Search

Traffic File Update - March 2009

This Traffic IQ Professional update for March 2009 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for March 2009

49 Application Exploits

Adobe Acrobat and Reader Collab 'getIcon()' Remote Code Execution (win_exec) S
Adobe Acrobat and Reader Collab 'getIcon()' Remote Code Execution (win_shell_bind_tcp) S
Adobe Flash Player 'DeclareFunction2' ActionScript Tag Remote Code Execution S
Adobe Flash Player Invalid Object Reference Remote Code Execution S
Cisco IOS FTP Server Multiple Vulnerabilities S
Easy Web Password '.ewp' File Buffer Overflow Vulnerability S
eXeScope Input File processing Buffer Overflow Vulnerability S
eZip Wizard Zip File Stack Remote Buffer Overflow Vulnerability S
Foxit Reader PDF Handling Authorization Bypass Vulnerability S
Foxit Reader PDF Handling Denial Of Service S
Foxit Reader PDF Handling Remote Code Execution S
HTML SupportSoft DNA Editor Module Insecure Method Remote Code Execution S
HTTP GeoVision LiveAudio Control Remote Code Execution Vulnerability S
HTTP Google Chrome Single Thread Alert Out of Bounds Memory Access Vulnerability S
HTTP iDefense COMRaider 'write()' Arbitrary File Overwrite Vulnerability S
HTTP Imera Systems ImeraIEPlugin Arbitrary File Download Vulnerability S
HTTP JOnAS 'select' Cross-Site Scripting Vulnerability S
HTTP Mozilla Firefox Nested 'window.print()' Denial of Service Vulnerability S
HTTP Mozilla Firefox XSL Parsing 'root' XML Tag Remote Memory Corruption S
HTTP Orbit Downloader 'download()' Method Arbitrary File Delete Vulnerability S
HTTP Orbit Downloader URL Parsing Remote Buffer Overflow Vulnerability S
HTTP Orbit Downloader URL Parsing Remote Code Execution Vulnerability S
HTTP Sun Java System Messenger Express 'error' Cross-Site Scripting S
HTTP VLC Media Player Web Interface 'input' Remote Buffer Overflow S
HTTP WebSVN 'index.php' Cross-site scripting Vulnerability S
HTTP WebSVN rss.php Directory Traversal Vulnerability S
HTTP Yaws Request Headers Denial of Service Vulnerability S
Maya Studio eo-video Playlist File Remote Code Execution S
Media Commands Media File Heap Buffer Overflow Vulnerability S
Media Commands Media File Heap Buffer Overflow Vulnerability_1 S
Media Commands Media File Heap Buffer Overflow Vulnerability_2 S
Microsoft GDI+ EMF 'GpFont.SetData()' Buffer Overflow Vulnerability S
Mozilla Firefox xdg-open 'mailcap' File Remote Code Execution Vulnerability S
MultiMedia Soft 'AdjMmsEng.dll' Buffer Overflow Vulnerability S
MultiMedia Soft 'AdjMmsEng.dll' Buffer Overflow Vulnerability_1 S
MultiMedia Soft 'AdjMmsEng.dll' Buffer Overflow Vulnerability_2 S
Nokia Multimedia Player '.npl' Heap Buffer Overflow Vulnerability S
Novell eDirectory Management Console Accept-Language Buffer Overflow S
Poppler Multiple Denial of Service Vulnerabilities S
RadASM '.rap' Project File Stack-Based Buffer Overflow Vulnerability S
RainbowPlayer '.rpl' File Remote Buffer Overflow Vulnerability S
Realtek Media Player Playlist Processing Buffer Overflow Vulnerability S
Realtek Media Player Playlist Processing Buffer Overflow Vulnerability_1 S
Realtek Media Player Playlist Processing Buffer Overflow Vulnerability_2 S
Siemens Gigaset SE461 WiMAX router Request Denial of Service (SCADA) S
Telnet-FTP Server Directory Traversal Vulnerability (deldir) S
Telnet-FTP Server Directory Traversal Vulnerability (deleteFile) S
Telnet-FTP Server Remote Denial of Service Vulnerability S
WinAsm Studio '.wap' Project File Heap-Based Buffer Overflow S

2 Evasions

Evasion HTTP Headers Folding (for CVE-2009-0927) S
Evasion HTTP junk headers (for CVE-2009-0927) S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.