Views:
Table of Contents
--------------------------
  New Filters - 13
  Modified Filters (logic changes) - 11
  Modified Filters (metadata changes only) - 2
  Removed Filters - 0
  New Filters: 

    42770: HTTP: WordPress Limit Login Attempts Plugin Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in the WordPress Limit Login Attempts plugin.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-1861
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42774: HTTP: mySCADA myPRO Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in mySCADA myPRO.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-28400
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42775: HTTP: WordPress Advanced Custom Fields Plugin post_status Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in WordPress Advanced Custom Fields plugin.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-30777
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42792: HTTP: Jenkins Sidebar Link Plugin icon Directory Traversal Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Jenkins Sidebar Link Plugin.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-32985
      - Classification: Vulnerability - Access Validation
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42793: TCP: Ivanti Avalanche Enterprise Server GetSettings Authentication Bypass Vulnerability(ZDI-23-454) 
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an authentication bypass vulnerability in Ivanti Avalanche Enterprise Server.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-28126
        - Zero Day Initiative: ZDI-23-454
      - Classification: Vulnerability - Access Validation
      - Protocol: TCP (Generic)
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42810: HTTP: WordPress Suspicious User-Agent Header Request
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects an HTTP request with a suspicious User-Agent header using the WordPress Shield Security plugin.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-0992 CVSS 8.7
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42820: TCP: Microsoft Windows JET Database Engine Large Prefix Length
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects a large prefix usage in Microsoft JET Database.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-1074
      - Classification: Security Policy - Other
      - Protocol: TCP (Generic)
      - Platform: Windows Server Application or Service
      - Release Date: June 13, 2023

    42821: HTTP: SQL Injection (Content-Disposition Header)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a SQL injection attack in which the Content-Disposition header of an HTTP request is used as an attack vector.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42822: HTTP: Joomla Configuration Leak
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a request to the application API endpoint for Joomla.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-23752
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: June 13, 2023

    42836: HTTP: LB-Link Multiple Products Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection in various LB-Link products.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-26801
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Networked Hardware Device Application or Service
      - Release Date: June 13, 2023

    42837: HTTP: Tenda G103 Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection in Tenda G103.
      - Deployments:
        - Deployment: Default (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-27076
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Networked Hardware Device Application or Service
      - Release Date: June 13, 2023

    42838: HTTP: Zyxel Routers Code Execution Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an code execution vulnerability in multiple Zyxel products.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Networked Hardware Device Application or Service
      - Release Date: June 13, 2023

    42839: HTTP: Digital China Networks DCBI-Netlog-LAB Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Digital China Networks DCBI-Netlog-LAB.
      - Deployments:
        - Deployment: Default (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-26802
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Networked Hardware Device Application or Service
      - Release Date: June 13, 2023

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    35440: HTTP: Microsoft Windows JET Database Engine Out-Of-Bounds Write Vulnerability (ZDI-20-1128)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: June 16, 2020
      - Last Modified Date: June 13, 2023

    40003: HTTP: Trend Micro Apex One Directory Traversal File Deletion Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40003: ZDI-CAN-14457: Zero Day Initiative Vulnerability (Trend Micro Apex One)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 20, 2021
      - Last Modified Date: June 13, 2023

    40482: HTTP: WECON LeviStudioU XML File Parsing G_Picture Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40482: ZDI-CAN-14935: Zero Day Initiative Vulnerability (WECON LeviStudioU)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: November 02, 2021
      - Last Modified Date: June 13, 2023

    40483: HTTP: WECON LeviStudioU HSC File General Tag WordAddr Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40483: ZDI-CAN-15014: Zero Day Initiative Vulnerability (WECON LeviStudioU)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: November 02, 2021
      - Last Modified Date: June 13, 2023

    40484: HTTP: WECON LeviStudioU XML File Parsing MulStatus Tag szFilename Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40484: ZDI-CAN-14937: Zero Day Initiative Vulnerability (WECON LeviStudioU)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: November 02, 2021
      - Last Modified Date: June 13, 2023

    41307: HTTP: Adobe Acrobat Reader DC Annotation Highlight delay Use-After-Free Vulnerability (ZDI-23-734)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41307: ZDI-CAN-16873: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 17, 2022
      - Last Modified Date: June 13, 2023

    41308: HTTP: Adobe Acrobat Reader DC Annotation popupOpen Use-After-Free Vulnerability (ZDI-23-735)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41308: ZDI-CAN-16874: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 17, 2022
      - Last Modified Date: June 13, 2023

    41309: HTTP: Adobe Acrobat Reader DC Highlight Annotation noView Use-After-Free Vulnerability (ZDI-23-736)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41309: ZDI-CAN-16875: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 17, 2022
      - Last Modified Date: June 13, 2023

    * 42155: HTTP: Synology RT6600ax Command Injection Vulnerability (Pwn2Own ZDI-23-661)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42155: PWN2OWN ZDI-CAN-19752: Zero Day Initiative Vulnerability (Synology RT6600ax)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Deployments updated and are now:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - Release Date: January 10, 2023
      - Last Modified Date: June 13, 2023

    * 42626: HTTP: PaperCut MF and NG SetupCompleted Authentication Bypass Vulnerability (ZDI-23-233)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Release Date: April 25, 2023
      - Last Modified Date: June 13, 2023

    42646: HTTP: VMware Aria Operations for Logs Insecure Deserialization Vulnerability (ZDI-23-482)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category changed from "Exploits" to "Vulnerabilities".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 02, 2023
      - Last Modified Date: June 13, 2023

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    39862: HTTP: Microsoft Windows Media Foundation Core Out-Of-Bounds Write Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39862: ZDI-CAN-13693: Zero Day Initiative Vulnerability (Microsoft Windows Media Foundation)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: June 15, 2021
      - Last Modified Date: June 13, 2023

    40353: SMB: Trend Micro Apex One Named Pipe Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40353: ZDI-CAN-14887,15138,15139,15140: Zero Day Initiative Vulnerability (Trend Micro Apex One)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: September 28, 2021
      - Last Modified Date: June 13, 2023

  Removed Filters: None