Summary
Digital Vaccine #9066 February 20, 2018
Details
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs. New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com SMS customers can update the Digital Vaccine through the SMS client. From the top line menu, you can open the "File > Download Digital Vaccine from TMC" menu item to detect and load the latest update. |
System Requirements |
The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above, all NGFW and all TPS systems. The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance. Please note that vTPS does not currently support pre-disclosed ZDI filters. |
The Digital Vaccine can be manually downloaded from the following URLs: https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_9066.pkg https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_9066.pkg |
Update Details
Table of Contents
--------------------------
Filters
New Filters
Modified Filters (logic changes)
Modified Filters (metadata changes only)
Removed Filters
Filters
----------------
New Filters:
30313: HTTP: Quest NetVault Backup Export File Overwrite Vulnerability (ZDI-18-005) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a file overwrite vulnerability in Quest NetVault Backup. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2018-1162 - Zero Day Initiative: ZDI-18-005 30315: HTTP: Squid Proxy ESI Response Processing Denial-of-Service Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Squid. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30316: OMAPI: ISC DHCP Server OMAPI Denial-of-Service Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in ISC DHCP. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 102726 - Common Vulnerabilities and Exposures: CVE-2017-3144 30347: HTTP: dotCMS ajax_file_upload Directory Traversal Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects an attempt to exploit a directory traversal vulnerability in dotCMS. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30352: HTTP: Quest NetVault Backup Export JSON File Overwrite Vulnerability (ZDI-18-005) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a file overwrite vulnerability in Quest NetVault Backup. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2018-1162 - Zero Day Initiative: ZDI-18-005 30364: HTTP: REDDOXX Appliance ExecuteDiag Command Injection Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in REDDOXX Appliance. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) 30384: HTTP: Oracle WebLogic Diagnosis Assistant rda_tfa_hrs Command Injection Vulnerability (ZDI-18-116) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in Oracle WebLogic. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Bugtraq ID: 102644 - Common Vulnerabilities and Exposures: CVE-2018-2616 CVSS 6.5 - Zero Day Initiative: ZDI-18-116 30390: ZDI-CAN-5386: Zero Day Initiative Vulnerability (Ecava IntegraXor) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Ecava IntegraXor. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30396: TCP: Commvault Communication Service Command Injection Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in Commvault Communication Service. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2017-18044 30397: HTTP: Cisco WebEx Browser Extension Code Execution Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a code execution vulnerability in the Cisco WebEx Browser Plugin. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 99614 - Common Vulnerabilities and Exposures: CVE-2017-6753 CVSS 9.3 30399: ZDI-CAN-5405: Zero Day Initiative Vulnerability (OMRON CX-One) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting OMRON CX-One. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30400: ZDI-CAN-5406: Zero Day Initiative Vulnerability (OMRON CX-One) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting OMRON CX-One. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30401: ZDI-CAN-5432: Zero Day Initiative Vulnerability (Foxit Reader) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Foxit Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30402: ZDI-CAN-5433,5434: Zero Day Initiative Vulnerability (Foxit Reader) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Foxit Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30403: ZDI-CAN-5435: Zero Day Initiative Vulnerability (Foxit Reader) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Foxit Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30404: HTTP: Microsoft Edge Chakra AsmJSByteCodeGenerator::EmitCall Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit a type confusion vulnerability in Microsoft Edge. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 102389 - Common Vulnerabilities and Exposures: CVE-2018-0780 30408: ZDI-CAN-5439: Zero Day Initiative Vulnerability (OMRON CX-One) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting OMRON CX-One. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30409: ZDI-CAN-5440: Zero Day Initiative Vulnerability (OMRON CX-One) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting OMRON CX-One. - Deployments: - Deployment: Security-Optimized (Block / Notify) 30412: HTTP: Microsoft Edge Scripting Engine asm Memory Corruption Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Bugtraq ID: 100053 - Common Vulnerabilities and Exposures: CVE-2017-8646 CVSS 7.6 30413: HTTP: Microsoft Edge Scripting Engine concat Memory Corruption Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Bugtraq ID: 100043 - Common Vulnerabilities and Exposures: CVE-2017-8634 CVSS 7.6 30415: HTTP: Microsoft Scripting Engine preventExtensions Memory Corruption Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Browsers. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Bugtraq ID: 100055 - Common Vulnerabilities and Exposures: CVE-2017-8635 CVSS 7.6 30416: HTTP: Microsoft Windows Uniscribe CreateIndexTable Memory Corruption Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Windows. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 98885 - Common Vulnerabilities and Exposures: CVE-2017-0282 CVSS 1.9 30417: HTTP: Microsoft Windows Uniscribe memmove Memory Corruption Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Windows. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 98920 - Common Vulnerabilities and Exposures: CVE-2017-0283 CVSS 9.3 30431: HTTP: Microsoft Windows Graphics Information Disclosure Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an information disclosure vulnerability in Windows Graphics. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 98923 - Common Vulnerabilities and Exposures: CVE-2017-0288 CVSS 1.9 Modified Filters (logic changes): * = Enabled in Default deployments 13330: HTTP: Microsoft Internet Explorer execCommand Use-After-Free Vulnerability - IPS Version: 1.0.0 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. * 22289: HTTP: WECON LeviStudio HmiSet Type Buffer Overflow Vulnerability (ZDI-16-377) - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Detection logic updated. - Vulnerability references updated. 25458: HTTP: Flexense Multiple Products Buffer Overflow Vulnerability - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "25458: HTTP: Flexense DiskPulse Enterprise Server Buffer Overflow Vulnerability". - Description updated. - Detection logic updated. - Vulnerability references updated. 26266: HTTP: Flexense Multiple Products Buffer Overflow Vulnerability - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "26266: HTTP: Flexense VX Search Enterprise Buffer Overflow Vulnerability". - Description updated. - Detection logic updated. - Vulnerability references updated. 27061: HTTP: Microsoft Internet Explorer ActiveX parseError.errorCode Invocation - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. * 27706: HTTP: Microsoft Internet Explorer textarea Use-After-Free Vulnerability - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. * 28031: HTTP: Flexense Multiple Products Import Command Buffer Overflow Vulnerability - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "28031: HTTP: Flexense Multiple Product Import Command Buffer Overflow Vulnerability". - Detection logic updated. * 28614: HTTP: Microsoft Windows Explorer LNK File Code Execution Vulnerability - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. * 29516: SMB: Microsoft Windows Explorer LNK File Code Execution Vulnerability - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. 29657: RPC: Advantech WebAccess Malicious IOCTL Usage (ZDI-17-938-940,ZDI-18-009-025,18-029-054,18-058-063) - IPS Version: 3.2.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. * 29707: HTTP: Microsoft Internet Explorer JsErrorToString Buffer Overflow Vulnerability - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "29707: HTTP: Windows Scripting Engine Memory Corruption Vulnerability". - Category changed from "Exploits" to "Vulnerabilities". - Description updated. - Detection logic updated. - Vulnerability references updated. * 29766: HTTP: Microsoft Office OOXML Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. 29767: HTTP: Micro Focus NetIQ Access Manager OspUIBasicSSODownload Directory Traversal (ZDI-18-131) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "29767: ZDI-CAN-5087: Zero Day Initiative Vulnerability (Novell NetIQ Access Manager)". - Description updated. - Detection logic updated. - Vulnerability references updated. * 29811: HTTP: Adobe Flash Player BitmapData hitTest Out-Of-Bounds Access Vulnerability (ZDI-17-998) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "29811: ZDI-CAN-5139: Zero Day Initiative Vulnerability (Adobe Flash)". - Description updated. - Detection logic updated. - Vulnerability references updated. 30017: HTTP: Adobe Acrobat Reader Pro XPS Parsing Module Information Disclosure Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Detection logic updated. - Vulnerability references updated. 30187: HTTP: Microsoft Windows ITS Protocol Information Disclosure Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Detection logic updated. * 30343: HTTP: Adobe Flash SWF Primetime Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Detection logic updated. - Vulnerability references updated. Modified Filters (metadata changes only): * = Enabled in Default deployments 6854: HTTP: Mulitple Product ASX Playlist Buffer Overflow - IPS Version: 1.0.0 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "6854: HTTP: Acoustica MP3 CD Burner ASX Playlist Buffer Overflow". - Description updated. - Vulnerability references updated. 20815: HTTP: Microsoft Windows VBScript Filter Function Use-After-Free Vulnerability (ZDI-15-592) - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Vulnerability references updated. * 28006: HTTP: Trend Micro OfficeScan Proxy Command Injection Vulnerability (ZDI-17-521, ZDI-17-522) - IPS Version: 3.1.3 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. * 29794: HTTP: Microsoft Windows VBScript Join Function Integer Overflow Vulnerability (ZDI-17-916) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Vulnerability references updated. 29991: HTTP: Adobe Flash ATF Parsing Information Disclosure Vulnerability (ZDI-18-124) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "29991: ZDI-CAN-5310: Zero Day Initiative Vulnerability (Adobe Flash)". - Description updated. - Vulnerability references updated. * 30054: HTTP: Electric Sheep Fencing (ESF) pfSense system_groupmanager.php Code Injection Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Miscellaneous modification. 30230: HTTP: Microsoft Office with Embedded Equation Editor OLE Object Download Attempt - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Vulnerability references updated. 30334: HTTP: Microsoft Windows win32k Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. 30336: HTTP: Microsoft Windows win32kbase Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. * 30341: HTTP: Microsoft Windows LNK Memory Corruption Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. * 30345: HTTP: Microsoft Chakra Javascript __proto__ JIT Optimization Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. * 30349: HTTP: Microsoft Chakra JavaScript Array sort JIT Optimization Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. 30351: HTTP: Microsoft Chakra JavaScript this JIT Optimization Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. * 30365: HTTP: Microsoft Chakra JavaScript Array Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. * 30366: HTTP: Microsoft Windows clfs.sys BLF Privilege Escalation Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. 30368: HTTP: Microsoft Windows clfs.sys BLF Privilege Escalation Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. Removed Filters: 3143: HTTP: Web Browser Heap Buffer Overflow (General) - IPS Version: 1.0.0 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. 30010: HTTP: Adobe Flash AS2 Bitmap Information Disclosure Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. 30201: HTTP: Adobe Flash ETC2 Texture Data Information Disclosure Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after.Top of the Page