Search

Traffic File Update - January 2009

This Traffic IQ Professional update for January 2009 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for January 2009

54 Application Exploits

Audacity '.aup' Project File Parsing Buffer Overflow Vulnerability S
Browse3D '.sfs' File Long Data Processing Code Execution S
Browse3D '.sfs' File Long Data Processing Denial of Service S
Cain & Abel Cisco IOS Configuration File Buffer Overflow S
Destiny Media Player '.lst' Denial of Service Vulnerability S
Destiny Media Player '.lst' Remote Stack Buffer Overflow S
Destiny Media Player '.lst' Remote Stack Buffer Overflow_1 S
Destiny Media Player '.lst' Remote Stack Buffer Overflow_2 S
Destiny Media Player Playlist Processing Denial of Service S
Destiny Media Player Playlist Processing Remote Code Execution S
Elecard MPEG Player '.m3u' File Remote Stack Buffer Overflow Vulnerability S
FTP Perception LiteServe 'USER' Command Remote Buffer Overflow S
HTTP Apache Jackrabbit 'search.jsp' Cross-Site Scripting Vulnerability S
HTTP Apache Jackrabbit 'swr.jsp' Cross-Site Scripting Vulnerability S
HTTP Apple Safari Malformed URI Remote Denial Of Service Vulnerability S
HTTP Cisco IOS Server Cross Site Scripting S
HTTP dBpowerAMP Audio Player Buffer Overflow Vulnerability S
HTTP dBpowerAMP Audio Player Buffer Overflow Vulnerability_1 S
HTTP dBpowerAMP Audio Player Buffer Overflow Vulnerability_2 S
HTTP Easy Grid Multiple Arbitrary File Overwrite Vulnerabilities S
HTTP Excel Viewer OCX ActiveX Control Multiple Remote Vulnerabilities S
HTTP Excel Viewer OCX ActiveX Control Multiple Remote Vulnerabilities_1 S
HTTP Gretech GOM Player '.asx' File Remote Stack Buffer Overflow S
HTTP Hspell GUI 'cilla.cgi' Remote Command Execution Vulnerability S
HTTP Microsoft Internet Explorer 'screen' Remote Denial of Service S
HTTP Microsoft Internet Explorer Marquee Denial of Service Vulnerability S
HTTP Mozilla Firefox 'designMode' Null Pointer Dereference Denial of Service S
HTTP Mozilla Firefox 'designMode' Null Pointer Dereference Denial of Service_1 S
HTTP Office 'Save()' Arbitrary File Overwrite Vulnerability S
HTTP Office Viewer 'Open()' Method Arbitrary Command Execution S
HTTP Office Viewer OpenWebFile() File Execution Vulnerability S
HTTP Opera Marquee Denial of Service Vulnerability S
HTTP OtsTurntables OFL File Buffer Overflow Vulnerability S
HTTP Powerpoint 'Save()' Arbitrary File Overwrite Vulnerability S
HTTP PowerPoint Viewer OpenWebFile() File Execution Vulnerability S
HTTP SeaMonkey Marquee Denial of Service Vulnerability S
HTTP Word 'Save()' Arbitrary File Overwrite Vulnerability S
HTTP Word Viewer OpenWebFile() File Execution Vulnerability S
IntelliTamper '.CAT' Catalog File Buffer Overflow Vulnerability S
Microsoft HTML Help Workshop File Handling Buffer Overflow Vulnerability S
Microsoft Windows CHM File Processing Buffer Overflow Vulnerability S
MP3 TrackMaker Remote Heap Buffer Overflow Vulnerability S
MPlayer TwinVQ Handling Stack Buffer Overflow Vulnerability S
OpenOffice '.doc' File Remote Denial of Service Vulnerability S
Sun Java System Identity Manager 'cntry' parameter HTML Injection S
Sun Java System Identity Manager 'helpUrl' Parameter Frame Injection S
Sun Java System Identity Manager 'lang' Parameter Cross-Site Scripting S
Sun Java System Identity Manager 'resultsForm' Parameter Cross-Site Scripting S
Triologic Media Player Heap Buffer Overflow Vulnerability S
VUPlayer '.asx' Playlist File Buffer Overflow Vulnerability S
VUPlayer '.asx' Playlist File Buffer Overflow Vulnerability_1 S
VUPlayer .pls File Line Buffer Overflow Vulnerability S
Winamp AIFF Processing Buffer Overflow Vulnerability S
Winamp MP3 File Parsing Buffer Overflow Vulnerability S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.