Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Digital Vaccine #9099

    • Updated:
    • 8 May 2018
    • Product/Version:
    • TippingPoint Digital Vaccine
    • Platform:
Summary
Digital Vaccine #9099      May 8, 2018
Details
Public
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs.

New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com

SMS customers can update the Digital Vaccine through the SMS client. From the top line menu, you can open the "File > Download Digital Vaccine from TMC" menu item to detect and load the latest update.
 
System Requirements
The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above,  all NGFW and all TPS systems. The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance.
Please note that vTPS does not currently support pre-disclosed ZDI filters.
 
Microsoft Security Bulletins
This DV includes coverage for the Microsoft vulnerabilities released on or before May 8, 2018.
The following table maps TippingPoint filters to the Microsoft CVEs.
CVE #TippingPoint Filter #Status
CVE-2018-0765 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0824 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0854 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0905 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0943 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0945 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-094631487 
CVE-2018-095131488 
CVE-2018-095331489 
CVE-2018-095431490 
CVE-2018-095531563 
CVE-2018-0958 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0959 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-0961 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-1021 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-1022 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-1025 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-1039 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8112 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-811431491 
CVE-2018-8119 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-812031562 
CVE-2018-812231492 
CVE-2018-812331552 
CVE-2018-812431558 
CVE-2018-8126 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8127 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8128 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8129 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8130 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8132 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-813331494 
CVE-2018-8134 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8136 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-813731617 
CVE-2018-8139 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8145 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-814731554 
CVE-2018-814831555 
CVE-2018-8149 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8150 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8151 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8152 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8153 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8154 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8155 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8156 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-815731556 
CVE-2018-815831557 
CVE-2018-8159 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8160 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-816131573 
CVE-2018-816231559 
CVE-2018-8163 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-816431561 
CVE-2018-816531571 
CVE-2018-816631572 
CVE-2018-816731560 
CVE-2018-8168 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8170 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8173 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-817431493 
CVE-2018-8177 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-8178 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2018-817931498 
CVE-2018-8897 Vendor Deemed Reproducibility or Exploitation Unlikely
Filters marked with * shipped prior to this DV, providing zero-day protection.
 
The Digital Vaccine can be manually downloaded from the following URLs:
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_9099.pkg
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_9099.pkg

Update Details

Table of Contents
--------------------------

Filters
 New Filters
 Modified Filters (logic changes)
 Modified Filters (metadata changes only)
 Removed Filters

Filters
----------------
 New Filters:
    3258: HTTP: Possible ASP.Net Authentication Bypass
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a hex encoding of the "\" character in the URI passed to a web server hosting ASP.NET pages.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2004-0847

    31200: HTTP: Apache httpd mod_cache_socache Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Apache httpd.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 103522
        - Common Vulnerabilities and Exposures: CVE-2018-1303

    31381: HTTP: Panda Antivirus ZOO Archive Decompression Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Panda Antivirus.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 15616
        - Common Vulnerabilities and Exposures: CVE-2005-3922 CVSS 7.5

    31386: SSL: Apache 2 mod_ssl Connection Abort Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Apache.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11094
        - Common Vulnerabilities and Exposures: CVE-2004-0748 CVSS 5.0

    31444: HTTP: GD Graphics Library PNG Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in GD Graphics Library.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11523, 11663
        - Common Vulnerabilities and Exposures: CVE-2004-0941 CVSS 10.0

    31445: HTTP: PHP phar 404 Page Reflected Cross-Site Scripting Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in PHP.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 102742
        - Common Vulnerabilities and Exposures: CVE-2018-5712

    31446: HTTP: Microsoft Windows Compressed Folders Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft Windows.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11382
        - Common Vulnerabilities and Exposures: CVE-2004-0575 CVSS 10.0
        - Microsoft Security Bulletin: MS04-034

    31448: HTTP: Microsoft Internet Explorer Status Bar URL Spoofing Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a URL status bar spoofing vulnerability in Microsoft Internet Explorer.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11561

    31455: Kerberos: Microsoft Windows 2000 Domain Authentication Bypass Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit an authentication bypass vulnerability in Microsoft Windows.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2004-0540 CVSS 10.0

    31456: HTTP: Microsoft Internet Explorer HTML Help Security Zone Bypass Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a security zone bypass vulnerability in Microsoft Internet Explorer.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11467
        - Common Vulnerabilities and Exposures: CVE-2004-1043 CVSS 5.0
        - Microsoft Security Bulletin: MS05-001

    31457: HTTP: Mozilla onunload SSL Certificate Spoofing Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a certificate spoofing vulnerability in Mozilla Firefox.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 15495
        - Common Vulnerabilities and Exposures: CVE-2004-0763 CVSS 5.0

    31458: HTTP: Mozilla Browser Non-ASCII Hostname Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Mozilla Browser.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11169
        - Common Vulnerabilities and Exposures: CVE-2004-0902 CVSS 10.0

    31459: HTTP: Adobe Macromedia JRun Server File Disclosure Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a file disclosure vulnerability in Adobe Macromedia JRun.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11245
        - Common Vulnerabilities and Exposures: CVE-2004-0928 CVSS 5.0

    31460: HTTP: Apache apr-util IPv6 URI Parsing Input Validation Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit an input validation vulnerability in Apache 2.x HTTP Server.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11187
        - Common Vulnerabilities and Exposures: CVE-2004-0786 CVSS 5.0

    31462: UDP: Symantec Enterprise Firewall DNSD Proxy Cache Poisoning Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a DNS cache poisoning vulnerability in Symantec Enterprise Firewall.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10557
        - Common Vulnerabilities and Exposures: CVE-2004-1754 CVSS 5.0

    31463: HTTP: Microsoft Internet Explorer Frame Injection Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a frame injection vulnerability in Microsoft Internet Explorer.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2004-0719 CVSS 7.5

    31466: UDP: OpenBSD ISAKMP Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in OpenBSD.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10028
        - Common Vulnerabilities and Exposures: CVE-2004-0222 CVSS 5.0

    31467: HTTP: Mozilla shell Protocol Input Validation Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an input validation vulnerability in Mozilla Firefox.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10681
        - Common Vulnerabilities and Exposures: CVE-2004-0648 CVSS 10.0

    31468: HTTP: Mozilla BMP Parsing Integer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an integer overflow vulnerability in Mozilla Suite.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11171
        - Common Vulnerabilities and Exposures: CVE-2004-0904 CVSS 10.0

    31469: HTTP: mod_ssl Hook Functions Format String Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in the mod_ssl module for Apache.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10736
        - Common Vulnerabilities and Exposures: CVE-2004-0700 CVSS 7.5

    31470: SNMP: Squid ASN.1 Header Parsing Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Squid web proxy.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11385
        - Common Vulnerabilities and Exposures: CVE-2004-0918 CVSS 5.0

    31471: HTTP: Mozilla Firefox Download Directory File Deletion Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a file deletion vulnerability in Mozilla Firefox.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11311
        - Common Vulnerabilities and Exposures: CVE-2004-2225 CVSS 5.0

    31472: UDP: FreeRADIUS Access/Accounting Request Denial-of-Service Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in RADIUS FreeRADIUS.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2004-0938

    31473: SMB: Samba Mangling Method Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Samba.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2004-0686 CVSS 5.0

    31474: HTTP: Microsoft Internet Explorer Malformed GIF Double Free Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Microsoft Internet Explorer.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 8530
        - Common Vulnerabilities and Exposures: CVE-2003-1048 CVSS 10.0
        - Microsoft Security Bulletin: MS04-025

    31477: DNS: Symantec DNS Response Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Symantec Client Security Products.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10336
        - Common Vulnerabilities and Exposures: CVE-2004-0445 CVSS 2.6

    31478: RSYNC: Rsync Arbitrary File Overwrite Directory Traversal Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Rsync.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10247
        - Common Vulnerabilities and Exposures: CVE-2004-0426 CVSS 5.0

    31479: SMB: Samba Unicode Filename Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Samba.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 11678
        - Common Vulnerabilities and Exposures: CVE-2004-0882 CVSS 10.0

    31480: HTTP: IIS ISAPI Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft IIS.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 4485
        - Common Vulnerabilities and Exposures: CVE-2002-0079 CVSS 7.5
        - Microsoft Security Bulletin: MS02-018

    31481: TCP: Oracle Database Server MD2 package SDO_CODE_SIZE procedure Buffer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Oracle Database Server.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 13145
        - Common Vulnerabilities and Exposures: CVE-2004-1774 CVSS 7.2

    31482: HTTP: Microsoft Windows SNMP Service Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Microsoft Windows SNMP Service.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 103652
        - Common Vulnerabilities and Exposures: CVE-2018-0967

    31483: HTTP: Joomla CMS User Notes List View SQL Injection Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a SQL injection vulnerability in Joomla CMS.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 103402
        - Common Vulnerabilities and Exposures: CVE-2018-8045

    31484: RPC: Tripwire Filename Format String Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a format string vulnerability in Tripwire carried out over RPC.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2004-0536

    31486: HTTP: Oracle Single Sign-On Redirection 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects an Oracle Single Sign-On (SSO) attempt including a redirect URL.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10009
        - Common Vulnerabilities and Exposures: CVE-2004-1877

    31487: HTTP: Microsoft Edge Scripting Engine AppendChild Memory Corruption Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge scripting engine.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-0946

    31488: HTTP: Microsoft Edge Chakra Scripting Engine Proxy Memory Corruption Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge scripting engine.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-0951

    31489: HTTP: Microsoft Edge Scripting Engine Magic Value Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge scripting engine.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-0953

    31490: HTTP: Microsoft Edge Scripting Engine DefineGetter Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge scripting engine.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-0954

    31491: HTTP: Microsoft Internet Explorer Prototype Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8114

    31492: HTTP: Microsoft Internet Explorer __proto__ Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8122

    31493: HTTP: Microsoft Windows VBScript Engine Class_Terminate Use-after-Free Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Windows VBScript Engine.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8174

    31494: HTTP: Microsoft Edge Scripting Engine Window Event Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge scripting engine.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8133

    31495: ZDI-CAN-5550 Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Trend Micro Encryption for Email Gateway.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)

    31496: ZDI-CAN-5551 Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, NGFW, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Trend Micro Encryption for Email Gateway.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)

    31497: TCP: Tripwire Filename Format String Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a format string vulnerability in Tripwire carried out over TCP.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 10454
        - Common Vulnerabilities and Exposures: CVE-2004-0536 CVSS 7.2

    31498: HTTP: Microsoft Edge RTCIceTransport Use-After-Free Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Edge.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8179

    31552: HTTP: Microsoft Edge CSS Use-After-Free Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Edge.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8123

    31554: HTTP: Microsoft Excel Use-After-Free Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Excel.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8147

    31555: HTTP: Microsoft Excel Use-After-Free Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Excel.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8148

    31556: HTTP: Microsoft Office Buffer Overflow Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft Office.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8157

    31557: HTTP: Microsoft Office Buffer Overflow Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft Office.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8158

    31558: HTTP: Microsoft Win32k Use-After-Free Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Win32k.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8124

    31559: HTTP: Microsoft Excel Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Excel.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8162

    31560: HTTP: Microsoft Windows CLFS Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Windows.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8167

    31561: HTTP: Microsoft Windows Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Windows.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8164

    31562: HTTP: Microsoft Win32k Elevation of Privilege Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an elevation of privilege vulnerability in Microsoft Win32k.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8120

    31563: HTTP: Microsoft Internet Explorer RegExp Replace Use-after-Free Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Internet Explorer.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-0955

    31570: TCP: PDF Reader Possible NTLM Credentials Leakage
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects PDF files that use objects that allow the embedding of remote documents and files.
      - Deployment: Not enabled by default in any deployment.

    31571: HTTP: Microsoft DirectX Graphics Kernel Integer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an integer overflow vulnerability in Microsoft DirectX.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8165

    31572: HTTP: Microsoft Windows Memory Corruption Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Windows.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8166

    31573: HTTP: Microsoft Outlook Use-After-Free Vulnerability 
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Outlook.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8161

    31617: HTTP: Microsoft Edge Array Processing Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Microsoft Edge.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2018-8137

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 2926: HTTP: AOL Instant Messenger Away Message Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "2926: HTTP: AOL IM Away Message Buffer Overflow".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    3047: HTTP: Suspicious CSS Tag Grouping
      - IPS Version: 1.4.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    3138: HTTP: IE Frame/Embed Name Parameter Anomaly
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 3169: HTTP: Winamp IN_CCDA.dll Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "3169: HTTP: Winamp IN_CCDA.dll Buffer Overflow".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    3442: IMAP: DELETE Command Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "3442: IMAP: DELETE Command Overflow Exploit".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 4838: HTTP: Microsoft Visual Studio WMI Object Broker ActiveX Control Security Bypass (ZDI-06-047)
      - IPS Version: 1.4.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "4838: HTTP: Malicious ActiveX Instantiation".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 29809: TFTP: NetGain Systems Enterprise Manager TFtpServer Filename Directory Traversal (ZDI-17-962)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    30439: HTTP: OMRON CX-One CX-FLnet Node Name Buffer Overflow Vulnerability (ZDI-18-290)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "30439: ZDI-CAN-5462: Zero Day Initiative Vulnerability (OMRON CX-One)".
      - Category changed from "Exploits" to "Vulnerabilities".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    30817: HTTP: Mozilla Firefox libvorbis OGG Decoding Out-of-Bounds Write Vulnerability (Pwn2Own, ZDI-18-263)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "30817: PWN2OWN ZDI-CAN-5822: Zero Day Initiative Vulnerability (Mozilla Firefox)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    31067: HTTP: Microsoft Windows TrueType Font Integer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    31079: HTTP: Microsoft JET Database Memory Corruption Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    31380: HTTP: Microsoft Internet Explorer execCommand File Type Spoofing Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    31383: TCP: Oracle WebLogic Server ProxyClass Registry And Activator Interfaces Usage
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    2860: DHCP: ISC DHCP Server Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "2860: DHCP: ISC DHCP Server Buffer Overflow".
      - Description updated.
      - Vulnerability references updated.

    19850: HTTP: Directory Traversal in MIME Form Header
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Vulnerability references updated.

    * 31377: HTTP: Digium Asterisk WebSocket Frame Empty Payload Denial-of-Service Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Deployments updated and are now:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)

  Removed Filters: None
Top of the Page
Premium
Internal
Rating:
Category:
Configure; Troubleshoot; Deploy
Solution Id:
TP000106111
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.