Search

Traffic File Update - February 2011

This Traffic IQ Professional update for February 2011 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for February 2011

40 Application Exploits

AOL Desktop 9.6 '.rtx' File Remote Buffer Overflow Vulnerability S
AOL Rich Text File Processing Buffer Overflow Vulnerability S
FTP SolarFTP 'USER' Command Remote Denial of Service Vulnerability S
HTTP AoA DVD Creator 'InitLicenKeys()' Buffer Overflow Vulnerability S
HTTP AoA MP4 Converter 'InitLicenKeys()' Buffer Overflow Vulnerability S
HTTP Apache Archiva Cross Site Request Forgery Vulnerability S
HTTP Check Point Multiple Products Information Disclosure Vulnerabilities S
HTTP Check Point Multiple Products Information Disclosure Vulnerabilities_1 S
HTTP Check Point Multiple Products Information Disclosure Vulnerabilities_2 S
HTTP Check Point Multiple Products Information Disclosure Vulnerabilities_3 S
HTTP Check Point Multiple Products Information Disclosure Vulnerabilities_4 S
HTTP Check Point Multiple Products Information Disclosure Vulnerabilities_5 S
HTTP Check Point Multiple Products Information Disclosure Vulnerabilities_6 S
HTTP Edraw Office Viewer Component 'HttpPost()' Buffer Overflow Vulnerability S
HTTP Firefox 3.6.8 - 3.6.11 Interleaving document.write and appendChild Exploit S
HTTP Firefox Interleaving document.write and appendChild Denial of Service S
HTTP Firefox Memory Corruption Proof of Concept (Simplified) S
HTTP Hyleos ChemView Buffer Overflow Vulnerability (gen_debug_trap) S
HTTP Hyleos ChemView Buffer Overflow Vulnerability (MessageBox) S
HTTP Hyleos ChemView Buffer Overflow Vulnerability (win_exec) S
HTTP Hyleos ChemView Buffer Overflow Vulnerability (win_shell_bind_tcp) S
HTTP Hyleos ChemView Buffer Overflow Vulnerability (win_shell_reverse_ord_tcp) S
HTTP Hyleos ChemView Buffer Overflow Vulnerability (win_shell_reverse_tcp) S
HTTP Mozilla Firefox Buffer Overflow Vulnerability (debug_trap) S
HTTP Mozilla Firefox Buffer Overflow Vulnerability (MessageBox) S
HTTP Mozilla Firefox Buffer Overflow Vulnerability (win_exec) S
HTTP Mozilla Firefox Buffer Overflow Vulnerability (win_shell_bind_tcp) S
HTTP Mozilla Firefox Buffer Overflow Vulnerability (win_shell_bind_tcp_xpfw) S
HTTP Mozilla Firefox Buffer Overflow Vulnerability (win_shell_reverse_ord_tcp) S
HTTP Mozilla Firefox Buffer Overflow Vulnerability (win_shell_reverse_tcp) S
HTTP PDF Viewer OCX Control Buffer Overflow Vulnerability S
HTTP WordPress GD Star Rating 'wpfn' Cross Site Scripting Vulnerability S
IBM Lotus Domino 'nLDAP.exe' Remote Buffer Overflow Vulnerability S
IBM Lotus Sametime Server 'stcenter.nsf' Cross Site Scripting S
MoviePlay '.lst' File Buffer Overflow Vulnerability S
Novell iPrint Server LPD Buffer Overflow Vulnerability S
Novell NetWare XNFS 'xdrDecodeString()' Code Execution Vulnerability S
Oracle Database 'exp.exe' Parameter File Buffer Overflow Vulnerability S
TFTP Novell ZENworks Configuration Management TFTPD Remote Code Execution S
Virtuosa Phoenix Edition '.asx' File Remote Buffer Overflow Vulnerability S

8 Evasions

Evasion HTML javascript escape (for CVE-2010-0679) S
Evasion HTML javascript escape (for CVE-2010-3765) S
Evasion HTTP chunked (for CVE-2010-0679) S
Evasion HTTP chunked (for CVE-2010-3765) S
Evasion HTTP Header Folding (for CVE-2010-0679) S
Evasion HTTP Header Folding (for CVE-2010-3765) S
Evasion HTTP junk headers (for CVE-2010-0679) S
Evasion HTTP junk headers (for CVE-2010-3765) S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.