New Filters: 46239: HTTP: Hewlett Packard Enterprise AutoPass License Server Hard-coded Credential Usage (ZDI-25-613) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: High - Description: This filter detects the usage of hard-coded credentials to connect to Hewlett Packard Enterprise AutoPass License Server. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-37107 CVSS 7.3 - Zero Day Initiative: ZDI-25-613 - Classification: Security Policy - Authentication Failure (telnet login failed, brute force, etc.) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: August 12, 2025 46250: ZDI-CAN-27685: Zero Day Initiative Vulnerability (Promptfoo) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Promptfoo. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46251: ZDI-CAN-26972: Zero Day Initiative Vulnerability (Langflow) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Langflow. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46252: ZDI-CAN-27322: Zero Day Initiative Vulnerability (Langflow) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Langflow. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46253: ZDI-CAN-27325: Zero Day Initiative Vulnerability (Langflow) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Langflow. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46254: ZDI-CAN-27497: Zero Day Initiative Vulnerability (Langflow) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Langflow. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46266: ZDI-CAN-27362: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46267: ZDI-CAN-27363: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46268: ZDI-CAN-27364: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46269: ZDI-CAN-27368: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46270: ZDI-CAN-27370: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46271: ZDI-CAN-27371: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46272: ZDI-CAN-27374: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46273: ZDI-CAN-27390: Zero Day Initiative Vulnerability (Schneider Electric EcoStruxure Power Build) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric EcoStruxure Power Build. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46274: HTTP: TOTOLINK T6 cstecgi.cgi setWiFiAclRules Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in TOTOLINK T6. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-7460 CVSS 7.4 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: August 12, 2025 46275: HTTP: TOTOLINK T6 cstecgi.cgi CloudSrvVersionCheck Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in TOTOLINK T6. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-7613 CVSS 5.3 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: August 12, 2025 46276: HTTP: Trend Micro Apex One Console Command Injection Vulnerability (ZDI-25-771,ZDI-25-772) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in Trend Micro Apex One. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-54948 CVSS 9.8, CVE-2025-54987 CVSS 9.8 - Zero Day Initiative: ZDI-25-771, ZDI-25-772 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: August 12, 2025 46278: HTTP: Ivanti Endpoint Manager Mobile Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in Ivanti Endpoint Manager Mobile. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-6771 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: August 12, 2025 46279: HTTP: TOTOLINK T6 cstecgi.cgi delDevice Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in TOTOLINK T6. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-7614 CVSS 5.3 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: August 12, 2025 46280: HTTP: TOTOLINK T6 cstecgi.cgi clearPairCfg Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in TOTOLINK T6. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-7615 CVSS 5.3 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: August 12, 2025 46281: HTTP: JetBrains TeamCity diskUsageBuildsStats Cross-Site Scripting Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in JetBrains TeamCity. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-52877 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: August 12, 2025 46287: ZDI-CAN-27323: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: August 12, 2025 46289: RPC: Microsoft Exchange Hybrid Deployment Authentication Bypass Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects an attempt to exploit an authentication bypass vulnerability in Microsoft Exchange Server. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2025-53786 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Windows Server Application or Service - Release Date: August 12, 2025 Modified Filters (logic changes): * = Enabled in Default deployments 31271: HTTP: wget Command Injection in HTTP URI - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. - Release Date: August 07, 2018 - Last Modified Date: August 12, 2025 41351: HTTP: Fuji Electric Tellus Lite V-Simulator 6 X1 Out-of-Bounds Write Vulnerability (ZDI-23-822) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41351: ZDI-CAN-16779: Zero Day Initiative Vulnerability (Fuji Electric Tellus Lite V-Simulator 6)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 31, 2022 - Last Modified Date: August 12, 2025 41353: HTTP: Fuji Electric Tellus Lite V-Simulator 6 X1 Out-Of-Bounds Write Vulnerability (ZDI-23-820) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41353: ZDI-CAN-16602: Zero Day Initiative Vulnerability (Fuji Electric Tellus Lite V-Simulator 6)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 31, 2022 - Last Modified Date: August 12, 2025 41354: HTTP: Fuji Electric Tellus Lite V-Simulator 6 X1 Buffer Overflow Vulnerability (ZDI-23-821) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41354: ZDI-CAN-16717: Zero Day Initiative Vulnerability (Fuji Electric Tellus Lite V-Simulator 6)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 31, 2022 - Last Modified Date: August 12, 2025 43926: HTTP: Microsoft Exchange PowerShell Exposed Dangerous Method NTLM Relay Vulnerability (ZDI-25-809) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43926: ZDI-CAN-23450: Zero Day Initiative Vulnerability (Microsoft Exchange)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: March 05, 2024 - Last Modified Date: August 12, 2025 45255: HTTP: QNAP TS-464 Active Directory Authentication Bypass Vulnerability (Pwn2Own ZDI-25-742) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45255: PWN2OWN ZDI-CAN-25587: Zero Day Initiative Vulnerability (QNAP TS-464)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: January 07, 2025 - Last Modified Date: August 12, 2025 45441: HTTP: Microsoft Windows Theme File Parsing Improper Input Validation Vulnerability (ZDI-25-824,823) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45441: ZDI-CAN-26364,26372: Zero Day Initiative Vulnerability (Microsoft Windows)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: February 18, 2025 - Last Modified Date: August 12, 2025 45686: HTTP: Vacron Camera ping Command Injection Vulnerability (ZDI-25-805) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45686: ZDI-CAN-25892: Zero Day Initiative Vulnerability (Vacron Camera)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 08, 2025 - Last Modified Date: August 12, 2025 * 45906: HTTP: Microsoft SharePoint DataSetSurrogate Insecure Deserialization Vulnerability (ZDI-25-581,653) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Detection logic updated. - Vulnerability references updated. - Release Date: May 20, 2025 - Last Modified Date: August 12, 2025 * 46121: HTTP: Citrix NetScaler ADC and NetScaler Gateway Memory Leak Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Detection logic updated. - Release Date: July 08, 2025 - Last Modified Date: August 12, 2025 Modified Filters (metadata changes only): * = Enabled in Default deployments * 3710: HTTP: Negative Content-Length HTTP Header - IPS Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Vulnerability references updated. - Release Date: December 31, 2005 - Last Modified Date: August 12, 2025 39724: HTTP: PKZIP Archive Filename Directory Traversal - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Vulnerability references updated. - Release Date: June 01, 2021 - Last Modified Date: August 12, 2025 * 43929: HTTP: Microsoft Windows MonikerLink Information Disclosure Vulnerability (ZDI-25-814) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "43929: ZDI-CAN-23548: Zero Day Initiative Vulnerability (Microsoft Windows)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: March 05, 2024 - Last Modified Date: August 12, 2025 45116: HTTP: Ashlar-Vellum Graphite VC6 File Parsing Uninitialized Variable Vulnerability (ZDI-25-632) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45116: ZDI-CAN-25459: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt)". - Description updated. - Vulnerability references updated. - Release Date: November 26, 2024 - Last Modified Date: August 12, 2025 45177: HTTP: QNAP TS-464 Log Tool SQL Injection Vulnerability (Pwn2Own ZDI-25-758,ZDI-25-759) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45177: PWN2OWN ZDI-CAN-25656: Zero Day Initiative Vulnerability (QNAP TS-464)". - Description updated. - Vulnerability references updated. - Release Date: December 24, 2024 - Last Modified Date: August 12, 2025 * 45192: HTTP: QNAP TS-464 URL Encoding Authentication Bypass Vulnerability (Pwn2Own ZDI-25-753) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45192: PWN2OWN ZDI-CAN-25482: Zero Day Initiative Vulnerability (QNAP TS-464)". - Description updated. - Vulnerability references updated. - Release Date: December 17, 2024 - Last Modified Date: August 12, 2025 * 45213: HTTP: QNAP TS-464 qnap_exec Command Injection Vulnerability (Pwn2Own ZDI-25-743) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45213: PWN2OWN ZDI-CAN-25585: Zero Day Initiative Vulnerability (QNAP TS-464)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: December 24, 2024 - Last Modified Date: August 12, 2025 45260: HTTP: Ashlar-Vellum Cobalt AR File Parsing Out-of-Bounds Read Vulnerability (ZDI-25-642) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45260: ZDI-CAN-25972: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt)". - Description updated. - Vulnerability references updated. - Release Date: January 07, 2025 - Last Modified Date: August 12, 2025 45261: HTTP: Ashlar-Vellum Cobalt VC6 File Parsing Out-of-Bounds Read Vulnerability (ZDI-25-643) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45261: ZDI-CAN-25945: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt)". - Description updated. - Vulnerability references updated. - Release Date: January 07, 2025 - Last Modified Date: August 12, 2025 45262: HTTP: Ashlar-Vellum Cobalt VC6 File Parsing Out-of-Bounds Write Vulnerability (ZDI-25-638) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45262: ZDI-CAN-25944: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt)". - Description updated. - Vulnerability references updated. - Release Date: January 07, 2025 - Last Modified Date: August 12, 2025 45265: HTTP: Ashlar-Vellum Graphite VC6 File Parsing Out-of-Bounds Write Vulnerability (ZDI-25-644) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45265: ZDI-CAN-25862: Zero Day Initiative Vulnerability (Ashlar-Vellum Graphite)". - Description updated. - Vulnerability references updated. - Release Date: January 07, 2025 - Last Modified Date: August 12, 2025 45266: HTTP: Ashlar-Vellum Graphite VC6 File Parsing Out-of-Bounds Write Vulnerability (ZDI-25-639) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45266: ZDI-CAN-25755: Zero Day Initiative Vulnerability (Ashlar-Vellum Graphite)". - Description updated. - Vulnerability references updated. - Release Date: January 07, 2025 - Last Modified Date: August 12, 2025 45268: HTTP: Ashlar-Vellum Graphite VC6 File Parsing Out-of-Bounds Write Vulnerability (ZDI-25-641) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45268: ZDI-CAN-25756: Zero Day Initiative Vulnerability (Ashlar-Vellum Graphite)". - Description updated. - Vulnerability references updated. - Release Date: January 07, 2025 - Last Modified Date: August 12, 2025 45574: HTTP: Phoenix Contact CHARX SEC-3150 DHCP Command Injection Vulnerability (Pwn2Own ZDI-25-621) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45574: ZDI-CAN-26350: Zero Day Initiative Vulnerability (Phoenix Contact CHARX SEC-3150)". - Description updated. - Vulnerability references updated. - Release Date: March 18, 2025 - Last Modified Date: August 12, 2025 45575: HTTP: Phoenix Contact CHARX SEC-3150 OCPP Authentication Bypass Vulnerability (Pwn2Own ZDI-25-628) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45575: ZDI-CAN-26346: Zero Day Initiative Vulnerability (Phoenix Contact CHARX SEC-3150)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: March 18, 2025 - Last Modified Date: August 12, 2025 46098: HTTP: Marvell QConvergeConsole compressConfigFiles Directory Traversal Vulnerability (ZDI-25-733) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "46098: ZDI-CAN-24915: Zero Day Initiative Vulnerability (Marvell QConvergeConsole)". - Severity changed from "Critical" to "High". - Description updated. - Vulnerability references updated. - Release Date: July 01, 2025 - Last Modified Date: August 12, 2025 46141: HTTP: NI LabVIEW VI File Parsing Memory Corruption Vulnerability (ZDI-25-768) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "46141: ZDI-CAN-27081: Zero Day Initiative Vulnerability (NI LabVIEW VI)". - Description updated. - Vulnerability references updated. - Release Date: July 08, 2025 - Last Modified Date: August 12, 2025 Removed Filters: None |