Summary
Digital Vaccine #9208 December 25, 2018
Details
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs. New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com. SMS customers can update the Digital Vaccine through the SMS client. From the top line menu, you can open the "File > Download Digital Vaccine from TMC" menu item to detect and load the latest update. |
System Requirements |
The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above, all NGFW and all TPS systems. The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance. Please note that vTPS does not currently support pre-disclosed ZDI filters. |
The Digital Vaccine can be manually downloaded from the following URLs: https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_9208.pkg https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_9208.pkg |
Update Details
Table of Contents
--------------------------
Filters
New Filters
Modified Filters (logic changes)
Modified Filters (metadata changes only)
Removed Filters
Filters
----------------
New Filters:
33398: HTTP: Microsoft Windows Codecs Library Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Microsoft Windows. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2018-8506 33461: TFTP: Microsoft Windows Deployment Services Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Windows Deployment Services. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 105774 - Common Vulnerabilities and Exposures: CVE-2018-8476 CVSS 10.0 33616: HTTP: Mozilla Firefox Object Tag Memory Corruption Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a memory corruption vulnerability in Mozilla Firefox. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 24946 - Common Vulnerabilities and Exposures: CVE-2007-3734 33699: HTTP: Apple Safari 4.0.4 XML Parser Infinite Recursion Denial-of-Service Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in Apple Safari. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) 33816: HTTP: Wecon PIStudio basedll TextContent Buffer Overflow Vulnerability (ZDI-18-1109) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Wecon PIStudio. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Zero Day Initiative: ZDI-18-1109 33840: ZDI-CAN-6855: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33841: ZDI-CAN-6858: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33844: HTTP: GitLab Wiki API Attachments Command Injection Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in GitLab Wiki API. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2018-18649 33848: HTTP: WordPress XMLRPC system.multicall Usage - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects usage of the system.multicall feature by XMLRPC in WordPress. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33849: ZDI-CAN-6862: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33850: ZDI-CAN-6864: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33851: ZDI-CAN-6869: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33852: ZDI-CAN-6875: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33853: HTTP: Oracle WebLogic Server DeploymentServiceServlet Insecure Deserialization Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Oracle WebLogic Server. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 105613 - Common Vulnerabilities and Exposures: CVE-2018-3252 33854: HTTP: Bancasella XSS Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a XSS vulnerability in Bancasella's website interface. - Deployment: Not enabled by default in any deployment. 33856: ZDI-CAN-6876: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33857: ZDI-CAN-6880: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Hewlett Packard Enterprise Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33858: ZDI-CAN-6908: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33859: ZDI-CAN-6910: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33860: ZDI-CAN-6881: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Hewlett Packard Enterprise Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33861: ZDI-CAN-6884: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Hewlett Packard Enterprise Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33862: ZDI-CAN-6886: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Hewlett Packard Enterprise Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33863: ZDI-CAN-6889: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Hewlett Packard Enterprise Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33864: ZDI-CAN-6914: Zero Day Initiative Vulnerability (HPE Intelligent Management Center) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting HPE Intelligent Management Center. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33865: RPC: Advantech WebAccess Client bwswfcfg Buffer Overflow Vulnerability (ZDI-18-1330) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Advantech WebAccess. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Bugtraq ID: 105736 - Common Vulnerabilities and Exposures: CVE-2018-17910 - Zero Day Initiative: ZDI-18-1330 33866: ZDI-CAN-7220: Zero Day Initiative Vulnerability (Adobe Reader) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Adobe Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33867: ZDI-CAN-7313: Zero Day Initiative Vulnerability (Microsoft JET Database) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft JET Database. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33868: HTTP: WordPress Plainview Activity Monitor Plugin Command Injection Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in WordPress Plainview Activity Monitor. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2018-15877 33869: ZDI-CAN-7319: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Adobe Acrobat Pro DC. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33870: HTTP: Apple Safari FrameLoader Use-After-Free Vulnerability (ZDI-18-1335) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Apple Safari. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2018-4375 - Zero Day Initiative: ZDI-18-1335 33871: ZDI-CAN-7335: Zero Day Initiative Vulnerability (Microsoft JET Database) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft JET Database. - Deployments: - Deployment: Security-Optimized (Block / Notify) 33873: ZDI-CAN-7336: Zero Day Initiative Vulnerability (Microsoft JET Database) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: Not available. - Requires: N/NX-Platform, NGFW, or TPS devices - Category: Exploits - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Microsoft JET Database. - Deployments: - Deployment: Security-Optimized (Block / Notify) Modified Filters (logic changes): * = Enabled in Default deployments 31620: HTTP: Microsoft Visual Studio Code URL Command Injection Vulnerability (ZDI-18-1290) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "31620: ZDI-CAN-5567: Zero Day Initiative Vulnerability (Microsoft Visual Studio)". - Description updated. - Detection logic updated. - Vulnerability references updated. 32785: HTTP: LAquis SCADA LQS File Parsing Out-of-Bounds Write Vulnerability (ZDI-18-1262) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "32785: ZDI-CAN-6630: Zero Day Initiative Vulnerability (LAquis SCADA)". - Description updated. - Detection logic updated. - Vulnerability references updated. 32786: HTTP: LAquis SCADA LQS File Parsing Patamar Out-of-Bounds Write Vulnerability (ZDI-18-1261) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "32786: ZDI-CAN-6602: Zero Day Initiative Vulnerability (LAquis SCADA)". - Description updated. - Detection logic updated. - Vulnerability references updated. 32787: HTTP: OMRON CX-Supervisor SCS File Parsing Use-After-Free Vulnerability (ZDI-18-1281) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "32787: ZDI-CAN-6582: Zero Day Initiative Vulnerability (LAquis SCADA)". - Description updated. - Detection logic updated. - Vulnerability references updated. 33350: HTTP: OMRON CX-Supervisor SCS File Parsing Use-After-Free Vulnerability (ZDI-18-1352) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33350: ZDI-CAN-6687: Zero Day Initiative Vulnerability (OMRON CX-Supervisor)". - Description updated. - Detection logic updated. - Vulnerability references updated. 33355: HTTP: OMRON CX-Supervisor SCS File Parsing Use-After-Free Vulnerability (ZDI-18-1353) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33355: ZDI-CAN-6691: Zero Day Initiative Vulnerability (OMRON CX-Supervisor)". - Description updated. - Detection logic updated. - Vulnerability references updated. 33368: HTTP: OMRON CX-Supervisor SCS File Parsing Use-After-Free Vulnerability (ZDI-18-1351) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33368: ZDI-CAN-6663: Zero Day Initiative Vulnerability (OMRON CX-Supervisor)". - Description updated. - Detection logic updated. - Vulnerability references updated. 33375: HTTP: Microsoft Word doc File Use-After-Free Vulnerability (ZDI-18-1356) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33375: ZDI-CAN-6706: Zero Day Initiative Vulnerability (Microsoft Office Word)". - Description updated. - Detection logic updated. - Vulnerability references updated. 33377: HTTP: OMRON CX-Supervisor SCS File Parsing Use-After-Free Vulnerability (ZDI-18-1354) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33377: ZDI-CAN-6711: Zero Day Initiative Vulnerability (OMRON CX-Supervisor)". - Description updated. - Detection logic updated. - Vulnerability references updated. * 33416: TFTP: Microsoft Windows Deployment Services Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Detection logic updated. - Vulnerability references updated. * 33687: HTTP: Microsoft Edge Chakra defineSetter Type Confusion Vulnerability (ZDI-18-1407) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33687: HTTP: Microsoft Edge Chakra defineSetter Type Confusion Vulnerability". - Category changed from "Exploits" to "Vulnerabilities". - Description updated. - Detection logic updated. - Vulnerability references updated. Modified Filters (metadata changes only): * = Enabled in Default deployments * 4932: Exploit: Shellcode Payload - IPS Version: 1.0.0 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Vulnerability references updated. 5262: SMB: Novell Netware Client nwspool.dll Fragmented Request (ZDI-07-045, ZDI-08-005) - IPS Version: 3.0.0 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Vulnerability references updated. * 33407: HTTP: Microsoft Internet Explorer Scripting.Dictionary Use-After-Free Vulnerability (ZDI-18-1349) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "33407: HTTP: Microsoft Internet Explorer Scripting.Dictionary Use-After-Free Vulnerability". - Description updated. - Vulnerability references updated. * 33595: HTTP: Foxit Reader Annotation Use-After-Free Vulnerability (ZDI-18-1151) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Description updated. - Vulnerability references updated. Removed Filters: None
Top of the Page