Search

Traffic File Update - January 2011

This Traffic IQ Professional update for January 2011 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for January 2011

44 Application Exploits

Adobe Reader 9.4 Remote Memory Corruption Vulnerability S
Automated Solutions Modbus & TCP OPC Server Heap Corruption Vulnerability (SCADA) S
Foxit Reader Title Parsing Buffer Overflow (debug_trap) S
Foxit Reader Title Parsing Buffer Overflow (win_exec) S
Foxit Reader Title Parsing Buffer Overflow (win_shell_bind_tcp) S
Foxit Reader Title Parsing Buffer Overflow (win_shell_reverse_ord_tcp) S
Foxit Reader Title Parsing Buffer Overflow (win_shell_reverse_tcp) S
HP Photo Creative 'ContentMan.dll' Buffer Overflow Vulnerability S
HTTP Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting S
HTTP Ecava IntegraXor Remote Stack-based Buffer Overflow Vulnerability S
HTTP Eclipse IDE Help Component 'content.jsp' Cross Site Scripting S
HTTP Eclipse IDE Help Component 'index.jsp' Cross Site Scripting S
HTTP Newv SmartClient 'DelFile()' Vulnerability S
HTTP Newv SmartClient 'RunCommand()' Vulnerability S
HTTP WordPress BezahlCode Generator 'gen_name' Cross Site Scripting S
HTTP WordPress FCChat Widget Plugin 'path' Cross Site Scripting S
HTTP WordPress Featured Content Plugin 'param' Cross-Site Scripting S
KingView Heap Based Buffer Overflow Vulnerability (SCADA) S
Macro Express Pro MXE File Processing Buffer Overflow Vulnerability S
Microsoft Data Access Components Memory Corruption Vulnerability (MS11-002) S
Microsoft IIS Repeated Parameter Request Denial of Service_1 (MS10-065) S
Microsoft Windows CreateSizedDIBSECTION Stack Overflow (gen_debug_trap) S
Microsoft Windows CreateSizedDIBSECTION Stack Overflow (MessageBox) S
Microsoft Windows CreateSizedDIBSECTION Stack Overflow (win_exec) S
Microsoft Windows CreateSizedDIBSECTION Stack Overflow (win_shell_bind_tcp) S
Microsoft Windows CreateSizedDIBSECTION Stack Overflow (win_shell_reverse_ord_tcp) S
Microsoft Windows CreateSizedDIBSECTION Stack Overflow (win_shell_reverse_tcp) S
Microsoft Windows Fax Cover Page Editor Double Free Memory Corruption Vulnerability S
Microsoft WMI Administration Tools Buffer Overflow (debug_trap) S
Microsoft WMI Administration Tools Buffer Overflow (win_exec) S
Microsoft WMI Administration Tools Buffer Overflow (win_shell_bind_tcp) S
Microsoft WMI Administration Tools Buffer Overflow (win_shell_reverse_ord_tcp) S
Microsoft WMI Administration Tools Buffer Overflow (win_shell_reverse_tcp) S
Music Animation Machine MIDI Player MAMX File Parsing Buffer Overflow S
Novell iPrint Client 'GetDriverSettings()' Buffer Overflow Vulnerability S
Oracle Document Capture CVE-2010-3591 'Actbar2.ocx' Remote Vulnerability S
Oracle Document Capture CVE-2010-3591 'empop3.dll' Remote Vulnerability S
Oracle Document Capture NCSECWLib Control Remote Vulnerabilities S
Oracle Document Capture NCSECWLib Control Remote Vulnerabilities_1 S
Real Networks RealPlayer SP 'RecordClip' Remote Code Execution S
SAP Crystal Reports 2008 Directory Traversal Vulnerability S
SMTP A-V Tronics InetServ SMTP Denial of Service Vulnerability S
SolarFTP 'PASV' Command Remote Buffer Overflow Vulnerability U
Winlog Pro Malformed Packet Stack Buffer Overflow Vulnerability S

6 Evasions

Evasion HTML base64 double_pad (for CVE-2010-4588) S
Evasion HTML javascript escape (for CVE-2010-4588) S
Evasion HTTP chunked (for CVE-2010-4588) S
Evasion HTTP gzip compression (for CVE-2010-4588) S
Evasion HTTP Header Folding (for CVE-2010-4588) S
Evasion HTTP junk headers (for CVE-2010-4588) S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.