Views:
Table of Contents
--------------------------
  New Filters - 17
  Modified Filters (logic changes) - 7
  Modified Filters (metadata changes only) - 22
  Removed Filters - 0
  New Filters: 

    45008: ZDI-CAN-25407: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics CNCSoft-G2.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: November 19, 2024

    45072: ZDI-CAN-25506: Zero Day Initiative Vulnerability (Trend Micro Endpoint Encryption)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Trend Micro Endpoint Encryption.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: November 19, 2024

    45085: HTTP: JetBrains TeamCity Backup History Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in JetBrains TeamCity.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-47950 CVSS 4.2
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: November 19, 2024

    45086: HTTP: GitLab Community and Enterprise Edition OAuth page Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in GitLab Community and Enterprise Edition.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-6530 CVSS 6.4
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: November 19, 2024

    45088: TCP: Acronis Cyber Infrastructure Default Credential Authentication
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects the usage of default credentials when connecting to the keystone database in Acronis Cyber Infrastructure.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-45249 CVSS 9.8
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: November 19, 2024

    45089: HTTP: Grafana duckdb Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Grafana.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-9264
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: November 19, 2024

    45090: HTTP: Ruckus Wireless Admin Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Ruckus Wireless Admin.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-25717 CVSS 9.8
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Networked Hardware Device Application or Service
      - Release Date: November 19, 2024

    45091: HTTP: CyberPanel Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in CyberPanel.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-51567
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: November 19, 2024

    45092: ZDI-CAN-25181: Zero Day Initiative Vulnerability (Fortinet FortiWeb)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Fortinet FortiWeb.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: November 19, 2024

    45093: HTTP: Apache OFBiz .jsp Code Execution Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a code execution vulnerability in Apache OFBiz.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-45195
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: November 19, 2024

    45094: ZDI-CAN-24820: Zero Day Initiative Vulnerability (SonicWall NSv)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting SonicWall NSv.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: November 19, 2024

    45095: DHCP: Microsoft Windows DHCP Server ProcessDhcpRequest Denial-of-Service Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Microsoft Windows Server.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-38236
      - Classification: Vulnerability - Other
      - Protocol: DHCP
      - Platform: Windows Server Application or Service
      - Release Date: November 19, 2024

    45096: ZDI-CAN-24819: Zero Day Initiative Vulnerability (SonicWall NSv)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting SonicWall NSv.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: November 19, 2024

    45097: HTTP: Spring Framework Directory Traversal Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Spring Framework's functional web frameworks.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-38816 CVSS 7.5
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: November 19, 2024

    45098: RPC: Microsoft Windows Remote Desktop Licensing Service Buffer Overread Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an buffer overread vulnerability in Microsoft Windows.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-38071
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: MS-RPC
      - Platform: Windows Server Application or Service
      - Release Date: November 19, 2024

    45100: HTTP: Webmin Tunneling Tool Usage
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects the use of the Tunneling Tool in Webmin.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-38308
      - Classification: Security Policy - Other
      - Protocol: SSL/TLS
      - Platform: Windows Server Application or Service
      - Release Date: November 19, 2024

    45107: HTTP: Palo Alto Networks Expedition Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Palo Alto Networks Expedition.
      - Deployments:
        - Deployment: Default (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-9463
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: UNIX/Linux Server Application or Service
      - Release Date: November 19, 2024

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 32892: HTTP: OGNL Entity Usage in an HTTP URI
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Release Date: August 28, 2018
      - Last Modified Date: November 19, 2024

    * 32909: SMTP: GNU Bash SMTP Header Remote Code Execution Vulnerability
      - IPS Version: 3.2.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: September 04, 2018
      - Last Modified Date: November 19, 2024

    44294: ZDI-CAN-23951-23953,23955-23957: Zero Day Initiative Vulnerability (VMware Private Mobile Network)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Detection logic updated.
      - Release Date: May 21, 2024
      - Last Modified Date: November 19, 2024

    44464: HTTP: Centreon updateContactServiceCommands_MC SQL Injection Vulnerability (ZDI-24-1458)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44464: ZDI-CAN-24535: Zero Day Initiative Vulnerability (Centreon)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 09, 2024
      - Last Modified Date: November 19, 2024

    44466: HTTP: Centreon updateAccessGroupLinks_MC SQL Injection Vulnerability (ZDI-24-1459)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44466: ZDI-CAN-24537: Zero Day Initiative Vulnerability (Centreon)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 09, 2024
      - Last Modified Date: November 19, 2024

    44467: HTTP: Centreon updateContactHostCommands_MC SQL Injection Vulnerability (ZDI-24-1460)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44467: ZDI-CAN-24538: Zero Day Initiative Vulnerability (Centreon)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 09, 2024
      - Last Modified Date: November 19, 2024

    44844: ZDI-CAN-25373: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Detection logic updated.
      - Release Date: October 01, 2024
      - Last Modified Date: November 19, 2024

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    44596: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Out-Of-Bounds Write Vulnerability (ZDI-24-1384)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44596: ZDI-CAN-24828: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 06, 2024
      - Last Modified Date: November 19, 2024

    44597: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Out-Of-Bounds Write Vulnerability (ZDI-24-1393)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44597: ZDI-CAN-24829: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 06, 2024
      - Last Modified Date: November 19, 2024

    44598: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Memory Corruption Vulnerability (ZDI-24-1392)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44598: ZDI-CAN-24910: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 06, 2024
      - Last Modified Date: November 19, 2024

    44612: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Out-Of-Bounds Write Vulnerability (ZDI-24-1391)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44612: ZDI-CAN-24971: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: November 19, 2024

    44613: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Out-Of-Bounds Write Vulnerability (ZDI-24-1387)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44613: ZDI-CAN-24767: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: November 19, 2024

    44615: HTTP: Delta Electronics CNCSoft-G2 DPAX Stack-based Buffer Overflow Vulnerability (ZDI-24-1396)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44615: ZDI-CAN-24994: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: November 19, 2024

    44616: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Memory Corruption Vulnerability (ZDI-24-1400)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44616: ZDI-CAN-25034: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: November 19, 2024

    44617: HTTP: Delta Electronics CNCSoft-G2 DPAX Heap-based Buffer Overflow Vulnerability (ZDI-24-1399)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44617: ZDI-CAN-25037: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: November 19, 2024

    44654: HTTP: Delta Electronics CNCSoft-G2 Stack-based Buffer Overflow Vulnerability (ZDI-24-1389)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44654: ZDI-CAN-24358: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44655: HTTP: Delta Electronics CNCSoft-G2 Stack-based Buffer Overflow Vulnerability (ZDI-24-1390)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44655: ZDI-CAN-24363: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44656: HTTP: Delta Electronics CNCSoft-G2 Uninitialized Variable Vulnerability (ZDI-24-1411)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44656: ZDI-CAN-24765: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44658: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Out-Of-Bounds Read Vulnerability (ZDI-24-1388)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44658: ZDI-CAN-24766: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44665: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1463)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44665: ZDI-CAN-25003: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44669: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1461)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44669: ZDI-CAN-25001: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44670: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1462)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44670: ZDI-CAN-25002: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44671: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1464)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44671: ZDI-CAN-25004: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44672: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1465)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44672: ZDI-CAN-25005: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44673: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1466)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44673: ZDI-CAN-25006: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44674: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1467)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44674: ZDI-CAN-25007: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44675: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1468)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44675: ZDI-CAN-25008: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44676: HTTP: Delta Electronics DIAScreen DPA Stack-based Buffer Overflow Vulnerability (ZDI-24-1469)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44676: ZDI-CAN-25009: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

    44677: HTTP: Delta Electronics DIAScreen Stack-based Buffer Overflow Vulnerability (ZDI-24-1470)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44677: ZDI-CAN-25010: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 20, 2024
      - Last Modified Date: November 19, 2024

  Removed Filters: None