Update #2540 (09/29/2015)
109 updated signatures:
HIGH | HTTP:STC:DL:XLS-MERGECELLS-OF | HTTP: Microsoft Excel MergeCells Record Heap Overflow |
HIGH | HTTP:STC:IE:INP-ELNT-OBJCT-RCE | HTTP: Microsoft IE CInputElement Object Arbitrary Code Execution |
HIGH | HTTP:ORACLE:GLASSFISH-REST | HTTP: Oracle GlassFish Enterprise Server REST Interface Cross Site Request Forgery |
CRITICAL | HTTP:STC:DL:MAL-WIN-BRIEFCASE-2 | HTTP: Windows Briefcase Integer Underflow Vulnerability (2) |
HIGH | HTTP:STC:ADOBE:CVE-2015-0091-CE | HTTP: Adobe Font Driver CVE-2015-0091 Remote Code Execution |
HIGH | HTTP:STC:ACTIVEX:IBM-C1SIZER | HTTP: IBM SPSS SamplePower c1sizer ActiveX Control Buffer Overflow |
MEDIUM | HTTP:MISC:WAPP-SUSP-FILEUL1 | HTTP: Multiple Web Application Parameter Suspicious File Upload Attempt 1 |
HIGH | HTTP:STC:JAVA:GSUB-BOF | HTTP: Oracle Java SE GSUB ReqFeatureIndex Buffer Overflow |
HIGH | HTTP:STC:ADOBE:FLASH-ARGREST | HTTP: Adobe Flash Player Rest Argument Remote Code Execution |
HIGH | APP:NOVELL:GWMGR-INFODISC | APP: Novell Groupwise Messenger Server Process Memory Information Disclosure |
HIGH | HTTP:VLC-ABC-FILE-BOF | HTTP: VLC Media Player ABC File Parts Field Parsing Heap Integer Overflow |
HIGH | HTTP:STC:DL:XLS-MAL-REC-MC | HTTP: Microsoft Office Excel Malformed Record Memory Corruption |
HIGH | HTTP:STC:DL:MS-ACCESS-MEM-CORR | HTTP: Microsoft Access CVE-2013-3157 Memory Corruption |
HIGH | HTTP:PHP:SDNTOJEWISH-FUNC-OF | HTTP: PHP SdnToJewish Function Integer Overflow |
HIGH | HTTP:STC:ADOBE:SHOCKWAVE-OOB | HTTP: Adobe Shockwave Player rcsL Chunk Parsing Out of Bounds Array Indexing |
HIGH | APP:SYMC:MESSAGING-SAVE.DO-CSRF | APP: Symantec Messaging Gateway Save.do Cross Site Request Forgery |
HIGH | HTTP:ORACLE:OUTSIDEIN-CORELDRAW | HTTP: Oracle Outside In CorelDRAW File Parser Integer Overflow |
HIGH | HTTP:RUBYONRAILS-JSONYAML-RCE | HTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution |
HIGH | HTTP:STC:DL:XLS-FIELD-MC | HTTP: Microsoft Office Excel Unexpected Field Value Handling Memory Corruption |
MEDIUM | HTTP:MS-WINDOWS-X509-DOS | HTTP: Microsoft Windows X.509 Certificate Validation Denial of Service |
HIGH | HTTP:STC:IE:REMOVECHILD-UAF | HTTP: Microsoft Internet Explorer removeChild Use After Free |
HIGH | HTTP:STC:IE:9-10-OBJERR-UAF | HTTP: Microsoft Internet Explorer 9 and 10 Improper Object Handling Use-After-Free |
HIGH | HTTP:STC:STREAM:QT-HREFTRACK | HTTP: Apple Quicktime 'HREFTrack' Cross-Zone Scripting |
HIGH | HTTP:STC:JAVA:GSUB-TABLE-BO | HTTP: Oracle Java SE GSUB FeatureCount Buffer Overflow |
HIGH | APP:WINAMP:MIDI-FILE-OF | APP: Nullsoft Winamp MIDI File Buffer Overflow |
MEDIUM | HTTP:IIS:ASP-DOT-NET-BACKSLASH | HTTP: IIS ASP.Net Directory Authentication Bypass |
HIGH | HTTP:STC:DL:MS-DIRECTSHOW-RCE | HTTP: Microsoft Windows DirectShow JPEG Remote Code Execution |
HIGH | HTTP:STC:ADOBE:READER-MC-RCE | HTTP: Adobe Acrobat Reader Memory Corruption Remote Code Execution (CVE-2012-1530) |
HIGH | HTTP:STC:JAVA:JRE-PTR-CTRL-EXEC | HTTP: Oracle JRE Pointer Control Remote Code Execution Attempt |
MEDIUM | HTTP:STC:GIT-CLIENT-CE | HTTP: GitHub Git Tree Handling Overwrite Arbitrary Command Execution |
HIGH | HTTP:STC:ADOBE:CVE-2014-0506-UF | HTTP: Adobe Flash Player CVE-2014-0506 Use After Free |
HIGH | HTTP:ORACLE:JNLP-CODE-EXEC | HTTP: Oracle Sun Java JRE Arbitrary Code Execution |
HIGH | HTTP:GOOGLE-SKETCHUP-BMP-BO | HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3664) |
HIGH | HTTP:STC:JAVA:MIXERSEQ-OF | HTTP: Oracle Java MixerSequencer.nAddControllerEventCallback Array Overflow |
HIGH | HTTP:STC:DL:OO-OLE | HTTP: OpenOffice OLE File Stream Buffer Overflow |
HIGH | HTTP:STC:DL:OO-EMF | HTTP: OpenOffice EMF File EMR_BITBLT Record Integer Overflow |
HIGH | HTTP:STC:IE:CLIP-MEM | HTTP: Microsoft Internet Explorer Clip Memory Corruption Remote Code Execution |
HIGH | HTTP:STC:JAVA:TYPECONF | HTTP: Oracle Java AtomicReferenceFieldUpdater Type Confusion |
HIGH | HTTP:STC:DL:XLS-FORMULA-BIFF | HTTP: Excel Formula Biff Code Execution |
HIGH | HTTP:STC:DL:MAL-WEBEX-WRF | HTTP: Cisco WebEx Player ATAS32.DLL Remote Code Execution |
HIGH | APP:ORACLE:RHINOSCRIPT-BYPASS | APP: Oracle Java Applet Rhino Script Engine Policy Bypass |
HIGH | HTTP:STC:ADOBE:CAM-RAW-PLUGIN | HTTP: Adobe Camera Raw Plug-in TIFF Image Processing Buffer Underflow |
CRITICAL | SHELLCODE:X86:BASE64-NOOP-80C | SHELLCODE: Base64 X86 NOOP Detection Over HTTP-CTS |
HIGH | HTTP:STC:DL:XLS-WOPT | HTTP: Microsoft Office Excel WOPT Record Memory Corruption |
HIGH | HTTP:STC:JAVA:IBM-RMI-PROXY-RCE | HTTP: IBM Java package com.ibm.rmi.util.ProxyUtil Remote Code Execution |
HIGH | HTTP:STC:IE:CVE-2014-1804-UAF | HTTP: Microsoft Internet Explorer CVE-2014-1804 Use-After-Free |
HIGH | HTTP:STC:DL:EXESCOPE-FILE-BO | HTTP: eXeScope Input File processing Buffer Overflow |
HIGH | HTTP:STC:ADOBE:PDF-LIBTIFF | HTTP: Adobe PDF Import Tiff Buffer Overflow |
HIGH | HTTP:STC:DL:MS-NET-CLILOADER-MC | HTTP: Microsoft .NET Framework CLI Loader Memory Corruption |
HIGH | HTTP:STC:DL:OUTLOOK-CE | HTTP: Microsoft Outlook SMB ATTACH_BY_REFERENCE Code Execution |
HIGH | DB:ORACLE:FUSION-XLS-IO | DB: Oracle Fusion Middleware Outside In Excel File Parsing Integer Overflow |
HIGH | HTTP:STC:JAVA:TYPE1-FONT | HTTP: Sun Java Runtime Environment Type1 Font Parsing Integer Overflow Vulnerability |
HIGH | HTTP:MISC:MS-XML-SIG-VAL-DOS | HTTP: Microsoft .NET Framework XML Signature Validation Entity Expansion Denial of Service |
HIGH | HTTP:STC:DL:VBA-MEM-CORRUPT | HTTP: Microsoft Visual Basic for Applications Stack Memory Corruption |
HIGH | HTTP:STC:IE:AUTH-REFLECTION | HTTP: Microsoft Internet Explorer and HTTP Services Authentication Reflection Code Execution |
HIGH | HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO | HTTP: Oracle Outside In Paradox Database Handling Buffer Overflow |
MEDIUM | HTTP:SPRING-XMLENTITY-INFODISC | HTTP: SpringSource Spring Framework XML External Entity Parsing Information Disclosure |
MEDIUM | HTTP:STC:SCRIPT:JS-ARRAY-POST | HTTP: Heuristics PHP Array POST Obfuscation |
CRITICAL | SHELLCODE:X86:PEXCALL-80C | SHELLCODE: X86 PexCall Encoder Routine Over HTTP-CTS |
HIGH | HTTP:STC:ADOBE:TRUETYPE-FONT-CE | HTTP: Adobe Acrobat Reader TrueType Font Remote Code Execution |
HIGH | HTTP:STC:ADOBE:PS-PNG-BO | HTTP: Adobe Products PNG File Handling Stack Buffer Overflow |
HIGH | HTTP:STC:DL:WORD-SMART-TAGS | HTTP: Microsoft Word Smart Tags Code Execution |
HIGH | HTTP:STC:ADOBE:READER-PRC | HTTP: Adobe Reader Product Representation Compact Remote Code Execution |
HIGH | HTTP:STC:DL:CISCO-WEBEX-ATDL | HTTP: Cisco WebEx Player ATDL2006.dll Heap Memory Corruption |
HIGH | HTTP:STC:DL:XLS-FILTER-REC | HTTP: Microsoft Excel Malformed Filter Records Handling Code Execution |
HIGH | HTTP:STC:ADOBE:ACROBAT-GETICON | HTTP: Adobe Acrobat JavaScript getIcon Method Buffer Overflow |
HIGH | HTTP:STC:ADOBE:U3D-CLODMESH-MC | HTTP: Adobe Acrobat Reader U3D CLODMeshDeclaration Memory Corruption |
MEDIUM | HTTP:STC:DL:MSSQL-BACKUP-MEM | HTTP: Microsoft SQL Server Backup Restoring Memory Corruption |
HIGH | HTTP:STC:IMG:JAVA-GIF-MEM | HTTP: Sun Java Runtime Environment GIF Parsing Memory Corruption |
HIGH | CHAT:MSN:PIDGIN-MSN-IO | CHAT: Pidgin MSN MSNP2P Message Integer Overflow |
MEDIUM | TFTP:TRANSPORT-BOF | TFTP: Multiple Vendors TFTP Transporting Mode Remote Buffer Overflow Vulnerability |
MEDIUM | HTTP:STC:ADOBE:SWF-ACTIONSCRIPT | HTTP: Adobe Flash Player ActionScript Function Variable Arguments Information Disclosure |
HIGH | HTTP:STC:DL:OLE-STRUCTURE-RCE | HTTP: Microsoft OLE Structure Remote Code Execution |
HIGH | HTTP:STC:IE:CVE-2014-1789-MC | HTTP: Microsoft Internet Explorer CVE-2014-1789 Memory Corruption |
HIGH | HTTP:STC:ADOBE:FLASH-PLAYER-BOF | HTTP: Adobe Flash Player File Parsing Heap Buffer Overflow |
HIGH | HTTP:STC:CLSID:ACTIVEX:CREATEOB | HTTP: Internet Explorer CreateObject ActiveX Vulnerability |
HIGH | HTTP:STC:ADOBE:CVE-2013-3357-MC | HTTP: Adobe Reader CVE-2013-3357 Memory Corruption |
HIGH | HTTP:STC:ADOBE:FLASHPLR-FILE-MC | HTTP: Adobe Flash Player Improper File Parsing Memory Corruption |
HIGH | HTTP:STC:JAVA:FONT-HANDLNG-BO | HTTP: Oracle Java Font Glyph Storage Handling Off-by-one Buffer Overflow |
HIGH | HTTP:STC:DL:XLS-AXISPARENT | HTTP: Microsoft Excel Axisparent Record Index Handling Code Execution |
HIGH | HTTP:STC:ADOBE:FLASH-AS3-INT-OV | HTTP: Adobe Flash Player ActionScript 3 Integer Overflow |
HIGH | HTTP:STC:DL:MOZILLA-WAV-BOF | HTTP: Mozilla Product WAV Processing Buffer Overflow |
HIGH | HTTP:STC:MS-CVE-2014-4121-RCE | HTTP: Microsoft .NET Framework CVE-2014-4121 Remote Code Execution |
HIGH | HTTP:STC:DL:WEBEX-ATDL-BOF | HTTP: Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow |
HIGH | HTTP:MS-WORDPERFECT-BOF | HTTP: Microsoft WordPerfect Length Field Parsing Buffer Overflow |
HIGH | HTTP:STC:DL:EOT-IO | HTTP: Microsoft Windows Win32k EOT Parsing Integer Overflow |
HIGH | HTTP:STC:DL:VISIO-UMLSTRING | HTTP: Microsoft Visio UMLString Remote Code Execution |
HIGH | HTTP:ORACLE:OUTSIDE-IN-MSACCESS | HTTP: Oracle Outside In Microsoft Access 1.x Parser Buffer Overflow |
HIGH | HTTP:STC:COREL-WP-BOF | HTTP: Corel WordPerfect Document Processing Buffer Overflow |
HIGH | HTTP:STC:MS-FOREFRONT-RCE | HTTP: Microsoft Forefront Threat Management Gateway Client Remote Code Execution |
HIGH | HTTP:STC:ADOBE:FLASH-INT-OV | HTTP: Adobe Flash Player Integer Overflow (CVE-2012-5677) |
HIGH | HTTP:STC:DL:APPLE-QT-MJPEG-OF | HTTP: Apple Quicktime MJPEG Frame stsd Atom Heap Overflow |
HIGH | HTTP:STC:DL:XLS-DATA-INIT | HTTP: Excel Data Initialization Vulnerability |
HIGH | HTTP:STC:DL:CRYSTAL-RPT-OLE | HTTP: Microsoft Visual Studio Crystal Reports RPT File Handling Code Execution |
HIGH | HTTP:STC:JAVA:ATOMIC-SB-BREACH | HTTP: Oracle Java AtomicReferenceArray Sandbox Breach |
HIGH | HTTP:STC:DL:GOOGLE-PICASA-OVF | HTTP: Google Picasa CR2 TIFF StripByteCounts Integer Overflow |
HIGH | HTTP:STC:ADOBE:FLASH-RUNTIME | HTTP: Adobe Flash Player RunTime Calculation Remote Code Execution |
MEDIUM | HTTP:STC:SCRIPT:APACHE-XML-DOS | HTTP: Apache Santuario XML Security for Java DTD Denial of Service |
HIGH | HTTP:STC:DL:RTF-MISMATCH | HTTP: Microsoft Word RTF Mismatch Remote Code Execution |
HIGH | HTTP:STC:DL:XLS-FNGROUPNAME | HTTP: Microsoft Office Excel FNGROUPNAME Record Memory Corruption |
HIGH | HTTP:STC:DL:IRFANVIEW-MC | HTTP: IrfanView FlashPix Plug-in Memory Corruption |
HIGH | APP:CAIN-ABEL-CISCO-IOS-BOF | APP: Cain & Abel Cisco IOS Configuration File Buffer Overflow |
HIGH | HTTP:PHP:PHP-QUOT-PRINT-ENCODE | HTTP: PHP php_quot_print_encode Heap Buffer Overflow |
HIGH | HTTP:STC:APPLE-QTIME-DREF-BO | HTTP: Apple QuickTime Alis Volume Name Parsing Stack Buffer Overflow |
HIGH | APP:CUPS:GIF-READ-LZW-OF | APP: Apple CUPS gif_read_lzw Heap Buffer Overflow |
HIGH | HTTP:STC:DL:FREETYPE-TYPE1 | HTTP: FreeType PostScript Type1 Font Parsing Code Execution |
HIGH | HTTP:STC:MS-WORD-INDEX-MC | HTTP: Microsoft Office Bad Index Memory Corruption |
HIGH | HTTP:STC:DL:MS-OPEN-FONT-FILE | HTTP: Microsoft Windows OpenType Font File Remote Code Execution |
HIGH | HTTP:STC:JAVA:METHODHANDLE | HTTP: Oracle Java Private MethodHandle Sandbox Bypass |
Details of the signatures included within this bulletin:
HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO - HTTP: Oracle Outside In Paradox Database Handling Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Oracle Outside In. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- microsoft exchange_server 2010 (sp2)
- microsoft exchange_server 2007 (sp3)
- oracle fusion_middleware 8.3.7.0
- oracle fusion_middleware 8.4
HTTP:SPRING-XMLENTITY-INFODISC - HTTP: SpringSource Spring Framework XML External Entity Parsing Information Disclosure
Severity: MEDIUM
Description:
This signature detects attempts to exploit a know vulnerability against SpringSource Spring Framework. The vulnerability is due to incorrectly configured XML parsing which accepts XML external entities from untrusted sources. A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would result in the disclosure of information from arbitrary files available to the security context of the server application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, idp-4.0.110090709, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, isg-3.4.139899, srx-branch-9.4, idp-5.0.110121210, srx-12.1, srx-branch-12.1, idp-4.2.110100823, idp-5.0.110130325, srx-branch-10.0, mx-11.4, srx-10.0, idp-4.2.110101203, idp-4.0.110090831, idp-5.1.0, j-series-9.5, srx-9.2, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, vsrx-12.1, srx-11.4
References:
Affected Products:
- Microsoft Office 2007 SP3
- Microsoft Excel 2007 SP3
- Microsoft Excel 2010
- Microsoft Office 2010 (32-bit edition)
- Microsoft Office 2010 (64-bit edition) SP1
- Microsoft Excel 2007 SP2
- Microsoft Office 2010 (64-bit edition)
- Microsoft Office 2010 (32-bit edition) SP1
- Microsoft Excel 2010 SP1
HTTP:STC:IE:INP-ELNT-OBJCT-RCE - HTTP: Microsoft IE CInputElement Object Arbitrary Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
HTTP:ORACLE:GLASSFISH-REST - HTTP: Oracle GlassFish Enterprise Server REST Interface Cross Site Request Forgery
Severity: HIGH
Description:
This signature detects Web pages containing dangerous cross site requests. A malicious Web site can exploit a known vulnerability in Oracle GlassFish REST interface and upload arbitrary WAR files which will be executed on the target server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Oracle Glassfish Server 3.1.1
Severity: CRITICAL
Description:
This signature detects attempts to exploit a know problem in Windows Briefcase. Windows Briefcase is a feature that will synchronize the contents of two folders. A successful exploit can lead to arbitrary code execution in the security context of the affected user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe Font Driver. A successful attack can lead to remote code execution within the context of the application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:DL:XLS-FIELD-MC - HTTP: Microsoft Office Excel Unexpected Field Value Handling Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2004 for Mac
- Microsoft Excel 2007
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Excel 2000
- Microsoft Office Excel Viewer 2003 SP3
- Microsoft Excel 2000 SR1
- Microsoft Excel 2000 SP2
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
- Microsoft Excel 2008 for Mac
- Microsoft Excel 2007 SP1
- Microsoft Excel 2003 SP3
- Microsoft Excel 2003 SP1
- Microsoft Open XML File Format Converter for Mac
- Microsoft Office Compatibility Pack 2007
- Microsoft Excel 2002
- Microsoft Excel 2003 SP2
- Microsoft Excel 2007 SP2
- Microsoft Excel 2000 SP3
- Microsoft Excel 2003
- Microsoft Office Compatibility Pack 2007 SP2
- Microsoft Excel 2002 SP3
- Microsoft Excel Viewer
- Microsoft Excel Viewer SP3
- Microsoft Excel 2000
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Office Word. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, idp-4.0.110090709, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, isg-3.4.139899, srx-branch-9.4, idp-5.0.110121210, srx-12.1, srx-branch-12.1, idp-4.2.110100823, idp-5.0.110130325, srx-branch-10.0, mx-11.4, srx-10.0, idp-4.2.110101203, idp-4.0.110090831, idp-5.1.0, j-series-9.5, srx-9.2, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, vsrx-12.1, srx-11.4
References:
Affected Products:
- Microsoft Word Viewer 2003
- Microsoft Works Suite 2004
- Microsoft Works Suite 2005
- Microsoft Works Suite 2000
- Microsoft Word 2002 SP3
- Microsoft Works Suite 2006
- Microsoft Works Suite 2001
- Microsoft Works Suite 2002
- Microsoft Word 2002
- Microsoft Word 2002 SP2
- Microsoft Word 2003
- Microsoft Word 2002 SP1
- Microsoft Works Suite 2003
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in Adobe Flash Player. An attacker can entice a user to load a malicious flash file which can result in arbitrary code execution within the context of the victim's browser.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Red Hat Desktop Extras 4
- Adobe Flash Player 9.125.0
- Adobe Flash Player 10.1.82.76
- Adobe Flash Player 9.0.280
- Sun Solaris 10 Sparc
- Adobe Flash Player 10.3.181.26
- Red Hat Enterprise Linux Desktop Supplementary 6
- Adobe Flash Player 9.0.159.0
- Adobe Flash Player 10.0.45.2
- Adobe Flash Player 9.0.262
- Adobe Flash Player 10.1 Release Candidate
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Adobe Flash Player 9.0.28.0
- Adobe Flash Player 9.0.28.0
- Adobe Flash Player 8.0.33.0
- HP Systems Insight Manager 6.0
- Google Chrome 10.0.648.204
- HP Systems Insight Manager 5.0
- HP Systems Insight Manager 5.0 SP1
- HP Systems Insight Manager 5.0 SP2
- HP Systems Insight Manager 5.0 SP3
- HP Systems Insight Manager 4.2 SP1
- HP Systems Insight Manager 4.2 SP2
- HP Systems Insight Manager 4.2
- Adobe Flash Player 9.0.114.0
- Adobe Flash Player 10.2.152.21
- Adobe Flash Player 10.1.106.16
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- Adobe Flash Player 8
- Adobe Flash Player 8
- Google Chrome 11.0.696.77
- Google Chrome 10.0.648.205
- Google Chrome 10.0.648.205
- Google Chrome 9.0.597.94
- HP Systems Insight Manager 4.1
- Adobe Flash Player 8.0.24.0
- Red Hat Enterprise Linux Supplementary 5 Server
- Adobe Flash Player 10
- Google Chrome 13.0.782.107
- Google Chrome 13
- Adobe Flash Player 9.0.31.0
- HP Systems Insight Manager 5.3
- HP Systems Insight Manager 5.3 Update 1
- Google Chrome 10.0.648.205
- Adobe Flash Player 10.0.0.584
- Google Chrome 10.0.648.127
- Adobe Flash Player 10.2.159.1
- Adobe Flash Player 10.2.154.27
- Adobe AIR 2.6.19120
- Adobe AIR 2.6.19140
- Adobe Flash Player 9.0.151 .0
- Adobe Flash Player 9.0.18D60
- Google Chrome 12.0.742.100
- Adobe Flash Player 9.0.124.0
- Adobe Flash Player 9.0.20.0
- Adobe Flash Player 8.0.39.0
- Adobe Flash Player 9.0.31.0
- Adobe Flash Player 9
- Adobe Flash Player 10.2.156.12
- Adobe Flash Player 10.1.95.2
- Adobe Flash Player 9.0.112.0
- Google Chrome 11.0.696.71
- Google Chrome 10.0.648.127
- Adobe Flash Player 9.0.48.0
- Google Chrome 10.0.648.128
- Adobe Flash Player 9.0.115.0
- Adobe Flash Player 10.1.102.65
- Adobe Flash Player 10.0.45 2
- Adobe Flash Player 9.0.260.0
- Adobe Flash Player 8.0.22.0
- Adobe Flash Player 10.2.154.13
- Sun Solaris 10 X86
- Google Chrome 11.0.696.43
- Adobe Flash Player 10.1.92.10
- SuSE openSUSE 11.4
- Google Chrome 12.0.742.112
- Adobe Flash Player 9.0.20
- Google Chrome 11.0.672.2
- Google Chrome 11
- Adobe Flash Player 8.0.35.0
- HP Systems Insight Manager 5.0 SP5
- HP Systems Insight Manager 5.0 SP6
- HP Systems Insight Manager 5.1 SP1
- Adobe Flash Player 9.0.16
- Adobe Flash Player 10.1.53.64
- Adobe Flash Player 9.0.277.0
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Adobe Flash Player 9.0.262.0
- Adobe Flash Player 10.3.185.25
- Google Chrome 9.0.597.107
- Adobe Flash Player 10.3.185.22
- Adobe Flash Player 10.3.181.22
- Adobe Flash Player 10.3.181.23
- Adobe Flash Player 10.0.42.34
- Adobe Flash Player 10.0.32.18
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Adobe Flash Player 9.0.246.0
- Adobe Flash Player 10.0.32 18
- Adobe Flash Player 9.0.246 0
- Adobe Flash Player 9.0.283.0
- Adobe Flash Player 8.0.42.0
- Adobe Flash Player 10.0.12 .36
- Google Chrome 11.0.696.43
- Adobe Flash Player 10.0.45 2
- Gentoo Linux
- HP Systems Insight Manager 6.1
- HP Systems Insight Manager 5.2 SP2
- Adobe AIR 2.7
- Adobe Flash Player 9.0.45.0
- Adobe Flash Player 9.0.47.0
- Adobe Flash Player 8.0.34.0
- Adobe Flash Player 10.1.52.14.1
- Adobe Flash Player 10.1.52.15
- Adobe Flash Player 10.1.92.8
- Adobe Flash Player 10.1.95.2
- Adobe Flash Player 10.2.152
- Adobe Flash Player 10.2.152.32
- Adobe Flash Player 10.3.181.16
- Adobe Flash Player 10.3.185.22
- HP Systems Insight Manager 6.2
- Google Chrome 12
- Google Chrome 12.0.742.91
- Adobe Flash Player 10.3.185.23
- Adobe Flash Player 9.0.155.0
- HP Systems Insight Manager 6.0.0.96
- HP Systems Insight Manager 6.3
- Google Chrome 10.0.648.133
- Red Hat Enterprise Linux Extras 4
- Adobe Flash Player 10.1.102.64
- Adobe Flash Player 9.0.289.0
- Google Chrome 11.0.696.57
- Adobe Flash Player 9.0.125.0
- Google Chrome 11.0.696.65
- Adobe Flash Player 10.1.51.66
- Adobe Flash Player 10.2.154.24
- Adobe Flash Player 10.3.181.16
- Adobe Flash Player 10.0.15 .3
- Adobe Flash Player 9.0.152 .0
- Adobe Flash Player 10.0.12 .35
- Adobe Flash Player 10.3.181.34
- HP Systems Insight Manager 4.1 Sp1
- Adobe Flash Player 10.2.154.18
- Adobe Flash Player 10.0.22.87
- Adobe Flash Player 10.2.152.33
- Adobe Flash Player 10.1.92.10
- Adobe Flash Player 10.1.95.1
- Adobe Flash Player 10.1.85.3
- SuSE openSUSE 11.3
- Xerox FreeFlow Print Server (FFPS) 73.C0.41
- Xerox FreeFlow Print Server (FFPS) 73.B3.61
- Avaya Interactive Response 4.0
- Adobe Flash Player 10.0.12.10
- Google Chrome 10
- Adobe Flash Player 10.2.157.51
- HP Systems Insight Manager 4.0
- Adobe Flash Player 10.2.154.28
- Adobe Flash Player 10.3.181.14
- Adobe Flash Player 10.3.185.21
- Adobe Flash Player 10.2.153.1
- Sun Solaris 11 Express
- Adobe Flash Player 10.1.105.6
- Adobe AIR 2.6
- Adobe Flash Player 10.2.154.25
- Google Chrome 9.0.597.84
- Google Chrome 11.0.696.68
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
HTTP:STC:ADOBE:READER-PRC - HTTP: Adobe Reader Product Representation Compact Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Red Hat Desktop Extras 4
- Adobe Reader 9.4.5
- Adobe Acrobat 9.3.4
- Red Hat Enterprise Linux Supplementary 5 Server
- Red Hat Enterprise Linux Desktop Supplementary 6
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Adobe Acrobat Professional 9.1.2
- Adobe Acrobat 9.3.4
- Adobe Acrobat 10.0.1
- Adobe Acrobat 9.4.2
- Adobe Acrobat Professional 10.0.1
- Adobe Acrobat Professional 9.4.2
- Adobe Acrobat Standard 10.0.1
- Adobe Acrobat Standard 9.4.2
- Adobe Reader 10.0.1
- Adobe Reader 9.4.2
- Adobe Acrobat Standard 9.3
- Adobe Acrobat 9.3
- Adobe Reader 9.3
- Adobe Acrobat Professional 9.3
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- Adobe Reader 9.2
- Adobe Acrobat Professional 9.2
- Adobe Acrobat Standard 9.2
- Red Hat Enterprise Linux Extras 4
- Adobe Acrobat 9.3.3
- Adobe Acrobat Professional 9.1
- Adobe Acrobat 9.4.1
- Adobe Acrobat Professional 9.4.1
- Adobe Acrobat Standard 9.4.1
- Adobe Reader 9.4.1
- Adobe Acrobat 9
- Adobe Acrobat Standard 9.3.2
- Adobe Acrobat Professional 9.3.2
- Adobe Acrobat 9.3.2
- Adobe Reader 9
- Adobe Reader 9.4
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Adobe Acrobat 9.1.1
- Adobe Acrobat Standard 9.4.5
- Adobe Acrobat Standard 9.4
- Adobe Acrobat Professional 9.4
- Adobe Acrobat Standard 9.3.4
- Adobe Acrobat Professional 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat Standard 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat 10.1.1
- Adobe Acrobat Professional 10.1.1
- Adobe Acrobat Standard 10.1.1
- Adobe Reader 10.1.1
- Adobe Acrobat 9.4.6
- Adobe Acrobat 9.4.4
- Adobe Acrobat Professional 9.4.6
- Adobe Acrobat Standard 9.4.6
- Adobe Reader 9.4.6
- Adobe Reader 9.1
- SuSE openSUSE 11.4
- Adobe Acrobat Standard 9.1
- Adobe Reader 9.3.3
- Adobe Acrobat 9.3.3
- Adobe Acrobat Professional 9.3.3
- Adobe Acrobat Standard 9.3.3
- Adobe Acrobat Professional 10.0
- Adobe Reader 9.3.1
- Adobe Acrobat Professional 9.3.1
- Adobe Acrobat Standard 9.3.1
- Adobe Reader 9.1.1
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Adobe Acrobat 9.4
- Adobe Reader 9.1.3
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Standard 9.1.3
- Gentoo Linux
- Adobe Reader 9.3.2
- Adobe Acrobat 10.0.3
- Adobe Acrobat Professional 10.0.3
- Adobe Acrobat Standard 10.0.3
- Adobe Reader 10.0.3
- Adobe Reader 9.4.3
- Adobe Reader 9.4.4
- Adobe Acrobat Standard 9.4.3
- Adobe Acrobat Standard 9.4.4
- Adobe Acrobat Professional 9.4.3
- Adobe Acrobat Professional 9.4.4
- Adobe Acrobat 9.4.3
- SuSE openSUSE 11.3
- Adobe Acrobat 9.3.1
- Adobe Acrobat 10.0.2
- Adobe Acrobat Professional 10.0.2
- Adobe Acrobat Standard 10.0.2
- Adobe Reader 10.0.2
- Adobe Acrobat 9.2
- Adobe Acrobat 10.1
- Adobe Acrobat Professional 10.1
- Adobe Acrobat Standard 10.1
- Adobe Reader 10.1
- Adobe Acrobat 10.0
- Adobe Acrobat 9.4.5
- Adobe Acrobat Standard 10.0
- Adobe Reader 10.0
- Adobe Acrobat Professional 9.4.5
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
HTTP:STC:ACTIVEX:IBM-C1SIZER - HTTP: IBM SPSS SamplePower c1sizer ActiveX Control Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to use unsafe ActiveX controls in IBM SPSS SamplePower. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Supported On:
idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- ibm spss_samplepower 3.0.0.0
HTTP:STC:DL:XLS-FILTER-REC - HTTP: Microsoft Excel Malformed Filter Records Handling Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Excel 2000 SP3
- Microsoft Excel 2004 for Mac
- Microsoft Excel 2003 SP1
- Microsoft Excel 2002 SP3
- Microsoft Excel 2000
- Microsoft Excel 2002
- Microsoft Excel 2000 SR1
- Avaya Customer Interaction Express (CIE) User Interface 1.0
- Microsoft Excel 2003 SP3
- Microsoft Excel 2000 SP2
- Microsoft Excel 2003 SP2
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2003
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft OLE Structure. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Windows Server 2003 Sp2 Storage
- Microsoft Windows Server 2003 Sp2 Enterprise
- Microsoft Windows Server 2003 x64 SP2
- Microsoft Windows XP Home SP3
- Microsoft Windows XP Embedded SP3
- Microsoft Windows Server 2003 Web Edition SP2
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Media Center Edition SP3
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1 Beta 1
- Microsoft Windows Server 2003 Itanium SP2
- Microsoft Windows Server 2003 Datacenter x64 Edition SP2
- Microsoft Windows Server 2003 Sp2 X64
- Microsoft Windows Server 2003 Standard Edition SP2
- Microsoft Windows Server 2003 SP2
- Microsoft Windows Server 2003 Sp2 Datacenter
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Server 2003 Sp2 Compute Cluster
- Microsoft Windows Server 2003 Enterprise Edition Itanium Sp2 Itanium
- Microsoft Windows XP Tablet PC Edition SP3
HTTP:STC:ADOBE:ACROBAT-GETICON - HTTP: Adobe Acrobat JavaScript getIcon Method Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe Acrobat. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Server.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Adobe Acrobat Professional 7.0.7
- Adobe Reader 7.0.3
- Adobe Reader 7.0.4
- Adobe Reader 7.0.5
- Adobe Reader 7.0.6
- Adobe Reader 7.0.7
- Sun Solaris 10 Sparc
- Adobe Acrobat Professional 7.0.0
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- SuSE openSUSE 11.0
- Nortel Networks Self-Service Peri Workstation
- Adobe Reader 8.1.2 Security Update 1
- Adobe Acrobat Professional 8.1.2 Security Update 1
- Adobe Acrobat Professional 7.0.9
- SuSE Linux Desktop 10
- Nortel Networks Self-Service MPS 1000
- Adobe Acrobat Professional 7.0.5
- SuSE SUSE Linux Enterprise Desktop 11
- Nortel Networks Self-Service Peri Application
- Adobe Reader 8.1
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Standard 8.1
- Adobe Reader 7.0.9
- Gentoo Linux
- Adobe Acrobat Professional 7.1
- Adobe Reader 7.1
- Adobe Acrobat Standard 7.1
- SuSE Novell Linux Desktop 9.0.0
- SuSE openSUSE 10.3
- Adobe Acrobat Standard 8.1.1
- Adobe Acrobat Standard 8.1.2
- Adobe Acrobat Professional 8.1.2
- Adobe Reader 9
- Adobe Acrobat Standard 9
- Adobe Acrobat Professional 7.0.4
- Adobe Reader 8.0
- Adobe Acrobat Professional 8.0
- Adobe Acrobat Standard 8.0
- Adobe Acrobat Professional 9
- SuSE openSUSE 11.1
- Nortel Networks Self-Service - CCSS7
- Adobe Reader 7.0.0
- Adobe Reader 7.0.1
- Adobe Acrobat Standard 7.0.0
- Adobe Acrobat Standard 7.0.1
- Adobe Acrobat Standard 7.0.2
- Adobe Acrobat Standard 7.0.3
- Adobe Acrobat Standard 7.0.4
- Adobe Acrobat Standard 7.0.5
- Adobe Acrobat Standard 7.0.8
- Adobe Acrobat Standard 7.0.6
- Adobe Acrobat Standard 7.0.7
- Adobe Reader 7.0.2
- Adobe Acrobat Professional 7.0.1
- Adobe Acrobat Professional 7.0.2
- Adobe Acrobat Professional 7.0.3
- Adobe Reader 8.1.1
- Adobe Acrobat Professional 8.1.1
- Adobe Reader 7.0.8
- Adobe Acrobat Professional 7.0.6
- Adobe Reader 8.1.2
- Adobe Acrobat Professional 7.0.8
HTTP:MISC:WAPP-SUSP-FILEUL1 - HTTP: Multiple Web Application Parameter Suspicious File Upload Attempt 1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against few web applications. A successful attack can lead to further attacks.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
HTTP:STC:JAVA:GSUB-BOF - HTTP: Oracle Java SE GSUB ReqFeatureIndex Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Oracle Java. The vulnerability is due to invalid processing of the ReqFeatureIndex entry in the GSUB table. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- oracle jdk 1.7.0 (update_45)
- oracle jre 1.5.0 (update_55)
- oracle jdk 1.5.0 (update_55)
- oracle jre 1.6.0 (update_65)
- oracle jdk 1.6.0 (update_65)
- oracle jrockit r27.7.7
- oracle jrockit r28.2.9
- oracle jre 1.7.0 (update_45)
HTTP:STC:ADOBE:FLASH-ARGREST - HTTP: Adobe Flash Player Rest Argument Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Adobe Flash Player 9.125.0
- Sun Solaris 10 X86
- Adobe Flash Player 10.1.82.76
- Adobe Flash Player 9.0.280
- Adobe Flash Player 9.0.159.0
- Adobe Flash Player 10.1.92.10
- Sun Solaris 10 Sparc
- Adobe Flash Player 10.2.153.1
- Red Hat Enterprise Linux Supplementary 5 Server
- SuSE openSUSE 11.4
- Red Hat Enterprise Linux Desktop Supplementary 6
- Adobe Flash Player 10.0.0.584
- Adobe Flash Player 10.0.45.2
- Adobe Flash Player 9.0.262
- Adobe Flash Player 10.1 Release Candidate
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Adobe Flash Player 9.0.246 0
- Adobe Flash Player 9.0.28.0
- Adobe Flash Player 10.1.102.64
- Adobe Flash Player 9.0.28.0
- Adobe Flash Player 9.0.20
- Adobe Flash Player 10.2.159.1
- Adobe Flash Player 10.2.154.27
- Adobe Flash Player 9.0.125.0
- Xerox FreeFlow Print Server (FFPS) 73.B0.73
- Adobe Flash Player 9.0.151 .0
- Adobe Flash Player 10.2.154.24
- Adobe Flash Player 10.1.105.6
- Adobe Flash Player 9.0.246.0
- Adobe Flash Player 10.2.152.21
- Adobe Flash Player 10.0.12 .36
- Adobe Flash Player 9.0.16
- Adobe Flash Player 10.1.53.64
- Adobe Flash Player 9.0.277.0
- Adobe Flash CS5 Professional
- Adobe Flash Player 9
- Adobe Flash Player 10.0.15 .3
- Adobe Flash Player 9.0.152 .0
- Adobe Flash Player 10.0.12 .35
- Adobe Flash Player 10.1.106.16
- Adobe Flash Player 10
- Adobe Flash Player 10.1.51.66
- Adobe Flash Player 9.0.289.0
- Adobe Flash Player 9.0.115.0
- Adobe Flash Player 9.0.18D60
- Adobe Flash Player 10.2.154.18
- Adobe Flash Player 10.0.45 2
- Adobe Flash Player 9.0.124.0
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Adobe Flash Player 10.0.42.34
- Adobe Flash Player 10.0.32.18
- Adobe Flash Player 9.0.31.0
- Adobe Flash Player 10.1.92.10
- Adobe Flash Player 10.0.32 18
- Adobe Flash Player 10.1.85.3
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- SuSE openSUSE 11.3
- Adobe Flash Player 10.1.95.2
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Adobe Flash Player 9.0.114.0
- Adobe Flash CS4 Professional
- Adobe Flash Player 10.0.45 2
- Adobe Flash Player 10.2.157.51
- Gentoo Linux
- Adobe Flash Player 10.2.154.28
- Adobe Flash Player 9.0.112.0
- Adobe Flash Player 10.1.95.1
- Adobe Flash Player 10.0.12.10
- Xerox FreeFlow Print Server (FFPS) 73.A3.31
- Adobe Flash Player 9.0.48.0
- Adobe Flash Player 9.0.45.0
- Adobe Flash Player 9.0.47.0
- Adobe Flash Player 10.1.102.65
- Adobe Flash Player 10.0.22.87
- Sun Solaris 11 Express
- Adobe Flash Player 10.2.156.12
- Adobe Flash Player 9.0.20.0
- Adobe Flash Player 10.2.154.25
- Adobe Flash Player 9.0.31.0
- Adobe Flash Player 10.2.152.33
- Adobe Flash Player 10.2.154.13
- Adobe Flash Player 9.0.260.0
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft .NET Framework CLI Loader. Attackers can leverage this vulnerability to execute arbitrary code on the victim.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Avaya Messaging Application Server MM 3.1
- HP Storage Management Appliance 2.1
- Avaya Customer Interaction Express (CIE) User Interface 1.0.2
- Microsoft .NET Framework 2.0
- Microsoft .NET Framework 1.0 SP1
- Microsoft .NET Framework 1.1
- Avaya Customer Interaction Express (CIE) Server 1.0
- Avaya Customer Interaction Express (CIE) User Interface 1.0
- Avaya Messaging Application Server MM 2.0
- Microsoft .NET Framework 1.0 SP2
- Microsoft .NET Framework 1.0
- Microsoft .NET Framework 1.0 SP3
- Microsoft .NET Framework 1.1 SP1
- Avaya Messaging Application Server MM 3.0
HTTP:STC:IMG:JAVA-GIF-MEM - HTTP: Sun Java Runtime Environment GIF Parsing Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Sun Java Runtime Environment GIF. A successful attack can lead to a arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Apple Mac OS X 10.4.7
- Apple Mac OS X Server 10.4.7
- Debian Linux 5.0 Armel
- VMWare ESX Server 3.0.3
- Sun JRE (Windows Production Release) 1.4.2 12
- HP HP-UX 11.23.0
- Apple Mac OS X 10.5.4
- Apple Mac OS X Server 10.5.4
- Oracle JRockit R27.6.0-50 1.5.0 15
- Red Hat Enterprise Linux Extras 4
- Apple Mac OS X Server 10.6.3
- SuSE Open-Enterprise-Server
- Nortel Networks Self-Service WVADS
- Sun JRE (Linux Production Release) 1.3.1 08
- Sun JRE (Linux Production Release) 1.3.1 09
- Sun JRE (Linux Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.3.1 08
- Sun JRE (Solaris Production Release) 1.3.1 09
- Sun JRE (Solaris Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.4.2 02
- Sun JRE (Windows Production Release) 1.3.1 08
- Sun JRE (Windows Production Release) 1.3.1 09
- Sun JRE (Windows Production Release) 1.4.2 02
- VMWare VirtualCenter 2.5 Update 2
- Apple Mac OS X 10.4.6
- Apple Mac OS X Server 10.4.6
- SuSE SUSE Linux Enterprise Server 11 DEBUGINFO
- Apple Mac OS X 10.6.2
- Apple Mac OS X Server 10.6.2
- HP HP-UX 11.31
- Apple Mac OS X 10.4.10
- Apple Mac OS X Server 10.4.10
- Pardus Linux 2008
- SuSE SUSE Linux Enterprise Server 11
- Sun JRE (Linux Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.6.0 07
- Sun JRE (Linux Production Release) 1.5.0 16
- Sun JRE (Linux Production Release) 1.4.2 18
- Sun JRE (Solaris Production Release) 1.4.2 18
- Sun JRE (Windows Production Release) 1.4.2 18
- Sun JRE (Linux Production Release) 1.3.1 23
- Sun JRE (Solaris Production Release) 1.3.1 23
- Sun JRE (Windows Production Release) 1.3.1 23
- Sun SDK (Linux Production Release) 1.4.2 17
- Sun SDK (Linux Production Release) 1.4.2 18
- SuSE SUSE Linux Enterprise 11
- Sun SDK (Linux Production Release) 1.3.1 22
- SuSE Novell Linux POS 9
- Sun SDK (Solaris Production Release) 1.3.1 23
- Sun SDK (Solaris Production Release) 1.4.2 17
- Sun JRE (Windows Production Release) 1.1.8 005
- Sun JRE (Windows Production Release) 1.1.7 B 007
- Sun SDK (Windows Production Release) 1.3.1 22
- Sun JRE (Windows Production Release) 1.1.6 09
- Sun SDK (Windows Production Release) 1.3.1 23
- Sun SDK (Windows Production Release) 1.4.2 17
- Sun SDK (Windows Production Release) 1.4.2 18
- Sun JRE (Solaris Production Release) 1.1.8 12
- Sun JDK (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.4.2 17
- Sun JRE (Solaris Production Release) 1.4.2 17
- Sun JRE (Windows Production Release) 1.4.2 17
- Sun JRE (Linux Production Release) 1.3.1 22
- Sun JRE (Solaris Production Release) 1.3.1 22
- Sun JRE (Windows Production Release) 1.3.1 22
- Sun JDK (Linux Production Release) 1.5.0 15
- Sun JDK (Linux Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.5.0 15
- Sun JRE (Solaris Production Release) 1.5.0 15
- Sun JRE (Linux Production Release) 1.6.0 06
- Sun JDK (Linux Production Release) 1.5.0 14
- Apple Mac OS X Server 10.4.8
- Sun SDK (Linux Production Release) 1.3.1 23
- Sun JRE (Linux Production Release) 1.4.2 03
- Sun JRE (Solaris Production Release) 1.4.2 03
- Sun JRE (Windows Production Release) 1.4.2 03
- Sun SDK (Linux Production Release) 1.4.2 01
- Sun SDK (Linux Production Release) 1.4.2 03
- Sun JRE (Linux Production Release) 1.4.2 04
- Sun JRE (Solaris Production Release) 1.4.2 04
- Sun JRE (Windows Production Release) 1.4.2 04
- Sun SDK (Windows Production Release) 1.4.2 04
- Sun SDK (Linux Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 03
- Sun SDK (Solaris Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2 03
- Sun JRE (Linux Production Release) 1.4.2 12
- Avaya CMS Server 15.0
- Sun SDK (Solaris Production Release) 1.2.2 05A
- Sun SDK (Solaris Production Release) 1.2.1
- Sun JRE (Solaris Production Release) 1.2.2 05A
- Sun JRE (Solaris Production Release) 1.2.1
- Sun JRE (Solaris Production Release) 1.1.8 10
- Sun JRE (Solaris Production Release) 1.1.7 B
- Sun JRE (Solaris Production Release) 1.1.6
- Sun SDK (Linux Production Release) 1.2.2 005
- Sun JRE (Linux Production Release) 1.2.2 005
- Apple Mac OS X 10.4.0
- Apple Mac OS X Server 10.4.0
- Sun JRE (Linux Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.3.1
- SuSE SUSE Linux Enterprise Server 10
- SuSE SUSE Linux Enterprise Server 9
- Apple Mac OS X Server 10.4.3
- Apple Mac OS X 10.4.3
- Sun SDK (Linux Production Release) 1.4.2 16
- Sun SDK (Solaris Production Release) 1.4.2 16
- Sun SDK (Windows Production Release) 1.4.2 16
- Sun SDK (Windows Production Release) 1.3.1 20
- Sun SDK (Linux Production Release) 1.3.1 20
- Sun JRE (Linux Production Release) 1.3.1 21
- Sun JRE (Solaris Production Release) 1.3.1 21
- Sun JRE (Windows Production Release) 1.3.1 21
- Sun SDK (Linux Production Release) 1.3.1 21
- Sun SDK (Solaris Production Release) 1.3.1 21
- Sun SDK (Windows Production Release) 1.3.1 21
- Sun JRE (Linux Production Release) 1.3.1 21
- VMWare Server 2.0
- Apple Mac OS X 10.5.5
- Apple Mac OS X Server 10.5.5
- Nortel Networks Enterprise Network Management System
- Sun SDK (Windows Production Release) 1.4.1 03
- SuSE SUSE Linux Enterprise Server 10 SP1
- Sun JRE (Linux Production Release) 1.3.1 18
- Sun JRE (Linux Production Release) 1.5.0 07
- Sun JRE (Linux Production Release) 1.3.1 19
- Sun JRE (Windows Production Release) 1.3.1 14
- Debian Linux 5.0 Alpha
- Sun JDK (Linux Production Release) 1.5.0 01
- Sun JDK (Linux Production Release) 1.5.0 02
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Desktop Extras 4
- Sun SDK (Linux Production Release) 1.4.2 15
- Sun SDK (Solaris Production Release) 1.4.2 15
- Sun SDK (Windows Production Release) 1.4.2 15
- Sun JRE (Linux Production Release) 1.4.2 06
- Sun JRE (Windows Production Release) 1.4.2 06
- Sun JRE (Solaris Production Release) 1.4.2 06
- Sun SDK (Windows Production Release) 1.4.1 02
- Nortel Networks Self-Service MPS 500
- Nortel Networks Self-Service MPS 1000
- Nortel Networks Self-Service Speech Server
- Sun SDK (Linux Production Release) 1.4.0 .0 02
- Sun JRE (Linux Production Release) 1.3.1 16
- Sun JRE (Linux Production Release) 1.5.0 15
- Apple Mac OS X 10.5
- Apple Mac OS X 10.6
- Apple Mac OS X Server 10.6
- Sun JRE (Windows Production Release) 1.4.2 05
- Oracle JRockit R27.6.2
- Apple Mac OS X Server 10.4.1
- Sun JRE (Linux Production Release) 1.2.2 12
- Red Hat Network Satellite (for RHEL 5 Server) 5.3
- Sun SDK (Linux Production Release) 1.4.2 05
- Apple Mac OS X 10.6.3
- Sun JDK (Linux Production Release) 1.5.0 .0 05
- Sun JRE (Linux Production Release) 1.3.0 .0
- Sun JRE (Windows Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.3.0
- Sun SDK (Windows Production Release) 1.3.0 .0 05
- Sun SDK (Linux Production Release) 1.3.1 08
- Sun SDK (Linux Production Release) 1.3.1 09
- Sun SDK (Linux Production Release) 1.3.1 10
- Sun SDK (Linux Production Release) 1.3.1 11
- Sun SDK (Linux Production Release) 1.3.1 12
- Sun SDK (Linux Production Release) 1.3.1 13
- Sun SDK (Linux Production Release) 1.3.1 14
- Sun SDK (Solaris Production Release) 1.3.1 08
- Sun SDK (Solaris Production Release) 1.3.1 09
- Sun SDK (Solaris Production Release) 1.3.1 10
- Sun SDK (Solaris Production Release) 1.3.1 11
- Sun SDK (Solaris Production Release) 1.3.1 12
- Sun SDK (Solaris Production Release) 1.3.1 13
- Sun SDK (Solaris Production Release) 1.3.1 14
- Sun SDK (Windows Production Release) 1.3.1 08
- Sun SDK (Windows Production Release) 1.3.1 09
- Sun SDK (Windows Production Release) 1.3.1 10
- Sun SDK (Windows Production Release) 1.3.1 11
- Sun SDK (Windows Production Release) 1.3.1 12
- Sun SDK (Windows Production Release) 1.3.1 13
- Sun SDK (Windows Production Release) 1.3.1 14
- Sun JRE (Linux Production Release) 1.3.1 10
- Sun JRE (Linux Production Release) 1.3.1 11
- Sun JRE (Linux Production Release) 1.3.1 13
- Sun JRE (Linux Production Release) 1.3.1 14
- Sun JRE (Solaris Production Release) 1.3.1 10
- Sun JRE (Solaris Production Release) 1.3.1 11
- Sun JRE (Solaris Production Release) 1.3.1 12
- Sun JRE (Solaris Production Release) 1.3.1 13
- Sun JRE (Solaris Production Release) 1.3.1 14
- Sun JRE (Windows Production Release) 1.3.1 10
- Sun JRE (Windows Production Release) 1.3.1 11
- Sun JRE (Windows Production Release) 1.3.1 12
- Sun JRE (Windows Production Release) 1.3.1 13
- Debian Linux 5.0
- Sun JRE (Linux Production Release) 1.3.1 12
- Debian Linux 5.0 Amd64
- Debian Linux 5.0 Arm
- Debian Linux 5.0 Hppa
- Debian Linux 5.0 Ia-32
- Debian Linux 5.0 Ia-64
- Debian Linux 5.0 M68k
- Debian Linux 5.0 Mips
- Debian Linux 5.0 Mipsel
- Debian Linux 5.0 Powerpc
- Debian Linux 5.0 S/390
- Debian Linux 5.0 Sparc
- Sun JRE (Solaris Production Release) 1.3.0 03
- Sun SDK (Solaris Production Release) 1.2.2 10
- Sun JRE (Linux Production Release) 1.3.0 .0 05
- Sun SDK (Solaris Production Release) 1.3.0
- Sun JRE (Linux Production Release) 1.6.0 10
- Sun SDK (Windows Production Release) 1.2.2 010
- Sun SDK (Solaris Production Release) 1.2.2 12
- Sun JRE (Linux Production Release) 1.4.2 15
- Sun JRE (Windows Production Release) 1.4.2 15
- Sun JRE (Solaris Production Release) 1.4.2 15
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Sun SDK (Linux Production Release) 1.2.2 12
- Apple Mac OS X Server 10.6.1
- Apple Mac OS X 10.6.1
- Sun SDK (Windows Production Release) 1.1.8 007
- Red Hat Enterprise Linux 5 Server
- Sun JRE (Solaris Production Release) 1.3.1 18
- Sun JRE (Windows Production Release) 1.3.1 18
- Sun JRE (Windows Production Release) 1.3.1 19
- Sun JRE (Solaris Production Release) 1.2.2 11
- Sun SDK (Linux Production Release) 1.4.2 09
- Sun SDK (Linux Production Release) 1.4.2 10
- Sun SDK (Linux Production Release) 1.4.2 11
- Sun SDK (Linux Production Release) 1.4.2 12
- Sun SDK (Linux Production Release) 1.4.2 13
- Sun SDK (Linux Production Release) 1.4.2 14
- Sun SDK (Solaris Production Release) 1.4.2 09
- Sun SDK (Solaris Production Release) 1.4.2 10
- Sun SDK (Solaris Production Release) 1.4.2 11
- Sun SDK (Solaris Production Release) 1.4.2 12
- Sun SDK (Solaris Production Release) 1.4.2 13
- Sun SDK (Solaris Production Release) 1.4.2 14
- Sun SDK (Windows Production Release) 1.4.2 09
- Sun SDK (Windows Production Release) 1.4.2 10
- Sun SDK (Windows Production Release) 1.4.2 11
- Sun SDK (Windows Production Release) 1.4.2 12
- Sun SDK (Windows Production Release) 1.4.2 13
- Sun SDK (Windows Production Release) 1.4.2 14
- Sun JRE (Windows Production Release) 1.4.2 07
- Sun JRE (Windows Production Release) 1.4.2 08
- Sun JRE (Windows Production Release) 1.4.2 09
- Sun JRE (Windows Production Release) 1.4.2 10
- Sun JRE (Windows Production Release) 1.4.2 11
- Sun JRE (Windows Production Release) 1.4.2 13
- Sun JRE (Windows Production Release) 1.4.2 14
- Sun JRE (Solaris Production Release) 1.4.2 07
- Sun JRE (Solaris Production Release) 1.4.2 08
- Sun JRE (Solaris Production Release) 1.4.2 09
- Sun JRE (Solaris Production Release) 1.4.2 10
- Sun JRE (Solaris Production Release) 1.4.2 11
- Sun JRE (Solaris Production Release) 1.4.2 13
- Sun JRE (Solaris Production Release) 1.4.2 14
- Sun JRE (Linux Production Release) 1.4.2 10
- Sun JRE (Linux Production Release) 1.4.2 11
- Sun JRE (Linux Production Release) 1.4.2 13
- Sun JRE (Linux Production Release) 1.4.2 14
- Sun SDK (Windows Production Release) 1.3.0 .0 02
- Sun JRE (Windows Production Release) 1.3.0 .0 02
- Sun SDK (Windows Production Release) 1.2.2 007
- Sun JRE (Windows Production Release) 1.2.2 007
- Sun JRE (Windows Production Release) 1.2.1
- Sun SDK (Windows Production Release) 1.2.1
- Sun SDK (Windows Production Release) 1.2.0
- Sun JRE (Windows Production Release) 1.2.0
- Sun JRE (Solaris Production Release) 1.3.0 .0 02
- Sun SDK (Solaris Production Release) 1.3.0 .0 02
- Sun JRE (Solaris Production Release) 1.2.2 07
- Sun SDK (Solaris Production Release) 1.2.2 07
- Sun JRE (Solaris Production Release) 1.2.0
- Sun SDK (Solaris Production Release) 1.2.0
- Sun JRE (Linux Production Release) 1.3.0 .0 03
- Sun SDK (Linux Production Release) 1.3.0 .0 02
- Sun JRE (Linux Production Release) 1.6.0 11
- Sun SDK (Linux Production Release) 1.2.2 007
- Sun JRE (Linux Production Release) 1.5.0 06
- Apple Mac OS X 10.5.3
- Sun JRE (Linux Production Release) 1.4.2 09
- Sun SDK (Solaris Production Release) 1.2.2 07A
- Sun JRE (Linux Production Release) 1.3.1 17
- Apple Mac OS X 10.4.11
- Apple Mac OS X Server 10.4.11
- Sun JDK (Linux Production Release) 1.6.0 10
- Sun JDK (Linux Production Release) 1.6.0 11
- Sun JDK (Linux Production Release) 1.5.0 17
- Sun SDK (Solaris Production Release) 1.4.2 19
- Sun SDK (Windows Production Release) 1.4.2 19
- Sun JRE (Linux Production Release) 1.4.1 03
- Sun JRE (Solaris Production Release) 1.4.1 03
- Sun JRE (Windows Production Release) 1.4.1 03
- Sun SDK (Linux Production Release) 1.3.1 24
- Sun SDK (Solaris Production Release) 1.4.1 03
- Sun SDK (Linux Production Release) 1.4.1 03
- Apple Mac OS X 10.5.1
- Apple Mac OS X Server 10.5
- Apple Mac OS X Server 10.5.1
- VMWare ESX Server 4.0
- VMWare ESX Server 3.5 ESX350-200906407-S
- VMWare vMA 4.0
- Mandriva Linux Mandrake 2009.1
- Mandriva Linux Mandrake 2009.1 X86 64
- Nortel Networks Self-Service Peri Application
- Nortel Networks Contact Center - CCT
- Nortel Networks Self-Service CCXML
- Nortel Networks Self Service VoiceXML
- VMWare VirtualCenter 2.5.Update 3 Build 11983
- Sun JRE (Windows Production Release) 1.3.1 05
- Red Hat Network Satellite (for RHEL 4 AS) 5.3
- Sun JDK (Linux Production Release) 1.5.0 07
- Apple Mac OS X Server 10.5.3
- Sun SDK (Solaris Production Release) 1.3.1 05
- Sun SDK (Solaris Production Release) 1.2.2 13
- Oracle JRockit R27.1.0
- Ubuntu Ubuntu Linux 8.10 I386
- Apple Mac OS X 10.4.4
- Apple Mac OS X Server 10.4.4
- Apple Mac OS X 10.4.5
- Apple Mac OS X Server 10.4.5
- Sun JRE (Windows Production Release) 1.4.1 07
- VMWare VirtualCenter 2.5
- HP HP-UX B.11.11
- Sun JRE (Linux Production Release) 1.4.2 08
- VMWare VirtualCenter 2.5 Update 1
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0
- VMWare VirtualCenter 2.0.2
- VMWare VirtualCenter 2.0.2 Update 1
- Sun JRE (Windows Production Release) 1.4.1 01
- VMWare VirtualCenter 2.0.2 Update 2
- Sun JRE (Solaris Production Release) 1.3.1 05
- Sun JDK (Linux Production Release) 1.5.0.0 12
- Avaya Interactive Response 3.0
- Oracle JRockit R27.6.3
- Sun JRE (Solaris Production Release) 1.3.0 01
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Apple Mac OS X 10.4.9
- HP HP-UX 11.11.0
- Sun JDK (Linux Production Release) 1.5.0.0 03
- Sun SDK (Windows Production Release) 1.3.1 06
- Apple Mac OS X 10.5.7
- Apple Mac OS X Server 10.5.7
- Sun JDK (Linux Production Release) 1.5.0.0 04
- Sun JRE (Solaris Production Release) 1.3.1
- Sun JRE (Linux Production Release) 1.3.1 15
- Sun SDK (Windows Production Release) 1.3.1 15
- Sun SDK (Linux Production Release) 1.3.1 15
- Sun SDK (Solaris Production Release) 1.3.1 15
- Sun SDK (Solaris Production Release) 1.4.2 08
- Sun SDK (Linux Production Release) 1.4.2 08
- Sun SDK (Windows Production Release) 1.4.2 08
- Sun JRE (Linux Production Release) 1.3.1 02
- Gentoo Linux
- Sun SDK (Solaris Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.4.2
- Sun JRE (Solaris Production Release) 1.4.2
- Sun JRE (Windows Production Release) 1.4.2
- Apple Mac OS X 10.5.6
- Apple Mac OS X Server 10.5.6
- Sun JRE (Windows Production Release) 1.4.0 .0 01
- Sun JRE (Windows Production Release) 1.3.1 01
- Sun JRE (Windows Production Release) 1.3.1 04
- Sun JRE (Windows Production Release) 1.2.2 12
- Sun SDK (Windows Production Release) 1.4.0 .0 01
- Sun SDK (Windows Production Release) 1.3.1 04
- Sun JRE (Solaris Production Release) 1.4.0 .0 01
- Sun JRE (Solaris Production Release) 1.3.1 04
- Sun JRE (Solaris Production Release) 1.2.2 012
- Sun JRE (Linux Production Release) 1.2.2 006
- Sun JRE (Linux Production Release) 1.2.2 004
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- SuSE SUSE Linux Enterprise Server 10 SP2
- Sun JRE (Windows Production Release) 1.3.1
- Sun JDK (Linux Production Release) 1.5.0.0 08
- Sun JDK (Linux Production Release) 1.5.0.0 09
- Sun JRE (Linux Production Release) 1.5.0 14
- Ubuntu Ubuntu Linux 8.10 Amd64
- Sun JRE (Linux Production Release) 1.4.1 02
- Sun JRE (Solaris Production Release) 1.4.1 02
- Sun JRE (Windows Production Release) 1.4.1 02
- Sun JRE (Linux Production Release) 1.3.1 07
- Sun JRE (Solaris Production Release) 1.3.1 07
- Sun JRE (Windows Production Release) 1.3.1 07
- Sun SDK (Linux Production Release) 1.3.1 07
- Sun SDK (Solaris Production Release) 1.3.1 07
- Sun SDK (Windows Production Release) 1.3.1 07
- Sun SDK (Linux Production Release) 1.4.1 02
- Sun SDK (Solaris Production Release) 1.4.1 02
- Sun JRE (Linux Production Release) 1.4.2 10-B03
- Sun JRE (Linux Production Release) 1.2.2 010
- Sun JRE (Linux Production Release) 1.3.0 .0 02
- Sun JRE (Linux Production Release) 1.3.0 .0 01
- Sun JRE (Windows Production Release) 1.3.0
- Sun JRE (Windows Production Release) 1.2.2 010
- Sun JRE (Windows Production Release) 1.1.8 007
- Sun JRE (Windows Production Release) 1.1.8
- Sun JRE (Windows Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.3.0 .0 04
- Sun JRE (Linux Production Release) 1.2.2 011
- Sun JRE (Linux Production Release) 1.2.2 003
- Sun JRE (Solaris Production Release) 1.3.1 20
- Sun JRE (Windows Production Release) 1.3.1 20
- Sun SDK (Windows Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.1.8 13
- Sun JRE (Solaris Production Release) 1.1.8
- Sun JRE (Solaris Production Release) 1.2.2 010
- Sun JRE (Solaris Production Release) 1.2.2
- Sun SDK (Solaris Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.3.1 02
- Sun JRE (Linux Production Release) 1.4.2 07
- Sun SDK (Linux Production Release) 1.3.1 02
- Apple Mac OS X Server 10.4.9
- Sun SDK (Linux Production Release) 1.2.2 010
- Sun JRE (Windows Production Release) 1.2.2 015
- Sun JRE (Windows Production Release) 1.4.0 .0 04
- Sun JRE (Solaris Production Release) 1.4.0 .0 04
- Sun SDK (Solaris Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.4.0 .0 04
- Sun SDK (Solaris Production Release) 1.3.0 02
- Sun JRE (Solaris Production Release) 1.3.1 15
- Sun JRE (Windows Production Release) 1.3.1 15
- Sun JRE (Solaris Production Release) 1.3.1 16
- Sun JRE (Solaris Production Release) 1.3.1 17
- Sun JRE (Windows Production Release) 1.3.0 .0 04
- Sun JRE (Windows Production Release) 1.3.1 17
- Sun SDK (Solaris Production Release) 1.4.0 .0 4
- Sun SDK (Windows Production Release) 1.4.0 .0 4
- Sun SDK (Windows Production Release) 1.2.2 015
- Sun JRE (Solaris Production Release) 1.3.1 19
- Sun SDK (Linux Production Release) 1.2.2 015
- Sun JRE (Windows Production Release) 1.3.0 01
- Sun JRE (Solaris Production Release) 1.3.1 01A
- Sun SDK (Solaris Production Release) 1.2.2 11
- Sun JRE (Linux Production Release) 1.3.1 04
- SuSE openSUSE 11.1
- Avaya Proactive Contact 3.0
- Red Hat Enterprise Linux Desktop 5 Client
- Red Hat Enterprise Linux Supplementary 5 Server
- Sun SDK (Solaris Production Release) 1.3.1 22
- Sun SDK (Linux Production Release) 1.4.0 .0 4
- VMWare VirtualCenter 2.0.2 Update 3
- VMWare VirtualCenter 2.0.2 Update 4
- VMWare VirtualCenter 2.5 Update 5
- VMWare VirtualCenter 2.0.2 Update 5
- Apple Mac OS X 10.5.2
- Apple Mac OS X Server 10.5.2
- Red Hat Red Hat Network Satellite (for RHEL 4) 5.1
- SuSE openSUSE 10.3
- Sun JRE (Windows Production Release) 1.1.8 009
- Sun JRE (Linux Production Release) 1.3.1 03
- Sun JRE (Solaris Production Release) 1.1.8 009
- Sun JRE (Solaris Production Release) 1.2.2 011
- Sun JRE (Solaris Production Release) 1.3.1 03
- Sun JRE (Windows Production Release) 1.2.2 011
- Sun JRE (Windows Production Release) 1.3.1 03
- Sun SDK (Linux Production Release) 1.2.2 011
- Sun SDK (Linux Production Release) 1.3.1 03
- Sun SDK (Windows Production Release) 1.2.2 011
- Sun SDK (Windows Production Release) 1.3.1 03
- Sun SDK (Solaris Production Release) 1.3.1 03
- Sun SDK (Solaris Production Release) 1.2.2 011
- HP HP-UX B.11.31
- Sun JRE (Linux Production Release) 1.2.2 015
- VMWare ESX Server 3.5 ESX350-200904401-BG
- VMWare ESXi Server 4.0
- VMWare vCenter 4.0
- Mandriva Enterprise Server 5 X86 64
- SuSE SUSE Linux Enterprise Desktop 11
- Sun SDK (Solaris Production Release) 1.3.1 20
- Nortel Networks Enterprise VoIP TM-CS1000
- Sun SDK (Solaris Production Release) 1.4.2 18
- Sun JDK (Linux Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.4.2 16
- Sun JRE (Solaris Production Release) 1.4.2 16
- Sun JRE (Windows Production Release) 1.4.2 16
- Sun JDK (Linux Production Release) 1.5.0 13
- Sun JRE (Linux Production Release) 1.5.0 12
- Sun JRE (Linux Production Release) 1.5.0 13
- Sun JDK (Linux Production Release) 1.6.0 03
- Apple Mac OS X 10.4.1
- Sun JRE (Linux Production Release) 1.6.0 03
- SuSE openSUSE 11.0
- Sun JRE (Solaris Production Release) 1.4.2 05
- Sun SDK (Solaris Production Release) 1.4.2 05
- Sun JRE (Linux Production Release) 1.2.2 007
- Sun SDK (Windows Production Release) 1.4.2 05
- Sun JRE (Windows Production Release) 1.3.1 01A
- Sun SDK (Windows Production Release) 1.3.1 01A
- Sun JDK (Linux Production Release) 1.5.0 06
- Sun JRE (Windows Production Release) 1.3.0 .0 05
- Sun JRE (Windows Production Release) 1.1.8 008
- Sun JRE (Solaris Production Release) 1.3.1 01
- Sun SDK (Solaris Production Release) 1.3.1 01
- Sun SDK (Solaris Production Release) 1.3.0 05
- Sun JRE (Solaris Production Release) 1.3.0 .0 05
- Sun JRE (Solaris Production Release) 1.1.8 14
- Sun SDK (Linux Production Release) 1.3.1 01
- Sun JRE (Linux Production Release) 1.3.1 01
- Sun JRE (Windows Production Release) 1.3.1 16
- Sun SDK (Linux Production Release) 1.3.0 05
- Apple Mac OS X 10.4.8
- Sun SDK (Windows Production Release) 1.2.2 012
- Sun JRE (Linux Production Release) 1.4.0
- Sun SDK (Linux Production Release) 1.4.0
- Sun SDK (Windows Production Release) 1.4.0
- Sun JRE (Windows Production Release) 1.4.0
- Sun SDK (Solaris Production Release) 1.4.0
- Sun JRE (Solaris Production Release) 1.4.0
- Sun JRE (Linux Production Release) 1.5.0 08
- Sun JRE (Linux Production Release) 1.5.0 09
- Sun JRE (Linux Production Release) 1.5.0 10
- Sun JDK (Linux Production Release) 1.5.0.0 11
- Sun JRE (Linux Production Release) 1.5.0 11
- Sun SDK (Solaris Production Release) 1.3.1 20
- Sun JDK (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.3.1 20
- Sun JRE (Linux Production Release) 1.5.0 17
- Sun JRE (Solaris Production Release) 1.4.2 19
- Sun JRE (Windows Production Release) 1.4.2 19
- Sun JRE (Linux Production Release) 1.4.2 19
- Sun SDK (Windows Production Release) 1.4.1
- Sun JRE (Windows Production Release) 1.4.1
- Sun JRE (Windows Production Release) 1.4.0 .0 02
- Sun SDK (Windows Production Release) 1.4.0 .0 02
- Sun SDK (Windows Production Release) 1.3.1 05
- Sun JRE (Windows Production Release) 1.4.2 01
- Sun JRE (Windows Production Release) 1.2.2 013
- Sun SDK (Windows Production Release) 1.2.2 013
- Sun JRE (Solaris Production Release) 1.4.1
- Sun SDK (Solaris Production Release) 1.4.1
- Sun SDK (Solaris Production Release) 1.4.0 .0 02
- Sun JRE (Solaris Production Release) 1.4.0 .0 02
- HP Serviceguard Manager A.05.00
- HP Serviceguard Manager A.05.01
- HP Serviceguard Manager A.05.02
- Sun JRE (Solaris Production Release) 1.2.2 013
- Sun JRE (Linux Production Release) 1.2.2 013
- Sun SDK (Linux Production Release) 1.2.2 13
- Sun SDK (Linux Production Release) 1.3.1 05
- Sun JRE (Linux Production Release) 1.3.1 05
- Sun JRE (Linux Production Release) 1.4.0 .0 02
- VMWare ESX Server 3.5 ESX350-200910401-SG
- Sun SDK (Linux Production Release) 1.4.1
- Sun JRE (Linux Production Release) 1.4.1
- Oracle JRockit R27.6.0
- VMWare ESX Server 3.5
- Sun SDK (Windows Production Release) 1.4.1 01
- Sun SDK (Windows Production Release) 1.4.0 .0 03
- Sun JRE (Windows Production Release) 1.4.0 .0 03
- Sun JRE (Windows Production Release) 1.3.1 06
- Sun JRE (Solaris Production Release) 1.3.0 04
- Sun SDK (Windows Production Release) 1.2.2 014
- Sun JRE (Windows Production Release) 1.2.2 014
- Sun JRE (Linux Production Release) 1.3.1 01A
- Sun SDK (Solaris Production Release) 1.4.1 01
- Sun JRE (Solaris Production Release) 1.4.1 01
- Sun JRE (Solaris Production Release) 1.4.0 .0 03
- Sun SDK (Solaris Production Release) 1.4.0 .0 03
- Sun JDK (Linux Production Release) 1.5.0 0 10
- Sun JRE (Solaris Production Release) 1.3.1 06
- Sun JRE (Solaris Production Release) 1.2.2 014
- Sun SDK (Solaris Production Release) 1.2.2 14
- Sun SDK (Linux Production Release) 1.4.1 01
- Sun JRE (Linux Production Release) 1.4.1 01
- Sun JRE (Linux Production Release) 1.4.0 .0 03
- Sun SDK (Linux Production Release) 1.4.0 .0 03
- Sun SDK (Linux Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.2.2 014
- Sun SDK (Linux Production Release) 1.2.2 014
- Ubuntu Ubuntu Linux 8.10 Lpia
- Ubuntu Ubuntu Linux 8.10 Powerpc
- Ubuntu Ubuntu Linux 8.10 Sparc
- Apple Mac OS X 10.4.2
- Apple Mac OS X Server 10.4.2
- Sun JRE (Linux Production Release) 1.4.2 05
- Sun JRE (Linux Production Release) 1.4.2 02
- Sun SDK (Linux Production Release) 1.4.2 02
- Sun SDK (Linux Production Release) 1.4.2
- Sun SDK (Solaris Production Release) 1.3.1 24
- Sun JRE (Solaris Production Release) 1.4.2 12
- Sun SDK (Linux Production Release) 1.4.2 19
- Avaya Interactive Response 4.0
- Sun SDK (Windows Production Release) 1.3.1 24
- Red Hat Enterprise Linux Extras 4.8.Z
- Red Hat Enterprise Linux Supplementary EUS 5.3.Z
APP:NOVELL:GWMGR-INFODISC - APP: Novell Groupwise Messenger Server Process Memory Information Disclosure
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Novell Messenger. A successful attack can lead to information disclosure. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Novell GroupWise Messenger 2.0.2
- Novell GroupWise Messenger 2.0
- Novell Messenger 2.2.0
- Novell Messenger 2.1
- Novell GroupWise Messenger 2.0.3
CHAT:MSN:PIDGIN-MSN-IO - CHAT: Pidgin MSN MSNP2P Message Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Pidgin MSN MSNP2P. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Pidgin 2.0.0
- Adium 1.3
- Adium 1.2.7
- Adium 1.2.6
- Adium 1.2.5
- Red Hat Enterprise Linux Desktop 5 Client
- Ubuntu Ubuntu Linux 6.06 LTS Powerpc
- Red Hat Enterprise Linux Optional Productivity Application 5 Server
- Ubuntu Ubuntu Linux 6.06 LTS Amd64
- Red Hat Desktop 4.0.0
- Ubuntu Ubuntu Linux 8.04 LTS Amd64
- Ubuntu Ubuntu Linux 8.04 LTS I386
- Ubuntu Ubuntu Linux 8.04 LTS Lpia
- Ubuntu Ubuntu Linux 8.04 LTS Powerpc
- Ubuntu Ubuntu Linux 8.04 LTS Sparc
- Red Hat Desktop 3.0.0
- Ubuntu Ubuntu Linux 7.10 Lpia
- Rob Flynn Gaim 0.59.8
- Pidgin 2.2.1
- Pidgin 2.2.0
- Pidgin 2.1.0
- Rob Flynn Gaim 0.82.1
- Rob Flynn Gaim 1.0.0
- Rob Flynn Gaim 1.0.1
- Rob Flynn Gaim 1.0.2
- Ubuntu Ubuntu Linux 6.06 LTS I386
- Rob Flynn Gaim 0.59.0
- Rob Flynn Gaim 0.51.0
- Rob Flynn Gaim 0.55.0
- Rob Flynn Gaim 0.54.0
- Rob Flynn Gaim 0.53.0
- Rob Flynn Gaim 0.52.0
- Rob Flynn Gaim 1.3.1
- Rob Flynn Gaim 0.58.0
- Rob Flynn Gaim 0.57.0
- Rob Flynn Gaim 0.56.0
- Mandriva Linux Mandrake 2008.0
- Mandriva Linux Mandrake 2008.0 X86 64
- Ubuntu Ubuntu Linux 7.10 I386
- Ubuntu Ubuntu Linux 7.10 Powerpc
- Ubuntu Ubuntu Linux 7.10 Sparc
- Rob Flynn Gaim 1.2.0
- Mandriva Linux Mandrake 2008.1
- Mandriva Linux Mandrake 2008.1 X86 64
- Pardus Linux 2007
- Pardus Linux 2008
- Rob Flynn Gaim 0.78.0
- Rob Flynn Gaim 0.75.0
- Debian Linux 4.0 S/390
- Rob Flynn Gaim 1.2.1
- Rob Flynn Gaim 0.73.0
- Red Hat Enterprise Linux AS 3
- Red Hat Enterprise Linux ES 3
- Rob Flynn Gaim 0.72.0
- Rob Flynn Gaim 1.1.4
- rPath rPath Linux 1
- Red Hat Enterprise Linux Desktop Workstation 5 Client
- Pidgin 2.4.2
- Rob Flynn Gaim 0.60.0
- Mandriva Corporate Server 3.0.0
- Rob Flynn Gaim 0.10.0 X
- Rob Flynn Gaim 0.10.3
- Rob Flynn Gaim 0.82.0
- Gentoo Linux
- Ubuntu Ubuntu Linux 7.10 Amd64
- Debian Linux 4.0 Alpha
- Debian Linux 4.0 Amd64
- Debian Linux 4.0 Arm
- Debian Linux 4.0 Hppa
- Debian Linux 4.0 Ia-32
- Debian Linux 4.0 Ia-64
- Debian Linux 4.0 M68k
- Debian Linux 4.0 Mips
- Debian Linux 4.0 Mipsel
- Debian Linux 4.0 Powerpc
- Rob Flynn Gaim 0.74.0
- Debian Linux 4.0 Sparc
- Debian Linux 4.0
- Rob Flynn Gaim 0.71.0
- Rob Flynn Gaim 0.70.0
- Rob Flynn Gaim 0.69.0
- Rob Flynn Gaim 0.68.0
- Rob Flynn Gaim 0.67.0
- Rob Flynn Gaim 0.66.0
- Rob Flynn Gaim 0.65.0
- Rob Flynn Gaim 0.64.0
- Rob Flynn Gaim 0.63.0
- Rob Flynn Gaim 0.62.0
- Rob Flynn Gaim 0.61.0
- Rob Flynn Gaim 0.77.0
- Red Hat Enterprise Linux AS 4
- Red Hat Enterprise Linux ES 4
- Red Hat Enterprise Linux WS 4
- Red Hat Enterprise Linux Desktop Version 4
- Rob Flynn Gaim 0.59.1
- Ubuntu Ubuntu Linux 6.06 LTS Sparc
- Mandriva Corporate Server 3.0.0 X86 64
- Rob Flynn Gaim 1.1.3
- Rob Flynn Gaim 1.1.2
- Rob Flynn Gaim 1.1.1
- Pidgin 2.4.1
- Rob Flynn Gaim 0.50.0
- Rob Flynn Gaim 1.3.0 .0
- Pidgin 2.2.2
- Pidgin 2.0.2
TFTP:TRANSPORT-BOF - TFTP: Multiple Vendors TFTP Transporting Mode Remote Buffer Overflow Vulnerability
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known buffer-overflow vulnerability against TFTPUtil GUI and 3COM TFTP server, a trivial file transfer protocol (TFTP) program. A successful attack allows an attacker to corrupt and overwrite memory and gain control of the affected application. An unsuccessful attack, can result in a denial-of-service condition.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
HTTP:STC:ADOBE:SWF-ACTIONSCRIPT - HTTP: Adobe Flash Player ActionScript Function Variable Arguments Information Disclosure
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known information disclosure vulnerability in the Adobe Flash Player ActionScript Function. It is due to insufficient validation of user-supplied input. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Google Chrome 5.0.375.86
- Sun Solaris 10 Sparc
- Google Chrome 5.0.375.0
- Google Chrome 4.0.250.2
- Red Hat Enterprise Linux Desktop Supplementary 6
- Google Chrome 4.1.249.1062
- Google Chrome 5.0.375.46
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Google Chrome 4.1.249.1044
- Google Chrome 5.0.375.70
- Google Chrome 4.0.250.0
- Google Chrome 4.0.223.1
- Google Chrome 5.0.379.0
- Google Chrome 5.0.336.0
- Google Chrome 5.0.325.0
- Google Chrome 4.0.292.0
- Google Chrome 4.0.249.70
- Google Chrome 5.0.375.4
- Google Chrome 4.0.249.58
- Google Chrome 4.0.264.0
- Google Chrome 5.0.375.47
- Google Chrome 5.0.354.1
- Google Chrome 5.0.375.26
- Google Chrome 6.0.405.0
- Google Chrome 2.0.172.28
- Gentoo Linux
- Google Chrome 4.0.249.52
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- Google Chrome 0.1.38.2
- Google Chrome 2.0.172.8
- Google Chrome 4.0.249.69
- Google Chrome 0.2.149.27
- Google Chrome 6.0.458.1
- Google Chrome 6.0.408.3
- Google Chrome 5.0.391.0
- Google Chrome 4.0.249.6
- Google Chrome 5.0.375.49
- Google Chrome 4.0.249.67
- Google Chrome 4.1.249.1006
- Google Chrome 5.0.342.1
- Google Chrome 4.1.249.1031
- Google Chrome 4.1.249.1024
- Google Chrome 5.0.307.6
- Google Chrome 10.0.648.205
- Google Chrome 0.1.42.3
- Google Chrome 1.0.154.53
- Google Chrome 1.0.154.65
- Adobe Flash Player 10.1 Release Candidate
- Google Chrome 5.0.375.69
- Google Chrome 4.0.286.0
- Google Chrome 1.0.154.53
- Google Chrome 4.0.249.62
- Adobe Flash Player 10.2.159.1
- Adobe Flash Player 10.2.154.27
- Google Chrome 5.0.342.4
- Google Chrome 4.1.249.1040
- Google Chrome 5.0.390.0
- Google Chrome 5.0.375.51
- Google Chrome 4.1.249.0
- Google Chrome 5.0.375.1
- Google Chrome 3.0.195.32
- Google Chrome 5.0.342.0
- Google Chrome 4.0.240.0
- Google Chrome 5.0.375.2
- Google Chrome 4.1.249.1039
- Google Chrome 4.1.249.1008
- Google Chrome 5.0.375.21
- Google Chrome 4.0.252.0
- Google Chrome 4.0.249.7
- Google Chrome 5.0.387.0
- Google Chrome 5.0.375.12
- Google Chrome 4.1.249.1036
- Adobe Flash Player 10.2.152.21
- Google Chrome 4.0.249.56
- Adobe Flash Player 10.0.45 2
- Google Chrome 6.0.472.55
- Google Chrome 4.1.249.1026
- Google Chrome 4.0.249.64
- Google Chrome 6.0.472.63
- Google Chrome 6.0.473.0
- Google Chrome 6.0.474.0
- Google Chrome 6.0.475.0
- Google Chrome 4.0.296.0
- Google Chrome 6.0.477.0
- Google Chrome 6.0.478.0
- Google Chrome 6.0.479.0
- Google Chrome 6.0.480.0
- Google Chrome 6.0.481.0
- Google Chrome 6.0.482.0
- Google Chrome 5.0.307.7
- Google Chrome 6.0.484.0
- Google Chrome 6.0.485.0
- Google Chrome 6.0.486.0
- Google Chrome 5.0.307.1
- Google Chrome 6.0.488.0
- Google Chrome 6.0.489.0
- Google Chrome 6.0.490.0
- Google Chrome 5.0.360.4
- Google Chrome 6.0.491.0
- Google Chrome 6.0.492.0
- Google Chrome 6.0.493.0
- Google Chrome 6.0.494.0
- Google Chrome 4.0.249.75
- Google Chrome 6.0.495.1
- Google Chrome 6.0.496.0
- Google Chrome 7.0.497.0
- Google Chrome 7.0.498.0
- Google Chrome 7.0.499.0
- Google Chrome 5.0.359.0
- Adobe Flash Player 10.1.92.10
- Google Chrome 7.0.500.1
- Google Chrome 7.0.503.0
- Google Chrome 5.0.366.1
- Google Chrome 4.1.249.1013
- Google Chrome 7.0.505.0
- Google Chrome 7.0.506.0
- Google Chrome 7.0.507.0
- Google Chrome 0.2.149.29
- Google Chrome 7.0.507.2
- Google Chrome 7.0.507.3
- Google Chrome 7.0.509.0
- Google Chrome 7.0.510.0
- Google Chrome 4.0.302.0
- Google Chrome 5.0.393.0
- Google Chrome 7.0.511.4
- Google Chrome 4.1.249.1049
- Google Chrome 7.0.513.0
- Google Chrome 5.0.356.0
- Google Chrome 7.0.514.1
- Google Chrome 7.0.515.0
- Google Chrome 7.0.516.0
- Google Chrome 7.0.517.0
- Google Chrome 7.0.517.10
- Google Chrome 7.0.517.11
- Google Chrome 7.0.517.12
- Google Chrome 7.0.517.13
- Google Chrome 7.0.517.14
- Google Chrome 7.0.517.16
- Google Chrome 7.0.517.17
- Google Chrome 7.0.517.18
- Google Chrome 7.0.517.19
- Google Chrome 7.0.517.2
- Google Chrome 7.0.517.20
- Google Chrome 7.0.517.21
- Google Chrome 7.0.517.22
- Google Chrome 7.0.517.23
- Google Chrome 2.0.172.43
- Google Chrome 5.0.328.0
- Google Chrome 4.1.249.1034
- Google Chrome 4.1.249.1020
- Google Chrome 5.0.320.0
- Google Chrome 7.0.517.29
- Google Chrome 7.0.517.30
- Google Chrome 7.0.517.31
- Google Chrome 7.0.517.32
- Google Chrome 7.0.517.33
- Google Chrome 7.0.517.34
- Google Chrome 7.0.517.35
- Google Chrome 7.0.517.36
- Google Chrome 5.0.375.125
- Google Chrome 7.0.517.38
- Google Chrome 4.0.249.33
- Google Chrome 5.0.339.0
- Google Chrome 7.0.517.40
- Google Chrome 7.0.517.5
- Google Chrome 7.0.517.6
- Google Chrome 7.0.517.7
- Google Chrome 4.0.249.72
- Google Chrome 7.0.517.9
- Google Chrome 4.0.249.66
- Google Chrome 6.0.472.49
- Google Chrome 6.0.472.5
- Google Chrome 6.0.472.50
- Google Chrome 6.0.472.51
- Google Chrome 6.0.472.52
- Google Chrome 6.0.472.53
- Google Chrome 5.0.342.7
- Google Chrome 5.0.316.0
- Google Chrome 6.0.472.56
- Google Chrome 6.0.472.57
- Google Chrome 6.0.472.6
- Google Chrome 6.0.472.7
- Google Chrome 6.0.472.8
- Google Chrome 6.0.472.9
- Google Chrome 4.0.256.0
- Google Chrome 4.0.249.38
- Google Chrome 4.0.249.12
- Google Chrome 4.0.246.0
- Google Chrome 5.0.326.0
- Google Chrome 5.0.353.0
- Google Chrome 5.0.318.0
- Google Chrome 1.0.154.46
- Google Chrome 5.0.354.0
- Google Chrome 4.0.267.0
- Google Chrome 4.0.249.50
- Google Chrome 5.0.375.99
- Google Chrome 5.0.322.2
- Google Chrome 4.0.249.14
- Google Chrome 5.0.375.30
- Google Chrome 4.0.289.0
- Google Chrome 4.0.302.1
- Google Chrome 4.1.249.1015
- Google Chrome 5.0.345.0
- Google Chrome 4.0.236.0
- Google Chrome 4.1.249.1011
- Google Chrome 6.0.472.53
- Google Chrome 4.1.249.1022
- Google Chrome 4.0.249.22
- Google Chrome 4.0.223.0
- Google Chrome 4.0.249.28
- Google Chrome 4.0.249.46
- Google Chrome 6.0.472.62
- Google Chrome 5.0.375.8
- Google Chrome 4.0.294.0
- Google Chrome 5.0.323.0
- Google Chrome 5.0.375.17
- Google Chrome 5.0.314.0
- Google Chrome 4.0.276.0
- Google Chrome 4.0.249.27
- Google Chrome 6.0.472.12
- Google Chrome 4.1.249.1048
- Google Chrome 0.1.40.1
- Google Chrome 5.0.351.0
- Adobe Flash Player 10.1.92.10
- Adobe Flash Player 10.1.95.1
- Adobe Flash Player 10.1.85.3
- Google Chrome 3.0 Beta
- Google Chrome 6.0.450.2
- Google Chrome 4.0.272.0
- Adobe Flash Player 10.1.102.64
- Google Chrome 5.0.343.0
- Google Chrome 5.0.366.0
- Google Chrome 6.0.397.0
- Sun Solaris 11 Express
- Google Chrome 0.3.154 9
- Google Chrome 4.0.249.47
- Google Chrome 5.0.360.3
- Google Chrome 5.0.342.5
- Google Chrome 5.0.344.0
- Google Chrome 5.0.338.0
- Google Chrome 4.0.249.18
- Google Chrome 3.0.182.2
- Google Chrome 5.0.350.0
- Google Chrome 5.0.375.48
- Google Chrome 2.0.172.31
- Google Chrome 2.0.172.30
- Google Chrome 4.0.249.32
- Google Chrome 5.0.369.0
- Google Chrome 5.0.375.32
- Google Chrome 4.1.249.1041
- Google Chrome 4.1.249.1058
- Google Chrome 4.0.212.1
- Google Chrome 4.0.260.0
- Google Chrome 5.0.360.5
- Google Chrome 7.0.519.0
- Google Chrome 5.0.369.2
- Google Chrome 7.0.521.0
- Google Chrome 7.0.522.0
- Google Chrome 0.2.149.30
- Google Chrome 7.0.525.0
- Google Chrome 7.0.526.0
- Google Chrome 7.0.528.0
- Google Chrome 4.1.249.1060
- Google Chrome 7.0.529.1
- Google Chrome 7.0.529.2
- Google Chrome 5.0.375.9
- Google Chrome 7.0.531.0
- Google Chrome 7.0.531.1
- Google Chrome 7.0.531.2
- Google Chrome 7.0.535.1
- Google Chrome 3.0.195.27
- Google Chrome 5.0.361.0
- Google Chrome 7.0.536.1
- Google Chrome 7.0.536.2
- Google Chrome 7.0.536.3
- Google Chrome 7.0.536.4
- Google Chrome 7.0.537.0
- Google Chrome 7.0.538.0
- Google Chrome 7.0.539.0
- Google Chrome 5.0.375.10
- Google Chrome 7.0.541.0
- Google Chrome 7.0.542.0
- Google Chrome 7.0.544.0
- Google Chrome 7.0.547.0
- Google Chrome 7.0.547.1
- Google Chrome 7.0.548.0
- Google Chrome 8.0.549.0
- Google Chrome 8.0.550.0
- Google Chrome 8.0.551.0
- Google Chrome 8.0.551.1
- Google Chrome 8.0.552.0
- Google Chrome 5.0.334.0
- Google Chrome 8.0.552.10
- Google Chrome 8.0.552.100
- Google Chrome 8.0.552.101
- Google Chrome 8.0.552.102
- Google Chrome 8.0.552.103
- Google Chrome 8.0.552.104
- Google Chrome 8.0.552.105
- Google Chrome 8.0.552.11
- Google Chrome 1.0.154.48
- Google Chrome 8.0.552.13
- Google Chrome 8.0.552.14
- Google Chrome 8.0.552.15
- Google Chrome 8.0.552.16
- Google Chrome 5.0.357.0
- Google Chrome 8.0.552.18
- Google Chrome 5.0.346.0
- Google Chrome 8.0.552.2
- Adobe Flash Player 10
- Google Chrome 5.0.372.0
- Google Chrome 8.0.552.201
- Google Chrome 8.0.552.202
- Google Chrome 8.0.552.203
- Google Chrome 8.0.552.204
- Google Chrome 8.0.552.205
- Google Chrome 8.0.552.206
- Google Chrome 8.0.552.207
- Google Chrome 8.0.552.208
- Google Chrome 8.0.552.209
- Google Chrome 8.0.552.21
- Google Chrome 8.0.552.210
- Google Chrome 8.0.552.211
- Google Chrome 8.0.552.212
- Google Chrome 8.0.552.213
- Google Chrome 8.0.552.214
- Google Chrome 3.0.190.2
- Google Chrome 4.0.249.31
- Google Chrome 3.0.195.25
- Google Chrome 5.0.375.34
- Google Chrome 4.0.229.1
- Google Chrome 4.0.288.1
- Google Chrome 4.1.249.1063
- Google Chrome 4.0.249.35
- Google Chrome 4.0.249.1
- Google Chrome 0.3.154.0
- Google Chrome 2.0.169.1
- Google Chrome 4.1.249.1061
- Google Chrome 5.0.375.55
- Google Chrome 5.0.365.0
- Google Chrome 4.0.249.73
- Google Chrome 4.0.303.0
- Google Chrome 4.0.249.76
- Google Chrome 5.0.307.9
- Google Chrome 5.0.380.0
- Google Chrome 3.0.195.36
- Google Chrome 5.0.382.0
- Google Chrome 2.0.172.33
- Adobe Flash Player 10.1.102.65
- Google Chrome 5.0.307.3
- Google Chrome 4.0.249.2
- Adobe Flash Player 10.0.12.10
- Google Chrome 5.0.369.1
- Google Chrome 4.0.255.0
- Google Chrome 5.0.375.127
- Google Chrome 4.0.305.0
- Google Chrome 4.0.249.26
- Google Chrome 2.0.170.0
- Google Chrome 4.0.249.74
- Google Chrome 8.0.552.224
- Google Chrome 11.0.672.2
- Google Chrome 11
- Google Chrome 4.0.287.0
- Google Chrome 11.0.696.43
- Google Chrome 4.0.223.8
- Google Chrome 4.0.249.42
- Google Chrome 4.0.239.0
- Google Chrome 4.0.257.0
- Google Chrome 4.0.249.49
- Google Chrome 4.0.222.5
- Google Chrome 4.1.249.1016
- Google Chrome 4.0.249.16
- Google Chrome 5.0.317.2
- Google Chrome 4.0.249.81
- Google Chrome 1.0.154.55
- Google Chrome 1.0.154.59
- Google Chrome 4.0.249.36
- Google Chrome 5.0.324.0
- Google Chrome 4.0.249.60
- Google Chrome 4.0.237.0
- Google Chrome 5.0.375.25
- Google Chrome 4.1.249.1042
- Google Chrome 4.1.249.1045
- Google Chrome 4.0.222.0
- Google Chrome 5.0.307.11
- Google Chrome 5.0.342.9
- Google Chrome 4.0.249.78
- Google Chrome 4.0.223.4
- Google Chrome 5.0.335.3
- Google Chrome 4.0.248.0
- Google Chrome 4.0.262.0
- Google Chrome 4.0.263.0
- Google Chrome 5.0.395.0
- Google Chrome 5.0.381.0
- Google Chrome 5.0.394.0
- Google Chrome 4.0.249.9
- Google Chrome 11.0.696.43
- Google Chrome 4.1.249.1038
- Google Chrome 5.0.333.0
- Google Chrome 9.0.597.107
- Google Chrome 4.0.242.0
- Google Chrome 6.0.465.2
- Google Chrome 6.0.466.0
- Google Chrome 6.0.466.1
- Google Chrome 6.0.466.2
- Google Chrome 6.0.466.3
- Google Chrome 6.0.466.4
- Google Chrome 6.0.466.5
- Google Chrome 6.0.466.6
- Google Chrome 6.0.467.0
- Google Chrome 6.0.469.0
- Google Chrome 6.0.470.0
- Google Chrome 6.0.471.0
- Google Chrome 6.0.472.0
- Google Chrome 6.0.472.1
- Google Chrome 5.0.362.0
- Google Chrome 6.0.472.11
- Google Chrome 5.0.375.20
- Google Chrome 6.0.472.13
- Google Chrome 6.0.472.14
- Google Chrome 6.0.472.15
- Google Chrome 6.0.472.16
- Google Chrome 6.0.472.17
- Google Chrome 6.0.472.18
- Google Chrome 6.0.472.19
- Google Chrome 6.0.472.2
- Google Chrome 6.0.472.20
- Google Chrome 6.0.472.21
- Google Chrome 11.0.696.65
- Google Chrome 6.0.472.23
- Google Chrome 6.0.472.24
- Google Chrome 6.0.472.25
- Google Chrome 5.0.321.0
- Google Chrome 4.0.249.44
- Google Chrome 6.0.472.28
- Google Chrome 6.0.472.29
- Google Chrome 6.0.472.3
- Google Chrome 6.0.472.30
- Google Chrome 6.0.472.31
- Google Chrome 4.0.249.25
- Google Chrome 6.0.472.33
- Google Chrome 6.0.472.34
- Google Chrome 4.0.249.77
- Google Chrome 4.0.302.2
- Google Chrome 6.0.472.37
- Google Chrome 6.0.472.38
- Google Chrome 5.0.322.1
- Google Chrome 5.0.348.0
- Google Chrome 6.0.472.40
- Google Chrome 4.1.249.1017
- Google Chrome 6.0.472.42
- Google Chrome 4.0.249.37
- Google Chrome 5.0.335.4
- Google Chrome 6.0.472.45
- Google Chrome 6.0.472.46
- Google Chrome 6.0.472.47
- Google Chrome 6.0.472.48
- Adobe Flash Player 10.0.22.87
- Google Chrome 5.0.358.0
- Google Chrome 5.0.375.33
- Google Chrome 4.1.249.1032
- Google Chrome 4.0.243.0
- Google Chrome 4.0.249.3
- Adobe Flash Player 10.2.154.28
- Adobe Flash Player 10.3.181.14
- Adobe Flash Player 10.3.185.21
- Google Chrome 0.4.154.33
- Google Chrome 4.0.249.57
- Google Chrome 8.0.552.216
- Google Chrome 8.0.552.217
- Google Chrome 8.0.552.218
- Google Chrome 8.0.552.219
- Google Chrome 8.0.552.220
- Google Chrome 8.0.552.221
- Google Chrome 8.0.552.222
- Google Chrome 8.0.552.223
- Google Chrome 11.0.696.68
- Google Chrome 8.0.552.226
- Google Chrome 8.0.552.300
- Google Chrome 8.0.552.301
- Google Chrome 8.0.552.302
- Google Chrome 4.0.245.0
- Google Chrome 8.0.552.304
- Google Chrome 8.0.552.305
- Google Chrome 8.0.552.306
- Google Chrome 8.0.552.307
- Google Chrome 8.0.552.308
- Google Chrome 8.0.552.309
- Google Chrome 8.0.552.310
- Google Chrome 3.0.195.37
- Google Chrome 5.0.375.73
- Google Chrome 8.0.552.303
- Google Chrome 4.0.223.7
- Adobe Flash Player 10.0.45.2
- Google Chrome 5.0.378.0
- Google Chrome 5.0.332.0
- Google Chrome 5.0.307.8
- Google Chrome 4.0.249.19
- Google Chrome 5.0.375.36
- Google Chrome 4.1.249.1030
- Google Chrome 6.0.437.0
- Google Chrome 5.0.375.16
- Adobe Flash Player 10.1.95.2
- Google Chrome 4.0.221.8
- Google Chrome 4.1.249.1025
- Google Chrome 11.0.696.57
- Google Chrome 5.0.342.8
- Google Chrome 5.0.375.31
- Google Chrome 4.0.268.0
- Google Chrome 4.1.249.1021
- Google Chrome 11.0.696.77
- Google Chrome 2.0.169.0
- Google Chrome 6.0.472.32
- Google Chrome 5.0.366.4
- Google Chrome 5.0.370.0
- Google Chrome 4.1.249.1055
- Google Chrome 4.0.249.61
- Google Chrome 6.0.401.1
- Google Chrome 5.0.375.52
- Google Chrome 5.0.375.27
- Adobe Flash Player 10.1.51.66
- Google Chrome 4.0.249.43
- Google Chrome 7.0.499.1
- Google Chrome 5.0.375.29
- Google Chrome 5.0.375.38
- Google Chrome 4.0.299.0
- Google Chrome 4.1.249.1014
- Google Chrome 10.0.648.205
- Google Chrome 8.0.552.237
- Google Chrome 4.0.212.0
- Google Chrome 5.0.308.0
- Google Chrome 4.0.261.0
- Google Chrome 5.0.322.0
- Google Chrome 7.0.500.0
- Google Chrome 5.0.347.0
- Google Chrome 5.0.375.97
- Google Chrome 5.0.384.0
- Google Chrome 4.0.249.89
- Google Chrome 4.0.269.0
- Google Chrome 4.0.271.0
- Google Chrome 10.0.648.127
- Google Chrome 10
- Google Chrome 4.0.249.80
- Google Chrome 5.0.342.6
- Google Chrome 5.0.366.3
- Google Chrome 8.0.552.344
- Google Chrome 4.0.258.0
- Google Chrome 4.1.249.1001
- Google Chrome 4.0.249.24
- Google Chrome 4.0.222.12
- Google Chrome 4.0.249.0
- Google Chrome 4.0.249.40
- Google Chrome 5.0.375.19
- Google Chrome 4.1.249.1028
- Google Chrome 1.0.154.64
- Adobe Flash Player 10.0.45 2
- Google Chrome 5.0.385.0
- Google Chrome 1.0.154.61
- Google Chrome 2.0.172.27
- Google Chrome 5.0.375.14
- Google Chrome 5.0.307.5
- Google Chrome 5.0.375.6
- Google Chrome 4.0.223.2
- Google Chrome 5.0.340.0
- Google Chrome 11.0.696.71
- Google Chrome 10.0.648.127
- Google Chrome 10.0.648.133
- Google Chrome 10.0.648.128
- Google Chrome 5.0.375.35
- Google Chrome 4.0.249.59
- Google Chrome 7.0.503.1
- Google Chrome 5.0.335.1
- Adobe Flash Player 10.2.152.33
- Adobe Flash Player 10.2.154.13
- Google Chrome 4.0.249.34
- Google Chrome 5.0.375.53
- Google Chrome 5.0.315.0
- Google Chrome 5.0.367.0
- Google Chrome 4.0.249.53
- Google Chrome 4.1.249.1009
- Google Chrome 1.0.154.52
- Google Chrome 2.0.172.38
- SuSE openSUSE 11.4
- Google Chrome 4.0.265.0
- Google Chrome 4.0.277.0
- Google Chrome 6.0.472.55
- Google Chrome 5.0.342.2
- Google Chrome 4.1.249.1007
- Google Chrome 2.0.159.0
- Google Chrome 4.0.266.0
- Google Chrome 3.0.195.38
- Google Chrome 8.0.552.1
- Adobe Flash Player 10.1.53.64
- Google Chrome 4.0.249.68
- Google Chrome 3.0.193.2 Beta
- Google Chrome 4.1.249.1004
- Google Chrome 3.0.195.2
- Google Chrome 4.1.249.1037
- Google Chrome 4.0.249.78 Beta
- Google Chrome 4.0.223.5
- Google Chrome 5.0.375.125
- Adobe Flash Player 10.0.42.34
- Google Chrome 4.0.249.29
- Google Chrome 3.0.195.24
- Google Chrome 5.0.375.39
- Google Chrome 4.1 Beta
- Google Chrome 6.0.399.0
- Google Chrome 6.0.400.0
- Google Chrome 6.0.401.0
- Google Chrome 5.0.375.13
- Google Chrome 6.0.403.0
- Adobe Flash Player 10.0.12 .36
- Google Chrome 6.0.404.1
- Google Chrome 6.0.404.2
- Google Chrome 7.0.517.41
- Google Chrome 6.0.406.0
- Google Chrome 6.0.407.0
- Google Chrome 6.0.408.0
- Google Chrome 6.0.408.1
- Google Chrome 6.0.408.10
- Google Chrome 6.0.408.2
- Google Chrome 5.0.375.37
- Google Chrome 6.0.408.4
- Google Chrome 6.0.408.5
- Google Chrome 6.0.408.6
- Google Chrome 6.0.408.7
- Google Chrome 6.0.408.8
- Google Chrome 6.0.408.9
- Google Chrome 6.0.409.0
- Google Chrome 7.0.518.0
- Google Chrome 6.0.411.0
- Google Chrome 6.0.412.0
- Google Chrome 6.0.413.0
- Google Chrome 6.0.414.0
- Google Chrome 6.0.415.0
- Google Chrome 6.0.415.1
- Google Chrome 6.0.416.0
- Google Chrome 6.0.416.1
- Google Chrome 6.0.417.0
- Google Chrome 6.0.418.0
- Google Chrome 6.0.418.1
- Google Chrome 7.0.520.0
- Google Chrome 6.0.418.3
- Google Chrome 6.0.418.4
- Google Chrome 6.0.418.5
- Google Chrome 6.0.418.6
- Google Chrome 6.0.418.7
- Google Chrome 6.0.418.8
- Google Chrome 6.0.418.9
- Google Chrome 6.0.419.0
- Google Chrome 6.0.421.0
- Google Chrome 6.0.422.0
- Google Chrome 6.0.423.0
- Google Chrome 6.0.424.0
- Google Chrome 6.0.425.0
- Google Chrome 6.0.426.0
- Google Chrome 6.0.427.0
- Google Chrome 6.0.428.0
- Google Chrome 6.0.430.0
- Google Chrome 6.0.431.0
- Google Chrome 6.0.432.0
- Google Chrome 6.0.433.0
- Google Chrome 6.0.434.0
- Google Chrome 6.0.435.0
- Google Chrome 6.0.436.0
- Google Chrome 6.0.465.1
- Google Chrome 6.0.437.1
- Google Chrome 6.0.437.2
- Google Chrome 6.0.437.3
- Google Chrome 6.0.438.0
- Google Chrome 6.0.440.0
- Google Chrome 6.0.441.0
- Google Chrome 6.0.443.0
- Google Chrome 6.0.444.0
- Google Chrome 6.0.445.0
- Google Chrome 6.0.445.1
- Google Chrome 6.0.446.0
- Google Chrome 6.0.447.0
- Google Chrome 6.0.447.1
- Google Chrome 6.0.447.2
- Google Chrome 6.0.449.0
- Google Chrome 6.0.450.0
- Google Chrome 6.0.450.1
- Google Chrome 7.0.529.0
- Google Chrome 6.0.450.3
- Google Chrome 6.0.450.4
- Google Chrome 4.0.290.0
- Google Chrome 5.0.375.23
- Google Chrome 6.0.472.10
- Google Chrome 4.1.249.1036
- Google Chrome 2.0.172.37
- Google Chrome 7.0.530.0
- Adobe Flash Player 10.0.15 .3
- Google Chrome 5.0.313.0
- Google Chrome 4.1.249.1050
- Google Chrome 4.0.288.0
- Adobe Flash Player 10.2.154.18
- Google Chrome 6.0.483.0
- Google Chrome 4.1.249.1010
- Google Chrome 0.1.38.1
- Google Chrome 7.0.535.2
- Google Chrome 6.0.404.0
- Xerox FreeFlow Print Server (FFPS) 73.C0.41
- Xerox FreeFlow Print Server (FFPS) 73.B3.61
- Google Chrome 7.0.536.0
- Google Chrome 4.0.224.0
- Google Chrome 5.0.374.0
- Google Chrome 4.0.249.48
- Google Chrome 5.0.349.0
- Google Chrome 6.0.487.0
- Google Chrome 5.0.386.0
- Google Chrome 4.0.249.63
- Google Chrome 0.1.42.2
- Google Chrome 5.0.383.0
- Google Chrome 4.1.249.1059
- Google Chrome 5.0.375.15
- Google Chrome 4.0.295.0
- Google Chrome 4.1.249.1054
- Adobe Flash Player 10.2.153.1
- Adobe Flash Player 10.2.154.24
- Adobe Flash Player 10.2.156.12
- Adobe Flash Player 10.2.154.25
- Google Chrome 9.0.597.84
- Google Chrome 4.0.275.1
- Google Chrome 6.0.490.1
- Google Chrome 6.0.472.22
- Google Chrome 4.0.249.39
- Google Chrome 10.0.648.205
- Google Chrome 4.0.300.0
- Google Chrome 4.1.249.1035
- Adobe Flash Player 10.1.82.76
- Google Chrome 7.0.540.0
- Red Hat Enterprise Linux Supplementary 5 Server
- Google Chrome 5.0.375.126
- Google Chrome 6.0.472.26
- Google Chrome 6.0.495.0
- Google Chrome 6.0.472.27
- Google Chrome 4.0.301.0
- Google Chrome 4.1.249.1029
- Google Chrome 0.2.152.1
- Google Chrome 0.2.153.1
- Google Chrome 10.0.648.204
- Google Chrome 0.3.154.3
- Google Chrome 0.4.154.18
- Google Chrome 0.4.154.22
- Google Chrome 0.4.154.31
- Google Chrome 4.1.249.1033
- Google Chrome 1.0.154.39
- Google Chrome 1.0.154.42
- Google Chrome 1.0.154.43
- Google Chrome 4.1.249.1051
- Google Chrome 2.0.156.1
- Google Chrome 2.0.157.0
- Google Chrome 2.0.157.2
- Google Chrome 2.0.158.0
- Google Chrome 4.1.249.1064
- Google Chrome 6.0.452.0
- Google Chrome 6.0.452.1
- Google Chrome 6.0.453.0
- Google Chrome 6.0.453.1
- Google Chrome 6.0.454.0
- Google Chrome 6.0.455.0
- Google Chrome 4.0.249.5
- Google Chrome 5.0.375.41
- Google Chrome 5.0.375.42
- Adobe Flash Player 10.1.106.16
- Google Chrome 6.0.458.2
- Google Chrome 6.0.459.0
- Google Chrome 6.0.460.0
- Google Chrome 6.0.461.0
- Google Chrome 6.0.462.0
- Google Chrome 6.0.464.1
- Google Chrome 5.0.375.50
- Google Chrome 6.0.472.58
- Google Chrome 6.0.472.60
- Google Chrome 6.0.472.61
- Google Chrome 5.0.375.54
- Google Chrome 5.0.375.56
- Google Chrome 5.0.375.57
- Google Chrome 5.0.375.58
- Google Chrome 5.0.375.59
- Google Chrome 5.0.375.60
- Google Chrome 5.0.375.61
- Google Chrome 5.0.375.62
- Google Chrome 5.0.375.63
- Google Chrome 5.0.375.64
- Google Chrome 5.0.375.65
- Google Chrome 5.0.375.66
- Google Chrome 5.0.375.67
- Google Chrome 6.0.472.59
- Google Chrome 4.0.249.82
- Google Chrome 6.0.472.36
- Google Chrome 9.0.597.94
- Google Chrome 7.0.504.0
- Google Chrome 5.0.375.40
- Google Chrome 5.0.330.0
- Google Chrome 5.0.317.0
- Google Chrome 4.0.278.0
- Google Chrome 5.0.375.22
- Google Chrome 5.0.366.2
- Google Chrome 6.0.472.39
- Google Chrome 6.0.472.4
- Google Chrome 7.0.507.1
- Google Chrome 4.0.249.8
- Google Chrome 3.0.195.21
- Google Chrome 6.0.472.41
- Google Chrome 7.0.517.43
- Google Chrome 8.0.552.215
- Google Chrome 5.0.375.28
- Google Chrome 6.0.472.43
- Google Chrome 5.0.363.0
- Google Chrome 5.0.341.0
- Google Chrome 5.0.371.0
- Google Chrome 6.0.472.44
- Google Chrome 7.0.511.1
- Google Chrome 4.0.244.0
- Adobe Flash Player 10.0.0.584
- Google Chrome 7.0.511.2
- Google Chrome 4.0.249.65
- Google Chrome 5.0.373.0
- Google Chrome 4.0.249.55
- Google Chrome 4.0.259.0
- Google Chrome 4.0.249.11
- Google Chrome 7.0.512.0
- Google Chrome 4.0.235.0
- Google Chrome 4.0.249.71
- Google Chrome 8.0.552.17
- Google Chrome 5.0.307.10
- Google Chrome 5.0.376.0
- Google Chrome 7.0.514.0
- Google Chrome 2.0.172
- Google Chrome 4.0.222.1
- Google Chrome 4.1.249.1018
- Google Chrome 5.0.392.0
- Google Chrome 4.0.302.3
- Google Chrome 4.0.249.79
- Google Chrome 8.0.552.200
- Google Chrome 4.0.241.0
- Google Chrome 5.0.375.3
- Google Chrome 4.1.249.1046
- Google Chrome 4.0.249.4
- Google Chrome 4.1.249.1043
- Google Chrome 4.0.251.0
- Google Chrome 6.0.451.0
- Google Chrome 7.0.517.41
- Google Chrome 7.0.517.42
- Google Chrome 5.0.356.2
- Google Chrome 5.0.350.1
- Google Chrome 5.0.314.1
- Google Chrome 5.0.307.4
- Google Chrome 5.0.319.0
- Google Chrome 5.0.342.3
- Google Chrome 5.0.317.1
- Google Chrome 5.0.335.2
- Google Chrome 5.0.356.1
- Google Chrome 3.0.195.33
- Sun Solaris 10 X86
- Google Chrome 4.0.249.45
- Google Chrome 5.0.309.0
- Google Chrome 5.0.375.11
- Google Chrome 7.0.524.0
- Google Chrome 8.0.552.19
- Google Chrome 4.1.249.1053
- Google Chrome 4.1.249.1056
- Google Chrome 4.0.249.21
- Google Chrome 7.0.517.24
- Google Chrome 2.0.172.2
- Google Chrome 0.1.38.4
- Google Chrome 7.0.517.25
- Google Chrome 4.0.249.17
- Google Chrome 7.0.517.26
- Google Chrome 6.0.418.2
- Google Chrome 5.0.375.5
- Google Chrome 7.0.517.27
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Google Chrome 7.0.517.28
- Google Chrome 5.0.306.1
- Google Chrome 4.1.249.1057
- Google Chrome 4.0.254.0
- Adobe Flash Player 10.3.181.16
- Adobe Flash Player 10.3.185.22
- Adobe Flash Player 10.3.181.22
- Adobe Flash Player 10.3.181.23
- Google Chrome 5.0.327.0
- Adobe Flash Player 10.0.32.18
- Google Chrome 8.0.552.20
- Adobe Flash Player 10.0.32 18
- Google Chrome 5.0.375.68
- Google Chrome 1.0.154.36
- Google Chrome 5.0.375.71
- Google Chrome 5.0.375.72
- Adobe Flash Player 10.0.12 .35
- Google Chrome 5.0.375.74
- Google Chrome 5.0.375.75
- Google Chrome 5.0.375.76
- Google Chrome 5.0.375.77
- Google Chrome 5.0.375.78
- Google Chrome 5.0.375.79
- Google Chrome 5.0.375.80
- Google Chrome 5.0.375.81
- Google Chrome 5.0.375.82
- Google Chrome 5.0.375.83
- Google Chrome 5.0.375.84
- Google Chrome 5.0.375.85
- Google Chrome 5.0.375.86
- Google Chrome 5.0.375.87
- Google Chrome 5.0.375.88
- Google Chrome 5.0.375.89
- Google Chrome 5.0.375.90
- Google Chrome 5.0.375.91
- Google Chrome 5.0.375.92
- Google Chrome 5.0.375.93
- Google Chrome 5.0.375.94
- Google Chrome 5.0.375.95
- Google Chrome 5.0.375.96
- Google Chrome 7.0.517.37
- Google Chrome 5.0.375.98
- Google Chrome 5.0.375.99
- Google Chrome 5.0.355.0
- Google Chrome 5.0.335.0
- Google Chrome 5.0.364.0
- Google Chrome 7.0.517.39
- Google Chrome 4.0.304.0
- Google Chrome 4.1.249.1019
- Google Chrome 7.0.517.4
- Google Chrome 4.0.249.41
- Google Chrome 12.0.742.91
- Google Chrome 4.1.249.1052
- Adobe Flash Player 10.3.185.23
- Google Chrome 6.0.476.0
- Google Chrome 4.0.249.23
- Google Chrome 4.0.247.0
- Google Chrome 7.0.517.44
- Google Chrome 4.0.237.1
- Google Chrome 7.0.517.8
- Google Chrome 4.1.249.1047
- Google Chrome 4.0.275.0
- Google Chrome 6.0.456.0
- Google Chrome 8.0.552.215
- Google Chrome 4.0.249.51
- Google Chrome 5.0.375.18
- Google Chrome 5.0.368.0
- Google Chrome 4.1.249.1023
- Google Chrome 8.0.552.12
- Google Chrome 5.0.360.0
- Google Chrome 5.0.382.3
- Google Chrome 6.0.398.0
- Google Chrome 5.0.375.44
- Google Chrome 4.0.249.30
- Google Chrome 4.0.249.20
- Google Chrome 5.0.375.43
- Google Chrome 6.0.457.0
- Google Chrome 4.0.249.54
- Google Chrome 4.0.249.10
- Google Chrome 5.0.375.7
- Google Chrome 5.0.329.0
- Google Chrome 5.0.337.0
- Google Chrome 4.1.249.1027
- SuSE openSUSE 11.3
- Google Chrome 5.0.396.0
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Google Chrome 8.0.552.225
- Google Chrome 5.0.306.0
- Adobe Flash Player 10.2.157.51
- Google Chrome 6.0.458.0
- Research In Motion Blackberry PlayBook Tablet Software 1.0.5.2342
- Google Chrome 6.0.472.35
- Google Chrome 6.0.410.0
- Adobe Flash Player 10.1.105.6
- Google Chrome 4.1.249.1012
- Google Chrome 5.0.375.45
- Google Chrome 12
- Google Chrome 6.0.472.54
Severity: MEDIUM
Description:
This signature detects scripts obfuscated (made unclear) with JavaScript. This is a technique commonly used by malicious Web sites to hide the malicious nature of the Web pages being downloaded by a user. A successful attack allows the Web page creator to take control of the victim's system.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
HTTP:STC:DL:XLS-WOPT - HTTP: Microsoft Office Excel WOPT Record Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Office Excel. It is due to a flaw while parsing crafted WOpt records in an Excel file. Remote attackers can exploit this by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current logged on user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Avaya Messaging Application Server MM 3.1
- Avaya Messaging Application Server 4
- Microsoft Excel 2002 SP1
- Avaya Messaging Application Server
- Microsoft Excel 2002 SP2
- Microsoft Excel 2002 SP3
- Microsoft Office 2004 for Mac
- Microsoft Excel 2002
- Avaya Messaging Application Server 5
- Avaya Messaging Application Server MM 2.0
- Avaya Messaging Application Server MM 1.1
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange - Recording Server
- Avaya Meeting Exchange - Streaming Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya Meeting Exchange - Webportal
- Avaya Messaging Application Server MM 3.0
HTTP:VLC-ABC-FILE-BOF - HTTP: VLC Media Player ABC File Parts Field Parsing Heap Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against libmodplug library used by VLC Media Player. It is due to an error while parsing Parts field in ABC files. A successful attack may lead to an integer overflow and arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
HTTP:STC:DL:XLS-MAL-REC-MC - HTTP: Microsoft Office Excel Malformed Record Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Office Excel products. It is due to manipulation of pointer values stored in record types Qsir. A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Excel 2007
- Microsoft Office Compatibility Pack 2007 SP2
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Excel Viewer
- Microsoft Office Compatibility Pack 2007
- Microsoft Excel 2007 SP1
- Microsoft Excel 2007 SP2
HTTP:STC:IE:CVE-2014-1789-MC - HTTP: Microsoft Internet Explorer CVE-2014-1789 Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Adobe Flash Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, idp-4.0.110090709, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, isg-3.4.139899, srx-branch-9.4, idp-5.0.110121210, srx-12.1, srx-branch-12.1, idp-4.2.110100823, idp-5.0.110130325, srx-branch-10.0, mx-11.4, srx-10.0, idp-4.2.110101203, idp-4.0.110090831, idp-5.1.0, j-series-9.5, srx-9.2, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, vsrx-12.1, srx-11.4
References:
Affected Products:
- adobe flash_player 11.3.300.262
- adobe flash_player up to 11.7.700.225
- adobe flash_player 11.6.602.171
- adobe flash_player 11.2.202.233
- adobe flash_player 11.1.115.7
- adobe flash_player 11.2.202.262
- adobe flash_player 11.1.111.50
- adobe flash_player up to 11.7.700.224
- adobe flash_player 11.5.502.149
- adobe flash_player 11.4.402.265
- adobe flash_player 11.2.202.261
- adobe flash_player up to 11.1.115.59
- adobe flash_player 11.1.111.8
- adobe flash_player 11.2.202.251
- adobe flash_player 11.1.115.48
- adobe flash_player 11.2.202.228
- adobe flash_player 11.1.102.63
- adobe flash_player 11.2.202.236
- adobe flash_player 11.1.111.54
- adobe flash_player 11.7.700.169
- adobe flash_player 11.1.102.62
- adobe flash_player 11.5.502.110
- adobe flash_player 11.1.115.58
- adobe flash_player 11.2.202.280
- adobe flash_player 11.2.202.235
- adobe flash_player 11.6.602.168
- adobe flash_player 11.6.602.167
- adobe flash_player 11.5.502.135
- adobe flash_player 11.3.300.271
- adobe flash_player 11.3.300.268
- adobe flash_player 11.3.300.270
- adobe flash_player 11.7.700.202
- adobe flash_player 11.2.202.275
- adobe flash_player 11.1.115.54
- adobe flash_player 11.4.402.278
- adobe flash_player 11.3.300.273
- adobe flash_player 11.1.102.59
- adobe flash_player 11.2.202.238
- adobe flash_player 11.2.202.285
- adobe flash_player 11.2.202.273
- adobe flash_player 11.3.300.257
- adobe flash_player 11.2.202.258
- adobe flash_player 11.1.111.44
- adobe flash_player 11.0
- adobe flash_player 11.5.502.136
- adobe flash_player 11.2.202.243
- adobe flash_player 11.0.1.153
- adobe flash_player 11.1
- adobe flash_player 11.6.602.180
- adobe flash_player 11.2.202.270
- adobe flash_player 11.0.1.152
- adobe flash_player 11.5.502.146
- adobe flash_player 11.1.115.34
- adobe flash_player up to 11.2.202.291
- adobe flash_player 11.3.300.265
- adobe flash_player up to 11.1.115.63
- adobe flash_player 11.1.102.55
- adobe flash_player 11.2.202.223
- adobe flash_player 11.4.402.287
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Internet Explorer. An attacker can create malicious Web pages containing dangerous ActiveX calls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Supported On:
idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Data Access Components (MDAC) 2.7
- Microsoft Data Access Components (MDAC) 2.8
- Hitachi HITSENSER5 01-00
- Hitachi HITSENSER5 01-10
- Hitachi HITSENSER5 02-80
- Hitachi DBPARTNER ODBC 01-00
- Hitachi DBPARTNER ODBC 01-11
- Hitachi DBPARTNER ODBC 01-06
- Hitachi DBPARTNER ODBC 01-03
- Hitachi DA Broker for ODBC 01-00
- Hitachi DA Broker for ODBC 01-02
- Hitachi DBPARTNER2 Client 01-05
- Hitachi DBPARTNER2 Client 01-12
- Hitachi DBPARTNER2 Client 01-00
- Microsoft Data Access Components (MDAC) 2.5 SP3
- Microsoft Data Access Components (MDAC) 2.7 SP1
- Microsoft Data Access Components (MDAC) 2.8 SP1
- Microsoft Data Access Components (MDAC) 2.8 SP2
HTTP:STC:ADOBE:TRUETYPE-FONT-CE - HTTP: Adobe Acrobat Reader TrueType Font Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Adobe Reader 9.4.5
- Adobe Acrobat 10.1.1
- Adobe Reader 10.1.1
- Adobe Acrobat 10.1.2
- Adobe Reader 9.4.6
- Adobe Reader 9.4
- Adobe Reader 9.5
- Adobe Reader 9.4.7
- Adobe Acrobat 10.0.1
- Adobe Reader 10.0.1
- Adobe Reader 9.4.2
- Adobe Acrobat 10.0.3
- Adobe Reader 10.0.3
- Adobe Reader 9.4.3
- Adobe Reader 9.4.4
- Adobe Acrobat 10.1.3
- Adobe Reader 9.4.1
- Adobe Reader 10.1.3
- Adobe Reader 9.5.1
- Adobe Acrobat 10.0.2
- Adobe Reader 10.0.2
- Adobe Reader 10.1.2
- Adobe Acrobat 10.1
- Adobe Reader 10.1
- Adobe Acrobat 10.0
- Adobe Reader 10.0
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft Access. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- adobe acrobat 11.0
- adobe acrobat 10.0.2
- adobe acrobat 10.0.1 (-:pro)
- adobe acrobat 10.1.6
- adobe acrobat_reader 10.1.7
- adobe acrobat_reader 11.0.2
- adobe acrobat_reader 10.1
- adobe acrobat_reader 11.0.3
- adobe acrobat 10.1.4
- adobe acrobat_reader 10.0
- adobe acrobat 10.1.7
- adobe acrobat 10.0 (-:pro)
- adobe acrobat 10.1.3
- adobe acrobat_reader 11.0.1
- adobe acrobat 10.1.2
- adobe acrobat 10.1.1
- adobe acrobat_reader 10.1.2
- adobe acrobat_reader 10.1.4
- adobe acrobat_reader 10.1.3
- adobe acrobat 11.0.3
- adobe acrobat 10.0.3
- adobe acrobat_reader 10.1.1
- adobe acrobat 11.0.2
- adobe acrobat_reader 10.1.6
- adobe acrobat 11.0.1
- adobe acrobat_reader 10.0.2
- adobe acrobat_reader 10.0.1
- adobe acrobat_reader 10.1.5
- adobe acrobat_reader 10.0.3
- adobe acrobat 10.1
- adobe acrobat_reader 11.0
- adobe acrobat 10.1.5
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against PHP. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- php 5.0.4
- php 3.0.1
- php 5.4.4
- php 4.4.6
- php 1.0
- php 5.3.9
- php 3.0.3
- php 5.1.4
- php up to 5.3.25
- php 4.3.2
- php 5.3.21
- php 3.0.5
- php 4.3.4
- php 5.3.23
- php 5.3.12
- php 4.0 (beta4)
- php 3.0.7
- php 5.1.6
- php 4.4.8
- php 5.2.5
- php 5.4.11
- php 5.2.7
- php 5.1.0
- php 5.2.12
- php 4.3.11
- php 5.2.1
- php 5.3.15
- php 4.3.0
- php 2.0
- php 4.4.5
- php 5.2.10
- php 5.2.3
- php 4.0.6
- php 5.2.16
- php 5.3.18
- php 4.0.4
- php 5.3.1
- php 5.2.14
- php 5.1.3
- php 5.0.3
- php 4.0.2
- php 5.3.3
- php 4.0.0
- php 5.2.9
- php 5.3.5
- php 5.3.7
- php 5.3.10
- php 5.4.10
- php 4.2.0
- php 5.0.5
- php 5.4.9
- php 5.4.12
- php 4.2.2
- php 5.3.14
- php 3.0.8
- php 5.4.14
- php 5.3.13
- php 5.3.16
- php 5.0.0 (rc1)
- php 5.0.1
- php 5.0.0 (beta4)
- php 4.3.9
- php 3.0.15
- php 5.4.3
- php 4.4.3
- php 3.0.13
- php 5.4.1
- php 5.1.1
- php 3.0.17
- php 5.0.0 (beta1)
- php 3.0.11
- php 5.4.7
- php 4.4.7
- php 3.0.2
- php 5.0.0 (rc3)
- php 5.2.4
- php 5.4.5
- php 5.1.5
- php 4.0 (beta3)
- php 5.2.8
- php 5.1.2
- php 4.0 (beta2)
- php 4.3.1
- php 5.3.20
- php 3.0.4
- php 4.0 (beta_4_patch1)
- php 4.3.3
- php 5.3.22
- php 3.0.6
- php 4.4.9
- php 5.4.2
- php 5.0.0 (beta2)
- php 4.3.5
- php 5.3.24
- php 5.2.6
- php 4.3.7
- php 4.3.10
- php 5.2.0
- php 4.3.6
- php 5.2.13
- php 5.2.2
- php 2.0b10
- php 4.0.7
- php 5.2.11
- php 5.3.19
- php 4.0.5
- php 3.0
- php 5.2.17
- php 4.0.3
- php 5.3.0
- php 5.2.15
- php 5.4.0
- php 4.0.1
- php 5.3.2
- php 5.3.4
- php 5.3.11
- php 5.3.6
- php 4.2.1
- php 4.1.1
- php 4.4.1
- php 5.4.8
- php 5.3.8
- php 4.2.3
- php 5.0.2
- php 5.0.0 (beta3)
- php 3.0.18
- php 5.4.13
- php 5.3.17
- php 3.0.9
- php 3.0.16
- php 5.4.15
- php 4.3.8
- php 3.0.14
- php 4.1.2
- php 4.4.4
- php 3.0.12
- php 4.1.0
- php 4.4.2
- php 5.0.0 (rc2)
- php 4.0 (beta1)
- php 3.0.10
- php 5.4.6
- php 4.4.0
HTTP:STC:ADOBE:FLASHPLR-FILE-MC - HTTP: Adobe Flash Player Improper File Parsing Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution. Failed exploit attempts could trigger a denial-of-service condition.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- adobe flash_player up to 10.3.183.23
- adobe adobe_air_sdk up to 3.3.0.3690
- adobe flash_player 9.0.8.0
- adobe adobe_air 2.6.0.19120
- adobe flash_player 10.3.183.16
- adobe flash_player 9.0.159.0
- adobe flash_player 8.0.22.0
- adobe flash_player 10.1.102.64
- adobe flash_player 10.3.181.22
- adobe flash_player 10.1.92.10
- adobe flash_player 10.2.152.33
- adobe flash_player_for_android 11.1.112.61
- adobe flash_player 7
- adobe adobe_air 2.0.3.13070
- adobe flash_player 10.1.52.14.1
- adobe flash_player 9.0.152.0
- adobe flash_player 7.1
- adobe flash_player 11.1.102.62
- adobe adobe_air 2.7.0.1953
- adobe flash_player 10.2.154.25
- adobe flash_player 9.0.260.0
- adobe flash_player 9.0.280
- adobe flash_player 10.1
- adobe flash_player 3
- adobe flash_player 8.0
- adobe adobe_air 1.0.1
- adobe adobe_air 3.0.0.408
- adobe flash_player 10.3.186.6
- adobe flash_player_for_android up to 11.1.115.11
- adobe adobe_air 2.0.3
- adobe flash_player 9.0.45.0
- adobe flash_player 10.0.0.584
- adobe flash_player 7.0.19.0
- adobe flash_player 8.0.42.0
- adobe flash_player 8.0.35.0
- adobe adobe_air 3.1.0.485
- adobe adobe_air 2.7.1
- adobe flash_player 9
- adobe flash_player 9.0.151.0
- adobe adobe_air 2.6.0.19140
- adobe flash_player 10.1.106.16
- adobe adobe_air 2.5.1.17730
- adobe adobe_air 1.5
- adobe adobe_air 2.5.0.16600
- adobe flash_player 9.0.262.0
- adobe flash_player 9.0.277.0
- adobe flash_player 10.3.185.22
- adobe flash_player 7.0.70.0
- adobe flash_player 11.1
- adobe flash_player_for_android 11.1.111.7
- adobe flash_player 7.1.1
- adobe flash_player 8.0.24.0
- adobe flash_player 10.1.53.64
- adobe flash_player 9.0.28.0
- adobe flash_player 11.1.115.7
- adobe flash_player_for_android 11.1.111.5
- adobe flash_player 9.0.246.0
- adobe adobe_air 2.7
- adobe flash_player 10.1.92.8
- adobe flash_player 10.1.52.14
- adobe flash_player 10.3.185.24
- adobe flash_player 8
- adobe flash_player 10.3.181.16
- adobe adobe_air 1.0
- adobe flash_player_for_android 11.1.102.59
- adobe flash_player 9.0.47.0
- adobe flash_player 10.2.152.26
- adobe flash_player 11.1.111.8
- adobe adobe_air 1.5.3
- adobe flash_player 4
- adobe flash_player 10.2.152.32
- adobe flash_player 10.1.95.2
- adobe flash_player 9.0.283.0
- adobe adobe_air 1.5.1
- adobe adobe_air 1.1
- adobe flash_player 7.0.68.0
- adobe flash_player 7.0.61.0
- adobe flash_player 10.0.2.54
- adobe flash_player 10.3.183.19
- adobe adobe_air 1.1.0.5790
- adobe flash_player 7.0.25
- adobe flash_player 7.0.66.0
- adobe flash_player 7.0
- adobe flash_player 10.0.15.3
- adobe flash_player 11.1.102.59
- adobe flash_player 7.2
- adobe flash_player 11.0.1.153
- adobe flash_player 7.0.1
- adobe flash_player 10.0.22.87
- adobe flash_player 9.0.9.0
- adobe flash_player 10.2.159.1
- adobe adobe_air 3.2.0.207
- adobe flash_player 10.0.45.2
- adobe adobe_air 1.5.3.9120
- adobe flash_player 10.1.85.3
- adobe flash_player 10.3.183.11
- adobe flash_player 11.2.202.233
- adobe flash_player 9.0.31
- adobe flash_player 10.3.181.23
- adobe adobe_air 2.7.0.19480
- adobe flash_player 10.3.181.26
- adobe flash_player_for_android 11.1.112.60
- adobe flash_player 9.0.31.0
- adobe adobe_air 2.0.4
- adobe flash_player 10.3.183.15
- adobe adobe_air 3.2.0.2070
- adobe flash_player 11.1.102.63
- adobe flash_player 5
- adobe flash_player 9.0.155.0
- adobe flash_player 9.0.115.0
- adobe flash_player 7.0.67.0
- adobe adobe_air 2.0.2.12610
- adobe flash_player 7.0.73.0
- adobe flash_player 9.0.48.0
- adobe adobe_air 2.0.2
- adobe flash_player 10.2.156.12
- adobe flash_player 10.2.152
- adobe flash_player 9.125.0
- adobe flash_player up to 11.2.202.235
- adobe flash_player 9.0.28
- adobe adobe_air 2.7.0.1948
- adobe flash_player 9.0.20.0
- adobe flash_player 10.1.106.17
- adobe flash_player 11.0
- adobe flash_player 10.3.181.14
- adobe flash_player 8.0.33.0
- adobe adobe_air 3.1.0.488
- adobe flash_player 10.2.157.51
- adobe flash_player_for_android 11.1.111.6
- adobe adobe_air 1.5.0.7220
- adobe flash_player 11.1.102.55
- adobe flash_player 7.0.63
- adobe flash_player 9.0.16
- adobe flash_player 6.0.21.0
- adobe flash_player 7.0.14.0
- adobe flash_player 9.0.20
- adobe adobe_air 2.6
- adobe adobe_air 1.5.1.8210
- adobe flash_player 9.0.125.0
- adobe flash_player 9.0.112.0
- adobe flash_player 7.0.53.0
- adobe adobe_air up to 3.3.0.3670
- adobe flash_player 10.3.186.3
- adobe flash_player 9.0.18d60
- adobe flash_player 10.1.52.15
- adobe flash_player 10.0.12.36
- adobe flash_player 10.1.95.1
- adobe flash_player 10.2.153.1
- adobe flash_player 10.2.154.13
- adobe flash_player 6
- adobe flash_player 10.0.32.18
- adobe flash_player 10.3.183.5
- adobe adobe_air 1.5.2
- adobe adobe_air 3.0.0.4080
- adobe flash_player 10.3.186.7
- adobe flash_player 11.2.202.228
- adobe flash_player 6.0.79
- adobe flash_player 10.3.183.7
- adobe adobe_air 1.5.3.9130
- adobe adobe_air 1.0.4990
- adobe flash_player 10.0.42.34
- adobe flash_player 2
- adobe flash_player 7.0.24.0
- adobe flash_player 10.3.183.18
- adobe flash_player 9.0.124.0
- adobe flash_player 10.0.12.10
- adobe flash_player 10.1.82.76
- adobe flash_player 10.1.105.6
- adobe flash_player 9.0.114.0
- adobe adobe_air 3.1.0.4880
- adobe flash_player_for_android 11.1.111.8
- adobe adobe_air 1.0.8.4990
- adobe adobe_air 2.7.0.19530
- adobe flash_player 10.3.181.34
- adobe flash_player 7.0.69.0
- adobe flash_player 11.0.1.152
- adobe flash_player 8.0.39.0
- adobe flash_player_for_android 11.1.115.6
- adobe flash_player 8.0.34.0
- adobe flash_player 7.0.60.0
- adobe flash_player 10.3.183.10
- adobe adobe_air 2.7.1.19610
- adobe flash_player 10
HTTP:STC:ADOBE:SHOCKWAVE-OOB - HTTP: Adobe Shockwave Player rcsL Chunk Parsing Out of Bounds Array Indexing
Severity: HIGH
Description:
A code execution vulnerability has been reported in Adobe Shockwave Player. The vulnerability is due to an error while parsing crafted data in an rcsL RIFF chunk of a DIR file. An attacker can exploit this vulnerability by enticing a user to process a malicious file, which can result in remote code execution under the security context of the current user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Adobe Shockwave Player 11.5.9.620
- Adobe Shockwave Player 11.0.0.456
- Adobe Shockwave Player 11.5.0.596
- Adobe Shockwave Player 11.5.0.600
- Adobe Shockwave Player 11.5.0.595
- Adobe Shockwave Player 11.5.2.606
- Adobe Shockwave Player 11.5.9.615
- Adobe Shockwave Player 11.5.8.612
- Adobe Shockwave Player 11.6.0.626
- Adobe Shockwave Player 11.5.0.601
- Adobe Shockwave Player 11.5.7.609
- Adobe Shockwave Player 11.6.3.633
- Adobe Shockwave Player 11.5.6.606
- Adobe Shockwave Player 11.5.1.601
- Adobe Shockwave Player 11.5.2.602
- Adobe Shockwave Player 11
- Adobe Shockwave Player 11.0.3.471
APP:SYMC:MESSAGING-SAVE.DO-CSRF - APP: Symantec Messaging Gateway Save.do Cross Site Request Forgery
Severity: HIGH
Description:
This signature detects attempts to exploit a known cross-site request forgery (CSRF) vulnerability against Symantec messaging gateway. It is due to input validation errors when accepting user input. A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful attack may result in adding an administrator user to the system.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- symantec messaging_gateway up to 9.5.4
- symantec messaging_gateway 9.5
- symantec messaging_gateway 9.5.1
- symantec messaging_gateway 10.0
- symantec messaging_gateway 9.5.2
- symantec messaging_gateway 9.5.3
HTTP:STC:DL:XLS-AXISPARENT - HTTP: Microsoft Excel Axisparent Record Index Handling Code Execution
Severity: HIGH
Description:
This signature detects an attempt to exploit a known code execution vulnerability in Microsoft Excel. In a successful attack where arbitrary code is attempted to be injected and executed on the target machine, the behavior of the target is dependent on the intention of the malicious code. In an unsuccessful attack, the application can terminate. If unexpected application termination is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Office Excel Viewer 2003
- Avaya Messaging Application Server MM 3.1
- Microsoft Office 2000 SP3
- Microsoft Excel 2002 SP3
- Microsoft Office 2004 for Mac
- Microsoft Excel 2003 SP2
- Microsoft Excel 2003 SP3
- Avaya Messaging Application Server MM 1.1
- Avaya Messaging Application Server MM 2.0
- Avaya Messaging Application Server
- Microsoft Office 2008 for Mac
- Avaya Messaging Application Server MM 3.0
HTTP:ORACLE:OUTSIDEIN-CORELDRAW - HTTP: Oracle Outside In CorelDRAW File Parser Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Oracle Outside-In. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Oracle Fusion Middleware 8.3.7
- Oracle Fusion Middleware 8.3.5.0
HTTP:RUBYONRAILS-JSONYAML-RCE - HTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against applications developed using Ruby on Rails. A successful attack can lead to arbitrary code execution.
Supported On:
DI-Base, DI-Server, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- rubyonrails ruby_on_rails 2.3.15
- rubyonrails ruby_on_rails 3.0.19
- rubyonrails ruby_on_rails 2.3.14
- rubyonrails ruby_on_rails 3.0.18
- rubyonrails ruby_on_rails 3.0.10 (rc1)
- rubyonrails ruby_on_rails 3.0.0 (beta)
- rubyonrails ruby_on_rails 3.0.9 (rc4)
- rubyonrails ruby_on_rails 2.3.9
- rubyonrails ruby_on_rails 2.3.11
- rubyonrails ruby_on_rails 3.0.8 (rc4)
- rubyonrails ruby_on_rails 3.0.0 (rc2)
- rubyonrails ruby_on_rails 3.0.17
- rubyonrails ruby_on_rails 3.0.0 (beta4)
- rubyonrails ruby_on_rails 2.3.10
- rubyonrails ruby_on_rails 3.0.4 (rc1)
- rubyonrails ruby_on_rails 3.0.16
- rubyonrails ruby_on_rails 2.3.13
- rubyonrails ruby_on_rails 3.0.8 (rc3)
- rubyonrails ruby_on_rails 2.3.4
- rubyonrails ruby_on_rails 2.3.12
- rubyonrails ruby_on_rails 3.0.14
- rubyonrails ruby_on_rails 3.0.9 (rc1)
- rubyonrails ruby_on_rails 3.0.0 (beta3)
- rubyonrails ruby_on_rails 3.0.3
- rubyonrails ruby_on_rails 3.0.0 (rc)
- rubyonrails ruby_on_rails 2.3.3
- rubyonrails ruby_on_rails 3.0.11
- rubyonrails ruby_on_rails 3.0.7 (rc2)
- rubyonrails ruby_on_rails 2.3.2
- rubyonrails ruby_on_rails 3.0.9 (rc5)
- rubyonrails ruby_on_rails 3.0.1 (pre)
- rubyonrails ruby_on_rails 2.3.1
- rubyonrails ruby_on_rails 3.0.8 (rc1)
- rubyonrails ruby_on_rails 2.3.0
- rubyonrails ruby_on_rails 3.0.13 (rc1)
- rubyonrails ruby_on_rails 3.0.6 (rc1)
- rubyonrails ruby_on_rails 3.0.8 (rc2)
- rubyonrails ruby_on_rails 3.0.0 (beta2)
- rubyonrails ruby_on_rails 3.0.9 (rc3)
- rubyonrails ruby_on_rails 3.0.4 (rc)
- rubyonrails ruby_on_rails 3.0.12 (rc1)
- rubyonrails ruby_on_rails 3.0.2 (pre)
- rubyonrails ruby_on_rails 3.0.5 (rc1)
- rubyonrails ruby_on_rails 3.0.7 (rc1)
- rubyonrails ruby_on_rails 3.0.9 (rc2)
- rubyonrails ruby_on_rails 3.0.6 (rc2)
HTTP:STC:JAVA:IBM-RMI-PROXY-RCE - HTTP: IBM Java package com.ibm.rmi.util.ProxyUtil Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in IBM Java "com.ibm.rmi.util.ProxyUtil" package. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- ibm java 1.4.2.13.11
- ibm smart_analytics_system_5600 7200
- ibm java up to 6.0.3.0
- ibm java 6.0.9.2
- ibm lotus_notes 8.5.2.0
- ibm java 1.4.2.13.8
- ibm lotus_domino 8.5.1.5
- tivoli_storage_productivity_center 5.0
- ibm lotus_domino 8.5.1
- ibm lotus_notes_traveler 8.0
- ibm lotus_domino 8.5.1.3
- ibm lotus_notes 8.5.3
- tivoli_storage_productivity_center 5.1.1
- ibm lotus_domino 8.5.1.1
- ibm java 1.4.2.13.4
- ibm lotus_notes 8.5
- ibm rational_host_on-demand 11.0.6.1
- ibm java 6.0.10.0
- ibm lotus_notes 8.5.1
- ibm java 5.0.0.0
- ibm lotus_notes_traveler 8.5.1.3
- ibm lotus_notes 8.5.1.3
- ibm java 1.4.2.13.6
- ibm lotus_notes 8.5.1.0
- ibm rational_host_on-demand 9.0.8.0
- ibm java 1.4.2.13.3
- ibm lotus_domino 8.5.2.4
- ibm lotus_notes_traveler 8.5.1.1
- ibm lotus_notes 8.5.1.1
- ibm lotus_notes 8.0.2.5
- ibm java up to 5.0.14.0
- ibm java 5.0.12.4
- ibm lotus_notes 8.5.2.2
- ibm lotus_notes 8.5.1.5
- ibm java 1.4.2.13.2
- ibm tivoli_monitoring 6.2.3.0
- ibm java 5.0.12.2
- ibm java 1.4.2
- ibm lotus_domino 8.5.2.0
- ibm java 5.0.13.0
- ibm lotus_notes_traveler 8.5.0.2
- ibm lotus_notes_traveler 8.0.1.3
- ibm tivoli_monitoring 6.2.3.2
- ibm java 5.0.12.0
- ibm lotus_domino 8.5.2.2
- ibm lotus_notes_traveler 8.5.0.0
- ibm java 5.0.11.2
- ibm tivoli_monitoring 6.2.1.4
- ibm rational_host_on-demand 10.0.10.0
- ibm lotus_notes 8.5.0.0
- ibm tivoli_monitoring 6.2.2.9
- ibm tivoli_monitoring 6.2.1.2
- ibm smart_analytics_system_5600_software -
- ibm lotus_domino 8.5.3.1
- ibm lotus_domino 8.0.2
- ibm tivoli_monitoring 6.2.1.0
- ibm websphere_real_time 2.0
- ibm java 7.0.3.0
- ibm lotus_domino 8.0.2.1
- ibm lotus_notes_traveler 8.5.3.1
- ibm lotus_notes 8.5.3.1
- ibm java 5.0.12.3
- ibm rational_host_on-demand 11.0.5.1
- ibm lotus_notes 8.0.2
- ibm lotus_domino 8.0.2.3
- ibm java 6.0.1.0
- ibm java up to 1.4.2.13.13
- ibm tivoli_monitoring 6.2.2.1
- tivoli_storage_productivity_center 5.1
- ibm lotus_notes 8.0.0
- ibm lotus_notes 8.0.2.1
- ibm lotus_notes 8.0.2.6
- ibm tivoli_monitoring 6.2.2.3
- ibm rational_change 4.7
- ibm lotus_notes 8.0.2.3
- ibm rational_host_on-demand 11.0.3.0
- ibm tivoli_monitoring 6.2.2.5
- ibm java 7.0.0.0
- ibm lotus_domino 8.5.0
- ibm java 6.0.9.0
- ibm tivoli_monitoring 6.2.2.7
- ibm lotus_notes_traveler 8.5.3.3 (interim_fix_1)
- ibm lotus_notes 8.5.0.1
- ibm tivoli_monitoring 6.2.0.3
- ibm tivoli_monitoring 6.1.0.7
- ibm lotus_notes_traveler 8.0.1.2
- ibm tivoli_monitoring 6.2.0.1
- ibm lotus_notes 8.0.2.0
- ibm java 1.4.2.13.10
- ibm lotus_domino 8.5.0.1
- ibm java 1.4.2.13.9
- ibm java 1.4.2.13
- ibm java 1.4.2.13.12
- ibm lotus_notes 8.5.4
- ibm lotus_notes 8.0
- ibm java 6.0.7.0
- ibm tivoli_remote_control 5.1.2
- ibm java 6.0.0.0
- ibm java 1.4.2.13.5
- ibm rational_host_on-demand 11.0.6.0
- ibm rational_change 5.2
- ibm rational_host_on-demand 1.6.0.12
- ibm lotus_domino 8.5.2.3
- ibm lotus_notes_traveler 8.5.1.2
- ibm lotus_notes 8.5.1.4
- ibm java 1.4.2.13.7
- ibm lotus_domino 8.0
- ibm lotus_notes 8.5.1.2
- ibm java 1.4.2.13.1
- ibm lotus_domino 8.5.1.2
- ibm java 7.0.1.0
- ibm rational_host_on-demand 11.0.4.0
- ibm lotus_notes 8.5.2.1
- ibm lotus_domino 8.5.1.4
- ibm java 6.0.8.1
- ibm tivoli_monitoring 6.2.3.1
- ibm java 5.0.12.5
- ibm service_delivery_manager 7.2.1.0
- ibm lotus_notes 8.5.2.3
- ibm lotus_notes_traveler 8.5.3
- ibm lotus_domino 8.5.2.1
- ibm lotus_notes_traveler 8.5.0.1
- ibm lotus_notes_sametime 8.0.80822
- ibm java 5.0.11.1
- ibm java 5.0.12.1
- ibm service_delivery_manager 7.2.2.0
- ibm java 6.0.2.0
- ibm tivoli_monitoring 6.2.2.8
- ibm tivoli_monitoring 6.2.1.3
- ibm tivoli_monitoring 6.2.1.1
- ibm tivoli_monitoring 6.2.3
- ibm lotus_domino 8.5.3.0
- ibm lotus_notes_sametime 8.5.1.20100709-1631 (:~~advanced_embedded~~~)
- ibm tivoli_monitoring 6.1.0
- ibm lotus_domino 8.0.1
- ibm lotus_domino 8.5.3.2
- ibm java up to 7.0.2.0
- ibm lotus_notes 8.0.2.4
- ibm lotus_notes_traveler 8.5.3.2
- ibm smart_analytics_system_5600_software 9.7
- ibm rational_host_on-demand 11.0.5.0
- ibm tivoli_monitoring 6.2.2.0
- ibm lotus_notes_traveler 8.0.1
- ibm lotus_notes 8.0.1
- ibm lotus_notes_sametime 8.0.80407
- ibm lotus_domino 8.0.2.2
- ibm websphere_real_time 3.0
- ibm lotus_notes 8.5.3.2
- ibm java 6.0.10.1
- ibm tivoli_monitoring 6.2.2.2
- ibm rational_change 5.1
- ibm lotus_domino 8.0.2.4
- ibm rational_host_on-demand 10.0.9.0
- ibm lotus_notes_traveler 8.5.2.1
- ibm rational_host_on-demand 8.0.8.0
- ibm tivoli_monitoring 6.2.2.4
- ibm rational_change 5.3
- ibm tivoli_monitoring 6.2.2
- ibm lotus_notes 8.0.2.2
- ibm tivoli_monitoring 6.2.2.6
- ibm tivoli_monitoring 6.2.0
- ibm tivoli_monitoring 6.2.0.2
- ibm tivoli_monitoring 6.2.1
- ibm java 6.0.9.1
- ibm java up to 6.0.11.0
- ibm java 6.0.8.0
HTTP:STC:DL:MOZILLA-WAV-BOF - HTTP: Mozilla Product WAV Processing Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Mozilla Product. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:MS-WINDOWS-X509-DOS - HTTP: Microsoft Windows X.509 Certificate Validation Denial of Service
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows. A successful attack can result in a denial-of-service condition.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- microsoft windows_server_2008 r2 (sp1:itanium)
- microsoft windows_server_2008 r2 (sp1:x64)
- microsoft windows_server_2008 (sp2:x86)
- microsoft windows_2003_server (sp2:itanium)
- microsoft windows_vista (sp2:x64)
- microsoft windows_7 (sp1:x86)
- microsoft windows_8 - (-:x86)
- microsoft windows_xp (sp2:professional)
- microsoft windows_8.1 - (-:~-~-~-~x86~)
- microsoft windows_server_2008 (sp2:itanium)
- microsoft windows_xp (sp3)
- microsoft windows_rt -
- microsoft windows_7 (sp1:x64)
- microsoft windows_server_2012 -
- microsoft windows_server_2012 r2 (-:~-~standard~~~)
- microsoft windows_rt_8.1 -
- microsoft windows_server_2008 (sp2:x64)
- microsoft windows_8.1 - (-:~-~-~-~x64~)
- microsoft windows_2003_server (sp2:x64)
- microsoft windows_8 - (-:x64)
HTTP:STC:IE:REMOVECHILD-UAF - HTTP: Microsoft Internet Explorer removeChild Use After Free
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:MS-CVE-2014-4121-RCE - HTTP: Microsoft .NET Framework CVE-2014-4121 Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft .NET Framework. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:IE:9-10-OBJERR-UAF - HTTP: Microsoft Internet Explorer 9 and 10 Improper Object Handling Use-After-Free
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- microsoft internet_explorer 9
- microsoft internet_explorer 10
HTTP:STC:DL:WEBEX-ATDL-BOF - HTTP: Cisco WebEx Recording Format Player atdl2006.dll Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Cisco WebEx Recording Format (WRF) Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the target program.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Cisco WebEx (Linux) T27 L SP11 EP26
- Cisco WebEx (Linux) T27 LB SP21 EP10
- Cisco WebEx (Linux) T27 LC SP25 EP9
- Cisco WebEx (Linux) T27 LD SP32
- Cisco WebEx (Mac OS X) T27 LC SP25 EP9
- Cisco WebEx (Mac OS X) T27 LB SP21 EP10
- Cisco WebEx (Mac OS X) T27 L SP11 EP26
- Cisco WebEx (Windows) T27 L SP11 EP26
- Cisco WebEx (Windows) T27 LB SP21 EP10
- Cisco WebEx (Windows) T27 LC SP25 EP9
- Cisco WebEx (Mac OS X) T27 LD SP32
- Cisco WebEx (Windows) T27 LD SP32
HTTP:STC:STREAM:QT-HREFTRACK - HTTP: Apple Quicktime 'HREFTrack' Cross-Zone Scripting
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Apple Quicktime. Quicktime versions 7.1.3 and prior are vulnerable. iTunes versions 7.0.2.16 and prior are also vulnerable. Attackers can cause malicious scripts to be executed outside of the intended security zone by embedding them in a specially crafted MOV file.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:JAVA:GSUB-TABLE-BO - HTTP: Oracle Java SE GSUB FeatureCount Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
APP:WINAMP:MIDI-FILE-OF - APP: Nullsoft Winamp MIDI File Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Nullsoft Winamp. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:MS-WORDPERFECT-BOF - HTTP: Microsoft WordPerfect Length Field Parsing Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft WordPerfect. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Word 2000 SP3
- Microsoft Word 2002
- Microsoft Word 2002 SP2
- Microsoft FrontPage 2002
- Microsoft FrontPage 2000 SR1
- Microsoft FrontPage 2000 SP2
- Microsoft FrontPage 2002 SP1
- Microsoft Office XP SP3
- Microsoft Works 2000
- Microsoft Publisher 2002
- Microsoft Office 2000 SP1
- Microsoft Office 2000 SP2
- Microsoft Word 2000 SP2
- Microsoft Office XP SP1
- Microsoft Works Suite 2001
- Microsoft Works Suite 2002
- Microsoft Works Suite 2003
- Microsoft FrontPage 2000 SP1
- Microsoft Publisher 2000
- Microsoft Word 2003
- Microsoft Word 2002 SP1
- Microsoft Office XP
- Microsoft Word 2000 SR1
- Microsoft Word 2000 Sr1a
- Microsoft FrontPage 2000
- Microsoft FrontPage 2003
- Microsoft Publisher 2003
- Microsoft Word 2000
- Microsoft Office 2003
- Microsoft Works Suite 2004
- Microsoft Office 2000
- Microsoft Office 2000 SP3
- Microsoft Office XP SP2
HTTP:STC:DL:EOT-IO - HTTP: Microsoft Windows Win32k EOT Parsing Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Windows Win32k EOT. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Windows XP Professional
- Microsoft Windows XP Home
- Microsoft Windows XP Embedded
- Microsoft Windows XP Embedded SP1
- Nortel Networks Self-Service MPS 100
- Nortel Networks Self-Service MPS 500
- Microsoft Windows Server 2003 x64 SP2
- Nortel Networks Self-Service Speech Server
- Nortel Networks Contact Center - TAPI Server
- Nortel Networks Contact Center Manager Server
- Nortel Networks Contact Center Express
- Nortel Networks Self-Service CCXML
- Nortel Networks Self Service VoiceXML
- Microsoft Windows Server 2003 x64 SP1
- Microsoft Windows Server 2003 Web Edition SP2
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Server 2003 Itanium
- Microsoft Windows Server 2003 Itanium SP1
- Microsoft Windows Server 2003 Itanium SP2
- Microsoft Windows Server 2003 Datacenter x64 Edition SP2
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft Windows Server 2003 Standard Edition SP2
- Microsoft Windows XP Tablet PC Edition SP1
- Microsoft Windows 2000 Professional
- Avaya Messaging Application Server
- Nortel Networks Self-Service WVADS
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Advanced Server SP1
- Avaya Messaging Application Server MM 3.1
- Microsoft Windows XP 64-bit Edition Version 2003
- Microsoft Windows XP Media Center Edition
- Microsoft Windows XP Tablet PC Edition
- Avaya Messaging Application Server MM 1.1
- Nortel Networks Contact Center Multimedia
- Microsoft Windows XP 64-bit Edition
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Professional SP1
- Microsoft Windows XP Tablet PC Edition SP3
- Microsoft Windows XP Professional x64 Edition SP3
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Media Center Edition SP3
- Microsoft Windows XP Home SP3
- Microsoft Windows Server 2003 Datacenter Edition SP1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition SP1
- Microsoft Windows Server 2003 Standard Edition SP1
- Microsoft Windows Server 2003 Web Edition SP1
- Nortel Networks Contact Center Administration
- Microsoft Windows 2000 Professional SP4
- Nortel Networks Self-Service MPS 1000
- Microsoft Windows Server 2003 Enterprise Edition
- Microsoft Windows Server 2003 Datacenter Edition
- Microsoft Windows Server 2003 Web Edition
- Microsoft Windows Server 2003 Enterprise Edition Itanium
- Microsoft Windows Server 2003 Datacenter Edition Itanium
- Microsoft Windows XP 64-bit Edition Version 2003 SP1
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Advanced Server SP3
- Microsoft Windows 2000 Datacenter Server SP3
- Microsoft Windows XP 64-bit Edition SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Nortel Networks Contact Center NCC
- Microsoft Windows XP Tablet PC Edition SP2
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server SP4
- Microsoft Windows 2000 Datacenter Server SP4
- Microsoft Windows XP Embedded SP2
- Microsoft Windows XP Embedded SP2 Feature Pack 2007
- Microsoft Windows XP Embedded Update Rollup 1.0
- Microsoft Windows XP Embedded SP3
- Nortel Networks CallPilot 703T
- Nortel Networks CallPilot 702T
- Nortel Networks CallPilot 201I
- Nortel Networks CallPilot 200I
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange - Recording Server
- Avaya Meeting Exchange - Streaming Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya Meeting Exchange - Webportal
- Microsoft Windows Server 2003 Datacenter Edition SP1 Beta 1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1 Beta 1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1 Beta 1
- Microsoft Windows Server 2003 Enterprise Edition SP1 Beta 1
- Microsoft Windows Server 2003 Standard Edition SP1 Beta 1
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 SP2
- Avaya Messaging Application Server MM 2.0
- Microsoft Windows XP Gold
- Nortel Networks Self-Service - CCSS7
- Microsoft Windows XP Home SP2
- Microsoft Windows XP Professional SP2
- Microsoft Windows XP Media Center Edition SP1
- Microsoft Windows XP Media Center Edition SP2
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Nortel Networks CallPilot 1002Rp
- Microsoft Windows Server 2003 Standard Edition
- Avaya Messaging Application Server MM 3.0
- Microsoft Windows Server 2003 Standard x64 Edition
- Microsoft Windows Server 2003 Web Edition SP1 Beta 1
- Microsoft Windows Server 2003 Datacenter x64 Edition
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows XP
Severity: MEDIUM
Description:
This signature detects backslash (\) characters in the URL portion of an HTTP request. Attackers can use a backslash as a directory separator instead of the normal forward slash (/) to bypass the Microsoft IIS ASP.Net authentication capabilities and access protected resources. Note: A poorly configured Web server can also display a backslash in a non-malicious URL request.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft ASP.NET
- Microsoft ASP.NET 1.1
- Microsoft ASP.NET 1.0
- Microsoft .NET Framework 1.0 SP1
- Microsoft .NET Framework 1.1
- Microsoft .NET Framework 1.0 SP2
- Microsoft .NET Framework 1.0
- Microsoft .NET Framework 1.0 SP3
- Microsoft .NET Framework 1.1 SP1
HTTP:STC:DL:VISIO-UMLSTRING - HTTP: Microsoft Visio UMLString Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Visio. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:ADOBE:PS-PNG-BO - HTTP: Adobe Products PNG File Handling Stack Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Photoshop. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Adobe Photoshop CS3
- Adobe Photoshop CS2
- Corel Paint Shop Pro Photo 11.20
- Adobe Illustrator CS3
- Adobe GoLive 9
- Adobe Photoshop Elements 5.0
HTTP:STC:DL:MS-DIRECTSHOW-RCE - HTTP: Microsoft Windows DirectShow JPEG Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows DirectShow. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:JAVA:METHODHANDLE - HTTP: Oracle Java Private MethodHandle Sandbox Bypass
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. The vulnerability is due to a failure to restrict access to private methods via reflection. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- oracle jdk 1.7.0 (update_45)
- oracle jre 1.7.0 (update_45)
HTTP:ORACLE:OUTSIDE-IN-MSACCESS - HTTP: Oracle Outside In Microsoft Access 1.x Parser Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Oracle Outside-In Microsoft Access 1.x database files (.mdb) Parser. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- oracle fusion_middleware 8.4
- oracle fusion_middleware 8.4.1
HTTP:STC:DL:CISCO-WEBEX-ATDL - HTTP: Cisco WebEx Player ATDL2006.dll Heap Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Cisco WebEx Player. A successful attack can lead to a heap memory corruption and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Cisco WebEx (Linux) 26.00
- Cisco WebEx (Linux) 27.00
- Cisco WebEx (Mac OS X) 26.00
- Cisco WebEx (Mac OS X) 27.00
- Cisco WebEx (Windows) 27.00
- Cisco WebEx (Windows) 26.00
- Cisco WebEx (Linux) 26.49.35
- Cisco WebEx (Linux) 27.11.8
- Cisco WebEx (Mac OS X) 27.11.8
- Cisco WebEx (Mac OS X) 26.49.35
- Cisco WebEx (Windows) 27.10.0
- Cisco WebEx (Windows) 26.49.32
- Cisco WebEx 27
- Cisco WebEx
- Cisco WebEx (Linux) 27LC SP22
- Cisco WebEx (Mac OS X) 27LC SP22
- Cisco WebEx (Windows) 27LC SP22
- Cisco WebEx (Linux) 27LB SP21 EP3
- Cisco WebEx (Mac OS X) 27LB SP21 EP3
- Cisco WebEx (Windows) 27LB SP21 EP3
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the php_quot_print_encode() function in PHP. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- php 5.0.4
- php 3.0.1
- php 5.4.4
- php 4.4.6
- php 1.0
- php 5.3.9
- php 3.0.3
- php 5.1.4
- php up to 5.3.25
- php 4.3.2
- php 5.3.21
- php 3.0.5
- php 4.3.4
- php 5.3.23
- php 5.3.12
- php 4.0 (beta4)
- php 3.0.7
- php 5.1.6
- php 4.4.8
- php 5.2.5
- php 5.4.11
- php 5.2.7
- php 5.1.0
- php 5.2.12
- php 4.3.11
- php 5.2.1
- php 5.3.15
- php 4.3.0
- php 2.0
- php 4.4.5
- php 5.2.10
- php 5.2.3
- php 4.0.6
- php 5.2.16
- php 5.3.18
- php 4.0.4
- php 5.3.1
- php 5.2.14
- php 5.1.3
- php 5.0.3
- php 4.0.2
- php 5.3.3
- php 4.0.0
- php 5.2.9
- php 5.3.5
- php 5.3.7
- php 5.3.10
- php 5.4.10
- php 4.2.0
- php 5.0.5
- php 5.4.9
- php 5.4.12
- php 4.2.2
- php 5.3.14
- php 3.0.8
- php 5.4.14
- php 5.3.13
- php 5.3.16
- php 5.0.0 (rc1)
- php 5.0.1
- php 5.0.0 (beta4)
- php 4.3.9
- php 3.0.15
- php 5.4.3
- php 4.4.3
- php 3.0.13
- php 5.4.1
- php 5.1.1
- php 3.0.17
- php 5.0.0 (beta1)
- php 3.0.11
- php 5.4.7
- php 4.4.7
- php 3.0.2
- php 5.0.0 (rc3)
- php 5.2.4
- php 5.4.5
- php 5.1.5
- php 4.0 (beta3)
- php 5.2.8
- php 5.1.2
- php 4.0 (beta2)
- php 4.3.1
- php 5.3.20
- php 3.0.4
- php 4.0 (beta_4_patch1)
- php 4.3.3
- php 5.3.22
- php 3.0.6
- php 4.4.9
- php 5.4.2
- php 5.0.0 (beta2)
- php 4.3.5
- php 5.3.24
- php 5.2.6
- php 4.3.7
- php 4.3.10
- php 5.2.0
- php 4.3.6
- php 5.2.13
- php 5.2.2
- php 2.0b10
- php 4.0.7
- php 5.2.11
- php 5.3.19
- php 4.0.5
- php 3.0
- php 5.2.17
- php 4.0.3
- php 5.3.0
- php 5.2.15
- php 5.4.0
- php 4.0.1
- php 5.3.2
- php 5.3.4
- php 5.3.11
- php 5.3.6
- php 4.2.1
- php 4.1.1
- php 4.4.1
- php 5.4.8
- php 5.3.8
- php 4.2.3
- php 5.0.2
- php 5.0.0 (beta3)
- php 3.0.18
- php 5.4.13
- php 5.3.17
- php 3.0.9
- php 3.0.16
- php 5.4.15
- php 4.3.8
- php 3.0.14
- php 4.1.2
- php 4.4.4
- php 3.0.12
- php 4.1.0
- php 4.4.2
- php 5.0.0 (rc2)
- php 4.0 (beta1)
- php 3.0.10
- php 5.4.6
- php 4.4.0
HTTP:STC:JAVA:FONT-HANDLNG-BO - HTTP: Oracle Java Font Glyph Storage Handling Off-by-one Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java SE Ligature Substitution Glyph. A successful attack can lead to buffer overflow and remote code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in Oracle Java. An unauthorized remote attacker can exploit this vulnerability by enticing the target user to open a malicious Java application or applet. Successful exploitation could breach the JRE sandbox and result in execution of arbitrary code the target system.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Ubuntu Ubuntu Linux 11.04 amd64
- Ubuntu Ubuntu Linux 11.04 ARM
- Ubuntu Ubuntu Linux 11.04 i386
- Ubuntu Ubuntu Linux 11.04 powerpc
- Red Hat Enterprise Linux Desktop 6
- Red Hat Enterprise Linux Desktop Optional 6
- Red Hat Enterprise Linux HPC Node 6
- Red Hat Enterprise Linux HPC Node Optional 6
- Red Hat Enterprise Linux Server 6
- Red Hat Enterprise Linux Server Optional 6
- Red Hat Enterprise Linux Workstation 6
- Red Hat Enterprise Linux Workstation Optional 6
- Red Hat Enterprise Linux Desktop Supplementary 6
- Apple Mac Os X 10.6.5
- Red Hat Enterprise Linux HPC Node Supplementary 6
- Apple Mac OS X Server 10.6.5
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Sun JRE (Linux Production Release) 1.5.0_29
- Sun JRE (Linux Production Release) 1.6.0_25
- Sun JRE (Windows Production Release) 1.6.0_22
- Sun JRE (Windows Production Release) 1.5.0_26
- Sun JRE (Windows Production Release) 1.5.0_29
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- SuSE SUSE Linux Enterprise Server 10 SP4
- Apple Mac OS X Server 10.6.3
- Apple Mac Os X 10.7.3
- Apple Mac Os X Server 10.7.3
- SuSE SUSE Linux Enterprise SDK 11 SP2
- SuSE SUSE Linux Enterprise Server 11 SP2
- Sun JDK (Linux Production Release) 1.5.0_29
- Sun JDK (Linux Production Release) 1.5.0_28
- Sun JDK (Linux Production Release) 1.6.0_24
- Sun JDK (Solaris Production Release) 1.5.0_28
- Sun JDK (Solaris Production Release) 1.6.0_24
- Sun JDK (Windows Production Release) 1.5.0_28
- Sun JDK (Windows Production Release) 1.6.0_24
- Sun JRE (Linux Production Release) 1.5.0_28
- Sun JRE (Linux Production Release) 1.6.0_24
- Sun JRE (Solaris Production Release) 1.5.0_28
- Sun JRE (Solaris Production Release) 1.6.0_24
- Sun JRE (Windows Production Release) 1.5.0_28
- Sun JRE (Windows Production Release) 1.6.0_24
- Apple Mac Os X 10.6.8
- Apple Mac Os X Server 10.6.8
- Apple Mac OS X 10.6.2
- Apple Mac OS X Server 10.6.2
- Apple Mac OS X 10.6.5
- Apple Mac OS X Server 10.6.5
- IBM Java SE 5.0.0 SR12
- IBM Java SE 5.0.0 SR12
- IBM Java SE 6.0.0 SR9
- Sun JDK (Windows Production Release) 1.5.0 .0 04
- Sun JRE (Linux Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.6.0 07
- Sun JRE (Linux Production Release) 1.5.0 16
- Sun JDK (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.6.0 05
- Sun JDK (Linux Production Release) 1.5.0 15
- Sun JDK (Solaris Production Release) 1.5.0 0 03
- Sun JDK (Linux Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.5.0 15
- Sun JRE (Solaris Production Release) 1.5.0 15
- Sun JRE (Linux Production Release) 1.6.0 06
- Sun JDK (Linux Production Release) 1.5.0 14
- Debian Linux 6.0 ia-32
- Debian Linux 6.0 amd64
- Debian Linux 6.0 arm
- Debian Linux 6.0 powerpc
- Debian Linux 6.0 sparc
- Debian Linux 6.0 ia-64
- Debian Linux 6.0 mips
- Sun JDK (Solaris Production Release) 1.5.0 0 09
- Sun JDK (Linux Production Release) 1.6.0_23
- Sun JDK (Solaris Production Release) 1.6.0_23
- Sun JDK (Windows Production Release) 1.6.0_23
- Sun JRE (Linux Production Release) 1.6.0_23
- Sun JRE (Solaris Production Release) 1.6.0_23
- Sun JRE (Windows Production Release) 1.6.0_23
- Sun JRE (Linux Production Release) 1.6.0 01
- Sun JDK (Linux Production Release) 1.5.0_33
- Sun JDK (Linux Production Release) 1.6.0_30
- Sun JDK (Solaris Production Release) 1.5.0_33
- Sun JDK (Windows Production Release) 1.5.0_33
- Sun JDK (Windows Production Release) 1.7.0_2
- Sun JDK (Linux Production Release) 1.7.0_2
- Sun JDK (Windows Production Release) 1.6.0_30
- Sun JDK (Solaris Production Release) 1.6.0_30
- Sun JDK (Solaris Production Release) 1.7.0_2
- Sun JRE (Linux Production Release) 1.6.0_30
- Sun JRE (Windows Production Release) 1.5.0_33
- Sun JRE (Windows Production Release) 1.7.0_2
- Sun JRE (Solaris Production Release) 1.7.0_2
- Sun JRE (Solaris Production Release) 1.5.0_33
- Sun JRE (Windows Production Release) 1.6.0_30
- Sun JRE (Linux Production Release) 1.5.0_33
- Sun JRE (Linux Production Release) 1.7.0_2
- Sun JRE (Solaris Production Release) 1.6.0_30
- Sun JDK (Windows Production Release) 1.6.0 20
- Sun JDK (Solaris Production Release) 1.6.0 20
- Sun JDK (Linux Production Release) 1.6.0 20
- Sun JRE (Linux Production Release) 1.6.0 14
- Sun JRE (Windows Production Release) 1.6.0 14
- Sun JRE (Solaris Production Release) 1.6.0 14
- IBM Java SE 5.0 SR11 PF1
- IBM Java SE 7.0
- IBM Java SE 5.0 SR13
- Mandriva Linux Mandrake 2011
- Mandriva Linux Mandrake 2011 x86_64
- Apple Mac Os X 10.7
- IBM Java SE 6 SR8 FP1
- Sun JRE (Solaris Production Release) 1.5.0.0 09
- Sun JDK (Linux Production Release) 1.5.0 16
- Sun JDK (Solaris Production Release) 1.5.0 16
- Sun JDK (Windows Production Release) 1.5.0 16
- Sun JRE (Linux Production Release) 1.5.0 07
- Sun JDK (Linux Production Release) 1.7.0
- Sun JDK (Linux Production Release) 1.5.0 01
- Sun JDK (Linux Production Release) 1.5.0 02
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Desktop Extras 4
- Sun JDK (Linux Production Release) 1.5.0 Update13
- Sun JDK (Linux Production Release) 1.5.0 Update14
- Sun JDK (Linux Production Release) 1.5.0 Update15
- Sun JDK (Linux Production Release) 1.5.0 Update16
- Sun JDK (Linux Production Release) 1.5.0 Update17
- Sun JDK (Linux Production Release) 1.5.0 Update18
- Sun JDK (Linux Production Release) 1.5.0 Update19
- Sun JDK (Linux Production Release) 1.5.0 Update20
- Sun JDK (Linux Production Release) 1.5.0 Update21
- Sun JDK (Linux Production Release) 1.5.0 Update22
- Sun JDK (Linux Production Release) 1.5.0 Update23
- Sun JDK (Linux Production Release) 1.5.0 Update24
- Sun JDK (Linux Production Release) 1.5.0 Update25
- Sun JDK (Linux Production Release) 1.6.0 Update 10
- Sun JDK (Linux Production Release) 1.6.0 Update 11
- Sun JDK (Linux Production Release) 1.6.0 Update 12
- Sun JDK (Linux Production Release) 1.6.0 Update 13
- Sun JDK (Linux Production Release) 1.6.0 Update 14
- Sun JDK (Linux Production Release) 1.6.0 Update 15
- Sun JDK (Linux Production Release) 1.6.0 Update 16
- Sun JDK (Linux Production Release) 1.6.0 Update 17
- Sun JDK (Linux Production Release) 1.6.0 Update 18
- Sun JDK (Linux Production Release) 1.6.0 Update 19
- Sun JDK (Linux Production Release) 1.6.0 Update 20
- Sun JDK (Linux Production Release) 1.6.0 Update 21
- Sun JDK (Linux Production Release) 1.6.0 Update 3
- Sun JDK (Linux Production Release) 1.6.0 Update 4
- Sun JDK (Linux Production Release) 1.6.0 Update 5
- Sun JDK (Linux Production Release) 1.6.0 Update 6
- Sun JDK (Linux Production Release) 1.6.0 Update 7
- Sun JRE (Linux Production Release) 1.5.0 15
- Apple Mac OS X 10.6
- Apple Mac OS X Server 10.6
- Oracle Enterprise Linux 5
- Oracle Enterprise Linux 6
- Sun JDK (Windows Production Release) 1.6.0 18
- Sun JDK (Solaris Production Release) 1.6.0 18
- Sun JDK (Linux Production Release) 1.6.0 18
- Sun JRE (Linux Production Release) 1.6.0 18
- Sun JRE (Windows Production Release) 1.6.0 18
- Sun JDK (Windows Production Release) 1.5.0 23
- Sun JRE (Solaris Production Release) 1.6.0 18
- Sun JDK (Linux Production Release) 1.5.0 23
- Sun JDK (Solaris Production Release) 1.5.0 23
- Sun JRE (Windows Production Release) 1.5.0 23
- Sun JRE (Linux Production Release) 1.5.0 23
- Sun JRE (Solaris Production Release) 1.5.0 23
- IBM JAVA IBM 31-bit SDK for z/OS 6.0
- Sun JDK (Windows Production Release) 1.5.0 .0 05
- Apple Mac OS X 10.6.3
- Sun JDK (Linux Production Release) 1.5.0 .0 05
- Sun JDK (Solaris Production Release) 1.5.0 .0 05
- Sun JRE (Linux Production Release) 1.6.0 19
- Sun JRE (Windows Production Release) 1.6.0 19
- Sun JRE (Solaris Production Release) 1.6.0 19
- Sun JDK (Solaris Production Release) 1.6.0 19
- Sun JDK (Windows Production Release) 1.6.0 19
- Sun JDK (Linux Production Release) 1.6.0 19
- Sun JDK (Linux Production Release) 1.5.0 24
- Sun JDK (Windows Production Release) 1.5.0 24
- Sun JDK (Solaris Production Release) 1.5.0 24
- Apple Mac Os X 10.6.6
- Apple Mac OS X Server 10.6.6
- Sun JRE (Linux Production Release) 1.6.0 12
- Sun JRE (Linux Production Release) 1.6.0
- Sun JRE (Linux Production Release) 1.6.0 10
- Apple Mac OS X Server 10.6.1
- Apple Mac OS X 10.6.1
- Sun JDK (Solaris Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.5.0 09
- HP HP-UX B.11.23
- Sun JDK (Windows Production Release) 1.6.0 01
- Sun JDK (Solaris Production Release) 1.5.0 07-B03
- Sun JDK (Solaris Production Release) 1.5.0 11-B03
- Sun JDK (Solaris Production Release) 1.6.0 01-B06
- Oracle Enterprise Linux 6.2
- Sun JRE (Linux Production Release) 1.6.0 11
- Sun JRE (Solaris Production Release) 1.6.0 11
- Sun JRE (Windows Production Release) 1.6.0 11
- Sun JRE (Solaris Production Release) 1.5.0
- Sun JRE (Linux Production Release) 1.5.0
- Sun JRE (Windows Production Release) 1.5.0
- Sun JRE (Windows Production Release) 1.5.0 06
- Sun JRE (Solaris Production Release) 1.5.0 06
- Sun JRE (Linux Production Release) 1.5.0 06
- Sun JRE (Linux Production Release) 1.5.0 03
- Sun JRE (Linux Production Release) 1.5.0 04
- Sun JDK (Linux Production Release) 1.6.0 10
- Sun JDK (Linux Production Release) 1.6.0 11
- IBM JAVA IBM 64-bit SDK for z/OS 6.0
- Sun JDK (Linux Production Release) 1.5.0 17
- Hitachi uCosminexus Operator
- Hitachi uCosminexus Client
- Hitachi Processing Kit for XML
- SuSE SUSE Linux Enterprise Java 10 SP4
- SuSE SUSE Linux Enterprise Java 11 SP1
- IBM Java SE 6 SR10
- Sun JDK (Windows Production Release) 1.5.0 14
- Red Hat Enterprise Linux Supplementary 5 Server
- Ubuntu Ubuntu Linux 10.10 amd64
- IBM Java SE 5.0
- IBM Java SE 6.0
- Sun JDK (Linux Production Release) 1.5.0
- Sun JDK (Linux Production Release) 1.5.0 07
- Sun JRE (Linux Production Release) 1.5.0 01
- Sun JRE (Linux Production Release) 1.5.0 02
- Sun JRE (Linux Production Release) 1.5.0 05
- Ubuntu Ubuntu Linux 10.10 powerpc
- Ubuntu Ubuntu Linux 10.10 i386
- HP HP-UX B.11.11
- Apple Mac Os X 10.7.2
- Sun JRE (Linux Production Release) 1.5.0 .0 Beta
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0
- SuSE SUSE Linux Enterprise Server 11 SP1
- SuSE SUSE Linux Enterprise SDK 11 SP1
- Sun JRE (Linux Production Release) 1.6.0 20
- Sun JRE (Windows Production Release) 1.6.0 20
- Sun JDK (Solaris Production Release) 1.6.0
- Apple Mac Os X 10.7.1
- Apple Mac Os X Server 10.7
- Apple Mac Os X Server 10.7.1
- Apple Mac Os X Server 10.7.2
- Sun JDK (Windows Production Release) 1.6.0
- Sun JDK (Windows Production Release) 1.5.0.0 12
- Sun JDK (Linux Production Release) 1.5.0.0 12
- Sun JDK (Solaris Production Release) 1.6.0 02
- Sun JRE (Windows Production Release) 1.5.0 09-B03
- Sun JDK (Solaris Production Release) 1.5.0_31
- Sun JDK (Windows Production Release) 1.5.0_31
- Sun JDK (Linux Production Release) 1.6.0_27
- Sun JDK (Solaris Production Release) 1.6.0_27
- Sun JDK (Windows Production Release) 1.6.0_27
- Sun JRE (Linux Production Release) 1.5.0_31
- Sun JRE (Solaris Production Release) 1.5.0_31
- HP Network Node Manager i 9.1
- Sun JRE (Linux Production Release) 1.6.0_27
- Sun JRE (Solaris Production Release) 1.6.0_27
- Sun JRE (Windows Production Release) 1.6.0_27
- Sun JRE (Linux Production Release) 1.7
- Sun JRE (Solaris Production Release) 1.7
- Sun JRE (Windows Production Release) 1.7
- Sun JDK (Linux Production Release) 1.5.0_31
- Sun JDK (Linux Production Release) 1.5.0.0 03
- Sun JDK (Linux Production Release) 1.5.0_32
- Sun JDK (Solaris Production Release) 1.5.0 .0 03
- Sun JDK (Windows Production Release) 1.5.0_32
- Sun JDK (Linux Production Release) 1.6.0_28
- Sun JDK (Solaris Production Release) 1.6.0_28
- Sun JDK (Linux Production Release) 1.5.0.0 04
- Sun JDK (Solaris Production Release) 1.5.0 .0 04
- Sun JRE (Linux Production Release) 1.5.0_32
- Sun JRE (Solaris Production Release) 1.5.0_32
- Sun JRE (Windows Production Release) 1.5.0_32
- Sun JRE (Linux Production Release) 1.6.0_28
- Sun JRE (Solaris Production Release) 1.6.0_28
- Sun JRE (Windows Production Release) 1.6.0_28
- Sun JDK (Windows Production Release) 1.5.0 07-B03
- Sun JDK (Windows Production Release) 1.5.0 11-B03
- Sun JDK (Windows Production Release) 1.6.0 01-B06
- IBM Java SE 5.0 SR10
- IBM Java SE 5.0 SR11
- IBM Java SE 6.0 SR6
- IBM Java SE 6.0 SR7
- Sun JDK (Linux Production Release) 1.5.0 07-B03
- Sun JDK (Linux Production Release) 1.5.0 11-B03
- Sun JDK (Linux Production Release) 1.6.0 01-B06
- Sun JRE (Solaris Production Release) 1.6.0_22
- Sun JDK (Solaris Production Release) 1.5.0 0 10
- Sun JDK (Linux Production Release) 1.6.0 14
- Sun JRE (Solaris Production Release) 1.5.0_25
- Ubuntu Ubuntu Linux 11.10 amd64
- Ubuntu Ubuntu Linux 11.10 i386
- IBM Java SE 6.0 SR5
- Sun JRE (Windows Production Release) 1.5.0.0 07
- Sun JRE (Solaris Production Release) 1.5.0.0 07
- Sun JDK (Windows Production Release) 1.5.0.0 08
- Sun JDK (Linux Production Release) 1.5.0.0 08
- Sun JRE (Windows Production Release) 1.5.0.0 08
- Sun JRE (Solaris Production Release) 1.5.0.0 08
- Sun JDK (Windows Production Release) 1.5.0.0 09
- Sun JDK (Linux Production Release) 1.5.0.0 09
- Sun JRE (Windows Production Release) 1.5.0.0 09
- Sun JRE (Linux Production Release) 1.5.0 14
- Sun JRE (Solaris Production Release) 1.5.0 14
- Sun JRE (Solaris Production Release) 1.6.0 2
- Sun JRE (Windows Production Release) 1.6.0 2
- Sun JRE (Windows Production Release) 1.5.0 14
- IBM Java SE 6.0.0 SR9-FP2
- Apple Mac OS X 10.6.4
- Apple Mac OS X Server 10.6.4
- Sun JRE (Solaris Production Release) 1.5.0 11
- Sun JRE (Windows Production Release) 1.5.0 11
- Sun JRE (Solaris Production Release) 1.5.0 10
- Sun JRE (Windows Production Release) 1.5.0 10
- Apple Mac Os X 10.6.7
- Apple Mac Os X Server 10.6.7
- Sun JRE (Solaris Production Release) 1.5.0 01
- Sun JRE (Windows Production Release) 1.5.0 01
- Sun JRE (Solaris Production Release) 1.5.0 02
- Sun JRE (Windows Production Release) 1.5.0 02
- Sun JRE (Solaris Production Release) 1.5.0 03
- Sun JRE (Windows Production Release) 1.5.0 03
- Sun JRE (Solaris Production Release) 1.5.0 04
- Sun JRE (Windows Production Release) 1.5.0 04
- Sun JRE (Solaris Production Release) 1.5.0 05
- Sun JRE (Windows Production Release) 1.5.0 05
- Sun JDK (Solaris Production Release) 1.5.0 01
- Sun JDK (Windows Production Release) 1.5.0 01
- Sun JDK (Solaris Production Release) 1.5.0 14
- Red Hat Enterprise Linux Desktop 5 Client
- Sun JDK (Windows Production Release) 1.5.0 15
- Sun JDK (Solaris Production Release) 1.5.0 17
- Sun JDK (Windows Production Release) 1.5.0 17
- Sun JDK (Solaris Production Release) 1.5.0 18
- Sun JDK (Windows Production Release) 1.5.0 18
- Sun JDK (Solaris Production Release) 1.5.0 02
- Sun JDK (Windows Production Release) 1.5.0 02
- Sun JDK (Solaris Production Release) 1.6.0 10
- Sun JDK (Windows Production Release) 1.6.0 10
- Sun JDK (Solaris Production Release) 1.6.0 04
- Sun JDK (Windows Production Release) 1.6.0 04
- Sun JDK (Solaris Production Release) 1.6.0 14
- Sun JDK (Windows Production Release) 1.6.0 14
- Sun JDK (Solaris Production Release) 1.6.0 13
- Sun JDK (Windows Production Release) 1.6.0 13
- Sun JDK (Solaris Production Release) 1.6.0 11
- Sun JDK (Windows Production Release) 1.6.0 11
- Sun JRE (Linux Production Release) 1.5.0 18
- Sun JRE (Linux Production Release) 1.6.0 13
- Sun JDK (Solaris Production Release) 1.6.0 05
- Sun JDK (Windows Production Release) 1.6.0 05
- Sun JDK (Windows Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 07
- Sun JDK (Windows Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.5.0 18
- Sun JDK (Linux Production Release) 1.6.0 13
- Sun JDK (Solaris Production Release) 1.7.0
- Sun JDK (Windows Production Release) 1.7.0
- Sun JRE (Solaris Production Release) 1.6.0
- Sun JRE (Windows Production Release) 1.6.0
- Sun JRE (Solaris Production Release) 1.6.0 10
- Sun JRE (Windows Production Release) 1.6.0 10
- Sun JRE (Windows Production Release) 1.5.0 15
- Sun JRE (Solaris Production Release) 1.5.0 16
- Sun JRE (Windows Production Release) 1.5.0 16
- Sun JRE (Solaris Production Release) 1.5.0 18
- Hitachi Cosminexus Developer Professional
- Sun JRE (Windows Production Release) 1.5.0 18
- Sun JRE (Solaris Production Release) 1.6.0 12
- Sun JRE (Windows Production Release) 1.6.0 12
- Sun JRE (Solaris Production Release) 1.6.0 13
- Sun JRE (Windows Production Release) 1.6.0 13
- Sun JRE (Solaris Production Release) 1.6.0 04
- Sun JRE (Windows Production Release) 1.6.0 04
- Sun JRE (Solaris Production Release) 1.6.0 05
- Sun JRE (Windows Production Release) 1.6.0 05
- Sun JRE (Solaris Production Release) 1.6.0 06
- Sun JRE (Windows Production Release) 1.6.0 06
- Sun JRE (Solaris Production Release) 1.6.0 07
- Sun JRE (Windows Production Release) 1.6.0 07
- Hitachi uCosminexus Application Server Enterprise
- HP HP-UX B.11.31
- Sun JDK (Linux Production Release) 1.5.0_27
- Sun JDK (Solaris Production Release) 1.5.0_27
- Sun JDK (Windows Production Release) 1.5.0_27
- Sun JRE (Linux Production Release) 1.5.0_27
- Sun JRE (Solaris Production Release) 1.5.0_27
- Sun JRE (Windows Production Release) 1.5.0_27
- Red Hat Fedora 16
- HP JDK and JRE 7.0.0
- Sun JDK (Linux Production Release) 1.6.0_21
- Sun JDK (Linux Production Release) 1.6.0_22
- Sun JDK (Linux Production Release) 1.5.0_25
- Sun JDK (Linux Production Release) 1.5.0_26
- Sun JDK (Solaris Production Release) 1.6.0_21
- Sun JDK (Solaris Production Release) 1.6.0_22
- Sun JDK (Solaris Production Release) 1.5.0_25
- Sun JDK (Solaris Production Release) 1.5.0_26
- Sun JDK (Windows Production Release) 1.6.0_21
- Sun JDK (Windows Production Release) 1.6.0_22
- Sun JDK (Windows Production Release) 1.5.0_25
- Sun JDK (Windows Production Release) 1.5.0_26
- Sun JRE (Linux Production Release) 1.6.0_21
- Sun JRE (Linux Production Release) 1.6.0_22
- Sun JRE (Linux Production Release) 1.5.0_25
- Hitachi uCosminexus Application Server Standard
- Sun JDK (Solaris Production Release) 1.5.0_29
- Sun JDK (Windows Production Release) 1.5.0_29
- Sun JRE (Solaris Production Release) 1.6.0_21
- Sun JDK (Solaris Production Release) 1.6.0_25
- Hitachi uCosminexus Application Server Smart Edition
- Sun JRE (Solaris Production Release) 1.5.0_26
- Hitachi uCosminexus Developer Standard
- Hitachi uCosminexus Developer Professional
- Sun JRE (Windows Production Release) 1.6.0_21
- Sun JRE (Solaris Production Release) 1.5.0_29
- Sun JRE (Windows Production Release) 1.5.0_25
- Sun JRE (Solaris Production Release) 1.6.0_25
- Hitachi uCosminexus Service Platform
- Sun JRE (Windows Production Release) 1.6.0_25
- Hitachi uCosminexus Service Architect
- Mandriva Enterprise Server 5
- Sun JDK (Linux Production Release) 1.6.0 02
- Sun JDK (Windows Production Release) 1.6.0 02
- Sun JRE (Windows Production Release) 1.5.0_31
- Sun JRE (Linux Production Release) 1.6.0 02
- Sun JRE (Solaris Production Release) 1.6.0 01
- Sun JRE (Solaris Production Release) 1.6.0 02
- Sun JRE (Windows Production Release) 1.6.0 01
- Sun JRE (Windows Production Release) 1.6.0 02
- Sun JDK (Windows Production Release) 1.5.0 12
- Sun JDK (Windows Production Release) 1.5.0 13
- Sun JDK (Solaris Production Release) 1.5.0 11
- Sun JDK (Solaris Production Release) 1.5.0 12
- Sun JDK (Solaris Production Release) 1.5.0 13
- Sun JDK (Linux Production Release) 1.5.0 13
- Sun JRE (Linux Production Release) 1.5.0 12
- Sun JRE (Linux Production Release) 1.5.0 13
- Sun JRE (Solaris Production Release) 1.5.0 12
- Sun JRE (Solaris Production Release) 1.5.0 13
- Sun JRE (Windows Production Release) 1.5.0 12
- Sun JRE (Windows Production Release) 1.5.0 13
- Sun JDK (Solaris Production Release) 1.6.0 03
- Sun JDK (Linux Production Release) 1.6.0 03
- Sun JDK (Linux Production Release) 1.6.0_25
- Sun JDK (Windows Production Release) 1.6.0 03
- Sun JRE (Linux Production Release) 1.6.0 03
- Sun JRE (Solaris Production Release) 1.6.0 03
- Sun JRE (Windows Production Release) 1.6.0 03
- Ubuntu Ubuntu Linux 10.04 ARM
- Ubuntu Ubuntu Linux 10.10 ARM
- Hitachi uCosminexus Developer Light
- Sun JDK (Windows Production Release) 1.5.0.0 06
- Sun JDK (Linux Production Release) 1.5.0 06
- IBM Java SE 5.0 SR12-FP5
- Sun JDK (Solaris Production Release) 1.5.0 06
- Hitachi Cosminexus Studio - Web Edition
- Sun JDK (Solaris Production Release) 1.5.0_32
- Sun JDK (Windows Production Release) 1.5.0 .0 03
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Red Hat Enterprise Linux 5 Server
- Sun JRE (Linux Production Release) 1.5.0 08
- Sun JDK (Windows Production Release) 1.6.0_25
- Sun JRE (Linux Production Release) 1.5.0 10
- Sun JDK (Linux Production Release) 1.5.0.0 11
- Sun JDK (Windows Production Release) 1.5.0.0 11
- Sun JRE (Linux Production Release) 1.5.0 11
- Sun JDK (Windows Production Release) 1.6.0_28
- Sun JDK (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.5.0 17
- Sun JRE (Windows Production Release) 1.5.0 17
- Sun JRE (Solaris Production Release) 1.5.0 17
- Sun JDK (Linux Production Release) 1.5.0_30
- Sun JDK (Linux Production Release) 1.6.0_26
- Sun JDK (Solaris Production Release) 1.5.0_30
- Sun JDK (Solaris Production Release) 1.6.0_26
- Sun JDK (Windows Production Release) 1.5.0_30
- Sun JDK (Windows Production Release) 1.6.0_26
- Sun JRE (Linux Production Release) 1.5.0_30
- Sun JRE (Linux Production Release) 1.6.0_26
- Sun JRE (Solaris Production Release) 1.5.0_30
- Sun JRE (Solaris Production Release) 1.6.0_26
- Sun JRE (Windows Production Release) 1.5.0_30
- Sun JRE (Windows Production Release) 1.6.0_26
- Sun JDK (Linux Production Release) 1.6.0 15
- Sun JDK (Windows Production Release) 1.6.0 15
- Sun JDK (Solaris Production Release) 1.6.0 15
- Sun JRE (Solaris Production Release) 1.6.0 15
- Sun JRE (Windows Production Release) 1.6.0 15
- Sun JRE (Linux Production Release) 1.6.0 15
- Sun JDK (Linux Production Release) 1.5.0 20
- Sun JDK (Windows Production Release) 1.5.0 20
- Sun JDK (Solaris Production Release) 1.5.0 20
- Sun JRE (Solaris Production Release) 1.5.0 20
- Sun JRE (Windows Production Release) 1.5.0 20
- Sun JRE (Linux Production Release) 1.5.0 20
- Ubuntu Ubuntu Linux 10.04 Amd64
- Ubuntu Ubuntu Linux 10.04 I386
- Ubuntu Ubuntu Linux 10.04 Powerpc
- Ubuntu Ubuntu Linux 10.04 Sparc
- Red Hat Enterprise Linux Extras 4
- Sun JDK (Linux Production Release) 1.5.0 0 10
- Sun JDK (Windows Production Release) 1.5.0 0 10
- Hitachi uCosminexus Application Server Standard-R
- Hitachi uCosminexus Client for Plug-in
- Hitachi uCosminexus Developer 01
- Hitachi uCosminexus Application Server Light
- Hitachi uCosminexus Primary Server Base
- Hitachi uCosminexus Service Platform - Messaging
- Hitachi uCosminexus Developer Professional for Plug-in
- Hitachi Cosminexus Application Server Enterprise
- Hitachi Cosminexus Application Server Standard
- Hitachi Cosminexus Client
- Hitachi Cosminexus Developer Light
- Hitachi Cosminexus Application Server
- Hitachi Cosminexus Developer Standard
- Hitachi Cosminexus Studio - Standard Edition
- Hitachi Cosminexus Primary Server Base
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Hitachi Cosminexus Developer
- Hitachi Cosminexus Studio
- Debian Linux 6.0 s/390
- SuSE SUSE Linux Enterprise Server for VMware 11 SP1
- Sun JRE (Linux Production Release) 1.6.0 17
- Sun JRE (Linux Production Release) 1.5.0 22
- Sun JRE (Solaris Production Release) 1.6.0 17
- Sun JRE (Solaris Production Release) 1.5.0 22
- Sun JRE (Windows Production Release) 1.6.0 17
- Sun JRE (Windows Production Release) 1.5.0 22
- Mandriva Enterprise Server 5 X86 64
- Sun JDK (Linux Production Release) 1.6.0 17
- Sun JDK (Linux Production Release) 1.5.0 22
- Sun JDK (Solaris Production Release) 1.6.0 17
- Sun JDK (Solaris Production Release) 1.5.0 22
- Sun JDK (Windows Production Release) 1.6.0 17
- Sun JDK (Windows Production Release) 1.5.0 22
- IBM JAVA IBM 31-bit SDK for z/OS 5.0
- Sun JRE (Linux Production Release) 1.5.0_26
HTTP:STC:ADOBE:READER-MC-RCE - HTTP: Adobe Acrobat Reader Memory Corruption Remote Code Execution (CVE-2012-1530)
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader. A successful attack can result in a memory corruption and remote code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
HTTP:STC:JAVA:JRE-PTR-CTRL-EXEC - HTTP: Oracle JRE Pointer Control Remote Code Execution Attempt
Severity: HIGH
Description:
This signature detects an attempt to exploit a remote code execution vulnerability in Oracle JRE application. Successful exploitation could allow an attacker to perform arbitrary code execution through crafting a malicious JAR files.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
HTTP:STC:COREL-WP-BOF - HTTP: Corel WordPerfect Document Processing Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Corel WordPerfect. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:MS-FOREFRONT-RCE - HTTP: Microsoft Forefront Threat Management Gateway Client Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft Forefront Threat Management Gateway 2010 Client. It is due to an error in the calculation of a buffer size in the NSPLookupServiceNext function. Potentially any application running on a system could be affected by this vulnerability due to the way Microsoft Forefront Threat Management Gateway is installed on a system. Remote attackers can exploit this vulnerability by enticing unsuspecting users to open a specially crafted web page or view an email message. Successful exploitation could result in execution of arbitrary code within the security context of the affected client application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Forefront Threat Management Gateway 2010 Client
HTTP:STC:GIT-CLIENT-CE - HTTP: GitHub Git Tree Handling Overwrite Arbitrary Command Execution
Severity: MEDIUM
Description:
This signature attempts to detect a known vulnerability against GitHub. A successful exploit can lead to remote command execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:DL:XLS-FNGROUPNAME - HTTP: Microsoft Office Excel FNGROUPNAME Record Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Office Excel. It is due to the way Microsoft Office Excel handles Excel files containing a malformed set of records, causing uninitialized memory to be accessed. Remote attackers can exploit this by enticing target users to open a malicious Excel file. In a successful attack, arbitrary code is injected and executed on the target machine; the target behavior is dependent on the intention of the malicious code. In an unsuccessful attack, the application can terminate as a result of memory corruption.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Excel 2007 SP1
- Microsoft Excel 2007 SP2
- Microsoft Excel 2003 SP3
- Microsoft Excel 2007
- Microsoft Excel 2004 for Mac
HTTP:STC:ADOBE:FLASH-INT-OV - HTTP: Adobe Flash Player Integer Overflow (CVE-2012-5677)
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe Flash Player. Successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- adobe adobe_air 2.7.1.19610
- adobe flash_player 10.3.183.10
- adobe flash_player 11.0.1.152
- adobe flash_player 10.3.181.34
- adobe adobe_air 2.7.0.19530
- adobe flash_player 11.3.300.257
- adobe adobe_air 1.0.8.4990
- adobe adobe_air 2.7.0.1948
- adobe flash_player 10.3.183.20
- adobe adobe_air 3.1.0.4880
- adobe flash_player 11.4.402.265
- adobe flash_player 11.3.300.268
- adobe adobe_air 1.0
- adobe flash_player 10.3.183.18
- adobe adobe_air 1.0.4990
- adobe adobe_air 1.5.3.9130
- adobe flash_player 10.3.183.7
- adobe flash_player up to 11.5.502.110
- adobe flash_player 11.2.202.228
- adobe adobe_air 3.0.0.4080
- adobe adobe_air 1.5.2
- adobe flash_player 10.3.183.5
- adobe flash_player 10.2.153.1
- adobe adobe_air 1.5.1.8210
- adobe adobe_air 2.6
- adobe flash_player 11.3.300.262
- adobe flash_player 11.1.102.55
- adobe adobe_air 1.5.0.7220
- adobe adobe_air 3.1.0.488
- adobe adobe_air 2.5.1.17730
- adobe adobe_air_sdk up to 3.5.0.600
- adobe flash_player 11.3.300.273
- adobe flash_player 11.3.300.271
- adobe adobe_air 2.0.2
- adobe adobe_air 2.0.2.12610
- adobe adobe_air 3.3.0.3670
- adobe flash_player 11.2.202.235
- adobe flash_player 11.1.102.63
- adobe adobe_air 3.2.0.2070
- adobe adobe_air 3.4.0.2540
- adobe flash_player 10.3.183.15
- adobe flash_player 10.2.152.32
- adobe flash_player up to 10.3.183.43
- adobe adobe_air 2.0.4
- adobe flash_player 10.3.181.26
- adobe flash_player 11.2.202.233
- adobe flash_player 10.3.183.11
- adobe flash_player 10.1.85.3
- adobe adobe_air 1.5.3.9120
- adobe flash_player 11.2.202.223
- adobe adobe_air 3.2.0.207
- adobe flash_player 10.2.159.1
- adobe adobe_air_sdk 3.4.0.2540
- adobe adobe_air 2.7.0.19480
- adobe adobe_air 1.1.0.5790
- adobe flash_player 11.4.402.278
- adobe adobe_air 1.1
- adobe adobe_air 1.5.1
- adobe flash_player 10.3.183.25
- adobe adobe_air 1.5.3
- adobe flash_player 10.2.152.26
- adobe adobe_air 1.5
- adobe flash_player 10.3.181.16
- adobe flash_player 10.3.181.14
- adobe adobe_air 2.7
- adobe flash_player 10.3.183.23
- adobe flash_player 11.4.402.287
- adobe flash_player 11.3.300.265
- adobe adobe_air 2.5.0.16600
- adobe adobe_air 2.6.0.19140
- adobe adobe_air 2.7.1
- adobe adobe_air 3.1.0.485
- adobe flash_player 11.2.202.238
- adobe adobe_air 2.7.0.1953
- adobe adobe_air 2.0.3
- adobe adobe_air 3.0.0.408
- adobe adobe_air 1.0.1
- adobe flash_player 11.1.102.62
- adobe adobe_air 2.0.3.13070
- adobe flash_player 10.3.181.22
- adobe flash_player 10.1.102.64
- adobe flash_player 10.3.183.16
- adobe adobe_air 2.6.0.19120
- adobe flash_player 7.0.60.0
- adobe flash_player 8.0.34.0
- adobe flash_player 10.1.95.1
- adobe flash_player 9.0.47.0
- adobe flash_player 8.0.39.0
- adobe flash_player 7.0.69.0
- adobe adobe_air_sdk 3.5.0.1060
- adobe flash_player 11.2.202.243
- adobe flash_player 11.5.502.135
- adobe flash_player 10.2.154.13
- adobe flash_player 11.1.102.59
- adobe flash_player 10.0.12.10
- adobe flash_player 9.0.124.0
- adobe flash_player 11.2.202.251
- adobe flash_player 7.0.24.0
- adobe flash_player 10.0.42.34
- adobe flash_player 6.0.79
- adobe flash_player 9.0.152.0
- adobe flash_player 10.3.186.7
- adobe flash_player 10.0.32.18
- adobe flash_player 10.1.105.6
- adobe adobe_air 3.5.0.1060
- adobe flash_player 10.0.12.36
- adobe flash_player 10.1.52.15
- adobe flash_player 10.3.186.3
- adobe flash_player 7.0.53.0
- adobe flash_player 9.0.112.0
- adobe flash_player 9.0.125.0
- adobe flash_player 9.0.20
- adobe flash_player 7.0.14.0
- adobe flash_player 6.0.21.0
- adobe flash_player 9.0.16
- adobe flash_player 7.0.63
- adobe flash_player 11.1.115.34
- adobe flash_player 10.2.157.51
- adobe flash_player 8.0.33.0
- adobe adobe_air_sdk 3.3.0.3690
- adobe flash_player 11.0
- adobe flash_player 10.1.106.17
- adobe flash_player 9.0.20.0
- adobe flash_player 9.0.28
- adobe flash_player 9.125.0
- adobe flash_player 10.2.152
- adobe flash_player 10.2.156.12
- adobe flash_player 7.1
- adobe flash_player 9.0.48.0
- adobe flash_player 7.0.73.0
- adobe flash_player 10.3.183.50
- adobe flash_player 7.0.67.0
- adobe flash_player 9.0.115.0
- adobe flash_player 9.0.155.0
- adobe flash_player 9.0.28.0
- adobe flash_player 7.1.1
- adobe flash_player 9.0.31.0
- adobe flash_player 10.3.181.23
- adobe flash_player 10.3.183.29
- adobe flash_player 9.0.31
- adobe flash_player 9.0.159.0
- adobe flash_player 10.0.45.2
- adobe flash_player 9.0.9.0
- adobe flash_player 10.0.22.87
- adobe flash_player 7.0.1
- adobe flash_player 11.0.1.153
- adobe flash_player 7.2
- adobe flash_player 11.2.202.258
- adobe flash_player 10.1.82.76
- adobe flash_player 10.0.15.3
- adobe flash_player 7.0
- adobe flash_player 7.0.66.0
- adobe flash_player 7.0.25
- adobe flash_player 10.3.183.19
- adobe flash_player 10.0.2.54
- adobe flash_player 9.0.114.0
- adobe flash_player 7.0.68.0
- adobe flash_player 10.3.185.22
- adobe adobe_air 3.4.0.2710
- adobe adobe_air 3.5.0.600
- adobe flash_player 9.0.283.0
- adobe flash_player 10.1.95.2
- adobe flash_player 11.1.111.8
- adobe flash_player 7.0.61.0
- adobe adobe_air_sdk 3.4.0.2710
- adobe flash_player 10.3.185.24
- adobe flash_player 10.1.52.14
- adobe flash_player 10.1.92.8
- adobe flash_player 9.0.246.0
- adobe flash_player 11.2.202.261
- adobe flash_player 10.1.53.64
- adobe flash_player 8.0.24.0
- adobe flash_player 9.0
- adobe flash_player 9.0.277.0
- adobe flash_player 9.0.262.0
- adobe flash_player 11.1
- adobe flash_player 7.0.70.0
- adobe flash_player 10.1.106.16
- adobe flash_player 9.0.151.0
- adobe flash_player 10.1.92.10
- adobe flash_player 8.0.35.0
- adobe flash_player 8.0.42.0
- adobe flash_player 7.0.19.0
- adobe flash_player 10.3.183.48
- adobe flash_player 10.0.0.584
- adobe adobe_air up to 3.5.0.880
- adobe flash_player 11.3.300.270
- adobe flash_player 9.0.45.0
- adobe flash_player 9.0.18d60
- adobe flash_player 10.3.186.6
- adobe flash_player up to 11.1.115.7
- adobe flash_player 8.0
- adobe flash_player 10.1
- adobe flash_player 9.0.280
- adobe flash_player 9.0.260.0
- adobe flash_player 10.2.154.25
- adobe flash_player 11.2.202.236
- adobe flash_player 10.1.52.14.1
- adobe flash_player 10.2.152.33
- adobe flash_player 8.0.22.0
- adobe adobe_air_sdk up to 3.5.0.880
- adobe flash_player 9.0.8.0
HTTP:STC:DL:APPLE-QT-MJPEG-OF - HTTP: Apple Quicktime MJPEG Frame stsd Atom Heap Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Apple Quicktime MJPEG Frame. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- apple quicktime 5.0
- apple quicktime 7.0.1
- apple quicktime 6.5.2
- apple quicktime 7.1.5
- apple quicktime 6.0
- apple quicktime 7.1.4
- apple quicktime 7.0.0
- apple quicktime 3.0
- apple quicktime 7.4.0
- apple quicktime 7.6.0
- apple quicktime 7.2.1
- apple quicktime 6.0.1
- apple quicktime 7.4.1
- apple quicktime 6.1.1
- apple quicktime 7.6.1
- apple quicktime 6.5
- apple quicktime 7.6.5
- apple quicktime 6.1.0
- apple quicktime 7.7.2
- apple quicktime 7.7.1
- apple quicktime 6.1
- apple quicktime 6.0.2
- apple quicktime 7.1.0
- apple quicktime 5.0.1
- apple quicktime 7.5.0
- apple quicktime 7.2.0
- apple quicktime 7.0.4
- apple quicktime 7.4.5
- apple quicktime 7.7.0
- apple quicktime 7.6.6
- apple quicktime 6.0.0
- apple quicktime 7.0.2
- apple quicktime 7.3.1
- apple quicktime 7.6.7
- apple quicktime 7.0.3
- apple quicktime 7.6.8
- apple quicktime 6.5.0
- apple quicktime 7.6.2
- apple quicktime 7.3.0
- apple quicktime 6.5.1
- apple quicktime 5.0.2
- apple quicktime 7.1.3
- apple quicktime 7.1.2
- apple quicktime 7.1.1
- apple quicktime 6.2.0
- apple quicktime 7.5.5
- apple quicktime 6.4.0
- apple quicktime 4.1.2
- apple quicktime 7.6.9
- apple quicktime 6.3.0
- apple quicktime up to 7.7.3
- apple quicktime 7.1.6
HTTP:STC:ADOBE:FLASH-RUNTIME - HTTP: Adobe Flash Player RunTime Calculation Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Adobe Flash Player 10.1.82.76
- Adobe Acrobat 9.3.3
- Adobe Acrobat 9.3.4
- Sun OpenSolaris Build Snv 99
- Red Hat Enterprise Linux Supplementary 5 Server
- Red Hat Enterprise Linux Desktop Supplementary 6
- Adobe Flash Player 10.0.45.2
- Adobe Flash Player 10.1 Release Candidate
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Sun OpenSolaris Build Snv 101A
- Sun OpenSolaris Build Snv 112
- Adobe Acrobat Professional 9.1.2
- HP Systems Insight Manager 6.0
- Adobe Reader 9.2
- HP Systems Insight Manager 5.0
- Sun OpenSolaris Build Snv 123
- HP Systems Insight Manager 5.0 SP2
- Sun OpenSolaris Build Snv 121
- Adobe Acrobat 9.3.4
- HP Systems Insight Manager 4.2 SP2
- HP Systems Insight Manager 4.2
- Sun OpenSolaris Build Snv 111A
- Adobe Acrobat 10.0.1
- Adobe Acrobat 9.4.2
- Adobe Acrobat Professional 10.0.1
- Adobe Acrobat Professional 9.4.2
- Adobe Acrobat Standard 10.0.1
- Adobe Acrobat Standard 9.4.2
- Adobe Reader 10.0.1
- Adobe Reader 9.4.2
- Adobe Flash Player 10.2.152.21
- Adobe Flash Player 10.1.106.16
- Sun OpenSolaris Build Snv 48
- Adobe Acrobat Standard 9.3
- Adobe Acrobat 9.3
- Adobe Reader 9.3
- Adobe Acrobat Professional 9.3
- Sun OpenSolaris Build Snv 122
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- Sun OpenSolaris Build Snv 71
- Adobe Reader 9
- Adobe Acrobat Standard 9
- Adobe Acrobat Professional 9.2
- Adobe Acrobat Standard 9.2
- Sun OpenSolaris Build Snv 49
- Adobe Flash Player 10.0.12 .35
- Adobe Flash Player 10.0.12.10
- Adobe Acrobat 9.3.3
- Sun OpenSolaris Build Snv 108
- Sun OpenSolaris Build Snv 128
- Adobe Flash Player 10
- Adobe Acrobat 9.4.1
- Adobe Acrobat Professional 9.4.1
- Adobe Acrobat Standard 9.4.1
- Adobe Reader 9.4.1
- Sun OpenSolaris Build Snv 39
- Adobe Acrobat 9
- Adobe Acrobat Standard 9.3.2
- Adobe Acrobat Professional 9.3.2
- Adobe Acrobat 9.3.2
- HP Systems Insight Manager 5.3
- HP Systems Insight Manager 5.3 Update 1
- Sun OpenSolaris Build Snv 134
- Sun OpenSolaris Build Snv 135
- Adobe Reader 9.4
- Sun OpenSolaris Build Snv 134A
- Adobe Flash Player 10.0.0.584
- Sun OpenSolaris build snv_151
- Red Hat Enterprise Linux Server Supplementary 6
- Sun OpenSolaris Build Snv 22
- Sun OpenSolaris Build Snv 92
- Sun OpenSolaris Build Snv 19
- Red Hat Enterprise Linux Workstation Supplementary 6
- Sun OpenSolaris Build Snv 85
- Adobe Acrobat 9.1.1
- Adobe AIR 2.6.19120
- Adobe Acrobat Professional 9.3.3
- Adobe Flash Player 10.1.105.6
- Sun OpenSolaris Build Snv 64
- Sun OpenSolaris Build Snv 119
- Sun OpenSolaris Build Snv 13
- Sun OpenSolaris Build Snv 91
- Sun OpenSolaris Build Snv 137
- Sun OpenSolaris Build Snv 127
- Sun OpenSolaris Build Snv 110
- Sun OpenSolaris Build Snv 111
- Sun Solaris 10 Express
- Adobe Flash Player 10.1.51.66
- Sun Solaris 10 Sparc
- Adobe Flash Player 10.0.45 2
- Sun OpenSolaris Build Snv 103
- Adobe Acrobat Standard 9.4
- Sun OpenSolaris Build Snv 68
- Sun OpenSolaris Build Snv 36
- Sun OpenSolaris Build Snv 136
- Sun OpenSolaris snv_111b
- Sun OpenSolaris Build Snv 54
- Sun OpenSolaris Build Snv 118
- Sun OpenSolaris Build Snv 74
- Sun OpenSolaris Build Snv 51
- Adobe Flash Player 10.1.92.10
- Adobe Acrobat 10.0.2
- Adobe Flash Player 10.1.95.2
- Adobe Flash Player 10.0.45 2
- Adobe Flash Player 10.1.95.1
- Adobe Acrobat 9.4.3
- Sun OpenSolaris Build Snv 101
- Adobe Acrobat Standard 9.3.4
- Adobe Acrobat Professional 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat Standard 9.3.4
- Adobe Reader 9.3.4
- Sun OpenSolaris Build Snv 130
- Sun OpenSolaris Build Snv 102
- Adobe Acrobat 9.4
- Sun OpenSolaris Build Snv 57
- Adobe Flash Player 10.2.152.33
- Adobe Flash Player 10.2.154.13
- Sun OpenSolaris Build Snv 129
- HP Systems Insight Manager 6.2
- Sun OpenSolaris Build Snv 84
- Sun Solaris 10 X86
- HP Systems Insight Manager 4.2 SP1
- Adobe Flash Player 10.1.92.10
- Adobe Acrobat 9.3.1
- Adobe Reader 9.1
- SuSE openSUSE 11.4
- Adobe Acrobat Standard 9.1
- Sun OpenSolaris Build Snv 80
- Sun OpenSolaris Build Snv 01
- Adobe Reader 9.3.3
- Sun OpenSolaris Build Snv 93
- Sun OpenSolaris Build Snv 94
- Adobe Acrobat Standard 9.3.3
- Sun OpenSolaris Build Snv 59
- Adobe Reader 9.3.1
- Adobe Acrobat Professional 9.1
- Sun OpenSolaris Build Snv 28
- Adobe Acrobat Professional 9.3.1
- Adobe Reader 9
- HP Systems Insight Manager 5.0 SP6
- HP Systems Insight Manager 5.1 SP1
- Adobe Acrobat Professional 9 Extended
- Adobe Acrobat Professional 9.4
- Sun OpenSolaris Build Snv 88
- Adobe Flash Player 10.1.53.64
- Adobe Reader 9.1.1
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Sun OpenSolaris Build Snv 02
- Adobe Acrobat Standard 9.3.1
- Adobe AIR 2.5.1
- Sun OpenSolaris Build Snv 95
- Sun OpenSolaris Build Snv 50
- Sun OpenSolaris Build Snv 37
- Sun OpenSolaris Build Snv 38
- Sun OpenSolaris Build Snv 87
- Sun OpenSolaris Build Snv 89
- Adobe Flash Player 10.0.42.34
- Sun OpenSolaris Build Snv 124
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- HP Systems Insight Manager 4.0
- Sun OpenSolaris Build Snv 86
- Sun OpenSolaris Build Snv 35
- Sun OpenSolaris Build Snv 56
- Adobe Flash Player 10.0.12 .36
- Sun OpenSolaris Build Snv 117
- Sun OpenSolaris Build Snv 83
- Adobe Reader 9.1.3
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Standard 9.1.3
- Gentoo Linux
- HP Systems Insight Manager 6.1
- Sun OpenSolaris Build Snv 109
- Sun OpenSolaris Build Snv 132
- HP Systems Insight Manager 5.2 SP2
- Sun OpenSolaris Build Snv 41
- Sun OpenSolaris Build Snv 96
- Adobe Flash Player 10.1.85.3
- Sun OpenSolaris Build Snv 90
- Sun OpenSolaris Build Snv 133
- Sun OpenSolaris Svn 126
- Sun OpenSolaris Build Snv 126
- HP Systems Insight Manager 5.0 SP5
- Adobe Flash Player 10.0.32.18
- Sun OpenSolaris Build Snv 81
- Sun OpenSolaris Build Snv 116
- HP Systems Insight Manager 6.0.0.96
- HP Systems Insight Manager 6.3
- Sun OpenSolaris Build Snv 47
- Sun OpenSolaris Build Snv 45
- Sun OpenSolaris Build Snv 82
- Sun OpenSolaris Build Snv 113
- Sun OpenSolaris Build Snv 114
- Sun OpenSolaris Build Snv 98
- Sun OpenSolaris Build Snv 131
- Sun OpenSolaris Build Snv 120
- Adobe Flash Player 10.1.102.65
- Sun OpenSolaris Build Snv 100
- SuSE openSUSE 11.3
- Adobe Acrobat 10.0
- HP Systems Insight Manager 5.0 SP1
- Adobe Flash Player 10.0.15 .3
- Sun OpenSolaris Build Snv 111B
- Sun OpenSolaris Build Snv 67
- HP Systems Insight Manager 4.1
- Sun OpenSolaris Build Snv 76
- Sun OpenSolaris Build Snv 77
- Adobe Flash Player 10.2.154.25
- Adobe Flash Player 10.2.154.18
- Adobe Flash Player 10.0.22.87
- Sun OpenSolaris Build Snv 78
- Adobe Reader 9.3.2
- Adobe Reader 9.4.3
- Adobe Acrobat Standard 9.4.3
- Adobe Acrobat Professional 9.4.3
- Sun OpenSolaris Build Snv 115
- Sun OpenSolaris Build Snv 125
- Sun OpenSolaris Build Snv 104
- Sun OpenSolaris Build Snv 105
- SuSE openSUSE 11.2
- Adobe Acrobat Professional 9
- HP Systems Insight Manager 4.1 Sp1
- Adobe Flash Player 10.1.102.64
- Sun OpenSolaris Build Snv 58
- Adobe Flash Player 10.0.32 18
- Adobe Acrobat Professional 10.0.2
- Adobe Acrobat Standard 10.0.2
- Adobe Reader 10.0.2
- Sun OpenSolaris Build Snv 29
- HP Systems Insight Manager 5.0 SP3
- Adobe Flash Player 10.2.153.1
- Adobe Flash Player 10.2.154.24
- Adobe Flash Player 10.2.156.12
- Adobe AIR 2.6
- Sun OpenSolaris Build Snv 61
- Sun OpenSolaris Build Snv 106
- Sun OpenSolaris Build Snv 107
- Adobe Acrobat Professional 10.0
- Adobe Acrobat Standard 10.0
- Adobe Reader 10.0
- Adobe Acrobat 9.2
HTTP:STC:SCRIPT:APACHE-XML-DOS - HTTP: Apache Santuario XML Security for Java DTD Denial of Service
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in the Apache Santuario. A successful attack can result in a denial-of-service condition.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- apache xml_security_for_java up to 1.5.5
- apache xml_security_for_java 1.5.4
- apache xml_security_for_java 1.4.0
- apache xml_security_for_java 1.2.0
- apache xml_security_for_java 1.4.5
- apache xml_security_for_java 1.2.1
- apache xml_security_for_java 1.5.3
- apache xml_security_for_java 1.4.1
- apache xml_security_for_java 1.3.0
- apache xml_security_for_java 1.5.2
- apache xml_security_for_java 1.4.6
- apache xml_security_for_java 1.4.2
- apache xml_security_for_java 1.5.1
- apache xml_security_for_java 1.4.7
- apache xml_security_for_java 1.4.8
- apache xml_security_for_java 1.4.3
- apache xml_security_for_java 1.5.0
- apache xml_security_for_java 1.4.4
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
HTTP:ORACLE:JNLP-CODE-EXEC - HTTP: Oracle Sun Java JRE Arbitrary Code Execution
Severity: HIGH
Description:
This signature detects an attempt to exploit a security restriction bypass vulnerability against Oracle JRE. Successful exploitation could allow an attacker to execute arbitrary codes through crafting a malicious JNLP file which could lead to further attacks.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
Severity: HIGH
Description:
This signature detects attempts to exploit a known issue with Microsoft Excel. A malformed Excel file, when opened, can result in arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Excel 2004 for Mac
- Microsoft Open XML File Format Converter for Mac
- Microsoft Excel 2002 SP3
- Microsoft Excel 2008 for Mac
- Microsoft Excel 2002
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
HTTP:STC:DL:CRYSTAL-RPT-OLE - HTTP: Microsoft Visual Studio Crystal Reports RPT File Handling Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Visual Studio. A successful attack can lead to a arbitrary remote code execution within the context of the application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Business Objects Crystal Reports XI Professional
- Business Objects Business Objects Enterprise XIr2
- Business Objects Crystal Reports for Visual Studio .NET 2005 10.2
- Business Objects Crystal Reports for Visual Studio .NET 2003
- Business Objects Crystal Reports for Visual Studio .NET 2002
- Microsoft Visual Studio .NET 2003 Enterprise Architect
- Microsoft Visual Studio 2005 Team Edition for Testers
- Microsoft Visual Studio 2005
- Microsoft Visual Studio .NET Professional Edition
- Microsoft Visual Studio .NET Enterprise Architect Edition
- Microsoft Visual Studio .NET Enterprise Developer Edition
- Microsoft Visual Studio .NET Academic Edition
- Microsoft Visual Studio .NET 2002 SP1
- Microsoft Visual Studio .NET 2003 SP1
- Microsoft Visual Studio 2005 Team Edition
- Business Objects Crystal Enterprise 10.0.0
- Microsoft Visual Studio .NET 2003
- Microsoft Visual Studio 2005 Standard Edition
- Microsoft Visual Studio 2005 Professional Edition
- Microsoft Visual Studio 2005 Team Edition for Developers
- Microsoft Visual Studio 2005 Team Edition for Architects
- Business Objects BusinessObjects Enterprise XI
- Microsoft Visual Studio 2005 SP1
- Microsoft Visual Studio .NET 2002
HTTP:STC:JAVA:MIXERSEQ-OF - HTTP: Oracle Java MixerSequencer.nAddControllerEventCallback Array Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in Java. A code execution vulnerability exists in Oracle's JDK and JRE. The vulnerability is due to improper boundary check and using an out-of-bounds array index. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user to open a Java applet or application via a web page (or other means). Successful exploitation could lead to arbitrary code execution in the target user's security context.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Sun JRE (Linux Production Release) 1.4.2_27
- Sun JRE (Linux Production Release) 1.4.2_28
- Avaya Messaging Storage Server 5.2
- Sun JRE (Solaris Production Release) 1.6.0_21
- Red Hat Enterprise Linux Desktop Supplementary 6
- Apple Mac Os X 10.6.5
- Red Hat Enterprise Linux HPC Node Supplementary 6
- Apple Mac OS X Server 10.6.5
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Sun JRE (Solaris Production Release) 1.5.0_26
- Sun JDK (Linux Production Release) 1.5.0 23
- Hitachi uCosminexus Developer Standard
- Hitachi uCosminexus Developer Professional
- Sun JRE (Windows Production Release) 1.6.0_22
- Sun JRE (Windows Production Release) 1.5.0_25
- Sun JRE (Windows Production Release) 1.5.0_26
- Avaya Message Networking 5.2.2
- Avaya Messaging Storage Server 5.2.2
- Avaya Proactive Contact 4.2.1
- Avaya Proactive Contact 4.0.1
- Sun JRE (Windows Production Release) 1.4.2 _28
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- SuSE SUSE Linux Enterprise Server 10 SP4
- Avaya Aura Presence Services 6.0
- Sun SDK (Linux Production Release) 1.4.2_28
- Oracle JRockit R27.6.0-50 1.5.0 15
- Red Hat Enterprise Linux Extras 4
- Avaya Aura Conferencing 6.0 Standard
- Apple Mac OS X Server 10.6.3
- Avaya IP Office Application Server 6.0
- Avaya Aura SIP Enablement Services 5.2.1
- Oracle JRockit R27.6.8
- Oracle JRockit R28.1.1
- Red Hat Enterprise Linux AS for SAP 4
- Red Hat Enterprise Linux for SAP 5 Server
- Sun JDK (Windows Production Release) 1.6.0 01
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.4.2 02
- Sun JRE (Windows Production Release) 1.4.2 02
- Avaya Messaging Storage Server 5.2 SP1
- Sun JDK (Linux Production Release) 1.6.0_24
- Sun JDK (Solaris Production Release) 1.5.0_28
- Sun JDK (Solaris Production Release) 1.6.0_24
- Sun JDK (Windows Production Release) 1.5.0_28
- Sun JDK (Windows Production Release) 1.6.0_24
- Sun JRE (Linux Production Release) 1.4.2_30
- Sun JRE (Linux Production Release) 1.5.0_28
- Sun JRE (Solaris Production Release) 1.4.2_30
- Sun JRE (Linux Production Release) 1.6.0_24
- Sun JRE (Solaris Production Release) 1.5.0_28
- Sun JRE (Solaris Production Release) 1.6.0_24
- Sun JRE (Windows Production Release) 1.4.2_30
- Sun JRE (Windows Production Release) 1.5.0_28
- Sun JRE (Windows Production Release) 1.6.0_24
- Sun SDK (Linux Production Release) 1.4.2_30
- Sun SDK (Solaris Production Release) 1.4.2_30
- Sun SDK (Windows Production Release) 1.4.2_30
- Apple Mac Os X 10.6.8
- Apple Mac Os X Server 10.6.8
- Apple Mac OS X 10.6.2
- Apple Mac OS X Server 10.6.2
- Avaya Proactive Contact 4.1
- VMWare vCenter 4.1
- Apple Mac OS X Server 10.6.5
- IBM Java SE 5.0.0 SR12
- IBM Java SE 5.0.0 SR12
- IBM Java SE 6.0.0 SR9
- Sun JRE (Solaris Production Release) 1.5.0 01
- Sun JDK (Windows Production Release) 1.5.0 .0 04
- Avaya Aura Session Manager 6.1 Sp1
- Avaya Aura Session Manager 6.1 SP2
- Avaya Aura System Manager 6.1 Sp1
- Avaya Aura SIP Enablement Services 5.1
- Sun JRE (Windows Production Release) 1.5.0 01
- Sun JRE (Linux Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.6.0 07
- Sun JRE (Linux Production Release) 1.5.0 16
- Sun JRE (Linux Production Release) 1.4.2 18
- Avaya Meeting Exchange 5.2 SP2
- Sun JRE (Windows Production Release) 1.4.2 18
- Sun SDK (Linux Production Release) 1.4.2 17
- Sun SDK (Linux Production Release) 1.4.2 18
- Sun SDK (Solaris Production Release) 1.4.2 17
- Sun SDK (Solaris Production Release) 1.4.2 18
- Sun SDK (Windows Production Release) 1.4.2 17
- Sun SDK (Windows Production Release) 1.4.2 18
- Avaya Proactive Contact 4.1.1
- Sun JDK (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.4.2 17
- Sun JRE (Solaris Production Release) 1.4.2 17
- Sun JRE (Windows Production Release) 1.4.2 17
- Sun JDK (Linux Production Release) 1.5.0 15
- Sun JDK (Windows Production Release) 1.5.0 11-B03
- Sun JDK (Linux Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.5.0 15
- Sun JRE (Solaris Production Release) 1.5.0 15
- Sun JRE (Linux Production Release) 1.6.0 06
- IBM Java SE 6.0 SR5
- Sun SDK (Windows Production Release) 1.4.2_32
- Sun JRE (Linux Production Release) 1.4.2 03
- Sun JRE (Solaris Production Release) 1.4.2 03
- Sun JRE (Windows Production Release) 1.4.2 03
- Sun SDK (Linux Production Release) 1.4.2 01
- Sun SDK (Linux Production Release) 1.4.2 03
- Sun JRE (Linux Production Release) 1.4.2 04
- Sun JRE (Solaris Production Release) 1.4.2 04
- Sun JRE (Windows Production Release) 1.4.2 04
- Sun SDK (Windows Production Release) 1.4.2 04
- Sun SDK (Linux Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 03
- Sun SDK (Solaris Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2 03
- Avaya Interactive Response 4.0
- Avaya CMS Server 15.0
- Sun JRE (Windows Production Release) 1.4.2 12
- Sun JRE (Linux Production Release) 1.6.0 01
- Sun JDK (Windows Production Release) 1.6.0 20
- Sun JDK (Solaris Production Release) 1.6.0 20
- Sun JDK (Linux Production Release) 1.6.0 20
- Sun JRE (Linux Production Release) 1.6.0 14
- Sun JRE (Windows Production Release) 1.6.0 14
- Sun JRE (Solaris Production Release) 1.6.0 14
- IBM Java SE 6.0.0 SR9-FP2
- Avaya Voice Portal 5.1
- Sun SDK (Linux Production Release) 1.4.2 16
- Sun SDK (Solaris Production Release) 1.4.2 16
- Sun SDK (Windows Production Release) 1.4.2 16
- Apple Mac Os X 10.7
- Oracle JRockit R27.6.5
- Oracle JRockit R27.6.2
- IBM Java SE 6 SR8 FP1
- Sun JRE (Linux Production Release) 1.5.0 14
- Avaya Aura Communication Manager Utility Services 6.1
- Avaya Aura Application Enablement Services 6.1
- Avaya Aura Session Manager 6.1
- Sun JDK (Linux Production Release) 1.5.0 16
- Sun JDK (Solaris Production Release) 1.5.0 16
- Sun JDK (Windows Production Release) 1.5.0 16
- Avaya Aura SIP Enablement Services 5.0
- Sun JRE (Linux Production Release) 1.5.0 07
- SuSE SUSE Linux Enterprise Server 11 SP1 for SP2
- Avaya Voice Portal 5.1 SP1
- Sun JDK (Linux Production Release) 1.5.0 01
- Sun JDK (Linux Production Release) 1.5.0 02
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Desktop Extras 4
- Sun JDK (Solaris Production Release) 1.5.0 23
- Sun SDK (Linux Production Release) 1.4.2 15
- Sun SDK (Solaris Production Release) 1.4.2 15
- Sun SDK (Windows Production Release) 1.4.2 15
- Avaya Proactive Contact 4.2
- Oracle JRockit R27.6.6
- Sun JRE (Linux Production Release) 1.4.2 06
- Sun JRE (Windows Production Release) 1.4.2 06
- Avaya Aura Experience Portal 6.0
- Sun JRE (Linux Production Release) 1.4.2 10-B03
- Sun JDK (Linux Production Release) 1.5.0 Update13
- Avaya Aura Presence Services 6.1
- Avaya Aura Communication Manager Utility Services 6.0
- Sun JDK (Linux Production Release) 1.5.0 Update16
- Sun JDK (Linux Production Release) 1.5.0 Update17
- Sun JDK (Linux Production Release) 1.5.0 Update18
- Sun JDK (Linux Production Release) 1.5.0 Update19
- Sun JDK (Linux Production Release) 1.5.0 Update20
- Sun JDK (Linux Production Release) 1.5.0 Update21
- Sun JDK (Linux Production Release) 1.5.0 Update22
- Sun JDK (Linux Production Release) 1.5.0 Update23
- Sun JDK (Linux Production Release) 1.5.0 Update24
- Sun JDK (Linux Production Release) 1.5.0 Update25
- Sun JDK (Linux Production Release) 1.6.0 Update 10
- Sun JDK (Linux Production Release) 1.6.0 Update 11
- Sun JDK (Linux Production Release) 1.6.0 Update 12
- Sun JDK (Linux Production Release) 1.6.0 Update 13
- Sun JDK (Linux Production Release) 1.6.0 Update 14
- Sun JDK (Linux Production Release) 1.6.0 Update 15
- Sun JDK (Linux Production Release) 1.6.0 Update 16
- Sun JDK (Linux Production Release) 1.6.0 Update 17
- Sun JDK (Linux Production Release) 1.6.0 Update 18
- Sun JDK (Linux Production Release) 1.6.0 Update 19
- Sun JDK (Linux Production Release) 1.6.0 Update 20
- Sun JDK (Linux Production Release) 1.6.0 Update 21
- Sun JDK (Linux Production Release) 1.6.0 Update 3
- Sun JDK (Linux Production Release) 1.6.0 Update 4
- Sun JDK (Linux Production Release) 1.6.0 Update 5
- Sun JDK (Linux Production Release) 1.6.0 Update 6
- Sun JDK (Linux Production Release) 1.6.0 Update 7
- Sun JRE (Linux Production Release) 1.5.0 15
- Avaya Messaging Storage Server 5.2.8
- Apple Mac OS X 10.6
- Apple Mac OS X Server 10.6
- Panda Antivirus 1.4.2 19
- Panda Antivirus 1.4.2 20
- Panda Antivirus 1.4.2 21
- Panda Antivirus 1.4.2 22
- Panda Antivirus 1.4.2 23
- Panda Antivirus 1.4.2 24
- Panda Antivirus 1.4.2 25
- Panda Antivirus 1.4.2 26
- Panda Antivirus 1.4.2 27
- Panda Antivirus 1.5.0 Update14
- Panda Antivirus 1.5.0 Update15
- Panda Antivirus 1.5.0 Update16
- Panda Antivirus 1.5.0 Update17
- Panda Antivirus 1.5.0 Update18
- Panda Antivirus 1.5.0 Update19
- Panda Antivirus 1.5.0 Update20
- Panda Antivirus 1.5.0 Update21
- Panda Antivirus 1.5.0 Update22
- Panda Antivirus 1.5.0 Update23
- Panda Antivirus 1.5.0 Update24
- Panda Antivirus 1.5.0 Update25
- Panda Antivirus 1.6.0 Update 1
- Panda Antivirus 1.6.0 Update 10
- Panda Antivirus 1.6.0 Update 11
- Panda Antivirus 1.6.0 Update 12
- Panda Antivirus 1.6.0 Update 13
- Panda Antivirus 1.6.0 Update 14
- Sun JDK (Linux Production Release) 1.6.0 18
- Panda Antivirus 1.6.0 Update 16
- Panda Antivirus 1.6.0 Update 17
- Panda Antivirus 1.6.0 Update 18
- Panda Antivirus 1.6.0 Update 19
- Panda Antivirus 1.6.0 Update 2
- Panda Antivirus 1.6.0 Update 20
- Panda Antivirus 1.6.0 Update 21
- Panda Antivirus 1.6.0 Update 3
- Panda Antivirus 1.6.0 Update 4
- Panda Antivirus 1.6.0 Update 5
- Panda Antivirus 1.6.0 Update 6
- Panda Antivirus 1.6.0 Update 7
- Sun JRE (Windows Production Release) 1.4.2 25
- Sun JRE (Linux Production Release) 1.4.2 25
- Sun JRE (Solaris Production Release) 1.4.2 25
- Avaya Voice Portal 5.0
- Avaya Meeting Exchange 5.0 SP1
- Avaya Meeting Exchange 5.0 SP2
- Avaya Meeting Exchange 5.1 SP1
- Sun JDK (Windows Production Release) 1.5.0 .0 05
- Apple Mac OS X 10.6.3
- Sun JDK (Linux Production Release) 1.5.0 .0 05
- Sun JDK (Solaris Production Release) 1.5.0 .0 05
- SuSE SUSE Linux Enterprise Software Development Kit 11 SP1 for SP2
- Sun SDK (Solaris Production Release) 1.4.2_28
- Avaya Aura SIP Enablement Services 5.2
- Avaya Voice Portal 5.0 SP1
- Sun JRE (Linux Production Release) 1.6.0 19
- Sun JRE (Windows Production Release) 1.6.0 19
- Sun JRE (Solaris Production Release) 1.6.0 19
- Sun JDK (Solaris Production Release) 1.6.0 19
- Sun JDK (Windows Production Release) 1.6.0 19
- Sun JDK (Linux Production Release) 1.6.0 19
- Sun JDK (Linux Production Release) 1.5.0 24
- Sun JDK (Windows Production Release) 1.5.0 24
- Sun JDK (Solaris Production Release) 1.5.0 24
- Sun SDK (Linux Production Release) 1.4.2 26
- Sun SDK (Windows Production Release) 1.4.2 26
- Sun SDK (Solaris Production Release) 1.4.2 26
- Sun SDK (Windows Production Release) 1.4.2 08
- Apple Mac Os X 10.6.6
- Apple Mac OS X Server 10.6.6
- Avaya Aura System Manager 6.1
- Avaya Aura System Manager 6.1 SP2
- Sun JRE (Linux Production Release) 1.6.0 12
- Avaya Voice Portal 5.1.1
- IBM Java SE 1.4.2 SR13-FP10
- Avaya Aura System Platform 1.1
- Sun JDK (Linux Production Release) 1.5.0_29
- Sun JRE (Linux Production Release) 1.6.0
- Sun JRE (Linux Production Release) 1.6.0 10
- Avaya Message Networking 5.2.3
- Sun JRE (Linux Production Release) 1.4.2 15
- Sun JRE (Windows Production Release) 1.4.2 15
- Sun JRE (Solaris Production Release) 1.4.2 15
- Avaya Message Networking 5.2.4
- Apple Mac OS X Server 10.6.1
- Apple Mac OS X 10.6.1
- Sun JDK (Solaris Production Release) 1.6.0 01
- Hitachi uCosminexus Service Architect
- Sun JRE (Linux Production Release) 1.5.0 09
- Avaya Proactive Contact 5.0
- Avaya Messaging Storage Server 5.2 SP2
- Avaya Messaging Storage Server 5.2 SP3
- Avaya Message Networking 5.2 SP1
- Sun SDK (Linux Production Release) 1.4.2 09
- Sun SDK (Linux Production Release) 1.4.2 10
- Sun SDK (Linux Production Release) 1.4.2 11
- Sun SDK (Linux Production Release) 1.4.2 12
- Sun SDK (Linux Production Release) 1.4.2 13
- Red Hat Enterprise Linux SAP 6
- Sun SDK (Solaris Production Release) 1.4.2 09
- Sun SDK (Solaris Production Release) 1.4.2 10
- Avaya IR 4.0
- Sun SDK (Solaris Production Release) 1.4.2 12
- Sun SDK (Solaris Production Release) 1.4.2 13
- Sun SDK (Solaris Production Release) 1.4.2 14
- Sun SDK (Windows Production Release) 1.4.2 09
- Sun SDK (Windows Production Release) 1.4.2 10
- Sun SDK (Windows Production Release) 1.4.2 11
- Sun SDK (Windows Production Release) 1.4.2 12
- Oracle JRockit R28.0.1
- Sun SDK (Windows Production Release) 1.4.2 14
- Sun JRE (Windows Production Release) 1.4.2 07
- Sun JRE (Windows Production Release) 1.4.2 08
- Sun JRE (Windows Production Release) 1.4.2 09
- Sun JRE (Windows Production Release) 1.4.2 10
- Sun JRE (Windows Production Release) 1.4.2 11
- Sun JRE (Windows Production Release) 1.4.2 13
- Sun JRE (Windows Production Release) 1.4.2 14
- Sun JRE (Solaris Production Release) 1.4.2 07
- Sun JRE (Solaris Production Release) 1.4.2 08
- Sun JRE (Solaris Production Release) 1.4.2 09
- Sun JRE (Solaris Production Release) 1.4.2 10
- Sun JRE (Solaris Production Release) 1.4.2 11
- Sun JRE (Solaris Production Release) 1.4.2 13
- Avaya Meeting Exchange 5.0
- Avaya Voice Portal 4.0
- Avaya Voice Portal 4.1
- Sun JRE (Linux Production Release) 1.4.2 10
- Sun JRE (Linux Production Release) 1.4.2 11
- Sun JRE (Linux Production Release) 1.4.2 13
- Sun JRE (Linux Production Release) 1.4.2 14
- Sun JRE (Windows Production Release) 1.5.0 02
- IBM Java SE 5.0
- IBM Java SE 6.0
- IBM Java SE 1.4.2
- Sun JRE (Windows Production Release) 1.5.0 03
- Sun JDK (Windows Production Release) 1.5.0.0 06
- Sun JDK (Linux Production Release) 1.5.0 06
- Sun JRE (Windows Production Release) 1.6.0 11
- Sun JRE (Solaris Production Release) 1.5.0
- Sun JRE (Linux Production Release) 1.5.0
- Sun JRE (Windows Production Release) 1.5.0
- Sun JRE (Windows Production Release) 1.5.0 06
- Sun JRE (Solaris Production Release) 1.5.0 06
- Sun JRE (Linux Production Release) 1.5.0 06
- Sun JRE (Linux Production Release) 1.5.0 03
- Sun JRE (Linux Production Release) 1.5.0 04
- Sun JRE (Linux Production Release) 1.4.2 09
- VMWare ESX 4.0
- VMWare ESX 4.1
- Sun JDK (Linux Production Release) 1.6.0 10
- Sun JDK (Linux Production Release) 1.6.0 11
- Sun JDK (Windows Production Release) 1.6.0 18
- Avaya Aura System Manager 6.1.1
- Sun JDK (Linux Production Release) 1.5.0 17
- Sun SDK (Solaris Production Release) 1.4.2 19
- Sun SDK (Windows Production Release) 1.4.2 19
- Sun SDK (Linux Production Release) 1.4.2 19
- Hitachi uCosminexus Operator
- Hitachi uCosminexus Client
- Sun JDK (Linux Production Release) 1.5.0_28
- Hitachi Processing Kit for XML
- Sun SDK (Windows Production Release) 1.4.2 22
- Sun JDK (Linux Production Release) 1.5.0 14
- Sun JRE (Solaris Production Release) 1.4.2_28
- Sun JDK (Solaris Production Release) 1.6.0 18
- SuSE SUSE Linux Enterprise Java 10 SP4
- SuSE SUSE Linux Enterprise Java 11 SP1
- Sun JRE (Solaris Production Release) 1.5.0 17
- VMWare vCenter 5.0
- Avaya Voice Portal 5.1.2
- Avaya Aura Session Manager 6.1.3
- Avaya Aura Communication Manager 5.1
- Avaya Aura System Manager 6.1.2
- Sun JRE (Linux Production Release) 1.6.0 11
- Avaya IQ 5.1.1
- Avaya Meeting Exchange 5.0.0.0.52
- Sun JRE (Solaris Production Release) 1.6.0 11
- Sun SDK (Windows Production Release) 1.4.2 13
- Sun SDK (Windows Production Release) 1.4.2 25
- Red Hat Enterprise Linux Supplementary 5 Server
- Sun JRE (Windows Production Release) 1.4.2 01
- Sun JDK (Solaris Production Release) 1.6.0 05
- Avaya Voice Portal 5.0 SP2
- Sun JDK (Solaris Production Release) 1.6.0 15
- Sun JRE (Linux Production Release) 1.4.2_32
- Sun JRE (Solaris Production Release) 1.4.2 06
- Avaya Messaging Application Server 5.2
- Avaya Aura Conferencing 6.0.0 Standard
- Avaya Aura Communication Manager 4.0
- Avaya Aura Communication Manager 4.0
- Avaya Voice Portal 4.1 SP1
- Avaya Voice Portal 4.1 SP2
- Avaya Voice Portal 5.1
- Sun JDK (Linux Production Release) 1.5.0
- Sun JDK (Linux Production Release) 1.5.0 07
- Oracle JRockit R27.6.0
- SuSE SUSE Linux Enterprise Software Development Kit 11 SP1
- SuSE SUSE Linux Enterprise Java 11 SP1
- Sun JRE (Linux Production Release) 1.4.2 20
- Sun JRE (Solaris Production Release) 1.4.2 12
- Sun JRE (Solaris Production Release) 1.4.2 20
- Sun JRE (Linux Production Release) 1.5.0 01
- Sun JRE (Linux Production Release) 1.5.0 02
- Sun JRE (Linux Production Release) 1.5.0 05
- Apple Mac OS X 10.6.5
- Sun JRE (Windows Production Release) 1.4.2 20
- Sun JDK (Linux Production Release) 1.5.0 Update14
- Sun JDK (Linux Production Release) 1.5.0 Update15
- HP HP-UX B.11.11
- Sun SDK (Linux Production Release) 1.4.2 06
- Sun SDK (Linux Production Release) 1.4.2 07
- Apple Mac Os X 10.7.2
- Sun SDK (Linux Production Release) 1.4.2 20
- Sun JRE (Linux Production Release) 1.5.0 .0 Beta
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0
- Avaya CMS Server 16.0
- SuSE SUSE Linux Enterprise SDK 11 SP1
- Avaya Aura SIP Enablement Services 4.0
- Sun JRE (Linux Production Release) 1.6.0 20
- Sun JRE (Windows Production Release) 1.6.0 20
- Avaya Aura Application Enablement Services 5.2
- Sun JRE (Solaris Production Release) 1.6.0 15
- Sun SDK (Windows Production Release) 1.4.2 20
- Avaya Message Networking 5.2
- Avaya Meeting Exchange 5.2 SP1
- Sun JDK (Linux Production Release) 1.5.0 18
- Apple Mac Os X 10.7.1
- Apple Mac Os X Server 10.7
- Apple Mac Os X Server 10.7.1
- Apple Mac Os X Server 10.7.2
- Sun JDK (Linux Production Release) 1.6.0 13
- Avaya CMS Server 16.1
- Sun JDK (Linux Production Release) 1.5.0.0 12
- Sun JDK (Solaris Production Release) 1.6.0 02
- Oracle JRockit R27.6.3
- Sun JRE (Linux Production Release) 1.5.0 23
- Sun JDK (Solaris Production Release) 1.5.0_31
- Sun JDK (Linux Production Release) 1.4.2
- Sun JDK (Linux Production Release) 1.6.0_27
- Sun JDK (Solaris Production Release) 1.6.0_27
- Sun JDK (Windows Production Release) 1.6.0_27
- Sun JRE (Linux Production Release) 1.5.0_31
- Sun JRE (Solaris Production Release) 1.5.0_31
- HP Network Node Manager i 9.1
- Sun JRE (Linux Production Release) 1.6.0_27
- Sun JRE (Solaris Production Release) 1.6.0_27
- Sun JRE (Windows Production Release) 1.6.0_27
- Sun JDK (Linux Production Release) 1.5.0_31
- Sun JDK (Linux Production Release) 1.5.0.0 03
- Oracle JRockit R28.1.4
- Sun JRE (Linux Production Release) 1.4.2_33
- Sun JDK (Solaris Production Release) 1.5.0 .0 04
- Sun JRE (Windows Production Release) 1.4.2_33
- Sun SDK (Linux Production Release) 1.4.2_33
- Sun SDK (Solaris Production Release) 1.4.2_33
- Sun SDK (Windows Production Release) 1.4.2_33
- Sun SDK (Solaris Production Release) 1.4.2 08
- Sun SDK (Linux Production Release) 1.4.2 08
- Avaya Aura System Platform 6.0
- Sun JDK (Windows Production Release) 1.5.0 07-B03
- Sun SDK (Solaris Production Release) 1.4.2 22
- Sun JDK (Windows Production Release) 1.6.0 01-B06
- Sun JRE (Solaris Production Release) 1.4.2 19
- IBM Java SE 5.0 SR10
- IBM Java SE 5.0 SR11
- IBM Java SE 6.0 SR6
- IBM Java SE 6.0 SR7
- Avaya Aura Session Manager 6.0 SP1
- Sun JRE (Solaris Production Release) 1.5.0 23
- Sun SDK (Linux Production Release) 1.4.2 14
- Sun JDK (Linux Production Release) 1.5.0 07-B03
- Sun JDK (Linux Production Release) 1.5.0 11-B03
- Sun JDK (Linux Production Release) 1.6.0 01-B06
- Sun JRE (Solaris Production Release) 1.6.0_22
- Gentoo Linux
- Sun JDK (Linux Production Release) 1.6.0 14
- Avaya CMS Server 16.2
- Sun SDK (Solaris Production Release) 1.4.2 11
- Sun JDK (Linux Production Release) 1.5.0 22
- Sun JRE (Linux Production Release) 1.4.2
- Sun JRE (Solaris Production Release) 1.4.2
- Sun JRE (Windows Production Release) 1.4.2
- SuSE SUSE Linux Enterprise Server 11 SP1
- Sun SDK (Linux Production Release) 1.4.2 25
- Sun JRE (Solaris Production Release) 1.5.0_25
- Avaya Aura Session Manager 5.2
- Oracle JRockit R27.6.7
- Sun JRE (Windows Production Release) 1.5.0.0 07
- Sun JRE (Solaris Production Release) 1.5.0.0 07
- Sun JDK (Windows Production Release) 1.5.0.0 08
- Sun JDK (Linux Production Release) 1.5.0.0 08
- Sun JRE (Windows Production Release) 1.5.0.0 08
- Sun JRE (Solaris Production Release) 1.5.0.0 08
- Sun JDK (Windows Production Release) 1.5.0.0 09
- Sun JDK (Linux Production Release) 1.5.0.0 09
- Sun JRE (Windows Production Release) 1.5.0.0 09
- Sun JRE (Solaris Production Release) 1.5.0.0 09
- Sun JRE (Solaris Production Release) 1.5.0 14
- Sun JRE (Solaris Production Release) 1.6.0 2
- Avaya Aura Application Enablement Services 5.2.2
- Sun JRE (Windows Production Release) 1.6.0 2
- Sun JRE (Windows Production Release) 1.5.0 14
- Oracle JRockit R28.1.3
- Avaya Proactive Contact 4.1.2
- Sun JRE (Windows Production Release) 1.4.2 07
- Sun JRE (Solaris Production Release) 1.4.2 07
- Sun JRE (Solaris Production Release) 1.4.2 08
- Sun JRE (Windows Production Release) 1.4.2 08
- Sun JRE (Windows Production Release) 1.4.2 09
- Sun JRE (Solaris Production Release) 1.4.2 09
- Sun JRE (Solaris Production Release) 1.4.2_27
- Sun SDK (Solaris Production Release) 1.4.2 06
- Sun SDK (Windows Production Release) 1.4.2 06
- Sun SDK (Windows Production Release) 1.4.2 07
- Sun SDK (Solaris Production Release) 1.4.2 07
- Sun JRE (Linux Production Release) 1.4.2 05
- Apple Mac OS X 10.6.4
- Apple Mac OS X Server 10.6.4
- Sun JRE (Solaris Production Release) 1.5.0 11
- Sun JRE (Windows Production Release) 1.5.0 11
- Sun JRE (Linux Production Release) 1.4.2 07
- Panda Antivirus 2008
- Xerox FreeFlow Print Server (FFPS) 73.C0.41
- Avaya IQ 5.1
- Sun JRE (Solaris Production Release) 1.6.0 07
- Sun JRE (Solaris Production Release) 1.4.2 18
- Sun JRE (Solaris Production Release) 1.5.0 10
- Sun JRE (Windows Production Release) 1.5.0 10
- Apple Mac Os X 10.6.7
- Apple Mac Os X Server 10.6.7
- Sun JDK (Solaris Production Release) 1.5.0 07-B03
- Sun JDK (Solaris Production Release) 1.5.0 11-B03
- Sun JRE (Solaris Production Release) 1.5.0 02
- Sun JDK (Solaris Production Release) 1.6.0 01-B06
- Sun JRE (Solaris Production Release) 1.5.0 03
- Sun JRE (Solaris Production Release) 1.4.2 14
- Sun JRE (Solaris Production Release) 1.5.0 04
- Sun JRE (Windows Production Release) 1.5.0 04
- Avaya Proactive Contact 4.0
- Sun JRE (Solaris Production Release) 1.5.0 05
- Sun JRE (Windows Production Release) 1.5.0 05
- Sun JDK (Solaris Production Release) 1.4.2
- Sun JDK (Windows Production Release) 1.4.2
- Sun JDK (Solaris Production Release) 1.5.0 01
- Sun JDK (Windows Production Release) 1.5.0 01
- Sun JDK (Solaris Production Release) 1.5.0 14
- Sun JDK (Windows Production Release) 1.5.0 14
- Sun JDK (Windows Production Release) 1.5.0 15
- Sun JDK (Solaris Production Release) 1.5.0 17
- Sun JDK (Windows Production Release) 1.5.0 17
- Sun JDK (Solaris Production Release) 1.5.0 18
- Sun JDK (Windows Production Release) 1.5.0 18
- Sun JDK (Solaris Production Release) 1.5.0 02
- Sun JDK (Windows Production Release) 1.5.0 02
- Sun JDK (Solaris Production Release) 1.6.0 10
- Sun JDK (Windows Production Release) 1.6.0 10
- Sun JDK (Solaris Production Release) 1.6.0 04
- Sun JDK (Windows Production Release) 1.6.0 04
- Sun JDK (Solaris Production Release) 1.6.0 14
- Sun JDK (Windows Production Release) 1.6.0 14
- Sun JDK (Solaris Production Release) 1.6.0 13
- Sun JDK (Windows Production Release) 1.6.0 13
- Sun JDK (Solaris Production Release) 1.6.0 11
- Sun JDK (Windows Production Release) 1.6.0 11
- Sun JRE (Linux Production Release) 1.5.0 18
- Sun JRE (Linux Production Release) 1.6.0 13
- VMWare VirtualCenter 2.5
- Sun JDK (Windows Production Release) 1.6.0 05
- Sun JDK (Windows Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 07
- Sun JDK (Windows Production Release) 1.6.0 07
- Sun JDK (Solaris Production Release) 1.6.0
- Sun JDK (Windows Production Release) 1.6.0
- Sun JRE (Linux Production Release) 1.4.2 08
- Sun JRE (Windows Production Release) 1.6.0_21
- Sun JRE (Solaris Production Release) 1.6.0
- Sun JRE (Windows Production Release) 1.6.0
- Sun JRE (Solaris Production Release) 1.6.0 10
- Sun JRE (Windows Production Release) 1.6.0 10
- Sun JRE (Windows Production Release) 1.5.0 15
- Sun JRE (Solaris Production Release) 1.5.0 16
- Sun JRE (Windows Production Release) 1.5.0 16
- Sun JRE (Solaris Production Release) 1.5.0 18
- Sun JRE (Windows Production Release) 1.5.0 18
- Avaya Aura Session Manager 6.0
- Oracle JRockit R27.6.9
- Sun JRE (Solaris Production Release) 1.6.0 13
- Sun JRE (Windows Production Release) 1.6.0 13
- Sun JRE (Solaris Production Release) 1.6.0 04
- Sun JRE (Windows Production Release) 1.6.0 04
- Sun JRE (Solaris Production Release) 1.6.0 05
- Sun JRE (Windows Production Release) 1.6.0 05
- Sun JRE (Solaris Production Release) 1.6.0 06
- Sun JRE (Windows Production Release) 1.6.0 06
- Sun JDK (Windows Production Release) 1.5.0.0 12
- Sun JRE (Windows Production Release) 1.6.0 07
- Hitachi uCosminexus Application Server Enterprise
- HP HP-UX B.11.31
- Avaya IP Office Application Server 6.1
- Sun JRE (Windows Production Release) 1.6.0 12
- Sun JRE (Windows Production Release) 1.4.2 _27
- Sun JRE (Linux Production Release) 1.4.2 02
- Avaya Aura Application Server 5300 SIP Core 2.0
- Sun JDK (Linux Production Release) 1.5.0_27
- Sun JDK (Solaris Production Release) 1.5.0_27
- Sun JDK (Windows Production Release) 1.5.0_27
- Avaya IP Office Application Server 7.0
- Sun JRE (Linux Production Release) 1.5.0_27
- Sun JRE (Solaris Production Release) 1.5.0_27
- Sun JRE (Windows Production Release) 1.5.0_27
- Sun JRE (Linux Production Release) 1.4.2_29
- Sun JRE (Solaris Production Release) 1.4.2_29
- Sun JRE (Windows Production Release) 1.4.2_29
- Sun SDK (Linux Production Release) 1.4.2_29
- Sun SDK (Solaris Production Release) 1.4.2_29
- Sun SDK (Windows Production Release) 1.4.2_29
- Sun JRE (Windows Production Release) 1.5.0 23
- Oracle JRockit R27.6.4
- Avaya Aura Application Enablement Services 5.2.3
- Avaya IQ 5.2
- Avaya Aura System Platform 6.0 SP2
- Avaya Aura System Platform 6.0 SP3
- Sun JDK (Linux Production Release) 1.6.0_21
- Sun JDK (Linux Production Release) 1.6.0_22
- Sun JDK (Linux Production Release) 1.5.0_25
- Sun JDK (Linux Production Release) 1.5.0_26
- Sun JDK (Solaris Production Release) 1.6.0_21
- Sun JDK (Solaris Production Release) 1.6.0_22
- Sun JDK (Solaris Production Release) 1.5.0_25
- VMWare vCenter 4.0
- Sun JDK (Windows Production Release) 1.6.0_21
- Sun JDK (Windows Production Release) 1.6.0_22
- Oracle JRockit R28.0.0
- IBM Java SE 5.0 SR11 PF1
- Sun JRE (Linux Production Release) 1.6.0_21
- Sun JRE (Linux Production Release) 1.6.0_22
- Sun JRE (Linux Production Release) 1.5.0_25
- Sun SDK (Linux Production Release) 1.4.2_27
- Hitachi uCosminexus Application Server Standard
- Sun JDK (Solaris Production Release) 1.5.0_29
- Sun JDK (Windows Production Release) 1.5.0_29
- Sun JDK (Linux Production Release) 1.6.0_25
- Sun JDK (Solaris Production Release) 1.6.0_25
- Hitachi uCosminexus Application Server Smart Edition
- Sun JRE (Linux Production Release) 1.4.2_31
- Sun JRE (Linux Production Release) 1.5.0_29
- VMWare Update Manager 5.0
- Sun JRE (Solaris Production Release) 1.4.2_31
- Sun JRE (Solaris Production Release) 1.5.0_29
- Sun JRE (Windows Production Release) 1.4.2_31
- Sun JRE (Solaris Production Release) 1.6.0_25
- Sun JRE (Windows Production Release) 1.5.0_29
- Sun JRE (Windows Production Release) 1.6.0_25
- Sun SDK (Linux Production Release) 1.4.2_31
- Sun SDK (Solaris Production Release) 1.4.2_31
- Sun SDK (Windows Production Release) 1.4.2_31
- Sun SDK (Solaris Production Release) 1.4.2_27
- Sun SDK (Windows Production Release) 1.4.2_27
- Sun SDK (Windows Production Release) 1.4.2_28
- Avaya Aura Session Manager 1.1
- Sun JDK (Windows Production Release) 1.5.0_31
- VMWare ESX 3.5
- Panda Antivirus 1.6.0 Update 15
- Hitachi Cosminexus Server Standard Edition
- Hitachi Cosminexus Server Web Edition
- Sun JRE (Linux Production Release) 1.6.0 18
- Sun JRE (Windows Production Release) 1.6.0 18
- Sun JDK (Windows Production Release) 1.5.0 23
- Sun JRE (Linux Production Release) 1.5.0 22
- Sun JRE (Solaris Production Release) 1.6.0 18
- Avaya Aura Presence Services 6.1.1
- Sun JDK (Linux Production Release) 1.6.0 02
- Sun JDK (Windows Production Release) 1.6.0 02
- Sun JRE (Windows Production Release) 1.5.0_31
- Sun JRE (Linux Production Release) 1.6.0 02
- Sun JRE (Solaris Production Release) 1.6.0 01
- Sun JRE (Solaris Production Release) 1.6.0 02
- Sun JRE (Windows Production Release) 1.6.0 01
- Sun JRE (Windows Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.4.2 16
- Sun JRE (Solaris Production Release) 1.4.2 16
- Sun JRE (Windows Production Release) 1.4.2 16
- Sun JDK (Windows Production Release) 1.5.0 12
- Sun JDK (Windows Production Release) 1.5.0 13
- Sun JDK (Solaris Production Release) 1.5.0 11
- Sun JDK (Solaris Production Release) 1.5.0 12
- Sun JDK (Solaris Production Release) 1.5.0 13
- Avaya Meeting Exchange 5.1
- Sun JDK (Linux Production Release) 1.5.0 13
- Sun JRE (Linux Production Release) 1.5.0 12
- Sun JRE (Linux Production Release) 1.5.0 13
- Sun JRE (Solaris Production Release) 1.5.0 12
- Sun JRE (Solaris Production Release) 1.5.0 13
- Sun JRE (Windows Production Release) 1.5.0 12
- Sun JRE (Windows Production Release) 1.5.0 13
- Sun JDK (Solaris Production Release) 1.6.0 03
- Sun JDK (Linux Production Release) 1.6.0 03
- Avaya Meeting Exchange 5.2
- Avaya IQ 5
- Sun JDK (Windows Production Release) 1.6.0 03
- Sun JRE (Linux Production Release) 1.6.0 03
- Sun JRE (Solaris Production Release) 1.6.0 03
- Sun JRE (Windows Production Release) 1.6.0 03
- Sun SDK (Solaris Production Release) 1.4.2 25
- Sun JRE (Windows Production Release) 1.4.2 24
- Hitachi uCosminexus Developer Light
- Avaya Message Networking 5.2.1
- Sun JRE (Solaris Production Release) 1.4.2 05
- Sun SDK (Solaris Production Release) 1.4.2 05
- Sun SDK (Linux Production Release) 1.4.2 05
- Sun SDK (Windows Production Release) 1.4.2 05
- Avaya Aura System Platform 6.0.1
- Avaya Aura System Platform 6.0.2
- IBM Java SE 5.0 SR12-FP5
- Sun JDK (Solaris Production Release) 1.5.0 06
- Avaya Aura Application Enablement Services 6.1.1
- Sun JDK (Solaris Production Release) 1.5.0 .0 03
- Sun JDK (Windows Production Release) 1.5.0 .0 03
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Sun JDK (Windows Production Release) 1.5.0 22
- Sun JRE (Linux Production Release) 1.5.0 08
- Sun JDK (Windows Production Release) 1.6.0_25
- Sun JRE (Linux Production Release) 1.5.0 10
- Sun JDK (Linux Production Release) 1.5.0.0 11
- Sun JDK (Windows Production Release) 1.5.0.0 11
- Sun JRE (Linux Production Release) 1.5.0 11
- Sun JDK (Linux Production Release) 1.5.0.0 04
- Sun JDK (Linux Production Release) 1.6.0 01
- Avaya Aura Application Enablement Services 5.2.1
- Avaya Aura Session Manager 6.1.1
- Avaya Aura Session Manager 6.1.2
- Sun JRE (Solaris Production Release) 1.4.2_33
- Avaya Proactive Contact 4.2.2
- Sun JRE (Linux Production Release) 1.5.0 17
- Sun JRE (Windows Production Release) 1.5.0 17
- Avaya Aura Messaging 6.0
- Avaya Aura Messaging 6.0.1
- Sun JRE (Windows Production Release) 1.4.2 19
- Sun JRE (Linux Production Release) 1.4.2 19
- Avaya Aura System Manager 6.1.3
- SuSE SUSE Linux Enterprise for SAP Applications 11 SP1
- Xerox FreeFlow Print Server (FFPS) 73.B3.61
- Sun JDK (Linux Production Release) 1.5.0_30
- Sun JDK (Linux Production Release) 1.6.0_26
- Sun JDK (Solaris Production Release) 1.5.0_30
- Sun JDK (Solaris Production Release) 1.6.0_26
- Sun JDK (Windows Production Release) 1.5.0_30
- Sun JDK (Windows Production Release) 1.6.0_26
- Hitachi uCosminexus Service Platform
- Sun JRE (Linux Production Release) 1.5.0_30
- Sun JRE (Linux Production Release) 1.6.0_26
- Sun JRE (Solaris Production Release) 1.4.2_32
- Sun JRE (Solaris Production Release) 1.5.0_30
- Sun JRE (Solaris Production Release) 1.6.0_26
- Sun JRE (Windows Production Release) 1.4.2_32
- Sun JRE (Windows Production Release) 1.5.0_30
- Sun JRE (Windows Production Release) 1.6.0_26
- Oracle JRockit R27.1.0
- Sun JDK (Linux Production Release) 1.6.0 15
- Sun JDK (Windows Production Release) 1.6.0 15
- Sun SDK (Linux Production Release) 1.4.2_32
- Sun SDK (Solaris Production Release) 1.4.2_32
- Sun JRE (Windows Production Release) 1.6.0 15
- Sun JRE (Linux Production Release) 1.6.0 15
- Sun JDK (Linux Production Release) 1.5.0 20
- Sun JDK (Windows Production Release) 1.5.0 20
- Sun JDK (Solaris Production Release) 1.5.0 20
- Sun JRE (Solaris Production Release) 1.5.0 20
- Sun JRE (Windows Production Release) 1.5.0 20
- Sun JRE (Linux Production Release) 1.5.0 20
- Sun JRE (Linux Production Release) 1.4.2 22
- Sun JRE (Windows Production Release) 1.4.2 22
- Sun JRE (Solaris Production Release) 1.4.2 22
- Sun JDK (Solaris Production Release) 1.5.0 0 03
- Sun JDK (Solaris Production Release) 1.5.0 0 09
- Sun SDK (Linux Production Release) 1.4.2 22
- Sun JDK (Solaris Production Release) 1.5.0 0 10
- Sun JDK (Linux Production Release) 1.5.0 0 10
- Sun JDK (Windows Production Release) 1.5.0 0 10
- Sun JRE (Windows Production Release) 1.4.2 05
- Sun JRE (Linux Production Release) 1.6.0_25
- Hitachi uCosminexus Application Server Express
- Hitachi uCosminexus Application Server Standard-R
- Hitachi uCosminexus Client for Plug-in
- Hitachi uCosminexus Developer 01
- Hitachi uCosminexus Application Server Light
- Hitachi uCosminexus Primary Server Base
- Hitachi uCosminexus Service Platform - Messaging
- Hitachi uCosminexus Developer Professional for Plug-in
- Hitachi Cosminexus Application Server Enterprise
- Hitachi Cosminexus Application Server Standard
- Hitachi Cosminexus Client
- Hitachi Cosminexus Developer Light
- Hitachi Cosminexus Application Server
- Hitachi Cosminexus Developer Standard
- Hitachi Cosminexus Studio - Standard Edition
- Hitachi Cosminexus Primary Server Base
- Hitachi HiRDB for Java
- Hitachi Cosminexus Studio - Web Edition
- Hitachi Cosminexus Developer Professional
- Hitachi Cosminexus Developer
- Hitachi Cosminexus Studio
- Sun JDK (Linux Production Release) 1.6.0_23
- Sun JDK (Solaris Production Release) 1.6.0_23
- Sun SDK (Linux Production Release) 1.4.2 02
- Sun SDK (Linux Production Release) 1.4.2
- SuSE SUSE Linux Enterprise Server for VMware 11 SP1
- Sun JDK (Windows Production Release) 1.6.0_23
- Sun JDK (Solaris Production Release) 1.5.0_26
- Sun JRE (Linux Production Release) 1.6.0_23
- Sun JRE (Linux Production Release) 1.6.0 17
- Sun JRE (Solaris Production Release) 1.6.0_23
- Sun JRE (Linux Production Release) 1.4.2 24
- Sun JRE (Solaris Production Release) 1.6.0 17
- Sun JRE (Solaris Production Release) 1.5.0 22
- Sun JRE (Solaris Production Release) 1.4.2 24
- Sun JRE (Windows Production Release) 1.6.0_23
- Sun JRE (Windows Production Release) 1.6.0 17
- Sun JRE (Windows Production Release) 1.5.0 22
- Sun JRE (Solaris Production Release) 1.6.0 12
- Sun JDK (Windows Production Release) 1.5.0_25
- Sun JDK (Linux Production Release) 1.6.0 17
- Sun JRE (Linux Production Release) 1.4.2 12
- Sun JDK (Solaris Production Release) 1.6.0 17
- Sun JDK (Solaris Production Release) 1.5.0 22
- Sun JDK (Windows Production Release) 1.6.0 17
- Sun JDK (Windows Production Release) 1.5.0_26
- Sun SDK (Linux Production Release) 1.4.2 24
- Sun SDK (Solaris Production Release) 1.4.2 24
- Sun SDK (Windows Production Release) 1.4.2 24
- Avaya CMS Server 15.0 AUX
- Avaya Aura Communication Manager 5.2
- Avaya Aura Communication Manager 5.2.1
- Sun SDK (Solaris Production Release) 1.4.2 20
- Sun JRE (Linux Production Release) 1.5.0_26
HTTP:STC:DL:GOOGLE-PICASA-OVF - HTTP: Google Picasa CR2 TIFF StripByteCounts Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Google Picasa. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
HTTP:STC:DL:OO-OLE - HTTP: OpenOffice OLE File Stream Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in OpenOffice. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- openoffice openoffice.org up to 2.3.1
- openoffice openoffice.org 2.0.3
- openoffice openoffice.org 2.3
- openoffice openoffice.org 2.2.1
- openoffice openoffice.org 2.2
- openoffice openoffice.org 2.1
HTTP:STC:DL:OO-EMF - HTTP: OpenOffice EMF File EMR_BITBLT Record Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in OpenOffice. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- OpenOffice 1.1.5
- OpenOffice 2.0.3
- Red Hat Enterprise Linux Desktop 5 Client
- Ubuntu Ubuntu Linux 6.06 LTS Powerpc
- Ubuntu Ubuntu Linux 6.06 LTS I386
- Ubuntu Ubuntu Linux 6.06 LTS Amd64
- OpenOffice 2.2.1
- OpenOffice 2.3.0
- Red Hat Desktop 3.0.0
- Ubuntu Ubuntu Linux 7.10 Lpia
- OpenOffice 2.2.0
- SuSE openSUSE 10.2
- OpenOffice 1.0.2
- SuSE openSUSE 10.3
- SuSE Linux 10.1 X86
- SuSE Linux 10.1 X86-64
- SuSE Linux 10.1 Ppc
- Red Hat Desktop 4.0.0
- OpenOffice 1.0.1
- Sun StarOffice 8.0
- Sun StarOffice 8 Update 7
- Red Hat Enterprise Linux Optional Productivity Application 5 Server
- Sun StarOffice 7.0 PP10
- Avaya Interactive Response 2.0
- OpenOffice 2.2
- Mandriva Linux Mandrake 2008.0
- Mandriva Linux Mandrake 2008.0 X86 64
- Sun StarOffice 7.0.0
- Red Hat Fedora 7
- Ubuntu Ubuntu Linux 7.10 I386
- Ubuntu Ubuntu Linux 7.10 Powerpc
- Ubuntu Ubuntu Linux 7.10 Sparc
- OpenOffice 2.0.4
- Debian Linux 3.1.0 Amd64
- Debian Linux 3.1.0
- Debian Linux 3.1.0 Alpha
- Debian Linux 3.1.0 Arm
- Debian Linux 3.1.0 Hppa
- Debian Linux 3.1.0 Ia-32
- Debian Linux 3.1.0 Ia-64
- Debian Linux 3.1.0 M68k
- Debian Linux 3.1.0 Mips
- Debian Linux 3.1.0 Mipsel
- Debian Linux 3.1.0 Ppc
- Debian Linux 3.1.0 S/390
- Debian Linux 3.1.0 Sparc
- OpenOffice 2.3.1
- OpenOffice 1.1.2
- Red Hat Enterprise Linux AS 3
- Red Hat Enterprise Linux ES 3
- Red Hat Enterprise Linux WS 3
- OpenOffice 1.1.4
- Avaya Interactive Response 3.0
- Mandriva Corporate Server 3.0.0
- Sun StarOffice 8 Update 6
- Sun StarOffice 7.0 PP9
- Ubuntu Ubuntu Linux 7.04 Amd64
- Ubuntu Ubuntu Linux 7.04 I386
- OpenOffice 2.0.2
- Ubuntu Ubuntu Linux 7.04 Sparc
- SuSE Novell Linux Desktop 9.0.0
- Red Hat Fedora 8
- Gentoo Linux
- Ubuntu Ubuntu Linux 7.10 Amd64
- Debian Linux 4.0 Alpha
- Debian Linux 4.0 Amd64
- Debian Linux 4.0 Arm
- Debian Linux 4.0 Hppa
- Debian Linux 4.0 Ia-32
- Debian Linux 4.0 Ia-64
- Debian Linux 4.0 M68k
- Debian Linux 4.0 Mips
- Debian Linux 4.0 Mipsel
- Debian Linux 4.0 Powerpc
- Debian Linux 4.0 S/390
- Debian Linux 4.0 Sparc
- Debian Linux 4.0
- OpenOffice 2.0.0 Beta
- OpenOffice 2.1
- OpenOffice 1.1.1
- OpenOffice 1.0.3
- OpenOffice 1.1.51
- OpenOffice 1.1.52
- Red Hat Enterprise Linux AS 4
- Red Hat Enterprise Linux ES 4
- Red Hat Enterprise Linux WS 4
- OpenOffice 2.0.3-1
- Ubuntu Ubuntu Linux 7.04 Powerpc
- OpenOffice 2.0.1
- Ubuntu Ubuntu Linux 6.06 LTS Sparc
- SuSE SUSE Linux Enterprise SDK 10.SP1
- SuSE SUSE Linux Enterprise Desktop 10 SP1
- Mandriva Corporate Server 3.0.0 X86 64
- OpenOffice 1.1.3
HTTP:STC:IE:CLIP-MEM - HTTP: Microsoft Internet Explorer Clip Memory Corruption Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Avaya Meeting Exchange 5.2
- Microsoft Internet Explorer 7.0
- Microsoft Internet Explorer 6.0
- Avaya CallPilot 4.0
- Avaya CallPilot 5.0
- Avaya Communication Server 1000 Telephony Manager 3.0
- Avaya Communication Server 1000 Telephony Manager 4.0
- Avaya Messaging Application Server 5.2
- Avaya Meeting Exchange 5.0 SP1
- Avaya Meeting Exchange 5.1 SP1
- Avaya Meeting Exchange 5.0
- Microsoft Internet Explorer 6.0 SP1
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange - Recording Server
- Avaya Meeting Exchange - Streaming Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya Meeting Exchange - Webportal
- Microsoft Internet Explorer 6.0 SP2
- Avaya Messaging Application Server 4
- Avaya Meeting Exchange 5.0.0.0.52
- Avaya Communication Server 1000 Telephony Manager
- Avaya Aura Conferencing 6.0 Standard
- Microsoft Internet Explorer 8
- Avaya Meeting Exchange 5.1
- Avaya CallPilot
- Avaya Meeting Exchange 5.2 SP2
- Avaya Meeting Exchange 5.2 SP1
HTTP:GOOGLE-SKETCHUP-BMP-BO - HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3664)
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Trimble Navigation (formerly Google) SketchUp. A successful attack may lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
HTTP:STC:JAVA:TYPECONF - HTTP: Oracle Java AtomicReferenceFieldUpdater Type Confusion
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. The vulnerability is due to a type confusion flaw in AtomicReferenceFieldUpdater class. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Office Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Excel 2003 SP3
- Microsoft Office 2004 for Mac
HTTP:STC:DL:MAL-WEBEX-WRF - HTTP: Cisco WebEx Player ATAS32.DLL Remote Code Execution
Severity: HIGH
Description:
This signature detects attempt to exploit a known vulnerability in Cisco WebEx Player. The vulnerability exists in ATAS32.DLL and is due to insufficient validation of WebEx Recording Format (WRF) files. Successful exploitation would result in execution of arbitrary code on the target host in the context of the application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Cisco WebEx (Linux) 26.00
- Cisco WebEx (Linux) 27.00
- Cisco WebEx (Mac OS X) 26.00
- Cisco WebEx (Mac OS X) 27.00
- Cisco WebEx (Windows) 27.00
- Cisco WebEx (Windows) 26.00
- Cisco WebEx (Linux) 26.49.35
- Cisco WebEx (Linux) 27.11.8
- Cisco WebEx (Mac OS X) 27.11.8
- Cisco WebEx (Mac OS X) 26.49.35
- Cisco WebEx (Windows) 27.10.0
- Cisco WebEx (Windows) 26.49.32
- Cisco WebEx 27
- Cisco WebEx
- Cisco WebEx (Linux) 27LC SP22
- Cisco WebEx (Mac OS X) 27LC SP22
- Cisco WebEx (Windows) 27LC SP22
- Cisco WebEx (Linux) 27LB SP21 EP3
- Cisco WebEx (Mac OS X) 27LB SP21 EP3
- Cisco WebEx (Windows) 27LB SP21 EP3
HTTP:STC:ADOBE:U3D-CLODMESH-MC - HTTP: Adobe Acrobat Reader U3D CLODMeshDeclaration Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat and Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Red Hat Desktop Extras 4
- Red Hat Desktop Extras 3
- Sun Solaris 10 Sparc
- Red Hat Enterprise Linux Supplementary 5 Server
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Adobe Acrobat Professional 8.1.6
- Adobe Acrobat Professional 9.1.2
- Adobe Acrobat Standard 8.1.6
- Adobe Reader 8.1.6
- Adobe Reader 7.1.3
- Adobe Acrobat Standard 7.1.3
- Adobe Acrobat Professional 7.1.3
- Adobe Reader 7.0.9
- Adobe Acrobat Professional 7.1
- Adobe Reader 7.1
- Adobe Acrobat Standard 7.1
- SuSE openSUSE 10.3
- Adobe Reader 8.1.3
- Adobe Reader 9
- Adobe Acrobat Standard 9
- Adobe Acrobat Standard 8.1.3
- Adobe Reader 8.0
- Adobe Acrobat Professional 8.0
- Adobe Acrobat Standard 8.0
- Adobe Acrobat Professional 8.1.3
- Adobe Acrobat 3D 8.1.3
- Adobe Acrobat 3D 8.1.2
- Adobe Acrobat Professional 7.0.7
- Adobe Reader 7.0.4
- Adobe Reader 7.0.5
- Adobe Reader 7.0.6
- Adobe Reader 7.0.7
- Adobe Reader 7.0.8
- Adobe Acrobat 9.1.1
- SuSE SUSE Linux Enterprise Desktop 11
- Adobe Acrobat Standard 7.0.7
- Adobe Reader 8.1.1
- SuSE SUSE Linux Enterprise Desktop 10 SP3
- Adobe Acrobat Professional 8.1.1
- Adobe Reader 7.0.0
- Adobe Reader 7.0.1
- Adobe Acrobat Reader (UNIX) 7.0.0
- Adobe Acrobat 7.0.0
- Adobe Acrobat 7.0.1
- Adobe Acrobat 7.0.2
- Adobe Reader 7.0.2
- Adobe Reader 9.1
- Adobe Acrobat Professional 9.1
- Adobe Acrobat Standard 9.1
- SuSE openSUSE 11.0
- Adobe Reader 8.1.5
- Adobe Reader 9.1.1
- Adobe Reader 7.1.2
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Adobe Acrobat 7.0.3
- Adobe Reader 7.0.3
- Adobe Acrobat Reader (UNIX) 7.0.1
- Adobe Reader 9.1.3
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Standard 9.1.3
- Gentoo Linux
- Adobe Acrobat Standard 7.0.0
- Adobe Acrobat Standard 7.0.1
- Adobe Acrobat Standard 7.0.2
- Adobe Acrobat Standard 7.0.3
- Adobe Acrobat Standard 7.0.4
- Adobe Acrobat Standard 7.0.5
- Adobe Acrobat Standard 7.0.8
- Adobe Acrobat Standard 7.0.6
- Adobe Acrobat 3D
- Adobe Acrobat Professional 7.0.0
- Adobe Acrobat Professional 7.0.1
- Adobe Acrobat Professional 7.0.2
- Adobe Acrobat Professional 7.0.3
- Adobe Acrobat Professional 7.0.4
- Adobe Acrobat Professional 7.0.5
- Adobe Acrobat Professional 7.0.6
- Adobe Reader 8.1.2
- Adobe Acrobat Professional 7.0.8
- Red Hat Enterprise Linux Extras 3
- Red Hat Enterprise Linux Extras 4
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- Adobe Reader 8.1.2 Security Update 1
- Adobe Acrobat Professional 8.1.2 Security Update 1
- Adobe Acrobat Professional 7.0.9
- Adobe Reader 8.1
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Standard 8.1
- Adobe Reader 7.1.1
- Adobe Reader 8.1.4
- Adobe Acrobat Professional 8.1.4
- Adobe Acrobat Professional 7.1.1
- Adobe Acrobat Standard 7.1.1
- Adobe Acrobat Standard 8.1.4
- Adobe Acrobat Standard 8.1.1
- Adobe Acrobat Standard 8.1.2
- Adobe Acrobat Professional 8.1.2
- Adobe Acrobat Professional 9
- SuSE openSUSE 11.1
- Red Hat Enterprise Linux AS Extras 3
- Red Hat Enterprise Linux ES Extras 3
- Red Hat Enterprise Linux WS Extras 3
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
HTTP:STC:DL:RTF-MISMATCH - HTTP: Microsoft Word RTF Mismatch Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Word. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Office Compatibility Pack SP2
- Microsoft Word 2007 SP2
- Microsoft Word 2007 SP1
- Microsoft Office 2008 for Mac
- Microsoft Office Compatibility Pack SP3
- Microsoft Word 2007
- Microsoft Word 2003 SP1
- Microsoft Word 2003 SP2
- Microsoft Office 2011 for Mac
- Microsoft Word 2003 SP3
- Microsoft Word 2007 SP3
HTTP:STC:MS-WORD-INDEX-MC - HTTP: Microsoft Office Bad Index Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Word. A successful attack can lead to memory corruption or arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
APP:ORACLE:RHINOSCRIPT-BYPASS - APP: Oracle Java Applet Rhino Script Engine Policy Bypass
Severity: HIGH
Description:
This signature detects attempts to exploit a policy bypass vulnerability in the Oracle Java Rhino Script engine. This issue can be used with a Java Applet to execute Java code outside of the sandbox. The vulnerability is caused by insufficient restrictions of certain instances of the error object. An attacker can exploit this vulnerability by enticing a user with sufficient privileges to open a webpage containing a Java Applet and Javascript code running the Rhino script engine. Successful exploitation can result in the execution of arbitrary Java code with full privileges of the currently logged in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Ubuntu Ubuntu Linux 11.04 amd64
- Ubuntu Ubuntu Linux 11.04 ARM
- Ubuntu Ubuntu Linux 11.04 i386
- Ubuntu Ubuntu Linux 11.04 powerpc
- Red Hat Enterprise Linux Desktop 6
- Red Hat Enterprise Linux Desktop Optional 6
- Red Hat Enterprise Linux HPC Node 6
- Red Hat Enterprise Linux HPC Node Optional 6
- Red Hat Enterprise Linux Server 6
- Red Hat Enterprise Linux Server Optional 6
- Red Hat Enterprise Linux Workstation 6
- Red Hat Enterprise Linux Workstation Optional 6
- Red Hat Enterprise Linux Desktop Supplementary 6
- Apple Mac Os X 10.6.5
- Red Hat Enterprise Linux HPC Node Supplementary 6
- Apple Mac OS X Server 10.6.5
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Sun JRE (Linux Production Release) 1.6.0_25
- Sun JRE (Windows Production Release) 1.6.0_21
- Avaya Message Networking 5.2.2
- Avaya Messaging Storage Server 5.2.2
- Avaya Proactive Contact 4.2.1
- Avaya Proactive Contact 4.0.1
- Avaya Messaging Storage Server 5.2
- SuSE SUSE Linux Enterprise Server 10 SP4
- Avaya Aura Presence Services 6.0
- Avaya Aura Conferencing 6.0 Standard
- Avaya IP Office Application Server 6.0
- Avaya Messaging Storage Server 5.2 SP1
- Sun JDK (Linux Production Release) 1.6.0_24
- Sun JDK (Solaris Production Release) 1.6.0_24
- Sun JDK (Windows Production Release) 1.6.0_24
- Sun JRE (Linux Production Release) 1.6.0_24
- Sun JRE (Solaris Production Release) 1.6.0_24
- Sun JRE (Windows Production Release) 1.6.0_24
- Apple Mac Os X 10.6.8
- Apple Mac Os X Server 10.6.8
- Apple Mac OS X 10.6.2
- Apple Mac OS X Server 10.6.2
- Avaya Proactive Contact 4.1
- Apple Mac OS X 10.6.5
- Apple Mac OS X Server 10.6.5
- IBM Java SE 6.0.0 SR9
- Avaya Aura Session Manager 6.1 Sp1
- Avaya Aura Session Manager 6.1 SP2
- Avaya Aura System Manager 6.1 Sp1
- Avaya Aura SIP Enablement Services 5.1
- Sun JRE (Linux Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.6.0 07
- Avaya Meeting Exchange 5.2 SP2
- Sun JDK (Windows Production Release) 1.6.0 20
- Avaya Proactive Contact 4.1.1
- Sun JDK (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.6.0 05
- Sun JDK (Linux Production Release) 1.6.0 06
- Sun JRE (Linux Production Release) 1.6.0 06
- IBM Java SE 6.0 SR5
- Debian Linux 6.0 ia-32
- Debian Linux 6.0 amd64
- Debian Linux 6.0 arm
- Debian Linux 6.0 powerpc
- Debian Linux 6.0 sparc
- Debian Linux 6.0 ia-64
- Debian Linux 6.0 mips
- Sun JDK (Linux Production Release) 1.6.0_23
- Sun JDK (Solaris Production Release) 1.6.0_23
- Sun JDK (Windows Production Release) 1.6.0_23
- Sun JRE (Linux Production Release) 1.6.0_23
- Sun JRE (Solaris Production Release) 1.6.0_23
- Sun JRE (Windows Production Release) 1.6.0_23
- Avaya Interactive Response 4.0
- Avaya CMS Server 15.0
- OpenJDK 1.6.0
- Avaya IR 4.0
- Sun JDK (Solaris Production Release) 1.6.0 20
- Sun JDK (Linux Production Release) 1.6.0 20
- Sun JRE (Linux Production Release) 1.6.0 14
- Sun JRE (Windows Production Release) 1.6.0 14
- Sun JRE (Solaris Production Release) 1.6.0 14
- IBM Java SE 7.0
- Mandriva Linux Mandrake 2011
- Mandriva Linux Mandrake 2011 x86_64
- Apple Mac Os X 10.7
- Red Hat Fedora 15
- IBM Java SE 6 SR8 FP1
- Avaya Aura Application Enablement Services 6.1
- Avaya Aura Session Manager 6.1
- Avaya Aura SIP Enablement Services 5.0
- Sun JDK (Linux Production Release) 1.7.0
- SuSE SUSE Linux Enterprise Server 11 SP1 for SP2
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Desktop Extras 4
- Avaya Proactive Contact 4.2
- Avaya Aura Experience Portal 6.0
- Avaya Aura Presence Services 6.1
- Avaya Aura Communication Manager Utility Services 6.0
- Sun JDK (Linux Production Release) 1.6.0 Update 10
- Sun JDK (Linux Production Release) 1.6.0 Update 11
- Sun JDK (Linux Production Release) 1.6.0 Update 12
- Sun JDK (Linux Production Release) 1.6.0 Update 13
- Sun JDK (Linux Production Release) 1.6.0 Update 14
- Sun JDK (Linux Production Release) 1.6.0 Update 15
- Sun JDK (Linux Production Release) 1.6.0 Update 16
- Sun JDK (Linux Production Release) 1.6.0 Update 17
- Sun JDK (Linux Production Release) 1.6.0 Update 18
- Sun JDK (Linux Production Release) 1.6.0 Update 19
- Sun JDK (Linux Production Release) 1.6.0 Update 20
- Sun JDK (Linux Production Release) 1.6.0 Update 21
- Sun JDK (Linux Production Release) 1.6.0 Update 3
- Sun JDK (Linux Production Release) 1.6.0 Update 4
- Sun JDK (Linux Production Release) 1.6.0 Update 5
- Sun JDK (Linux Production Release) 1.6.0 Update 6
- Sun JDK (Linux Production Release) 1.6.0 Update 7
- Avaya Messaging Storage Server 5.2.8
- Apple Mac OS X 10.6
- Apple Mac OS X Server 10.6
- Oracle Enterprise Linux 5
- Oracle Enterprise Linux 6
- Sun JDK (Solaris Production Release) 1.6.0 05
- Panda Antivirus 1.6.0 Update 1
- Panda Antivirus 1.6.0 Update 10
- Panda Antivirus 1.6.0 Update 11
- Panda Antivirus 1.6.0 Update 12
- Panda Antivirus 1.6.0 Update 13
- Panda Antivirus 1.6.0 Update 14
- Panda Antivirus 1.6.0 Update 15
- Panda Antivirus 1.6.0 Update 16
- Panda Antivirus 1.6.0 Update 17
- Panda Antivirus 1.6.0 Update 18
- Panda Antivirus 1.6.0 Update 19
- Panda Antivirus 1.6.0 Update 2
- Panda Antivirus 1.6.0 Update 20
- Panda Antivirus 1.6.0 Update 21
- Panda Antivirus 1.6.0 Update 3
- Panda Antivirus 1.6.0 Update 4
- Panda Antivirus 1.6.0 Update 5
- Panda Antivirus 1.6.0 Update 6
- Panda Antivirus 1.6.0 Update 7
- Avaya Voice Portal 5.0
- Avaya Meeting Exchange 5.0 SP1
- Avaya Meeting Exchange 5.0 SP2
- Avaya Meeting Exchange 5.1 SP1
- Apple Mac OS X 10.6.3
- Apple Mac OS X Server 10.6.3
- SuSE SUSE Linux Enterprise Software Development Kit 11 SP1 for SP2
- Avaya Aura SIP Enablement Services 5.2
- Avaya Voice Portal 5.0 SP1
- Sun JRE (Linux Production Release) 1.6.0 19
- Sun JRE (Windows Production Release) 1.6.0 19
- Sun JRE (Solaris Production Release) 1.6.0 19
- Sun JDK (Solaris Production Release) 1.6.0 19
- Sun JDK (Windows Production Release) 1.6.0 19
- Sun JDK (Linux Production Release) 1.6.0 19
- Apple Mac Os X 10.6.6
- Apple Mac OS X Server 10.6.6
- Avaya Aura System Manager 6.1
- Sun JRE (Linux Production Release) 1.6.0 12
- Red Hat Fedora 14
- Avaya Aura System Platform 1.1
- Sun JRE (Linux Production Release) 1.6.0
- Sun JRE (Linux Production Release) 1.6.0 10
- Avaya Message Networking 5.2.4
- Apple Mac OS X Server 10.6.1
- Apple Mac OS X 10.6.1
- Sun JDK (Solaris Production Release) 1.6.0 01
- Avaya Proactive Contact 5.0
- Avaya Messaging Storage Server 5.2 SP2
- Avaya Messaging Storage Server 5.2 SP3
- Avaya Message Networking 5.2 SP1
- Avaya Meeting Exchange 5.0
- Avaya Voice Portal 4.0
- Avaya Voice Portal 4.1
- IBM Java SE 6.0
- Sun JRE (Linux Production Release) 1.6.0 11
- Sun JRE (Solaris Production Release) 1.6.0 11
- Sun JRE (Windows Production Release) 1.6.0 11
- VMWare ESX 4.0
- VMWare ESX 4.1
- Sun JDK (Linux Production Release) 1.6.0 10
- Sun JDK (Linux Production Release) 1.6.0 11
- Avaya Aura System Manager 6.1.1
- SuSE SUSE Linux Enterprise Java 10 SP4
- SuSE SUSE Linux Enterprise Java 11 SP1
- Avaya Voice Portal 5.1.2
- Avaya Aura Communication Manager 5.1
- Avaya Meeting Exchange 5.0.0.0.52
- Avaya Voice Portal 5.0 SP2
- Avaya Messaging Application Server 5.2
- Avaya Aura Conferencing 6.0.0 Standard
- Avaya Aura Communication Manager 4.0
- Avaya Aura Communication Manager 4.0
- Avaya Voice Portal 4.1 SP1
- Avaya Voice Portal 4.1 SP2
- Avaya Voice Portal 5.1
- Ubuntu Ubuntu Linux 10.10 amd64
- Ubuntu Ubuntu Linux 10.10 powerpc
- VMWare vCenter 4.1
- OpenJDK 6
- Ubuntu Ubuntu Linux 10.10 i386
- HP HP-UX B.11.11
- Apple Mac Os X 10.7.2
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0
- Avaya CMS Server 16.0
- Avaya Aura Session Manager 5.2
- Avaya Aura SIP Enablement Services 4.0
- Sun JRE (Linux Production Release) 1.6.0 20
- Sun JRE (Windows Production Release) 1.6.0 20
- Avaya Aura Application Enablement Services 5.2
- Avaya Message Networking 5.2
- Sun JRE (Windows Production Release) 1.6.0 15
- Apple Mac Os X 10.7.1
- Apple Mac Os X Server 10.7
- Apple Mac Os X Server 10.7.1
- Apple Mac Os X Server 10.7.2
- Sun JDK (Linux Production Release) 1.6.0 13
- Avaya CMS Server 16.1
- Sun JDK (Solaris Production Release) 1.6.0 02
- Sun JDK (Linux Production Release) 1.6.0_27
- Sun JDK (Solaris Production Release) 1.6.0_27
- Sun JDK (Windows Production Release) 1.6.0_27
- Mandriva Enterprise Server 5
- HP Network Node Manager i 9.1
- Sun JRE (Linux Production Release) 1.6.0_27
- Sun JRE (Solaris Production Release) 1.6.0_27
- Sun JRE (Windows Production Release) 1.6.0_27
- Sun JRE (Linux Production Release) 1.7
- Sun JRE (Solaris Production Release) 1.7
- Sun JRE (Windows Production Release) 1.7
- Avaya Aura System Platform 6.0
- Sun JDK (Windows Production Release) 1.6.0 01-B06
- Sun JDK (Linux Production Release) 1.6.0 17
- IBM Java SE 6.0 SR6
- IBM Java SE 6.0 SR7
- Avaya Aura Session Manager 6.0 SP1
- Sun JDK (Linux Production Release) 1.6.0 01-B06
- Sun JRE (Solaris Production Release) 1.6.0_22
- Gentoo Linux
- Sun JDK (Linux Production Release) 1.6.0 14
- Avaya CMS Server 16.2
- SuSE SUSE Linux Enterprise Server 11 SP1
- SuSE SUSE Linux Enterprise SDK 11 SP1
- Ubuntu Ubuntu Linux 11.10 amd64
- Ubuntu Ubuntu Linux 11.10 i386
- Avaya Aura Session Manager 6.0
- Sun JRE (Solaris Production Release) 1.6.0 2
- Avaya Aura Application Enablement Services 5.2.2
- Sun JRE (Windows Production Release) 1.6.0 2
- Avaya Aura System Manager 6.1 SP2
- Avaya Proactive Contact 4.1.2
- IBM Java SE 6.0.0 SR9-FP2
- Apple Mac OS X 10.6.4
- Apple Mac OS X Server 10.6.4
- Xerox FreeFlow Print Server (FFPS) 73.C0.41
- Avaya IQ 5.1
- Apple Mac Os X 10.6.7
- Apple Mac Os X Server 10.6.7
- Sun JDK (Solaris Production Release) 1.6.0 01-B06
- Avaya Proactive Contact 4.0
- Red Hat Enterprise Linux Desktop 5 Client
- Red Hat Enterprise Linux Supplementary 5 Server
- Sun JDK (Solaris Production Release) 1.6.0 10
- Sun JDK (Windows Production Release) 1.6.0 10
- Sun JDK (Solaris Production Release) 1.6.0 04
- Sun JDK (Windows Production Release) 1.6.0 04
- Sun JDK (Solaris Production Release) 1.6.0 14
- Sun JDK (Windows Production Release) 1.6.0 14
- Sun JDK (Solaris Production Release) 1.6.0 13
- Sun JDK (Windows Production Release) 1.6.0 13
- Sun JDK (Solaris Production Release) 1.6.0 11
- Sun JDK (Windows Production Release) 1.6.0 11
- Sun JRE (Linux Production Release) 1.6.0 13
- VMWare VirtualCenter 2.5
- Sun JDK (Windows Production Release) 1.6.0 05
- Sun JDK (Windows Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 07
- Sun JDK (Windows Production Release) 1.6.0 07
- Sun JDK (Solaris Production Release) 1.6.0
- Sun JDK (Windows Production Release) 1.6.0
- Sun JDK (Solaris Production Release) 1.7.0
- Sun JDK (Windows Production Release) 1.7.0
- Sun JRE (Solaris Production Release) 1.6.0
- Sun JRE (Windows Production Release) 1.6.0
- Sun JRE (Solaris Production Release) 1.6.0 10
- Sun JRE (Windows Production Release) 1.6.0 10
- Sun JRE (Solaris Production Release) 1.6.0 12
- Sun JRE (Windows Production Release) 1.6.0 12
- Sun JRE (Solaris Production Release) 1.6.0 13
- Sun JRE (Windows Production Release) 1.6.0 13
- Sun JRE (Solaris Production Release) 1.6.0 04
- Sun JRE (Windows Production Release) 1.6.0 04
- Sun JRE (Solaris Production Release) 1.6.0 05
- Sun JRE (Windows Production Release) 1.6.0 05
- Sun JRE (Solaris Production Release) 1.6.0 06
- Sun JRE (Windows Production Release) 1.6.0 06
- Sun JRE (Solaris Production Release) 1.6.0 07
- Sun JRE (Windows Production Release) 1.6.0 07
- IBM Java SE 7
- IBM Java SE 6
- HP HP-UX B.11.31
- Avaya IP Office Application Server 6.1
- Avaya Aura Session Manager 1.1
- Avaya Meeting Exchange 5.2
- Red Hat Fedora 16
- Avaya Aura Application Enablement Services 5.2.3
- Avaya IQ 5.2
- Avaya Aura System Platform 6.0 SP2
- Avaya Aura System Platform 6.0 SP3
- Sun JDK (Linux Production Release) 1.6.0_21
- Sun JDK (Linux Production Release) 1.6.0_22
- Sun JDK (Solaris Production Release) 1.6.0_21
- Sun JDK (Solaris Production Release) 1.6.0_22
- VMWare vCenter 4.0
- Sun JDK (Windows Production Release) 1.6.0_21
- Sun JDK (Windows Production Release) 1.6.0_22
- Mandriva Enterprise Server 5 X86 64
- Sun JRE (Linux Production Release) 1.6.0_21
- Sun JRE (Linux Production Release) 1.6.0_22
- Sun JRE (Solaris Production Release) 1.6.0_21
- Sun JDK (Solaris Production Release) 1.6.0_25
- Sun JDK (Windows Production Release) 1.6.0_25
- VMWare vCenter 5.0
- VMWare Update Manager 5.0
- Sun JRE (Windows Production Release) 1.6.0_22
- Sun JRE (Solaris Production Release) 1.6.0_25
- Sun JRE (Windows Production Release) 1.6.0_25
- Sun JDK (Windows Production Release) 1.6.0 18
- Sun JDK (Solaris Production Release) 1.6.0 18
- VMWare ESX 3.5
- Sun JDK (Linux Production Release) 1.6.0 18
- Sun JRE (Linux Production Release) 1.6.0 18
- Sun JRE (Windows Production Release) 1.6.0 18
- Sun JRE (Solaris Production Release) 1.6.0 18
- Avaya Aura Presence Services 6.1.1
- Sun JDK (Linux Production Release) 1.6.0 02
- Sun JDK (Windows Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.6.0 02
- Sun JRE (Solaris Production Release) 1.6.0 01
- Sun JRE (Solaris Production Release) 1.6.0 02
- Sun JRE (Windows Production Release) 1.6.0 01
- Sun JRE (Windows Production Release) 1.6.0 02
- Avaya Voice Portal 5.1
- Avaya Meeting Exchange 5.1
- Sun JDK (Solaris Production Release) 1.6.0 03
- Sun JDK (Linux Production Release) 1.6.0 03
- Sun JDK (Linux Production Release) 1.6.0_25
- Avaya IQ 5
- Sun JDK (Windows Production Release) 1.6.0 03
- Sun JRE (Linux Production Release) 1.6.0 03
- Sun JRE (Solaris Production Release) 1.6.0 03
- Sun JRE (Windows Production Release) 1.6.0 03
- Ubuntu Ubuntu Linux 10.04 ARM
- Ubuntu Ubuntu Linux 10.10 ARM
- Avaya Message Networking 5.2.1
- Avaya Message Networking 5.2.3
- Avaya Aura System Platform 6.0.1
- Avaya Aura System Platform 6.0.2
- Avaya Aura Application Enablement Services 6.1.1
- Avaya Voice Portal 5.1.1
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Red Hat Enterprise Linux 5 Server
- Sun JDK (Windows Production Release) 1.6.0 01
- Sun JDK (Linux Production Release) 1.6.0 01
- Avaya Aura Application Enablement Services 5.2.1
- Avaya Aura Session Manager 6.1.1
- Avaya Aura Session Manager 6.1.2
- Avaya Proactive Contact 4.2.2
- Avaya Aura Messaging 6.0
- Avaya Aura Messaging 6.0.1
- Avaya Aura Session Manager 6.1.3
- Avaya Aura System Manager 6.1.2
- Avaya Aura System Manager 6.1.3
- Avaya IQ 5.1.1
- Xerox FreeFlow Print Server (FFPS) 73.B3.61
- Sun JDK (Linux Production Release) 1.6.0_26
- Sun JDK (Solaris Production Release) 1.6.0_26
- Sun JDK (Windows Production Release) 1.6.0_26
- Sun JRE (Linux Production Release) 1.6.0_26
- Sun JRE (Solaris Production Release) 1.6.0_26
- Sun JRE (Windows Production Release) 1.6.0_26
- Sun JDK (Linux Production Release) 1.6.0 15
- Sun JDK (Windows Production Release) 1.6.0 15
- Sun JDK (Solaris Production Release) 1.6.0 15
- Sun JRE (Solaris Production Release) 1.6.0 15
- Avaya Meeting Exchange 5.2 SP1
- Sun JRE (Linux Production Release) 1.6.0 15
- Ubuntu Ubuntu Linux 10.04 Amd64
- Ubuntu Ubuntu Linux 10.04 I386
- Ubuntu Ubuntu Linux 10.04 Powerpc
- Ubuntu Ubuntu Linux 10.04 Sparc
- Red Hat Enterprise Linux Extras 4
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Debian Linux 6.0 s/390
- Avaya Aura Application Server 5300 SIP Core 2.0
- Avaya IP Office Application Server 7.0
- SuSE SUSE Linux Enterprise Server for VMware 11 SP1
- Sun JRE (Linux Production Release) 1.6.0 17
- Sun JRE (Solaris Production Release) 1.6.0 17
- Sun JRE (Windows Production Release) 1.6.0 17
- Avaya Aura Communication Manager Utility Services 6.1
- Avaya Voice Portal 5.1 SP1
- Sun JDK (Solaris Production Release) 1.6.0 17
- Sun JDK (Windows Production Release) 1.6.0 17
- Avaya CMS Server 15.0 AUX
- Avaya Aura Communication Manager 5.2
- Avaya Aura Communication Manager 5.2.1
- Avaya Aura SIP Enablement Services 5.2.1
HTTP:STC:ADOBE:CAM-RAW-PLUGIN - HTTP: Adobe Camera Raw Plug-in TIFF Image Processing Buffer Underflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Camera Raw Plug-in. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- adobe camera_raw 5.2
- adobe camera_raw 5.4
- adobe camera_raw 5.1
- adobe camera_raw 4.5
- adobe camera_raw 4.2
- adobe camera_raw 2.1
- adobe camera_raw 2.2
- adobe camera_raw 4.0
- adobe camera_raw 2.3
- adobe camera_raw 4.1
- adobe camera_raw 2.4
- adobe camera_raw 4.4.1
- adobe camera_raw 4.3.1
- adobe camera_raw 3.5
- adobe camera_raw 3.4
- adobe camera_raw up to 7.2
- adobe camera_raw 3.7
- adobe camera_raw 5.5
- adobe camera_raw 5.0
- adobe camera_raw 4.6
- adobe camera_raw 3.6
- adobe camera_raw 3.1
- adobe camera_raw 3.3
- adobe camera_raw 5.3
- adobe camera_raw 3.2
HTTP:STC:DL:IRFANVIEW-MC - HTTP: IrfanView FlashPix Plug-in Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against IrfanView. A successful attack can lead to a arbitrary remote code execution within the context of the affected application.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
HTTP:STC:DL:FREETYPE-TYPE1 - HTTP: FreeType PostScript Type1 Font Parsing Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the FreeType font engine. The vulnerability is due to improper validation of the argument count parameter passed to the PostScript operation callothersubr, which can lead to a stack buffer overflow. A remote attacker can entice a target user to download a malicious PostScript or PDF file, and leverage this vulnerability to execute arbitrary code.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Apple Mac Os X Server 10.7.1
- Ubuntu Ubuntu Linux 11.04 amd64
- Ubuntu Ubuntu Linux 11.04 ARM
- Ubuntu Ubuntu Linux 11.04 i386
- Ubuntu Ubuntu Linux 11.04 powerpc
- Apple iOS 4.0.1
- Apple iPod Touch
- Red Hat Enterprise Linux Desktop 6
- Red Hat Enterprise Linux Desktop Optional 6
- Red Hat Enterprise Linux HPC Node 6
- Red Hat Enterprise Linux HPC Node Optional 6
- Red Hat Enterprise Linux Server 6
- Red Hat Enterprise Linux Server Optional 6
- Red Hat Enterprise Linux Workstation 6
- Red Hat Enterprise Linux Workstation Optional 6
- Apple iOS 4.2.1
- Mandriva Corporate Server 4.0.0 X86 64
- SuSE SUSE Linux Enterprise Server for VMware 11 SP1
- Apple iOS 4.2
- Avaya 96x1 IP Deskphone 6
- Mandriva Enterprise Server 5 X86 64
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Apple iOS 4.1
- FreeType 2.4.0
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Mandriva Corporate Server 4.0
- Apple iOS 4.3
- Apple iOS 4.0.2
- Apple iPad
- Apple iOS 3.2.1
- Apple iOS 3.2
- Apple iOS 4
- Apple iPhone
- FreeType 2.4.3
- Ubuntu Ubuntu Linux 10.10 amd64
- Debian Linux 6.0 amd64
- Debian Linux 6.0 arm
- Red Hat Fedora 15
- Debian Linux 6.0 sparc
- Debian Linux 6.0 ia-64
- Debian Linux 6.0 mips
- Debian Linux 6.0 powerpc
- Debian Linux 6.0 s/390
- Apple iPad
- Apple iOS 3.2.2
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Apple iOS 4.2 beta
- SuSE SUSE Linux Enterprise Server 11 SP1
- SuSE openSUSE 11.3
- Ubuntu Ubuntu Linux 10.10 i386
- Gentoo Linux
- Apple Mac Os X 10.7
- Apple Mobile Safari
- Ubuntu Ubuntu Linux 10.10 ARM
- FreeType 2.4.2
- SuSE SUSE Linux Enterprise SDK 11 SP1
- FreeType 2.4.5
- Debian Linux 6.0 ia-32
- Apple iOS 4.3.3
- Apple iOS 3.1
- SuSE openSUSE 11.4
- Ubuntu Ubuntu Linux 10.10 powerpc
- Apple iOS 4.3.2
- Apple iOS 4.2.5
- Apple iOS 4.2.6
- Apple iOS 4.2.7
- Apple iOS 4.3.1
- Apple iOS 3.0
- Apple iOS 4.2.8
- Apple Mac Os X 10.7.1
- Apple Mac Os X Server 10.7
APP:CAIN-ABEL-CISCO-IOS-BOF - APP: Cain & Abel Cisco IOS Configuration File Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Cain & Abel Cisco IOS. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
Severity: CRITICAL
Description:
This signature detects payloads being transferred over network that have been using base64 x86 NOOP. This may be an indication of someone trying to evade anti-virus/IPS solutions and possibly drop malicious code.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
HTTP:STC:IE:CVE-2014-1804-UAF - HTTP: Microsoft Internet Explorer CVE-2014-1804 Use-After-Free
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the eXeScope version 6.50. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
HTTP:STC:APPLE-QTIME-DREF-BO - HTTP: Apple QuickTime Alis Volume Name Parsing Stack Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Apple QuickTime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- apple quicktime 5.0
- apple quicktime 7.0.1
- apple quicktime 6.5.2
- apple quicktime 7.1.5
- apple quicktime 6.0
- apple quicktime 7.1.4
- apple quicktime 7.0.0
- apple quicktime 3.0
- apple quicktime 7.4.0
- apple quicktime 7.6.0
- apple quicktime 7.2.1
- apple quicktime 6.0.1
- apple quicktime 7.4.1
- apple quicktime 6.1.1
- apple quicktime 7.6.1
- apple quicktime 6.5
- apple quicktime 7.6.5
- apple quicktime 6.1.0
- apple quicktime 7.7.2
- apple quicktime 7.7.1
- apple quicktime 6.1
- apple quicktime 6.0.2
- apple quicktime 7.1.0
- apple quicktime 5.0.1
- apple quicktime 7.5.0
- apple quicktime 7.2.0
- apple quicktime 7.0.4
- apple quicktime 7.4.5
- apple quicktime 7.7.0
- apple quicktime 7.6.6
- apple quicktime 6.0.0
- apple quicktime 7.0.2
- apple quicktime 7.3.1
- apple quicktime 7.6.7
- apple quicktime 7.0.3
- apple quicktime 7.6.8
- apple quicktime 6.5.0
- apple quicktime 7.6.2
- apple quicktime 7.3.0
- apple quicktime 6.5.1
- apple quicktime 5.0.2
- apple quicktime 7.1.3
- apple quicktime 7.1.2
- apple quicktime 7.1.1
- apple quicktime 6.2.0
- apple quicktime 7.5.5
- apple quicktime 6.4.0
- apple quicktime 4.1.2
- apple quicktime 7.6.9
- apple quicktime 6.3.0
- apple quicktime up to 7.7.3
- apple quicktime 7.1.6
APP:CUPS:GIF-READ-LZW-OF - APP: Apple CUPS gif_read_lzw Heap Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Common Unix Printing System (CUPS). A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Ubuntu Ubuntu Linux 11.04 amd64
- Ubuntu Ubuntu Linux 11.04 ARM
- Ubuntu Ubuntu Linux 11.04 i386
- Ubuntu Ubuntu Linux 11.04 powerpc
- Ubuntu Ubuntu Linux 10.04 Amd64
- Ubuntu Ubuntu Linux 10.04 I386
- Ubuntu Ubuntu Linux 10.04 Powerpc
- Ubuntu Ubuntu Linux 10.04 Sparc
- Ubuntu Ubuntu Linux 10.04 ARM
- Ubuntu Ubuntu Linux 10.10 ARM
- Mandriva Enterprise Server 5 X86 64
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Ubuntu Ubuntu Linux 8.04 LTS Amd64
- Ubuntu Ubuntu Linux 8.04 LTS I386
- Ubuntu Ubuntu Linux 8.04 LTS Lpia
- Mandriva Linux Mandrake 2011
- Mandriva Linux Mandrake 2011 x86_64
- Ubuntu Ubuntu Linux 10.10 amd64
- Debian Linux 6.0 amd64
- Debian Linux 6.0 arm
- Debian Linux 6.0 powerpc
- Debian Linux 6.0 sparc
- Debian Linux 6.0 ia-64
- Debian Linux 6.0 mips
- Debian Linux 6.0 s/390
- Ubuntu Ubuntu Linux 8.04 LTS Powerpc
- Ubuntu Ubuntu Linux 8.04 LTS Sparc
- Ubuntu Ubuntu Linux 10.10 i386
- Gentoo Linux
- Debian Linux 6.0 ia-32
- Ubuntu Ubuntu Linux 10.10 powerpc
- Easy Software Products CUPS 1.4.8
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe Acrobat Reader. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- SuSE SUSE Linux Enterprise 11
- Adobe Acrobat Professional 8.1.3
- Adobe Acrobat Standard 8.0
- Adobe Reader 8.1.1
- Red Hat Enterprise Linux Desktop 5 Client
- Adobe Reader 9.1
- Adobe Acrobat Professional 9.1
- Adobe Acrobat Standard 9.1
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- Adobe Acrobat Professional 8.1.4
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Adobe Acrobat Professional 8.1.6
- SuSE openSUSE 11.0
- Adobe Reader 8.1.2 Security Update 1
- Adobe Acrobat Professional 8.1.2 Security Update 1
- Adobe Acrobat Standard 8.1.6
- Adobe Reader 8.1.6
- Adobe Acrobat 9.1.1
- Adobe Acrobat Standard 8.1.3
- Adobe Reader 9.1.3
- Adobe Acrobat Standard 9
- Adobe Reader 8.1.5
- Adobe Reader 9.1.1
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Adobe Acrobat Professional 8.0
- Adobe Reader 8.1
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Standard 8.1
- Adobe Reader 8.1.4
- Adobe Acrobat Standard 8.2
- Adobe Acrobat Standard 9.3
- Adobe Acrobat 9.3
- Adobe Reader 9.3
- Adobe Acrobat Professional 9.3
- Adobe Reader 8.2
- Adobe Reader 8.0
- Adobe Acrobat Standard 8.1.4
- Gentoo Linux
- SuSE Moblin 2.0
- Adobe Acrobat Standard 8.1.1
- Adobe Acrobat Standard 8.1.2
- Adobe Acrobat Professional 8.1.2
- Adobe Reader 8.1.3
- Adobe Reader 9
- Adobe Reader 9.2
- Adobe Acrobat Professional 9.2
- Adobe Acrobat Standard 9.2
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Professional 8.1.7
- SuSE SUSE Linux Enterprise Desktop 10 SP3
- Adobe Acrobat Professional 9
- Adobe Acrobat Standard 8.1.7
- Red Hat Enterprise Linux ES 4.8.Z
- Adobe Reader 8.1.7
- Red Hat Enterprise Linux EUS 5.4.Z Server
- Adobe Acrobat Professional 8.2
- Adobe Reader 8.1.2
- Adobe Acrobat Standard 9.1.3
- Adobe Acrobat Professional 9.1.2
- SuSE openSUSE 11.1
- SuSE openSUSE 11.2
- Adobe Acrobat Professional 8.1.1
- Adobe Acrobat 9.2
- Red Hat Enterprise Linux ES Extras 4
HTTP:STC:DL:MSSQL-BACKUP-MEM - HTTP: Microsoft SQL Server Backup Restoring Memory Corruption
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft SQL Server. A successful attack can lead to privilege escalation and arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Server SP3
- Microsoft Windows 2000 Advanced Server SP3
- Microsoft Windows 2000 Datacenter Server SP3
- Microsoft SQL Server 7.0 SP4
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft SQL Server 2000 SP1
- Microsoft SQL Server 2000 SP4
- VMWare VirtualCenter 2.5 Update 4
- Microsoft SQL Server 2000 SP3
- Microsoft SQL Server 2005 SP1
- Microsoft SQL Server 7.0 SP1
- Microsoft SQL Server 7.0 SP2
- Microsoft SQL Server 2000 Itanium Edition SP4
- Microsoft Windows 2000 Professional
- Microsoft SQL Server 2005 Itanium Edition SP2
- Microsoft SQL Server 2005 Express Edition SP2
- Microsoft SQL Server 2005 x64 Edition SP2
- Microsoft SQL Server 2005 Express Edition with Advanced Serv SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Advanced Server SP1
- VMWare vCenter 4.0
- Microsoft SQL Server 2005 x64 Edition SP1
- Microsoft Windows 2000 Advanced Server SP4
- Microsoft Windows 2000 Datacenter Server SP4
- VMWare VirtualCenter 2.5 Update 1
- VMWare VirtualCenter 2.5 Update 2
- Microsoft Windows Internal Database (WYukon) x64 SP2
- Microsoft SQL Server 2000 Itanium Edition
- Microsoft SQL Server 2000 Itanium Edition SP1
- Microsoft SQL Server 2000 Itanium Edition SP2
- Microsoft SQL Server 2000 Itanium Edition SP3
- Microsoft SQL Server 2000 Desktop Engine SP3
- Microsoft SQL Server 2000 Desktop Engine SP2
- Microsoft SQL Server 2000 Desktop Engine SP1
- Microsoft Data Engine (MSDE) 1.0 SP3
- Microsoft Data Engine (MSDE) 1.0 SP2
- Microsoft Windows 2000 Server
- Microsoft Windows Internal Database (WYukon) SP1
- VMWare Vcenter Update Manager 4.0
- Microsoft Windows Internal Database (WYukon) x64 SP1
- VMWare VirtualCenter 2.5 Update 5
- Microsoft Data Engine (MSDE) 1.0 SP4
- Microsoft Data Engine (MSDE) 1.0
- Microsoft SQL Server 7.0
- Microsoft Data Engine (MSDE) 1.0 SP1
- VMWare vCenter 4.1
- VMWare Vcenter Update Manager 1.0
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Microsoft Windows Internal Database (WYukon)
- Microsoft Windows Server 2003 SP2
- VMWare VirtualCenter 2.5 Update 6
- VMWare Vcenter Update Manager 4.1
- Microsoft SQL Server 2005 Itanium Edition SP1
- Microsoft Windows 2000 Server SP2
- Microsoft Windows Internal Database (WYukon) x64
- Microsoft SQL Server 2005 Express Edition SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP4
- Microsoft SQL Server 2005 Express Edition with Advanced Serv SP1
- Microsoft Windows 2000 Server SP4
- VMWare VirtualCenter 2.5.Update 3 Build 11983
- VMWare VirtualCenter 2.5
- Microsoft SQL Server 2000 Desktop Engine SP4
- Microsoft SQL Server 2000 Desktop Engine
- Microsoft Windows Server 2008 for 32-bit Systems
- Microsoft Windows Server 2008 for x64-based Systems
- Microsoft SQL Server 2000
- Microsoft SQL Server 7.0 SP3
- Microsoft SQL Server 2005 SP2
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft SQL Server 2000 SP2
- Microsoft Windows Internal Database (WYukon) SP2
HTTP:STC:DL:OUTLOOK-CE - HTTP: Microsoft Outlook SMB ATTACH_BY_REFERENCE Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in Microsoft Office Outlook Email client application. The vulnerability is due to a design error while Outlook parses specially crafted email attachments. Remote attackers can exploit this vulnerability by sending a crafted email attachment using the ATTACH_BY_REFERENCE method. Successful exploitation of this vulnerability would result in arbitrary code execution with the privileges of the logged on user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Outlook 2007 SP1
- Microsoft Outlook 2002 SP3
- Microsoft Outlook 2002
- Microsoft Outlook 2007 SP2
- Microsoft Outlook 2003
- Microsoft Outlook 2002 SP1
- Microsoft Outlook 2007
- Microsoft Outlook 2002 SP2
- Microsoft Outlook 2003 SP3
- Microsoft Outlook 2003 SP2
DB:ORACLE:FUSION-XLS-IO - DB: Oracle Fusion Middleware Outside In Excel File Parsing Integer Overflow
Severity: HIGH
Description:
An integer overflow vulnerability exists in Oracle Outside In. The vulnerability is due to improper parsing of Excel files. When handling TxO records the code improperly wraps an integer value. This will result in an integer overflow causing a heap-based buffer overflow. A remote unauthenticated attacker can exploit this vulnerability by causing an application that uses the vulnerable library to handle a malformed Excel file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
HTTP:STC:JAVA:TYPE1-FONT - HTTP: Sun Java Runtime Environment Type1 Font Parsing Integer Overflow Vulnerability
Severity: HIGH
Description:
This signature detects known flaw in the Sun Java Runtime Environment software. It is due to signedness error while parsing certain Type1 font files. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted HTML file. Successful exploitation may lead to arbitrary code execution on the target. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the logged in user. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Apple Mac OS X 10.4.7
- Apple Mac OS X Server 10.4.7
- Debian Linux 5.0 Armel
- VMWare ESX Server 3.0.3
- Sun JRE (Windows Production Release) 1.4.2 12
- HP HP-UX 11.23.0
- Apple Mac OS X 10.5.4
- Apple Mac OS X Server 10.5.4
- Oracle JRockit R27.6.0-50 1.5.0 15
- Red Hat Enterprise Linux Extras 4
- Apple Mac OS X Server 10.6.3
- SuSE Open-Enterprise-Server
- Nortel Networks Self-Service WVADS
- Sun JRE (Linux Production Release) 1.3.1 08
- Sun JRE (Linux Production Release) 1.3.1 09
- Sun JRE (Linux Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.3.1 08
- Sun JRE (Solaris Production Release) 1.3.1 09
- Sun JRE (Solaris Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.4.2 02
- Sun JRE (Windows Production Release) 1.3.1 08
- Sun JRE (Windows Production Release) 1.3.1 09
- Sun JRE (Windows Production Release) 1.4.2 02
- VMWare VirtualCenter 2.5 Update 2
- Apple Mac OS X 10.4.6
- Apple Mac OS X Server 10.4.6
- SuSE SUSE Linux Enterprise Server 11 DEBUGINFO
- Apple Mac OS X 10.6.2
- Apple Mac OS X Server 10.6.2
- HP HP-UX 11.31
- Apple Mac OS X 10.4.10
- Apple Mac OS X Server 10.4.10
- Pardus Linux 2008
- SuSE SUSE Linux Enterprise Server 11
- Sun JRE (Linux Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.6.0 07
- Sun JRE (Linux Production Release) 1.5.0 16
- Sun JRE (Linux Production Release) 1.4.2 18
- Sun JRE (Solaris Production Release) 1.4.2 18
- Sun JRE (Windows Production Release) 1.4.2 18
- Sun JRE (Linux Production Release) 1.3.1 23
- Sun JRE (Solaris Production Release) 1.3.1 23
- Sun JRE (Windows Production Release) 1.3.1 23
- Sun SDK (Linux Production Release) 1.4.2 17
- Sun SDK (Linux Production Release) 1.4.2 18
- SuSE SUSE Linux Enterprise 11
- Sun SDK (Linux Production Release) 1.3.1 22
- SuSE Novell Linux POS 9
- Sun SDK (Solaris Production Release) 1.3.1 23
- Sun SDK (Solaris Production Release) 1.4.2 17
- Sun JRE (Windows Production Release) 1.1.8 005
- Sun JRE (Windows Production Release) 1.1.7 B 007
- Sun SDK (Windows Production Release) 1.3.1 22
- Sun JRE (Windows Production Release) 1.1.6 09
- Sun SDK (Windows Production Release) 1.3.1 23
- Sun SDK (Windows Production Release) 1.4.2 17
- Sun SDK (Windows Production Release) 1.4.2 18
- Sun JRE (Solaris Production Release) 1.1.8 12
- Sun JDK (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.4.2 17
- Sun JRE (Solaris Production Release) 1.4.2 17
- Sun JRE (Windows Production Release) 1.4.2 17
- Sun JRE (Linux Production Release) 1.3.1 22
- Sun JRE (Solaris Production Release) 1.3.1 22
- Sun JRE (Windows Production Release) 1.3.1 22
- Sun JDK (Linux Production Release) 1.5.0 15
- Sun JDK (Linux Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.5.0 15
- Sun JRE (Solaris Production Release) 1.5.0 15
- Sun JRE (Linux Production Release) 1.6.0 06
- Sun JDK (Linux Production Release) 1.5.0 14
- Apple Mac OS X Server 10.4.8
- Sun SDK (Linux Production Release) 1.3.1 23
- Sun JRE (Linux Production Release) 1.4.2 03
- Sun JRE (Solaris Production Release) 1.4.2 03
- Sun JRE (Windows Production Release) 1.4.2 03
- Sun SDK (Linux Production Release) 1.4.2 01
- Sun SDK (Linux Production Release) 1.4.2 03
- Sun JRE (Linux Production Release) 1.4.2 04
- Sun JRE (Solaris Production Release) 1.4.2 04
- Sun JRE (Windows Production Release) 1.4.2 04
- Sun SDK (Windows Production Release) 1.4.2 04
- Sun SDK (Linux Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 03
- Sun SDK (Solaris Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2 03
- Sun JRE (Linux Production Release) 1.4.2 12
- Avaya CMS Server 15.0
- Sun SDK (Solaris Production Release) 1.2.2 05A
- Sun SDK (Solaris Production Release) 1.2.1
- Sun JRE (Solaris Production Release) 1.2.2 05A
- Sun JRE (Solaris Production Release) 1.2.1
- Sun JRE (Solaris Production Release) 1.1.8 10
- Sun JRE (Solaris Production Release) 1.1.7 B
- Sun JRE (Solaris Production Release) 1.1.6
- Sun SDK (Linux Production Release) 1.2.2 005
- Sun JRE (Linux Production Release) 1.2.2 005
- Apple Mac OS X 10.4.0
- Apple Mac OS X Server 10.4.0
- Sun JRE (Linux Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.3.1
- SuSE SUSE Linux Enterprise Server 10
- SuSE SUSE Linux Enterprise Server 9
- Apple Mac OS X Server 10.4.3
- Apple Mac OS X 10.4.3
- Sun SDK (Linux Production Release) 1.4.2 16
- Sun SDK (Solaris Production Release) 1.4.2 16
- Sun SDK (Windows Production Release) 1.4.2 16
- Sun SDK (Windows Production Release) 1.3.1 20
- Sun SDK (Linux Production Release) 1.3.1 20
- Sun JRE (Linux Production Release) 1.3.1 21
- Sun JRE (Solaris Production Release) 1.3.1 21
- Sun JRE (Windows Production Release) 1.3.1 21
- Sun SDK (Linux Production Release) 1.3.1 21
- Sun SDK (Solaris Production Release) 1.3.1 21
- Sun SDK (Windows Production Release) 1.3.1 21
- Sun JRE (Linux Production Release) 1.3.1 21
- VMWare Server 2.0
- Apple Mac OS X 10.5.5
- Apple Mac OS X Server 10.5.5
- Nortel Networks Enterprise Network Management System
- Sun SDK (Windows Production Release) 1.4.1 03
- SuSE SUSE Linux Enterprise Server 10 SP1
- Sun JRE (Linux Production Release) 1.3.1 18
- Sun JRE (Linux Production Release) 1.5.0 07
- Sun JRE (Linux Production Release) 1.3.1 19
- Sun JRE (Windows Production Release) 1.3.1 14
- Debian Linux 5.0 Alpha
- Sun JDK (Linux Production Release) 1.5.0 01
- Sun JDK (Linux Production Release) 1.5.0 02
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Desktop Extras 4
- Sun SDK (Linux Production Release) 1.4.2 15
- Sun SDK (Solaris Production Release) 1.4.2 15
- Sun SDK (Windows Production Release) 1.4.2 15
- Sun JRE (Linux Production Release) 1.4.2 06
- Sun JRE (Windows Production Release) 1.4.2 06
- Sun JRE (Solaris Production Release) 1.4.2 06
- Sun SDK (Windows Production Release) 1.4.1 02
- Nortel Networks Self-Service MPS 500
- Nortel Networks Self-Service MPS 1000
- Nortel Networks Self-Service Speech Server
- Sun SDK (Linux Production Release) 1.4.0 .0 02
- Sun JRE (Linux Production Release) 1.3.1 16
- Sun JRE (Linux Production Release) 1.5.0 15
- Apple Mac OS X 10.5
- Apple Mac OS X 10.6
- Apple Mac OS X Server 10.6
- Sun JRE (Windows Production Release) 1.4.2 05
- Oracle JRockit R27.6.2
- Apple Mac OS X Server 10.4.1
- Sun JRE (Linux Production Release) 1.2.2 12
- Red Hat Network Satellite (for RHEL 5 Server) 5.3
- Sun SDK (Linux Production Release) 1.4.2 05
- Apple Mac OS X 10.6.3
- Sun JDK (Linux Production Release) 1.5.0 .0 05
- Sun JRE (Linux Production Release) 1.3.0 .0
- Sun JRE (Windows Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.3.0
- Sun SDK (Windows Production Release) 1.3.0 .0 05
- Sun SDK (Linux Production Release) 1.3.1 08
- Sun SDK (Linux Production Release) 1.3.1 09
- Sun SDK (Linux Production Release) 1.3.1 10
- Sun SDK (Linux Production Release) 1.3.1 11
- Sun SDK (Linux Production Release) 1.3.1 12
- Sun SDK (Linux Production Release) 1.3.1 13
- Sun SDK (Linux Production Release) 1.3.1 14
- Sun SDK (Solaris Production Release) 1.3.1 08
- Sun SDK (Solaris Production Release) 1.3.1 09
- Sun SDK (Solaris Production Release) 1.3.1 10
- Sun SDK (Solaris Production Release) 1.3.1 11
- Sun SDK (Solaris Production Release) 1.3.1 12
- Sun SDK (Solaris Production Release) 1.3.1 13
- Sun SDK (Solaris Production Release) 1.3.1 14
- Sun SDK (Windows Production Release) 1.3.1 08
- Sun SDK (Windows Production Release) 1.3.1 09
- Sun SDK (Windows Production Release) 1.3.1 10
- Sun SDK (Windows Production Release) 1.3.1 11
- Sun SDK (Windows Production Release) 1.3.1 12
- Sun SDK (Windows Production Release) 1.3.1 13
- Sun SDK (Windows Production Release) 1.3.1 14
- Sun JRE (Linux Production Release) 1.3.1 10
- Sun JRE (Linux Production Release) 1.3.1 11
- Sun JRE (Linux Production Release) 1.3.1 13
- Sun JRE (Linux Production Release) 1.3.1 14
- Sun JRE (Solaris Production Release) 1.3.1 10
- Sun JRE (Solaris Production Release) 1.3.1 11
- Sun JRE (Solaris Production Release) 1.3.1 12
- Sun JRE (Solaris Production Release) 1.3.1 13
- Sun JRE (Solaris Production Release) 1.3.1 14
- Sun JRE (Windows Production Release) 1.3.1 10
- Sun JRE (Windows Production Release) 1.3.1 11
- Sun JRE (Windows Production Release) 1.3.1 12
- Sun JRE (Windows Production Release) 1.3.1 13
- Debian Linux 5.0
- Sun JRE (Linux Production Release) 1.3.1 12
- Debian Linux 5.0 Amd64
- Debian Linux 5.0 Arm
- Debian Linux 5.0 Hppa
- Debian Linux 5.0 Ia-32
- Debian Linux 5.0 Ia-64
- Debian Linux 5.0 M68k
- Debian Linux 5.0 Mips
- Debian Linux 5.0 Mipsel
- Debian Linux 5.0 Powerpc
- Debian Linux 5.0 S/390
- Debian Linux 5.0 Sparc
- Sun JRE (Solaris Production Release) 1.3.0 03
- Sun SDK (Solaris Production Release) 1.2.2 10
- Sun JRE (Linux Production Release) 1.3.0 .0 05
- Sun SDK (Solaris Production Release) 1.3.0
- Sun JRE (Linux Production Release) 1.6.0 10
- Sun SDK (Windows Production Release) 1.2.2 010
- Sun SDK (Solaris Production Release) 1.2.2 12
- Sun JRE (Linux Production Release) 1.4.2 15
- Sun JRE (Windows Production Release) 1.4.2 15
- Sun JRE (Solaris Production Release) 1.4.2 15
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Sun SDK (Linux Production Release) 1.2.2 12
- Apple Mac OS X Server 10.6.1
- Apple Mac OS X 10.6.1
- Sun SDK (Windows Production Release) 1.1.8 007
- Red Hat Enterprise Linux 5 Server
- Sun JRE (Solaris Production Release) 1.3.1 18
- Sun JRE (Windows Production Release) 1.3.1 18
- Sun JRE (Windows Production Release) 1.3.1 19
- Sun JRE (Solaris Production Release) 1.2.2 11
- Sun SDK (Linux Production Release) 1.4.2 09
- Sun SDK (Linux Production Release) 1.4.2 10
- Sun SDK (Linux Production Release) 1.4.2 11
- Sun SDK (Linux Production Release) 1.4.2 12
- Sun SDK (Linux Production Release) 1.4.2 13
- Sun SDK (Linux Production Release) 1.4.2 14
- Sun SDK (Solaris Production Release) 1.4.2 09
- Sun SDK (Solaris Production Release) 1.4.2 10
- Sun SDK (Solaris Production Release) 1.4.2 11
- Sun SDK (Solaris Production Release) 1.4.2 12
- Sun SDK (Solaris Production Release) 1.4.2 13
- Sun SDK (Solaris Production Release) 1.4.2 14
- Sun SDK (Windows Production Release) 1.4.2 09
- Sun SDK (Windows Production Release) 1.4.2 10
- Sun SDK (Windows Production Release) 1.4.2 11
- Sun SDK (Windows Production Release) 1.4.2 12
- Sun SDK (Windows Production Release) 1.4.2 13
- Sun SDK (Windows Production Release) 1.4.2 14
- Sun JRE (Windows Production Release) 1.4.2 07
- Sun JRE (Windows Production Release) 1.4.2 08
- Sun JRE (Windows Production Release) 1.4.2 09
- Sun JRE (Windows Production Release) 1.4.2 10
- Sun JRE (Windows Production Release) 1.4.2 11
- Sun JRE (Windows Production Release) 1.4.2 13
- Sun JRE (Windows Production Release) 1.4.2 14
- Sun JRE (Solaris Production Release) 1.4.2 07
- Sun JRE (Solaris Production Release) 1.4.2 08
- Sun JRE (Solaris Production Release) 1.4.2 09
- Sun JRE (Solaris Production Release) 1.4.2 10
- Sun JRE (Solaris Production Release) 1.4.2 11
- Sun JRE (Solaris Production Release) 1.4.2 13
- Sun JRE (Solaris Production Release) 1.4.2 14
- Sun JRE (Linux Production Release) 1.4.2 10
- Sun JRE (Linux Production Release) 1.4.2 11
- Sun JRE (Linux Production Release) 1.4.2 13
- Sun JRE (Linux Production Release) 1.4.2 14
- Sun SDK (Windows Production Release) 1.3.0 .0 02
- Sun JRE (Windows Production Release) 1.3.0 .0 02
- Sun SDK (Windows Production Release) 1.2.2 007
- Sun JRE (Windows Production Release) 1.2.2 007
- Sun JRE (Windows Production Release) 1.2.1
- Sun SDK (Windows Production Release) 1.2.1
- Sun SDK (Windows Production Release) 1.2.0
- Sun JRE (Windows Production Release) 1.2.0
- Sun JRE (Solaris Production Release) 1.3.0 .0 02
- Sun SDK (Solaris Production Release) 1.3.0 .0 02
- Sun JRE (Solaris Production Release) 1.2.2 07
- Sun SDK (Solaris Production Release) 1.2.2 07
- Sun JRE (Solaris Production Release) 1.2.0
- Sun SDK (Solaris Production Release) 1.2.0
- Sun JRE (Linux Production Release) 1.3.0 .0 03
- Sun SDK (Linux Production Release) 1.3.0 .0 02
- Sun JRE (Linux Production Release) 1.6.0 11
- Sun SDK (Linux Production Release) 1.2.2 007
- Sun JRE (Linux Production Release) 1.5.0 06
- Apple Mac OS X 10.5.3
- Sun JRE (Linux Production Release) 1.4.2 09
- Sun SDK (Solaris Production Release) 1.2.2 07A
- Sun JRE (Linux Production Release) 1.3.1 17
- Apple Mac OS X 10.4.11
- Apple Mac OS X Server 10.4.11
- Sun JDK (Linux Production Release) 1.6.0 10
- Sun JDK (Linux Production Release) 1.6.0 11
- Sun JDK (Linux Production Release) 1.5.0 17
- Sun SDK (Solaris Production Release) 1.4.2 19
- Sun SDK (Windows Production Release) 1.4.2 19
- Sun JRE (Linux Production Release) 1.4.1 03
- Sun JRE (Solaris Production Release) 1.4.1 03
- Sun JRE (Windows Production Release) 1.4.1 03
- Sun SDK (Linux Production Release) 1.3.1 24
- Sun SDK (Solaris Production Release) 1.4.1 03
- Sun SDK (Linux Production Release) 1.4.1 03
- Apple Mac OS X 10.5.1
- Apple Mac OS X Server 10.5
- Apple Mac OS X Server 10.5.1
- VMWare ESX Server 4.0
- VMWare ESX Server 3.5 ESX350-200906407-S
- VMWare vMA 4.0
- Mandriva Linux Mandrake 2009.1
- Mandriva Linux Mandrake 2009.1 X86 64
- Nortel Networks Self-Service Peri Application
- Nortel Networks Contact Center - CCT
- Nortel Networks Self-Service CCXML
- Nortel Networks Self Service VoiceXML
- VMWare VirtualCenter 2.5.Update 3 Build 11983
- Sun JRE (Windows Production Release) 1.3.1 05
- Red Hat Network Satellite (for RHEL 4 AS) 5.3
- Sun JDK (Linux Production Release) 1.5.0 07
- Apple Mac OS X Server 10.5.3
- Sun SDK (Solaris Production Release) 1.3.1 05
- Sun SDK (Solaris Production Release) 1.2.2 13
- Oracle JRockit R27.1.0
- Ubuntu Ubuntu Linux 8.10 I386
- Apple Mac OS X 10.4.4
- Apple Mac OS X Server 10.4.4
- Apple Mac OS X 10.4.5
- Apple Mac OS X Server 10.4.5
- Sun JRE (Windows Production Release) 1.4.1 07
- VMWare VirtualCenter 2.5
- HP HP-UX B.11.11
- Sun JRE (Linux Production Release) 1.4.2 08
- VMWare VirtualCenter 2.5 Update 1
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0
- VMWare VirtualCenter 2.0.2
- VMWare VirtualCenter 2.0.2 Update 1
- Sun JRE (Windows Production Release) 1.4.1 01
- VMWare VirtualCenter 2.0.2 Update 2
- Sun JRE (Solaris Production Release) 1.3.1 05
- Sun JDK (Linux Production Release) 1.5.0.0 12
- Avaya Interactive Response 3.0
- Oracle JRockit R27.6.3
- Sun JRE (Solaris Production Release) 1.3.0 01
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Apple Mac OS X 10.4.9
- HP HP-UX 11.11.0
- Sun JDK (Linux Production Release) 1.5.0.0 03
- Sun SDK (Windows Production Release) 1.3.1 06
- Apple Mac OS X 10.5.7
- Apple Mac OS X Server 10.5.7
- Sun JDK (Linux Production Release) 1.5.0.0 04
- Sun JRE (Solaris Production Release) 1.3.1
- Sun JRE (Linux Production Release) 1.3.1 15
- Sun SDK (Windows Production Release) 1.3.1 15
- Sun SDK (Linux Production Release) 1.3.1 15
- Sun SDK (Solaris Production Release) 1.3.1 15
- Sun SDK (Solaris Production Release) 1.4.2 08
- Sun SDK (Linux Production Release) 1.4.2 08
- Sun SDK (Windows Production Release) 1.4.2 08
- Sun JRE (Linux Production Release) 1.3.1 02
- Gentoo Linux
- Sun SDK (Solaris Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.4.2
- Sun JRE (Solaris Production Release) 1.4.2
- Sun JRE (Windows Production Release) 1.4.2
- Apple Mac OS X 10.5.6
- Apple Mac OS X Server 10.5.6
- Sun JRE (Windows Production Release) 1.4.0 .0 01
- Sun JRE (Windows Production Release) 1.3.1 01
- Sun JRE (Windows Production Release) 1.3.1 04
- Sun JRE (Windows Production Release) 1.2.2 12
- Sun SDK (Windows Production Release) 1.4.0 .0 01
- Sun SDK (Windows Production Release) 1.3.1 04
- Sun JRE (Solaris Production Release) 1.4.0 .0 01
- Sun JRE (Solaris Production Release) 1.3.1 04
- Sun JRE (Solaris Production Release) 1.2.2 012
- Sun JRE (Linux Production Release) 1.2.2 006
- Sun JRE (Linux Production Release) 1.2.2 004
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- SuSE SUSE Linux Enterprise Server 10 SP2
- Sun JRE (Windows Production Release) 1.3.1
- Sun JDK (Linux Production Release) 1.5.0.0 08
- Sun JDK (Linux Production Release) 1.5.0.0 09
- Sun JRE (Linux Production Release) 1.5.0 14
- Ubuntu Ubuntu Linux 8.10 Amd64
- Sun JRE (Linux Production Release) 1.4.1 02
- Sun JRE (Solaris Production Release) 1.4.1 02
- Sun JRE (Windows Production Release) 1.4.1 02
- Sun JRE (Linux Production Release) 1.3.1 07
- Sun JRE (Solaris Production Release) 1.3.1 07
- Sun JRE (Windows Production Release) 1.3.1 07
- Sun SDK (Linux Production Release) 1.3.1 07
- Sun SDK (Solaris Production Release) 1.3.1 07
- Sun SDK (Windows Production Release) 1.3.1 07
- Sun SDK (Linux Production Release) 1.4.1 02
- Sun SDK (Solaris Production Release) 1.4.1 02
- Sun JRE (Linux Production Release) 1.4.2 10-B03
- Sun JRE (Linux Production Release) 1.2.2 010
- Sun JRE (Linux Production Release) 1.3.0 .0 02
- Sun JRE (Linux Production Release) 1.3.0 .0 01
- Sun JRE (Windows Production Release) 1.3.0
- Sun JRE (Windows Production Release) 1.2.2 010
- Sun JRE (Windows Production Release) 1.1.8 007
- Sun JRE (Windows Production Release) 1.1.8
- Sun JRE (Windows Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.3.0 .0 04
- Sun JRE (Linux Production Release) 1.2.2 011
- Sun JRE (Linux Production Release) 1.2.2 003
- Sun JRE (Solaris Production Release) 1.3.1 20
- Sun JRE (Windows Production Release) 1.3.1 20
- Sun SDK (Windows Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.1.8 13
- Sun JRE (Solaris Production Release) 1.1.8
- Sun JRE (Solaris Production Release) 1.2.2 010
- Sun JRE (Solaris Production Release) 1.2.2
- Sun SDK (Solaris Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.3.1 02
- Sun JRE (Linux Production Release) 1.4.2 07
- Sun SDK (Linux Production Release) 1.3.1 02
- Apple Mac OS X Server 10.4.9
- Sun SDK (Linux Production Release) 1.2.2 010
- Sun JRE (Windows Production Release) 1.2.2 015
- Sun JRE (Windows Production Release) 1.4.0 .0 04
- Sun JRE (Solaris Production Release) 1.4.0 .0 04
- Sun SDK (Solaris Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.4.0 .0 04
- Sun SDK (Solaris Production Release) 1.3.0 02
- Sun JRE (Solaris Production Release) 1.3.1 15
- Sun JRE (Windows Production Release) 1.3.1 15
- Sun JRE (Solaris Production Release) 1.3.1 16
- Sun JRE (Solaris Production Release) 1.3.1 17
- Sun JRE (Windows Production Release) 1.3.0 .0 04
- Sun JRE (Windows Production Release) 1.3.1 17
- Sun SDK (Solaris Production Release) 1.4.0 .0 4
- Sun SDK (Windows Production Release) 1.4.0 .0 4
- Sun SDK (Windows Production Release) 1.2.2 015
- Sun JRE (Solaris Production Release) 1.3.1 19
- Sun SDK (Linux Production Release) 1.2.2 015
- Sun JRE (Windows Production Release) 1.3.0 01
- Sun JRE (Solaris Production Release) 1.3.1 01A
- Sun SDK (Solaris Production Release) 1.2.2 11
- Sun JRE (Linux Production Release) 1.3.1 04
- SuSE openSUSE 11.1
- Avaya Proactive Contact 3.0
- Red Hat Enterprise Linux Desktop 5 Client
- Red Hat Enterprise Linux Supplementary 5 Server
- Sun SDK (Solaris Production Release) 1.3.1 22
- Sun SDK (Linux Production Release) 1.4.0 .0 4
- VMWare VirtualCenter 2.0.2 Update 3
- VMWare VirtualCenter 2.0.2 Update 4
- VMWare VirtualCenter 2.5 Update 5
- VMWare VirtualCenter 2.0.2 Update 5
- Apple Mac OS X 10.5.2
- Apple Mac OS X Server 10.5.2
- Red Hat Red Hat Network Satellite (for RHEL 4) 5.1
- SuSE openSUSE 10.3
- Sun JRE (Windows Production Release) 1.1.8 009
- Sun JRE (Linux Production Release) 1.3.1 03
- Sun JRE (Solaris Production Release) 1.1.8 009
- Sun JRE (Solaris Production Release) 1.2.2 011
- Sun JRE (Solaris Production Release) 1.3.1 03
- Sun JRE (Windows Production Release) 1.2.2 011
- Sun JRE (Windows Production Release) 1.3.1 03
- Sun SDK (Linux Production Release) 1.2.2 011
- Sun SDK (Linux Production Release) 1.3.1 03
- Sun SDK (Windows Production Release) 1.2.2 011
- Sun SDK (Windows Production Release) 1.3.1 03
- Sun SDK (Solaris Production Release) 1.3.1 03
- Sun SDK (Solaris Production Release) 1.2.2 011
- HP HP-UX B.11.31
- Sun JRE (Linux Production Release) 1.2.2 015
- VMWare ESX Server 3.5 ESX350-200904401-BG
- VMWare ESXi Server 4.0
- VMWare vCenter 4.0
- Mandriva Enterprise Server 5 X86 64
- SuSE SUSE Linux Enterprise Desktop 11
- Sun SDK (Solaris Production Release) 1.3.1 20
- Nortel Networks Enterprise VoIP TM-CS1000
- Sun SDK (Solaris Production Release) 1.4.2 18
- Sun JDK (Linux Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.4.2 16
- Sun JRE (Solaris Production Release) 1.4.2 16
- Sun JRE (Windows Production Release) 1.4.2 16
- Sun JDK (Linux Production Release) 1.5.0 13
- Sun JRE (Linux Production Release) 1.5.0 12
- Sun JRE (Linux Production Release) 1.5.0 13
- Sun JDK (Linux Production Release) 1.6.0 03
- Apple Mac OS X 10.4.1
- Sun JRE (Linux Production Release) 1.6.0 03
- SuSE openSUSE 11.0
- Sun JRE (Solaris Production Release) 1.4.2 05
- Sun SDK (Solaris Production Release) 1.4.2 05
- Sun JRE (Linux Production Release) 1.2.2 007
- Sun SDK (Windows Production Release) 1.4.2 05
- Sun JRE (Windows Production Release) 1.3.1 01A
- Sun SDK (Windows Production Release) 1.3.1 01A
- Sun JDK (Linux Production Release) 1.5.0 06
- Sun JRE (Windows Production Release) 1.3.0 .0 05
- Sun JRE (Windows Production Release) 1.1.8 008
- Sun JRE (Solaris Production Release) 1.3.1 01
- Sun SDK (Solaris Production Release) 1.3.1 01
- Sun SDK (Solaris Production Release) 1.3.0 05
- Sun JRE (Solaris Production Release) 1.3.0 .0 05
- Sun JRE (Solaris Production Release) 1.1.8 14
- Sun SDK (Linux Production Release) 1.3.1 01
- Sun JRE (Linux Production Release) 1.3.1 01
- Sun JRE (Windows Production Release) 1.3.1 16
- Sun SDK (Linux Production Release) 1.3.0 05
- Apple Mac OS X 10.4.8
- Sun SDK (Windows Production Release) 1.2.2 012
- Sun JRE (Linux Production Release) 1.4.0
- Sun SDK (Linux Production Release) 1.4.0
- Sun SDK (Windows Production Release) 1.4.0
- Sun JRE (Windows Production Release) 1.4.0
- Sun SDK (Solaris Production Release) 1.4.0
- Sun JRE (Solaris Production Release) 1.4.0
- Sun JRE (Linux Production Release) 1.5.0 08
- Sun JRE (Linux Production Release) 1.5.0 09
- Sun JRE (Linux Production Release) 1.5.0 10
- Sun JDK (Linux Production Release) 1.5.0.0 11
- Sun JRE (Linux Production Release) 1.5.0 11
- Sun SDK (Solaris Production Release) 1.3.1 20
- Sun JDK (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.3.1 20
- Sun JRE (Linux Production Release) 1.5.0 17
- Sun JRE (Solaris Production Release) 1.4.2 19
- Sun JRE (Windows Production Release) 1.4.2 19
- Sun JRE (Linux Production Release) 1.4.2 19
- Sun SDK (Windows Production Release) 1.4.1
- Sun JRE (Windows Production Release) 1.4.1
- Sun JRE (Windows Production Release) 1.4.0 .0 02
- Sun SDK (Windows Production Release) 1.4.0 .0 02
- Sun SDK (Windows Production Release) 1.3.1 05
- Sun JRE (Windows Production Release) 1.4.2 01
- Sun JRE (Windows Production Release) 1.2.2 013
- Sun SDK (Windows Production Release) 1.2.2 013
- Sun JRE (Solaris Production Release) 1.4.1
- Sun SDK (Solaris Production Release) 1.4.1
- Sun SDK (Solaris Production Release) 1.4.0 .0 02
- Sun JRE (Solaris Production Release) 1.4.0 .0 02
- HP Serviceguard Manager A.05.00
- HP Serviceguard Manager A.05.01
- HP Serviceguard Manager A.05.02
- Sun JRE (Solaris Production Release) 1.2.2 013
- Sun JRE (Linux Production Release) 1.2.2 013
- Sun SDK (Linux Production Release) 1.2.2 13
- Sun SDK (Linux Production Release) 1.3.1 05
- Sun JRE (Linux Production Release) 1.3.1 05
- Sun JRE (Linux Production Release) 1.4.0 .0 02
- VMWare ESX Server 3.5 ESX350-200910401-SG
- Sun SDK (Linux Production Release) 1.4.1
- Sun JRE (Linux Production Release) 1.4.1
- Oracle JRockit R27.6.0
- VMWare ESX Server 3.5
- Sun SDK (Windows Production Release) 1.4.1 01
- Sun SDK (Windows Production Release) 1.4.0 .0 03
- Sun JRE (Windows Production Release) 1.4.0 .0 03
- Sun JRE (Windows Production Release) 1.3.1 06
- Sun JRE (Solaris Production Release) 1.3.0 04
- Sun SDK (Windows Production Release) 1.2.2 014
- Sun JRE (Windows Production Release) 1.2.2 014
- Sun JRE (Linux Production Release) 1.3.1 01A
- Sun SDK (Solaris Production Release) 1.4.1 01
- Sun JRE (Solaris Production Release) 1.4.1 01
- Sun JRE (Solaris Production Release) 1.4.0 .0 03
- Sun SDK (Solaris Production Release) 1.4.0 .0 03
- Sun JDK (Linux Production Release) 1.5.0 0 10
- Sun JRE (Solaris Production Release) 1.3.1 06
- Sun JRE (Solaris Production Release) 1.2.2 014
- Sun SDK (Solaris Production Release) 1.2.2 14
- Sun SDK (Linux Production Release) 1.4.1 01
- Sun JRE (Linux Production Release) 1.4.1 01
- Sun JRE (Linux Production Release) 1.4.0 .0 03
- Sun SDK (Linux Production Release) 1.4.0 .0 03
- Sun SDK (Linux Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.2.2 014
- Sun SDK (Linux Production Release) 1.2.2 014
- Ubuntu Ubuntu Linux 8.10 Lpia
- Ubuntu Ubuntu Linux 8.10 Powerpc
- Ubuntu Ubuntu Linux 8.10 Sparc
- Apple Mac OS X 10.4.2
- Apple Mac OS X Server 10.4.2
- Sun JRE (Linux Production Release) 1.4.2 05
- Sun JRE (Linux Production Release) 1.4.2 02
- Sun SDK (Linux Production Release) 1.4.2 02
- Sun SDK (Linux Production Release) 1.4.2
- Sun SDK (Solaris Production Release) 1.3.1 24
- Sun JRE (Solaris Production Release) 1.4.2 12
- Sun SDK (Linux Production Release) 1.4.2 19
- Avaya Interactive Response 4.0
- Sun SDK (Windows Production Release) 1.3.1 24
- Red Hat Enterprise Linux Extras 4.8.Z
- Red Hat Enterprise Linux Supplementary EUS 5.3.Z
HTTP:STC:DL:MS-OPEN-FONT-FILE - HTTP: Microsoft Windows OpenType Font File Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows handling of OpenType Font File. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- microsoft windows_server_2008 r2 (sp1:x64)
- microsoft windows_7 (sp1:x86)
- microsoft .net_framework 3.5.1
- microsoft windows_xp (sp3)
- microsoft .net_framework 4.0
- microsoft .net_framework 3.5 (sp1)
- microsoft windows_7 (sp1:x64)
- microsoft windows_server_2003 (sp2:x64)
- microsoft windows_server_2008 (sp2:x86)
- microsoft windows_rt -
- microsoft windows_8 - (-:x86)
- microsoft windows_server_2008 (sp2:itanium)
- microsoft windows_xp (sp2:professional)
- microsoft .net_framework 4.5
- microsoft windows_server_2003 (sp2:itanium)
- microsoft windows_server_2012 -
- microsoft windows_server_2008 (sp2:x64)
- microsoft windows_server_2008 r2 (sp1:itanium)
- microsoft windows_vista (sp2:x64)
- microsoft .net_framework 3.0 (sp2)
- microsoft windows_8 - (-:x64)
SHELLCODE:X86:PEXCALL-80C - SHELLCODE: X86 PexCall Encoder Routine Over HTTP-CTS
Severity: CRITICAL
Description:
This signature detects payloads being transferred over network that have been encoded using x86 PexCall Encoder routine. This may be an indication of someone trying to evade anti-virus/IPS solutions and possibly drop malicious code.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
HTTP:MISC:MS-XML-SIG-VAL-DOS - HTTP: Microsoft .NET Framework XML Signature Validation Entity Expansion Denial of Service
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft .NET Framework. A successful attack can result in a denial-of-service condition.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- microsoft .net_framework 2.0 (sp2)
- microsoft .net_framework 3.5.1
- microsoft .net_framework 4.5
- microsoft .net_framework 4.0
- microsoft .net_framework 3.5 (sp1)
HTTP:STC:DL:VBA-MEM-CORRUPT - HTTP: Microsoft Visual Basic for Applications Stack Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft Visual Basic for Applications Library. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004, srx-11.4
References:
Affected Products:
- Microsoft Visual Basic for Applications
- Microsoft Office XP
- Microsoft Visual Basic for Applications SDK 6.0
- Microsoft Office XP SP3
- Microsoft Office 2003 SP1
- Microsoft Office 2003 SP2
- Microsoft Office 2007 SP1
- Microsoft Office XP SP1
- Microsoft Office 2003 SP3
- IBM CATIA V5 Release 18
- IBM CATIA V5 Release 18
- Microsoft Office 2007 SP2
- Microsoft Office 2007
- Microsoft Office XP SP2
- Microsoft Office 2003
- IBM CATIA V5 Release 19
HTTP:STC:IE:AUTH-REFLECTION - HTTP: Microsoft Internet Explorer and HTTP Services Authentication Reflection Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known authentication reflection vulnerability against Microsoft Internet Explorer and Windows HTTP services. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141414, idp-5.1.110150921, isg-3.5.141421, idp-5.1.110151004
References:
Affected Products:
- Microsoft Windows XP Professional
- Microsoft Windows XP Home
- Microsoft Windows XP Embedded
- Microsoft Internet Explorer 5.0.1
- Microsoft Windows Server 2003 x64 SP2
- Microsoft Internet Explorer 5.0.1 SP2
- Microsoft Windows Vista x64 Edition SP1
- Microsoft Windows XP Embedded SP1
- Microsoft Windows Server 2008 Datacenter Edition
- Microsoft Windows Server 2008 Enterprise Edition
- Microsoft Windows Server 2008 Standard Edition
- Microsoft Windows Vista Business SP1
- Microsoft Windows Vista Home Basic SP1
- Microsoft Windows Vista Home Premium SP1
- Microsoft Windows Vista Enterprise SP1
- Microsoft Windows Vista Ultimate SP1
- Microsoft Windows Vista Business 64-bit edition SP1
- Microsoft Windows Vista Enterprise 64-bit edition SP1
- Microsoft Windows Vista Home Basic 64-bit edition SP1
- Microsoft Windows Vista Home Premium 64-bit edition SP1
- Microsoft Windows Vista Ultimate 64-bit edition SP1
- Microsoft Windows Server 2003 x64 SP1
- Microsoft Windows Vista x64 Edition
- Microsoft Windows Server 2003 Web Edition SP2
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Server 2003 Itanium
- Microsoft Windows Server 2003 Itanium SP1
- Microsoft Windows Server 2003 Itanium SP2
- Microsoft Windows Server 2003 Datacenter x64 Edition SP2
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft Windows Server 2003 Standard Edition SP2
- Microsoft Windows XP Tablet PC Edition SP1
- Microsoft Internet Explorer 5.0.1 SP3
- Microsoft Windows Server 2003 Terminal Services
- Microsoft Windows 2000 Professional
- Avaya Messaging Application Server
- Microsoft Windows 2000 Professional SP1
- Avaya Messaging Application Server MM 3.1
- Microsoft Internet Explorer 5.0.1 SP4
- Microsoft Windows XP Media Center Edition
- Microsoft Windows XP Tablet PC Edition
- Avaya Messaging Application Server MM 1.1
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Microsoft Windows XP 64-bit Edition
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Professional SP1
- Microsoft Windows XP Tablet PC Edition SP3
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Media Center Edition SP3
- Microsoft Windows XP Home SP3
- Microsoft Windows Server 2003 Datacenter Edition SP1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition SP1
- Microsoft Windows Server 2003 Standard Edition SP1
- Microsoft Windows Server 2003 Web Edition SP1
- Microsoft Windows 2000 Professional SP4
- Microsoft Windows Server 2003 Enterprise Edition
- Microsoft Windows Server 2003 Datacenter Edition
- Microsoft Windows Server 2003 Web Edition
- Microsoft Windows Server 2003 Enterprise Edition Itanium
- Microsoft Windows Server 2003 Datacenter Edition Itanium
- Microsoft Internet Explorer 5.0.1 SP1
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows XP 64-bit Edition SP1
- Microsoft Internet Explorer 7.0
- Microsoft Windows XP Tablet PC Edition SP2
- Microsoft Windows XP Embedded SP2
- Microsoft Windows XP Embedded SP3
- Nortel Networks CallPilot 703T
- Nortel Networks CallPilot 201I
- Microsoft Internet Explorer 5.0.1 For Windows 2000
- Microsoft Windows Vista Home Basic
- Microsoft Windows Server 2003 Datacenter Edition SP1 Beta 1
- Nortel Networks Contact Center
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 SP2
- Avaya Messaging Application Server MM 2.0
- Microsoft Internet Explorer 8
- Microsoft Windows XP Home SP2
- Microsoft Windows XP Professional SP2
- Microsoft Windows XP Media Center Edition SP1
- Microsoft Windows XP Media Center Edition SP2
- Microsoft Internet Explorer 6.0
- Microsoft Windows Vista SP1
- Nortel Networks CallPilot 1005R
- Nortel Networks CallPilot 600R
- Microsoft Windows Vista Ultimate
- Microsoft Windows Vista Home Premium
- Nortel Networks CallPilot 1002Rp
- Microsoft Windows Vista Business
- Microsoft Windows Vista Enterprise
- Microsoft Windows Server 2003 Standard Edition
- Avaya Messaging Application Server MM 3.0
- Microsoft Windows Server 2003 Standard x64 Edition
- Nortel Networks Contact Center Multimedia
- Nortel Networks Contact Center Manager
- Microsoft Windows Server 2003 Datacenter x64 Edition
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Vista Business 64-bit edition
- Microsoft Windows Vista Enterprise 64-bit edition
- Microsoft Windows Vista Home Basic 64-bit edition
- Microsoft Windows Vista Home Premium 64-bit edition
- Microsoft Windows Vista Ultimate 64-bit edition
- Microsoft Windows Vista
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows Server 2008 for 32-bit Systems
- Microsoft Windows Server 2008 for x64-based Systems
- Microsoft Windows Server 2008 for Itanium-based Systems
- Microsoft Windows XP