Search

Traffic File Update - February 2012

This Traffic IQ Professional update for February 2012 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for February 2012

56 Application Exploits

BS.Player 2.57 Buffer Overflow Vulnerability (debug_trap) S
BS.Player 2.57 Buffer Overflow Vulnerability (MessageBox) S
BS.Player 2.57 Buffer Overflow Vulnerability (win_exec) S
BS.Player 2.57 Buffer Overflow Vulnerability (win_shell_bind_tcp) S
BS.Player 2.57 Buffer Overflow Vulnerability (win_shell_reverse_ord_tcp) S
BS.Player 2.57 Buffer Overflow Vulnerability (win_shell_reverse_tcp) S
Citrix Provisioning Services 0x40020000 Vulnerability (gen_shell_bind_tcp) S
Citrix Provisioning Services 0x40020000 Vulnerability (gen_shell_reverse_tcp) S
Citrix Provisioning Services 0x40020000 Vulnerability (MessageBox) S
Citrix Provisioning Services 0x40020000 Vulnerability (win_adduser) S
Citrix Provisioning Services 0x40020000 Vulnerability (win_exec) S
HTTP Apache MyFaces 'ln' Parameter Information Disclosure Vulnerability S
HTTP Apache MyFaces 'ln' Parameter Information Disclosure Vulnerability_1 S
HTTP Apache MyFaces 'ln' Parameter Information Disclosure Vulnerability_2 S
HTTP Apache MyFaces 'ln' Parameter Information Disclosure Vulnerability_3 S
HTTP Cyberoam Central Console 'file' Parameter Local File Include Vulnerability S
HTTP D-Link ShareCenter Multiple Information Disclosure Vulnerabilities S
HTTP D-Link ShareCenter Multiple Information Disclosure Vulnerabilities_1 S
HTTP D-Link ShareCenter Remote Code Execution Vulnerability S
HTTP Edraw Diagram Component 'LicenseName()' Buffer Overflow Vulnerability S
HTTP Edraw Office Viewer Component Buffer Overflow Vulnerability S
HTTP Edraw PDF Viewer Component ActiveX Denial Of Service Vulnerability S
HTTP ManageEngine ADManager Plus Multiple Cross Site Scripting S
HTTP OpenEMR 'fax_dispatch.php' Command Injection Vulnerability S
HTTP OpenEMR Multiple Local File Include Vulnerabilities S
HTTP OpenEMR Multiple Local File Include Vulnerabilities_1 S
HTTP PDF-XChange pdfSaver InitFromRegistry Buffer Overflow Vulnerability S
HTTP PDF-XChange pdfSaver StoreInRegistry Buffer Overflow Vulnerability S
HTTP Zimbra 'view' Parameter Cross Site Scripting Vulnerability S
Jeskola Buzz Memory Corruption Vulnerability S
Jeskola Buzz Multiple Buffer Overflow Vulnerabilities S
Jeskola Buzz Multiple Buffer Overflow Vulnerabilities_1 S
Jeskola Buzz Multiple Buffer Overflow Vulnerabilities_2 S
Jeskola Buzz Multiple Buffer Overflow Vulnerabilities_3 S
jetVideo '.mp3' File Buffer Overflow Vulnerability S
NetSarang Xlpd Remote Denial of Service Vulnerability S
Novell GroupWise Messenger 'NM_A_PARM1' Tag Vulnerability S
Novell GroupWise Messenger Client '.nmx' File Vulnerability S
OfficeSIP Server Remote Denial of Service Vulnerability S
Psycle PATD Heap Overflow Vulnerability S
Psycle SNGI Array Overflow Vulnerability S
Psycle SNGI Heap Overflow Vulnerability S
RabidHamster R2 Extreme Directory Traversal Vulnerability S
RabidHamster R2 Extreme Stack Overflow Vulnerability S
RabidHamster R4 'miniscreenshot' Stack overflow Vulnerability S
RabidHamster R4 Directory Traversal Vulnerability S
RabidHamster R4 Heap Overflow Vulnerability S
RabidHamster R4 Stack Overflow Vulnerability S
TYPSoft FTP Server 'CWD' Command Remote Denial of Service S
TYPSoft FTP Server 'NLST' Command Remote Denial of Service S
TYPSoft FTP Server 'SIZE' Command Remote Denial of Service S
XnView 'FLI' Heap Overflow Vulnerability S
XnView 'ICO' Heap Overflow Vulnerability S
XnView 'jpeg & tif' Heap Overflow Vulnerability S
XnView 'PCX' Heap Overflow Vulnerability S
XnView width and height Integer Overflow Vulnerability S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.