Search

Traffic File Update - December 2017

This Traffic IQ Professional update for December 2017 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for December 2017

143 Application Exploits

Apache Tomcat Remote Code Execution via JSP Upload Bypass (Metasploit) S
CyberLink LabelPrint 2.5 - Local Buffer Overflow (SEH Unicode) S
CyberLink LabelPrint 2.5 - Local Buffer Overflow_1 (SEH Unicode) S
CyberLink LabelPrint 2.5 - Local Buffer Overflow_2 (SEH Unicode) S
Disk Savvy Enterprise 9.9.14 - Buffer Overflow (SEH) S
DiskBoss Enterprise - GET Buffer Overflow (Metasploit)_1 S
DiskBoss Enterprise - GET Buffer Overflow (Metasploit)_2 S
Dup Scout Enterprise 10.0.18 - Login Buffer Overflow (Metasploit) S
Dup Scout Enterprise 9.9.14 - Buffer Overflow (SEH) S
EMC CMCNE Inmservlets.war FileUploadController 11.2.1 - Remote Code Execution (Metasploit) S
HP iMC Plat 7.2 - Remote Code Execution (CVE-2017-5816) S
HP iMC Plat 7.2 - Remote Code Execution (CVE-2017-5817) S
HP Smart Storage Administrator 2.30.6.0 - Remote Command Injection (Metasploit) S
HTTP Accesspress Anonymous Post Pro 3.2.0 - Unauthenticated Arbitrary File Upload S
HTTP Apple WebKit 10.0.2 - Cross-Origin IFRAME Pop-up Blocker Bypass S
HTTP Apple WebKit 10.0.2 - Sandboxed IFRAME Pop-up Blocker Bypass S
HTTP Artica Web Proxy 3.06 - Remote Code Execution S
HTTP ASX To MP3 3.1.3.7 Buffer Overflow S
HTTP CPA Lead Reward Script - SQL Injection (From Server) S
HTTP CPA Lead Reward Script - SQL Injection (To Server) S
HTTP DotCMS 4.1.1 Shell Execute S
HTTP DotCMS 4.1.1 Shell Upload S
HTTP Ghostscript CVE-2017-8291 Remote Code Execution S
HTTP Joomla! Component SP Movie Database 'index.php' SQL Injection Vuln S
HTTP Joomla! Component Survey Force Deluxe 'index.php' SQL Injection Vuln S
HTTP Joomla! Component Twitch Tv 'index.php' SQL Injection Vuln S
HTTP Joomla! Component Twitch Tv 'index.php' SQL Injection Vuln_1 S
HTTP Joomla! Component Zap Calendar Lite 'index.php' SQL Injection Vuln S
HTTP KMPlayer 4.2.2.4 - Denial of Service S
HTTP LaCie 5big Network 2.2.8 - Command Injection S
HTTP LiveCRM 'index.php' SQL Injection Vuln S
HTTP LiveCRM 'index.php' SQL Injection Vuln_1 S
HTTP LiveCRM 'index.php' SQL Injection Vuln_2 S
HTTP LiveCRM LiveProjects 'index.php' SQL Injection Vuln S
HTTP LiveCRM LiveProjects 'index.php' SQL Injection Vuln_1 S
HTTP LiveCRM LiveSales 'index.php' SQL Injection Vuln S
HTTP LiveCRM LiveSales 'index.php' SQL Injection Vuln_1 S
HTTP LiveCRM LiveSupport 'index.php' SQL Injection Vuln S
HTTP LiveCRM LiveSupport 'index.php' SQL Injection Vuln_1 S
HTTP LiveCRM LiveSupport 'index.php' SQL Injection Vuln_2 S
HTTP Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read S
HTTP Microsoft Edge - 'Object.setPrototypeOf' Memory Corruption S
HTTP Microsoft Edge Chakra JIT - 'LowererLowerBoundCheck' Incorrect Integer Overflow Check S
HTTP Microsoft Edge Chakra JIT - 'OP_Memset' Type Confusion S
HTTP Microsoft Edge Chakra JIT - Type Confusion with switch Statements S
HTTP Microsoft Internet Explorer 11 (Windows 7 x86) - 'mshtml.dll' RCE (MS17-007) S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_1 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_2 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_3 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_4 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_5 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_6 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_7 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_8 S
HTTP Mscript Matrimonial Script 'advsearch_results.php' SQL Injection Vuln_9 S
HTTP Mscript Matrimonial Script 'load_caste_state_city.php' SQL Injection Vuln S
HTTP Mscript Matrimonial Script 'printprofile.php' SQL Injection Vuln S
HTTP Mscript Matrimonial Script 'viewphoto.php' SQL Injection Vuln S
HTTP OpenEMR 5.0.0 - OS Command Injection S
HTTP OpenEMR 5.0.0 - Reflected Cross Site Scripting S
HTTP OTRS 'Intro' Install Dialog Disclosure S
HTTP OTRS 'Start' Install Dialog Disclosure S
HTTP OTRS 'System' Install Dialog Disclosure S
HTTP OTRS Install Dialog Disclosure S
HTTP Scriptzee Law Firm Website Script SQL Injection Vuln S
HTTP Scriptzee Law Firm Website Script SQL Injection Vuln_1 S
HTTP Scriptzee Law Firm Website Script SQL Injection Vuln_2 S
HTTP Scriptzee Law Firm Website Script SQL Injection Vuln_3 S
HTTP Synology StorageManager 5.2 - Root Remote Command Execution S
HTTP vBulletin 5 - 'cacheTemplates' Unauthenticated Remote Arbitrary File Deletion S
HTTP vBulletin 5 - 'routestring' Unauthenticated Remote Code Execution S
HTTP Vonage VDV-23 - Denial of Service S
HTTP VX Search 10.2.14 - 'command_name' Buffer Overflow S
HTTP VX Search Enterprise 10.1.12 - Buffer Overflow S
HTTP WebKit - 'WebCoreAXObjectCacheperformDeferredCacheUpdate' Use-After-Free S
HTTP WebKit - 'WebCoreDocumentLoaderframeLoader' Use-After-Free S
HTTP WebKit - 'WebCoreTreeScopedocumentScope' Use-After-Free S
HTTP Winamp Pro 5.66.Build.3512 - Denial of Service S
HTTP ZTE ZXDSL 831CII - Improper Access Restrictions S
Infinite Automation Mango Automation - Command Injection (Metasploit) S
Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection S
Joomla! Component JEXTN Question And Answer 3.1.0 - SQL Injection S
Joomla! Component JEXTN Question And Answer 3.1.0 - SQL Injection_1 S
Joomla! Component JEXTN Video Gallery 3.0.5 - 'id' SQL Injection S
Mako Server 2.5 - OS Command Injection Remote Command Execution (Metasploit) S
Malware GET Request Associated with Emotet Malware (aeroplume.fr) S
Malware GET Request Associated with Emotet Malware (krfseb.ru) S
Malware GET Request Associated with Emotet Malware (lf.s-grand.ru) S
Malware GET Request Associated with Emotet Malware (lostfishermensmemorial.net) S
Malware GET Request Associated with Emotet Malware (mobilemedicine.ru) S
Malware GET Request Associated with Emotet Malware (oilcom.com.ua) S
Malware GET Request Associated with Emotet Malware (pr-kuhni.ru) S
Malware GET Request Associated with Emotet Malware (servicepack.biz) S
Malware GET Request Associated with Emotet Malware (taswines.co.uk) S
Malware GET Request Associated with Emotet Malware (vozim-gruz.by) S
Malware GET Request Associated with Emotet Malware (www.aquacottapizza.com.au) S
Malware GET Request Associated with Emotet Malware (www.auto-kuply.ru) S
Malware GET Request Associated with Emotet Malware (www.avcilarbinicilik.xyz) S
Malware GET Request Associated with Emotet Malware (www.demoevents.criticalskillsboost.com) S
Malware GET Request Associated with Emotet Malware (www.events.comprara.com.au) S
Malware GET Request Associated with Emotet Malware (www.iphoneprofix.com) S
Malware GET Request Associated with Emotet Malware (www.jira.forexworld.com.au) S
Malware GET Request Associated with Emotet Malware (www.laptopthanhhoa.com.vn) S
Malware GET Request Associated with Emotet Malware (www.lo12.wroc.pl) S
Malware GET Request Associated with Emotet Malware (www.meganetop.co.jp) S
Malware GET Request Associated with Emotet Malware (www.nschool2.ru) S
Malware GET Request Associated with Emotet Malware (www.vipapart.co.il) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (accessyouraudience.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (altarek.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (alucmuhendislik.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (amcscomputer.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (arcusautomatika.ba) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (awholeblueworld.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (basarteks.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (bit-chasers.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (boaze.de) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (c3pconsulting.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (coloradofootinstitutecom) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (datenhaus.info) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (gulercin.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (hexacam.com) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (mh-service.ru) S
Malware HTTP GET Request Associated with Globe Imposter Ransomware (yamanashi-jyujin.jp) S
Malware HTTP GET Request Associated with Scarab Ransomware (atlantarecyclingcenters.com) S
Malware HTTP GET Request Associated with Scarab Ransomware (hard-grooves.com) S
Malware HTTP GET Request Associated with Scarab Ransomware (hellonwheelsthemovie.com) S
Malware HTTP GET Request Associated with Scarab Ransomware (miamirecyclecenters.com) S
Malware HTTP GET Request Associated with Scarab Ransomware (pamplonarecados.com) S
Malware HTTP GET Request Associated with Scarab Ransomware (xploramail.com) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (bawabetelbaik.com) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (nrrgarment.com) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (phonecenter24.de) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (protcuba.com) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (ssemanipur.com) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (tanbethinho.net) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (tci.seventhworld.com) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (tecclix.com) S
Malware HTTP GET Request to Server Connected to Dridex Campaign (www.drpampe.com) S
Microsoft Office - OLE Remote Code Execution (Metasploit) S
PCMAN FTP 2.0.7 - ls Command Buffer Overflow (Metasploit) S
Sync Breeze Enterprise 10.0.28 Buffer Overflow S
VX Search Enterprise 10.0.14 Buffer Overflow S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.