Search

Traffic File Update - April 2011

This Traffic IQ Professional update for April 2011 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for April 2011

53 Application Exploits

HTTP eGroupware 'test.php' Cross Site Scripting Vulnerability S
HTTP eyeOS Cross Site Scripting Vulnerability S
HTTP eyeOS Information Disclosure Vulnerability S
HTTP Gesytec GmbH ElonFmt 'GetItem1()' Method Buffer Overflow Vulnerability S
HTTP RealNetworks GameHouse InstallerDlg.dll Control 'copydocument' Vulnerability S
HTTP RealNetworks GameHouse InstallerDlg.dll Control 'createshortcut' Vulnerability S
HTTP RealNetworks GameHouse InstallerDlg.dll Control 'exec' Vulnerability S
HTTP RealNetworks GameHouse InstallerDlg.dll Control 'execlow' Vulnerability S
HTTP RealNetworks GameHouse InstallerDlg.dll Control 'shellexec' Vulnerability S
HTTP RealNetworks GameHouse InstallerDlg.dll Control 'shellexec' Vulnerability_1 S
HTTP RealNetworks GameHouse InstallerDlg.dll Control 'shellexecrunas' Vulnerability S
HTTP THOMSON TG585v7 Wireless Router 'url' Parameter Cross-Site Scripting S
IDEAL Administration 2009 Buffer Overflow (debug_trap) S
IDEAL Administration 2009 Buffer Overflow (gen_shell_bind_tcp) S
IDEAL Administration 2009 Buffer Overflow (gen_shell_reverse_tcp) S
IDEAL Administration 2009 Buffer Overflow (MessageBox) S
IDEAL Administration 2009 Buffer Overflow (win_exec) S
IDEAL Administration 2009 Buffer Overflow (win_shell_reverse_ord_tcp) S
IrfanView '.ico' File Denial of Service Vulnerability S
IrfanView '.ico' File Denial of Service Vulnerability_1 S
Media Player Classic '.ogg' File Remote DoS Vulnerability S
Microsoft Host Integration Server Multiple Vulnerabilities S
Microsoft Host Integration Server Multiple Vulnerabilities_1 S
Microsoft Host Integration Server Multiple Vulnerabilities_10 S
Microsoft Host Integration Server Multiple Vulnerabilities_11 S
Microsoft Host Integration Server Multiple Vulnerabilities_12 S
Microsoft Host Integration Server Multiple Vulnerabilities_2 S
Microsoft Host Integration Server Multiple Vulnerabilities_3 S
Microsoft Host Integration Server Multiple Vulnerabilities_4 S
Microsoft Host Integration Server Multiple Vulnerabilities_5 S
Microsoft Host Integration Server Multiple Vulnerabilities_6 S
Microsoft Host Integration Server Multiple Vulnerabilities_7 S
Microsoft Host Integration Server Multiple Vulnerabilities_8 S
Microsoft Host Integration Server Multiple Vulnerabilities_9 S
Microsoft HTML Help '.chm' File Stack Buffer Overflow Vulnerability S
Microsoft Reader LIT File Processing Multiple Vulnerabilities S
Microsoft Reader LIT File Processing Multiple Vulnerabilities_1 S
Microsoft Reader LIT File Processing Multiple Vulnerabilities_2 S
Microsoft Reader LIT File Processing Multiple Vulnerabilities_3 S
Microsoft Reader LIT File Processing Multiple Vulnerabilities_4 S
Microsoft Windows Media Player '.avi' File Buffer Overflow Vulnerability S
Microsoft Windows Media Player '.ogg' File Remote DoS Vulnerability S
MoviePlay '.avi' File Buffer Overflow Vulnerability S
RealNetworks GameHouse InstallerDlg.dll Control 'createvistatasklow' Vulnerability S
RealPlayer '.avi' File Remote Buffer Overflow Vulnerability S
VLC Media Player AMV File Buffer Overflow Vulnerability (debug_trap) S
VLC Media Player AMV File Buffer Overflow Vulnerability (gen_shell_bind_tcp) S
VLC Media Player AMV File Buffer Overflow Vulnerability (gen_shell_reverse_tcp) S
VLC Media Player AMV File Buffer Overflow Vulnerability (MessageBox) S
VLC Media Player AMV File Buffer Overflow Vulnerability (win_exec) S
VLC Media Player AMV File Buffer Overflow Vulnerability (win_shell_reverse_ord_tcp) S
Winamp '.m3u8' File Remote Buffer Overflow Vulnerability S
Wordtrainer '.ord' File Buffer Overflow Vulnerability S

3 Evasions

Evasion HTTP chunked (for CVE-2010-3275) S
Evasion HTTP Header Folding (for CVE-2010-3275) S
Evasion HTTP junk headers (for CVE-2010-3275) S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.