Search

Traffic File Update - January 2016

This Traffic IQ Professional update for January 2016 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for January 2016

156 Application Exploits

Adobe Flash MovieClip.attachMovie Use-After-Free Vulnerability (fla) S
Adobe Flash MovieClip.attachMovie Use-After-Free Vulnerability (swf) S
Adobe Flash MovieClip.localToGlobal Use-After-Free Vulnerability (fla) S
Adobe Flash MovieClip.localToGlobal Use-After-Free Vulnerability (swf) S
Adobe Flash TextField.antiAliasType Setter Use-After-Free Vulnerability (fla) S
Adobe Flash TextField.antiAliasType Setter Use-After-Free Vulnerability (swf) S
Adobe Flash TextField.replaceSel Use-After-Free Vulnerability (fla) S
Adobe Flash TextField.replaceSel Use-After-Free Vulnerability (swf) S
D-Link DIR-815 DIR-850L - SSDP Command Injection S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_1 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_2 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_3 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_4 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_5 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_6 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_7 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_8 S
HTTP Alcatel Lucent Home Device Manager XSS Vulnerability_9 S
HTTP AlegroCart 1.2.8 - 'checkout' SQL Injection Vulnerability (Percent Encoded) S
HTTP AlegroCart 1.2.8 - 'checkout' SQL Injection Vulnerability S
HTTP AlegroCart 1.2.8 - 'download' SQL Injection Vulnerability S
HTTP AlegroCart 1.2.8 - LFI Vulnerability (From Server) S
HTTP AlegroCart 1.2.8 - LFI Vulnerability (To Server) S
HTTP AlegroCart 1.2.8 - RFI Vulnerability (From Server) S
HTTP AlegroCart 1.2.8 - RFI Vulnerability (To Server) S
HTTP Apache ActiveMQ 'refresh' Parameter XSS Vulnerability S
HTTP Atlassian Confluence Cross Site Scripting Vulnerability S
HTTP Bitrix 'bitrix.mpbuilder' Directory Traversal Vulnerability (From Server) S
HTTP Bitrix 'bitrix.mpbuilder' Directory Traversal Vulnerability (To Server) S
HTTP Bitrix 'bitrix.xscan' Module Directory Traversal Vulnerability S
HTTP Cacti CVE 2015 8604 SQL Injection Vulnerability S
HTTP Cacti CVE-2015-8369 SQL Injection Vulnerability S
HTTP CMS e107 'admin-filemanager.php' XSS Vulnerability S
HTTP Cryptocat CVE 2013 4103 Arbitrary Script Injection Vulnerability S
HTTP D-Link DIR-615 - Email Buffer Overflow (From Server) S
HTTP D-Link DIR-615 - Email Buffer Overflow (To Server) S
HTTP D-Link DIR-615 - Ping Buffer Overflow (From Server) S
HTTP D-Link DIR-615 - Ping Buffer Overflow (To Server) S
HTTP D-Link DIR-645 - Buffer Overflow Vulnerability S
HTTP D-Link DIR-645 - Command Injection Vulnerability S
HTTP D-Link DIR-815 - Auth Buffer Overflow Vulnerability S
HTTP D-Link DIR-815 - Command Injection Vulnerability S
HTTP D-Link DIR-815 - HNAP Buffer Overflow Vulnerability S
HTTP D-Link DIR-817LW - Auth Buffer Overflow Vulnerability S
HTTP D-Link DIR-817LW - Command Injection Vulnerability S
HTTP D-Link DIR-817LW - HNAP Buffer Overflow Vulnerability S
HTTP D-Link DIR-818W - Auth Buffer Overflow Vulnerability S
HTTP D-Link DIR-818W - Command Injection Vulnerability S
HTTP D-Link DIR-818W - HNAP Buffer Overflow Vulnerability S
HTTP D-Link DIR-825(vC) - Auth Buffer Overflow Vulnerability S
HTTP D-Link DIR-825(vC) - Directory Traversal Vulnerability S
HTTP D-Link DIR-825(vC) - HNAP Buffer Overflow Vulnerability S
HTTP D-Link DIR-825(vC) - Ping Buffer Overflow Vulnerability S
HTTP D-Link DIR-866L - Email Buffer Overflow Vulnerability S
HTTP D-Link DIR-866L - HNAP Buffer Overflow Vulnerability S
HTTP D-Link DIR-880L - Auth Buffer Overflow Vulnerability S
HTTP D-Link DIR-880L - HNAP Buffer Overflow Vulnerability S
HTTP D-Link DIR-890L R - Auth Buffer Overflow Vulnerability S
HTTP D-Link DIR-890L R - HNAP Buffer Overflow Vulnerability S
HTTP Easy File Sharing Web Server 7.2 GET HTTP Request Vulnerability S
HTTP Easy File Sharing Web Server 7.2 HEAD HTTP Request Vulnerability S
HTTP F5 Networks BIG-IP Application Security Manager (ASM) HTML Injection S
HTTP foobar2000 1.3.9 - (.asx) Local Crash PoC S
HTTP Gokhan Balbal Script CSRF Vulnerability (From Server) S
HTTP Gokhan Balbal Script CSRF Vulnerability (To Server) S
HTTP Grawlix CSRF Vulnerability (From Server) S
HTTP Grawlix CSRF Vulnerability (To Server) S
HTTP Joomla! Core CVE-2015-8562 Remote Code Execution Vulnerability S
HTTP Kerio Control 8.6.1 - 'id' SQL Injection (Percent Encoded) S
HTTP Kerio Control 8.6.1 - 'id' SQL Injection S
HTTP Manage Engine Applications Manager XSS Vulnerability S
HTTP Manage Engine Applications Manager XSS Vulnerability_1 S
HTTP Manage Engine Applications Manager XSS Vulnerability_2 S
HTTP Manage Engine Applications Manager XSS Vulnerability_3 S
HTTP Manage Engine Applications Manager XSS Vulnerability_4 S
HTTP Manage Engine Applications Manager XSS Vulnerability_5 S
HTTP Manage Engine Command Execution CSRF Vulnerability (From Server) S
HTTP Manage Engine Command Execution CSRF Vulnerability (To Server) S
HTTP mcart.xls Bitrix Module 6.5.2 - 'firstColumn' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'firstRow' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'highestColumn' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'sku_iblock_id' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'titleRow' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'xls_iblock_id' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'xls_iblock_section_id' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'xls_iblock_section_id_new' SQL Injection S
HTTP mcart.xls Bitrix Module 6.5.2 - 'xls_profile' SQL Injection (Percent Encoded) S
HTTP mcart.xls Bitrix Module 6.5.2 - 'xls_profile' SQL Injection S
HTTP MediaAccess TG788vn - Unauthenticated File Disclosure S
HTTP Microsoft IE CVE-2015-6152 Remote Memory Corruption Vulnerability S
HTTP netis RealTek Wireless Router ADSL Modem - Create User CSRF S
HTTP OpenMRS Cross Site Scripting Vulnerability (From Server) S
HTTP OpenMRS Cross Site Scripting Vulnerability (To Server) S
HTTP Ovidentia Widgets 1.0.61 - Remote Command Execution Exploit S
HTTP PFSense Directory Traversal Vulnerability S
HTTP PFSense Directory Traversal Vulnerability_1 S
HTTP phpDolphin CSRF Vulnerability (From Server) S
HTTP phpDolphin CSRF Vulnerability (To Server) S
HTTP phpDolphin CSRF Vulnerability_1 (From Server) S
HTTP phpDolphin CSRF Vulnerability_1 (To Server) S
HTTP phpDolphin XSS Vulnerability S
HTTP PHPIPAM CSRF Vulnerability (From Server) S
HTTP PHPIPAM CSRF Vulnerability (To Server) S
HTTP PHPIPAM CSRF Vulnerability_1 (From Server) S
HTTP PHPIPAM CSRF Vulnerability_1 (To Server) S
HTTP PHPIPAM XSS Vulnerability S
HTTP PhpSocial CSRF Vulnerability (From Server) S
HTTP PhpSocial CSRF Vulnerability (To Server) S
HTTP PhpSocial UserEditprofileStatus.php Open Redirect Vulnerability S
HTTP Polycom VVX-Series Business Media Phones Directory Traversal Vulnerability S
HTTP Polycom VVX-Series Business Media Phones Directory Traversal Vulnerability_1 S
HTTP Simple Ads Manager 2.9.4.116 - 'wc' SQL Injection S
HTTP Simple PHP Polling System XSS Vulnerability S
HTTP Skybox Platform 7.0.611 - Directory Traversal S
HTTP Skybox Platform 7.0.611 - SQL Injection S
HTTP Skybox Platform 7.0.611 - XSS S
HTTP Synnefo Internet Management Software XSS Vulnerability S
HTTP Tequila File Hosting 1.5 - 'file' XSS (Percent Encoded) S
HTTP Tequila File Hosting 1.5 - 'file' XSS S
HTTP Tequila File Hosting 1.5 - 'folder' XSS (Percent Encoded) S
HTTP Tequila File Hosting 1.5 - 'folder' XSS S
HTTP Tequila File Hosting 1.5 - File Download (Percent Encoded) S
HTTP Tequila File Hosting 1.5 - File Download S
HTTP WIMAX LX350P(WIXFMR-108) - Credentials Disclosure (Percent Encoded) S
HTTP WIMAX LX350P(WIXFMR-108) - Credentials Disclosure S
HTTP WIMAX LX350P(WIXFMR-108) - DMZ_Host IP Vulnerability S
HTTP WIMAX LX350P(WIXFMR-108) - DNS IP Vulnerability S
HTTP WIMAX LX350P(WIXFMR-108) - Frame Injection Vulnerability S
HTTP WIMAX LX350P(WIXFMR-108) - Network Information Disclosure S
HTTP WIMAX LX350P(WIXFMR-108) - Ping Vulnerability S
HTTP WIMAX MT711x - Change Admin Password Vulnerability S
HTTP WIMAX MT711x - Enable - Disable Connections S
HTTP WIMAX MT711x - Ping Vulnerability S
HTTP WIMAX MT711x - WiFi Information Disclosure S
HTTP WIMAX MT711x - Wimax Information Disclosure S
HTTP WordPress Admin Mgmt Xtended Plugin 2.4.0 - Media XSS S
HTTP WordPress Admin Mgmt Xtended Plugin 2.4.0 - Post Title XSS S
HTTP WordPress Plugin WP Easy Poll CSRF Vulnerability (From Server) S
HTTP WordPress Plugin WP Easy Poll CSRF Vulnerability (To Server) S
HTTP ZeroCMS 'user_id' SQL Injection S
IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - Invalid Pointer Dereference S
IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - _FXCLI_GetConfFileChunk BO S
IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - _FXCLI_SetConfFileChunk BO S
KiTTY Portable 0.65.0.2p Chat CVE-2015-7874 Buffer Overflow Vulnerability (Win10) S
KiTTY Portable 0.65.0.2p Chat CVE-2015-7874 Buffer Overflow Vulnerability (Win7) S
KiTTY Portable 0.65.0.2p Chat CVE-2015-7874 Buffer Overflow Vulnerability (WinXP) S
Libxml2 'parser.c' CVE-2015-8241 Buffer Overflow Vulnerability S
Microsoft Windows CVE-2015-6127 Information Disclosure Vulnerability S
Microsoft Windows CVE-2015-6128 DLL Loading RCE Vulnerability S
Microsoft Windows CVE-2015-6131 Remote Code Execution Vulnerability S
Microsoft Windows CVE-2015-6131 Remote Code Execution Vulnerability_1 S
Microsoft Windows Library Loading CVE-2015-6132 RCE Vulnerability S
Notepad++ NPPFtp Plugin LIST Command Buffer Overflow Vulnerability S
pdfium CPDF_DIBSource DownSampleScanline32Bit Out-of-Bounds Read Vulnerability S
pdfium CPDF_DIBSource DownSampleScanline32Bit Out-of-Bounds Read Vulnerability_1 S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.