Search

Traffic File Update - March 2012

This Traffic IQ Professional update for March 2012 contains the latest application exploits, threats and security evasion techniques along with technical data and high quality security rules.

Traffic IQ Professional

Traffic File Update for March 2012

43 Application Exploits

Adobe Photoshop TIFF Image Parsing Buffer Overflow Vulnerability S
ASUS Net4Switch ipswcom.dll Buffer Overflow Vulnerability (MessageBox) S
ASUS Net4Switch ipswcom.dll Buffer Overflow Vulnerability (win_exec) S
ASUS Net4Switch ipswcom.dll Buffer Overflow Vulnerability (win_shell_bind_tcp) S
ASUS Net4Switch ipswcom.dll Buffer Overflow Vulnerability (win_shell_reverse_tcp) S
Cisco Wireless-G PTZ WVC200 'PlayerPT.ocx' Vulnerability S
EMC NetWorker 'nsrexecd.exe' RPC Packet Vulnerability S
EMC NetWorker 'nsrexecd.exe' RPC Packet Vulnerability_1 S
FTP Ricoh DC Software DL-10 'USER' Command Vulnerability (MessageBox) S
FTP Ricoh DC Software DL-10 'USER' Command Vulnerability (win_exec) S
FTP Ricoh DC Software DL-10 'USER' Command Vulnerability (win_shell_bind_tcp) S
FTP Ricoh DC Software DL-10 'USER' Command Vulnerability S
HTTP at32 Reverse Proxy Multiple HTTP Header Fields Vulnerabilities S
HTTP Dell Webcam 'crazytalk4.ocx' Buffer Overflow Vulnerability S
HTTP Etano 'photo_search.php' Cross Site Scripting Vulnerability S
HTTP Etano 'photo_view.php' Cross Site Scripting Vulnerability S
HTTP Etano 'search.php' Cross Site Scripting Vulnerability S
HTTP Netmechanica NetDecision HTTP Server Denial Of Service Vulnerability S
HTTP Polycom Products Directory Traversal Vulnerability S
HTTP Tiny Server HEAD Request Remote Denial of Service Vulnerability S
IBM Personal Communications WS File Vulnerability (debug_trap) S
IBM Personal Communications WS File Vulnerability (MessageBox) S
IBM Personal Communications WS File Vulnerability (win_exec) S
IBM Personal Communications WS File Vulnerability (win_shell_bind_tcp) S
IBM Personal Communications WS File Vulnerability (win_shell_bind_tcp_xpfw) S
IBM Personal Communications WS File Vulnerability (win_shell_reverse_ord_tcp) S
IBM Personal Communications WS File Vulnerability (win_shell_reverse_tcp) S
NetDecision Multiple Directory Traversal Vulnerabilities S
NetDecision Multiple Directory Traversal Vulnerabilities_1 S
Netmechanica NetDecision Dashboard Server Information Disclosure Vulnerability S
Netmechanica NetDecision Traffic Grapher Server Information Disclosure Vulnerability S
Novell Groupwise Client CVE-2011-4189 Address Book Parsing Vulnerability S
Oreans WinLicense XML Memory Corruption Vulnerability S
Passport PC To Host '.zws' File Memory Corruption Vulnerability S
Splash PRO '.avi' File Denial of Service Vulnerability S
Symantec pcAnywhere Authentication Request Handling Vulnerability S
TrendMicro Control Manager CmdProcessor.exe Vulnerability (debug_trap) S
TrendMicro Control Manager CmdProcessor.exe Vulnerability (MessageBox) S
TrendMicro Control Manager CmdProcessor.exe Vulnerability (win_exec) S
TrendMicro Control Manager CmdProcessor.exe Vulnerability (win_shell_bind_tcp) S
TrendMicro Control Manager CmdProcessor.exe Vulnerability (win_shell_bind_tcp_xpfw) S
TrendMicro Control Manager CmdProcessor.exe Vulnerability (win_shell_reverse_ord_tcp) S
TrendMicro Control Manager CmdProcessor.exe Vulnerability (win_shell_reverse_tcp) S

5 Evasions

Evasion HTML javascript obfuscate (for OSVDB 79438) S
Evasion HTTP chunked (for OSVDB 79438) S
Evasion HTTP gzip compression (for OSVDB 79438) S
Evasion HTTP Header Folding (for OSVDB 79438) S
Evasion HTTP junk headers (for OSVDB 79438) S

3 Standard Protocol Traffic

Epson EventManager 'x-protocol-version' Denial of Service Vulnerability S
Microsoft Remote Desktop Protocol CVE-2012-0002 Vulnerability (MS12-020) S
Microsoft Remote Desktop Protocol CVE-2012-0002 Vulnerability (MS12-020)_1 S


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.