WelcomeEnterpriseSmall BusinessHome & Home OfficePartnersAbout Symantec
January 29, 2009
Symantec Endpoint Protection - Security Update 95

Description

Use the LiveUpdate feature of Symantec Endpoint Protection to download the security update.

The signature update changes specified below correspond to a new IPS engine update provided to increase threat protection within the SEP product.

Security Update 95 adds coverage for the following vulnerabilities and threats:
  • HTTP AOL Radio AmpX ActiveX BO
  • HTTP MSIE COM Object Memory Corruption
  • HTTP Suspicious Executable Image Download
  • HTTP Fake Codec Request (2)
  • HTTP MS Visual Studio ActiveX BO
  • HTTP Acrobat PDF Suspicious File Download
  • HTTP Acrobat PDF Suspicious File Download 2

Security Update 95 provides updated coverage for the following vulnerabilities and threats:
  • HTTP SCO Skunkware ViewSrc Traversal
  • HTTP ISM DLL Remote Administration
  • HTTP MS IIS SQL Hit Disclosure
  • HTTP MS IIS ASP Source Disclosure
  • HTTP MS IIS ExAir Search DoS
  • HTTP htdig File Disclosure
  • HTML WinHelp Item BO
  • HTTP bdir.htr Path Disclosure
  • HTTP MDAC Component Query BO
  • MSN Messenger Login Attempt
  • HTTP MSN Messenger Login
  • HTTP Whisker/Libwhisker Scan (1)
  • HTTP Whisker/Libwhisker Scan (2)
  • HTTP MS Media Services BO
  • HTTP IIS CMDExecution Access (1)
  • HTTP IIS Welchia WebDAV SEARCH BO (1)
  • HTTP IIS Welchia WebDAV SEARCH BO (2)
  • Nimda Worm A
  • HTTP MS FrontPage SmartHTML DoS
  • MS ASN1 Integer Overflow TCP
  • MS IIS PCT SSL Exploit Attempt
  • HTTP IIS ISAPI Printer BO
  • HTTP Anaconda Directory Traversal
  • W32 Beagle A Worm Backdoor
  • MS Win9x IE5/Telnet Heap Overflow
  • W32 Beagle B Worm Backdoor
  • HTTP IE Object Type Validation
  • HTTP Cisco VoIP DoS
  • HTTP MS FrontPage Remote Debug BO
  • HTTP MS IIS Newdsn CGI Request
  • HTTP MS IIS Showcode ASP Request
  • HTTP MS fpcount BO Attempt
  • HTTP MS IE MIME IFRAME Exec
  • HTTP MS IIS ASP DataSuffix Request
  • HTTP MS BizTalk DTA RemoteExec
  • HTTP Lotus Domino Password Bypass
  • HTTP CGI NPH Request
  • HTTP CGI Test Request
  • HTTP AltaVista DirTraversal
  • HTTP ColdFusion CFM Disclosure
  • HTTP WEBGais Remote Command Exec
  • HTTP CF GetTempDirectory Attempt
  • HTTP Novell CGI Convert Request
  • HTTP SGI InfoSearch fname Exec
  • HTTP PHP Nuke ConfigFile Request
  • SSH CRC-32 Boundary BO
  • MS SQL PacketResolution DoS
  • HTTP MS IE CHM Cross-Domain Redirect
  • HTTP MS showhelp CHM Download Attempt
  • HTTP MS IFRAME JOB Share Redirect
  • HTTP MS IE ADODB Stream SavetoFile
  • Yahoo! IM Conference Invite
  • Yahoo! IM File Transfer
  • Yahoo! IM Login
  • Yahoo! IM Activity
  • Kazaa File Request
  • P2P Gnutella File Request
  • P2P Blubster Download Setup
  • Snork DoS
  • HTML HR Align BO
  • HTTP IIS ISAPI Enumeration
  • HTTP IIS WebDAV PROPFIND
  • HTTP MS JET DB Engine DSN Hack
  • HTTP Hylafax Faxsurvey Remote PW Access
  • VNC Server Banner
  • VNC Login Success
  • VNC Login Failed
  • HTTP JJ Sample CGI Cmd Exec
  • MSRPC Mutiple Headers
  • HTTP MS GDI JPEG Integer Overflow
  • HTTP MS IE Install Engine Ctl. Heap BO
  • HTTP MS IE EXE in IMG Code Execution
  • HTTP MS IE Malf. IFRAME/EMBED BO
  • Yahoo! Ping
  • Yahoo! Conference Login
  • HTTP Crystal Rpts Form Viewer Traversal
  • HTTP MS Shell File Download Ext. Misrep.
  • HTTP MS Visual Studio RAD Support BO
  • WhenU ClockSync WeatherCast Activity
  • WhenU Installation Activity
  • WhenU Update Events
  • WhenU Request For Offers
  • WhenU SearchBar Sidefinder Activity
  • Hotbar Reports Activity
  • TopMoxie Requesting Build Files
  • Topmoxie Recoding Downloads and Offers
  • MXTarget Information Upload
  • HTTP BetterInternet Info Upload
  • HTTP BetterInternet Install Activity
  • HTTP 180Solutions Config Event
  • 180Solutions Requesting Keywords
  • 180Solutions Requesting Ads
  • 180Solutions Tracking Events
  • 180Solutions Requesting Action URL
  • 180Solutions Update
  • HTTP Euniverse FlowGoBar Config Request
  • Euniverse Flowgo Ping Request
  • HTTP Euniverse KeenValue Info Transfer
  • HTTP Euniverse Keenvalue PopUp Request
  • Euniverse Thunderdownload Installation
  • Euniverse Thunderdownload Activity
  • HTTP ISTBar Agent Activity
  • ISTBar Fav Menu Porn Site Request
  • HTTP MyWay Configuration Request
  • NetOptimizer Agent Upload
  • HTTP Cydoor Media Files Request
  • HTTP MS IE Help CTRL Local Zone Bypass
  • HTTP PHPBB URL Decode SQL Injection
  • ActiveSearch Search Activity
  • Delfin Ads Request
  • Delfin Definition File Request
  • HTTP Delfin Activity
  • HTTP Avres Activity
  • GAIN New Code Info Request
  • GAIN Communication
  • GAIN Website Visit Data Request
  • GAIN Reporting Typed URL
  • GAIN Reporting Typed URL (2)
  • GAIN Web Cookie
  • Hotbar Installation & Upgrade Activity
  • Hotbar Temp & Toolbar Disp Activity
  • Hotbar Updates Activity
  • HTTP Hotbar Info Transfer PopUp
  • Hotbar PopUp Ads Request
  • Hotbar Cookie Detected
  • Ezula Upgrade and Version Check
  • HTTP MS FrontPage dvwssr.dll Request
  • HTTP BD BugBear
  • HTTP MS Word HyperlinkExt BO
  • HTTP Windows Sharepoint Svc Spoofing
  • HTTP MS IE DHTML Edit Ctrl Attack
  • AOL IM AwayMsg BO
  • HTTP Negative Content Length
  • HTTP MS JET DB BO
  • HTTP MS Windows MSHTA Shell Execution
  • OS X Help Remote Code Execution
  • HTTP IIS HTW Cross Site Scripting
  • Outlook Express NNTP LIST Newsgroup BO
  • HTTP MS OWC Local File Disclosure
  • Skype Requesting Updates (1)
  • HTTP MS IE FTP Proto Hndlr Loc File Disc
  • HTTP MS Javaprxy DLL BO
  • Skype Requesting Updates (2)
  • HTTP Oracle SOAP Default Config Vuln
  • HTTP Oracle 9IAS PL/SQL Directory Trav.
  • HTTP Oracle 9IAS PLSQL BO
  • HTTP Cobalt RAQ Service.cgi BO
  • HTTP MS IE Sysimage File Detection
  • HTTP MS IE Local Resource Enumeration
  • Google Desktop Search Remote XSS
  • Google Toolbar About.HTML HTML Injection
  • Shoutcast Remote Format String
  • NetBIOS MS PnP QueryResConflist BO
  • HTTP MS IE Frame Cross Site Scripting
  • HTTP MS Media Player File Attr Corrupt.
  • HTTP MS IE msdds.dll Code Exec
  • HP OpenView Remote Command Exec
  • HTML Domain Name BO (PoC)
  • HTTP MS IE MSHTML.DLL CSS Handling BO
  • HTTP RealPlayer SMIL File Stack BO
  • HTTP MS IE HHCtrl ActiveX XDom Scripting
  • HTTP Acrobat ActiveX Ctrl URI Req BO
  • HTTP MS IE MMS Proto Hndlr Cmd Injection
  • HTTP MS IE Style Tag Cmt Mem Corruption
  • HTTP MS IE MData Foreign Domain Spoofing
  • AdDestroyer Activity
  • HTTP Apropos Installation Activity
  • HTTP Apropos Ad Activity
  • BargainBuddy Adv Activity
  • BargainBuddy Installation Activity
  • CometCursor Plus Download
  • CometCursor Logging Information
  • CometCursor Cursor Download
  • HTTP CommonName Activity
  • IEPlugin DLL Download Request
  • IEPlugin Activity
  • Instafinder Reporting Mistyped URL
  • Instafinder Requesting Configuration
  • HTML Domain Name BO (Milw0rm Exploit)
  • HTTP Dealhelper Downloading Data
  • E2Give AppID Registry Subkey
  • E2Give InstallFile Request
  • Elitebar Control Information Activity
  • Elitebar Update Activity
  • LOP Toolbar Update
  • HTTP LOP Toolbar Activity
  • Windupdates Mediapass Installer CLSID
  • HTTP Windupdate Mediapass Install
  • PurityScan Installation Activity
  • PurityScan Notification Activity
  • PurityScan InfoTransfer Activity
  • Slagent DLL Request
  • Slagent Registry CLSID
  • HTTP SurfSideKick Installation Activity
  • SurfSideKick AutoUpdate Activity
  • Starware Installation Activity
  • Starware Update Activity
  • VirtualBouncer Installation Activity
  • VirtualBouncer Update Activity
  • Envolo Installation Activity
  • Envolo AutoUpdate Activity
  • HTTP ShopNav Uploading Reg Info
  • SuperSpider Hijack Activity
  • WebSearch Activity
  • Websearch Reporting Log Information
  • Websearch Configuration Request
  • HTTP BookedSpace Activity
  • BookedSpace Downloading Files
  • IPInsight StubSentry Activity
  • IPInsight StubConscorr Activity
  • ZangoSearch CLSID Reg. Subkey Install
  • MedLoad Logging Activity
  • HTTP MedLoad OCX FileDownload
  • MedLoad InstallFile Download
  • HTTP IEDriver Popup Activity
  • NaviHelper Installation Activity
  • NaviHelper Update Activity
  • MS MSDTC UserAllocate BO
  • HTTP MS Lnk File FaceName BO
  • Snort BackOrifice Preprocessor BO
  • IEFeats Data Transfer
  • CWSIEFEATS Data Transfer
  • NewDotNet Redirecting Mistyped URL
  • Virtumonde Requesting DLL Files
  • HTTP Quadro Data Transfer
  • BlazeFind SetupFile Request
  • Look2ME Updates
  • WebHancer Posting Information
  • HTTP Clearsearch ControlInfo Transfer
  • HTTP CoolWebSearch Activity
  • Incredifind Redirect Activity
  • HTTP BroadcastPC Activity
  • SafeSearch Redirection Attempt
  • StatBlaster Update
  • Favoriteman Activity
  • HTTP Begin2Search Activity
  • LinkMaker Activity
  • HTTP QuickSearch Activity
  • Perfect InstallFIle Download
  • HTTP TargetSaver Update Activity
  • HTTP SideSearch Activity
  • P2PNetworking SetupFile Request
  • HTTP MS IE Dbl Backslash CHM File Exec.
  • HTTP MS IE Dbl Backslash Local Zone Exec
  • HTTP MS IE Object Element Data DoS
  • HTTP MS IE Macromedia Flash Plugin DoS
  • HTTP MS IE MSWebDVD Object DoS
  • Firefox Favicon Link Tag Code Exec
  • Kazaa Sig2Dat Protocol Code Exec
  • Yahoo! Webcam ActiveX Control BO
  • Helpexpress SetupFile Request
  • Adlogix SetupFile Request
  • HTTP IGetNet Activity
  • Webrebate Activity
  • WildMedia WinFetch Activity
  • WinMail Directory Traversal
  • HTTP SalesLogix SQL Injection
  • HTTP MSIE JavaScript OnLoad Rte CodeExec
  • HTTP Mozilla Firefox IFRAME Handling DoS
  • HTTP MS Frontpage Image Mapper BO
  • HTTP MS IE GetObject File Disclosure
  • HTTP MS IE DHTML AnchorClick Partial DoS
  • Yahoo! IM Activex yauto.dll BO
  • HTTP MS XP HCP URI Handler Abuse
  • RSA Agent Chunked Encoding Heap BO
  • RSA Agent WebRedirect BO
  • HTTP MS Windows WMF Code Exec
  • MS DirectShow AVI BO
  • HTTP GIF Netscape Ext. Malformed Heap BO
  • Computer Associates License GCR BO
  • Computer Associates License GetConfig BO
  • HTTP RealPlayer Error Msg Format String
  • Megasearchbar InstallationFile Request
  • Dotcomtoolbar Installation Files Request
  • HTTP EasyWWW Install File Request
  • 2020Search Info. Upload Request
  • 2020Search Installation File Request
  • 2020Search Configuration Request
  • Tafbar Install File Request
  • HTTP SearchPounder Info Request
  • HTTP ZSearch Installation File Request
  • HTTP MSIE CreateTextRange Code Exec
  • HTTP Sygate Policy Mgr SQL Injection
  • P2P OpenFT File Request
  • P2P Peercast Application
  • HTTP MatrixSearch Installation Request
  • HTTP MatrixSearch Activity
  • Adblock Install Download
  • Adblock Redirect Activity
  • Adblock Update Activity
  • Adroar Install Request
  • Adroar Update Activity
  • 007SPY Install Request
  • 7FASST User Tracking Activity
  • 7FASST Search Activity
  • Adbars Install Request
  • Adbars Search Activity
  • HTTP Adultlinks Install Request
  • Alexa User Info Tracking
  • Alexa Installation Request
  • HTTP Zuvio Install Request
  • HTTP Zeropopup Install Request
  • HTTP OfferAgent Install Request
  • HTTP OfferAgent Ad Popup Activity
  • RealVNC NULL Auth Bypass Attempt
  • Symantec AV Stack Overflow
  • HTTP WMP Malformed PNG Handling BO
  • HTTP MSIE MHTML URI BO
  • HTTP UCMore Install Request
  • HTTP TAFbar Install Request
  • HTTP BadBlue MFCISAPI Cmd BO
  • Alt-N WebAdmin USER Buffer Overflow
  • HTTP MSIE ITS Protocol Zone Bypass
  • HTTP MS Excel Unicode HLINK BO
  • HTTP PeerCast Remote Buffer Overflow
  • HTTP Webhancer Install Activity
  • MSIE FTP URI Arbitrary Cmd Exec
  • HTTP DirectAnim ComObj CodeExec (CLSID)
  • HTTP DirectAnim ComObj CodeExec (PROGID)
  • MS DNS Client ATMA Code Exec
  • MSRPC SrvSvc NetApi Buffer Overflow (2)
  • HTTP MS Excel XLW 4.0 Workbook CodeExec
  • Microsoft DHCP Service Options BO
  • HTTP MovieMaker ComObj CodeExec (PROGID)
  • HTTP MovieMaker ComObj CodeExec (CLSID)
  • SMB Srv.sys Driver Remote Code Execution
  • HTTP ASP.NET App Folder Info. Disc.
  • HTTP CSS Domain/Zone Info Disclosure
  • HTTP MS FrontPage Server Ext. XSS
  • HTTP MDAC RDS Dataspace Rem Code Exec.
  • HTTP WMF Metahdr FileSize Int. Overflow
  • HTTP Embed Tag NPDSPlay DLL BO
  • MSRPC Symantec Backup Exec SelectSvc BO
  • HTTP ANI File Hdr Size BO
  • HTTP Mozilla InstallVersion CompareTo BO
  • HTTP NullSoft Winamp M3U BO
  • HTTP NullSoft Winamp Playlist BO
  • HTTP Firefox SVG Mem Corrupt Code Exec
  • HTTP DirectAnimation Spline Heap BO
  • HTTP MSIE IsComponentInstalled BO
  • HTTP MS OLE Automation SubstringData BO
  • HTTP Firefox DOM Override Code Exec
  • HTTP DirectAnimation KeyFrame Heap BO
  • HTTP FIZZLE Config Request
  • HTTP FreeScratchWin Activity
  • HTTP MS IE VML Fill Method BO
  • HTTP MessStopper Activity
  • HTTP Shorty Activity
  • HTTP BBSee Activity
  • HTTP Umaxsearch Activity
  • HTTP IEHlpr SmartAllyes Update Activity
  • HTTP IEHlpr CCNNLC Update Activity
  • HTTP IEHlpr Register Activity
  • HTTP IEHlpr Info Download Activity
  • HTTP MoneyGainer Download Activity
  • HTTP SmartDove Download Request
  • HTTP WebViewFolderIcon SetSlice BO
  • HTTP Director Download Activity
  • HTTP SystemProcess Activity
  • HTTP McAfee EPolicy Large Source BO
  • HTTP Ezula Activity
  • HTTP Excel Multiple Remote Code Exec (2)
  • HTTP WKS Lotus 1-2-3 Remote Code Exec
  • HTTP FastSeek Download Activity
  • HTTP DollarRevenue Download Activity
  • HTTP Webprefix Activity
  • HTTP Adware Bonzi Activity
  • HTTP SmartSearch Activity
  • SMB Server Transaction Name BO
  • HTTP InstantAccess Activity
  • HTTP CasinoClient Install Request
  • HTTP DialPlatform Activity
  • HTTP WinBo Activity
  • HTTP RCPrograms Activity
  • HTTP Surfsidkick Info Upload
  • HTTP Surfsidkick Popup Activity
  • HTTP PowerSearch Download Activity
  • HTTP Eziin Activity
  • HTTP FastFind Activity
  • HTTP Getup Activity
  • HTTP Instdollars Activity
  • HTTP NowFind Activity
  • HTTP WhileUSurf Activity
  • HTTP WorldSearch Activity
  • HTTP StartPage Ifrbiz Activity
  • HTTP SurfAccuracy Config Request
  • HTTP WebDir Activity
  • HTTP MS Unsafe ActiveX Obj Instantiation
  • HTTP Webbar Register Update Activity
  • HTTP Qoolaid Activity
  • HTTP Iebar Activity
  • HTTP XMLHTTP SetRequestHeader Exec
  • MSRPC Client Svc Netware BO (1)
  • MSRPC Client Svc Netware DoS
  • HTTP MS ACF Parsing Code Exec
  • HTTP Excel ShockWave Obj Flash JS Exec
  • HTTP PunkBuster Webkey Param BO
  • HTTP 2Search Activity
  • HTTP Superbar Activity
  • HTTP AdultLinks Activity
  • HTTP PigSearch Activity
  • HTTP Adlogix Activity
  • HTTP ABXToolbar Activity
  • MSRPC Spooler GetPrinterData DoS
  • HTTP WMP ASF File Parsing Code Exec.
  • HTTP CWSAlfaSearch Update Activity
  • HTTP EnhanceMSearch Activity
  • SNMP V2 GetBulk Request Code Execution
  • HTTP Topantispyware Activity
  • HTTP Quicktime HREFTrack JavaScript Ref.
  • HTTP Adobe AcroPDF BO
  • HTTP TrustInPopups Activity
  • HTTP WinAd Activity
  • HTTP Webext Install Activity
  • HTTP Cryptomathic ActiveX Control BO
  • HTTP FindemNow Activity
  • HTTP VMWare ActiveX Control BO
  • HTTP EZSearch Activity
  • HTTP ClickAlchemy Activity
  • HTTP GreenIo Activity
  • HTTP Daosearch Activity
  • HTTP QuickBrowser Activity
  • HTTP ClearX Activity
  • HTTP QuickBrowser Install
  • HTTP Adgoblin Activity
  • HTTP CoolWebSearch Activity 2
  • HTTP DownloadPlus Activity
  • HTTP EasySearch Activity
  • HTTP FlashEnhancer Activity
  • HTTP ICcontrol Activity
  • HTTP Lantend Activity
  • HTTP Look2me Activity
  • HTTP Adblaster Activity
  • HTTP LoveFreeGames Activity
  • HTTP Margoc Activity
  • HTTP Roimoi Activity
  • HTTP TopAV Activity
  • HTTP Ulubione Activity
  • HTTP Vanish Activity
  • HTTP OverPro Activity
  • HTTP SearchNew Activity
  • HTTP Quicktime RTSP URI BO
  • HTTP SearchSeekFind Activity
  • HTTP Adobe Acrobat Plugin XSS
  • HTTP Novell AccessMgr IssueInstat XSS
  • HTTP Kuaiso Activity
  • HTTP Winshow Activity
  • HTTP Twaintec Activity
  • HTTP MSIE VML RecolorInfo Code Exec
  • HTTP MS Outlook VEVENT Code Exec
  • HTTP Yuupsearch Activity
  • HTTP SearchBarCash Activity
  • HTTP MediaInject Activity
  • HTTP Ziocom Activity
  • HTTP ZQuest Activity
  • HTTP Winpup Activity
  • HTTP PortalScan Activity
  • BD Peacomm Trojan
  • HTTP Peacomm Download Request
  • HTTP Peacomm Download Activity
  • HTTP PSN Activity
  • HTTP MSIE Generic Browser Exploit
  • HTTP License Mgr. COM Obj Instantiation
  • HTTP MS RichEdit ObjEmb Code Exec
  • HTTP Excel MSO Remote Code Exec
  • HTTP BINET Download Request
  • HTTP Verisign ConfigCHK BO
  • HTTP News Rover Remote Buffer Overflow
  • HTTP Windows Explorer WMF File DOS
  • IRC Worm Rinbot Activity
  • HTTP RealPlayer Ierpplug DLL AX DoS
  • Infostealer Snifula.B HTTP Activity
  • HTTP MS ASX File Format BO
  • HTTP Wnad Activity
  • HTTP Searchsquire Activity
  • HTTP WinFixer Activity
  • HTTP Trojan Vundo Activity
  • HTTP Trojan Vundo Log Activity
  • HTTP Trojan Lodeight.C Activity
  • HTTP W32.Mixor Worm Activity
  • HTTP MS Virtual Machine Prog Exec
  • HTTP QuickTime UDTA Atom Integer BO
  • HTTP W32 Alcra Activity
  • HTTP MS CMS Information Disclosure
  • HTTP IASysteminfo ActiveX BO
  • HTTP Sign Korea ActiveX BO
  • HTTP Zlob Activity
  • HTTP AOL SuperBuddy ActiveX Code Exec
  • HTTP XOOPS SQL Injection
  • HTTP HP Mercury QC ActiveX BO
  • HTTP GDI Remote Code Exec
  • HTTP Yahoo! Voice Chat ActiveX BO
  • HTTP Actsoft Dvdtools ActiveX BO
  • HTTP Microsoft Agent Remote Code Exec
  • HTTP NCTAudioFile2 ActiveX BO
  • HTTP Akamai Download Manager BO
  • HTTP ADODB RecordSet Buffer Overflow
  • HTTP Kaspersky Sysinfo File Exfilt Inst.
  • HTTP Gracenote CddbCtrl SetClientInfo BO
  • HTTP Kaspersky Kl File Exfilt Inst.
  • HTTP MS MDAC ADODB Connection Code Exec
  • HTTP Strip Activity
  • HTTP SignKorea Skcrypx Activex BO
  • HTTP iPix Image Well Activex BO
  • HTTP Qidion Activity
  • HTTP W32 Medbot Activity
  • MSRPC DNS Server BO
  • HTTP Netsprint Toolbar ActiveX BO
  • HTTP Zomplog PHP Dir. Traversal
  • HTTP Imaut File Download Activity
  • HTTP Mancsyn File Download Activity
  • HTTP Apple QuickTime toQTPointer Int BO
  • HTTP Adobe Photoshop BMP File BO
  • HTTP ACDSee XPM File BO
  • HTTP InterVideo HomeTheater ActiveX BO
  • HTTP Rediff Toolbar ActiveX DoS
  • HTTP Rediff Bol Downloader ActiveX Code Exec
  • HTTP IncrediMail ActiveX BO
  • HTTP InterActual Player ActiveX BO
  • HTTP MS Office Drawing BO
  • HTTP Excel Multiple Remote Code Exec (3)
  • HTTP MS Word Document Undo Code Exec
  • HTTP RTF File Drawing Obj Property DoS
  • HTTP Office OCX PowerPoint Viewer BO
  • HTTP Sina UC ActiveX BO
  • HTTP Iconics Dialog Activex BO
  • HTTP BlooMooWeb Activex File Overwrite
  • HTTP Banktown ActiveX BO
  • HTTP Axis Camera Control ActiveX BO
  • MSRPC WorkStation NetJoin BO
  • HTTP MS Word Unchecked Count BO
  • HTTP MS SharePoint Server XSS
  • HTTP Eastwind Advdaudio ActiveX BO
  • HTTP Sienzo Digital Music ActiveX BO
  • HTTP Versalsoft File Upload ActiveX BO
  • HTTP SmartCode VNC Manager ActiveX BO
  • HTTP Taltech Talbar Activex BO
  • HTTP CAPICOM ActiveX Remote Code Exec
  • HTTP RIM Blackberry TeamOn Import BO
  • HTTP MS WMS ActiveX Remote Code Exec
  • HTTP GetMySystem BarCodeWiz ActiveX BO
  • HTTP W32 Dasher Activity
  • HTTP Audio CD Ripper ActiveX DoS
  • HTTP MS Int. Training CBO Parsing BO
  • HTTP DiVX Zenith Player ActiveX BO
  • HTTP FullRemoteDisplay Dev Kit ActiveX BO
  • HTTP W32 Looksky Activity
  • HTTP MS Outlook ActiveX IE DoS
  • HTTP Morovia BarCode ActiveX File Overwrite
  • HTTP ID Auto. Linear Barcode ActiveX BO
  • HTTP DB Software Lab VimpX ActiveX BO
  • HTTP Precision Data Matrix ActiveX BO
  • HTTP Windows Shell Usr Unauth Usr Create
  • HTTP Norton 2004 ISAlert BO
  • HTTP Cashfiesta Activity
  • HTTP DeWizardX ActiveX File Overwrite
  • HTTP Precisionid Barcode ActiveX BO
  • HTTP W32 Mumawow Activity
  • HTTP Sienzo Ltmm15 ActiveX BO
  • HTTP Leadtools JPEG Activex Control BO
  • HTTP Tickerbar Activity
  • HTTP Leadtools SDK ActiveX File Overwrite
  • HTTP W32.Stration Activity
  • HTTP Virtual CD VC9API ActiveX Cmd Exec
  • HTTP KSignSWAT ActiveX BO
  • HTTP Pegasus ImagN ActiveX BO
  • HTTP LeadTools ISIS Control ActiveX BO
  • HTTP Dart ZipLite ActiveX BO
  • HTTP Sky MegaPack ShComboBox ActiveX BO
  • HTTP W32.Reyds Activity
  • HTTP mIRC IRC URL BO
  • HTTP LeadTools Raster File Obj ActiveX BO
  • HTTP UltraISO Cue File BO
  • HTTP Leadtools Raster Dialog ActiveX BO
  • HTTP Dart Zip ActiveX BO
  • HTTP W32 Fubalca Activity
  • HTTP Ademco ATNBaseLoader100 ActiveX BO
  • HTTP LeadTools Raster ActiveX BO
  • HTTP Leadtools Raster ISIS ActiveX BO
  • HTTP Symantec NAV NavComUI ActiveX BO
  • HTTP W32.Sality Activity
  • HTTP Acer LunchApp Unsafe Method
  • HTTP Media Tech Group CdPass ActiveX BO
  • HTTP British Telecom Webhelper ActiveX BO
  • HTTP EDraw Office Viewer ActiveX File Delete
  • HTTP Vivotek Motion JPEG ActiveX BO
  • HTTP Logitech VideoCall ActiveX BO
  • HTTP Zenturi DebugMsgLog ActiveX BO
  • HTTP Provideo CamImage ISSCamControl ActiveX BO
  • HTTP eSellerate ActiveX BO
  • HTTP Win32 API Remote Code Execution
  • HTTP Yahoo! Messenger Webcam ActiveX BO
  • HTTP DesktopMedia Activity
  • HTTP Zenturi PogramChecker DownloadUrl ActiveX File Overwrite
  • HTTP Zenturi Prgchk AX Nav URL File Exec
  • HTTP E-Vision CMS SQL Injection
  • HTTP Internet Download Accel. ActiveX BO
  • HTTP Alipay Password Input ActiveX Code Exec
  • HTTP Blowsearch Activity
  • HTTP CramToolbar Activity
  • HTTP SupportSoft ActiveX Stack Overflow
  • HTTP Citrix Presentation Client ActiveX BO
  • HTTP TEC-IT TBarCode ActiveX File Overwrite
  • HTTP MS Visio Malformed File Code Exec
  • HTTP Xoops Horoscope File Include
  • HTTP Egyrank Activity
  • HTTP Conspy Activity
  • HTTP MS MSODataSourceControl ActiveX BO
  • HTTP W32 Relfeer Activity
  • HTTP Corel Activegsm Activex BO
  • HTTP Aurora Activity
  • HTTP W32.Hitapop Activity
  • HTTP Novell Extend Dir ActiveX Comm Exec
  • HTTP XunLei WebThunder ActiveX Download
  • HTTP Adobe PDF Subroutine Mem. Corrupt
  • HTTP RKD Barcode ActiveX BO
  • HTTP NCTAudio2 Studio ActiveX File Overwrite
  • HTTP RealPlayer Helix ParseWallClockValue BO
  • HTTP Avax Vector ActiveX File Overwrite
  • HTTP HP Digital Imaging HPQXML ActiveX Overwrite
  • HTTP Sonycam SncP5View ActiveX BO
  • HTTP AMX VNC ActiveX Control BO
  • HTTP MS Office Web Components Code Exec
  • HTTP EasyBe 123 Music Store SQL Inj.
  • HTTP Buddy Zone SQL Injection
  • HTTP HP Instant Support ActiveX BO
  • HTTP SAP EnjoySAP Kwedit ActiveX BO
  • HTTP SAP Message Server Group Param BO
  • HTTP SAP EnjoySAP RFCGUIsink ActiveX BO
  • HTTP HP Digital Imaging HPQVWOCX ActiveX Overwrite
  • HTTP McAfee NeoTrace ActiveX BO
  • HTTP Nonnoi ASP BarCode ActiveX File Overwrite
  • HTTP Symantec Norton Ghost Remote DLL BO
  • HTTP Eltima Vsport ActiveX BO
  • HTTP Innovasys DockStudio ActiveX BO
  • HTTP Sun Java WebStart JNLP BO
  • HTTP FireFox MailTo URIHandler Remote Code Execution
  • HTTP FlashBB Sendmsg.php File Include
  • HTTP Zenturi Fill Method ActiveX BO
  • HTTP Adobe Flash SWF Plugin Code Exec
  • HTTP W32.Drom Activity
  • HTTP Publisher Malformed File Code Exec
  • HTTP Surfcomp Activity
  • HTTP Interactual Player IAKey ActiveX BO
  • HTTP TrafficJam Activity
  • HTTP Data Dynamics Activebar File Overwrite
  • HTTP Data Dynamics Abar File Overwrite
  • HTTP SpyCrush Activity
  • HTTP Winzip ActiveXControl KillBit
  • HTTP 1st AntiVirus Activity
  • HTTP AntiSpyZone Activity
  • HTTP Zenturi ProgramChecker ActiveX BO
  • HTTP AntiVermins Activity
  • HTTP LinkedIn Toolbar ActiveX BO
  • HTTP Clever Internet Suite Overwrite
  • HTTP DriveCleaner Activity
  • HTTP W32.Rontokbro Activity
  • HTTP SpyLocked Activity
  • HTTP Yahoo! Widget Engine Activex BO
  • HTTP ExpertAntivirus Activity
  • HTTP SpywareQuake Activity
  • HTTP ArgoSoft Mail Server ActiveX File Overwrite
  • HTTP VMWare IntraProcessingLog File Overwrite
  • HTTP VMWare Vielib StartProcess ActiveX Code Exec
  • HTTP Baidu Soba Search Bar ActiveX Code Exec
  • HTTP VMWare Vielib CreateProcess ActiveX Code Exec
  • HTTP SuperKeylogger Actvity
  • HTTP PCParent Activity
  • HTTP Nafaoz Activity
  • HTTP Archivio Activity
  • HTTP Mediasups Activity
  • HTTP Chilkat ASP String ActiveX File Overwrite
  • HTTP Searchtool Activity
  • HTTP Searchnet Activity
  • HTTP MS Excel XLW Remote Code Execution
  • HTTP NewAds Activity
  • HTTP SoftStop Activity
  • HTTP Torrent101 Activity
  • HTTP DXMedia SDK Flashpix ActiveX BO
  • HTTP MS XMLDom Integer Overflow
  • HTTP MSIE TLI App ActiveX Code Exec
  • HTTP MS VB PD Wizard ActiveX Code Exec
  • HTTP EDraw Office Viewer ActiveX File Overwrite
  • HTTP eCentrex VOIP Client ActiveX BO
  • RPC TrendMicro ServerProtect Multiple BO
  • HTTP Fujacks Activity
  • HTTP Infostealer Monstres Activity
  • HTTP EasyMail EMSMTP ActiveX BO
  • HTTP Subversion Windows Client Dir Traversal
  • HTTP ACTi Video Controller ActiveX File Overwrite
  • HTTP MicroCMS RevertContent SQL Injection
  • HTTP PPStream PowerPlayer ActiveX BO
  • HTTP Yvora CMS Error_View SQL Injection
  • HTTP Move Media Player Quantum ActiveX BO
  • HTTP FastLook Activity
  • HTTP Intuit QuickBooks Online ActiveX BO
  • HTTP MapServer MapFile LayerName BO
  • HTTP GlobalLink gltemflat ActiveX BO
  • HTTP EDraw Office Viewer FtpDownloadFile ActiveX BO
  • HTTP MS SQL Server SQLDMO Activex BO
  • HTTP BaoFeng Storm MPS ActiveX BO
  • HTTP Ultra Crypto CryptoX ActiveX BO
  • HTTP Ultra Crypto SaveToFile ActiveX File Overwrite
  • HTTP Worm W32.PYKSPA.D
  • HTTP MS VB6 VBP File BO
  • HTTP Broderbund 3DGreetings Player ActiveX BO
  • HTTP MS VS Lib. ActiveX File Overwrite
  • HTTP MS PDWizard ActiveX Code Exec
  • HTTP Apple QuickTime QTL Code Execution
  • HTTP Apple QuickTime PictureViewer BO
  • HTTP HP Photo and Imaging ActiveX BO
  • HTTP EDraw Office Viewer ActiveX BO
  • HTTP MW6 Tech QRCode ActiveX File Overwrite
  • HTTP Cowon jetAudio ActiveX Dir Trav.
  • HTTP Yahoo! Messenger CYFT Ctrl GetFile
  • HTTP XunLei DownURL2 ActiveX File Dwnld
  • HTTP Adobe Acrobat Mailto PDF Cmd Exec
  • HTTP ebCrypt AddString ActiveX BO
  • HTTP ebCrypt ActiveX File Overwrite
  • HTTP AskJeeves Toolbar Plugin ActiveX BO
  • HTTP Apple iTunes Playlist BO
  • HTTP Cyberlink PowerDVD ClavSetting File Overwrite
  • MS RPC NTLM Auth DoS
  • HTTP MS Mac Word 5 Remote Code
  • HTTP Kazaa Altnet ActiveX BO
  • HTTP MS XML Core Services Info Disc
  • HTTP Pegasus ImagXpress ActiveX File Overwrite
  • HTTP Pegasus ThumbnailXpress ActiveX File Delete
  • HTTP Else If CMS Input Validation
  • HTTP MS Visual Foxpro Cmd Exec
  • HTTP Outlook Advanced Find Remote Code Execution
  • HTTP SpyBlocs Activity
  • HTTP PBEmail ActiveX File Overwrite
  • HTTP PCHealthPlan Activity
  • HTTP RealPlayer IERPCtl ActiveX BO
  • HTTP ErrorSafe Activity
  • HTTP BitDefender Scanner ActiveX BO
  • HTTP GOM Player GomWeb Ctrl ActiveX BO
  • HTTP MySpace Breadcrumb Remote File Incl
  • HTTP GlobalLink ActiveX Control Heap BO
  • HTTP SSReader Reader ActiveX BO
  • HTTP MacroVision FlexNet USWA ActiveX BO
  • HTTP MacroVision Flexnet Uswa ActiveX File Overwrite
  • HTTP SonicWALL SSL VPN ActiveX BO
  • HTTP EDraw Flowchart ActiveX Overwrite
  • HTTP Firefly Media Server Format String
  • HTTP Apple Quicktime Color Atom Heap BO
  • HTTP Apple QuickTime STSD Atom BO
  • HTTP Apple QuickTime Panaroma Atom BO
  • HTTP Viewpoint MediaPlayer ActiveX BO
  • Hacktool Dahij
  • HTTP Adobe Shockwave Version ActiveX DoS
  • HTTP MS Office Web Component DoS
  • HTTP SpyFalcon Activity
  • HTTP SpyFighter Activity
  • HTTP UnSpyPC Activity
  • HTTP Malware Alarm Install
  • HTTP ScanAndRepair Activity
  • HTTP Spybouncer Activity
  • HTTP Malicious URL Download Request
  • HTTP Xunlei Thunder PPlayer ActiveX BO
  • HTTP Aurigma Image Uploader ActiveX BO
  • HTTP Apple QT RTSP Content Type BO
  • HTTP PPStream PowerList ActiveX BO
  • TCP Symantec Backup Exec GIOP DoS
  • HTTP Tencent QQ IM ActiveX BO
  • HTTP MSIE WPAD Spoofing
  • HTTP VideoLan VLC ActiveX Mem Corruption
  • HTTP SonicWall Global VPN Format String
  • HTTP Tginfo Activity
  • HTTP BadBlue Webserver BO
  • HTTP ASF StreamPropObj AudioErrMasking BO
  • HTTP ASF BinaryMediaObject BO
  • HTTP ASF StreamPropObj SpreadAudio BO
  • HTTP ASF StreamProperty BO
  • HTTP MS DirectShow SAMI File Code Exec
  • MSRPC MS Message Queuing BO
  • HTTP MS DirectShow Crafted WAV Code Exec
  • HTTP AVS Media ActiveX Code Exec
  • HTTP HP Info Center ActiveX Code Exec
  • HTTP Rosoft Media Player Track List BO
  • HTTP RavWare RavFLIC ActiveX BO
  • HTTP HP Software Update ActiveX BO
  • HTTP HP ESupport Diag ActiveX Info Disc
  • HTTP IBM Lotus Domino Web Access ActiveX BO
  • HTTP VideoLAN VLC Subtitle BO
  • HTTP VideoLAN VLC Format String 2
  • HTTP Persits Xupload Activex BO
  • HTTP SkyFex Client Activex BO
  • HTTP AdsAlert Activity
  • HTTP AdwareSpy Activity
  • HTTP AgentSpyware Activity
  • HTTP AntiVirusGold Activity
  • HTTP EasySpywareKiller Activity
  • HTTP MagicAntiSpy Activity
  • HTTP AdwareSheriff Activity
  • HTTP UCCPlay Misleading Apps Installation
  • HTTP KMGuide Activity
  • HTTP Revealerkeylog Activity
  • HTTP AVSystemCare Activity
  • HTTP Gateway CWebLaunchCtl ActiveX File Overwrite
  • HTTP MS Rich TextBox ActiveX File Overwrite
  • HTTP 2Wire Drive-By Automatic Config Change
  • HTTP NeoSpy Activity
  • HTTP Qvod Player ActiveX BO
  • HTTP DVRHOST ActiveX BO
  • HTTP Macrovision ActiveX File Overwrite
  • HTTP Apple QT Atom Memory Corruption
  • HTTP Excel Remote Code Exec
  • HTTP RTS Sentry PTZCamPanel ActiveX BO
  • HTTP Crystal Reports EnterpriseControls ActiveX BO
  • HTTP Digital Data Comms Rtsp ActiveX BO
  • HTTP GlobalLink ChatRoom ActiveX BO
  • HTTP Gateway WebLaunch ActiveX BO
  • HTTP Move Networks Media Player ActiveX BO
  • HTTP MailBee Objects ActiveX File Overwrite
  • HTTP Symantec BackupExec ActiveX BO
  • HTTP Chilkat Mail ActiveX File Overwrite
  • HTTP MS Office Web Component Code Exec
  • HTTP MS WebDAV Mini-Redirector BO
  • HTTP MS DirectX Img Processing Code Exec
  • HTTP MS Word Remote Code Exec
  • HTTP MS OLE Automation Remote Code Exec
  • HTTP MySpace Uploader ActiveX BO
  • HTTP SystemDoctor Activity
  • HTTP Chilkat FTP ActiveX File Overwrite
  • HTTP FaceBook Photo Uploader ActiveX BO
  • HTTP Yahoo! Jukebox MediaGrid ActiveX BO
  • HTTP Yahoo! JukeBox DataGrid ActiveX BO
  • HTTP GlobalLink StartNotify ActiveX BO
  • HTTP Facebook PhotoUploader Action ActiveX BO
  • HTTP Sejoong Namo ActiveSquare ActiveX BO
  • HTTP Sony ImageStation ActiveX BO
  • HTTP Microsoft IE Generic Heap Spray BO
  • HTTP Apple Quicktime QTPlugin ActiveX BO
  • HTTP Toshiba Surveillance ActiveX BO
  • HTTP Lycos Fileuploader ActiveX BO
  • HTTP HP Virtual Rooms ActiveX BO
  • HTTP Mozilla Firefox JS Obj Code Exec
  • HTTP RARLAB WinRAR LHA Filename BO
  • HTTP DoctorAdwarePro Activity
  • HTTP TrojanGuarder Activity
  • HTTP Truesword Activity
  • HTTP Novell IPrint Client AX BO
  • HTTP MS Office PowerPoint Memory Corruption
  • HTTP EliteProtector Activity
  • HTTP Cleanator Activity
  • HTTP Remacc MultiWebSurv Activity
  • HTTP Malwarecrush Activity
  • HTTP AntiSpyBoss Activity
  • HTTP SwiftCleaner Activity
  • HTTP Malwarepro Activity
  • HTTP AdwareRemover Activity
  • HTTP Virusblast Activity
  • HTTP DLink Mpeg4 Shm Audio ActiveX BO
  • HTTP Move MPlayer Quantum AX BO
  • HTTP VirusRescue Activity
  • HTTP ScriptElement CreateControlRange BO
  • HTTP 4XEM VatDecoder ActiveX BO
  • HTTP RTSP Mpeg4 Control ActiveX BO
  • HTTP Winreanimator Activity
  • HTTP MyCleanerPC Activity
  • HTTP VirusProtectPro Activity
  • HTTP TOR Activity
  • HTTP KingSoft AV ActiveX BO
  • HTTP ICQ Toolbar ActiveX DoS
  • HTTP B21Soft BfUp ActiveX BO
  • HTTP SpyShield Activity
  • HTTP CA BrightStor ActiveX BO
  • Novell Client NWSPOOL.DLL EnumPrinters BO
  • HTTP Trend Micro OfficeScan BO
  • HTTP Registry Pro RegKey Deletion
  • HTTP Univeral HTTP Remote File Deletion
  • SMB Critical File Tamper Activity
  • HTTP HxTocCtrl ActiveX Code Exec
  • HTTP EMF GDI Integer BO
  • HTTP GDI EMF Remote Code Exec
  • HTTP MyBugFreePc Activity
  • HTTP ErrorDoctor Activity
  • HTTP PrivacyGuarantor Activity
  • HTTP PrivacyKit Activity
  • HTTP SpywareSweeper Activity
  • HTTP IrfanView FPX Memory Corruption
  • HTTP Suspicious Exploit Decoder
  • HTTP IBiz EBanking Active File Overwrite
  • HTTP TumbleWeed TransferFile ActiveX BO
  • HTTP Chilkat HTTP ActiveX File Overwrite
  • HTTP Trojan Zlob Activity
  • HTTP WinSpy Activity
  • HTTP ErrClean Activity
  • HTTP PCCleaner Activity
  • HTTP ICQ 6 Status Message BO
  • HTTP Malicious Toolkit Download Request
  • HTTP Malicious Toolkit Download Activity
  • HTTP Malicious Toolkit Variant Activity
  • HTTP Malicious Toolkit Variant Activity 2
  • HTTP Zune Software ActiveX File Overwrite
  • HTTP MS Works 7 WkImgSrv ActiveX Code Execution
  • HTTP HP Software Update ActiveX File Overwrite
  • HTTP MPlayer Mpeg4 demux BO
  • HTTP Swiftview ActiveX BO
  • HTTP Ghostscript zseticcspace Function BO
  • HTTP RealPlayer rmoc BO
  • HTTP Adobe SWF Malicious Download Attempt
  • HTTP HP OpenView Network Dir Traversal
  • HTTP OpenOffice OLE BO
  • HTTP Kantaris SSA File BO
  • HTTP MS Word RTF File Code Exec
  • HTTP OurGame GlieDown2 ActiveX BO
  • HTTP DronDog Trojan Activity
  • HTTP Secure File Delete Wizard AX FD
  • HTTP aaxRegistry ActiveX Registry Del
  • HTTP Backup Exec Sys Recovery Dir Trav
  • HTTP ETDScanner Activity
  • HTTP RegistryCare Activity
  • HTTP SaferScan Activity
  • HTTP SpyDestroy Activity
  • HTTP TheSpywareDetective Activity
  • HTTP SQL Injection Bot Registration
  • HTTP Creative Labs AutoUpdate ActiveX BO
  • HTTP Adobe Malformed PDF DoS
  • HTTP Safari IE Remote Code Exec
  • HTTP MS Speech API ActiveX
  • HTTP MS DirectX Malformed File Code Exec
  • HTTP Gammima Activity
  • HTTP Trojan Bayrob Activity
  • HTTP HP GetFileTime ActiveX BO
  • HTTP HP MoveFile ActiveX BO
  • HTTP HP ExtractCab ActiveX BO
  • HTTP HP RegistryString ActiveX BO
  • HTTP BackWeb ActiveX KillBit
  • HTTP BlackIce DownloadImage ActiveX BO
  • HTTP C6 Messenger ActiveX File Overwrite
  • HTTP BlackIce ActiveX Download Activity
  • HTTP BlackIce TIFF SDK ActiveX BO
  • HTTP BlackIce Annotation SDK ActiveX BO
  • HTTP Fake Codec WebPage
  • HTTP Fake Codec Request
  • HTTP Fake Scan Webpage
  • HTTP Misleading Application Detection
  • HTTP Fake Product WebPage
  • HTTP Trojan Webkit Activity
  • HTTP Muvee AutoProducer ActiveX BO
  • HTTP Trojan Nebuler Activity
  • HTTP Trojan Pandex Activity
  • HTTP Novell Iprint Client ActiveX BO
  • HTTP Foxy 'fs' Parameter Memory Exhaustion DoS
  • HTTP Fake AV Installers Activity
  • Http Nweb2fax Multiple Remote Vulnerabilities
  • HTTP XnView TAAC File BO
  • HTTP TrackZapper Activity
  • HTTP SpyKill Activity
  • HTTP BPSpyware Activity
  • HTTP FaceBook Phish Attempt
  • HTTP MS Windows Explorer Code Exec
  • HTTP VLC Media Player WAV BO
  • HTTP SnapShot Viewer ActiveX File Download
  • HTTP Snapshot Viewer ActiveX Download Request
  • HTTP MS Word Malformed File Code Exec
  • HTTP Download Accelerator M3U BO
  • HTTP AntivirusXP2008 Activity
  • HTTP Sina Downloader ActiveX Unsafe Usage
  • HTTP PPMate PPMedia ActiveX BO
  • HTTP Trojan Brisv A Activity
  • HTTP UltimateDefender Activity
  • HTTP SpywareScrapper Activity
  • HTTP CrisysTecSentry Activity
  • HTTP MalwareDestructor Activity
  • HTTP WinXDefender Activity
  • HTTP WebEx Meeting Manager ActiveX BO
  • HTTP JcomSoft AniGIF ActiveX BO
  • HTTP Apache Tomcat UTF-8 Dir Traversal
  • HTTP Utorrent File Handling BO
  • HTTP Trojan Malware Download Activity
  • HTTP W32 Jeefo Activity
  • HTTP Spyware Ultimatekeylog Activity
  • HTTP Anzio Web Print Object ActiveX BO
  • HTTP TTPlayer ActiveX File Overwrite
  • HTTP Acoustica Mixcraft Mx4 BO
  • HTTP Friendly Tech ActiveX Cmd Exec
  • HTTP Acoustica Beatcraft Title BO
  • HTTP Windows Media Encoder ActiveX BO
  • HTTP MS Office OneNote Code Exec
  • HTTP MS GDI Malformed BMP Code Exec
  • HTTP MS Img Logger ActiveX File Overwrite
  • HTTP PeachTree ActiveX File Overwrite
  • HTTP reDuh Activity
  • HTTP Trend Micro OfficeScan cgiRecvFile.exe BO
  • HTTP PhpMyAdmin Server DataBases Code Exec
  • HTTP ComponentOne VSFlexGrid ActiveX BO
  • HTTP Apple Quicktime Type BO
  • HTTP BlazeVideo BlazeDVD Playlist BO
  • HTTP Chilkat XML ActiveX Unsafe Method
  • HTTP Novell Zenworks ActiveX BO
  • HTTP Chilkat IMAP ActiveX File Overwrite
  • HTTP AutoDesk DWF Viewer AX Program Exec
  • HTTP Autodesk DWF Viewer File Overwrite
  • HTTP GdPicture Pro ActiveX File Overwrite
  • HTTP eZoneScripts Link Trader SQL Injection
  • HTTP iseemedia Lpviewer ActiveX BO
  • HTTP Atomix MP3 M3U File Path Buffer Overflow
  • HTTP Hummingbird HostExplorer ActiveX BO
  • HTTP VLC Tivo Decoder BO
  • HTTP PowerTCP FTP Activex BO
  • MSRPC Server Service BO
  • MSRPC Server Service BO2
  • HTTP DB Software Lab ActiveX File Overwrite
  • HTTP DJVU ActiveX BO
  • HTTP MS DataGrid Memory Corruption
  • HTTP Suspicious Domain Request
  • HTTP VeryPDF PDFView AX BO
  • NDMP Symantec Backup Exec File BO
  • HTTP ffdshow URL Link BO
  • HTTP FlexCell ActiveX File Overwrite
  • HTTP MS Word RTF Parsing Code Exec
  • HTTP MS Word RTF Malformed Code Exec
  • HTTP MS Word RTF Obj Parsing Code Exec
  • HTTP MS Word RTF Malicious Code Exec
  • HTTP MS IE Embed Src BO
  • HTTP Windows Search Code Exec
  • HTTP MSIE Webdav Src BO
  • HTTP RadASM Project File BO
  • HTTP W32 Harakit Activity
  • HTTP MSIE Malformed XML BO
  • SMB MS Windows Malformed Packet BO
  • HTTP Chunked Encoding Negative Length BO
  • HTTP IIS Webdav Exploit
  • HTTP Info2www CGI Command Exec
  • HTTP MS IIS TranslateF Request
  • HTTP IIS ISAPI Extension (Code Red)
  • HTTP Htgrep CGI File Access

Security Update 95 removes coverage for the following vulnerabilities and threats:
  • Telnet TTYPROMPT BO
  • HTTP MS Speech COM Object Mem Corruption
  • HTTP Adobe Acrobat JavaScript BO
  • HTTP Adobe CollectEmailInfo Function BO



Last modified on: Friday, 30-Jan-09 03:15:55