Search

Traffic File Update - April 2008

This Traffic IQ Professional update for April 2008 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for April 2008

51 Application Exploits

AlsaPlayer Vorbis Input Plug-in OGG Processing Remote Buffer Overflow S
Borland InterBase IBServer.EXE Remote Buffer Overflow S
DivX Player .SRT 'subtitle' Remote Buffer Overflow S
FTP XM Easy Personal ftp Server 'PORT' Remote Denial of Service S
FTP XM Easy Personal ftp Server 'XCWD' Remote Denial of Service S
HTTP Airspan WiMAX ProST Web Interface Authentication Bypass Vulnerability S
HTTP BigAnt IM Server GET Request Remote Buffer Overflow S
HTTP Business Objects Infoview 'cms' Parameter Cross-Site Scripting S
HTTP Chilkat 'ChilkatHttp.dll' Control Insecure Method Vulnerabilities S
HTTP Chilkat Zip SaveLastError and WriteExe Arbitrary File Overwrite Issue S
HTTP Data Dynamics ActiveBar Actbar3.OCX Control Multiple Insecure Methods S
HTTP Data Dynamics ActiveBar Actbar3.OCX Control Multiple Insecure Methods_1 S
HTTP Facebook Photo Uploader ImageUploader4.1.ocx FileMask Method DoS S
HTTP Facebook Photo Uploader ImageUploader4.1.ocx FileMask Method Remote Code Execution S
HTTP HP Software Update 'Hpufunction.dll' Insecure Method Vulnerability S
HTTP IBiz E-Banking Integrator Object WriteOFXDataFile() Insecure Method S
HTTP Interwoven WorkSite Web 'iManFile.cab' TransferCtrl Double Free Vulnerability S
HTTP Microsoft IE Header Handling Information Disclosure Vulnerability S
HTTP Microsoft Zune Software Arbitrary File Overwrite Vulnerability S
HTTP Mozilla Multiple Products Layout Engine Code Execution S
HTTP Novell eDirectory HEAD Request Handling Denial Of Service S
HTTP RealNetworks RealPlayer 'rmoc3260.dll' Control Memory Corruption S
HTTP RealNetworks RealPlayer 'rmoc3260.dll' Control Memory Corruption_1 S
HTTP RealPlayer 'rmoc3260.dll' Console Memory Corruption DoS S
HTTP RealPlayer 'rmoc3260.dll' Console Memory Corruption Remote Code Execution S
HTTP SmarterTools SmarterMail HTTP Request Handling Denial Of Service S
HTTP SubEdit Player Subtitle File Remote Buffer Overflow S
HTTP Sun Java System Messenger Express 'sid' Cross-Site Scripting S
HTTP Tumbleweed SecureTransport Control TransferFile() Buffer Overflow S
HTTP VideoLAN VLC Format String Remote Code Execution S
HTTP Watchfire AppScan (CompactSave) Insecure Method Vulnerability S
HTTP Watchfire AppScan (saveRecordedExploreToFile) Insecure Method Vulnerability S
HTTP Watchfire AppScan (SaveSession) Insecure Method Vulnerability S
IMAP Alt-N MDaemon Server FETCH Command Remote Buffer Overflow S
Ipswitch FTP Log Server Denial of Service Vulnerability S
McAfee Common Management Agent FrameworkService.exe Remote Denial of Service S
Microsoft Excel JavaScript Code Remote Denial Of Service S
Microsoft Internet Explorer XDR Prototype Hijacking Denial of Service S
Microsoft Office Components Code Execution Vulnerabilities (MS08-017) S
Microsoft Office Components Code Execution Vulnerabilities_1 S
Microsoft Office File Memory Corruption Vulnerability (MS08-016) S
Microsoft Office Web Components URL Parsing Remote Code Execution POC_1 S
Microsoft Office Web Components URL Parsing Remote Code Execution S
Microsoft VB Enterprise Edition DSR (CommandText) Buffer Overflow S
Microsoft Windows GDI Code Execution Vulnerabilities (MS08-021) S
Microsoft Works 7 'WkImgSrv.dll' Remote Code Execution S
Motorola Timbuktu Pro Multiple Denial of Service Vulnerabilities S
Nero MediaHome NMMediaServer.EXE Remote Denial of Service S
Novell iPrint Client ExecuteRequest() Remote Buffer Overflow S
Sun Java Web Start Multiple Code Execution Vulnerabilities S
Symantec Veritas Storage Foundation Administrator Service Buffer Overflow S

1 Standard Protocol Traffic

Firebird Relational Database XDR Protocol Remote Memory Corruption S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.