New Filters:
46023: HTTP: Progress Kemp LoadMaster access Command Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a command injection vulnerability in Progress Kemp LoadMaster.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2024-56132 CVSS 7.9
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: July 08, 2025
46071: HTTP: LibreNMS Poller Group Name Stored Cross-Site Scripting Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in LibreNMS.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-47931 CVSS 6.1
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: July 08, 2025
46118: ZDI-CAN-26687: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46119: ZDI-CAN-27128: Zero Day Initiative Vulnerability (Delta Electronics ASDA-Soft)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics ADSA-Soft.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46121: HTTP: Citrix NetScaler ADC and NetScaler Gateway Memory Leak Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a memory leak vulnerability in Citrix NetScaler ADC and NetScaler Gateway.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-6543
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: UNIX/Linux Server Application or Service
- Release Date: July 08, 2025
46122: ZDI-CAN-27086: Zero Day Initiative Vulnerability (Delta Electronics ASDA-Soft)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics ADSA-Soft.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46123: ZDI-CAN-27093: Zero Day Initiative Vulnerability (Delta Electronics DIAView)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAView.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46124: ZDI-CAN-26672: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46125: ZDI-CAN-26677: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46126: ZDI-CAN-26683: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46136: ZDI-CAN-27326: Zero Day Initiative Vulnerability (Ivanti Avalanche)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Ivanti Avalanche.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46137: ZDI-CAN-27250: Zero Day Initiative Vulnerability (NVIDIA Triton)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting NVIDIA Triton.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46138: ZDI-CAN-27310: Zero Day Initiative Vulnerability (Arista NG Firewall)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Arista NG Firewall.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46139: ZDI-CAN-27006: Zero Day Initiative Vulnerability (Arista NG Firewall)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Arista NG Firewall.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46140: ZDI-CAN-27007: Zero Day Initiative Vulnerability (Arista NG Firewall)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Arista NG Firewall.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46141: ZDI-CAN-27081: Zero Day Initiative Vulnerability (NI LabVIEW VI)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting NI LabVIEW VI.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46142: ZDI-CAN-27283: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46143: ZDI-CAN-27332: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46144: HTTP: AMI MegaRAC SPx BMC Authentication Bypass Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit an authentication bypass vulnerability in AMI MegaRAC SPx BMC versions.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2024-54085
- Classification: Vulnerability - Access Validation
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: July 08, 2025
46146: HTTP: OpenEMR Patient Demographics Additional Addresses Stored Cross-Site Scripting Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a cross-side scripting vulnerability in OpenEMR.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-43860 CVSS 8.9
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: July 08, 2025
46147: HTTP: Microsoft Windows WMPhoto setUniformTiling Buffer Overflow Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft Windows WMPhoto.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-29962
- Classification: Vulnerability - Buffer/Heap Overflow
- Protocol: HTTP
- Platform: Windows Client Application
- Release Date: July 08, 2025
46148: HTTP: OneLogin Administrative API Requests
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Security Policy
- Severity: Low
- Description: This filter detects API requests to sensitive OneLogin resources.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2025-34062, CVE-2025-34063, CVE-2025-34064
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46151: ZDI-CAN-26570: Zero Day Initiative Vulnerability (Siemens SINEC NMS)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens SINEC NMS.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46152: ZDI-CAN-26708: Zero Day Initiative Vulnerability (WatchYourLAN)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting WatchYourLAN.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46154: ZDI-CAN-27224: Zero Day Initiative Vulnerability (Autodesk AutoCAD)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Exploits
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Autodesk AutoCAD.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: July 08, 2025
46158: TCP: Suspicious Microsoft SQL Server COLLATE Operation Usage
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Security Policy
- Severity: Low
- Description: This filter detects a suspicious Microsoft SQL server query containing COLLATE operation.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2025-49718
- Classification: Security Policy - Other
- Protocol: TCP (Generic)
- Platform: Windows Server Application or Service
- Release Date: July 08, 2025
46160: HTTP: Microsoft SharePoint DataSetSurrogateSelector Insecure Deserialization Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Microsoft SharePoint.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-49704
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Windows Server Application or Service
- Release Date: July 08, 2025
46161: TCP: Microsoft NEGOEX Buffer Overflow Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft NEGOEX.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-47981
- Classification: Vulnerability - Buffer/Heap Overflow
- Protocol: TCP (Generic)
- Platform: Windows Server Application or Service
- Release Date: July 08, 2025
Modified Filters (logic changes):
* = Enabled in Default deployments
16232: HTTP: HP Sprinter TTF16.ocx DefaultFontName ActiveX Instantiation (ZDI-14-359)
- IPS Version: 3.1.3 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: June 03, 2014
- Last Modified Date: July 08, 2025
16278: HTTP: libYAML Scanner Buffer Overflow Vulnerability
- IPS Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Description updated.
- Detection logic updated.
- Release Date: June 24, 2014
- Last Modified Date: July 08, 2025
39968: HTTP: Ivanti Avalanche Filestore Management Arbitrary File Upload Vulnerability (ZDI-21-1299)
- IPS Version: 3.6.2 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: July 20, 2021
- Last Modified Date: July 08, 2025
* 43225: HTTP: Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Detection logic updated.
- Release Date: September 12, 2023
- Last Modified Date: July 08, 2025
* 44394: HTTP: Ivanti Endpoint Manager Report_Run2 SQL Injection Vulnerability (ZDI-24-1496)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Detection logic updated.
- Release Date: June 18, 2024
- Last Modified Date: July 08, 2025
45506: HTTP: Fuji Electric Smart Editor V8 File Parsing Buffer Overflow Vulnerability (ZDI-25-399)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45506: ZDI-CAN-26026: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: March 04, 2025
- Last Modified Date: July 08, 2025
45507: HTTP: Fuji Electric Smart Editor V10 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-401)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45507: ZDI-CAN-26028: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: March 04, 2025
- Last Modified Date: July 08, 2025
45508: HTTP: Fuji Electric Smart Editor TL5 File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-400)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45508: ZDI-CAN-26032: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: March 04, 2025
- Last Modified Date: July 08, 2025
45530: HTTP: Fuji Electric Smart Editor TL5 File Parsing Buffer Overflow Vulnerability (ZDI-25-402)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45530: ZDI-CAN-25942: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: March 11, 2025
- Last Modified Date: July 08, 2025
45531: HTTP: Fuji Electric Smart Editor V8 File Parsing Buffer Overflow Vulnerability (ZDI-25-403)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45531: ZDI-CAN-26020: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: March 11, 2025
- Last Modified Date: July 08, 2025
45532: HTTP: Fuji Electric Smart Editor X1 File Parsing Buffer Overflow Vulnerability (ZDI-25-404)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45532: ZDI-CAN-26022: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: March 11, 2025
- Last Modified Date: July 08, 2025
45533: HTTP: Fuji Electric Smart Editor X1 File Parsing Buffer Overflow Vulnerability (ZDI-25-405)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45533: ZDI-CAN-26024: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: March 11, 2025
- Last Modified Date: July 08, 2025
* 45693: HTTP: Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Write Vulnerability (ZDI-25-335)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45693: ZDI-CAN-26342: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: April 08, 2025
- Last Modified Date: July 08, 2025
45919: ZDI-CAN-27098: Zero Day Initiative Vulnerability (Autodesk Revit)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Detection logic updated.
- Release Date: May 27, 2025
- Last Modified Date: July 08, 2025
46065: HTTP: Suspicious Visual Studio Code Java Extension Pack Detected
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Detection logic updated.
- Release Date: June 24, 2025
- Last Modified Date: July 08, 2025
Modified Filters (metadata changes only):
* = Enabled in Default deployments
* 44499: HTTP: Adobe Commerce and Magento XML External Entity Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Description updated.
- Vulnerability references updated.
- Release Date: July 16, 2024
- Last Modified Date: July 08, 2025
45503: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Memory Corruption Vulnerability (ZDI-25-411)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45503: ZDI-CAN-26167: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
- Description updated.
- Vulnerability references updated.
- Release Date: March 04, 2025
- Last Modified Date: July 08, 2025
45836: HTTP: Fuji Electric Smart Editor TL5 File Parsing Buffer Overflow Vulnerability (ZDI-25-413)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45836: ZDI-CAN-26018: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Vulnerability references updated.
- Release Date: May 13, 2025
- Last Modified Date: July 08, 2025
45951: HTTP: Fuji Electric Smart Editor X1 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-412)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45951: ZDI-CAN-26031: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
- Description updated.
- Vulnerability references updated.
- Release Date: June 10, 2025
- Last Modified Date: July 08, 2025
Removed Filters: None
|