

HTTP: Firefox nsPropertyTable PropertyList Memory Corruption HTTP: Windows Live Messenger Unsafe ActiveX Method (MSKB 240797) HTTP: IBM Lotus Expeditor cai URI Handler Command Execution HTTP: Internet Explorer Install Engine Integer Overflow HTTP: Microsoft Edge CVE-2017-8496 Remote Code Execution HTTP: Internet Explorer Drag-and-Drop Modified HTTP: Microsoft Internet Explorer CVE-2015-1659 Remote Code Execution HTTP: Adobe Flash Player ActiveX Null Dereference HTTP: Morovia Barcode ActiveX Control Arbitrary File Overwrite Vulnerability HTTP: Internet Explorer 8 DOM Uninitialized Memory HTTP: Internet Explorer Text Help Zone Bypass HTTP: Firefox ConstructFrame First-letter HTTP: Mozilla Firefox Plugin Parameter Array Dangling Pointer HTTP: Microsoft Edge CVE-2016-3294 Memory Corruption HTTP: Microsoft Internet Explorer CVE-2016-3295 Memory Corruption WORM: HTTP IFRAME Containing Possible Malicious Stats.php HTTP: Wordpress FGallery Plugin Malicious File Posting HTTP: Microsoft Internet Explorer boundElements Uninitialized Memory Corruption HTTP: Microsoft Internet Explorer HTML Layout Memory Corruption HTTP: Microsoft Internet Explorer Erroneous Object Handling Use-After-Free HTTP: Microsoft Internet Explorer CVE-2016-3327 Information Disclosure HTTP: Microsoft Internet Explorer onBeforeCopy Use After Free HTTP: Samsung NET-i ware ConnectDDNS Method ActiveX HTTP: Samsung NET-i ware BackupToAvi Method ActiveX HTTP: IBM Lotus iNotes Upload Module ActiveX Control Buffer Overflow HTTP: Oracle Java JPEGImageWriter Memory Corruption HTTP: Microsoft Internet Explorer Center Element Remote Code Execution HTTP: Microsoft Internet Explorer HTML Sanitization Vulnerability

HTTP: Microsoft ActiveX Control ClassID Obfuscation HTTP: Oracle Java IE Browser Plugin docbase Parameter Stack Buffer Overflow HTTP: Squid Proxy ESI Response Denial of Service HTTP: Electron Java Script Command Injection HTTP: IBM Lotus Quickr ActiveX Control Buffer Overflow HTTP: Internet Explorer Forced File Download HTTP: Microsoft Windows ITS Protocol Information Disclosure HTTP: Microsoft Internet Explorer CVE-2015-0100 Use After Free HTTP: Multiple Denial Of Service Vulnerability (STC) HTTP: Microsoft Edge CVE-2016-3326 Use After Free HTTP: Microsoft Internet Explorer CVE-2016-3288 Use After Free HTTP: Samsung NET-i Viewer msls31.dll ActiveX Buffer Overflow

Complete details can be found in the official IDP Detector Engine Release Notes: 'Signature Update #3106 contains new detector engine builds for the Junos OS, IDP OS, and ISG OS.
