Search

Traffic File Update - August 2011

This Traffic IQ Professional update for August 2011 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for August 2011

47 Application Exploits

Acoustica Mixcraft '.mxc' File Remote Denial of Service Vulnerability S
Adobe Photoshop '.GIF' File Remote Memory Corruption Vulnerability S
DVD X Player PLF File Buffer Overflow Vulnerability S
FTP ActFax FTP Server RETR Command Remote Overflow S
FTP ActFax Server 'USER' Command Vulnerability (gen_debug_trap) S
FTP ActFax Server 'USER' Command Vulnerability (MessageBox) S
FTP ActFax Server 'USER' Command Vulnerability (win_exec) S
FTP ActFax Server 'USER' Command Vulnerability (win_shell_bind_tcp) S
FTP ActFax Server 'USER' Command Vulnerability (win_shell_reverse_ord_tcp) S
FTP ActFax Server 'USER' Command Vulnerability (win_shell_reverse_tcp) S
FTP ActFax Server 'USER' Command Vulnerability (win_speak_pwned) S
FTP BisonFTP Server Remote Buffer Overflow Vulnerability S
FTP Freefloat FTP Server 'ACCL' Command Buffer Overflow Vulnerability S
FTP Freefloat FTP Server 'ALLO' Command Buffer Overflow Vulnerability S
FTP Freefloat FTP Server 'DELE' Command Buffer Overflow Vulnerability S
FTP Freefloat FTP Server 'REST' Command Buffer Overflow Vulnerability S
FTP Freefloat FTP Server 'REST' Vulnerability (MessageBox) S
FTP Freefloat FTP Server 'REST' Vulnerability (win_exec) S
FTP Freefloat FTP Server 'REST' Vulnerability (win_shell_bind_tcp) S
FTP Freefloat FTP Server 'REST' Vulnerability (win_shell_reverse_ord_tcp) S
FTP Freefloat FTP Server 'REST' Vulnerability (win_shell_reverse_tcp) S
HTTP Adobe ColdFusion 'name' Cross-Site Scripting Vulnerability S
HTTP F-Secure Gadget Resource Handler 'initialize()' Buffer Overflow S
HTTP IBM Open Admin Tool Multiple Cross Site Scripting Vulnerability S
HTTP Mongoose PUT Request Buffer Overflow CVE-2011-2900 Vulnerability S
HTTP StudioLine Photo Basic 'NMSDVDXU.dll' File Overwrite Vulnerability S
HTTP SurgeFTP Multiple Cross Site Scripting Vulnerabilities S
HTTP SurgeFTP Multiple Cross Site Scripting Vulnerabilities_1 S
HTTP SurgeFTP Multiple Cross Site Scripting Vulnerabilities_2 S
HTTP SurgeFTP Multiple Cross Site Scripting Vulnerabilities_3 S
HTTP TeeChart Pro AddSeries() Method Overflow (debug_trap) S
HTTP TeeChart Pro AddSeries() Method Overflow (MessageBox) S
HTTP TeeChart Pro AddSeries() Method Overflow (win_exec) S
HTTP TeeChart Pro AddSeries() Method Overflow (win_shell_bind_tcp) S
HTTP TeeChart Pro AddSeries() Method Overflow (win_shell_reverse_ord_tcp) S
HTTP TeeChart Pro AddSeries() Method Overflow (win_shell_reverse_tcp) S
HTTP ThreeDify Designer 'cmdSave()' Insecure Method Vulnerability S
HTTP ThreeDify Designer ActiveSolid.dll 'cmdExport()' Vulnerability S
HTTP ThreeDify Designer ActiveSolid.dll 'cmdImport()' Vulnerability S
HTTP ThreeDify Designer ActiveSolid.dll 'cmdOpen()' Vulnerability S
HTTP ThreeDify Designer ActiveSolid.dll 'cmdSave()' Vulnerability S
HTTP WordPress WP e-Commerce Plugin 'cart_messages[]' XSS Vulnerability S
MapServer Map File Double Free Remote Denial of Service Vulnerability S
Microsoft Excel Buffer Overflow CVE-2011-1276 Vulnerability (MS11-045) S
Microsoft Visual Studio Report Viewer Control Multiple XSS Vulnerabilities (MS11-067) S
TFTP CiscoKits CCNA TFTP 'Read' Command Directory Traversal Vulnerability S
TFTP CiscoKits CCNA TFTP Write Command Remote DoS Vulnerability S

4 Evasions

Evasion HTML javascript escape (for TeeChart Pro) S
Evasion HTTP chunked (for TeeChart Pro) S
Evasion HTTP Header Folding (for TeeChart Pro) S
Evasion HTTP junk headers (for TeeChart Pro) S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.