Views:
Table of Contents
--------------------------
  New Filters - 28
  Modified Filters (logic changes) - 15
  Modified Filters (metadata changes only) - 4
  Removed Filters - 0
  New Filters:

    46023: HTTP: Progress Kemp LoadMaster access Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Progress Kemp LoadMaster.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-56132 CVSS 7.9
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: July 08, 2025

    46071: HTTP: LibreNMS Poller Group Name Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in LibreNMS.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-47931 CVSS 6.1
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: July 08, 2025

    46118: ZDI-CAN-26687: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46119: ZDI-CAN-27128: Zero Day Initiative Vulnerability (Delta Electronics ASDA-Soft)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics ADSA-Soft.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46121: HTTP: Citrix NetScaler ADC and NetScaler Gateway Memory Leak Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory leak vulnerability in Citrix NetScaler ADC and NetScaler Gateway.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-6543
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: UNIX/Linux Server Application or Service
      - Release Date: July 08, 2025

    46122: ZDI-CAN-27086: Zero Day Initiative Vulnerability (Delta Electronics ASDA-Soft)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics ADSA-Soft.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46123: ZDI-CAN-27093: Zero Day Initiative Vulnerability (Delta Electronics DIAView)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAView.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46124: ZDI-CAN-26672: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46125: ZDI-CAN-26677: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46126: ZDI-CAN-26683: Zero Day Initiative Vulnerability (Delta Electronics DIAScreen)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Delta Electronics DIAScreen.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46136: ZDI-CAN-27326: Zero Day Initiative Vulnerability (Ivanti Avalanche)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Ivanti Avalanche.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
        - Deployment: Evaluation (Permit / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46137: ZDI-CAN-27250: Zero Day Initiative Vulnerability (NVIDIA Triton)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting NVIDIA Triton.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
        - Deployment: Evaluation (Permit / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46138: ZDI-CAN-27310: Zero Day Initiative Vulnerability (Arista NG Firewall)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Arista NG Firewall.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
        - Deployment: Evaluation (Permit / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46139: ZDI-CAN-27006: Zero Day Initiative Vulnerability (Arista NG Firewall)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Arista NG Firewall.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
        - Deployment: Evaluation (Permit / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46140: ZDI-CAN-27007: Zero Day Initiative Vulnerability (Arista NG Firewall)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Arista NG Firewall.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
        - Deployment: Evaluation (Permit / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46141: ZDI-CAN-27081: Zero Day Initiative Vulnerability (NI LabVIEW VI)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting NI LabVIEW VI.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46142: ZDI-CAN-27283: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46143: ZDI-CAN-27332: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46144: HTTP: AMI MegaRAC SPx BMC Authentication Bypass Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an authentication bypass vulnerability in AMI MegaRAC SPx BMC versions.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-54085
      - Classification: Vulnerability - Access Validation
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: July 08, 2025

    46146: HTTP: OpenEMR Patient Demographics Additional Addresses Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-side scripting vulnerability in OpenEMR.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-43860 CVSS 8.9
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: July 08, 2025

    46147: HTTP: Microsoft Windows WMPhoto setUniformTiling Buffer Overflow Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft Windows WMPhoto.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-29962
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: HTTP
      - Platform: Windows Client Application
      - Release Date: July 08, 2025

    46148: HTTP: OneLogin Administrative API Requests
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects API requests to sensitive OneLogin resources.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-34062, CVE-2025-34063, CVE-2025-34064
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46151: ZDI-CAN-26570: Zero Day Initiative Vulnerability (Siemens SINEC NMS)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens SINEC NMS.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46152: ZDI-CAN-26708: Zero Day Initiative Vulnerability (WatchYourLAN)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting WatchYourLAN.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46154: ZDI-CAN-27224: Zero Day Initiative Vulnerability (Autodesk AutoCAD)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Autodesk AutoCAD.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: July 08, 2025

    46158: TCP: Suspicious Microsoft SQL Server COLLATE Operation Usage
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects a suspicious Microsoft SQL server query containing COLLATE operation.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-49718
      - Classification: Security Policy - Other
      - Protocol: TCP (Generic)
      - Platform: Windows Server Application or Service
      - Release Date: July 08, 2025

    46160: HTTP: Microsoft SharePoint DataSetSurrogateSelector Insecure Deserialization Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Microsoft SharePoint.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-49704
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Windows Server Application or Service
      - Release Date: July 08, 2025

    46161: TCP: Microsoft NEGOEX Buffer Overflow Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft NEGOEX.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-47981
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: TCP (Generic)
      - Platform: Windows Server Application or Service
      - Release Date: July 08, 2025

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    16232: HTTP: HP Sprinter TTF16.ocx DefaultFontName ActiveX Instantiation (ZDI-14-359)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: June 03, 2014
      - Last Modified Date: July 08, 2025

    16278: HTTP: libYAML Scanner Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Release Date: June 24, 2014
      - Last Modified Date: July 08, 2025

    39968: HTTP: Ivanti Avalanche Filestore Management Arbitrary File Upload Vulnerability (ZDI-21-1299)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: July 20, 2021
      - Last Modified Date: July 08, 2025

    * 43225: HTTP: Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability 
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Release Date: September 12, 2023
      - Last Modified Date: July 08, 2025

    * 44394: HTTP: Ivanti Endpoint Manager Report_Run2 SQL Injection Vulnerability (ZDI-24-1496)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Release Date: June 18, 2024
      - Last Modified Date: July 08, 2025

    45506: HTTP: Fuji Electric Smart Editor V8 File Parsing Buffer Overflow Vulnerability (ZDI-25-399)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45506: ZDI-CAN-26026: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 04, 2025
      - Last Modified Date: July 08, 2025

    45507: HTTP: Fuji Electric Smart Editor V10 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-401)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45507: ZDI-CAN-26028: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 04, 2025
      - Last Modified Date: July 08, 2025

    45508: HTTP: Fuji Electric Smart Editor TL5 File Parsing Out-Of-Bounds Read Vulnerability (ZDI-25-400)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45508: ZDI-CAN-26032: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 04, 2025
      - Last Modified Date: July 08, 2025

    45530: HTTP: Fuji Electric Smart Editor TL5 File Parsing Buffer Overflow Vulnerability (ZDI-25-402)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45530: ZDI-CAN-25942: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 11, 2025
      - Last Modified Date: July 08, 2025

    45531: HTTP: Fuji Electric Smart Editor V8 File Parsing Buffer Overflow Vulnerability (ZDI-25-403)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45531: ZDI-CAN-26020: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 11, 2025
      - Last Modified Date: July 08, 2025

    45532: HTTP: Fuji Electric Smart Editor X1 File Parsing Buffer Overflow Vulnerability (ZDI-25-404)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45532: ZDI-CAN-26022: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 11, 2025
      - Last Modified Date: July 08, 2025

    45533: HTTP: Fuji Electric Smart Editor X1 File Parsing Buffer Overflow Vulnerability (ZDI-25-405)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45533: ZDI-CAN-26024: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 11, 2025
      - Last Modified Date: July 08, 2025

    * 45693: HTTP: Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Write Vulnerability (ZDI-25-335)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45693: ZDI-CAN-26342: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 08, 2025
      - Last Modified Date: July 08, 2025

    45919: ZDI-CAN-27098: Zero Day Initiative Vulnerability (Autodesk Revit)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Detection logic updated.
      - Release Date: May 27, 2025
      - Last Modified Date: July 08, 2025

    46065: HTTP: Suspicious Visual Studio Code Java Extension Pack Detected
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Release Date: June 24, 2025
      - Last Modified Date: July 08, 2025

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    * 44499: HTTP: Adobe Commerce and Magento XML External Entity Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: July 16, 2024
      - Last Modified Date: July 08, 2025

    45503: HTTP: Delta Electronics CNCSoft-G2 DPAX File Parsing Memory Corruption Vulnerability (ZDI-25-411)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45503: ZDI-CAN-26167: Zero Day Initiative Vulnerability (Delta Electronics CNCSoft-G2)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 04, 2025
      - Last Modified Date: July 08, 2025

    45836: HTTP: Fuji Electric Smart Editor TL5 File Parsing Buffer Overflow Vulnerability (ZDI-25-413)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45836: ZDI-CAN-26018: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: May 13, 2025
      - Last Modified Date: July 08, 2025

    45951: HTTP: Fuji Electric Smart Editor X1 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-412)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45951: ZDI-CAN-26031: Zero Day Initiative Vulnerability (Fuji Electric Smart Editor)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: June 10, 2025
      - Last Modified Date: July 08, 2025

  Removed Filters: None