Search

Traffic File Update - February 2010

This Traffic IQ Professional update for February 2010 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for February 2010

55 Application Exploits

AIMP '.m3u' File Remote Stack Buffer Overflow Vulnerability S
Cisco Collaboration Server Source Code Disclosure Vulnerabilities S
Cisco Collaboration Server Source Code Disclosure Vulnerabilities_1 S
Cisco Collaboration Server Source Code Disclosure Vulnerabilities_2 S
Cisco Collaboration Server Source Code Disclosure Vulnerabilities_3 S
CounterPath X-Lite '.wav' File Buffer Overflow Vulnerability S
DigitalAmp Media File Processing Buffer Overflow Vulnerability S
FoxMediaTools FoxPlayer '.m3u' File Remote Code Execution S
FTP httpdx 'MKD' Command Directory Traversal Vulnerability S
FTP On The Go HTTP Request Processing Denial of Service Vulnerability S
FTP UplusFtp 'APPE' Remote Buffer Overflow Vulnerability S
FTP UplusFtp 'CWD' Remote Buffer Overflow Vulnerability S
FTP UplusFtp 'MKD' Remote Buffer Overflow Vulnerability S
FTP UplusFtp 'MKD' Remote Denial of Service Vulnerability S
FTP UplusFTP 'Path' Parameter Buffer Overflow Vulnerability S
HTTP APC Network Management Card Cross Site Scripting Vulnerability S
HTTP Cisco Collaboration Server 'LoginPage.jhtml' Cross Site Scripting Vulnerability S
HTTP cPanel 'failurl' Header Injection (Set-Cookie) Vulnerability S
HTTP cPanel 'failurl' Parameter Cross-Site Scripting Vulnerability S
HTTP cPanel 'failurl' Parameter Open Redirection Vulnerability S
HTTP Extreme Mobster 'login' Parameter Cross Site Scripting Vulnerability S
HTTP Google Chrome 'iframe' Information Disclosure Vulnerability S
HTTP HP System Management Homepage 'servercert' Cross Site Scripting S
HTTP Huawei HG510 Security Bypass and Cross-Site Request Forgery Vulnerabilities S
HTTP IBM Lotus Web Content Management Cross Site Scripting Vulnerability S
HTTP IntelliTamper 'defer' Attribute Handling Remote Buffer Overflow Vulnerability S
HTTP IntelliTamper 'defer' Attribute Handling Remote Buffer Overflow Vulnerability_1 S
HTTP LiteSpeed Web Server Cross-Site Request Forgery Vulnerability S
HTTP Nikira Fraud Management System 'message' Cross-Site Scripting S
HTTP Novatel Wireless MiFi Password Information Disclosure Vulnerability S
HTTP Novatel Wireless MiFi Password Information Disclosure Vulnerability_1 S
HTTP Rising Online Virus Scanner 'Scan()' Method Buffer Overflow Vulnerability S
HTTP RSA SecurID WebID Cross Site Scripting Vulnerability S
HTTP SAP BusinessObjects 'actionNavFrame.jsp' Cross Site Scripting S
HTTP SAP BusinessObjects 'display-flash.jsp' Cross Site Scripting S
HTTP SAP BusinessObjects 'docLoadUrl.jsp' Cross Site Scripting S
HTTP SAP BusinessObjects 'logonform.jsp' Cross Site Scripting S
HTTP SAP BusinessObjects 'query.jsp' Cross Site Scripting S
HTTP SAP BusinessObjects 'query.jsp' Cross Site Scripting_1 S
HTTP SAP BusinessObjects 'viewReport.jsp' Cross Site Scripting S
HTTP Windows Live Messenger 'RichUploadControlContextData' Buffer Overflow S
IBM DB2 'kuddb2' Remote Denial of Service Vulnerability S
LANDesk Management Gateway Multiple Input Validation Vulnerabilities S
MediaMonkey '.mp3' File Remote Buffer Overflow Vulnerability S
Oracle Times Ten In-Memory Database Remote Denial of Service S
RadASM '.mnu' File Buffer Overflow Vulnerability S
Sun Java System Web Server 'admin' Server Denial of Service S
Sun Java System Web Server Digest Authentication Remote Buffer Overflow S
Sun Java System Web Server WebDAV Format String Vulnerability S
Sun Java System Web Server WebDAV Remote Buffer Overflow Vulnerability S
Total Video Player '.wav' File Remote Denial of Service Vulnerability S
VKPlayer '.mid' File Processing Buffer Overflow Vulnerability S
WebKit Style Tag Remote Memory Corruption Vulnerability S
Xerox WorkCentre PJL Daemon Buffer Overflow Vulnerability S
Zeus Web Server 'SSL2_CLIENT_HELLO' Remote Buffer Overflow Vulnerability S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.