Search

Traffic File Update - May 2008

This Traffic IQ Professional update for May 2008 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for May 2008

48 Application Exploits

Apple iCal 'ATTACH' Parameter Denial Of Service Vulnerability S
Apple iCal 'COUNT' Parameter Integer Overflow Vulnerability S
Apple iCal 'TRIGGER' Parameter Denial of Service Vulnerability S
Borland Interbase Integer Overflow Vulnerability S
HP OpenView Network Node Manager 'ovalarmsrv' Denial of Service S
HP OpenView Network Node Manager 'ovalarmsrv' Null Pointer DoS S
HP OpenView Network Node Manager 'ovalarmsrv.exe' Buffer Overflow S
HP OpenView Network Node Manager 'ovalarmsrv.exe' Format String Vulnerability S
HP OpenView Network Node Manager 'OVAS.EXE' Buffer Overflow S
HP OpenView Network Node Manager 'ovspmd' Buffer Overflow S
HP OpenView Network Node Manager 'ovtopmd' Denial of Service S
HP OpenView Network Node Manager 'ovuispmd' Buffer Overflow S
HP OpenView Network Node Manager 'ovwdb' Buffer Overflow S
HP OpenView NNM v7.5.1 ovalarmsrv.exe Remote Buffer Overflow Exploit S
HP OpenView NNM v7.5.1 ovalarmsrv.exe Remote Buffer Overflow Exploit_1 S
HTTP Alcatel-Lucent OmniPCX Office Remote Command Execution S
HTTP Cisco BBSM 'AccesCodeStart.asp' Cross-Site Scripting S
HTTP Creative Software AutoUpdate OCX Module Buffer Overflow S
HTTP DivX Player Subtitle Parsing Buffer Overflow S
HTTP HP OpenView Network Node Manager Directory Traversal Vulnerability S
HTTP IDAutomation Barcode Multiple Arbitrary File Overwrite Vulnerabilities S
HTTP Mozilla Firefox JSframe Heap Corruption Denial of Service S
HTTP Novell eDirectory Multiple Connection Headers Processing DoS S
HTTP Novell GroupWise 'mailto' URI Handler Buffer Overflow S
HTTP Oracle Application Server Portal Authentication Bypass Vulnerability S
HTTP Ourgame GLIEDown2.dll Control Remote Code Execution Vulnerability S
HTTP SAP Internet Transaction Server wgate.dll Cross-Site Scripting POC_1 S
HTTP SAP Internet Transaction Server wgate.dll Cross-Site Scripting S
HTTP SAP Web Application Server 'webgui' Cross Site Scripting Vulnerability S
HTTP SonicWALL Email Security Host Header Cross-Site Scripting S
HTTP WebMod 'Cookie' Buffer Overflow Vulnerability S
HTTP WebMod 'parser.cpp' Memory Corruption Vulnerability S
HTTP WebMod Directory Traversal Vulnerability S
HTTP WebMod Scripts Source Code Disclosure Vulnerability S
HTTP Yahoo Assistant 'yNotifier.dll' Memory Corruption Vulnerability S
HTTP Zyxel ZYWall 100 'Referer' Header Cross Site Scripting S
Microsoft Internet Explorer Printing Cross-Zone Scripting Vulnerability S
Microsoft Works 7 WksPictureInterface Remote Code Execution S
Multiple Vendor rdesktop iso_recv_msg() Integer Underflow Vulnerability S
Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability S
Novell GroupWise 'mailto' URI Handler Buffer Overflow Vulnerability S
OpenOffice OLE Heap Based Buffer Overflow S
Python zlib (zlib-unflush-misallocation) Remote Buffer Overflow S
Python zlib (zlib-unflush-signedness) Remote Buffer Overflow S
SMTP AXIGEN Mail Server AXIMilter Filtering Format String Vulnerability S
TFTP Server SP Error Message Handling Buffer Overflow S
TFTP Server SP Error Message Handling Buffer Overflow_1 S
VideoLAN VLC SSA Parsing Double Sh311 Remote Code Execution S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.