Search

Traffic File Update - November 2012

This Traffic IQ Professional update for November 2012 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for November 2012

80 Application Exploits

Adobe Reader 11.0.0 '.pdf' File Stack Overflow Vulnerability S
Adobe Reader Memory Corruption Denial of Service Vulnerability S
Apple QuickTime Player '.mov' Division By Zero Vulnerability S
Foxit Reader PDF File Handling Division by Zero Vulnerability S
HCView Remote Arbitrary Code Execution Vulnerability S
HP Intelligent Management Center UAM sprintf Vulnerability (MessageBox) S
HP Intelligent Management Center UAM sprintf Vulnerability (win_adduser) S
HP Intelligent Management Center UAM sprintf Vulnerability (win_exec) S
HTTP Aladdin Knowledge System PrivAgent ActiveX Buffer Overflow Vulnerability (MessageBox) S
HTTP Aladdin Knowledge System PrivAgent ActiveX Buffer Overflow Vulnerability (win_exec) S
HTTP Aladdin Knowledge System PrivAgent ActiveX Buffer Overflow Vulnerability_1 S
HTTP Axigen Mail Server 'fileName' Parameter CVE-2012-4940 Traversal Vulnerability S
HTTP Axigen Mail Server 'fileName' Parameter CVE-2012-4940 Traversal Vulnerability_1 S
HTTP Axigen Mail Server 'fileName' Parameter CVE-2012-4940 Traversal Vulnerability_2 S
HTTP CorePlayer 'callback' Parameter Cross Site Scripting Vulnerability S
HTTP cPanel Pro 'add ftp account' Cross-Site Request Forgery Vulnerability S
HTTP cPanel Pro 'delete handler' Cross-Site Request Forgery Vulnerability S
HTTP cPanel Pro 'drop database' Cross-Site Request Forgery Vulnerability S
HTTP FL Studio Browser Extra Search Folder Path Handling Vulnerability S
HTTP Gramophone 'rs' Parameter Cross Site Scripting Vulnerability S
HTTP NetCat 'redirect_url' Cross-Site Scripting Vulnerability S
HTTP OrangeHRM 'viewCustomers' SQL Injection Vulnerability S
HTTP OrangeHRM 'viewPayGrades' SQL Injection Vulnerability S
HTTP OrangeHRM 'viewSystemUsers' SQL Injection Vulnerability S
HTTP SolarWinds Orion IP Address Manager (IPAM) 'search.aspx' XSS Vulnerability S
HTTP WordPress Easy Webinar Plugin 'wid' Parameter SQL Injection Vulnerability S
HTTP WordPress FLV Player Plugin 'id' Parameter SQL Injection Vulnerability S
HTTP WordPress Foxypress Plugin CSRF Vulnerability S
HTTP WordPress Foxypress Plugin HTML Injection Vulnerability S
HTTP WordPress Foxypress Plugin Information Disclosure Vulnerability S
HTTP WordPress Foxypress Plugin SQL Injection Vulnerability S
HTTP WordPress Kakao Theme 'ID' Parameter SQL Injection Vulnerability S
HTTP XiVO 'id' Parameter Arbitrary File Download Vulnerability S
IBM Lotus Notes Traveler Redirection CVE-2012-4824 Vulnerability S
IMAP Adobe Photoshop TIFF Image Parsing Buffer Overflow Vulnerability S
IMAP IBM Personal Communications WS File Vulnerability (debug_trap) S
IMAP IBM Personal Communications WS File Vulnerability (MessageBox) S
IMAP IBM Personal Communications WS File Vulnerability (win_exec) S
IMAP IBM Personal Communications WS File Vulnerability (win_shell_bind_tcp) S
IMAP IBM Personal Communications WS File Vulnerability (win_shell_bind_tcp_xpfw) S
IMAP IBM Personal Communications WS File Vulnerability (win_shell_reverse_ord_tcp) S
IMAP IBM Personal Communications WS File Vulnerability (win_shell_reverse_tcp) S
IMAP IrfanView Formats PlugIn 'jpeg_ls.dll' Heap Buffer Overflow Vulnerability S
IMAP Nokia PC Suite Video Manager '.mp4' File DoS Vulnerability S
IMAP XnView GIF Image Processing Heap Overflow Vulnerability S
IMAP XnView PCT Image Processing Heap Overflow Vulnerability S
IMAP XnView RAS Image Processing Heap Overflow Vulnerability S
IMAP XnView TIFF Image Processing Heap Overflow Vulnerability S
IMAP XnView TIFF Image Processing Heap Overflow Vulnerability_1 S
KMPlayer '.avi' File Denial of Service Vulnerability S
LibreOffice and OpenOffice 'odg' DoS Vulnerability S
LibreOffice and OpenOffice 'odt' DoS Vulnerability S
LibreOffice and OpenOffice 'ppt' DoS Vulnerability S
LibreOffice and OpenOffice 'xls' DoS Vulnerability S
Microsoft Office Picture Manager Memory Corruption Vulnerability S
Microsoft Office Publisher '.pub' File Denial of Service Vulnerability S
Microsoft Paint '.bmp' Denial of Service Vulnerability S
Microsoft Windows Help Viewer Memory Corruption DoS Vulnerability S
Microsoft Windows Media Player AVI File Divide-by-Zero Vulnerability S
Microsoft Word Stack Overflow Denial Of Service Vulnerability S
POP3 Adobe Photoshop TIFF Image Parsing Buffer Overflow Vulnerability S
POP3 IBM Personal Communications WS File Vulnerability (debug_trap) S
POP3 IBM Personal Communications WS File Vulnerability (MessageBox) S
POP3 IBM Personal Communications WS File Vulnerability (win_exec) S
POP3 IBM Personal Communications WS File Vulnerability (win_shell_bind_tcp) S
POP3 IBM Personal Communications WS File Vulnerability (win_shell_bind_tcp_xpfw) S
POP3 IBM Personal Communications WS File Vulnerability (win_shell_reverse_ord_tcp) S
POP3 IBM Personal Communications WS File Vulnerability (win_shell_reverse_tcp) S
POP3 IrfanView Formats PlugIn 'jpeg_ls.dll' Heap Buffer Overflow Vulnerability S
POP3 Nokia PC Suite Video Manager '.mp4' File DoS Vulnerability S
POP3 XnView GIF Image Processing Heap Overflow Vulnerability S
POP3 XnView PCT Image Processing Heap Overflow Vulnerability S
POP3 XnView RAS Image Processing Heap Overflow Vulnerability S
POP3 XnView TIFF Image Processing Heap Overflow Vulnerability S
POP3 XnView TIFF Image Processing Heap Overflow Vulnerability_1 S
Real Networks RealPlayer Write Access Violation Vulnerability S
RealPlayer 3GP File Handling Memory Corruption Vulnerability S
Smadav Denial of Service Vulnerability S
Zoner Photo Studio Stack Buffer Overflow Vulnerability S
Zoner Photo Studio Stack Buffer Overflow Vulnerability_1 S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.