New Filters: 42770: HTTP: WordPress Limit Login Attempts Plugin Stored Cross-Site Scripting Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in the WordPress Limit Login Attempts plugin. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-1861 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42774: HTTP: mySCADA myPRO Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in mySCADA myPRO. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-28400 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42775: HTTP: WordPress Advanced Custom Fields Plugin post_status Cross-Site Scripting Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in WordPress Advanced Custom Fields plugin. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-30777 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42792: HTTP: Jenkins Sidebar Link Plugin icon Directory Traversal Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Jenkins Sidebar Link Plugin. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-32985 - Classification: Vulnerability - Access Validation - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42793: TCP: Ivanti Avalanche Enterprise Server GetSettings Authentication Bypass Vulnerability(ZDI-23-454) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit an authentication bypass vulnerability in Ivanti Avalanche Enterprise Server. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-28126 - Zero Day Initiative: ZDI-23-454 - Classification: Vulnerability - Access Validation - Protocol: TCP (Generic) - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42810: HTTP: WordPress Suspicious User-Agent Header Request - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects an HTTP request with a suspicious User-Agent header using the WordPress Shield Security plugin. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-0992 CVSS 8.7 - Classification: Security Policy - Other - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42820: TCP: Microsoft Windows JET Database Engine Large Prefix Length - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Low - Description: This filter detects a large prefix usage in Microsoft JET Database. - Deployment: Not enabled by default in any deployment. - References: - Common Vulnerabilities and Exposures: CVE-2020-1074 - Classification: Security Policy - Other - Protocol: TCP (Generic) - Platform: Windows Server Application or Service - Release Date: June 13, 2023 42821: HTTP: SQL Injection (Content-Disposition Header) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects a SQL injection attack in which the Content-Disposition header of an HTTP request is used as an attack vector. - Deployments: - Deployment: Security-Optimized (Block / Notify) - Classification: Security Policy - Other - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42822: HTTP: Joomla Configuration Leak - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects a request to the application API endpoint for Joomla. - Deployment: Not enabled by default in any deployment. - References: - Common Vulnerabilities and Exposures: CVE-2023-23752 - Classification: Security Policy - Other - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: June 13, 2023 42836: HTTP: LB-Link Multiple Products Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection in various LB-Link products. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-26801 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: June 13, 2023 42837: HTTP: Tenda G103 Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection in Tenda G103. - Deployments: - Deployment: Default (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-27076 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: June 13, 2023 42838: HTTP: Zyxel Routers Code Execution Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit an code execution vulnerability in multiple Zyxel products. - Deployments: - Deployment: Security-Optimized (Block / Notify) - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: June 13, 2023 42839: HTTP: Digital China Networks DCBI-Netlog-LAB Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in Digital China Networks DCBI-Netlog-LAB. - Deployments: - Deployment: Default (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2023-26802 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: June 13, 2023 Modified Filters (logic changes): * = Enabled in Default deployments 35440: HTTP: Microsoft Windows JET Database Engine Out-Of-Bounds Write Vulnerability (ZDI-20-1128) - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. - Vulnerability references updated. - Release Date: June 16, 2020 - Last Modified Date: June 13, 2023 40003: HTTP: Trend Micro Apex One Directory Traversal File Deletion Vulnerability - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "40003: ZDI-CAN-14457: Zero Day Initiative Vulnerability (Trend Micro Apex One)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: July 20, 2021 - Last Modified Date: June 13, 2023 40482: HTTP: WECON LeviStudioU XML File Parsing G_Picture Buffer Overflow Vulnerability - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "40482: ZDI-CAN-14935: Zero Day Initiative Vulnerability (WECON LeviStudioU)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: November 02, 2021 - Last Modified Date: June 13, 2023 40483: HTTP: WECON LeviStudioU HSC File General Tag WordAddr Buffer Overflow Vulnerability - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "40483: ZDI-CAN-15014: Zero Day Initiative Vulnerability (WECON LeviStudioU)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: November 02, 2021 - Last Modified Date: June 13, 2023 40484: HTTP: WECON LeviStudioU XML File Parsing MulStatus Tag szFilename Buffer Overflow Vulnerability - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "40484: ZDI-CAN-14937: Zero Day Initiative Vulnerability (WECON LeviStudioU)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: November 02, 2021 - Last Modified Date: June 13, 2023 41307: HTTP: Adobe Acrobat Reader DC Annotation Highlight delay Use-After-Free Vulnerability (ZDI-23-734) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41307: ZDI-CAN-16873: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 17, 2022 - Last Modified Date: June 13, 2023 41308: HTTP: Adobe Acrobat Reader DC Annotation popupOpen Use-After-Free Vulnerability (ZDI-23-735) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41308: ZDI-CAN-16874: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 17, 2022 - Last Modified Date: June 13, 2023 41309: HTTP: Adobe Acrobat Reader DC Highlight Annotation noView Use-After-Free Vulnerability (ZDI-23-736) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "41309: ZDI-CAN-16875: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 17, 2022 - Last Modified Date: June 13, 2023 * 42155: HTTP: Synology RT6600ax Command Injection Vulnerability (Pwn2Own ZDI-23-661) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "42155: PWN2OWN ZDI-CAN-19752: Zero Day Initiative Vulnerability (Synology RT6600ax)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Deployments updated and are now: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - Release Date: January 10, 2023 - Last Modified Date: June 13, 2023 * 42626: HTTP: PaperCut MF and NG SetupCompleted Authentication Bypass Vulnerability (ZDI-23-233) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Detection logic updated. - Release Date: April 25, 2023 - Last Modified Date: June 13, 2023 42646: HTTP: VMware Aria Operations for Logs Insecure Deserialization Vulnerability (ZDI-23-482) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category changed from "Exploits" to "Vulnerabilities". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 02, 2023 - Last Modified Date: June 13, 2023 Modified Filters (metadata changes only): * = Enabled in Default deployments 39862: HTTP: Microsoft Windows Media Foundation Core Out-Of-Bounds Write Vulnerability - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "39862: ZDI-CAN-13693: Zero Day Initiative Vulnerability (Microsoft Windows Media Foundation)". - Description updated. - Vulnerability references updated. - Release Date: June 15, 2021 - Last Modified Date: June 13, 2023 40353: SMB: Trend Micro Apex One Named Pipe Denial-of-Service Vulnerability - IPS Version: 3.6.2 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "40353: ZDI-CAN-14887,15138,15139,15140: Zero Day Initiative Vulnerability (Trend Micro Apex One)". - Description updated. - Vulnerability references updated. - Release Date: September 28, 2021 - Last Modified Date: June 13, 2023 Removed Filters: None |