZDI-21-591) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "38817: ZDI-CAN-12048: Zero Day Initiative Vulnerability (QNAP NAS)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: February 02, 2021 - Last Modified Date: May 13, 2025 39387: HTTP: Advantech iView getAllActiveTraps SQL Injection Vulnerability (ZDI-21-653) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39387: ZDI-CAN-11838: Zero Day Initiative Vulnerability (Advantech iView)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: March 30, 2021 - Last Modified Date: May 13, 2025 39388: HTTP: Advantech iView deleteZtpConfig SQL Injection Vulnerability (ZDI-21-654) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. - Release Date: March 30, 2021 - Last Modified Date: May 13, 2025 39392: HTTP: D-Link DAP-1330 lighttpd http_parse_request Buffer Overflow Vulnerability (ZDI-21-681) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39392: ZDI-CAN-12065: Zero Day Initiative Vulnerability (D-Link DAP-1330)". - Description updated. - Vulnerability references updated. - Release Date: March 30, 2021 - Last Modified Date: May 13, 2025 39420: HTTP: Advantech iView NetworkServlet SQL Injection Vulnerability (ZDI-21-655) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39420: ZDI-CAN-13137: Zero Day Initiative Vulnerability (Advantech iView)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: April 06, 2021 - Last Modified Date: May 13, 2025 39515: HTTP: ISC BIND TKEY Query Integer Overflow Vulnerability (ZDI-21-657) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39515: ZDI-CAN-13347: Zero Day Initiative Vulnerability (ISC BIND)". - Description updated. - Vulnerability references updated. - Release Date: April 20, 2021 - Last Modified Date: May 13, 2025 40337: HTTP: Adobe Acrobat AcroForm deleteItemAt Use-After-Free Vulnerability (ZDI-21-1099) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. - Release Date: September 21, 2021 - Last Modified Date: May 13, 2025 40464: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-432) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "40464: ZDI-CAN-14797: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)". - Description updated. - Vulnerability references updated. - Release Date: November 02, 2021 - Last Modified Date: May 13, 2025 40812: HTTP: Foxit PDF Reader Doc Object Use-After-Free Vulnerability (ZDI-22-275) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40812: ZDI-CAN-15851: Zero Day Initiative Vulnerability (Foxit PDF Reader)". - Description updated. - Vulnerability references updated. - Release Date: February 01, 2022 - Last Modified Date: May 13, 2025 40813: HTTP: Foxit PDF Reader AcroForm Use-After-Free Vulnerability (ZDI-22-277) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40813: ZDI-CAN-15853: Zero Day Initiative Vulnerability (Foxit PDF Reader)". - Description updated. - Vulnerability references updated. - Release Date: February 01, 2022 - Last Modified Date: May 13, 2025 40814: HTTP: Foxit PDF Reader Doc Use-After-Free Vulnerability (ZDI-22-279) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40814: ZDI-CAN-16115: Zero Day Initiative Vulnerability (Foxit PDF Reader)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: February 01, 2022 - Last Modified Date: May 13, 2025 40934: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1167) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40934: ZDI-CAN-16270: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)". - Description updated. - Vulnerability references updated. - Release Date: March 01, 2022 - Last Modified Date: May 13, 2025 40957: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1168) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40957: ZDI-CAN-16271: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)". - Description updated. - Vulnerability references updated. - Release Date: March 08, 2022 - Last Modified Date: May 13, 2025 40958: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1169) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40958: ZDI-CAN-16296: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)". - Description updated. - Vulnerability references updated. - Release Date: March 08, 2022 - Last Modified Date: May 13, 2025 40959: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1170) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40959: ZDI-CAN-16304: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)". - Description updated. - Vulnerability references updated. - Release Date: March 08, 2022 - Last Modified Date: May 13, 2025 40960: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1171) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40960: ZDI-CAN-16358: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)". - Description updated. - Vulnerability references updated. - Release Date: March 08, 2022 - Last Modified Date: May 13, 2025 40961: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1172) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "40961: ZDI-CAN-16360: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)". - Description updated. - Vulnerability references updated. - Release Date: March 08, 2022 - Last Modified Date: May 13, 2025 42332: HTTP: Autodesk 3DS Max USD File Parsing Uninitialized Pointer Vulnerability (ZDI-23-582) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42332: ZDI-CAN-20173: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 42333: HTTP: Autodesk 3DS Max USD File Parsing Use-After-Free Vulnerability (ZDI-23-579) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42333: ZDI-CAN-20171: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Description updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 42335: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Write Vulnerability (ZDI-23-584) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42335: ZDI-CAN-20169: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Description updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 42336: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-577) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42336: ZDI-CAN-20168: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 42339: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-578) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42339: ZDI-CAN-20221: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 42340: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-581) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42340: ZDI-CAN-20174: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 42341: HTTP: Autodesk 3DS Max USD File Parsing Use-After-Free Vulnerability (ZDI-23-580) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42341: ZDI-CAN-20175: Zero Day Initiative Vulnerability (Autodesk 3DS Max)". - Description updated. - Vulnerability references updated. - Release Date: February 14, 2023 - Last Modified Date: May 13, 2025 * 43069: HTTP: Trend Micro Apex Central widget WFProxy Local File Inclusion Vulnerability (ZDI-24-024) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43069: ZDI-CAN-21327: Zero Day Initiative Vulnerability (Trend Micro Apex Central)". - Description updated. - Vulnerability references updated. - Release Date: August 01, 2023 - Last Modified Date: May 13, 2025 * 44382: HTTP: Ivanti Endpoint Manager SQL Injection (ZDI-24-1213,1215,1217,1218,1219,1221,ZDI-25-041) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Description updated. - Vulnerability references updated. - Release Date: June 18, 2024 - Last Modified Date: May 13, 2025 45600: HTTP: eCharge Hardy Barth cPH2 index.php Command Injection Vulnerability (ZDI-25-249) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45600: ZDI-CAN-23115: Zero Day Initiative Vulnerability (eCharge Hardy Barth cPH2)". - Description updated. - Vulnerability references updated. - Release Date: March 25, 2025 - Last Modified Date: May 13, 2025 45601: HTTP: eCharge Hardy Barth cPH2 check_req.php ntp Command Injection Vulnerability (ZDI-25-247) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45601: ZDI-CAN-23113: Zero Day Initiative Vulnerability (eCharge Hardy Barth cPH2)". - Description updated. - Vulnerability references updated. - Release Date: March 25, 2025 - Last Modified Date: May 13, 2025 45730: ZDI-CAN-26524: Zero Day Initiative Vulnerability (Allegra) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Name changed from "45730: ZDI-CAN-26436: Zero Day Initiative Vulnerability (Allegra)". - Release Date: April 15, 2025 - Last Modified Date: May 13, 2025 Removed Filters: None |