Search

Traffic File Update - September 2009

This Traffic IQ Professional update for September 2009 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for September 2009

51 Application Exploits

Adobe Acrobat and Reader Collab 'getIcon()' Remote Code Execution Vulnerability S
BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability (win_add_user) S
BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability (win_exec) S
BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability (win_shell_bind_tcp) S
BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability (win_shell_reverse_tcp) S
BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability S
BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability_1 S
EMC AlphaStor Library Manager Arbitrary Command Execution Vulnerability S
FTP FTPShell Client PASV Message Handling Buffer Overflow Vulnerability S
FTP FtpXQ Server 'ABOR' Command Denial of Service Vulnerability S
FTP Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability (win_adduser) S
FTP Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability (win_exec) S
FTP Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability (win_shell_bind_tcp) S
FTP Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability (win_shell_reverse_ord_tcp) S
FTP Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability (win_shell_reverse_tcp) S
FTP Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability S
FTP Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability_1 S
HP Web JetAdmin 6.5 Server Arbitrary Command Execution S
HTTP Adobe Shockwave 'PlayerVersion' Property Remote Buffer Overflow S
HTTP Apple iPhone and iPod touch Mobile Safari Alert Remote Buffer Overflow Vulnerability S
HTTP Apple Safari JavaScript 'eval()' Denial of Service Vulnerability S
HTTP Blind SQL Injection GET QUERY Scanner S
HTTP EasyMail Objects 'emimap4.dll' Remote Code Execution Vulnerability S
HTTP EasyMail Objects 'emmailstore.dll' Remote Buffer Overflow Vulnerability S
HTTP EasyMail Objects 'emmailstore.dll' Remote Buffer Overflow Vulnerability_1 S
HTTP Mozilla Firefox UTF-8 URL Remote Buffer Overflow Vulnerability S
HTTP NaviCOPA Web Server Source Information Disclosure Vulnerability S
HTTP PPStream 'MList.ocx' Multiple Buffer Overflow Vulnerability S
HTTP SmartVMD 'VideoMovementDetection.dll' Buffer Overflow Vulnerability S
HTTP WordPress 'wp-login.php' Admin Password Reset Security Bypass Vulnerability S
IBM Lotus Connections 'name' Cross Site Scripting Vulnerability S
Ipswitch WS_FTP Professional HTTP Server Response Format String Vulnerability S
MailEnable 'MEHTTPS.EXE' Stack-Based Buffer Overflow Vulnerability S
Media Player Classic '.mid' File Processing Integer Overflow Vulnerability S
Nokia Lotus Notes Connector 'lnresobject.dll' Remote Denial of Service S
Nokia Multimedia Player Remote Denial of Service Vulnerability S
Novell Client 'nwsetup.dll' Remote Denial of Service Vulnerability S
Novell Client 'nwsetup.dll' Remote Denial of Service Vulnerability_1 S
Novell GroupWise Client 'gxmim1.dll' Buffer Overflow Vulnerability S
Oracle Secure Backup Authentication Bypass Command Injection Vulnerability S
Quiksoft EasyMail 'AddAttachment()' Method Buffer Overflow Vulnerability S
Quiksoft EasyMail Objects Connect Method Remote Buffer Overflow S
Safenet SoftRemote IKE Service Remote Stack Overflow (win_shell_reverse_ord_tcp) S
Safenet SoftRemote IKE Service Remote Stack Overflow Vulnerability (win_exec) S
SAP MaxDB 'cons.exe' Remote Command Injection Vulnerability S
SIDVault 'simple_bind()' Function Multiple Remote Buffer Overflow S
SIP Invite Spoofing Vulnerability S
SolarWinds TFTP Server OACK Request Denial Of Service Vulnerability S
TFTP PacketTrap pt360 TFTP Server Remote Denial of Service Vulnerability S
VLC Media Player CUE File Buffer Overflow Vulnerability S
Zoom Player Pro Malformed MIDI File Integer Overflow Vulnerability S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.