Is there a list to be found anywhere that indicates all the CVE Exploits against which HMP.A protects?
A vulnerability in a software application is described in a CVE. In order to abuse a vulnerability an exploit must be used. There are only a handful of exploit techniques to abuse a vulnerability (i.e. climb through the
hole onto your machine). Alert mitigates such exploit techniques and therefor plugs (existing and future) vulnerabilities in software applications.
New vulnerabilities are found everyday (and make headlines). Exploits techniques on the other hand are rarely new.
Has anyone seen the test results from PC Security Lab in 2014? The report (.pdf) can be downloaded by selecting the green pane that includes Hitman Pro Alert in the list of tested software. You select the small circles at the middle-bottom of the pane to bring up the various links.
PC Security Lab:
https://www.pitci.com/ (As far as I know it has a respectable reputation).
NOTE: The test results apply to HitmanPro.Alert3 CTP23 SurfRight 3.0.12.73 only on Windows XP SP3 systems.
First, that test is commissioned by Malwarebytes.
Second, that test was done on an early alpha build (technology preview) against full released products. Several features did not yet exists in the CTP builds. E.g. Application lockdown and Network lockdown were completely non existent in those CTP builds as we were still working on them. Also many other features were far from finished (note: the test was done more that 6 months ago and we are still in
release candidate state).
Third, they did not add Quicktime to Alert. That had to be done because Alert was in alpha and did protect some apps out of the box. But if they would just add the app to the list of protected applications, it would have protected Quicktime. As a matter of fact, they did add Quicktime to EMET, but they did not do this for Alert.
Fourth, the test was done in virtual machines. Our hardware-assisted ROP detection only works on physical hardware because virtual machines fail to virtualize specifc hardware registers.
Fifth, they did not bother asking us to test our software nor did they contact us whether they were testing Alert correctly (with respect to item 4).
Hope this helps.