New Filters:
37850: HTTP: Microsoft .NET Framework XPS File Parsing Remote Code Execution Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a remote code execution vulnerability in Microsoft .NET Framework.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2020-0605
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: October 10, 2023
42478: HTTP: LG Simple Editor deleteFolder Directory Traversal Vulnerability (ZDI-23-1200)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a directory traversal vulnerability in LG Simple Editor.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-40494 CVSS 8.3
- Zero Day Initiative: ZDI-23-1200
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: October 10, 2023
43288: HTTP: JetBrains TeamCity Copy Build Step Reflected Cross-Site Scripting Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a reflected cross-site scripting vulnerability in JetBrains TeamCity.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Performance-Optimized (Disabled)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-41249 CVSS 5.5
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: October 10, 2023
43295: ZDI-CAN-22041: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter protects against the exploitation of a zero-day vulnerability affecting Adobe Acrobat Reader DC.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: October 10, 2023
43313: TCP: Apache CouchDB Erlang Cookie Authentication Bypass Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Exploits
- Severity: High
- Description: This filter detects an attempt to exploit an authentication bypass in Apache CouchDB.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2022-24706 CVSS 9.8
- Classification: Vulnerability - Other
- Protocol: TCP (Generic)
- Platform: Multi-Platform Server Application or Service
- Release Date: October 10, 2023
43314: HTTP: Microsoft SharePoint GenerateProxyAssembly Code Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a code injection vulnerability in Microsoft SharePoint.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Performance-Optimized (Disabled)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-24954 CVSS 6.5
- Zero Day Initiative: ZDI-23-883
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Windows Server Application or Service
- Release Date: October 10, 2023
43316: HTTP: OpenTSDB Command Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a command injection vulnerability in OpenTSDB.
- Deployments:
- Deployment: Default (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-25826 CVSS 9.8, CVE-2023-36812 CVSS 9.8
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: UNIX/Linux Client Application
- Release Date: October 10, 2023
43317: ZDI-CAN-21952: Zero Day Initiative Vulnerability (Ivanti Avalanche)
- IPS Version: 3.9.5 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Ivanti Avalanche.
- Deployments:
- Deployment: Security-Optimized (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: October 10, 2023
43325: HTTP: Microsoft SharePoint GenerateProxyAssembly Base64 Encoded Code Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a code injection vulnerability in Microsoft SharePoint.
- Deployments:
- Deployment: Default (Block / Notify)
- Deployment: Performance-Optimized (Disabled)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-24954 CVSS 6.5
- Zero Day Initiative: ZDI-23-883
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Windows Server Application or Service
- Release Date: October 10, 2023
Modified Filters (logic changes):
* = Enabled in Default deployments
0343: HTTP: Shell Command Execution (/bin/ps)
- IPS Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: December 31, 2005
- Last Modified Date: October 10, 2023
* 12658: HTTP: Novell GroupWise Internet Agent Buffer Overflow Vulnerability
- IPS Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: November 20, 2012
- Last Modified Date: October 10, 2023
16466: HTTP: Avaya IP Office Customer Call Reporter Unrestricted File Upload Vulnerability (ZDI-12-106)
- IPS Version: 3.6.2 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: July 08, 2014
- Last Modified Date: October 10, 2023
* 16628: TCP: HP Data Protector Multiple Opcodes Parsing Code Execution Vulnerability
- IPS Version: 1.0.0 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: August 19, 2014
- Last Modified Date: October 10, 2023
39423: HTTP: Grandstream UCM6202 SQL Injection Vulnerability
- IPS Version: 3.6.2 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: April 06, 2021
- Last Modified Date: October 10, 2023
40328: TCP: Oracle WebLogic Server Memory Corruption Vulnerability
- IPS Version: 3.6.2 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Release Date: September 21, 2021
- Last Modified Date: October 10, 2023
41546: SMTP: Exim Improper Neutralization of Special Elements Vulnerability (ZDI-23-1471)
- IPS Version: 3.0.0 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "41546: ZDI-CAN-17554: Zero Day Initiative Vulnerability (Exim)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: August 02, 2022
- Last Modified Date: October 10, 2023
41722: HTTP: Mozilla Firefox JIT Boolean Conversion Uninitialized Variable Vulnerability (ZDI-23-1467)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "41722: ZDI-CAN-18594: Zero Day Initiative Vulnerability (Mozilla Firefox)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: September 13, 2022
- Last Modified Date: October 10, 2023
* 42542: HTTP: Microsoft SharePoint GenerateProxyAssembly Code Injection Vulnerability (Pwn2Own ZDI-23-883)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: April 04, 2023
- Last Modified Date: October 10, 2023
42833: HTTP: Ivanti Avalanche allowPassThrough Authentication Bypass Vulnerability (ZDI-23-1121)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Detection logic updated.
- Release Date: June 20, 2023
- Last Modified Date: October 10, 2023
43027: HTTP: Foxit PDF Reader XFA Doc Object Use-After-Free Vulnerability (ZDI-23-1424)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "43027: ZDI-CAN-21601: Zero Day Initiative Vulnerability (Foxit PDF Reader)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: August 01, 2023
- Last Modified Date: October 10, 2023
43079: HTTP: Foxit PDF Reader templates Use-After-Free Vulnerability (ZDI-23-1422)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "43079: ZDI-CAN-21586: Zero Day Initiative Vulnerability (Foxit PDF Reader)".
- Severity changed from "Critical" to "High".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: August 01, 2023
- Last Modified Date: October 10, 2023
Modified Filters (metadata changes only):
* = Enabled in Default deployments
41576: DNS: Exim libspf2 Integer Underflow Vulnerability (ZDI-23-1472)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "41576: ZDI-CAN-17578: Zero Day Initiative Vulnerability (Exim)".
- Description updated.
- Vulnerability references updated.
- Release Date: August 02, 2022
- Last Modified Date: October 10, 2023
42118: HTTP: Adobe Acrobat Reader DC richText Use-After-Free Vulnerability (ZDI-23-061)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42118: HTTP: Adobe Acrobat Reader DC richText Use-After-Free Vulnerability".
- Description updated.
- Vulnerability references updated.
- Release Date: December 27, 2022
- Last Modified Date: October 10, 2023
42433: HTTP: Softing edgeAggregator Client Cross-Site Scripting Vulnerability (Pwn2Own ZDI-23-1057)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Description updated.
- Release Date: March 14, 2023
- Last Modified Date: October 10, 2023
* 42781: HTTP: Control Web Panel mysql_manager Command Injection Vulnerability (ZDI-23-1476)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42781: ZDI-CAN-21080: Zero Day Initiative Vulnerability (Control Web Panel)".
- Description updated.
- Vulnerability references updated.
- Release Date: June 06, 2023
- Last Modified Date: October 10, 2023
42998: HTTP: ManageEngine ADManager Plus download Directory Traversal Vulnerability (ZDI-23-1401)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "42998: ZDI-CAN-21184: Zero Day Initiative Vulnerability (ManageEngine ADManager Plus)".
- Severity changed from "Critical" to "High".
- Description updated.
- Vulnerability references updated.
- Release Date: July 25, 2023
- Last Modified Date: October 10, 2023
* 43001: HTTP: Microsoft Exchange ExFileLog Deserialization of Untrusted Data Vulnerability (ZDI-23-1447)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "43001: ZDI-CAN-21487: Zero Day Initiative Vulnerability (Microsoft Exchange)".
- Severity changed from "Critical" to "High".
- Description updated.
- Vulnerability references updated.
- Release Date: July 25, 2023
- Last Modified Date: October 10, 2023
* 43002: HTTP: Microsoft Exchange Project Deserialization of Untrusted Data Vulnerability (ZDI-23-1417)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "43002: ZDI-CAN-21489: Zero Day Initiative Vulnerability (Microsoft Exchange)".
- Severity changed from "Critical" to "High".
- Description updated.
- Vulnerability references updated.
- Release Date: July 25, 2023
- Last Modified Date: October 10, 2023
Removed Filters: None
|