Search

Traffic File Update - June 2010

This Traffic IQ Professional update for June 2010 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for June 2010

46 Application Exploits

Adobe Acrobat and Reader CoolType Typography Engine Remote DoS S
Adobe InDesign CS3 INDD File Handling Buffer Overflow Vulnerability S
Adobe Photoshop CS4 Extended ASL File Remote Buffer Overflow Vulnerability S
Adobe Photoshop CS4 Extended GRD File Remote Buffer Overflow Vulnerability S
Adobe SVG Viewer Circle Transform Remote Code Execution Vulnerability S
Chrome Engine 4 Denial Of Service Vulnerability S
HP OpenView NNM getnnmdata.exe CGI Invalid ICount Remote Code Execution Vulnerability S
HP OpenView NNM getnnmdata.exe CGI Invalid MaxAge Remote Code Execution Vulnerability S
HTTP Axis Media Controller 'AxisMediaControlEmb.dll' Remote Code Execution S
HTTP CommuniCrypt Mail 1.16 SMTP ActiveX Stack Buffer Overflow S
HTTP EvoCam Web Server GET Request Buffer Overflow Vulnerability (3.6.6) S
HTTP EvoCam Web Server GET Request Buffer Overflow Vulnerability (3.6.7) S
HTTP Microsoft IE 'mshtml.dll' Remote Information Disclosure Vulnerability S
HTTP Microsoft IE CSS 'expression' Remote Denial of Service Vulnerability S
HTTP Motorola SB5101 Haxorware Denial Of Service Vulnerability S
HTTP Motorola SB5101 Haxorware Denial Of Service Vulnerability_1 S
HTTP Mozilla Firefox Error Handling Information Disclosure Vulnerability S
HTTP Trend Micro InterScan Web Security Virtual Appliance CSRF Vulnerability S
HTTP Trend Micro InterScan Web Security Virtual Appliance CSRF Vulnerability_1 S
Kingsoft Writer '.doc' File Stack Buffer Overflow Vulnerability S
Microsoft Help and Support Center Cross Site Scripting Vulnerability S
Microsoft PowerPoint Viewer TextBytesAtom Stack Overflow MS10-004 (gen_shell_bind_tcp) S
Microsoft PowerPoint Viewer TextBytesAtom Stack Overflow MS10-004 (gen_shell_reverse_tcp) S
Microsoft PowerPoint Viewer TextBytesAtom Stack Overflow MS10-004 (win_exec) S
Microsoft PowerPoint Viewer TextBytesAtom Stack Overflow MS10-004(win_shell_reverse_ord_tcp) S
Orbital Viewer '.ORB' File Stack Based Buffer Overflow Vulnerability S
Orbital Viewer '.ov' File Stack Based Buffer Overflow Vulnerability S
Pointdev IDEAL Migration & Administration .ipj Buffer Overflow (gen_shell_reverse_tcp) S
Pointdev IDEAL Migration & Administration .ipj Buffer Overflow (win_exec) S
Pointdev IDEAL Migration & Administration .ipj Buffer Overflow (win_shell_bind) S
Pointdev IDEAL Migration & Administration .ipj Buffer Overflow (win_shell_bind_tcp) S
Pointdev IDEAL Migration & Administration .ipj Buffer Overflow (win_shell_reverse_ord_tcp) S
S.O.M.P.L. Player M3U Playlist Buffer Overflow (win_exec) S
S.O.M.P.L. Player M3U Playlist Buffer Overflow (win_shell_bind_tcp) S
S.O.M.P.L. Player M3U Playlist Buffer Overflow (win_shell_reverse_ord_tcp) S
S.O.M.P.L. Player M3U Playlist Buffer Overflow (win_shell_reverse_tcp) S
S.O.M.P.L. Player M3U Playlist Buffer Overflow S
TFTP SolarWinds Server Write Request Denial Of Service Vulnerability S
Trident Software PowerZip ZIP Archive Stack Buffer Overflow Vulnerability S
UltraISO 'MDF' File Parsing Buffer Overflow Vulnerability S
UltraISO 'MDS' File Parsing Buffer Overflow Vulnerability S
VLC Media Player Multiple Media File Formats Buffer Overflow Vulnerability S
Wincalc '.num' File Parsing Remote Buffer Overflow Vulnerability S
WM Downloader '.m3u' File Remote Stack Buffer Overflow Vulnerability S
XnView MBM File Remote Heap Buffer Overflow Vulnerability S
XnView MBM File Remote Heap Buffer Overflow Vulnerability_1 S

5 Evasions

Evasion HTML base64 double_pad (for CommuniCrypt Mail 1.16 Buffer Overflow) S
Evasion HTML javascript escape (for CommuniCrypt Mail 1.16 Buffer Overflow) S
Evasion HTTP chunked (for CommuniCrypt Mail 1.16 Buffer Overflow) S
Evasion HTTP Header Folding (for CommuniCrypt Mail 1.16 Buffer Overflow) S
Evasion HTTP junk headers (for CommuniCrypt Mail 1.16 Buffer Overflow) S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.