|
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs. New content is now available at the Threat Management Center (TMC). |
| |
|
System Requirements |
The 3.2.0 DV is supported on devices running TOS 5.x and earlier. The 4.0.0 DV is supported on devices running TOS 6.x or higher, as
well as vTPS. Please note that vTPS does not currently support pre-disclosed ZDI filters.
|
| |
|
The Digital Vaccine can be manually downloaded from the following URLs:
|
New Filters:
46153: HTTP: Microsoft ASP.NET SOAP Execution Restriction Bypass Vulnerability (ZDI-25-1056)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a security bypass vulnerability in Microsoft .NET Framework.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Zero Day Initiative: ZDI-25-1056
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: January 13, 2026
46438: ZDI-CAN-28623: Zero Day Initiative Vulnerability (SolarWinds Web Help Desk)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against exploitation of a zero-day vulnerability affecting SolarWinds Web Help Desk.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: January 13, 2026
46798: HTTP: React Server Components Unsafe Deserialization Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: High
- Description: This filter detects an attempt to exploit an unsafe deserialization vulnerability in React Server Components.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-55184
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: January 13, 2026
46799: PWN2OWN ZDI-CAN-28233: Zero Day Initiative Vulnerability (Samsung Galaxy S25)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against exploitation of a zero-day vulnerability affecting Samsung Galaxy S25.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: January 13, 2026
46800: PWN2OWN ZDI-CAN-28455,28457: Zero Day Initiative Vulnerability (Samsung Galaxy S25)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against exploitation of a zero-day vulnerability affecting Samsung Galaxy S25.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: January 13, 2026
46801: PWN2OWN ZDI-CAN-28456: Zero Day Initiative Vulnerability (Samsung Galaxy S25)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against exploitation of a zero-day vulnerability affecting Samsung Galaxy S25.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: January 13, 2026
46813: HTTP: WordPress Starter Templates Plugin Arbitrary File Upload Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit an arbitrary file upload vulnerability in WordPress Starter Templates Plugin.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-13065
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: January 13, 2026
46814: HTTP: Ivanti Endpoint Manager HashCalculator GetHashForWildcard NTLM Relay Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a path traversal vulnerability in Ivanti Endpoint Manager.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2024-13160 CVSS 8.5
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: January 13, 2026
46815: HTTP: s-a-zhd Ecommerce-Website-using-PHP Unrestricted File Upload Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit an unrestricted file upload vulnerability in s-a-zhd Ecommerce-Website-using-PHP.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-2035 CVSS 9.8
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: January 13, 2026
46817: HTTP: GStreamer H.265 Codec Parsing Stack Buffer Overflow Vulnerability (ZDI-25-267)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a stack-based buffer overflow vulnerability in GStreamer.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-3887
- Zero Day Initiative: ZDI-25-267
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: January 13, 2026
46818: HTTP: LibreNMS Alert Rule Stored Cross-Site Scripting Vulnerability (ZDI-25-1182)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in LibreNMS.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-68614 CVSS 4.3
- Zero Day Initiative: ZDI-25-1182
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: January 13, 2026
46819: ZDI-CAN-28410: Zero Day Initiative Vulnerability (Microsoft Exchange)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft Exchange.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: January 13, 2026
46822: HTTP: Django FilteredRelation SQL Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a SQL injection vulnerability in Django.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2025-57833
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: January 13, 2026
46823: HTTP: Cisco Identity Services Engine Cross-Site Scripting Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in Cisco Identity Services Engine.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-20303
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: January 13, 2026
46824: ZDI-CAN-28661: Zero Day Initiative Vulnerability (Fortinet FortiWeb)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against exploitation of a zero-day vulnerability affecting Fortinet FortiWeb.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Evaluation (Permit / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: January 13, 2026
46825: HTTP: TOTOLINK X2000R boafrm peerRptPin Command Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a command injection vulnerability in TOTOLINK X2000R.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-5504 CVSS 5.3
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: January 13, 2026
46826: HTTP: LibreNMS Discovery Endpoint hostname SQL Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit an SQL injection vulnerability in LibreNMS.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Evaluation (Permit / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2025-65093
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: UNIX/Linux Server Application or Service
- Release Date: January 13, 2026
46827: HTTP: TRENDnet TEW-411BRPplus Command Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a command injection vulnerability in TRENDnet TEW-411BRPplus.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-51833
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Networked Hardware Device Application or Service
- Release Date: January 13, 2026
46828: ZDI-CAN-28660: Zero Day Initiative Vulnerability (Fortinet FortiWeb)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against exploitation of a zero-day vulnerability affecting Fortinet FortiWeb.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: January 13, 2026
46829: TCP: MongoDB Query Request with Compression
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Security Policy
- Severity: Low
- Description: This filter detects an attempt to query MongoDB, which may indicate MongoBleed attempts.
- Deployment: Not enabled by default in any deployment.
- References:
- Common Vulnerabilities and Exposures: CVE-2025-14847
- Classification: Security Policy - Other
- Protocol: TCP (Generic)
- Platform: Multi-Platform Server Application or Service
- Release Date: January 13, 2026
Modified Filters (logic changes):
* = Enabled in Default deployments
* 46140: HTTP: Arista NG Firewall replace_marker Authentication Bypass Vulnerability (ZDI-25-1019)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46140: ZDI-CAN-27007: Zero Day Initiative Vulnerability (Arista NG Firewall)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: July 08, 2025
- Last Modified Date: January 13, 2026
46151: HTTP: Siemens SINEC NMS getTotalAndFilterCounts SQL Injection Vulnerability (ZDI-25-1021)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46151: ZDI-CAN-26570: Zero Day Initiative Vulnerability (Siemens SINEC NMS)".
- Severity changed from "Critical" to "High".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: July 08, 2025
- Last Modified Date: January 13, 2026
* 46326: SNMP: Net-SNMP SnmpTrapd Agent Message Stack-based Buffer Overflow Vulnerability (ZDI-25-1181)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46326: ZDI-CAN-27507: Zero Day Initiative Vulnerability (Net-SNMP)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: August 26, 2025
- Last Modified Date: January 13, 2026
46539: HTTP: IceWarp14 X-File-Operation Command Injection Vulnerability (ZDI-25-1072)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46539: ZDI-CAN-27394: Zero Day Initiative Vulnerability (IceWarp)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: October 21, 2025
- Last Modified Date: January 13, 2026
46589: HTTP: Framelink Figma MCP Server fetchWithRetry Command Injection Vulnerability (ZDI-25-1197)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46589: ZDI-CAN-27877: Zero Day Initiative Vulnerability (Framelink Figma MCP Server)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: November 04, 2025
- Last Modified Date: January 13, 2026
Modified Filters (metadata changes only):
* = Enabled in Default deployments
39724: HTTP: PKZIP Archive Filename Directory Traversal
- IPS Version: 3.6.2 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Vulnerability references updated.
- Release Date: June 01, 2021
- Last Modified Date: January 13, 2026
42803: HTTP: Foxit PDF Reader Annotation Use-After-Free Vulnerability (ZDI-25-1176)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42803: ZDI-CAN-28403: Zero Day Initiative Vulnerability (Foxit PDF Reader)".
- Description updated.
- Vulnerability references updated.
- Release Date: December 09, 2025
- Last Modified Date: January 13, 2026
44929: HTTP: Suspicious Python Pickle File Transfer
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Vulnerability references updated.
- Release Date: October 15, 2024
- Last Modified Date: January 13, 2026
45871: HTTP: Siemens Simcenter Femap IGS File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1042)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45871: ZDI-CAN-26755: Zero Day Initiative Vulnerability (Siemens Simcenter Femap)".
- Description updated.
- Vulnerability references updated.
- Release Date: May 13, 2025
- Last Modified Date: January 13, 2026
45954: HTTP: AzeoTech DAQFactory CTL File Parsing Type Confusion Vulnerability (ZDI-25-1134)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45954: ZDI-CAN-26883: Zero Day Initiative Vulnerability (AzeoTech DAQFactory)".
- Description updated.
- Vulnerability references updated.
- Release Date: June 10, 2025
- Last Modified Date: January 13, 2026
* 45961: HTTP: DreamFactory saveZipFile Command Injection Vulnerability (ZDI-25-1024)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "45961: ZDI-CAN-26589: Zero Day Initiative Vulnerability (Dreamfactory)".
- Description updated.
- Vulnerability references updated.
- Release Date: June 10, 2025
- Last Modified Date: January 13, 2026
46100: HTTP: PDFsam Enhanced App Out-Of-Bounds Read Vulnerability (ZDI-25-1089)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46100: ZDI-CAN-27260: Zero Day Initiative Vulnerability (PDFSam Enhanced)".
- Description updated.
- Vulnerability references updated.
- Release Date: July 01, 2025
- Last Modified Date: January 13, 2026
46198: HTTP: Apple macOS WindowServer Excessive Iteration Vulnerability (ZDI-25-1005)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46198: ZDI-CAN-27348: Zero Day Initiative Vulnerability (Apple macOS)".
- Severity changed from "Critical" to "High".
- Description updated.
- Vulnerability references updated.
- Release Date: July 22, 2025
- Last Modified Date: January 13, 2026
46241: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Heap-based Buffer Overflow (ZDI-25-1062)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46241: ZDI-CAN-27351: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 05, 2025
- Last Modified Date: January 13, 2026
46243: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow (ZDI-25-1064)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46243: ZDI-CAN-27527: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 05, 2025
- Last Modified Date: January 13, 2026
46245: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow (ZDI-25-1063)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46245: ZDI-CAN-27399: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 05, 2025
- Last Modified Date: January 13, 2026
46246: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1102)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46246: ZDI-CAN-27436: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 05, 2025
- Last Modified Date: January 13, 2026
46247: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1101)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46247: ZDI-CAN-27438: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 05, 2025
- Last Modified Date: January 13, 2026
46248: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1103)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46248: ZDI-CAN-27360: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 05, 2025
- Last Modified Date: January 13, 2026
46249: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1100)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46249: ZDI-CAN-27440: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 05, 2025
- Last Modified Date: January 13, 2026
46287: HTTP: Delta Electronics CNCSoft-G2 DOPSoft DPAX File Parsing Stack-based Buffer Overflow(ZDI-25-985)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46287: ZDI-CAN-27323: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 12, 2025
- Last Modified Date: January 13, 2026
46389: HTTP: Apple Safari JavaScriptCore operationMapIteratorNext Type Confusion Vulnerability(ZDI-25-1007)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46389: ZDI-CAN-27825: Zero Day Initiative Vulnerability (Apple Safari)".
- Severity changed from "Critical" to "High".
- Description updated.
- Vulnerability references updated.
- Release Date: September 09, 2025
- Last Modified Date: January 13, 2026
46401: HTTP: Autodesk AutoCAD CATPART File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1110)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46401: ZDI-CAN-27998: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46402: HTTP: Autodesk AutoCAD CATPRODUCT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1111)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46402: ZDI-CAN-27974: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46403: HTTP: Autodesk AutoCAD X_T File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1112)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46403: ZDI-CAN-27973: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46404: HTTP: Autodesk AutoCAD CATPRODUCT File Parsing Heap-based Buffer Overflow Vulnerability(ZDI-25-1135)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46404: ZDI-CAN-27960: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46405: HTTP: Autodesk AutoCAD CATPRODUCT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1117)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46405: ZDI-CAN-27963: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46406: HTTP: Autodesk AutoCAD PRT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1118)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46406: ZDI-CAN-27972: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46407: HTTP: Autodesk AutoCAD PRT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1119)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46407: ZDI-CAN-27971: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46408: HTTP: Autodesk AutoCAD SLDPRT File Parsing Memory Corruption Vulnerability (ZDI-25-1120)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46408: ZDI-CAN-27970: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46409: HTTP: Autodesk AutoCAD PRT File Parsing Memory Corruption Vulnerability (ZDI-25-987)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46409: ZDI-CAN-27965: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46410: HTTP: Autodesk AutoCAD SLDPRT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1113)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46410: ZDI-CAN-27967: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46411: HTTP: Autodesk AutoCAD SLDPRT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1114)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46411: ZDI-CAN-27966: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46412: HTTP: Autodesk AutoCAD SLDPRT File Parsing Memory Corruption Vulnerability (ZDI-25-1116)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46412: ZDI-CAN-27964: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46413: HTTP: Autodesk AutoCAD PRT File Parsing Memory Corruption Vulnerability (ZDI-25-1115)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46413: ZDI-CAN-27961: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46433: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow (ZDI-25-1066)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46433: ZDI-CAN-27352: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46434: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Heap-based Buffer Overflow (ZDI-25-1065)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46434: ZDI-CAN-27350: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 16, 2025
- Last Modified Date: January 13, 2026
46449: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow (ZDI-25-1067)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46449: ZDI-CAN-27358: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 23, 2025
- Last Modified Date: January 13, 2026
46450: HTTP: AzeoTech DAQFactory CTL File Parsing Type Confusion Vulnerability (ZDI-25-1131)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46450: ZDI-CAN-27523: Zero Day Initiative Vulnerability (AzeoTech DAQFactory)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 23, 2025
- Last Modified Date: January 13, 2026
46452: HTTP: AzeoTech DAQFactory CTL File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1129)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46452: ZDI-CAN-27811: Zero Day Initiative Vulnerability (AzeoTech DAQFactory)".
- Description updated.
- Vulnerability references updated.
- Release Date: September 23, 2025
- Last Modified Date: January 13, 2026
46495: HTTP: Autodesk AutoCAD MODEL File Parsing Memory Corruption Vulnerability (ZDI-25-1108)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46495: ZDI-CAN-28126: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: October 07, 2025
- Last Modified Date: January 13, 2026
46496: HTTP: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1107)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46496: ZDI-CAN-28127: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: October 07, 2025
- Last Modified Date: January 13, 2026
46497: HTTP: Autodesk AutoCAD CATPART File Parsing Memory Corruption Vulnerability (ZDI-25-1106)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46497: ZDI-CAN-28128: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: October 07, 2025
- Last Modified Date: January 13, 2026
46525: HTTP: Fuji Electric Monitouch V-SFT V7 File Parsing Heap-based Buffer Overflow (ZDI-25-1068)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46525: ZDI-CAN-27353: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
- Description updated.
- Vulnerability references updated.
- Release Date: October 14, 2025
- Last Modified Date: January 13, 2026
46526: HTTP: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-1122)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46526: ZDI-CAN-28179: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: October 14, 2025
- Last Modified Date: January 13, 2026
46694: HTTP: Autodesk AutoCAD CATPART File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-1123)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "46694: ZDI-CAN-28421: Zero Day Initiative Vulnerability (Autodesk AutoCAD)".
- Description updated.
- Vulnerability references updated.
- Release Date: December 02, 2025
- Last Modified Date: January 13, 2026
Removed Filters: None
|