Search

Traffic File Update - June 2011

This Traffic IQ Professional update for June 2011 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for June 2011

48 Application Exploits

Adobe Reader and Acrobat Memory Corruption Vulnerability S
eZip Wizard Zip File Buffer Overflow Vulnerability (gen_shell_bind_tcp) S
eZip Wizard Zip File Buffer Overflow Vulnerability (gen_shell_reverse_tcp) S
eZip Wizard Zip File Buffer Overflow Vulnerability (MessageBox) S
eZip Wizard Zip File Buffer Overflow Vulnerability (win_exec) S
Golden FTP Server PASS Command Vulnerability (MessageBox) S
Golden FTP Server PASS Command Vulnerability (win_exec) S
Golden FTP Server PASS Command Vulnerability (win_shell_bind_tcp) S
Golden FTP Server PASS Command Vulnerability (win_shell_reverse_ord_tcp) S
Golden FTP Server PASS Command Vulnerability (win_shell_reverse_tcp) S
HP OpenView Storage Data Protector Code Execution Vulnerability S
HTTP Black Ice Fax Voice ActiveX Control Remote Code Execution Vulnerability S
HTTP Easewe FTP OCX CreateLocalFile() Insecure Method Vulnerability S
HTTP Easewe FTP OCX CreateLocalFolder() Insecure Method Vulnerability S
HTTP Easewe FTP OCX DeleteLocalFile() Insecure Method Vulnerability S
HTTP Easewe FTP OCX Execute() Insecure Method Vulnerability S
HTTP Easewe FTP OCX Run() Insecure Method Vulnerability S
HTTP LANSA aXes Web Terminal TN5250 'axes_default.css' XSS Vulnerability S
HTTP LEADTOOLS Imaging LEADSmtp 'SaveMessage()' Vulnerability S
HTTP Mozilla Firefox & SeaMonkey 'nsTreeRange' Dangling Pointer Vulnerability S
HTTP N-13 News 'id' and 'pid' Cross-Site Scripting Vulnerabilities S
HTTP N-13 News 'id' and 'pid' Cross-Site Scripting Vulnerabilities_1 S
HTTP Nagios 'expand' Parameter Cross Site Scripting Vulnerability S
HTTP Nagios 'expand' Parameter Cross Site Scripting Vulnerability_1 S
HTTP NetGear WNDAP350 Information Disclosure Vulnerability S
HTTP NetGear WNDAP350 Information Disclosure Vulnerability_1 S
HTTP Opera Web Browser 11.11 Denial of Service Vulnerability S
HTTP vBulletin vBExperience 'sortorder' Parameter XSS Vulnerability S
HTTP Xitami HTTP Header Remote Buffer Overflow Vulnerability S
IBM Tivoli Management Framework 'opts' Argument Buffer Overflow Vulnerability S
libmodplug 'S3M' Buffer Overflow Vulnerability (MessageBox) S
libmodplug 'S3M' Buffer Overflow Vulnerability (win_exec) S
libmodplug 'S3M' Buffer Overflow Vulnerability (win_shell_bind_tcp) S
libmodplug 'S3M' Buffer Overflow Vulnerability (win_shell_reverse_ord_tcp) S
libmodplug 'S3M' Buffer Overflow Vulnerability (win_shell_reverse_tcp) S
Microsoft Lync Server 2010 'ReachJoin.aspx' Remote Command Injection S
Microsoft Windows Media Player K-Lite Codec Pack Vulnerability S
Microsoft Word 'wdGetApplicationObject()' Remote Code Execution S
MJM Core Player 2011 .s3m Stack Buffer Overflow (gen_shell_bind_tcp) S
MJM Core Player 2011 .s3m Stack Buffer Overflow (MessageBox) S
MJM Core Player 2011 .s3m Stack Buffer Overflow (win_exec) S
Trend Micro Data Loss Prevention Directory Traversal Vulnerability S
VisiWave VWR File Parsing Vulnerability (debug_trap) S
VisiWave VWR File Parsing Vulnerability (gen_shell_bind_tcp) S
VisiWave VWR File Parsing Vulnerability (gen_shell_reverse_tcp) S
VisiWave VWR File Parsing Vulnerability (MessageBox) S
VisiWave VWR File Parsing Vulnerability (win_exec) S
VLC Media Player XSPF Playlist Integer Overflow Vulnerability S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.