Views:
Table of Contents
--------------------------
  New Filters - 37
  Modified Filters (logic changes) - 39
  Modified Filters (metadata changes only) - 42
  Removed Filters - 0
  New Filters: 

    44623: HTTP: Microsoft Windows Scripting Engine JIT Out-of-Bounds Write Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an out-of-bounds write vulnerability in the Microsoft Windows scripting engine.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-30397
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Windows Client Application
      - Release Date: May 13, 2025

    45727: HTTP: Vite Arbitrary File Read Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit an arbitrary file read vulnerability in Vite.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-31125
      - Classification: Vulnerability - Access Validation
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45821: TCP: Microsoft Windows Web Threat Defense Denial-of-Service Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Microsoft Windows Web Threat Defense.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-29971
      - Classification: Vulnerability - Denial of Service (Crash/Reboot)
      - Protocol: TCP (Generic)
      - Platform: Windows Server Application or Service
      - Release Date: May 13, 2025

    45836: ZDI-CAN-26018: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Fuji Electric Smart Editor.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45837: ZDI-CAN-26963: Zero Day Initiative Vulnerability (Autodesk Revit)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Autodesk Revit.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45838: ZDI-CAN-26631: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45839: ZDI-CAN-26718: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45840: ZDI-CAN-26719: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45841: HTTP: Ivanti Endpoint Manager Extensions DecodeBase64Object Insecure Deserialization (ZDI-25-040)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Ivanti Endpoint Manager.
      - Deployments:
        - Deployment: Security-Optimized (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-13163 CVSS 7.7
        - Zero Day Initiative: ZDI-25-040
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45842: ZDI-CAN-26720: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45843: HTTP: CyberPanel filemanager.py upload Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in CyberPanel.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-51568 CVSS 8.6
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45844: HTTP: Apple Safari/Webkit loadInSameDocument Use-After-Free Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Apple WebKit.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2022-22620
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: May 13, 2025

    45845: ZDI-CAN-26901: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45846: ZDI-CAN-26895: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45847: ZDI-CAN-26520: Zero Day Initiative Vulnerability (Samsung MagicINFO 9 Server)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Samsung MagicINFO 9 Server.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45848: ZDI-CAN-26842: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45849: ZDI-CAN-25717: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45850: ZDI-CAN-25718: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45851: ZDI-CAN-25719: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45852: ZDI-CAN-25720: Zero Day Initiative Vulnerability (Labcenter Electronics Proteus)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Labcenter Electronics Proteus.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45853: HTTP: Microsoft Windows .NET RemoteApplicationMetadata Request
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects RemoteApplicationMetadata HTTP response.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-29059
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45855: MQTT: Connect Command Request Using cURL Client ID
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a connect command request to a MQTT broker with a client ID of curl.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-22945 CVSS 9.1
      - Classification: Security Policy - Other
      - Protocol: TCP (Generic)
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45858: ZDI-CAN-26626: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45859: ZDI-CAN-26628: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45860: HTTP: SysAid On-Premise Multiple External Entity Injection Vulnerabilities
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects attempts to exploit an external entity injection vulnerability in SysAid On-Premise.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-2775, CVE-2025-2776
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45861: HTTP: SysAid On-Premise lshw External Entity Injection Vulnerability
      - Name (3.2 DV): 45861: HTTP: SysAid On-Premise lshw External Entity Injection Vulnerabilities
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects attempts to exploit an external entity injection vulnerability in SysAid On-Premise.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-2777
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45862: HTTP: SysAid On-Premise Remote Code Execution Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects attempts to exploit a remote code execution vulnerability in SysAid On-Premise.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-2778
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45863: ZDI-CAN-26971: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45864: ZDI-CAN-26975: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45865: HTTP: Commvault Command Center deployWebpackage.do Directory Traversal Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Commvault Command Center.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-34028
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45866: HTTP: WonderCMS Module Installation
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a module installation request in WonderCMS.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-41425
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: May 13, 2025

    45867: ZDI-CAN-26747: Zero Day Initiative Vulnerability (Siemens Simcenter Femap)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45868: ZDI-CAN-26744: Zero Day Initiative Vulnerability (Siemens Simcenter Femap)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45869: TCP: Redis NOAUTH Response
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects NOAUTH responses from Redis.
      - Deployment: Not enabled by default in any deployment.
      - Classification: Security Policy - Forbidden Application Access or Service Request
      - Protocol: TCP (Generic)
      - Platform: UNIX/Linux Server Application or Service
      - Release Date: May 13, 2025

    45870: ZDI-CAN-26748: Zero Day Initiative Vulnerability (Siemens Simcenter Femap)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45871: ZDI-CAN-26755: Zero Day Initiative Vulnerability (Siemens Simcenter Femap)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

    45872: ZDI-CAN-26692: Zero Day Initiative Vulnerability (Siemens Simcenter Femap)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens Simcenter Femap.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: May 13, 2025

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    32773: HTTP: Horner Automation Cscape Untrusted Pointer Dereference Vulnerability (ZDI-18-1440)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "32773: ZDI-CAN-6413: Zero Day Initiative Vulnerability (Horner Automation Cscape)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 07, 2018
      - Last Modified Date: May 13, 2025

    33551: HTTP: Microsoft Windows JET Database Engine Out-of-Bounds Read Vulnerability (ZDI-19-220)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "33551: ZDI-CAN-7312: Zero Day Initiative Vulnerability (Microsoft Windows)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: November 27, 2018
      - Last Modified Date: May 13, 2025

    37605: HTTP: Fuji Electric Tellus Lite V-Simulator 6 V9 Buffer Overflow Vulnerability (ZDI-20-1116)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "37605: ZDI-CAN-10736: Zero Day Initiative Vulnerability (Fuji Electric Tellus Lite V-Simulator 6)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 14, 2020
      - Last Modified Date: May 13, 2025

    37622: HTTP: Microhard Bullet-LTE Ping Command Injection Vulnerability (ZDI-20-1205)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "37622: ZDI-CAN-10595: Zero Day Initiative Vulnerability (Microhard Bullet-LTE)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 21, 2020
      - Last Modified Date: May 13, 2025

    39268: HTTP: QNAP NAS Malware Remover Command Injection Vulnerability (ZDI-21-592)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39268: ZDI-CAN-12891: Zero Day Initiative Vulnerability (QNAP NAS)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 23, 2021
      - Last Modified Date: May 13, 2025

    39477: HTTP: Autodesk Design Review PDF File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-749)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39477: ZDI-CAN-13004: Zero Day Initiative Vulnerability (AutoDesk Design Review)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 06, 2021
      - Last Modified Date: May 13, 2025

    39735: HTTP: Microsoft Excel XLS File Parsing Use-After-Free Vulnerability (ZDI-21-670)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39735: ZDI-CAN-13681: Zero Day Initiative Vulnerability (Microsoft Excel)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 25, 2021
      - Last Modified Date: May 13, 2025

    39737: HTTP: Schneider Electric IGSS WSP and CGF Directory Traversal Vulnerability (ZDI-21-675)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39737: ZDI-CAN-13657: Zero Day Initiative Vulnerability (Schneider Electric IGSS)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 25, 2021
      - Last Modified Date: May 13, 2025

    39738: HTTP: Schneider Electric IGSS CGF File Parsing Memory Corruption Vulnerability (ZDI-21-676)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39738: ZDI-CAN-13663: Zero Day Initiative Vulnerability (Schneider Electric IGSS)".
      - Category changed from "Vulnerabilities" to "Exploits".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 25, 2021
      - Last Modified Date: May 13, 2025

    41867: HTTP: D-Link DAP-1325 HNAP SetHostIPv6StaticSettings Command Injection (ZDI-23-1308,1314-1319)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41867: ZDI-CAN-18820,18832-18837: Zero Day Initiative Vulnerability (D-Link DAP-1325)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 25, 2022
      - Last Modified Date: May 13, 2025

    41869: HTTP: D-Link DAP-1325 SetTriggerAPValidate Key Stack-based Buffer Overflow (ZDI-23-1320)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41869: ZDI-CAN-18839: Zero Day Initiative Vulnerability (D-Link DAP-1325)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 25, 2022
      - Last Modified Date: May 13, 2025

    42123: HTTP: D-Link DIR-825/EE xupnpd YouTube Plugin Command Injection (ZDI-22-1701,1702,1703,1704,1705)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42123: ZDI-CAN-19222,19460-19463: Zero Day Initiative Vulnerability (D-Link DIR-825)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: January 03, 2023
      - Last Modified Date: May 13, 2025

    42128: HTTP: D-Link DIR-825/EE xupnpd Upload Command Injection Vulnerability (ZDI-22-1706)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42128: ZDI-CAN-19464: Zero Day Initiative Vulnerability (D-Link DIR-825)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: January 03, 2023
      - Last Modified Date: May 13, 2025

    * 42212: HTTP: Trend Micro Apex Central Cross-Site Scripting Vulnerability (ZDI-24-023)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42212: ZDI-CAN-18873: Zero Day Initiative Vulnerability (Trend Micro Apex Central)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: January 31, 2023
      - Last Modified Date: May 13, 2025

    * 42214: HTTP: Trend Micro Apex Central Cross-Site Scripting Vulnerability (ZDI-23-726)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42214: ZDI-CAN-18876: Zero Day Initiative Vulnerability (Trend Micro Apex Central)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: January 31, 2023
      - Last Modified Date: May 13, 2025

    42334: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-583)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42334: ZDI-CAN-20170: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    43013: HTTP: D-Link DIR-3040 prog.cgi SetDynamicDNSSettings Buffer Overflow Vulnerability (ZDI-23-1324)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43013: ZDI-CAN-21616: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 25, 2023
      - Last Modified Date: May 13, 2025

    43014: HTTP: D-Link DIR-3040 prog.cgi SetQuickVPNSettings Password Buffer Overflow (ZDI-23-1325)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43014: ZDI-CAN-21617: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 25, 2023
      - Last Modified Date: May 13, 2025

    43022: HTTP: D-Link DIR-3040 prog.cgi SetWan3Settings Buffer Overflow Vulnerability (ZDI-23-1326,1327,1330)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43022: ZDI-CAN-21618,21619,21622: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 25, 2023
      - Last Modified Date: May 13, 2025

    43023: HTTP: D-Link DIR-3040 prog.cgi SetSysEmailSettings Buffer Overflow Vulnerability (ZDI-23-1328)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43023: ZDI-CAN-21620: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 25, 2023
      - Last Modified Date: May 13, 2025

    43024: HTTP: D-Link DIR-3040 prog.cgi SetQuickVPNSettings PSK Buffer Overflow Vulnerability (ZDI-23-1331)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43024: ZDI-CAN-21623: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 25, 2023
      - Last Modified Date: May 13, 2025

    43026: HTTP: D-Link DIR-3040 prog.cgi SetWLanRadioSecurity Buffer Overflow Vulnerability (ZDI-23-1329)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43026: ZDI-CAN-21621: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 25, 2023
      - Last Modified Date: May 13, 2025

    43030: HTTP: D-Link DIR-3040 prog.cgi SetMyDLinkRegistration Buffer Overflow Vulnerability (ZDI-23-1334)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43030: ZDI-CAN-21652: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 08, 2023
      - Last Modified Date: May 13, 2025

    43031: HTTP: D-Link DIR-3040 prog.cgi SetDeviceSettings Buffer Overflow Vulnerability (ZDI-23-1332)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43031: ZDI-CAN-21650: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 01, 2023
      - Last Modified Date: May 13, 2025

    43032: HTTP: D-Link DIR-3040 prog.cgi SetUsersSettings Buffer Overflow Vulnerability (ZDI-23-1336)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43032: ZDI-CAN-21654: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 01, 2023
      - Last Modified Date: May 13, 2025

    43038: HTTP: D-Link DIR-3040 prog.cgi SetIPv6PppoeSettings Buffer Overflow Vulnerability (ZDI-23-1333)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43038: ZDI-CAN-21651: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 01, 2023
      - Last Modified Date: May 13, 2025

    43039: HTTP: D-Link DIR-3040 prog.cgi SetTriggerPPPoEValidate Buffer Overflow Vulnerability (ZDI-23-1335)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43039: ZDI-CAN-21653: Zero Day Initiative Vulnerability (D-Link DIR-3040)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 01, 2023
      - Last Modified Date: May 13, 2025

    44664: HTTP: Delta Electronics CNCSoft-G2 DOPSoft Stack-based Buffer Overflow Vulnerability (ZDI-24-1402)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: May 13, 2025

    44947: HTTP: Cisco IOS XE SNMP GET-NEXT cilmCurrentImageLevel Buffer Overflow Vulnerability (ZDI-25-276)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44947: ZDI-CAN-25019: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: May 13, 2025

    44948: HTTP: Cisco IOS XE SNMP GET-NEXT cContextMappingBridgeDomainIdentifier Buffer Overflow (ZDI-25-279)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44948: ZDI-CAN-25022: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: May 13, 2025

    44949: HTTP: Cisco IOS XE SNMP SET cewProxyClass Stack-based Buffer Overflow Vulnerability (ZDI-25-281)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44949: ZDI-CAN-25017: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: May 13, 2025

    44957: HTTP: Cisco IOS XE SNMP GET-NEXT ciscoFlashChipCode Unexpected Sign Extension (ZDI-25-280)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44957: ZDI-CAN-25024: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: May 13, 2025

    44959: HTTP: Cisco IOS XE SNMP GET-NEXT callHomeUserDefCmdName Unexpected Sign Extension (ZDI-25-275)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44959: ZDI-CAN-25018: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: May 13, 2025

    44960: HTTP: Cisco IOS XE SNMP SET cewEventTime Stack-based Buffer Overflow Vulnerability (ZDI-25-277)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44960: ZDI-CAN-25020: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: May 13, 2025

    44961: HTTP: Cisco IOS XE SNMP GET-NEXT ctspIpSgtValue Buffer Overflow Vulnerability (ZDI-25-278)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44961: ZDI-CAN-25021: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: May 13, 2025

    44986: HTTP: Cisco IOS XE SNMP GET-NEXT ciscoFlashFileSize Unexpected Sign Extension (ZDI-25-270)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44986: ZDI-CAN-25030: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 29, 2024
      - Last Modified Date: May 13, 2025

    44998: HTTP: Cisco IOS XE SNMP OID Handling Out-Of-Bounds Read Vulnerability (ZDI-25-273)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44998: ZDI-CAN-25023: Zero Day Initiative Vulnerability (Cisco IOS)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: November 26, 2024
      - Last Modified Date: May 13, 2025

    45174: HTTP: Ivanti Avalanche SecureFilter Authentication Bypass Vulnerability (ZDI-25-044)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: December 17, 2024
      - Last Modified Date: May 13, 2025

    45803: HTTP: Suspicious Number of Encoding Headers
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Release Date: May 06, 2025
      - Last Modified Date: May 13, 2025

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    * 31875: HTTP: Adobe Acrobat Pro DC ImageConversion EMF GIF Buffer Overflow Vulnerability (ZDI-18-597)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "31875: ZDI-CAN-5760: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: May 29, 2018
      - Last Modified Date: May 13, 2025

    32810: HTTP: Foxit Reader TextBox Validate Use-After-Free Vulnerability (ZDI-18-1181)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "32810: ZDI-CAN-6439: Zero Day Initiative Vulnerability (ABB Panel Builder 800)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 07, 2018
      - Last Modified Date: May 13, 2025

    * 33164: HTTP: Foxit Reader XFA isPropertySpecified Use-After-Free Vulnerability (ZDI-18-1214)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "33164: ZDI-CAN-6470: Zero Day Initiative Vulnerability (Foxit Reader)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: October 16, 2018
      - Last Modified Date: May 13, 2025

    33320: HTTP: OMRON CX-Supervisor sr3 File Parsing Script API Use-After-Free Vulnerability (ZDI-18-1446)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "33320: ZDI-CAN-6657: Zero Day Initiative Vulnerability (OMRON CX-Supervisor)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: October 23, 2018
      - Last Modified Date: May 13, 2025

    * 33327: HTTP: Foxit Reader array Use-After-Free Vulnerability (ZDI-18-1159)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: November 06, 2018
      - Last Modified Date: May 13, 2025

    * 33486: HTTP: Adobe Acrobat Pro DC ImageConversion XPS Out-Of-Bounds Read Vulnerability (ZDI-18-1390)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "33486: ZDI-CAN-7165: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: November 13, 2018
      - Last Modified Date: May 13, 2025

    33741: HTTP: Adobe Acrobat Reader HTML2PDF Use-After-Free Vulnerability (ZDI-18-1385)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: December 18, 2018
      - Last Modified Date: May 13, 2025

    35111: HTTP: Trend Micro OfficeScan ServerMigrationTool Out-Of-Bounds Read Vulnerability (ZDI-20-1225)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "35111: ZDI-CAN-11108: Zero Day Initiative Vulnerability (Trend Micro OfficeScan)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: June 16, 2020
      - Last Modified Date: May 13, 2025

    36070: HTTP: HP Enterprise IMC Language Injection Vulnerability (ZDI-19-1039,1040,1042,1043,1044,1045)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36070: ZDI-CAN-8963,8964,8968,8969,8970,8971: Zero Day Initiative Vulnerability (HPE IMC)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 27, 2019
      - Last Modified Date: May 13, 2025

    36312: HTTP: Advantech WISE-PaaS/RMM AccountMgmt activateAccount XML Information Disclosure (ZDI-19-953)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: October 15, 2019
      - Last Modified Date: May 13, 2025

    37860: HTTP: D-Link DAP-1860 HNAP Authorization Command Injection Vulnerability (ZDI-20-1428)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: July 21, 2020
      - Last Modified Date: May 13, 2025

    37861: HTTP: D-Link DAP-1860 uHTTPd Authentication Bypass Vulnerability (ZDI-20-1429)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: July 21, 2020
      - Last Modified Date: May 13, 2025

    38061: HTTP: NETGEAR Multiple Routers mini_httpd Authentication Bypass Vulnerability (ZDI-20-1451)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "38061: ZDI-CAN-11559: Zero Day Initiative Vulnerability (NETGEAR R7450)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: September 22, 2020
      - Last Modified Date: May 13, 2025

    38817: HTTP: QNAP NAS MusicStation Directory Traversal Arbitrary Vulnerability (ZDI-21-591)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "38817: ZDI-CAN-12048: Zero Day Initiative Vulnerability (QNAP NAS)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 02, 2021
      - Last Modified Date: May 13, 2025

    39387: HTTP: Advantech iView getAllActiveTraps SQL Injection Vulnerability (ZDI-21-653)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39387: ZDI-CAN-11838: Zero Day Initiative Vulnerability (Advantech iView)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 30, 2021
      - Last Modified Date: May 13, 2025

    39388: HTTP: Advantech iView deleteZtpConfig SQL Injection Vulnerability (ZDI-21-654)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: March 30, 2021
      - Last Modified Date: May 13, 2025

    39392: HTTP: D-Link DAP-1330 lighttpd http_parse_request Buffer Overflow Vulnerability (ZDI-21-681)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39392: ZDI-CAN-12065: Zero Day Initiative Vulnerability (D-Link DAP-1330)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 30, 2021
      - Last Modified Date: May 13, 2025

    39420: HTTP: Advantech iView NetworkServlet SQL Injection Vulnerability (ZDI-21-655)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39420: ZDI-CAN-13137: Zero Day Initiative Vulnerability (Advantech iView)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: April 06, 2021
      - Last Modified Date: May 13, 2025

    39515: HTTP: ISC BIND TKEY Query Integer Overflow Vulnerability (ZDI-21-657)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39515: ZDI-CAN-13347: Zero Day Initiative Vulnerability (ISC BIND)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: April 20, 2021
      - Last Modified Date: May 13, 2025

    40337: HTTP: Adobe Acrobat AcroForm deleteItemAt Use-After-Free Vulnerability (ZDI-21-1099)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: September 21, 2021
      - Last Modified Date: May 13, 2025

    40464: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-432)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40464: ZDI-CAN-14797: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: November 02, 2021
      - Last Modified Date: May 13, 2025

    40812: HTTP: Foxit PDF Reader Doc Object Use-After-Free Vulnerability (ZDI-22-275)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40812: ZDI-CAN-15851: Zero Day Initiative Vulnerability (Foxit PDF Reader)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 01, 2022
      - Last Modified Date: May 13, 2025

    40813: HTTP: Foxit PDF Reader AcroForm Use-After-Free Vulnerability (ZDI-22-277)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40813: ZDI-CAN-15853: Zero Day Initiative Vulnerability (Foxit PDF Reader)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 01, 2022
      - Last Modified Date: May 13, 2025

    40814: HTTP: Foxit PDF Reader Doc Use-After-Free Vulnerability (ZDI-22-279)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40814: ZDI-CAN-16115: Zero Day Initiative Vulnerability (Foxit PDF Reader)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 01, 2022
      - Last Modified Date: May 13, 2025

    40934: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1167)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40934: ZDI-CAN-16270: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 01, 2022
      - Last Modified Date: May 13, 2025

    40957: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1168)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40957: ZDI-CAN-16271: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 08, 2022
      - Last Modified Date: May 13, 2025

    40958: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1169)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40958: ZDI-CAN-16296: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 08, 2022
      - Last Modified Date: May 13, 2025

    40959: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1170)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40959: ZDI-CAN-16304: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 08, 2022
      - Last Modified Date: May 13, 2025

    40960: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1171)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40960: ZDI-CAN-16358: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 08, 2022
      - Last Modified Date: May 13, 2025

    40961: HTTP: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Vulnerability (ZDI-22-1172)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "40961: ZDI-CAN-16360: Zero Day Initiative Vulnerability (Fatek Automation FvDesigner)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 08, 2022
      - Last Modified Date: May 13, 2025

    42332: HTTP: Autodesk 3DS Max USD File Parsing Uninitialized Pointer Vulnerability (ZDI-23-582)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42332: ZDI-CAN-20173: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    42333: HTTP: Autodesk 3DS Max USD File Parsing Use-After-Free Vulnerability (ZDI-23-579)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42333: ZDI-CAN-20171: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    42335: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Write Vulnerability (ZDI-23-584)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42335: ZDI-CAN-20169: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    42336: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-577)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42336: ZDI-CAN-20168: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    42339: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-578)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42339: ZDI-CAN-20221: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    42340: HTTP: Autodesk 3DS Max USD File Parsing Out-Of-Bounds Read Vulnerability (ZDI-23-581)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42340: ZDI-CAN-20174: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    42341: HTTP: Autodesk 3DS Max USD File Parsing Use-After-Free Vulnerability (ZDI-23-580)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42341: ZDI-CAN-20175: Zero Day Initiative Vulnerability (Autodesk 3DS Max)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 14, 2023
      - Last Modified Date: May 13, 2025

    * 43069: HTTP: Trend Micro Apex Central widget WFProxy Local File Inclusion Vulnerability (ZDI-24-024)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "43069: ZDI-CAN-21327: Zero Day Initiative Vulnerability (Trend Micro Apex Central)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 01, 2023
      - Last Modified Date: May 13, 2025

    * 44382: HTTP: Ivanti Endpoint Manager SQL Injection (ZDI-24-1213,1215,1217,1218,1219,1221,ZDI-25-041)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: June 18, 2024
      - Last Modified Date: May 13, 2025

    45600: HTTP: eCharge Hardy Barth cPH2 index.php Command Injection Vulnerability (ZDI-25-249)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45600: ZDI-CAN-23115: Zero Day Initiative Vulnerability (eCharge Hardy Barth cPH2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 25, 2025
      - Last Modified Date: May 13, 2025

    45601: HTTP: eCharge Hardy Barth cPH2 check_req.php ntp Command Injection Vulnerability (ZDI-25-247)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45601: ZDI-CAN-23113: Zero Day Initiative Vulnerability (eCharge Hardy Barth cPH2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 25, 2025
      - Last Modified Date: May 13, 2025

    45730: ZDI-CAN-26524: Zero Day Initiative Vulnerability (Allegra)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Name changed from "45730: ZDI-CAN-26436: Zero Day Initiative Vulnerability (Allegra)".
      - Release Date: April 15, 2025
      - Last Modified Date: May 13, 2025

  Removed Filters: None