Search

Traffic File Update - August 2006

This Traffic IQ Professional update for August 2006 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for August 2006

46 Application Exploits

eDirectory 8.7.3 iMonitor Remote Stack Overflow (win32_adduser) S
eDirectory 8.7.3 iMonitor Remote Stack Overflow (win32_bind) S
eDirectory 8.7.3 iMonitor Remote Stack Overflow (win32_bind_meterpreter) S
eDirectory 8.7.3 iMonitor Remote Stack Overflow (win32_reverse) S
eDirectory 8.7.3 iMonitor Remote Stack Overflow (win32_reverse_ord) S
eDirectory 8.7.3 iMonitor Remote Stack Overflow (win32_reverse_stg) S
eDirectory 8.8 iMonitor Remote Stack Overflow (win32_adduser) S
eDirectory 8.8 iMonitor Remote Stack Overflow (win32_bind) S
eDirectory 8.8 iMonitor Remote Stack Overflow (win32_bind_meterpreter) S
eDirectory 8.8 iMonitor Remote Stack Overflow (win32_exec) S
eDirectory 8.8 iMonitor Remote Stack Overflow (win32_reverse) S
eDirectory 8.8 iMonitor Remote Stack Overflow (win32_reverse_ord) S
FTP CesarFTP 0.99g Buffer Overflow (win32_bind_meterpreter) S
FTP CesarFTP 0.99g Buffer Overflow (win32_bind_stg) S
FTP CesarFTP 0.99g Buffer Overflow (win32_reverse) S
FTP CesarFTP 0.99g Buffer Overflow (win32_reverse_meterpreter) S
FTP CesarFTP 0.99g Buffer Overflow (win32_reverse_stg) S
HTTP Apache mod_auth_pgsql Multiple Format String Vulnerabilities S
HTTP COM Object Instantiation Memory Corruption Vulnerability (CAN-2005-1990) S
HTTP IE COM Object Instantiation Memory Corruption Vulnerability (MS06-021) CVE-2006-1303 S
HTTP IE Content Advisor Memory Corruption Vulnerability (CAN-2005-0555) S
HTTP IE Exception Handling Memory Corruption Vulnerability (CVE-2006-2218) S
HTTP IE HHCtrl ActiveX Control Memory Corruption Vulnerability S
HTTP IE PNG image rendering buffer overflow S
HTTP IE Position CSS Denial of Service Vulnerability S
HTTP IIS 5.1 DLL Request Denial of Service Vulnerability S
HTTP Internet Explorer Address Bar Spoofing Vulnerability (CVE-2006-1626) S
HTTP Internet Explorer Status Bar URI Spoofing S
HTTP Microsoft DXImageTransform.Microsoft.Light ActiveX Control Vulnerability S
HTTP Microsoft Internet Explorer .mht files code execution S
HTTP Microsoft Windows GDI WMF Handling Vulnerability (MS06-026) S
HTTP Mozilla Firefox Deleted Object Reference Vulnerability S
HTTP Mozilla Firefox Marquee Denial of Service S
HTTP MS Internet Explorer (HTML Tag) Memory Corruption (MS06-013) S
HTTP MS Windows Media Player Remote Code Execution (MS06-024) S
HTTP Multiple Browser Telnet URI Handler File Manipulation S
HTTP PlanetWeb long URL buffer overflow S
HTTP Windows COM object as ActiveX allows execution of code (CAN-2005-2831) S
P2P Bitcomet information exchange S
Spyware 4arcadebar (SeekItAll) toolbar download S
Spyware ABetterInternet information upload S
Spyware ABetterInternet installation S
Spyware Hotbar information download S
Spyware Hotbar information upload S
Spyware Push toolbar information search S
Spyware Searchsquire download S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.