· 6 years ago · Nov 13, 2019, 11:37 AM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.meb.gov.tr ISP Turk Telekom
4Continent Asia Flag
5TR
6Country Turkey Country Code TR
7Region Unknown Local time 13 Nov 2019 05:31 +03
8City Unknown Postal Code Unknown
9IP Address 212.174.189.120 Latitude 41.021
10 Longitude 28.995
11=======================================================================================================================================
12#######################################################################################################################################
13> www.meb.gov.tr
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.meb.gov.tr
19Address: 212.174.189.120
20;; Got SERVFAIL reply from 185.93.180.131, trying next server
21;; Got SERVFAIL reply from 194.187.251.67, trying next server
22** server can't find www.meb.gov.tr: SERVFAIL
23>
24#######################################################################################################################################
25** Domain Name: meb.gov.tr
26
27** Registrant:
28 Milli Eğitim Bakanlığı
29 MEB Atatürk Bulvarı Zemin Kat A Blok Bakanlıklar
30 06648
31 Ankara,
32 Türkiye
33 feridun@meb.gov.tr
34 + 90-312-4131185-
35 + 90-312-4175009
36
37
38** Administrative Contact:
39NIC Handle : meb8-metu
40Organization Name : MİLLİ EĞİTİM BAKANLIĞI
41Address : MEB ATATÜRK BUL. ZEMİN KAT A BLOK
42 BAKANLIKLAR
43 Ankara,06648
44 Türkiye
45Phone : + 90-312-4131182-
46Fax : + 90-312-4175009-
47
48
49** Technical Contact:
50NIC Handle : meb8-metu
51Organization Name : MİLLİ EĞİTİM BAKANLIĞI
52Address : MEB ATATÜRK BUL. ZEMİN KAT A BLOK
53 BAKANLIKLAR
54 Ankara,06648
55 Türkiye
56Phone : + 90-312-4131182-
57Fax : + 90-312-4175009-
58
59
60** Billing Contact:
61NIC Handle : meb8-metu
62Organization Name : MİLLİ EĞİTİM BAKANLIĞI
63Address : MEB ATATÜRK BUL. ZEMİN KAT A BLOK
64 BAKANLIKLAR
65 Ankara,06648
66 Türkiye
67Phone : + 90-312-4131182-
68Fax : + 90-312-4175009-
69
70
71** Domain Servers:
72papatya.meb.gov.tr 212.174.189.114
73papatya2.meb.gov.tr 212.174.189.113
74
75** Additional Info:
76Created on..............: 2001-May-11.
77Expires on..............: 2021-May-10.
78#######################################################################################################################################
79[+] Target : www.meb.gov.tr
80
81[+] IP Address : 212.174.189.120
82
83[+] Headers :
84
85[+] Content-Type : text/html; charset=UTF-8
86[+] Server : Microsoft-IIS/7.5
87[+] X-Powered-By : ASP.NET
88[+] Date : Wed, 13 Nov 2019 02:35:19 GMT
89[+] Content-Length : 38385
90
91[+] SSL Certificate Information :
92
93[+] countryName : TR
94[+] stateOrProvinceName : Ankara
95[+] localityName : Bakanliklar
96[+] organizationalUnitName : Bilgi Islem Dairesi
97[+] organizationName : Milli Egitim Bakanligi
98[+] commonName : *.meb.gov.tr
99[+] countryName : BE
100[+] organizationName : GlobalSign nv-sa
101[+] commonName : GlobalSign Organization Validation CA - SHA256 - G2
102[+] Version : 3
103[+] Serial Number : 44ED5ADC7CC1082694D5B9EC
104[+] Not Before : Dec 19 15:34:35 2017 GMT
105[+] Not After : Mar 8 15:02:14 2021 GMT
106[+] OCSP : ('http://ocsp2.globalsign.com/gsorganizationvalsha2g2',)
107[+] subject Alt Name : (('DNS', '*.meb.gov.tr'), ('DNS', 'meb.gov.tr'))
108[+] CA Issuers : ('http://secure.globalsign.com/cacert/gsorganizationvalsha2g2r1.crt',)
109[+] CRL Distribution Points : ('http://crl.globalsign.com/gs/gsorganizationvalsha2g2.crl',)
110
111[+] Whois Lookup :
112
113[+] NIR : None
114[+] ASN Registry : ripencc
115[+] ASN : 9121
116[+] ASN CIDR : 212.174.128.0/17
117[+] ASN Country Code : TR
118[+] ASN Date : 1999-04-07
119[+] ASN Description : TTNET, TR
120[+] cidr : 212.174.189.112/28
121[+] name : MEBNET
122[+] handle : BIDB1-RIPE
123[+] range : 212.174.189.112 - 212.174.189.127
124[+] description : Ministry of National Education
125[+] country : TR
126[+] state : None
127[+] city : None
128[+] address : T.C Ministry of National Education
129Bilgi Islem Dairesi Baskanligi
130Zemin Kat, A Blok 06648 Bakanliklar ANKARA
131[+] postal_code : None
132[+] emails : None
133[+] created : 2004-06-11T13:00:59Z
134[+] updated : 2015-08-20T12:11:37Z
135
136[+] Crawling Target...
137
138[+] Looking for robots.txt........[ Found ]
139[+] Extracting robots Links.......[ 1 ]
140[+] Looking for sitemap.xml.......[ Not Found ]
141[+] Extracting CSS Links..........[ 14 ]
142[+] Extracting Javascript Links...[ 11 ]
143[+] Extracting Internal Links.....[ 11 ]
144[+] Extracting External Links.....[ 42 ]
145[+] Extracting Images.............[ 55 ]
146
147[+] Total Links Extracted : 134
148
149[+] Dumping Links in /opt/FinalRecon/dumps/www.meb.gov.tr.dump
150[+] Completed!
151#######################################################################################################################################
152[i] Scanning Site: http://www.meb.gov.tr
153
154
155
156B A S I C I N F O
157====================
158
159
160[+] Site Title: T.C. Millî Eğitim Bakanlığı
161[+] IP address: 212.174.189.120
162[+] Web Server: Microsoft-IIS/7.5
163[+] CMS: Could Not Detect
164[+] Cloudflare: Not Detected
165[+] Robots File: Found
166
167-------------[ contents ]----------------
168User-agent: *
169Allow: /
170
171
172
173
174
175
176-----------[end of contents]-------------
177
178
179
180W H O I S L O O K U P
181========================
182
183 ** Domain Name: meb.gov.tr
184
185** Registrant:
186 Milli Eğitim Bakanlığı
187 MEB Atatürk Bulvarı Zemin Kat A Blok Bakanlıklar
188 06648
189 Ankara,
190 Türkiye
191 feridun@meb.gov.tr
192 + 90-312-4131185-
193 + 90-312-4175009
194
195
196** Administrative Contact:
197NIC Handle : meb8-metu
198Organization Name : MİLLİ EĞİTİM BAKANLIĞI
199Address : MEB ATATÜRK BUL. ZEMİN KAT A BLOK
200 BAKANLIKLAR
201 Ankara,06648
202 Türkiye
203Phone : + 90-312-4131182-
204Fax : + 90-312-4175009-
205
206
207** Technical Contact:
208NIC Handle : meb8-metu
209Organization Name : MİLLİ EĞİTİM BAKANLIĞI
210Address : MEB ATATÜRK BUL. ZEMİN KAT A BLOK
211 BAKANLIKLAR
212 Ankara,06648
213 Türkiye
214Phone : + 90-312-4131182-
215Fax : + 90-312-4175009-
216
217
218** Billing Contact:
219NIC Handle : meb8-metu
220Organization Name : MİLLİ EĞİTİM BAKANLIĞI
221Address : MEB ATATÜRK BUL. ZEMİN KAT A BLOK
222 BAKANLIKLAR
223 Ankara,06648
224 Türkiye
225Phone : + 90-312-4131182-
226Fax : + 90-312-4175009-
227
228
229** Domain Servers:
230papatya.meb.gov.tr 212.174.189.114
231papatya2.meb.gov.tr 212.174.189.113
232
233** Additional Info:
234Created on..............: 2001-May-11.
235Expires on..............: 2021-May-10.
236
237
238
239
240G E O I P L O O K U P
241=========================
242
243[i] IP Address: 212.174.189.120
244[i] Country: Turkey
245[i] State: Istanbul
246[i] City: Bueyuekcekmece
247[i] Latitude: 41.0156
248[i] Longitude: 28.56
249
250
251
252
253H T T P H E A D E R S
254=======================
255
256
257[i] HTTP/1.1 200 OK
258[i] Content-Type: text/html; charset=UTF-8
259[i] Server: Microsoft-IIS/7.5
260[i] X-Powered-By: ASP.NET
261[i] Date: Wed, 13 Nov 2019 02:35:51 GMT
262[i] Connection: close
263[i] Content-Length: 38385
264
265
266
267
268D N S L O O K U P
269===================
270
271meb.gov.tr. 3599 IN A 212.174.189.120
272meb.gov.tr. 3599 IN NS papatya2.meb.gov.tr.
273meb.gov.tr. 3599 IN NS papatya.meb.gov.tr.
274meb.gov.tr. 3599 IN SOA papatya.meb.gov.tr. ays.meb.gov.tr. 2016121325 14400 3600 1296000 3600
275meb.gov.tr. 3599 IN MX 10 mebfmgw.meb.gov.tr.
276meb.gov.tr. 3599 IN TXT "adobe-idp-site-verification=29678fb148b362521305f146f13f245956ef66b528571d1818bb8e6f8f25d41a"
277meb.gov.tr. 3599 IN TXT "v=spf1 ip4:212.175.170.105 a mx ~all"
278
279
280
281
282S U B N E T C A L C U L A T I O N
283====================================
284
285Address = 212.174.189.120
286Network = 212.174.189.120 / 32
287Netmask = 255.255.255.255
288Broadcast = not needed on Point-to-Point links
289Wildcard Mask = 0.0.0.0
290Hosts Bits = 0
291Max. Hosts = 1 (2^0 - 0)
292Host Range = { 212.174.189.120 - 212.174.189.120 }
293
294
295
296N M A P P O R T S C A N
297============================
298
299Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-13 02:37 UTC
300Nmap scan report for meb.gov.tr (212.174.189.120)
301Host is up (0.13s latency).
302rDNS record for 212.174.189.120: mail.meb.gov.tr
303
304PORT STATE SERVICE
30521/tcp filtered ftp
30622/tcp filtered ssh
30723/tcp filtered telnet
30880/tcp open http
309110/tcp filtered pop3
310143/tcp filtered imap
311443/tcp open https
3123389/tcp filtered ms-wbt-server
313
314Nmap done: 1 IP address (1 host up) scanned in 3.38 seconds
315
316
317
318S U B - D O M A I N F I N D E R
319==================================
320
321
322[i] Total Subdomains Found : 1275
323
324[+] Subdomain: kale20.meb.gov.tr
325[-] IP: 212.175.132.140
326
327[+] Subdomain: bozkurt20.meb.gov.tr
328[-] IP: 212.175.132.139
329
330[+] Subdomain: pazar60.meb.gov.tr
331[-] IP: 212.175.132.136
332
333[+] Subdomain: yesilyurt60.meb.gov.tr
334[-] IP: 212.175.132.141
335
336[+] Subdomain: yenipazar11.meb.gov.tr
337[-] IP: 212.175.132.139
338
339[+] Subdomain: yenisehir21.meb.gov.tr
340[-] IP: 212.175.132.139
341
342[+] Subdomain: koprubasi61.meb.gov.tr
343[-] IP: 212.175.132.136
344
345[+] Subdomain: e-okul1.meb.gov.tr
346[-] IP: 212.175.170.97
347
348[+] Subdomain: golbasi02.meb.gov.tr
349[-] IP: 212.175.132.139
350
351[+] Subdomain: mebk12.meb.gov.tr
352[-] IP: 212.175.170.116
353
354[+] Subdomain: gonen32.meb.gov.tr
355[-] IP: 212.175.132.140
356
357[+] Subdomain: eregli42.meb.gov.tr
358[-] IP: 212.175.132.140
359
360[+] Subdomain: ekip42.meb.gov.tr
361[-] IP: 212.175.132.133
362
363[+] Subdomain: ulubey52.meb.gov.tr
364[-] IP: 212.175.132.141
365
366[+] Subdomain: ovacik62.meb.gov.tr
367[-] IP: 212.175.132.136
368
369[+] Subdomain: papatya2.meb.gov.tr
370[-] IP: 212.174.189.113
371
372[+] Subdomain: mek2.meb.gov.tr
373[-] IP: 212.175.132.138
374
375[+] Subdomain: mebbis2.meb.gov.tr
376[-] IP: 212.175.132.108
377
378[+] Subdomain: externaldns2.meb.gov.tr
379[-] IP: 212.174.189.113
380
381[+] Subdomain: bayat03.meb.gov.tr
382[-] IP: 212.175.132.139
383
384[+] Subdomain: sbs2013.meb.gov.tr
385[-] IP: 95.0.196.204
386
387[+] Subdomain: aydincik33.meb.gov.tr
388[-] IP: 212.175.132.141
389
390[+] Subdomain: yenisehir33.meb.gov.tr
391[-] IP: 212.175.132.141
392
393[+] Subdomain: pazar53.meb.gov.tr
394[-] IP: 212.175.132.142
395
396[+] Subdomain: kale44.meb.gov.tr
397[-] IP: 212.175.132.142
398
399[+] Subdomain: yesilyurt44.meb.gov.tr
400[-] IP: 212.175.132.142
401
402[+] Subdomain: ulubey64.meb.gov.tr
403[-] IP: 212.175.132.141
404
405[+] Subdomain: altinyayla15.meb.gov.tr
406[-] IP: 212.175.132.139
407
408[+] Subdomain: kemer15.meb.gov.tr
409[-] IP: 212.175.132.140
410
411[+] Subdomain: koprubasi45.meb.gov.tr
412[-] IP: 212.175.132.142
413
414[+] Subdomain: ayvacik55.meb.gov.tr
415[-] IP: 212.175.132.136
416
417[+] Subdomain: edremit65.meb.gov.tr
418[-] IP: 212.175.132.136
419
420[+] Subdomain: saray65.meb.gov.tr
421[-] IP: 212.175.132.136
422
423[+] Subdomain: golbasi06.meb.gov.tr
424[-] IP: 212.175.132.139
425
426[+] Subdomain: nilufer16.meb.gov.tr
427[-] IP: 212.175.132.140
428
429[+] Subdomain: aydincik66.meb.gov.tr
430[-] IP: 212.175.132.136
431
432[+] Subdomain: ilbap07.meb.gov.tr
433[-] IP: 212.175.132.132
434
435[+] Subdomain: kemer07.meb.gov.tr
436[-] IP: 212.175.132.139
437
438[+] Subdomain: aksu07.meb.gov.tr
439[-] IP: 212.175.132.139
440
441[+] Subdomain: yenice17.meb.gov.tr
442[-] IP: 212.175.132.140
443
444[+] Subdomain: pinarbasi37.meb.gov.tr
445[-] IP: 212.175.132.142
446
447[+] Subdomain: bitek37.meb.gov.tr
448[-] IP: 212.175.132.133
449
450[+] Subdomain: bozkurt37.meb.gov.tr
451[-] IP: 212.175.132.142
452
453[+] Subdomain: eregli67.meb.gov.tr
454[-] IP: 212.175.132.141
455
456[+] Subdomain: altinyayla58.meb.gov.tr
457[-] IP: 212.175.132.141
458
459[+] Subdomain: ortakoy68.meb.gov.tr
460[-] IP: 212.175.132.136
461
462[+] Subdomain: yenice78.meb.gov.tr
463[-] IP: 212.175.132.136
464
465[+] Subdomain: ovacik78.meb.gov.tr
466[-] IP: 212.175.132.136
467
468[+] Subdomain: yenipazar09.meb.gov.tr
469[-] IP: 212.175.132.139
470
471[+] Subdomain: bayat19.meb.gov.tr
472[-] IP: 212.175.132.140
473
474[+] Subdomain: saray59.meb.gov.tr
475[-] IP: 212.175.132.136
476
477[+] Subdomain: erbaa.meb.gov.tr
478[-] IP: 212.175.132.141
479
480[+] Subdomain: carsamba.meb.gov.tr
481[-] IP: 212.175.132.142
482
483[+] Subdomain: alaca.meb.gov.tr
484[-] IP: 212.175.132.139
485
486[+] Subdomain: darica.meb.gov.tr
487[-] IP: 212.175.132.140
488
489[+] Subdomain: catalca.meb.gov.tr
490[-] IP: 212.175.132.140
491
492[+] Subdomain: yigilca.meb.gov.tr
493[-] IP: 212.175.132.136
494
495[+] Subdomain: sapanca.meb.gov.tr
496[-] IP: 212.175.132.142
497
498[+] Subdomain: foca.meb.gov.tr
499[-] IP: 212.175.132.142
500
501[+] Subdomain: akcakoca.meb.gov.tr
502[-] IP: 212.175.132.136
503
504[+] Subdomain: kaynarca.meb.gov.tr
505[-] IP: 212.175.132.142
506
507[+] Subdomain: cukurca.meb.gov.tr
508[-] IP: 212.175.132.141
509
510[+] Subdomain: datca.meb.gov.tr
511[-] IP: 212.175.132.142
512
513[+] Subdomain: buca.meb.gov.tr
514[-] IP: 212.175.132.142
515
516[+] Subdomain: kumluca.meb.gov.tr
517[-] IP: 212.175.132.139
518
519[+] Subdomain: tuzluca.meb.gov.tr
520[-] IP: 212.175.132.141
521
522[+] Subdomain: bozcaada.meb.gov.tr
523[-] IP: 212.175.132.139
524
525[+] Subdomain: gokceada.meb.gov.tr
526[-] IP: 212.175.132.140
527
528[+] Subdomain: sanliurfa.meb.gov.tr
529[-] IP: 212.175.132.134
530
531[+] Subdomain: yenicaga.meb.gov.tr
532[-] IP: 212.175.132.140
533
534[+] Subdomain: aliaga.meb.gov.tr
535[-] IP: 212.175.132.140
536
537[+] Subdomain: biga.meb.gov.tr
538[-] IP: 212.175.132.139
539
540[+] Subdomain: dodurga.meb.gov.tr
541[-] IP: 212.175.132.140
542
543[+] Subdomain: karsiyaka.meb.gov.tr
544[-] IP: 212.175.132.142
545
546[+] Subdomain: akyaka.meb.gov.tr
547[-] IP: 212.175.132.142
548
549[+] Subdomain: golyaka.meb.gov.tr
550[-] IP: 212.175.132.136
551
552[+] Subdomain: borcka.meb.gov.tr
553[-] IP: 212.175.132.139
554
555[+] Subdomain: sertifika.meb.gov.tr
556[-] IP: 95.0.196.42
557
558[+] Subdomain: bala.meb.gov.tr
559[-] IP: 212.175.132.139
560
561[+] Subdomain: mugla.meb.gov.tr
562[-] IP: 212.175.132.134
563
564[+] Subdomain: kodlamugla.meb.gov.tr
565[-] IP: 212.175.132.134
566
567[+] Subdomain: urla.meb.gov.tr
568[-] IP: 212.175.132.142
569
570[+] Subdomain: akkisla.meb.gov.tr
571[-] IP: 212.175.132.142
572
573[+] Subdomain: sarkisla.meb.gov.tr
574[-] IP: 212.175.132.136
575
576[+] Subdomain: ulukisla.meb.gov.tr
577[-] IP: 212.175.132.142
578
579[+] Subdomain: ula.meb.gov.tr
580[-] IP: 212.175.132.142
581
582[+] Subdomain: kula.meb.gov.tr
583[-] IP: 212.175.132.141
584
585[+] Subdomain: haydikizlarokula.meb.gov.tr
586[-] IP: 212.175.132.140
587
588[+] Subdomain: camliyayla.meb.gov.tr
589[-] IP: 212.175.132.141
590
591[+] Subdomain: basyayla.meb.gov.tr
592[-] IP: 212.175.132.141
593
594[+] Subdomain: tuzla.meb.gov.tr
595[-] IP: 212.175.132.142
596
597[+] Subdomain: bergama.meb.gov.tr
598[-] IP: 212.175.132.142
599
600[+] Subdomain: atama.meb.gov.tr
601[-] IP: 212.174.189.125
602
603[+] Subdomain: ilkatama.meb.gov.tr
604[-] IP: 95.0.196.73
605
606[+] Subdomain: soma.meb.gov.tr
607[-] IP: 212.175.132.141
608
609[+] Subdomain: bandirma.meb.gov.tr
610[-] IP: 212.175.132.139
611
612[+] Subdomain: caycuma.meb.gov.tr
613[-] IP: 212.175.132.136
614
615[+] Subdomain: okuma-yazma.meb.gov.tr
616[-] IP: 212.175.132.137
617
618[+] Subdomain: adana.meb.gov.tr
619[-] IP: 212.175.132.132
620
621[+] Subdomain: haymana.meb.gov.tr
622[-] IP: 212.175.132.139
623
624[+] Subdomain: astana.meb.gov.tr
625[-] IP: 212.175.132.137
626
627[+] Subdomain: saraybosna.meb.gov.tr
628[-] IP: 212.175.132.137
629
630[+] Subdomain: aoa.meb.gov.tr
631[-] IP: 212.175.132.137
632
633[+] Subdomain: gsoa.meb.gov.tr
634[-] IP: 95.0.196.28
635
636[+] Subdomain: aslanapa.meb.gov.tr
637[-] IP: 212.175.132.142
638
639[+] Subdomain: hopa.meb.gov.tr
640[-] IP: 212.175.132.139
641
642[+] Subdomain: malkara.meb.gov.tr
643[-] IP: 212.175.132.136
644
645[+] Subdomain: ankara.meb.gov.tr
646[-] IP: 212.175.132.134
647
648[+] Subdomain: metefankara.meb.gov.tr
649[-] IP: 212.175.132.136
650
651[+] Subdomain: megepankara.meb.gov.tr
652[-] IP: 212.175.132.136
653
654[+] Subdomain: caykara.meb.gov.tr
655[-] IP: 212.175.132.136
656
657[+] Subdomain: marmara.meb.gov.tr
658[-] IP: 212.175.132.139
659
660[+] Subdomain: golmarmara.meb.gov.tr
661[-] IP: 212.175.132.142
662
663[+] Subdomain: alucra.meb.gov.tr
664[-] IP: 212.175.132.141
665
666[+] Subdomain: bafra.meb.gov.tr
667[-] IP: 212.175.132.142
668
669[+] Subdomain: kandira.meb.gov.tr
670[-] IP: 212.175.132.140
671
672[+] Subdomain: yomra.meb.gov.tr
673[-] IP: 212.175.132.136
674
675[+] Subdomain: cumra.meb.gov.tr
676[-] IP: 212.175.132.140
677
678[+] Subdomain: kemalpasa.meb.gov.tr
679[-] IP: 212.175.132.142
680
681[+] Subdomain: mustafakemalpasa.meb.gov.tr
682[-] IP: 212.175.132.140
683
684[+] Subdomain: bayrampasa.meb.gov.tr
685[-] IP: 212.175.132.142
686
687[+] Subdomain: gaziosmanpasa.meb.gov.tr
688[-] IP: 212.175.132.140
689
690[+] Subdomain: sinanpasa.meb.gov.tr
691[-] IP: 212.175.132.139
692
693[+] Subdomain: muratpasa.meb.gov.tr
694[-] IP: 212.175.132.139
695
696[+] Subdomain: manisa.meb.gov.tr
697[-] IP: 212.175.132.133
698
699[+] Subdomain: lefkosa.meb.gov.tr
700[-] IP: 212.175.132.137
701
702[+] Subdomain: bursa.meb.gov.tr
703[-] IP: 212.175.132.132
704
705[+] Subdomain: hassa.meb.gov.tr
706[-] IP: 212.175.132.141
707
708[+] Subdomain: fatsa.meb.gov.tr
709[-] IP: 212.175.132.141
710
711[+] Subdomain: havsa.meb.gov.tr
712[-] IP: 212.175.132.140
713
714[+] Subdomain: kahta.meb.gov.tr
715[-] IP: 212.175.132.139
716
717[+] Subdomain: isparta.meb.gov.tr
718[-] IP: 212.175.132.133
719
720[+] Subdomain: orta.meb.gov.tr
721[-] IP: 212.175.132.140
722
723[+] Subdomain: eposta.meb.gov.tr
724[-] IP: 212.174.176.1
725
726[+] Subdomain: pop3.eposta.meb.gov.tr
727[-] IP: 212.174.176.2
728
729[+] Subdomain: smtp.eposta.meb.gov.tr
730[-] IP: 212.174.176.3
731
732[+] Subdomain: selfservis.eposta.meb.gov.tr
733[-] IP: 212.174.176.5
734
735[+] Subdomain: balcova.meb.gov.tr
736[-] IP: 212.175.132.140
737
738[+] Subdomain: karliova.meb.gov.tr
739[-] IP: 212.175.132.139
740
741[+] Subdomain: incirliova.meb.gov.tr
742[-] IP: 212.175.132.139
743
744[+] Subdomain: yuksekova.meb.gov.tr
745[-] IP: 212.175.132.141
746
747[+] Subdomain: yesilova.meb.gov.tr
748[-] IP: 212.175.132.140
749
750[+] Subdomain: golova.meb.gov.tr
751[-] IP: 212.175.132.141
752
753[+] Subdomain: altinova.meb.gov.tr
754[-] IP: 212.175.132.136
755
756[+] Subdomain: bornova.meb.gov.tr
757[-] IP: 212.175.132.142
758
759[+] Subdomain: cayirova.meb.gov.tr
760[-] IP: 212.175.132.140
761
762[+] Subdomain: tasova.meb.gov.tr
763[-] IP: 212.175.132.139
764
765[+] Subdomain: gumusova.meb.gov.tr
766[-] IP: 212.175.132.136
767
768[+] Subdomain: artova.meb.gov.tr
769[-] IP: 212.175.132.141
770
771[+] Subdomain: suluova.meb.gov.tr
772[-] IP: 212.175.132.139
773
774[+] Subdomain: bozova.meb.gov.tr
775[-] IP: 212.175.132.141
776
777[+] Subdomain: alacakaya.meb.gov.tr
778[-] IP: 212.175.132.141
779
780[+] Subdomain: saricakaya.meb.gov.tr
781[-] IP: 212.175.132.140
782
783[+] Subdomain: sarikaya.meb.gov.tr
784[-] IP: 212.175.132.141
785
786[+] Subdomain: cankaya.meb.gov.tr
787[-] IP: 212.175.132.139
788
789[+] Subdomain: senkaya.meb.gov.tr
790[-] IP: 212.175.132.141
791
792[+] Subdomain: kutahya.meb.gov.tr
793[-] IP: 212.175.132.133
794
795[+] Subdomain: antakya.meb.gov.tr
796[-] IP: 212.175.132.137
797
798[+] Subdomain: balya.meb.gov.tr
799[-] IP: 212.175.132.139
800
801[+] Subdomain: antalya.meb.gov.tr
802[-] IP: 212.175.132.132
803
804[+] Subdomain: mudanya.meb.gov.tr
805[-] IP: 212.175.132.140
806
807[+] Subdomain: alanya.meb.gov.tr
808[-] IP: 212.175.132.139
809
810[+] Subdomain: konya.meb.gov.tr
811[-] IP: 212.175.132.133
812
813[+] Subdomain: tonya.meb.gov.tr
814[-] IP: 212.175.132.141
815
816[+] Subdomain: sakarya.meb.gov.tr
817[-] IP: 212.175.132.134
818
819[+] Subdomain: amasya.meb.gov.tr
820[-] IP: 212.175.132.132
821
822[+] Subdomain: tosya.meb.gov.tr
823[-] IP: 212.175.132.142
824
825[+] Subdomain: malatya.meb.gov.tr
826[-] IP: 212.175.132.133
827
828[+] Subdomain: papatya.meb.gov.tr
829[-] IP: 212.174.189.114
830
831[+] Subdomain: ortakhafiza.meb.gov.tr
832[-] IP: 85.111.38.118
833
834[+] Subdomain: havza.meb.gov.tr
835[-] IP: 212.175.132.136
836
837[+] Subdomain: fenlab.meb.gov.tr
838[-] IP: 212.175.170.110
839
840[+] Subdomain: eaddb.meb.gov.tr
841[-] IP: 212.175.132.131
842
843[+] Subdomain: cedb.meb.gov.tr
844[-] IP: 212.175.132.131
845
846[+] Subdomain: hedb.meb.gov.tr
847[-] IP: 212.175.132.130
848
849[+] Subdomain: iedb.meb.gov.tr
850[-] IP: 212.175.132.131
851
852[+] Subdomain: bidb.meb.gov.tr
853[-] IP: 212.175.132.129
854
855[+] Subdomain: imdb.meb.gov.tr
856[-] IP: 212.175.132.130
857
858[+] Subdomain: sdb.meb.gov.tr
859[-] IP: 212.175.132.131
860
861[+] Subdomain: obydb.meb.gov.tr
862[-] IP: 212.175.132.131
863
864[+] Subdomain: aolweb.meb.gov.tr
865[-] IP: 212.175.170.107
866
867[+] Subdomain: iegb.meb.gov.tr
868[-] IP: 212.175.132.131
869
870[+] Subdomain: bigb.meb.gov.tr
871[-] IP: 212.175.132.129
872
873[+] Subdomain: sgb.meb.gov.tr
874[-] IP: 212.175.132.130
875
876[+] Subdomain: merkezisgb.meb.gov.tr
877[-] IP: 212.175.132.131
878
879[+] Subdomain: tkb.meb.gov.tr
880[-] IP: 212.175.132.130
881
882[+] Subdomain: ttkb.meb.gov.tr
883[-] IP: 212.175.132.131
884
885[+] Subdomain: sarkikaraagac.meb.gov.tr
886[-] IP: 212.175.132.140
887
888[+] Subdomain: kirkagac.meb.gov.tr
889[-] IP: 212.175.132.142
890
891[+] Subdomain: gulagac.meb.gov.tr
892[-] IP: 212.175.132.141
893
894[+] Subdomain: beyagac.meb.gov.tr
895[-] IP: 212.175.132.139
896
897[+] Subdomain: arac.meb.gov.tr
898[-] IP: 212.175.132.142
899
900[+] Subdomain: yalvac.meb.gov.tr
901[-] IP: 212.175.132.141
902
903[+] Subdomain: gomec.meb.gov.tr
904[-] IP: 212.175.132.139
905
906[+] Subdomain: bigadic.meb.gov.tr
907[-] IP: 212.175.132.139
908
909[+] Subdomain: ilic.meb.gov.tr
910[-] IP: 212.175.132.141
911
912[+] Subdomain: bayramic.meb.gov.tr
913[-] IP: 212.175.132.140
914
915[+] Subdomain: domanic.meb.gov.tr
916[-] IP: 212.175.132.142
917
918[+] Subdomain: meric.meb.gov.tr
919[-] IP: 212.175.132.140
920
921[+] Subdomain: genc.meb.gov.tr
922[-] IP: 212.175.132.139
923
924[+] Subdomain: reportsnc.meb.gov.tr
925[-] IP: 212.174.189.118
926
927[+] Subdomain: ardanuc.meb.gov.tr
928[-] IP: 212.175.132.139
929
930[+] Subdomain: sonuc.meb.gov.tr
931[-] IP: 95.0.196.204
932
933[+] Subdomain: suruc.meb.gov.tr
934[-] IP: 212.175.132.136
935
936[+] Subdomain: med.meb.gov.tr
937[-] IP: 212.175.132.137
938
939[+] Subdomain: uod.meb.gov.tr
940[-] IP: 212.175.170.124
941
942[+] Subdomain: eokulyd.meb.gov.tr
943[-] IP: 95.0.196.39
944
945[+] Subdomain: mebbisyd.meb.gov.tr
946[-] IP: 95.0.196.40
947
948[+] Subdomain: baae.meb.gov.tr
949[-] IP: 212.175.132.137
950
951[+] Subdomain: persembe.meb.gov.tr
952[-] IP: 212.175.132.141
953
954[+] Subdomain: kucukcekmece.meb.gov.tr
955[-] IP: 212.175.132.141
956
957[+] Subdomain: buyukcekmece.meb.gov.tr
958[-] IP: 212.175.132.141
959
960[+] Subdomain: bahce.meb.gov.tr
961[-] IP: 212.175.132.136
962
963[+] Subdomain: guzelbahce.meb.gov.tr
964[-] IP: 212.175.132.142
965
966[+] Subdomain: eurydice.meb.gov.tr
967[-] IP: 212.175.132.131
968
969[+] Subdomain: delice.meb.gov.tr
970[-] IP: 212.175.132.136
971
972[+] Subdomain: sivrice.meb.gov.tr
973[-] IP: 212.175.132.141
974
975[+] Subdomain: derince.meb.gov.tr
976[-] IP: 212.175.132.142
977
978[+] Subdomain: guce.meb.gov.tr
979[-] IP: 212.175.132.141
980
981[+] Subdomain: ikizce.meb.gov.tr
982[-] IP: 212.175.132.142
983
984[+] Subdomain: duzce.meb.gov.tr
985[-] IP: 212.175.132.138
986
987[+] Subdomain: cidde.meb.gov.tr
988[-] IP: 212.175.132.137
989
990[+] Subdomain: gerede.meb.gov.tr
991[-] IP: 212.175.132.140
992
993[+] Subdomain: nigde.meb.gov.tr
994[-] IP: 212.175.132.134
995
996[+] Subdomain: abide.meb.gov.tr
997[-] IP: 212.175.132.130
998
999[+] Subdomain: cide.meb.gov.tr
1000[-] IP: 212.175.132.142
1001
1002[+] Subdomain: darende.meb.gov.tr
1003[-] IP: 212.175.132.141
1004
1005[+] Subdomain: ankarahee.meb.gov.tr
1006[-] IP: 212.175.132.136
1007
1008[+] Subdomain: erzurumhee.meb.gov.tr
1009[-] IP: 212.175.132.140
1010
1011[+] Subdomain: mersinhee.meb.gov.tr
1012[-] IP: 212.175.132.136
1013
1014[+] Subdomain: yee.meb.gov.tr
1015[-] IP: 212.175.132.136
1016
1017[+] Subdomain: sanliurfaarge.meb.gov.tr
1018[-] IP: 212.175.132.134
1019
1020[+] Subdomain: muglaarge.meb.gov.tr
1021[-] IP: 212.175.132.134
1022
1023[+] Subdomain: adanaarge.meb.gov.tr
1024[-] IP: 212.175.132.132
1025
1026[+] Subdomain: ankaraarge.meb.gov.tr
1027[-] IP: 212.175.132.134
1028
1029[+] Subdomain: manisaarge.meb.gov.tr
1030[-] IP: 212.175.132.133
1031
1032[+] Subdomain: bursaarge.meb.gov.tr
1033[-] IP: 212.175.132.132
1034
1035[+] Subdomain: kutahyaarge.meb.gov.tr
1036[-] IP: 212.175.132.133
1037
1038[+] Subdomain: antalyaarge.meb.gov.tr
1039[-] IP: 212.175.132.132
1040
1041[+] Subdomain: konyaarge.meb.gov.tr
1042[-] IP: 212.175.132.133
1043
1044[+] Subdomain: sakaryaarge.meb.gov.tr
1045[-] IP: 212.175.132.134
1046
1047[+] Subdomain: amasyaarge.meb.gov.tr
1048[-] IP: 212.175.132.132
1049
1050[+] Subdomain: malatyaarge.meb.gov.tr
1051[-] IP: 212.175.132.133
1052
1053[+] Subdomain: canakkalearge.meb.gov.tr
1054[-] IP: 212.175.132.132
1055
1056[+] Subdomain: osmaniyearge.meb.gov.tr
1057[-] IP: 212.175.132.135
1058
1059[+] Subdomain: kocaeliarge.meb.gov.tr
1060[-] IP: 212.175.132.133
1061
1062[+] Subdomain: denizliarge.meb.gov.tr
1063[-] IP: 212.175.132.132
1064
1065[+] Subdomain: kayseriarge.meb.gov.tr
1066[-] IP: 212.175.132.133
1067
1068[+] Subdomain: usakarge.meb.gov.tr
1069[-] IP: 212.175.132.134
1070
1071[+] Subdomain: erzincanarge.meb.gov.tr
1072[-] IP: 212.175.132.133
1073
1074[+] Subdomain: batmanarge.meb.gov.tr
1075[-] IP: 212.175.132.138
1076
1077[+] Subdomain: mardinarge.meb.gov.tr
1078[-] IP: 212.175.132.134
1079
1080[+] Subdomain: aydinarge.meb.gov.tr
1081[-] IP: 212.175.132.132
1082
1083[+] Subdomain: trabzonarge.meb.gov.tr
1084[-] IP: 212.175.132.134
1085
1086[+] Subdomain: giresunarge.meb.gov.tr
1087[-] IP: 212.175.132.133
1088
1089[+] Subdomain: samsunarge.meb.gov.tr
1090[-] IP: 212.175.132.134
1091
1092[+] Subdomain: gazianteparge.meb.gov.tr
1093[-] IP: 212.175.132.133
1094
1095[+] Subdomain: kirsehirarge.meb.gov.tr
1096[-] IP: 212.175.132.133
1097
1098[+] Subdomain: izmirarge.meb.gov.tr
1099[-] IP: 212.175.132.133
1100
1101[+] Subdomain: balikesirarge.meb.gov.tr
1102[-] IP: 212.175.132.132
1103
1104[+] Subdomain: burdurarge.meb.gov.tr
1105[-] IP: 212.175.132.132
1106
1107[+] Subdomain: kmarasarge.meb.gov.tr
1108[-] IP: 212.175.132.134
1109
1110[+] Subdomain: sivasarge.meb.gov.tr
1111[-] IP: 212.175.132.134
1112
1113[+] Subdomain: bitlisarge.meb.gov.tr
1114[-] IP: 212.175.132.132
1115
1116[+] Subdomain: yozgatarge.meb.gov.tr
1117[-] IP: 212.175.132.134
1118
1119[+] Subdomain: tokatarge.meb.gov.tr
1120[-] IP: 212.175.132.134
1121
1122[+] Subdomain: orduarge.meb.gov.tr
1123[-] IP: 212.175.132.134
1124
1125[+] Subdomain: boluarge.meb.gov.tr
1126[-] IP: 212.175.132.132
1127
1128[+] Subdomain: kastamonuarge.meb.gov.tr
1129[-] IP: 212.175.132.133
1130
1131[+] Subdomain: hatayarge.meb.gov.tr
1132[-] IP: 212.175.132.133
1133
1134[+] Subdomain: karlsruhe.meb.gov.tr
1135[-] IP: 212.175.132.137
1136
1137[+] Subdomain: yetiskinproje.meb.gov.tr
1138[-] IP: 212.175.132.137
1139
1140[+] Subdomain: feke.meb.gov.tr
1141[-] IP: 212.175.132.139
1142
1143[+] Subdomain: silifke.meb.gov.tr
1144[-] IP: 212.175.132.141
1145
1146[+] Subdomain: finike.meb.gov.tr
1147[-] IP: 212.175.132.139
1148
1149[+] Subdomain: akcakale.meb.gov.tr
1150[-] IP: 212.175.132.136
1151
1152[+] Subdomain: canakkale.meb.gov.tr
1153[-] IP: 212.175.132.132
1154
1155[+] Subdomain: toprakkale.meb.gov.tr
1156[-] IP: 212.175.132.136
1157
1158[+] Subdomain: kirikkale.meb.gov.tr
1159[-] IP: 212.175.132.133
1160
1161[+] Subdomain: askale.meb.gov.tr
1162[-] IP: 212.175.132.141
1163
1164[+] Subdomain: baskale.meb.gov.tr
1165[-] IP: 212.175.132.136
1166
1167[+] Subdomain: bogazkale.meb.gov.tr
1168[-] IP: 212.175.132.139
1169
1170[+] Subdomain: basiskele.meb.gov.tr
1171[-] IP: 212.175.132.142
1172
1173[+] Subdomain: gorele.meb.gov.tr
1174[-] IP: 212.175.132.140
1175
1176[+] Subdomain: sile.meb.gov.tr
1177[-] IP: 212.175.132.142
1178
1179[+] Subdomain: kurucasile.meb.gov.tr
1180[-] IP: 212.175.132.136
1181
1182[+] Subdomain: yenimahalle.meb.gov.tr
1183[-] IP: 212.175.132.139
1184
1185[+] Subdomain: gole.meb.gov.tr
1186[-] IP: 212.175.132.141
1187
1188[+] Subdomain: deneme.meb.gov.tr
1189[-] IP: 212.174.189.110
1190
1191[+] Subdomain: heryerdeogrenme.meb.gov.tr
1192[-] IP: 212.175.132.137
1193
1194[+] Subdomain: bilgiedinme.meb.gov.tr
1195[-] IP: 212.175.170.115
1196
1197[+] Subdomain: ozdegerlendirme.meb.gov.tr
1198[-] IP: 212.175.132.138
1199
1200[+] Subdomain: esme.meb.gov.tr
1201[-] IP: 212.175.132.141
1202
1203[+] Subdomain: saphane.meb.gov.tr
1204[-] IP: 212.175.132.142
1205
1206[+] Subdomain: kutuphane.meb.gov.tr
1207[-] IP: 95.0.196.59
1208
1209[+] Subdomain: e-kutuphane.meb.gov.tr
1210[-] IP: 95.0.196.61
1211
1212[+] Subdomain: gumushane.meb.gov.tr
1213[-] IP: 212.175.132.133
1214
1215[+] Subdomain: kagithane.meb.gov.tr
1216[-] IP: 212.175.132.140
1217
1218[+] Subdomain: surmene.meb.gov.tr
1219[-] IP: 212.175.132.136
1220
1221[+] Subdomain: defne.meb.gov.tr
1222[-] IP: 212.175.132.137
1223
1224[+] Subdomain: cine.meb.gov.tr
1225[-] IP: 212.175.132.139
1226
1227[+] Subdomain: ezine.meb.gov.tr
1228[-] IP: 212.175.132.139
1229
1230[+] Subdomain: edirne.meb.gov.tr
1231[-] IP: 212.175.132.132
1232
1233[+] Subdomain: sancaktepe.meb.gov.tr
1234[-] IP: 212.175.132.142
1235
1236[+] Subdomain: maltepe.meb.gov.tr
1237[-] IP: 212.175.132.142
1238
1239[+] Subdomain: kiziltepe.meb.gov.tr
1240[-] IP: 212.175.132.141
1241
1242[+] Subdomain: gurgentepe.meb.gov.tr
1243[-] IP: 212.175.132.142
1244
1245[+] Subdomain: aydintepe.meb.gov.tr
1246[-] IP: 212.175.132.136
1247
1248[+] Subdomain: kartepe.meb.gov.tr
1249[-] IP: 212.175.132.142
1250
1251[+] Subdomain: savastepe.meb.gov.tr
1252[-] IP: 212.175.132.139
1253
1254[+] Subdomain: boztepe.meb.gov.tr
1255[-] IP: 212.175.132.142
1256
1257[+] Subdomain: yayladere.meb.gov.tr
1258[-] IP: 212.175.132.139
1259
1260[+] Subdomain: yaglidere.meb.gov.tr
1261[-] IP: 212.175.132.141
1262
1263[+] Subdomain: kavaklidere.meb.gov.tr
1264[-] IP: 212.175.132.142
1265
1266[+] Subdomain: narlidere.meb.gov.tr
1267[-] IP: 212.175.132.142
1268
1269[+] Subdomain: iyidere.meb.gov.tr
1270[-] IP: 212.175.132.142
1271
1272[+] Subdomain: kalkandere.meb.gov.tr
1273[-] IP: 212.175.132.142
1274
1275[+] Subdomain: uzundere.meb.gov.tr
1276[-] IP: 212.175.132.141
1277
1278[+] Subdomain: ikizdere.meb.gov.tr
1279[-] IP: 212.175.132.142
1280
1281[+] Subdomain: tire.meb.gov.tr
1282[-] IP: 212.175.132.142
1283
1284[+] Subdomain: demre.meb.gov.tr
1285[-] IP: 212.175.132.139
1286
1287[+] Subdomain: yunusemre.meb.gov.tr
1288[-] IP: 212.175.132.137
1289
1290[+] Subdomain: kure.meb.gov.tr
1291[-] IP: 212.175.132.142
1292
1293[+] Subdomain: cizre.meb.gov.tr
1294[-] IP: 212.175.132.136
1295
1296[+] Subdomain: mentese.meb.gov.tr
1297[-] IP: 212.175.132.137
1298
1299[+] Subdomain: menekse.meb.gov.tr
1300[-] IP: 212.175.170.125
1301
1302[+] Subdomain: kose.meb.gov.tr
1303[-] IP: 212.175.132.141
1304
1305[+] Subdomain: ayse.meb.gov.tr
1306[-] IP: 212.175.132.129
1307
1308[+] Subdomain: mete.meb.gov.tr
1309[-] IP: 212.175.132.137
1310
1311[+] Subdomain: geyve.meb.gov.tr
1312[-] IP: 212.175.132.142
1313
1314[+] Subdomain: eyyubiye.meb.gov.tr
1315[-] IP: 212.175.132.138
1316
1317[+] Subdomain: muradiye.meb.gov.tr
1318[-] IP: 212.175.132.141
1319
1320[+] Subdomain: resadiye.meb.gov.tr
1321[-] IP: 212.175.132.136
1322
1323[+] Subdomain: mahmudiye.meb.gov.tr
1324[-] IP: 212.175.132.141
1325
1326[+] Subdomain: mesudiye.meb.gov.tr
1327[-] IP: 212.175.132.142
1328
1329[+] Subdomain: arifiye.meb.gov.tr
1330[-] IP: 212.175.132.142
1331
1332[+] Subdomain: felahiye.meb.gov.tr
1333[-] IP: 212.175.132.140
1334
1335[+] Subdomain: islahiye.meb.gov.tr
1336[-] IP: 212.175.132.140
1337
1338[+] Subdomain: fethiye.meb.gov.tr
1339[-] IP: 212.175.132.142
1340
1341[+] Subdomain: kemaliye.meb.gov.tr
1342[-] IP: 212.175.132.141
1343
1344[+] Subdomain: haliliye.meb.gov.tr
1345[-] IP: 212.175.132.138
1346
1347[+] Subdomain: nazimiye.meb.gov.tr
1348[-] IP: 212.175.132.136
1349
1350[+] Subdomain: burhaniye.meb.gov.tr
1351[-] IP: 212.175.132.139
1352
1353[+] Subdomain: osmaniye.meb.gov.tr
1354[-] IP: 212.175.132.135
1355
1356[+] Subdomain: umraniye.meb.gov.tr
1357[-] IP: 212.175.132.142
1358
1359[+] Subdomain: ihsaniye.meb.gov.tr
1360[-] IP: 212.175.132.139
1361
1362[+] Subdomain: espiye.meb.gov.tr
1363[-] IP: 212.175.132.141
1364
1365[+] Subdomain: aziziye.meb.gov.tr
1366[-] IP: 212.175.132.141
1367
1368[+] Subdomain: gebze.meb.gov.tr
1369[-] IP: 212.175.132.142
1370
1371[+] Subdomain: rize.meb.gov.tr
1372[-] IP: 212.175.132.134
1373
1374[+] Subdomain: vize.meb.gov.tr
1375[-] IP: 212.175.132.142
1376
1377[+] Subdomain: gerze.meb.gov.tr
1378[-] IP: 212.175.132.136
1379
1380[+] Subdomain: samsunmaarif.meb.gov.tr
1381[-] IP: 212.175.132.134
1382
1383[+] Subdomain: of.meb.gov.tr
1384[-] IP: 212.175.132.141
1385
1386[+] Subdomain: dusseldorf.meb.gov.tr
1387[-] IP: 212.175.132.137
1388
1389[+] Subdomain: hasankeyf.meb.gov.tr
1390[-] IP: 212.175.132.136
1391
1392[+] Subdomain: babadag.meb.gov.tr
1393[-] IP: 212.175.132.140
1394
1395[+] Subdomain: akcadag.meb.gov.tr
1396[-] IP: 212.175.132.142
1397
1398[+] Subdomain: aladag.meb.gov.tr
1399[-] IP: 212.175.132.139
1400
1401[+] Subdomain: elmadag.meb.gov.tr
1402[-] IP: 212.175.132.139
1403
1404[+] Subdomain: samandag.meb.gov.tr
1405[-] IP: 212.175.132.141
1406
1407[+] Subdomain: altindag.meb.gov.tr
1408[-] IP: 212.175.132.139
1409
1410[+] Subdomain: tekirdag.meb.gov.tr
1411[-] IP: 212.175.132.134
1412
1413[+] Subdomain: emirdag.meb.gov.tr
1414[-] IP: 212.175.132.139
1415
1416[+] Subdomain: ugurludag.meb.gov.tr
1417[-] IP: 212.175.132.140
1418
1419[+] Subdomain: beydag.meb.gov.tr
1420[-] IP: 212.175.132.142
1421
1422[+] Subdomain: mesbilelazig.meb.gov.tr
1423[-] IP: 212.175.132.137
1424
1425[+] Subdomain: otmg.meb.gov.tr
1426[-] IP: 212.175.132.141
1427
1428[+] Subdomain: etwinning.meb.gov.tr
1429[-] IP: 85.111.38.122
1430
1431[+] Subdomain: hamburg.meb.gov.tr
1432[-] IP: 212.175.132.137
1433
1434[+] Subdomain: strazburg.meb.gov.tr
1435[-] IP: 212.175.132.136
1436
1437[+] Subdomain: adanaisg.meb.gov.tr
1438[-] IP: 212.175.132.132
1439
1440[+] Subdomain: ankaraisg.meb.gov.tr
1441[-] IP: 212.175.132.134
1442
1443[+] Subdomain: yalovaisg.meb.gov.tr
1444[-] IP: 212.175.132.132
1445
1446[+] Subdomain: kayseriisg.meb.gov.tr
1447[-] IP: 212.175.132.133
1448
1449[+] Subdomain: bingolisg.meb.gov.tr
1450[-] IP: 212.175.132.132
1451
1452[+] Subdomain: karamanisg.meb.gov.tr
1453[-] IP: 212.175.132.134
1454
1455[+] Subdomain: vanisg.meb.gov.tr
1456[-] IP: 212.175.132.134
1457
1458[+] Subdomain: mersinisg.meb.gov.tr
1459[-] IP: 212.175.132.133
1460
1461[+] Subdomain: samsunisg.meb.gov.tr
1462[-] IP: 212.175.132.134
1463
1464[+] Subdomain: kmarasisg.meb.gov.tr
1465[-] IP: 212.175.132.134
1466
1467[+] Subdomain: kastamonuisg.meb.gov.tr
1468[-] IP: 212.175.132.133
1469
1470[+] Subdomain: hatayisg.meb.gov.tr
1471[-] IP: 212.175.132.133
1472
1473[+] Subdomain: kemah.meb.gov.tr
1474[-] IP: 212.175.132.141
1475
1476[+] Subdomain: fatih.meb.gov.tr
1477[-] IP: 212.175.132.141
1478
1479[+] Subdomain: eruh.meb.gov.tr
1480[-] IP: 212.175.132.136
1481
1482[+] Subdomain: baliseyh.meb.gov.tr
1483[-] IP: 212.175.132.136
1484
1485[+] Subdomain: celebi.meb.gov.tr
1486[-] IP: 212.175.132.136
1487
1488[+] Subdomain: e-hizmetici.meb.gov.tr
1489[-] IP: 95.0.196.48
1490
1491[+] Subdomain: yonetici.meb.gov.tr
1492[-] IP: 95.0.196.82
1493
1494[+] Subdomain: duzici.meb.gov.tr
1495[-] IP: 212.175.132.136
1496
1497[+] Subdomain: basmakci.meb.gov.tr
1498[-] IP: 212.175.132.139
1499
1500[+] Subdomain: canakci.meb.gov.tr
1501[-] IP: 212.175.132.140
1502
1503[+] Subdomain: celtikci.meb.gov.tr
1504[-] IP: 212.175.132.139
1505
1506[+] Subdomain: ayranci.meb.gov.tr
1507[-] IP: 212.175.132.141
1508
1509[+] Subdomain: demirci.meb.gov.tr
1510[-] IP: 212.175.132.141
1511
1512[+] Subdomain: ibradi.meb.gov.tr
1513[-] IP: 212.175.132.139
1514
1515[+] Subdomain: merkezefendi.meb.gov.tr
1516[-] IP: 212.175.132.137
1517
1518[+] Subdomain: selendi.meb.gov.tr
1519[-] IP: 212.175.132.142
1520
1521[+] Subdomain: ivrindi.meb.gov.tr
1522[-] IP: 212.175.132.139
1523
1524[+] Subdomain: camardi.meb.gov.tr
1525[-] IP: 212.175.132.142
1526
1527[+] Subdomain: yayladagi.meb.gov.tr
1528[-] IP: 212.175.132.141
1529
1530[+] Subdomain: mazidagi.meb.gov.tr
1531[-] IP: 212.175.132.141
1532
1533[+] Subdomain: cicekdagi.meb.gov.tr
1534[-] IP: 212.175.132.142
1535
1536[+] Subdomain: sultandagi.meb.gov.tr
1537[-] IP: 212.175.132.139
1538
1539[+] Subdomain: nurdagi.meb.gov.tr
1540[-] IP: 212.175.132.141
1541
1542[+] Subdomain: kigi.meb.gov.tr
1543[-] IP: 212.175.132.139
1544
1545[+] Subdomain: balikesirbengi.meb.gov.tr
1546[-] IP: 212.175.132.132
1547
1548[+] Subdomain: kargi.meb.gov.tr
1549[-] IP: 212.175.132.140
1550
1551[+] Subdomain: sindirgi.meb.gov.tr
1552[-] IP: 212.175.132.139
1553
1554[+] Subdomain: akseki.meb.gov.tr
1555[-] IP: 212.175.132.139
1556
1557[+] Subdomain: lapseki.meb.gov.tr
1558[-] IP: 212.175.132.140
1559
1560[+] Subdomain: babaeski.meb.gov.tr
1561[-] IP: 212.175.132.142
1562
1563[+] Subdomain: mutki.meb.gov.tr
1564[-] IP: 212.175.132.140
1565
1566[+] Subdomain: kocaali.meb.gov.tr
1567[-] IP: 212.175.132.142
1568
1569[+] Subdomain: tasimali.meb.gov.tr
1570[-] IP: 95.0.196.97
1571
1572[+] Subdomain: elmali.meb.gov.tr
1573[-] IP: 212.175.132.139
1574
1575[+] Subdomain: karaisali.meb.gov.tr
1576[-] IP: 212.175.132.139
1577
1578[+] Subdomain: yahyali.meb.gov.tr
1579[-] IP: 212.175.132.142
1580
1581[+] Subdomain: gulyali.meb.gov.tr
1582[-] IP: 212.175.132.142
1583
1584[+] Subdomain: kocaeli.meb.gov.tr
1585[-] IP: 212.175.132.133
1586
1587[+] Subdomain: otlukbeli.meb.gov.tr
1588[-] IP: 212.175.132.141
1589
1590[+] Subdomain: tunceli.meb.gov.tr
1591[-] IP: 212.175.132.134
1592
1593[+] Subdomain: turkeli.meb.gov.tr
1594[-] IP: 212.175.132.136
1595
1596[+] Subdomain: cameli.meb.gov.tr
1597[-] IP: 212.175.132.140
1598
1599[+] Subdomain: orhaneli.meb.gov.tr
1600[-] IP: 212.175.132.140
1601
1602[+] Subdomain: osmaneli.meb.gov.tr
1603[-] IP: 212.175.132.139
1604
1605[+] Subdomain: kirklareli.meb.gov.tr
1606[-] IP: 212.175.132.133
1607
1608[+] Subdomain: dereli.meb.gov.tr
1609[-] IP: 212.175.132.141
1610
1611[+] Subdomain: korkuteli.meb.gov.tr
1612[-] IP: 212.175.132.139
1613
1614[+] Subdomain: develi.meb.gov.tr
1615[-] IP: 212.175.132.142
1616
1617[+] Subdomain: cayeli.meb.gov.tr
1618[-] IP: 212.175.132.142
1619
1620[+] Subdomain: yildizeli.meb.gov.tr
1621[-] IP: 212.175.132.136
1622
1623[+] Subdomain: oguzeli.meb.gov.tr
1624[-] IP: 212.175.132.140
1625
1626[+] Subdomain: yavuzeli.meb.gov.tr
1627[-] IP: 212.175.132.141
1628
1629[+] Subdomain: agli.meb.gov.tr
1630[-] IP: 212.175.132.142
1631
1632[+] Subdomain: cigli.meb.gov.tr
1633[-] IP: 212.175.132.142
1634
1635[+] Subdomain: salihli.meb.gov.tr
1636[-] IP: 212.175.132.142
1637
1638[+] Subdomain: karakecili.meb.gov.tr
1639[-] IP: 212.175.132.136
1640
1641[+] Subdomain: yenifakili.meb.gov.tr
1642[-] IP: 212.175.132.136
1643
1644[+] Subdomain: bahsili.meb.gov.tr
1645[-] IP: 212.175.132.136
1646
1647[+] Subdomain: adakli.meb.gov.tr
1648[-] IP: 212.175.132.139
1649
1650[+] Subdomain: arakli.meb.gov.tr
1651[-] IP: 212.175.132.141
1652
1653[+] Subdomain: tarakli.meb.gov.tr
1654[-] IP: 212.175.132.142
1655
1656[+] Subdomain: yaprakli.meb.gov.tr
1657[-] IP: 212.175.132.140
1658
1659[+] Subdomain: bayrakli.meb.gov.tr
1660[-] IP: 212.175.132.142
1661
1662[+] Subdomain: kozakli.meb.gov.tr
1663[-] IP: 212.175.132.142
1664
1665[+] Subdomain: sandikli.meb.gov.tr
1666[-] IP: 212.175.132.139
1667
1668[+] Subdomain: findikli.meb.gov.tr
1669[-] IP: 212.175.132.141
1670
1671[+] Subdomain: karahalli.meb.gov.tr
1672[-] IP: 212.175.132.141
1673
1674[+] Subdomain: bekilli.meb.gov.tr
1675[-] IP: 212.175.132.140
1676
1677[+] Subdomain: yesilli.meb.gov.tr
1678[-] IP: 212.175.132.142
1679
1680[+] Subdomain: nazilli.meb.gov.tr
1681[-] IP: 212.175.132.139
1682
1683[+] Subdomain: yenisarbademli.meb.gov.tr
1684[-] IP: 212.175.132.141
1685
1686[+] Subdomain: erdemli.meb.gov.tr
1687[-] IP: 212.175.132.141
1688
1689[+] Subdomain: cilimli.meb.gov.tr
1690[-] IP: 212.175.132.136
1691
1692[+] Subdomain: kilimli.meb.gov.tr
1693[-] IP: 212.175.132.140
1694
1695[+] Subdomain: saruhanli.meb.gov.tr
1696[-] IP: 212.175.132.142
1697
1698[+] Subdomain: reyhanli.meb.gov.tr
1699[-] IP: 212.175.132.141
1700
1701[+] Subdomain: karamanli.meb.gov.tr
1702[-] IP: 212.175.132.140
1703
1704[+] Subdomain: tavsanli.meb.gov.tr
1705[-] IP: 212.175.132.141
1706
1707[+] Subdomain: semdinli.meb.gov.tr
1708[-] IP: 212.175.132.141
1709
1710[+] Subdomain: alapli.meb.gov.tr
1711[-] IP: 212.175.132.141
1712
1713[+] Subdomain: kocarli.meb.gov.tr
1714[-] IP: 212.175.132.139
1715
1716[+] Subdomain: omerli.meb.gov.tr
1717[-] IP: 212.175.132.142
1718
1719[+] Subdomain: cayirli.meb.gov.tr
1720[-] IP: 212.175.132.140
1721
1722[+] Subdomain: kaynasli.meb.gov.tr
1723[-] IP: 212.175.132.136
1724
1725[+] Subdomain: sivasli.meb.gov.tr
1726[-] IP: 212.175.132.136
1727
1728[+] Subdomain: sisli.meb.gov.tr
1729[-] IP: 212.175.132.142
1730
1731[+] Subdomain: sefaatli.meb.gov.tr
1732[-] IP: 212.175.132.136
1733
1734[+] Subdomain: polatli.meb.gov.tr
1735[-] IP: 212.175.132.139
1736
1737[+] Subdomain: muratli.meb.gov.tr
1738[-] IP: 212.175.132.136
1739
1740[+] Subdomain: ahmetli.meb.gov.tr
1741[-] IP: 212.175.132.142
1742
1743[+] Subdomain: mezitli.meb.gov.tr
1744[-] IP: 212.175.132.141
1745
1746[+] Subdomain: musabeyli.meb.gov.tr
1747[-] IP: 212.175.132.136
1748
1749[+] Subdomain: elbeyli.meb.gov.tr
1750[-] IP: 212.175.132.136
1751
1752[+] Subdomain: saimbeyli.meb.gov.tr
1753[-] IP: 212.175.132.139
1754
1755[+] Subdomain: tufanbeyli.meb.gov.tr
1756[-] IP: 212.175.132.139
1757
1758[+] Subdomain: cihanbeyli.meb.gov.tr
1759[-] IP: 212.175.132.142
1760
1761[+] Subdomain: hasanbeyli.meb.gov.tr
1762[-] IP: 212.175.132.136
1763
1764[+] Subdomain: sultanbeyli.meb.gov.tr
1765[-] IP: 212.175.132.140
1766
1767[+] Subdomain: denizli.meb.gov.tr
1768[-] IP: 212.175.132.132
1769
1770[+] Subdomain: ferizli.meb.gov.tr
1771[-] IP: 212.175.132.141
1772
1773[+] Subdomain: ogrenciprogrami.meb.gov.tr
1774[-] IP: 212.175.132.136
1775
1776[+] Subdomain: ogretmenprogrami.meb.gov.tr
1777[-] IP: 212.175.132.136
1778
1779[+] Subdomain: akademi.meb.gov.tr
1780[-] IP: 95.0.196.140
1781
1782[+] Subdomain: dinogretimi.meb.gov.tr
1783[-] IP: 212.175.132.130
1784
1785[+] Subdomain: aileegitimi.meb.gov.tr
1786[-] IP: 212.175.132.137
1787
1788[+] Subdomain: kizlarinegitimi.meb.gov.tr
1789[-] IP: 212.175.132.137
1790
1791[+] Subdomain: okultabanliafetegitimi.meb.gov.tr
1792[-] IP: 212.175.132.137
1793
1794[+] Subdomain: ergani.meb.gov.tr
1795[-] IP: 212.175.132.141
1796
1797[+] Subdomain: hani.meb.gov.tr
1798[-] IP: 212.175.132.139
1799
1800[+] Subdomain: kadinhani.meb.gov.tr
1801[-] IP: 212.175.132.142
1802
1803[+] Subdomain: devrekani.meb.gov.tr
1804[-] IP: 212.175.132.142
1805
1806[+] Subdomain: eflani.meb.gov.tr
1807[-] IP: 212.175.132.141
1808
1809[+] Subdomain: simdiokumazamani.meb.gov.tr
1810[-] IP: 212.175.132.140
1811
1812[+] Subdomain: akdagmadeni.meb.gov.tr
1813[-] IP: 212.175.132.141
1814
1815[+] Subdomain: tefenni.meb.gov.tr
1816[-] IP: 212.175.132.140
1817
1818[+] Subdomain: besni.meb.gov.tr
1819[-] IP: 212.175.132.139
1820
1821[+] Subdomain: silopi.meb.gov.tr
1822[-] IP: 212.175.132.136
1823
1824[+] Subdomain: hakkari.meb.gov.tr
1825[-] IP: 212.175.132.133
1826
1827[+] Subdomain: kulturyayinlari.meb.gov.tr
1828[-] IP: 95.0.196.45
1829
1830[+] Subdomain: adapazari.meb.gov.tr
1831[-] IP: 212.175.132.142
1832
1833[+] Subdomain: derepazari.meb.gov.tr
1834[-] IP: 212.175.132.142
1835
1836[+] Subdomain: salipazari.meb.gov.tr
1837[-] IP: 212.175.132.136
1838
1839[+] Subdomain: dernekpazari.meb.gov.tr
1840[-] IP: 212.175.132.136
1841
1842[+] Subdomain: salpazari.meb.gov.tr
1843[-] IP: 212.175.132.136
1844
1845[+] Subdomain: golpazari.meb.gov.tr
1846[-] IP: 212.175.132.139
1847
1848[+] Subdomain: odunpazari.meb.gov.tr
1849[-] IP: 212.175.132.140
1850
1851[+] Subdomain: beypazari.meb.gov.tr
1852[-] IP: 212.175.132.139
1853
1854[+] Subdomain: kultureserleri.meb.gov.tr
1855[-] IP: 185.86.7.24
1856
1857[+] Subdomain: kayseri.meb.gov.tr
1858[-] IP: 212.175.132.133
1859
1860[+] Subdomain: veri.meb.gov.tr
1861[-] IP: 95.0.196.38
1862
1863[+] Subdomain: cumayeri.meb.gov.tr
1864[-] IP: 212.175.132.141
1865
1866[+] Subdomain: pazaryeri.meb.gov.tr
1867[-] IP: 212.175.132.139
1868
1869[+] Subdomain: agri.meb.gov.tr
1870[-] IP: 212.175.132.132
1871
1872[+] Subdomain: kadisehri.meb.gov.tr
1873[-] IP: 212.175.132.136
1874
1875[+] Subdomain: susehri.meb.gov.tr
1876[-] IP: 212.175.132.136
1877
1878[+] Subdomain: cankiri.meb.gov.tr
1879[-] IP: 212.175.132.132
1880
1881[+] Subdomain: besiri.meb.gov.tr
1882[-] IP: 212.175.132.141
1883
1884[+] Subdomain: silivri.meb.gov.tr
1885[-] IP: 212.175.132.141
1886
1887[+] Subdomain: tepebasi.meb.gov.tr
1888[-] IP: 212.175.132.140
1889
1890[+] Subdomain: carsibasi.meb.gov.tr
1891[-] IP: 212.175.132.136
1892
1893[+] Subdomain: caybasi.meb.gov.tr
1894[-] IP: 212.175.132.141
1895
1896[+] Subdomain: kusadasi.meb.gov.tr
1897[-] IP: 212.175.132.139
1898
1899[+] Subdomain: yardimmasasi.meb.gov.tr
1900[-] IP: 95.0.196.86
1901
1902[+] Subdomain: meslekiegitimharitasi.meb.gov.tr
1903[-] IP: 212.175.132.130
1904
1905[+] Subdomain: dilovasi.meb.gov.tr
1906[-] IP: 212.175.132.140
1907
1908[+] Subdomain: fatihprojesi.meb.gov.tr
1909[-] IP: 85.111.38.120
1910
1911[+] Subdomain: siddetinonlenmesi.meb.gov.tr
1912[-] IP: 212.175.132.137
1913
1914[+] Subdomain: karesi.meb.gov.tr
1915[-] IP: 212.175.132.137
1916
1917[+] Subdomain: sariyahsi.meb.gov.tr
1918[-] IP: 212.175.132.141
1919
1920[+] Subdomain: aokyurtdisi.meb.gov.tr
1921[-] IP: 212.175.132.137
1922
1923[+] Subdomain: marmaraereglisi.meb.gov.tr
1924[-] IP: 212.175.132.141
1925
1926[+] Subdomain: halfeti.meb.gov.tr
1927[-] IP: 212.175.132.136
1928
1929[+] Subdomain: konyaalti.meb.gov.tr
1930[-] IP: 212.175.132.139
1931
1932[+] Subdomain: dosemealti.meb.gov.tr
1933[-] IP: 212.175.132.139
1934
1935[+] Subdomain: fenlabtoplanti.meb.gov.tr
1936[-] IP: 212.175.170.114
1937
1938[+] Subdomain: aybasti.meb.gov.tr
1939[-] IP: 212.175.132.142
1940
1941[+] Subdomain: arhavi.meb.gov.tr
1942[-] IP: 212.175.132.139
1943
1944[+] Subdomain: otlukbeliogretmenevi.meb.gov.tr
1945[-] IP: 212.175.132.137
1946
1947[+] Subdomain: baskentogretmenevi.meb.gov.tr
1948[-] IP: 212.175.132.137
1949
1950[+] Subdomain: melikgazi.meb.gov.tr
1951[-] IP: 212.175.132.140
1952
1953[+] Subdomain: mihalgazi.meb.gov.tr
1954[-] IP: 212.175.132.141
1955
1956[+] Subdomain: battalgazi.meb.gov.tr
1957[-] IP: 212.175.132.141
1958
1959[+] Subdomain: orhangazi.meb.gov.tr
1960[-] IP: 212.175.132.140
1961
1962[+] Subdomain: osmangazi.meb.gov.tr
1963[-] IP: 212.175.132.139
1964
1965[+] Subdomain: ihsangazi.meb.gov.tr
1966[-] IP: 212.175.132.140
1967
1968[+] Subdomain: sultangazi.meb.gov.tr
1969[-] IP: 212.175.132.142
1970
1971[+] Subdomain: emirgazi.meb.gov.tr
1972[-] IP: 212.175.132.142
1973
1974[+] Subdomain: seyitgazi.meb.gov.tr
1975[-] IP: 212.175.132.141
1976
1977[+] Subdomain: karayazi.meb.gov.tr
1978[-] IP: 212.175.132.140
1979
1980[+] Subdomain: akyazi.meb.gov.tr
1981[-] IP: 212.175.132.142
1982
1983[+] Subdomain: bozyazi.meb.gov.tr
1984[-] IP: 212.175.132.141
1985
1986[+] Subdomain: bulancak.meb.gov.tr
1987[-] IP: 212.175.132.141
1988
1989[+] Subdomain: kuluncak.meb.gov.tr
1990[-] IP: 212.175.132.142
1991
1992[+] Subdomain: bucak.meb.gov.tr
1993[-] IP: 212.175.132.139
1994
1995[+] Subdomain: derebucak.meb.gov.tr
1996[-] IP: 212.175.132.142
1997
1998[+] Subdomain: kuyucak.meb.gov.tr
1999[-] IP: 212.175.132.139
2000
2001[+] Subdomain: cardak.meb.gov.tr
2002[-] IP: 212.175.132.139
2003
2004[+] Subdomain: mamak.meb.gov.tr
2005[-] IP: 212.175.132.139
2006
2007[+] Subdomain: kizilirmak.meb.gov.tr
2008[-] IP: 212.175.132.140
2009
2010[+] Subdomain: guroymak.meb.gov.tr
2011[-] IP: 212.175.132.139
2012
2013[+] Subdomain: hanak.meb.gov.tr
2014[-] IP: 212.175.132.136
2015
2016[+] Subdomain: konak.meb.gov.tr
2017[-] IP: 212.175.132.142
2018
2019[+] Subdomain: guclukonak.meb.gov.tr
2020[-] IP: 212.175.132.136
2021
2022[+] Subdomain: sirnak.meb.gov.tr
2023[-] IP: 212.175.132.133
2024
2025[+] Subdomain: yunak.meb.gov.tr
2026[-] IP: 212.175.132.140
2027
2028[+] Subdomain: usak.meb.gov.tr
2029[-] IP: 212.175.132.134
2030
2031[+] Subdomain: catak.meb.gov.tr
2032[-] IP: 212.175.132.136
2033
2034[+] Subdomain: tubitak.meb.gov.tr
2035[-] IP: 212.175.170.97
2036
2037[+] Subdomain: tutak.meb.gov.tr
2038[-] IP: 212.175.132.139
2039
2040[+] Subdomain: kavak.meb.gov.tr
2041[-] IP: 212.175.132.136
2042
2043[+] Subdomain: karapurcek.meb.gov.tr
2044[-] IP: 212.175.132.142
2045
2046[+] Subdomain: goynucek.meb.gov.tr
2047[-] IP: 212.175.132.139
2048
2049[+] Subdomain: hendek.meb.gov.tr
2050[-] IP: 212.175.132.142
2051
2052[+] Subdomain: erdek.meb.gov.tr
2053[-] IP: 212.175.132.139
2054
2055[+] Subdomain: erfelek.meb.gov.tr
2056[-] IP: 212.175.132.136
2057
2058[+] Subdomain: ermenek.meb.gov.tr
2059[-] IP: 212.175.132.141
2060
2061[+] Subdomain: cekerek.meb.gov.tr
2062[-] IP: 212.175.132.141
2063
2064[+] Subdomain: gemerek.meb.gov.tr
2065[-] IP: 212.175.132.136
2066
2067[+] Subdomain: siverek.meb.gov.tr
2068[-] IP: 212.175.132.141
2069
2070[+] Subdomain: devrek.meb.gov.tr
2071[-] IP: 212.175.132.136
2072
2073[+] Subdomain: metek.meb.gov.tr
2074[-] IP: 212.175.132.135
2075
2076[+] Subdomain: egitek.meb.gov.tr
2077[-] IP: 212.175.132.129
2078
2079[+] Subdomain: yegitek.meb.gov.tr
2080[-] IP: 212.175.132.129
2081
2082[+] Subdomain: pertek.meb.gov.tr
2083[-] IP: 212.175.132.136
2084
2085[+] Subdomain: egitimedestek.meb.gov.tr
2086[-] IP: 212.174.189.120
2087
2088[+] Subdomain: www.egitimedestek.meb.gov.tr
2089[-] IP: 212.174.189.120
2090
2091[+] Subdomain: cemisgezek.meb.gov.tr
2092[-] IP: 212.175.132.136
2093
2094[+] Subdomain: mihaliccik.meb.gov.tr
2095[-] IP: 212.175.132.140
2096
2097[+] Subdomain: kalecik.meb.gov.tr
2098[-] IP: 212.175.132.139
2099
2100[+] Subdomain: bilecik.meb.gov.tr
2101[-] IP: 212.175.132.132
2102
2103[+] Subdomain: birecik.meb.gov.tr
2104[-] IP: 212.175.132.136
2105
2106[+] Subdomain: harmancik.meb.gov.tr
2107[-] IP: 212.175.132.140
2108
2109[+] Subdomain: osmancik.meb.gov.tr
2110[-] IP: 212.175.132.139
2111
2112[+] Subdomain: ayancik.meb.gov.tr
2113[-] IP: 212.175.132.136
2114
2115[+] Subdomain: germencik.meb.gov.tr
2116[-] IP: 212.175.132.139
2117
2118[+] Subdomain: sincik.meb.gov.tr
2119[-] IP: 212.175.132.139
2120
2121[+] Subdomain: cinarcik.meb.gov.tr
2122[-] IP: 212.175.132.136
2123
2124[+] Subdomain: asarcik.meb.gov.tr
2125[-] IP: 212.175.132.142
2126
2127[+] Subdomain: pazarcik.meb.gov.tr
2128[-] IP: 212.175.132.142
2129
2130[+] Subdomain: kibriscik.meb.gov.tr
2131[-] IP: 212.175.132.140
2132
2133[+] Subdomain: ladik.meb.gov.tr
2134[-] IP: 212.175.132.136
2135
2136[+] Subdomain: pendik.meb.gov.tr
2137[-] IP: 212.175.132.141
2138
2139[+] Subdomain: nasilbasardik.meb.gov.tr
2140[-] IP: 212.175.132.137
2141
2142[+] Subdomain: hafik.meb.gov.tr
2143[-] IP: 212.175.132.136
2144
2145[+] Subdomain: aralik.meb.gov.tr
2146[-] IP: 212.175.132.141
2147
2148[+] Subdomain: yumurtalik.meb.gov.tr
2149[-] IP: 212.175.132.139
2150
2151[+] Subdomain: ayvalik.meb.gov.tr
2152[-] IP: 212.175.132.139
2153
2154[+] Subdomain: gemlik.meb.gov.tr
2155[-] IP: 212.175.132.140
2156
2157[+] Subdomain: ciftlik.meb.gov.tr
2158[-] IP: 212.175.132.142
2159
2160[+] Subdomain: basciftlik.meb.gov.tr
2161[-] IP: 212.175.132.136
2162
2163[+] Subdomain: cermik.meb.gov.tr
2164[-] IP: 212.175.132.140
2165
2166[+] Subdomain: canik.meb.gov.tr
2167[-] IP: 212.175.132.136
2168
2169[+] Subdomain: bulanik.meb.gov.tr
2170[-] IP: 212.175.132.142
2171
2172[+] Subdomain: kinik.meb.gov.tr
2173[-] IP: 212.175.132.140
2174
2175[+] Subdomain: iznik.meb.gov.tr
2176[-] IP: 212.175.132.140
2177
2178[+] Subdomain: derik.meb.gov.tr
2179[-] IP: 212.175.132.141
2180
2181[+] Subdomain: serik.meb.gov.tr
2182[-] IP: 212.175.132.139
2183
2184[+] Subdomain: etik.meb.gov.tr
2185[-] IP: 212.175.132.137
2186
2187[+] Subdomain: internetik.meb.gov.tr
2188[-] IP: 212.175.132.137
2189
2190[+] Subdomain: celtik.meb.gov.tr
2191[-] IP: 212.175.132.142
2192
2193[+] Subdomain: mebistatistik.meb.gov.tr
2194[-] IP: 95.0.196.193
2195
2196[+] Subdomain: aok.meb.gov.tr
2197[-] IP: 212.175.132.137
2198
2199[+] Subdomain: newyork.meb.gov.tr
2200[-] IP: 212.175.132.137
2201
2202[+] Subdomain: kosk.meb.gov.tr
2203[-] IP: 212.175.132.139
2204
2205[+] Subdomain: karabuk.meb.gov.tr
2206[-] IP: 212.175.132.131
2207
2208[+] Subdomain: cubuk.meb.gov.tr
2209[-] IP: 212.175.132.139
2210
2211[+] Subdomain: selcuk.meb.gov.tr
2212[-] IP: 212.175.132.140
2213
2214[+] Subdomain: golcuk.meb.gov.tr
2215[-] IP: 212.175.132.142
2216
2217[+] Subdomain: cocuk.meb.gov.tr
2218[-] IP: 85.111.38.120
2219
2220[+] Subdomain: camoluk.meb.gov.tr
2221[-] IP: 212.175.132.140
2222
2223[+] Subdomain: susurluk.meb.gov.tr
2224[-] IP: 212.175.132.139
2225
2226[+] Subdomain: kozluk.meb.gov.tr
2227[-] IP: 212.175.132.136
2228
2229[+] Subdomain: goynuk.meb.gov.tr
2230[-] IP: 212.175.132.140
2231
2232[+] Subdomain: huyuk.meb.gov.tr
2233[-] IP: 212.175.132.142
2234
2235[+] Subdomain: yalihuyuk.meb.gov.tr
2236[-] IP: 212.175.132.142
2237
2238[+] Subdomain: bozuyuk.meb.gov.tr
2239[-] IP: 212.175.132.139
2240
2241[+] Subdomain: cal.meb.gov.tr
2242[-] IP: 212.175.132.139
2243
2244[+] Subdomain: kangal.meb.gov.tr
2245[-] IP: 212.175.132.136
2246
2247[+] Subdomain: turhal.meb.gov.tr
2248[-] IP: 212.175.132.136
2249
2250[+] Subdomain: damal.meb.gov.tr
2251[-] IP: 212.175.132.136
2252
2253[+] Subdomain: termal.meb.gov.tr
2254[-] IP: 212.175.132.136
2255
2256[+] Subdomain: kartal.meb.gov.tr
2257[-] IP: 212.175.132.141
2258
2259[+] Subdomain: ogmmateryal.meb.gov.tr
2260[-] IP: 212.175.132.132
2261
2262[+] Subdomain: dogmmateryal.meb.gov.tr
2263[-] IP: 212.175.132.133
2264
2265[+] Subdomain: personel.meb.gov.tr
2266[-] IP: 212.175.132.129
2267
2268[+] Subdomain: bruksel.meb.gov.tr
2269[-] IP: 212.175.132.137
2270
2271[+] Subdomain: karamursel.meb.gov.tr
2272[-] IP: 212.175.132.140
2273
2274[+] Subdomain: kestel.meb.gov.tr
2275[-] IP: 212.175.132.140
2276
2277[+] Subdomain: e-ozel.meb.gov.tr
2278[-] IP: 95.0.196.228
2279
2280[+] Subdomain: aoihl.meb.gov.tr
2281[-] IP: 212.175.132.137
2282
2283[+] Subdomain: mesbil.meb.gov.tr
2284[-] IP: 212.175.132.136
2285
2286[+] Subdomain: idil.meb.gov.tr
2287[-] IP: 212.175.132.136
2288
2289[+] Subdomain: baskil.meb.gov.tr
2290[-] IP: 212.175.132.141
2291
2292[+] Subdomain: eskil.meb.gov.tr
2293[-] IP: 212.175.132.136
2294
2295[+] Subdomain: sehitkamil.meb.gov.tr
2296[-] IP: 212.175.132.140
2297
2298[+] Subdomain: bismil.meb.gov.tr
2299[-] IP: 212.175.132.140
2300
2301[+] Subdomain: civril.meb.gov.tr
2302[-] IP: 212.175.132.139
2303
2304[+] Subdomain: eynesil.meb.gov.tr
2305[-] IP: 212.175.132.140
2306
2307[+] Subdomain: aol.meb.gov.tr
2308[-] IP: 212.175.132.138
2309
2310[+] Subdomain: aolweb.aol.meb.gov.tr
2311[-] IP: 212.175.170.107
2312
2313[+] Subdomain: www.aol.meb.gov.tr
2314[-] IP: 212.175.132.138
2315
2316[+] Subdomain: maol.meb.gov.tr
2317[-] IP: 212.175.132.135
2318
2319[+] Subdomain: inegol.meb.gov.tr
2320[-] IP: 212.175.132.139
2321
2322[+] Subdomain: acigol.meb.gov.tr
2323[-] IP: 212.175.132.142
2324
2325[+] Subdomain: sarigol.meb.gov.tr
2326[-] IP: 212.175.132.141
2327
2328[+] Subdomain: bingol.meb.gov.tr
2329[-] IP: 212.175.132.132
2330
2331[+] Subdomain: hboprotokol.meb.gov.tr
2332[-] IP: 212.175.132.137
2333
2334[+] Subdomain: dortyol.meb.gov.tr
2335[-] IP: 212.175.132.140
2336
2337[+] Subdomain: sumbul.meb.gov.tr
2338[-] IP: 212.174.189.116
2339
2340[+] Subdomain: istanbul.meb.gov.tr
2341[-] IP: 212.175.132.135
2342
2343[+] Subdomain: megepistanbul.meb.gov.tr
2344[-] IP: 212.175.132.136
2345
2346[+] Subdomain: gudul.meb.gov.tr
2347[-] IP: 212.175.132.139
2348
2349[+] Subdomain: murgul.meb.gov.tr
2350[-] IP: 212.175.132.139
2351
2352[+] Subdomain: e-okul.meb.gov.tr
2353[-] IP: 212.175.170.97
2354
2355[+] Subdomain: eokul.meb.gov.tr
2356[-] IP: 212.175.170.97
2357
2358[+] Subdomain: m.eokul.meb.gov.tr
2359[-] IP: 95.0.196.157
2360
2361[+] Subdomain: torul.meb.gov.tr
2362[-] IP: 212.175.132.141
2363
2364[+] Subdomain: alacam.meb.gov.tr
2365[-] IP: 212.175.132.142
2366
2367[+] Subdomain: saricam.meb.gov.tr
2368[-] IP: 212.175.132.139
2369
2370[+] Subdomain: kizilcahamam.meb.gov.tr
2371[-] IP: 212.175.132.139
2372
2373[+] Subdomain: manisaram.meb.gov.tr
2374[-] IP: 212.175.132.136
2375
2376[+] Subdomain: meram.meb.gov.tr
2377[-] IP: 212.175.132.142
2378
2379[+] Subdomain: sincanram.meb.gov.tr
2380[-] IP: 212.175.132.137
2381
2382[+] Subdomain: sungurluram.meb.gov.tr
2383[-] IP: 212.175.132.140
2384
2385[+] Subdomain: kastamonuram.meb.gov.tr
2386[-] IP: 212.175.132.137
2387
2388[+] Subdomain: acipayam.meb.gov.tr
2389[-] IP: 212.175.132.140
2390
2391[+] Subdomain: odm.meb.gov.tr
2392[-] IP: 212.175.132.130
2393
2394[+] Subdomain: konyaodm.meb.gov.tr
2395[-] IP: 212.175.132.133
2396
2397[+] Subdomain: sakaryaodm.meb.gov.tr
2398[-] IP: 212.175.132.134
2399
2400[+] Subdomain: nigdeodm.meb.gov.tr
2401[-] IP: 212.175.132.134
2402
2403[+] Subdomain: edirneodm.meb.gov.tr
2404[-] IP: 212.175.132.132
2405
2406[+] Subdomain: usakodm.meb.gov.tr
2407[-] IP: 212.175.132.134
2408
2409[+] Subdomain: bilecikodm.meb.gov.tr
2410[-] IP: 212.175.132.132
2411
2412[+] Subdomain: karabukodm.meb.gov.tr
2413[-] IP: 212.175.132.131
2414
2415[+] Subdomain: bingolodm.meb.gov.tr
2416[-] IP: 212.175.132.132
2417
2418[+] Subdomain: erzincanodm.meb.gov.tr
2419[-] IP: 212.175.132.133
2420
2421[+] Subdomain: batmanodm.meb.gov.tr
2422[-] IP: 212.175.132.138
2423
2424[+] Subdomain: aydinodm.meb.gov.tr
2425[-] IP: 212.175.132.132
2426
2427[+] Subdomain: mersinodm.meb.gov.tr
2428[-] IP: 212.175.132.133
2429
2430[+] Subdomain: artvinodm.meb.gov.tr
2431[-] IP: 212.175.132.132
2432
2433[+] Subdomain: eskisehirodm.meb.gov.tr
2434[-] IP: 212.175.132.133
2435
2436[+] Subdomain: kmarasodm.meb.gov.tr
2437[-] IP: 212.175.132.134
2438
2439[+] Subdomain: tokatodm.meb.gov.tr
2440[-] IP: 212.175.132.134
2441
2442[+] Subdomain: hatayodm.meb.gov.tr
2443[-] IP: 212.175.132.133
2444
2445[+] Subdomain: bem.meb.gov.tr
2446[-] IP: 212.174.189.120
2447
2448[+] Subdomain: metargem.meb.gov.tr
2449[-] IP: 212.175.132.131
2450
2451[+] Subdomain: hem.meb.gov.tr
2452[-] IP: 212.175.132.106
2453
2454[+] Subdomain: erbaahem.meb.gov.tr
2455[-] IP: 212.175.132.136
2456
2457[+] Subdomain: bornovahem.meb.gov.tr
2458[-] IP: 212.175.132.137
2459
2460[+] Subdomain: bogazkalehem.meb.gov.tr
2461[-] IP: 212.175.132.136
2462
2463[+] Subdomain: kiziltepehem.meb.gov.tr
2464[-] IP: 212.175.132.137
2465
2466[+] Subdomain: dernekpazarihem.meb.gov.tr
2467[-] IP: 212.175.132.136
2468
2469[+] Subdomain: bucakhem.meb.gov.tr
2470[-] IP: 212.175.132.136
2471
2472[+] Subdomain: kalecikhem.meb.gov.tr
2473[-] IP: 212.175.132.136
2474
2475[+] Subdomain: civrilhem.meb.gov.tr
2476[-] IP: 212.175.132.140
2477
2478[+] Subdomain: dalamanhem.meb.gov.tr
2479[-] IP: 212.175.132.140
2480
2481[+] Subdomain: goksunhem.meb.gov.tr
2482[-] IP: 212.175.132.137
2483
2484[+] Subdomain: gaziemirhem.meb.gov.tr
2485[-] IP: 212.175.132.137
2486
2487[+] Subdomain: tireboluhem.meb.gov.tr
2488[-] IP: 212.175.132.136
2489
2490[+] Subdomain: kutuphanem.meb.gov.tr
2491[-] IP: 95.0.196.31
2492
2493[+] Subdomain: berlinem.meb.gov.tr
2494[-] IP: 212.175.132.137
2495
2496[+] Subdomain: bilsem.meb.gov.tr
2497[-] IP: 95.0.196.52
2498
2499[+] Subdomain: balikesirbilsem.meb.gov.tr
2500[-] IP: 212.175.132.137
2501
2502[+] Subdomain: musbilsem.meb.gov.tr
2503[-] IP: 212.175.132.137
2504
2505[+] Subdomain: ooegm.meb.gov.tr
2506[-] IP: 212.175.132.130
2507
2508[+] Subdomain: tegm.meb.gov.tr
2509[-] IP: 212.175.132.130
2510
2511[+] Subdomain: oyegm.meb.gov.tr
2512[-] IP: 212.175.132.130
2513
2514[+] Subdomain: yyegm.meb.gov.tr
2515[-] IP: 212.175.132.130
2516
2517[+] Subdomain: digm.meb.gov.tr
2518[-] IP: 212.175.132.130
2519
2520[+] Subdomain: abdigm.meb.gov.tr
2521[-] IP: 212.175.132.130
2522
2523[+] Subdomain: ikgm.meb.gov.tr
2524[-] IP: 212.175.132.129
2525
2526[+] Subdomain: ookgm.meb.gov.tr
2527[-] IP: 212.175.132.133
2528
2529[+] Subdomain: ogm.meb.gov.tr
2530[-] IP: 212.175.132.132
2531
2532[+] Subdomain: hbogm.meb.gov.tr
2533[-] IP: 212.175.132.129
2534
2535[+] Subdomain: dogm.meb.gov.tr
2536[-] IP: 212.175.132.130
2537
2538[+] Subdomain: iogm.meb.gov.tr
2539[-] IP: 212.175.132.130
2540
2541[+] Subdomain: etogm.meb.gov.tr
2542[-] IP: 212.175.132.130
2543
2544[+] Subdomain: ktogm.meb.gov.tr
2545[-] IP: 212.175.132.130
2546
2547[+] Subdomain: ttogm.meb.gov.tr
2548[-] IP: 212.175.132.130
2549
2550[+] Subdomain: yogm.meb.gov.tr
2551[-] IP: 212.175.132.130
2552
2553[+] Subdomain: pgm.meb.gov.tr
2554[-] IP: 95.0.196.251
2555
2556[+] Subdomain: orgm.meb.gov.tr
2557[-] IP: 212.175.132.130
2558
2559[+] Subdomain: odsgm.meb.gov.tr
2560[-] IP: 212.175.132.130
2561
2562[+] Subdomain: yetgm.meb.gov.tr
2563[-] IP: 212.175.132.129
2564
2565[+] Subdomain: cygm.meb.gov.tr
2566[-] IP: 212.175.132.130
2567
2568[+] Subdomain: oygm.meb.gov.tr
2569[-] IP: 212.175.132.130
2570
2571[+] Subdomain: hadim.meb.gov.tr
2572[-] IP: 212.175.132.142
2573
2574[+] Subdomain: ilkadim.meb.gov.tr
2575[-] IP: 212.175.132.136
2576
2577[+] Subdomain: didim.meb.gov.tr
2578[-] IP: 212.175.132.139
2579
2580[+] Subdomain: selim.meb.gov.tr
2581[-] IP: 212.175.132.140
2582
2583[+] Subdomain: eogrenim.meb.gov.tr
2584[-] IP: 95.0.196.250
2585
2586[+] Subdomain: yildirim.meb.gov.tr
2587[-] IP: 212.175.132.140
2588
2589[+] Subdomain: meslegimhayatim.meb.gov.tr
2590[-] IP: 212.175.132.130
2591
2592[+] Subdomain: kutuphanem-yonetim.meb.gov.tr
2593[-] IP: 95.0.196.31
2594
2595[+] Subdomain: okulwebyonetim.meb.gov.tr
2596[-] IP: 212.175.170.116
2597
2598[+] Subdomain: okulyonetim.meb.gov.tr
2599[-] IP: 212.175.170.116
2600
2601[+] Subdomain: uretim.meb.gov.tr
2602[-] IP: 212.175.132.137
2603
2604[+] Subdomain: uzaktanegitim.meb.gov.tr
2605[-] IP: 95.0.196.222
2606
2607[+] Subdomain: aloegitim.meb.gov.tr
2608[-] IP: 212.174.189.116
2609
2610[+] Subdomain: radyoegitim.meb.gov.tr
2611[-] IP: 212.175.132.137
2612
2613[+] Subdomain: stuttgartegitim.meb.gov.tr
2614[-] IP: 212.175.132.137
2615
2616[+] Subdomain: meslekitanitim.meb.gov.tr
2617[-] IP: 212.175.132.131
2618
2619[+] Subdomain: yayim.meb.gov.tr
2620[-] IP: 212.175.132.130
2621
2622[+] Subdomain: pbsm.meb.gov.tr
2623[-] IP: 95.0.196.56
2624
2625[+] Subdomain: hum.meb.gov.tr
2626[-] IP: 212.175.132.130
2627
2628[+] Subdomain: atakum.meb.gov.tr
2629[-] IP: 212.175.132.136
2630
2631[+] Subdomain: bodrum.meb.gov.tr
2632[-] IP: 212.175.132.142
2633
2634[+] Subdomain: corum.meb.gov.tr
2635[-] IP: 212.175.132.132
2636
2637[+] Subdomain: erzurum.meb.gov.tr
2638[-] IP: 212.175.132.133
2639
2640[+] Subdomain: tortum.meb.gov.tr
2641[-] IP: 212.175.132.140
2642
2643[+] Subdomain: daym.meb.gov.tr
2644[-] IP: 212.175.132.137
2645
2646[+] Subdomain: araban.meb.gov.tr
2647[-] IP: 212.175.132.141
2648
2649[+] Subdomain: keban.meb.gov.tr
2650[-] IP: 212.175.132.140
2651
2652[+] Subdomain: karacoban.meb.gov.tr
2653[-] IP: 212.175.132.141
2654
2655[+] Subdomain: can.meb.gov.tr
2656[-] IP: 212.175.132.139
2657
2658[+] Subdomain: sincan.meb.gov.tr
2659[-] IP: 212.175.132.139
2660
2661[+] Subdomain: erzincan.meb.gov.tr
2662[-] IP: 212.175.132.133
2663
2664[+] Subdomain: karakocan.meb.gov.tr
2665[-] IP: 212.175.132.141
2666
2667[+] Subdomain: tercan.meb.gov.tr
2668[-] IP: 212.175.132.140
2669
2670[+] Subdomain: duragan.meb.gov.tr
2671[-] IP: 212.175.132.136
2672
2673[+] Subdomain: yatagan.meb.gov.tr
2674[-] IP: 212.175.132.142
2675
2676[+] Subdomain: bozdogan.meb.gov.tr
2677[-] IP: 212.175.132.139
2678
2679[+] Subdomain: korgan.meb.gov.tr
2680[-] IP: 212.175.132.142
2681
2682[+] Subdomain: han.meb.gov.tr
2683[-] IP: 212.175.132.141
2684
2685[+] Subdomain: ardahan.meb.gov.tr
2686[-] IP: 212.175.132.132
2687
2688[+] Subdomain: yahsihan.meb.gov.tr
2689[-] IP: 212.175.132.136
2690
2691[+] Subdomain: yazihan.meb.gov.tr
2692[-] IP: 212.175.132.142
2693
2694[+] Subdomain: celikhan.meb.gov.tr
2695[-] IP: 212.175.132.139
2696
2697[+] Subdomain: kirikhan.meb.gov.tr
2698[-] IP: 212.175.132.141
2699
2700[+] Subdomain: solhan.meb.gov.tr
2701[-] IP: 212.175.132.139
2702
2703[+] Subdomain: hekimhan.meb.gov.tr
2704[-] IP: 212.175.132.142
2705
2706[+] Subdomain: buyukorhan.meb.gov.tr
2707[-] IP: 212.175.132.140
2708
2709[+] Subdomain: ceyhan.meb.gov.tr
2710[-] IP: 212.175.132.139
2711
2712[+] Subdomain: seyhan.meb.gov.tr
2713[-] IP: 212.175.132.139
2714
2715[+] Subdomain: kontenjan.meb.gov.tr
2716[-] IP: 212.174.189.125
2717
2718[+] Subdomain: baykan.meb.gov.tr
2719[-] IP: 212.175.132.136
2720
2721[+] Subdomain: cayiralan.meb.gov.tr
2722[-] IP: 212.175.132.136
2723
2724[+] Subdomain: kurtalan.meb.gov.tr
2725[-] IP: 212.175.132.136
2726
2727[+] Subdomain: sarioglan.meb.gov.tr
2728[-] IP: 212.175.132.142
2729
2730[+] Subdomain: baklan.meb.gov.tr
2731[-] IP: 212.175.132.139
2732
2733[+] Subdomain: kaman.meb.gov.tr
2734[-] IP: 212.175.132.142
2735
2736[+] Subdomain: dalaman.meb.gov.tr
2737[-] IP: 212.175.132.142
2738
2739[+] Subdomain: karaman.meb.gov.tr
2740[-] IP: 212.175.132.134
2741
2742[+] Subdomain: adiyaman.meb.gov.tr
2743[-] IP: 212.175.132.132
2744
2745[+] Subdomain: tekman.meb.gov.tr
2746[-] IP: 212.175.132.141
2747
2748[+] Subdomain: narman.meb.gov.tr
2749[-] IP: 212.175.132.141
2750
2751[+] Subdomain: batman.meb.gov.tr
2752[-] IP: 212.175.132.138
2753
2754[+] Subdomain: kocasinan.meb.gov.tr
2755[-] IP: 212.175.132.140
2756
2757[+] Subdomain: siran.meb.gov.tr
2758[-] IP: 212.175.132.140
2759
2760[+] Subdomain: harran.meb.gov.tr
2761[-] IP: 212.175.132.136
2762
2763[+] Subdomain: havran.meb.gov.tr
2764[-] IP: 212.175.132.139
2765
2766[+] Subdomain: kesan.meb.gov.tr
2767[-] IP: 212.175.132.140
2768
2769[+] Subdomain: ozvatan.meb.gov.tr
2770[-] IP: 212.175.132.142
2771
2772[+] Subdomain: eyupsultan.meb.gov.tr
2773[-] IP: 212.175.132.141
2774
2775[+] Subdomain: elbistan.meb.gov.tr
2776[-] IP: 212.175.132.142
2777
2778[+] Subdomain: van.meb.gov.tr
2779[-] IP: 212.175.132.134
2780
2781[+] Subdomain: eldivan.meb.gov.tr
2782[-] IP: 212.175.132.140
2783
2784[+] Subdomain: serdivan.meb.gov.tr
2785[-] IP: 212.175.132.142
2786
2787[+] Subdomain: hilvan.meb.gov.tr
2788[-] IP: 212.175.132.136
2789
2790[+] Subdomain: silvan.meb.gov.tr
2791[-] IP: 212.175.132.141
2792
2793[+] Subdomain: sirvan.meb.gov.tr
2794[-] IP: 212.175.132.136
2795
2796[+] Subdomain: tatvan.meb.gov.tr
2797[-] IP: 212.175.132.140
2798
2799[+] Subdomain: arguvan.meb.gov.tr
2800[-] IP: 212.175.132.142
2801
2802[+] Subdomain: bogazliyan.meb.gov.tr
2803[-] IP: 212.175.132.136
2804
2805[+] Subdomain: bunyan.meb.gov.tr
2806[-] IP: 212.175.132.142
2807
2808[+] Subdomain: kazan.meb.gov.tr
2809[-] IP: 212.175.132.139
2810
2811[+] Subdomain: hizan.meb.gov.tr
2812[-] IP: 212.175.132.139
2813
2814[+] Subdomain: kozan.meb.gov.tr
2815[-] IP: 212.175.132.139
2816
2817[+] Subdomain: seben.meb.gov.tr
2818[-] IP: 212.175.132.140
2819
2820[+] Subdomain: icden.meb.gov.tr
2821[-] IP: 212.175.132.137
2822
2823[+] Subdomain: mengen.meb.gov.tr
2824[-] IP: 212.175.132.140
2825
2826[+] Subdomain: palandoken.meb.gov.tr
2827[-] IP: 212.175.132.141
2828
2829[+] Subdomain: belen.meb.gov.tr
2830[-] IP: 212.175.132.141
2831
2832[+] Subdomain: menemen.meb.gov.tr
2833[-] IP: 212.175.132.142
2834
2835[+] Subdomain: dikmen.meb.gov.tr
2836[-] IP: 212.175.132.136
2837
2838[+] Subdomain: mebdeogren.meb.gov.tr
2839[-] IP: 212.175.132.134
2840
2841[+] Subdomain: abyiogren.meb.gov.tr
2842[-] IP: 212.175.132.138
2843
2844[+] Subdomain: agacoren.meb.gov.tr
2845[-] IP: 212.175.132.136
2846
2847[+] Subdomain: gungoren.meb.gov.tr
2848[-] IP: 212.175.132.142
2849
2850[+] Subdomain: kecioren.meb.gov.tr
2851[-] IP: 212.175.132.139
2852
2853[+] Subdomain: akoren.meb.gov.tr
2854[-] IP: 212.175.132.142
2855
2856[+] Subdomain: kiziloren.meb.gov.tr
2857[-] IP: 212.175.132.139
2858
2859[+] Subdomain: bayramoren.meb.gov.tr
2860[-] IP: 212.175.132.140
2861
2862[+] Subdomain: evren.meb.gov.tr
2863[-] IP: 212.175.132.139
2864
2865[+] Subdomain: ardesen.meb.gov.tr
2866[-] IP: 212.175.132.141
2867
2868[+] Subdomain: essen.meb.gov.tr
2869[-] IP: 212.175.132.140
2870
2871[+] Subdomain: nusaybin.meb.gov.tr
2872[-] IP: 212.175.132.142
2873
2874[+] Subdomain: lacin.meb.gov.tr
2875[-] IP: 212.175.132.140
2876
2877[+] Subdomain: bolvadin.meb.gov.tr
2878[-] IP: 212.175.132.139
2879
2880[+] Subdomain: diyadin.meb.gov.tr
2881[-] IP: 212.175.132.139
2882
2883[+] Subdomain: mardin.meb.gov.tr
2884[-] IP: 212.175.132.134
2885
2886[+] Subdomain: aydin.meb.gov.tr
2887[-] IP: 212.175.132.132
2888
2889[+] Subdomain: agin.meb.gov.tr
2890[-] IP: 212.175.132.141
2891
2892[+] Subdomain: e-yaygin.meb.gov.tr
2893[-] IP: 95.0.196.228
2894
2895[+] Subdomain: altinekin.meb.gov.tr
2896[-] IP: 212.175.132.142
2897
2898[+] Subdomain: keskin.meb.gov.tr
2899[-] IP: 212.175.132.136
2900
2901[+] Subdomain: berlin.meb.gov.tr
2902[-] IP: 212.175.132.137
2903
2904[+] Subdomain: andirin.meb.gov.tr
2905[-] IP: 212.175.132.142
2906
2907[+] Subdomain: afsin.meb.gov.tr
2908[-] IP: 212.175.132.142
2909
2910[+] Subdomain: camlihemsin.meb.gov.tr
2911[-] IP: 212.175.132.141
2912
2913[+] Subdomain: arsin.meb.gov.tr
2914[-] IP: 212.175.132.136
2915
2916[+] Subdomain: mersin.meb.gov.tr
2917[-] IP: 212.175.132.133
2918
2919[+] Subdomain: bartin.meb.gov.tr
2920[-] IP: 212.175.132.132
2921
2922[+] Subdomain: catalzeytin.meb.gov.tr
2923[-] IP: 212.175.132.140
2924
2925[+] Subdomain: erzin.meb.gov.tr
2926[-] IP: 212.175.132.140
2927
2928[+] Subdomain: koln.meb.gov.tr
2929[-] IP: 212.175.132.140
2930
2931[+] Subdomain: merzifon.meb.gov.tr
2932[-] IP: 212.175.132.139
2933
2934[+] Subdomain: sason.meb.gov.tr
2935[-] IP: 212.175.132.136
2936
2937[+] Subdomain: boston.meb.gov.tr
2938[-] IP: 212.175.132.137
2939
2940[+] Subdomain: trabzon.meb.gov.tr
2941[-] IP: 212.175.132.134
2942
2943[+] Subdomain: megeptrabzon.meb.gov.tr
2944[-] IP: 212.175.132.136
2945
2946[+] Subdomain: bern.meb.gov.tr
2947[-] IP: 212.175.132.137
2948
2949[+] Subdomain: urn.meb.gov.tr
2950[-] IP: 212.175.132.138
2951
2952[+] Subdomain: korgun.meb.gov.tr
2953[-] IP: 212.175.132.140
2954
2955[+] Subdomain: sorgun.meb.gov.tr
2956[-] IP: 212.175.132.136
2957
2958[+] Subdomain: iskenderun.meb.gov.tr
2959[-] IP: 212.175.132.140
2960
2961[+] Subdomain: karaburun.meb.gov.tr
2962[-] IP: 212.175.132.140
2963
2964[+] Subdomain: gurun.meb.gov.tr
2965[-] IP: 212.175.132.136
2966
2967[+] Subdomain: aglasun.meb.gov.tr
2968[-] IP: 212.175.132.139
2969
2970[+] Subdomain: giresun.meb.gov.tr
2971[-] IP: 212.175.132.133
2972
2973[+] Subdomain: goksun.meb.gov.tr
2974[-] IP: 212.175.132.142
2975
2976[+] Subdomain: okullarhayatolsun.meb.gov.tr
2977[-] IP: 212.175.132.135
2978
2979[+] Subdomain: samsun.meb.gov.tr
2980[-] IP: 212.175.132.134
2981
2982[+] Subdomain: kurtun.meb.gov.tr
2983[-] IP: 212.175.132.140
2984
2985[+] Subdomain: emezun.meb.gov.tr
2986[-] IP: 95.0.196.78
2987
2988[+] Subdomain: hbo.meb.gov.tr
2989[-] IP: 212.175.132.129
2990
2991[+] Subdomain: bitefo.meb.gov.tr
2992[-] IP: 212.175.132.136
2993
2994[+] Subdomain: hafiziho.meb.gov.tr
2995[-] IP: 212.175.132.133
2996
2997[+] Subdomain: aio.meb.gov.tr
2998[-] IP: 212.175.132.137
2999
3000[+] Subdomain: www.aio.meb.gov.tr
3001[-] IP: 212.175.132.137
3002
3003[+] Subdomain: tillo.meb.gov.tr
3004[-] IP: 212.175.132.136
3005
3006[+] Subdomain: demo.meb.gov.tr
3007[-] IP: 212.175.132.137
3008
3009[+] Subdomain: hazro.meb.gov.tr
3010[-] IP: 212.175.132.141
3011
3012[+] Subdomain: varto.meb.gov.tr
3013[-] IP: 212.175.132.141
3014
3015[+] Subdomain: eoyo.meb.gov.tr
3016[-] IP: 95.0.196.58
3017
3018[+] Subdomain: gaziantepebap.meb.gov.tr
3019[-] IP: 212.175.132.133
3020
3021[+] Subdomain: beytussebap.meb.gov.tr
3022[-] IP: 212.175.132.136
3023
3024[+] Subdomain: mebidap.meb.gov.tr
3025[-] IP: 212.175.132.137
3026
3027[+] Subdomain: kesap.meb.gov.tr
3028[-] IP: 212.175.132.140
3029
3030[+] Subdomain: sorucevap.meb.gov.tr
3031[-] IP: 212.175.132.137
3032
3033[+] Subdomain: adp.meb.gov.tr
3034[-] IP: 212.175.132.141
3035
3036[+] Subdomain: tedp.meb.gov.tr
3037[-] IP: 212.175.132.141
3038
3039[+] Subdomain: bep.meb.gov.tr
3040[-] IP: 212.175.170.104
3041
3042[+] Subdomain: www.bep.meb.gov.tr
3043[-] IP: 212.175.170.104
3044
3045[+] Subdomain: megep.meb.gov.tr
3046[-] IP: 212.175.132.136
3047
3048[+] Subdomain: mesgep.meb.gov.tr
3049[-] IP: 212.175.132.137
3050
3051[+] Subdomain: ikmep.meb.gov.tr
3052[-] IP: 212.175.132.141
3053
3054[+] Subdomain: gaziantep.meb.gov.tr
3055[-] IP: 212.175.132.133
3056
3057[+] Subdomain: megepgaziantep.meb.gov.tr
3058[-] IP: 212.175.132.136
3059
3060[+] Subdomain: iskilip.meb.gov.tr
3061[-] IP: 212.175.132.139
3062
3063[+] Subdomain: sip.meb.gov.tr
3064[-] IP: 212.175.133.100
3065
3066[+] Subdomain: nizip.meb.gov.tr
3067[-] IP: 212.175.132.140
3068
3069[+] Subdomain: kulp.meb.gov.tr
3070[-] IP: 212.175.132.139
3071
3072[+] Subdomain: sinop.meb.gov.tr
3073[-] IP: 212.175.132.134
3074
3075[+] Subdomain: ysop.meb.gov.tr
3076[-] IP: 212.175.132.140
3077
3078[+] Subdomain: urgup.meb.gov.tr
3079[-] IP: 212.175.132.141
3080
3081[+] Subdomain: kirkambar.meb.gov.tr
3082[-] IP: 95.0.196.49
3083
3084[+] Subdomain: atkaracalar.meb.gov.tr
3085[-] IP: 212.175.132.139
3086
3087[+] Subdomain: hocalar.meb.gov.tr
3088[-] IP: 212.175.132.139
3089
3090[+] Subdomain: adalar.meb.gov.tr
3091[-] IP: 212.175.132.141
3092
3093[+] Subdomain: baglar.meb.gov.tr
3094[-] IP: 212.175.132.139
3095
3096[+] Subdomain: karabaglar.meb.gov.tr
3097[-] IP: 212.175.132.140
3098
3099[+] Subdomain: hacilar.meb.gov.tr
3100[-] IP: 212.175.132.140
3101
3102[+] Subdomain: bagcilar.meb.gov.tr
3103[-] IP: 212.175.132.140
3104
3105[+] Subdomain: kovancilar.meb.gov.tr
3106[-] IP: 212.175.132.140
3107
3108[+] Subdomain: akincilar.meb.gov.tr
3109[-] IP: 212.175.132.141
3110
3111[+] Subdomain: avcilar.meb.gov.tr
3112[-] IP: 212.175.132.138
3113
3114[+] Subdomain: oncecocuklar.meb.gov.tr
3115[-] IP: 95.0.196.214
3116
3117[+] Subdomain: dinogretimiokullar.meb.gov.tr
3118[-] IP: 212.175.132.130
3119
3120[+] Subdomain: cobanlar.meb.gov.tr
3121[-] IP: 212.175.132.139
3122
3123[+] Subdomain: aydinlar.meb.gov.tr
3124[-] IP: 212.175.132.136
3125
3126[+] Subdomain: pazarlar.meb.gov.tr
3127[-] IP: 212.175.132.142
3128
3129[+] Subdomain: hemraporlar.meb.gov.tr
3130[-] IP: 212.175.170.109
3131
3132[+] Subdomain: aioraporlar.meb.gov.tr
3133[-] IP: 212.175.170.109
3134
3135[+] Subdomain: toroslar.meb.gov.tr
3136[-] IP: 212.175.132.141
3137
3138[+] Subdomain: yurtlar.meb.gov.tr
3139[-] IP: 212.174.189.123
3140
3141[+] Subdomain: basvurular.meb.gov.tr
3142[-] IP: 212.175.170.124
3143
3144[+] Subdomain: sinavlar.meb.gov.tr
3145[-] IP: 85.111.38.36
3146
3147[+] Subdomain: oguzlar.meb.gov.tr
3148[-] IP: 212.175.132.139
3149
3150[+] Subdomain: cinar.meb.gov.tr
3151[-] IP: 212.175.132.140
3152
3153[+] Subdomain: dinar.meb.gov.tr
3154[-] IP: 212.175.132.139
3155
3156[+] Subdomain: halkapinar.meb.gov.tr
3157[-] IP: 212.175.132.142
3158
3159[+] Subdomain: karapinar.meb.gov.tr
3160[-] IP: 212.175.132.142
3161
3162[+] Subdomain: kayapinar.meb.gov.tr
3163[-] IP: 212.175.132.139
3164
3165[+] Subdomain: akpinar.meb.gov.tr
3166[-] IP: 212.175.132.140
3167
3168[+] Subdomain: catalpinar.meb.gov.tr
3169[-] IP: 212.175.132.142
3170
3171[+] Subdomain: ceylanpinar.meb.gov.tr
3172[-] IP: 212.175.132.141
3173
3174[+] Subdomain: gurpinar.meb.gov.tr
3175[-] IP: 212.175.132.141
3176
3177[+] Subdomain: gulnar.meb.gov.tr
3178[-] IP: 212.175.132.141
3179
3180[+] Subdomain: sebinkarahisar.meb.gov.tr
3181[-] IP: 212.175.132.141
3182
3183[+] Subdomain: ortahisar.meb.gov.tr
3184[-] IP: 212.175.132.138
3185
3186[+] Subdomain: sereflikochisar.meb.gov.tr
3187[-] IP: 212.175.132.139
3188
3189[+] Subdomain: iscehisar.meb.gov.tr
3190[-] IP: 212.175.132.139
3191
3192[+] Subdomain: seferihisar.meb.gov.tr
3193[-] IP: 212.175.132.142
3194
3195[+] Subdomain: sivrihisar.meb.gov.tr
3196[-] IP: 212.175.132.141
3197
3198[+] Subdomain: akhisar.meb.gov.tr
3199[-] IP: 212.175.132.142
3200
3201[+] Subdomain: yesilhisar.meb.gov.tr
3202[-] IP: 212.175.132.142
3203
3204[+] Subdomain: golhisar.meb.gov.tr
3205[-] IP: 212.175.132.139
3206
3207[+] Subdomain: koyulhisar.meb.gov.tr
3208[-] IP: 212.175.132.141
3209
3210[+] Subdomain: doganhisar.meb.gov.tr
3211[-] IP: 212.175.132.142
3212
3213[+] Subdomain: sultanhisar.meb.gov.tr
3214[-] IP: 212.175.132.139
3215
3216[+] Subdomain: inhisar.meb.gov.tr
3217[-] IP: 212.175.132.139
3218
3219[+] Subdomain: serinhisar.meb.gov.tr
3220[-] IP: 212.175.132.139
3221
3222[+] Subdomain: altunhisar.meb.gov.tr
3223[-] IP: 212.175.132.142
3224
3225[+] Subdomain: cavdarhisar.meb.gov.tr
3226[-] IP: 212.175.132.142
3227
3228[+] Subdomain: pinarhisar.meb.gov.tr
3229[-] IP: 212.175.132.142
3230
3231[+] Subdomain: niksar.meb.gov.tr
3232[-] IP: 212.175.132.136
3233
3234[+] Subdomain: dogansar.meb.gov.tr
3235[-] IP: 212.175.132.136
3236
3237[+] Subdomain: eskipazar.meb.gov.tr
3238[-] IP: 212.175.132.136
3239
3240[+] Subdomain: nilufer.meb.gov.tr
3241[-] IP: 95.0.196.89
3242
3243[+] Subdomain: gerger.meb.gov.tr
3244[-] IP: 212.175.132.139
3245
3246[+] Subdomain: sehzadeler.meb.gov.tr
3247[-] IP: 212.175.132.137
3248
3249[+] Subdomain: efeler.meb.gov.tr
3250[-] IP: 212.175.132.138
3251
3252[+] Subdomain: ogmprojeler.meb.gov.tr
3253[-] IP: 212.175.132.132
3254
3255[+] Subdomain: hboprojeler.meb.gov.tr
3256[-] IP: 212.175.132.135
3257
3258[+] Subdomain: cifteler.meb.gov.tr
3259[-] IP: 212.175.132.141
3260
3261[+] Subdomain: tebligler.meb.gov.tr
3262[-] IP: 212.175.132.137
3263
3264[+] Subdomain: evciler.meb.gov.tr
3265[-] IP: 212.175.132.139
3266
3267[+] Subdomain: seydiler.meb.gov.tr
3268[-] IP: 212.175.132.140
3269
3270[+] Subdomain: sariveliler.meb.gov.tr
3271[-] IP: 212.175.132.141
3272
3273[+] Subdomain: sosyaletkinlikler.meb.gov.tr
3274[-] IP: 212.175.132.129
3275
3276[+] Subdomain: yenilikciogretmenler.meb.gov.tr
3277[-] IP: 212.175.132.136
3278
3279[+] Subdomain: erenler.meb.gov.tr
3280[-] IP: 212.175.132.142
3281
3282[+] Subdomain: esenler.meb.gov.tr
3283[-] IP: 212.175.132.140
3284
3285[+] Subdomain: pasinler.meb.gov.tr
3286[-] IP: 212.175.132.141
3287
3288[+] Subdomain: hbourunler.meb.gov.tr
3289[-] IP: 212.175.132.137
3290
3291[+] Subdomain: sutculer.meb.gov.tr
3292[-] IP: 212.175.132.140
3293
3294[+] Subdomain: bahcelievler.meb.gov.tr
3295[-] IP: 212.175.132.140
3296
3297[+] Subdomain: seydikemer.meb.gov.tr
3298[-] IP: 212.175.132.137
3299
3300[+] Subdomain: mebmobilper.meb.gov.tr
3301[-] IP: 95.0.196.96
3302
3303[+] Subdomain: munster.meb.gov.tr
3304[-] IP: 212.175.132.136
3305
3306[+] Subdomain: autodiscover.meb.gov.tr
3307[-] IP: 95.0.196.30
3308
3309[+] Subdomain: hannover.meb.gov.tr
3310[-] IP: 212.175.132.137
3311
3312[+] Subdomain: sariyer.meb.gov.tr
3313[-] IP: 212.175.132.141
3314
3315[+] Subdomain: vakfikebir.meb.gov.tr
3316[-] IP: 212.175.132.136
3317
3318[+] Subdomain: igdir.meb.gov.tr
3319[-] IP: 212.175.132.138
3320
3321[+] Subdomain: cildir.meb.gov.tr
3322[-] IP: 212.175.132.141
3323
3324[+] Subdomain: candir.meb.gov.tr
3325[-] IP: 212.175.132.141
3326
3327[+] Subdomain: bayindir.meb.gov.tr
3328[-] IP: 212.175.132.142
3329
3330[+] Subdomain: egirdir.meb.gov.tr
3331[-] IP: 212.175.132.140
3332
3333[+] Subdomain: cavdir.meb.gov.tr
3334[-] IP: 212.175.132.140
3335
3336[+] Subdomain: yuregir.meb.gov.tr
3337[-] IP: 212.175.132.139
3338
3339[+] Subdomain: arapgir.meb.gov.tr
3340[-] IP: 212.175.132.142
3341
3342[+] Subdomain: alasehir.meb.gov.tr
3343[-] IP: 212.175.132.142
3344
3345[+] Subdomain: atasehir.meb.gov.tr
3346[-] IP: 212.175.132.142
3347
3348[+] Subdomain: seydisehir.meb.gov.tr
3349[-] IP: 212.175.132.140
3350
3351[+] Subdomain: eskisehir.meb.gov.tr
3352[-] IP: 212.175.132.133
3353
3354[+] Subdomain: yenisehir.meb.gov.tr
3355[-] IP: 212.175.132.140
3356
3357[+] Subdomain: aksehir.meb.gov.tr
3358[-] IP: 212.175.132.142
3359
3360[+] Subdomain: basaksehir.meb.gov.tr
3361[-] IP: 212.175.132.140
3362
3363[+] Subdomain: gulsehir.meb.gov.tr
3364[-] IP: 212.175.132.141
3365
3366[+] Subdomain: dogansehir.meb.gov.tr
3367[-] IP: 212.175.132.142
3368
3369[+] Subdomain: viransehir.meb.gov.tr
3370[-] IP: 212.175.132.141
3371
3372[+] Subdomain: kirsehir.meb.gov.tr
3373[-] IP: 212.175.132.133
3374
3375[+] Subdomain: nevsehir.meb.gov.tr
3376[-] IP: 212.175.132.134
3377
3378[+] Subdomain: beysehir.meb.gov.tr
3379[-] IP: 212.175.132.140
3380
3381[+] Subdomain: diyarbakir.meb.gov.tr
3382[-] IP: 212.175.132.132
3383
3384[+] Subdomain: kazimkarabekir.meb.gov.tr
3385[-] IP: 212.175.132.141
3386
3387[+] Subdomain: birmilyonfikir.meb.gov.tr
3388[-] IP: 212.175.132.129
3389
3390[+] Subdomain: bozkir.meb.gov.tr
3391[-] IP: 212.175.132.142
3392
3393[+] Subdomain: gaziemir.meb.gov.tr
3394[-] IP: 212.175.132.140
3395
3396[+] Subdomain: izmir.meb.gov.tr
3397[-] IP: 212.175.132.133
3398
3399[+] Subdomain: megepizmir.meb.gov.tr
3400[-] IP: 212.175.132.136
3401
3402[+] Subdomain: guneysinir.meb.gov.tr
3403[-] IP: 212.175.132.142
3404
3405[+] Subdomain: ispir.meb.gov.tr
3406[-] IP: 212.175.132.141
3407
3408[+] Subdomain: balikesir.meb.gov.tr
3409[-] IP: 212.175.132.132
3410
3411[+] Subdomain: mucur.meb.gov.tr
3412[-] IP: 212.175.132.140
3413
3414[+] Subdomain: burdur.meb.gov.tr
3415[-] IP: 212.175.132.132
3416
3417[+] Subdomain: bepmudur.meb.gov.tr
3418[-] IP: 212.175.170.104
3419
3420[+] Subdomain: olur.meb.gov.tr
3421[-] IP: 212.175.132.140
3422
3423[+] Subdomain: hamur.meb.gov.tr
3424[-] IP: 212.175.132.139
3425
3426[+] Subdomain: anamur.meb.gov.tr
3427[-] IP: 212.175.132.140
3428
3429[+] Subdomain: sur.meb.gov.tr
3430[-] IP: 212.175.132.139
3431
3432[+] Subdomain: savur.meb.gov.tr
3433[-] IP: 212.175.132.142
3434
3435[+] Subdomain: sumbas.meb.gov.tr
3436[-] IP: 212.175.132.136
3437
3438[+] Subdomain: kas.meb.gov.tr
3439[-] IP: 212.175.132.139
3440
3441[+] Subdomain: aydinmekas.meb.gov.tr
3442[-] IP: 212.175.132.132
3443
3444[+] Subdomain: talas.meb.gov.tr
3445[-] IP: 212.175.132.140
3446
3447[+] Subdomain: milas.meb.gov.tr
3448[-] IP: 212.175.132.141
3449
3450[+] Subdomain: ulas.meb.gov.tr
3451[-] IP: 212.175.132.141
3452
3453[+] Subdomain: camas.meb.gov.tr
3454[-] IP: 212.175.132.142
3455
3456[+] Subdomain: kmaras.meb.gov.tr
3457[-] IP: 212.175.132.134
3458
3459[+] Subdomain: kabatas.meb.gov.tr
3460[-] IP: 212.175.132.142
3461
3462[+] Subdomain: karatas.meb.gov.tr
3463[-] IP: 212.175.132.139
3464
3465[+] Subdomain: besiktas.meb.gov.tr
3466[-] IP: 212.175.132.141
3467
3468[+] Subdomain: altintas.meb.gov.tr
3469[-] IP: 212.175.132.141
3470
3471[+] Subdomain: tavas.meb.gov.tr
3472[-] IP: 212.175.132.139
3473
3474[+] Subdomain: gevas.meb.gov.tr
3475[-] IP: 212.175.132.141
3476
3477[+] Subdomain: sivas.meb.gov.tr
3478[-] IP: 212.175.132.134
3479
3480[+] Subdomain: ayas.meb.gov.tr
3481[-] IP: 212.175.132.139
3482
3483[+] Subdomain: payas.meb.gov.tr
3484[-] IP: 212.175.132.137
3485
3486[+] Subdomain: manyas.meb.gov.tr
3487[-] IP: 212.175.132.139
3488
3489[+] Subdomain: ikbs.meb.gov.tr
3490[-] IP: 95.0.196.67
3491
3492[+] Subdomain: mbs.meb.gov.tr
3493[-] IP: 95.0.196.44
3494
3495[+] Subdomain: opds.meb.gov.tr
3496[-] IP: 95.0.196.36
3497
3498[+] Subdomain: ilsiswebservices.meb.gov.tr
3499[-] IP: 212.174.189.124
3500
3501[+] Subdomain: gordes.meb.gov.tr
3502[-] IP: 212.175.132.141
3503
3504[+] Subdomain: oges.meb.gov.tr
3505[-] IP: 212.175.132.137
3506
3507[+] Subdomain: cerkes.meb.gov.tr
3508[-] IP: 212.175.132.139
3509
3510[+] Subdomain: keles.meb.gov.tr
3511[-] IP: 212.175.132.139
3512
3513[+] Subdomain: menderes.meb.gov.tr
3514[-] IP: 212.175.132.142
3515
3516[+] Subdomain: pictes.meb.gov.tr
3517[-] IP: 212.175.132.138
3518
3519[+] Subdomain: turkmetes.meb.gov.tr
3520[-] IP: 212.175.132.138
3521
3522[+] Subdomain: mebbis.meb.gov.tr
3523[-] IP: 212.175.170.112
3524
3525[+] Subdomain: tefbis.meb.gov.tr
3526[-] IP: 212.174.189.122
3527
3528[+] Subdomain: yobis.meb.gov.tr
3529[-] IP: 95.0.196.70
3530
3531[+] Subdomain: ercis.meb.gov.tr
3532[-] IP: 212.175.132.136
3533
3534[+] Subdomain: samsungis.meb.gov.tr
3535[-] IP: 212.175.132.134
3536
3537[+] Subdomain: kilis.meb.gov.tr
3538[-] IP: 212.175.132.131
3539
3540[+] Subdomain: bitlis.meb.gov.tr
3541[-] IP: 212.175.132.132
3542
3543[+] Subdomain: sarikamis.meb.gov.tr
3544[-] IP: 212.175.132.142
3545
3546[+] Subdomain: karkamis.meb.gov.tr
3547[-] IP: 212.175.132.140
3548
3549[+] Subdomain: odemis.meb.gov.tr
3550[-] IP: 212.175.132.140
3551
3552[+] Subdomain: okuloncesimis.meb.gov.tr
3553[-] IP: 95.0.196.230
3554
3555[+] Subdomain: hinis.meb.gov.tr
3556[-] IP: 212.175.132.140
3557
3558[+] Subdomain: marmaris.meb.gov.tr
3559[-] IP: 212.175.132.141
3560
3561[+] Subdomain: paris.meb.gov.tr
3562[-] IP: 212.175.132.136
3563
3564[+] Subdomain: mebsis.meb.gov.tr
3565[-] IP: 212.174.189.116
3566
3567[+] Subdomain: ilsis.meb.gov.tr
3568[-] IP: 212.175.170.112
3569
3570[+] Subdomain: okulsis.meb.gov.tr
3571[-] IP: 212.175.170.102
3572
3573[+] Subdomain: mebservis.meb.gov.tr
3574[-] IP: 212.175.170.123
3575
3576[+] Subdomain: bulutservis.meb.gov.tr
3577[-] IP: 212.175.170.123
3578
3579[+] Subdomain: konferans.meb.gov.tr
3580[-] IP: 95.0.196.201
3581
3582[+] Subdomain: externaldns.meb.gov.tr
3583[-] IP: 212.174.189.114
3584
3585[+] Subdomain: patnos.meb.gov.tr
3586[-] IP: 212.175.132.139
3587
3588[+] Subdomain: kars.meb.gov.tr
3589[-] IP: 212.175.132.133
3590
3591[+] Subdomain: vetexpress.meb.gov.tr
3592[-] IP: 212.175.132.130
3593
3594[+] Subdomain: mss.meb.gov.tr
3595[-] IP: 212.175.132.100
3596
3597[+] Subdomain: timss.meb.gov.tr
3598[-] IP: 212.175.132.137
3599
3600[+] Subdomain: samsunrits.meb.gov.tr
3601[-] IP: 212.175.132.134
3602
3603[+] Subdomain: rebus.meb.gov.tr
3604[-] IP: 95.0.196.132
3605
3606[+] Subdomain: gercus.meb.gov.tr
3607[-] IP: 212.175.132.136
3608
3609[+] Subdomain: cungus.meb.gov.tr
3610[-] IP: 212.175.132.139
3611
3612[+] Subdomain: akkus.meb.gov.tr
3613[-] IP: 212.175.132.142
3614
3615[+] Subdomain: mus.meb.gov.tr
3616[-] IP: 212.175.132.134
3617
3618[+] Subdomain: almus.meb.gov.tr
3619[-] IP: 212.175.132.141
3620
3621[+] Subdomain: basinmus.meb.gov.tr
3622[-] IP: 212.175.132.130
3623
3624[+] Subdomain: tarsus.meb.gov.tr
3625[-] IP: 212.175.132.141
3626
3627[+] Subdomain: akcaabat.meb.gov.tr
3628[-] IP: 212.175.132.136
3629
3630[+] Subdomain: askabat.meb.gov.tr
3631[-] IP: 212.175.132.137
3632
3633[+] Subdomain: boyabat.meb.gov.tr
3634[-] IP: 212.175.132.141
3635
3636[+] Subdomain: onikisubat.meb.gov.tr
3637[-] IP: 212.175.132.137
3638
3639[+] Subdomain: cat.meb.gov.tr
3640[-] IP: 212.175.132.140
3641
3642[+] Subdomain: mufredat.meb.gov.tr
3643[-] IP: 212.175.132.107
3644
3645[+] Subdomain: manavgat.meb.gov.tr
3646[-] IP: 212.175.132.139
3647
3648[+] Subdomain: yozgat.meb.gov.tr
3649[-] IP: 212.175.132.134
3650
3651[+] Subdomain: tokat.meb.gov.tr
3652[-] IP: 212.175.132.134
3653
3654[+] Subdomain: ahlat.meb.gov.tr
3655[-] IP: 212.175.132.140
3656
3657[+] Subdomain: hayrat.meb.gov.tr
3658[-] IP: 212.175.132.136
3659
3660[+] Subdomain: samsat.meb.gov.tr
3661[-] IP: 212.175.132.139
3662
3663[+] Subdomain: savsat.meb.gov.tr
3664[-] IP: 212.175.132.139
3665
3666[+] Subdomain: mevzuat.meb.gov.tr
3667[-] IP: 212.175.132.137
3668
3669[+] Subdomain: midyat.meb.gov.tr
3670[-] IP: 212.175.132.142
3671
3672[+] Subdomain: anket.meb.gov.tr
3673[-] IP: 95.0.196.82
3674
3675[+] Subdomain: emet.meb.gov.tr
3676[-] IP: 212.175.132.142
3677
3678[+] Subdomain: mebnet.meb.gov.tr
3679[-] IP: 95.0.196.190
3680
3681[+] Subdomain: aionet.meb.gov.tr
3682[-] IP: 212.175.170.109
3683
3684[+] Subdomain: internet.meb.gov.tr
3685[-] IP: 212.175.132.129
3686
3687[+] Subdomain: kursiyernet.meb.gov.tr
3688[-] IP: 95.0.196.231
3689
3690[+] Subdomain: dargecit.meb.gov.tr
3691[-] IP: 212.175.132.142
3692
3693[+] Subdomain: kelkit.meb.gov.tr
3694[-] IP: 212.175.132.140
3695
3696[+] Subdomain: izmit.meb.gov.tr
3697[-] IP: 212.175.132.142
3698
3699[+] Subdomain: dogubeyazit.meb.gov.tr
3700[-] IP: 212.175.132.139
3701
3702[+] Subdomain: derbent.meb.gov.tr
3703[-] IP: 212.175.132.142
3704
3705[+] Subdomain: akcakent.meb.gov.tr
3706[-] IP: 212.175.132.142
3707
3708[+] Subdomain: dogankent.meb.gov.tr
3709[-] IP: 212.175.132.141
3710
3711[+] Subdomain: buharkent.meb.gov.tr
3712[-] IP: 212.175.132.139
3713
3714[+] Subdomain: senirkent.meb.gov.tr
3715[-] IP: 212.175.132.141
3716
3717[+] Subdomain: taskent.meb.gov.tr
3718[-] IP: 212.175.132.142
3719
3720[+] Subdomain: saraykent.meb.gov.tr
3721[-] IP: 212.175.132.136
3722
3723[+] Subdomain: robot.meb.gov.tr
3724[-] IP: 212.175.132.139
3725
3726[+] Subdomain: malazgirt.meb.gov.tr
3727[-] IP: 212.175.132.141
3728
3729[+] Subdomain: mazgirt.meb.gov.tr
3730[-] IP: 212.175.132.136
3731
3732[+] Subdomain: siirt.meb.gov.tr
3733[-] IP: 212.175.132.134
3734
3735[+] Subdomain: eleskirt.meb.gov.tr
3736[-] IP: 212.175.132.139
3737
3738[+] Subdomain: bayburt.meb.gov.tr
3739[-] IP: 212.175.132.134
3740
3741[+] Subdomain: akyurt.meb.gov.tr
3742[-] IP: 212.175.132.139
3743
3744[+] Subdomain: sulakyurt.meb.gov.tr
3745[-] IP: 212.175.132.136
3746
3747[+] Subdomain: guzelyurt.meb.gov.tr
3748[-] IP: 212.175.132.141
3749
3750[+] Subdomain: doganyurt.meb.gov.tr
3751[-] IP: 212.175.132.142
3752
3753[+] Subdomain: esenyurt.meb.gov.tr
3754[-] IP: 212.175.132.140
3755
3756[+] Subdomain: gelendost.meb.gov.tr
3757[-] IP: 212.175.132.140
3758
3759[+] Subdomain: sogut.meb.gov.tr
3760[-] IP: 212.175.132.139
3761
3762[+] Subdomain: etimesgut.meb.gov.tr
3763[-] IP: 212.175.132.139
3764
3765[+] Subdomain: suhut.meb.gov.tr
3766[-] IP: 212.175.132.139
3767
3768[+] Subdomain: okut.meb.gov.tr
3769[-] IP: 212.175.170.97
3770
3771[+] Subdomain: korkut.meb.gov.tr
3772[-] IP: 212.175.132.142
3773
3774[+] Subdomain: mut.meb.gov.tr
3775[-] IP: 212.175.132.141
3776
3777[+] Subdomain: kepsut.meb.gov.tr
3778[-] IP: 212.175.132.139
3779
3780[+] Subdomain: tut.meb.gov.tr
3781[-] IP: 212.175.132.139
3782
3783[+] Subdomain: tuzlukcu.meb.gov.tr
3784[-] IP: 212.175.132.142
3785
3786[+] Subdomain: turnikesunucu.meb.gov.tr
3787[-] IP: 95.0.196.92
3788
3789[+] Subdomain: ordu.meb.gov.tr
3790[-] IP: 212.175.132.134
3791
3792[+] Subdomain: altinordu.meb.gov.tr
3793[-] IP: 212.175.132.137
3794
3795[+] Subdomain: evraksorgu.meb.gov.tr
3796[-] IP: 95.0.196.127
3797
3798[+] Subdomain: palu.meb.gov.tr
3799[-] IP: 212.175.132.141
3800
3801[+] Subdomain: turkoglu.meb.gov.tr
3802[-] IP: 212.175.132.141
3803
3804[+] Subdomain: suloglu.meb.gov.tr
3805[-] IP: 212.175.132.141
3806
3807[+] Subdomain: imamoglu.meb.gov.tr
3808[-] IP: 212.175.132.139
3809
3810[+] Subdomain: beyoglu.meb.gov.tr
3811[-] IP: 212.175.132.141
3812
3813[+] Subdomain: selcuklu.meb.gov.tr
3814[-] IP: 212.175.132.142
3815
3816[+] Subdomain: artuklu.meb.gov.tr
3817[-] IP: 212.175.132.137
3818
3819[+] Subdomain: kumlu.meb.gov.tr
3820[-] IP: 212.175.132.141
3821
3822[+] Subdomain: uzumlu.meb.gov.tr
3823[-] IP: 212.175.132.141
3824
3825[+] Subdomain: kursunlu.meb.gov.tr
3826[-] IP: 212.175.132.139
3827
3828[+] Subdomain: karakoyunlu.meb.gov.tr
3829[-] IP: 212.175.132.136
3830
3831[+] Subdomain: bolu.meb.gov.tr
3832[-] IP: 212.175.132.132
3833
3834[+] Subdomain: hayrabolu.meb.gov.tr
3835[-] IP: 212.175.132.136
3836
3837[+] Subdomain: tirebolu.meb.gov.tr
3838[-] IP: 212.175.132.141
3839
3840[+] Subdomain: gelibolu.meb.gov.tr
3841[-] IP: 212.175.132.140
3842
3843[+] Subdomain: safranbolu.meb.gov.tr
3844[-] IP: 212.175.132.136
3845
3846[+] Subdomain: pazaryolu.meb.gov.tr
3847[-] IP: 212.175.132.141
3848
3849[+] Subdomain: keciborlu.meb.gov.tr
3850[-] IP: 212.175.132.140
3851
3852[+] Subdomain: uluborlu.meb.gov.tr
3853[-] IP: 212.175.132.140
3854
3855[+] Subdomain: corlu.meb.gov.tr
3856[-] IP: 212.175.132.136
3857
3858[+] Subdomain: sungurlu.meb.gov.tr
3859[-] IP: 212.175.132.139
3860
3861[+] Subdomain: sogutlu.meb.gov.tr
3862[-] IP: 212.175.132.142
3863
3864[+] Subdomain: turgutlu.meb.gov.tr
3865[-] IP: 212.175.132.142
3866
3867[+] Subdomain: armutlu.meb.gov.tr
3868[-] IP: 212.175.132.136
3869
3870[+] Subdomain: kulu.meb.gov.tr
3871[-] IP: 212.175.132.142
3872
3873[+] Subdomain: kozlu.meb.gov.tr
3874[-] IP: 212.175.132.140
3875
3876[+] Subdomain: karpuzlu.meb.gov.tr
3877[-] IP: 212.175.132.139
3878
3879[+] Subdomain: kastamonu.meb.gov.tr
3880[-] IP: 212.175.132.133
3881
3882[+] Subdomain: hanonu.meb.gov.tr
3883[-] IP: 212.175.132.142
3884
3885[+] Subdomain: inonu.meb.gov.tr
3886[-] IP: 212.175.132.141
3887
3888[+] Subdomain: sarayonu.meb.gov.tr
3889[-] IP: 212.175.132.142
3890
3891[+] Subdomain: mudurnu.meb.gov.tr
3892[-] IP: 212.175.132.140
3893
3894[+] Subdomain: alpu.meb.gov.tr
3895[-] IP: 212.175.132.141
3896
3897[+] Subdomain: kumru.meb.gov.tr
3898[-] IP: 212.175.132.142
3899
3900[+] Subdomain: karakopru.meb.gov.tr
3901[-] IP: 212.175.132.138
3902
3903[+] Subdomain: uzunkopru.meb.gov.tr
3904[-] IP: 212.175.132.141
3905
3906[+] Subdomain: vezirkopru.meb.gov.tr
3907[-] IP: 212.175.132.136
3908
3909[+] Subdomain: taskopru.meb.gov.tr
3910[-] IP: 212.175.132.140
3911
3912[+] Subdomain: basvuru.meb.gov.tr
3913[-] IP: 212.175.170.124
3914
3915[+] Subdomain: karacasu.meb.gov.tr
3916[-] IP: 212.175.132.139
3917
3918[+] Subdomain: karasu.meb.gov.tr
3919[-] IP: 212.175.132.141
3920
3921[+] Subdomain: incesu.meb.gov.tr
3922[-] IP: 212.175.132.140
3923
3924[+] Subdomain: yedisu.meb.gov.tr
3925[-] IP: 212.175.132.139
3926
3927[+] Subdomain: aksu.meb.gov.tr
3928[-] IP: 212.175.132.140
3929
3930[+] Subdomain: gursu.meb.gov.tr
3931[-] IP: 212.175.132.139
3932
3933[+] Subdomain: guneysu.meb.gov.tr
3934[-] IP: 212.175.132.142
3935
3936[+] Subdomain: oltu.meb.gov.tr
3937[-] IP: 212.175.132.140
3938
3939[+] Subdomain: okulsutu.meb.gov.tr
3940[-] IP: 95.0.196.87
3941
3942[+] Subdomain: hayatboyu.meb.gov.tr
3943[-] IP: 212.175.132.137
3944
3945[+] Subdomain: derinkuyu.meb.gov.tr
3946[-] IP: 212.175.132.141
3947
3948[+] Subdomain: hamamozu.meb.gov.tr
3949[-] IP: 212.175.132.139
3950
3951[+] Subdomain: ekinozu.meb.gov.tr
3952[-] IP: 212.175.132.142
3953
3954[+] Subdomain: altinozu.meb.gov.tr
3955[-] IP: 212.175.132.140
3956
3957[+] Subdomain: demirozu.meb.gov.tr
3958[-] IP: 212.175.132.136
3959
3960[+] Subdomain: mecitozu.meb.gov.tr
3961[-] IP: 212.175.132.139
3962
3963[+] Subdomain: beylikduzu.meb.gov.tr
3964[-] IP: 212.175.132.140
3965
3966[+] Subdomain: besikduzu.meb.gov.tr
3967[-] IP: 212.175.132.136
3968
3969[+] Subdomain: sarayduzu.meb.gov.tr
3970[-] IP: 212.175.132.136
3971
3972[+] Subdomain: gunyuzu.meb.gov.tr
3973[-] IP: 212.175.132.140
3974
3975[+] Subdomain: simav.meb.gov.tr
3976[-] IP: 212.175.132.142
3977
3978[+] Subdomain: esinav.meb.gov.tr
3979[-] IP: 95.0.196.227
3980
3981[+] Subdomain: dev.meb.gov.tr
3982[-] IP: 95.0.196.62
3983
3984[+] Subdomain: digitalarsiv.meb.gov.tr
3985[-] IP: 212.175.170.126
3986
3987[+] Subdomain: www.meb.gov.tr
3988[-] IP: 212.174.189.120
3989
3990[+] Subdomain: scientix.meb.gov.tr
3991[-] IP: 85.111.38.111
3992
3993[+] Subdomain: cay.meb.gov.tr
3994[-] IP: 212.175.132.139
3995
3996[+] Subdomain: arpacay.meb.gov.tr
3997[-] IP: 212.175.132.142
3998
3999[+] Subdomain: taslicay.meb.gov.tr
4000[-] IP: 212.175.132.139
4001
4002[+] Subdomain: daday.meb.gov.tr
4003[-] IP: 212.175.132.142
4004
4005[+] Subdomain: bahcesaray.meb.gov.tr
4006[-] IP: 212.175.132.136
4007
4008[+] Subdomain: sulusaray.meb.gov.tr
4009[-] IP: 212.175.132.141
4010
4011[+] Subdomain: hatay.meb.gov.tr
4012[-] IP: 212.175.132.133
4013
4014[+] Subdomain: karatay.meb.gov.tr
4015[-] IP: 212.175.132.141
4016
4017[+] Subdomain: azdavay.meb.gov.tr
4018[-] IP: 212.175.132.140
4019
4020[+] Subdomain: karacabey.meb.gov.tr
4021[-] IP: 212.175.132.140
4022
4023[+] Subdomain: atabey.meb.gov.tr
4024[-] IP: 212.175.132.140
4025
4026[+] Subdomain: gokcebey.meb.gov.tr
4027[-] IP: 212.175.132.136
4028
4029[+] Subdomain: sahinbey.meb.gov.tr
4030[-] IP: 212.175.132.141
4031
4032[+] Subdomain: dursunbey.meb.gov.tr
4033[-] IP: 212.175.132.139
4034
4035[+] Subdomain: lahey.meb.gov.tr
4036[-] IP: 212.175.132.137
4037
4038[+] Subdomain: guney.meb.gov.tr
4039[-] IP: 212.175.132.140
4040
4041[+] Subdomain: kocakoy.meb.gov.tr
4042[-] IP: 212.175.132.141
4043
4044[+] Subdomain: tekkekoy.meb.gov.tr
4045[-] IP: 212.175.132.136
4046
4047[+] Subdomain: cekmekoy.meb.gov.tr
4048[-] IP: 212.175.132.142
4049
4050[+] Subdomain: gumushacikoy.meb.gov.tr
4051[-] IP: 212.175.132.139
4052
4053[+] Subdomain: kadikoy.meb.gov.tr
4054[-] IP: 212.175.132.141
4055
4056[+] Subdomain: akkoy.meb.gov.tr
4057[-] IP: 212.175.132.139
4058
4059[+] Subdomain: ciftlikkoy.meb.gov.tr
4060[-] IP: 212.175.132.136
4061
4062[+] Subdomain: golkoy.meb.gov.tr
4063[-] IP: 212.175.132.141
4064
4065[+] Subdomain: sarkoy.meb.gov.tr
4066[-] IP: 212.175.132.136
4067
4068[+] Subdomain: yerkoy.meb.gov.tr
4069[-] IP: 212.175.132.136
4070
4071[+] Subdomain: bakirkoy.meb.gov.tr
4072[-] IP: 212.175.132.140
4073
4074[+] Subdomain: demirkoy.meb.gov.tr
4075[-] IP: 212.175.132.142
4076
4077[+] Subdomain: haskoy.meb.gov.tr
4078[-] IP: 212.175.132.141
4079
4080[+] Subdomain: arnavutkoy.meb.gov.tr
4081[-] IP: 212.175.132.142
4082
4083[+] Subdomain: koprukoy.meb.gov.tr
4084[-] IP: 212.175.132.141
4085
4086[+] Subdomain: saraykoy.meb.gov.tr
4087[-] IP: 212.175.132.139
4088
4089[+] Subdomain: cerkezkoy.meb.gov.tr
4090[-] IP: 212.175.132.136
4091
4092[+] Subdomain: duzkoy.meb.gov.tr
4093[-] IP: 212.175.132.141
4094
4095[+] Subdomain: kofcaz.meb.gov.tr
4096[-] IP: 212.175.132.142
4097
4098[+] Subdomain: ilgaz.meb.gov.tr
4099[-] IP: 212.175.132.139
4100
4101[+] Subdomain: banaz.meb.gov.tr
4102[-] IP: 212.175.132.136
4103
4104[+] Subdomain: kiraz.meb.gov.tr
4105[-] IP: 212.175.132.142
4106
4107[+] Subdomain: korfez.meb.gov.tr
4108[-] IP: 212.175.132.142
4109
4110[+] Subdomain: enez.meb.gov.tr
4111[-] IP: 212.175.132.140
4112
4113[+] Subdomain: kepez.meb.gov.tr
4114[-] IP: 212.175.132.139
4115
4116[+] Subdomain: gediz.meb.gov.tr
4117[-] IP: 212.175.132.141
4118
4119[+] Subdomain: koycegiz.meb.gov.tr
4120[-] IP: 212.175.132.142
4121
4122[+] Subdomain: uzaktakiyakinlarimiz.meb.gov.tr
4123[-] IP: 212.175.132.140
4124
4125[+] Subdomain: akdeniz.meb.gov.tr
4126[-] IP: 212.175.132.141
4127
4128[+] Subdomain: sariz.meb.gov.tr
4129[-] IP: 212.175.132.140
4130
4131[+] Subdomain: piraziz.meb.gov.tr
4132[-] IP: 212.175.132.141
4133
4134[+] Subdomain: beykoz.meb.gov.tr
4135[-] IP: 212.175.132.141
4136
4137[+] Subdomain: fatihprojesietz.meb.gov.tr
4138[-] IP: 212.175.132.138
4139
4140[+] Subdomain: kabaduz.meb.gov.tr
4141[-] IP: 212.175.132.141
4142
4143[+] Subdomain: arsuz.meb.gov.tr
4144[-] IP: 212.175.132.137
4145
4146[+] Subdomain: susuz.meb.gov.tr
4147[-] IP: 212.175.132.142
4148#######################################################################################################################################
4149
4150[+] Starting At 2019-11-12 21:39:53.347887
4151[+] Collecting Information On: http://www.meb.gov.tr/
4152[#] Status: 200
4153--------------------------------------------------
4154[#] Web Server Detected: Microsoft-IIS/7.5
4155[#] X-Powered-By: ASP.NET
4156[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
4157- Content-Type: text/html; charset=UTF-8
4158- Server: Microsoft-IIS/7.5
4159- X-Powered-By: ASP.NET
4160- Date: Wed, 13 Nov 2019 02:38:14 GMT
4161- Content-Length: 38385
4162--------------------------------------------------
4163[#] Finding Location..!
4164[#] status: success
4165[#] country: Turkey
4166[#] countryCode: TR
4167[#] region: 74
4168[#] regionName: Bartın
4169[#] city: Ulus
4170[#] zip: 74600
4171[#] lat: 41.5832
4172[#] lon: 32.6389
4173[#] timezone: Europe/Istanbul
4174[#] isp: TurkTelecom
4175[#] org:
4176[#] as: AS9121 Turk Telekomunikasyon Anonim Sirketi
4177[#] query: 212.174.189.120
4178--------------------------------------------------
4179[x] Didn't Detect WAF Presence on: http://www.meb.gov.tr/
4180--------------------------------------------------
4181[#] Starting Reverse DNS
4182[-] Failed ! Fail
4183--------------------------------------------------
4184[!] Scanning Open Port
4185[#] 80/tcp open http
4186[#] 443/tcp open https
4187--------------------------------------------------
4188[+] Collecting Information Disclosure!
4189[#] Detecting sitemap.xml file
4190[-] sitemap.xml file not Found!?
4191[#] Detecting robots.txt file
4192[!] robots.txt File Found: http://www.meb.gov.tr//robots.txt
4193[#] Detecting GNU Mailman
4194[-] GNU Mailman App Not Detected!?
4195--------------------------------------------------
4196[+] Crawling Url Parameter On: http://www.meb.gov.tr/
4197--------------------------------------------------
4198[#] Searching Html Form !
4199[-] No Html Form Found!?
4200--------------------------------------------------
4201[!] Found 7 dom parameter
4202[#] http://www.meb.gov.tr//#search
4203[#] http://www.meb.gov.tr//#mobile-menu
4204[#] http://www.meb.gov.tr//#announcement-sinav-duyurulari
4205[#] http://www.meb.gov.tr//#announcement-yaklasan-sinavlar
4206[#] http://www.meb.gov.tr//#news-basin-aciklamalari
4207[#] http://www.meb.gov.tr//#apps-kurumsal-projeler
4208[#] http://www.meb.gov.tr//#apps-mobil-uygulamalar
4209--------------------------------------------------
4210[!] 3 Internal Dynamic Parameter Discovered
4211[+] http://www.meb.gov.tr///meb_haberindex.php?KATEGORI=286
4212[+] http://www.meb.gov.tr/meb_duyuruindex.php?KATEGORI=2304
4213[+] http://www.meb.gov.tr/meb_duyuruindex.php?KATEGORI=2265
4214--------------------------------------------------
4215[!] 11 External Dynamic Parameter Discovered
4216[#] https://play.google.com/store/apps/details?id=com.meb.acikLise&hl=tr
4217[#] https://itunes.apple.com/tr/app/meb-ac-klise/id1148523971?mt=8
4218[#] https://play.google.com/store/apps/details?id=com.meb.vbsmobil
4219[#] https://itunes.apple.com/tr/app/meb-e-okul/id839482639?mt=8
4220[#] https://play.google.com/store/apps/details?id=com.meb.e_okul
4221[#] https://play.google.com/store/apps/details?id=air.meb.bilsemdemo
4222[#] https://play.google.com/store/apps/details?id=tr.gov.eba.hesap
4223[#] https://itunes.apple.com/us/app/eba/id1207256037?mt=8
4224[#] https://play.google.com/store/apps/details?id=com.meb.personelV2
4225[#] https://itunes.apple.com/tr/app/meb-personel/id661164713?mt=8
4226[#] https://www.cimer.gov.tr/?bim=CfDJ8CLd_u-3vtlEmchj_bWBwBeK-BX3obmKdETAPl_qwPi5sWDVZ-itnPeEYUQouDvZ8k1XmjC6LPNHADZWLN1vSVSPnZOGvXlHc-vaV_a4fJJBCjkDWbX_DNHQ2Vzh52l42Rf3i3WYWJaVNS4p9nv7nYN_2up2V9X9eKOt7r6NuKktxuXlXH0MrxmW_9L57_FQ_g
4227--------------------------------------------------
4228[!] 79 Internal links Discovered
4229[+] http://www.meb.gov.tr//favicon.ico
4230[+] http://www.meb.gov.tr//favicon.ico
4231[+] http://www.meb.gov.tr///assets/css/bootstrap.min.css
4232[+] http://www.meb.gov.tr///assets/css/bootstrap-reboot.min.css
4233[+] http://www.meb.gov.tr///assets/css/jquery.mmenu.all.css
4234[+] http://www.meb.gov.tr///assets/css/animate.css
4235[+] http://www.meb.gov.tr///assets/css/jquery.fancybox.min.css
4236[+] http://www.meb.gov.tr///assets/css/owl.carousel.min.css
4237[+] http://www.meb.gov.tr///assets/css/owl.theme.default.min.css
4238[+] http://www.meb.gov.tr///assets/css/all.min.css
4239[+] http://www.meb.gov.tr///assets/css/headhesive.css
4240[+] http://www.meb.gov.tr///assets/css/superfish.css
4241[+] http://www.meb.gov.tr///assets/css/aos.css
4242[+] http://www.meb.gov.tr///assets/css/hover-animate.css
4243[+] http://www.meb.gov.tr///assets/css/style.css
4244[+] http://www.meb.gov.tr///assets/css/ie.css
4245[+] http://www.meb.gov.tr///
4246[+] http://www.meb.gov.tr///
4247[+] http://www.meb.gov.tr///index.php
4248[+] http://www.meb.gov.tr///eposta/
4249[+] http://www.meb.gov.tr///en
4250[+] http://www.meb.gov.tr///bakan-selcuk-arnavutluk-egitim-bakani-shahini-ile-gorustu/haber/19679/tr
4251[+] http://www.meb.gov.tr///bakan-selcuk-arnavutluk-egitim-bakani-shahini-ile-gorustu/haber/19679/tr
4252[+] http://www.meb.gov.tr///bakan-selcuk-arnavutluk-egitim-bakani-shahini-ile-gorustu/haber/19679/tr
4253[+] http://www.meb.gov.tr///rehberlik-ve-arastirma-merkezleri-gucleniyor/haber/19678/tr
4254[+] http://www.meb.gov.tr///rehberlik-ve-arastirma-merkezleri-gucleniyor/haber/19678/tr
4255[+] http://www.meb.gov.tr///rehberlik-ve-arastirma-merkezleri-gucleniyor/haber/19678/tr
4256[+] http://www.meb.gov.tr///11-milyon-agac-bugun-fidan-yarin-nefes/haber/19673/tr
4257[+] http://www.meb.gov.tr///11-milyon-agac-bugun-fidan-yarin-nefes/haber/19673/tr
4258[+] http://www.meb.gov.tr///11-milyon-agac-bugun-fidan-yarin-nefes/haber/19673/tr
4259[+] http://www.meb.gov.tr///karanligi-aydinlananlar-oyku-yarismasinin-sonuclari-belli-oldu/haber/19671/tr
4260[+] http://www.meb.gov.tr///karanligi-aydinlananlar-oyku-yarismasinin-sonuclari-belli-oldu/haber/19671/tr
4261[+] http://www.meb.gov.tr///karanligi-aydinlananlar-oyku-yarismasinin-sonuclari-belli-oldu/haber/19671/tr
4262[+] http://www.meb.gov.tr///destek-egitim-programlari-guncellendi/haber/19670/tr
4263[+] http://www.meb.gov.tr///destek-egitim-programlari-guncellendi/haber/19670/tr
4264[+] http://www.meb.gov.tr///destek-egitim-programlari-guncellendi/haber/19670/tr
4265[+] http://www.meb.gov.tr///guzel-sanatlar-liselerini-guclendirecek-hamle/haber/19669/tr
4266[+] http://www.meb.gov.tr///guzel-sanatlar-liselerini-guclendirecek-hamle/haber/19669/tr
4267[+] http://www.meb.gov.tr///guzel-sanatlar-liselerini-guclendirecek-hamle/haber/19669/tr
4268[+] http://www.meb.gov.tr///hicbir-cocugumuzun-ayrimciliga-maruz-kalmasina-asla-musaade-etmeyiz/haber/19654/tr
4269[+] http://www.meb.gov.tr///hicbir-cocugumuzun-ayrimciliga-maruz-kalmasina-asla-musaade-etmeyiz/haber/19654/tr
4270[+] http://www.meb.gov.tr///hicbir-cocugumuzun-ayrimciliga-maruz-kalmasina-asla-musaade-etmeyiz/haber/19654/tr
4271[+] http://www.meb.gov.tr///belediyelerimizle-daha-buyuk-bir-is-birligine-ihtiyacimiz-var/haber/19657/tr
4272[+] http://www.meb.gov.tr///belediyelerimizle-daha-buyuk-bir-is-birligine-ihtiyacimiz-var/haber/19657/tr
4273[+] http://www.meb.gov.tr///belediyelerimizle-daha-buyuk-bir-is-birligine-ihtiyacimiz-var/haber/19657/tr
4274[+] http://www.meb.gov.tr///dortmund-turk-egitim-merkezi-27-yasinda/haber/19672/tr
4275[+] http://www.meb.gov.tr///dortmund-turk-egitim-merkezi-27-yasinda/haber/19672/tr
4276[+] http://www.meb.gov.tr///dortmund-turk-egitim-merkezi-27-yasinda/haber/19672/tr
4277[+] http://www.meb.gov.tr///ara-tatilde-okullarin-kapilari-dogaya-spora-kulture-sanata-aciliyor/haber/19647/tr
4278[+] http://www.meb.gov.tr///ara-tatilde-okullarin-kapilari-dogaya-spora-kulture-sanata-aciliyor/haber/19647/tr
4279[+] http://www.meb.gov.tr///ara-tatilde-okullarin-kapilari-dogaya-spora-kulture-sanata-aciliyor/haber/19647/tr
4280[+] http://www.meb.gov.tr///meb_sinavindex.php
4281[+] http://www.meb.gov.tr///meb_duyuruindex.php
4282[+] http://www.meb.gov.tr/basin-aciklamasi/haber/19452/tr
4283[+] http://www.meb.gov.tr/basin-aciklamasi/haber/19162/tr
4284[+] http://www.meb.gov.tr/basin-aciklamasi/haber/18718/tr
4285[+] http://www.meb.gov.tr/basin-aciklamasi/haber/17902/tr
4286[+] http://2023vizyonu.meb.gov.tr
4287[+] http://birmilyonfikir.meb.gov.tr
4288[+] https://meslegimhayatim.meb.gov.tr/
4289[+] https://e-okul.meb.gov.tr/
4290[+] http://mebbis.meb.gov.tr/
4291[+] http://dys.meb.gov.tr
4292[+] http://aolweb.aol.meb.gov.tr/
4293[+] http://mebbis.meb.gov.tr/
4294[+] https://e-okul.meb.gov.tr/
4295[+] http://dys.meb.gov.tr
4296[+] http://www.meb.gov.tr/duyurular/duyurular2012/basinmus/mebim.php
4297[+] http://fatihprojesi.meb.gov.tr/
4298[+] https://pictes.meb.gov.tr
4299[+] http://kizlarinegitimi.meb.gov.tr/
4300[+] http://mesgep.meb.gov.tr/
4301[+] http://okulsagligi.meb.gov.tr/
4302[+] http://iedb.meb.gov.tr/www/hayirsever-yatirimlari/kategori/161
4303[+] http://ookgm.meb.gov.tr/meb_iys_dosyalar/2018_05/02150850_01_Trafik_Eylem_PlanY.pdf
4304[+] https://www.kultureserleri.meb.gov.tr/
4305[+] https://evraksorgu.meb.gov.tr/dilekcesorgula.jsp
4306[+] https://evraksorgu.meb.gov.tr/evrakdogrulama.jsp
4307[+] https://meslegimhayatim.meb.gov.tr/
4308--------------------------------------------------
4309[!] 14 External links Discovered
4310[#] https://www.facebook.com/milliegitimbakanligi
4311[#] https://www.twitter.com/tcmeb
4312[#] http://www.instagram.com/tcmeb
4313[#] http://www.eba.gov.tr/
4314[#] http://www.eba.gov.tr/
4315[#] https://itunes.apple.com/tr/app/meb-e-okul/id982521746
4316[#] https://itunes.apple.com/tr/app/bilsem-tan%C4%B1t%C4%B1m/id1303486851
4317[#] http://www.eba.gov.tr/
4318[#] https://www.cimer.gov.tr/
4319[#] https://www.turkiye.gov.tr/
4320[#] http://www.edchreturkey-eu.coe.int/default_TU.asp
4321[#] http://www.kdkcocuk.gov.tr/
4322[#] http://www.trafikdedektifleri.com/
4323[#] https://www.teknofestistanbul.org/
4324--------------------------------------------------
4325[#] Mapping Subdomain..
4326[!] Found 100 Subdomain
4327- gonen10.meb.gov.tr
4328- kale20.meb.gov.tr
4329- bozkurt20.meb.gov.tr
4330- pazar60.meb.gov.tr
4331- yesilyurt60.meb.gov.tr
4332- yenipazar11.meb.gov.tr
4333- yenisehir21.meb.gov.tr
4334- koprubasi61.meb.gov.tr
4335- e-okul1.meb.gov.tr
4336- golbasi02.meb.gov.tr
4337- mebk12.meb.gov.tr
4338- gonen32.meb.gov.tr
4339- eregli42.meb.gov.tr
4340- ekip42.meb.gov.tr
4341- ulubey52.meb.gov.tr
4342- ovacik62.meb.gov.tr
4343- papatya2.meb.gov.tr
4344- mek2.meb.gov.tr
4345- mebbis2.meb.gov.tr
4346- externaldns2.meb.gov.tr
4347- bayat03.meb.gov.tr
4348- sbs2013.meb.gov.tr
4349- aydincik33.meb.gov.tr
4350- yenisehir33.meb.gov.tr
4351- pazar53.meb.gov.tr
4352- kale44.meb.gov.tr
4353- yesilyurt44.meb.gov.tr
4354- ulubey64.meb.gov.tr
4355- altinyayla15.meb.gov.tr
4356- kemer15.meb.gov.tr
4357- koprubasi45.meb.gov.tr
4358- ayvacik55.meb.gov.tr
4359- edremit65.meb.gov.tr
4360- saray65.meb.gov.tr
4361- golbasi06.meb.gov.tr
4362- nilufer16.meb.gov.tr
4363- aydincik66.meb.gov.tr
4364- ilbap07.meb.gov.tr
4365- kemer07.meb.gov.tr
4366- aksu07.meb.gov.tr
4367- yenice17.meb.gov.tr
4368- pinarbasi37.meb.gov.tr
4369- bitek37.meb.gov.tr
4370- bozkurt37.meb.gov.tr
4371- eregli67.meb.gov.tr
4372- altinyayla58.meb.gov.tr
4373- ortakoy68.meb.gov.tr
4374- yenice78.meb.gov.tr
4375- ovacik78.meb.gov.tr
4376- yenipazar09.meb.gov.tr
4377- bayat19.meb.gov.tr
4378- saray59.meb.gov.tr
4379- erbaa.meb.gov.tr
4380- carsamba.meb.gov.tr
4381- alaca.meb.gov.tr
4382- darica.meb.gov.tr
4383- catalca.meb.gov.tr
4384- yigilca.meb.gov.tr
4385- sapanca.meb.gov.tr
4386- foca.meb.gov.tr
4387- akcakoca.meb.gov.tr
4388- kaynarca.meb.gov.tr
4389- cukurca.meb.gov.tr
4390- datca.meb.gov.tr
4391- buca.meb.gov.tr
4392- kumluca.meb.gov.tr
4393- tuzluca.meb.gov.tr
4394- bozcaada.meb.gov.tr
4395- gokceada.meb.gov.tr
4396- sanliurfa.meb.gov.tr
4397- yenicaga.meb.gov.tr
4398- aliaga.meb.gov.tr
4399- biga.meb.gov.tr
4400- dodurga.meb.gov.tr
4401- karsiyaka.meb.gov.tr
4402- akyaka.meb.gov.tr
4403- golyaka.meb.gov.tr
4404- borcka.meb.gov.tr
4405- sertifika.meb.gov.tr
4406- bala.meb.gov.tr
4407- mugla.meb.gov.tr
4408- kodlamugla.meb.gov.tr
4409- urla.meb.gov.tr
4410- akkisla.meb.gov.tr
4411- sarkisla.meb.gov.tr
4412- ulukisla.meb.gov.tr
4413- ula.meb.gov.tr
4414- kula.meb.gov.tr
4415- haydikizlarokula.meb.gov.tr
4416- camliyayla.meb.gov.tr
4417- basyayla.meb.gov.tr
4418- tuzla.meb.gov.tr
4419- bergama.meb.gov.tr
4420- atama.meb.gov.tr
4421- ilkatama.meb.gov.tr
4422- soma.meb.gov.tr
4423- bandirma.meb.gov.tr
4424- caycuma.meb.gov.tr
4425- okuma-yazma.meb.gov.tr
4426- adana.meb.gov.tr
4427--------------------------------------------------
4428[!] Done At 2019-11-12 21:40:29.330010
4429######################################################################################################################################
4430[INFO] ------TARGET info------
4431[*] TARGET: http://www.meb.gov.tr/
4432[*] TARGET IP: 212.174.189.120
4433[INFO] NO load balancer detected for www.meb.gov.tr...
4434[*] DNS servers: papatya.meb.gov.tr.
4435[*] TARGET server: Microsoft-IIS/7.5
4436[*] CC: TR
4437[*] Country: Turkey
4438[*] RegionCode: 74
4439[*] RegionName: Bartın
4440[*] City: Ulus
4441[*] ASN: AS9121
4442[*] BGP_PREFIX: 212.174.0.0/15
4443[*] ISP: TTNet Turk Telekomunikasyon Anonim Sirketi, TR
4444[INFO] DNS enumeration:
4445[*] ads.meb.gov.tr 95.0.196.23
4446[*] ftp.meb.gov.tr 212.175.170.116
4447[*] mail.meb.gov.tr 212.174.189.120
4448[*] webconf.meb.gov.tr 212.175.133.101
4449[INFO] Possible abuse mails are:
4450[*] abuse@meb.gov.tr
4451[*] abuse@ttnet.com.tr
4452[*] abuse@www.meb.gov.tr
4453[INFO] NO PAC (Proxy Auto Configuration) file FOUND
4454[ALERT] robots.txt file FOUND in http://www.meb.gov.tr/robots.txt
4455[INFO] Checking for HTTP status codes recursively from http://www.meb.gov.tr/robots.txt
4456[INFO] Status code Folders
4457[INFO] Starting FUZZing in http://www.meb.gov.tr/FUzZzZzZzZz...
4458[INFO] Status code Folders
4459[ALERT] Look in the source code. It may contain passwords
4460[INFO] SAME content in http://www.meb.gov.tr/ AND http://212.174.189.120/
4461[INFO] Links found from http://www.meb.gov.tr/:
4462[*] http://2023vizyonu.meb.gov.tr/
4463[*] http://aolweb.aol.meb.gov.tr/
4464[*] http://birmilyonfikir.meb.gov.tr/
4465[*] http://dys.meb.gov.tr/
4466[*] http://fatihprojesi.meb.gov.tr/
4467[*] http://iedb.meb.gov.tr/www/hayirsever-yatirimlari/kategori/161
4468[*] http://kizlarinegitimi.meb.gov.tr/
4469[*] http://mebbis.meb.gov.tr/
4470[*] http://mesgep.meb.gov.tr/
4471[*] http://okulsagligi.meb.gov.tr/
4472[*] http://ookgm.meb.gov.tr/meb_iys_dosyalar/2018_05/02150850_01_Trafik_Eylem_PlanY.pdf
4473[*] http://oygm.meb.gov.tr/www/adaylik-kaldirma-sinavi-08-aralik-2019/icerik/763
4474[*] https://e-okul.meb.gov.tr/
4475[*] https://evraksorgu.meb.gov.tr/dilekcesorgula.jsp
4476[*] https://evraksorgu.meb.gov.tr/evrakdogrulama.jsp
4477[*] https://itunes.apple.com/tr/app/bilsem-tan%C4%B1t%C4%B1m/id1303486851
4478[*] https://itunes.apple.com/tr/app/meb-ac-klise/id1148523971?mt=8
4479[*] https://itunes.apple.com/tr/app/meb-e-okul/id839482639?mt=8
4480[*] https://itunes.apple.com/tr/app/meb-e-okul/id982521746
4481[*] https://itunes.apple.com/tr/app/meb-personel/id661164713?mt=8
4482[*] https://itunes.apple.com/us/app/eba/id1207256037?mt=8
4483[*] https://meslegimhayatim.meb.gov.tr/
4484[*] https://pictes.meb.gov.tr/
4485[*] https://play.google.com/store/apps/details?id=air.meb.bilsemdemo
4486[*] https://play.google.com/store/apps/details?id=com.meb.acikLise&hl=tr
4487[*] https://play.google.com/store/apps/details?id=com.meb.e_okul
4488[*] https://play.google.com/store/apps/details?id=com.meb.personelV2
4489[*] https://play.google.com/store/apps/details?id=com.meb.vbsmobil
4490[*] https://play.google.com/store/apps/details?id=tr.gov.eba.hesap
4491[*] https://www.cimer.gov.tr/
4492[*] https://www.cimer.gov.tr/?bim=CfDJ8CLd_u-3vtlEmchj_bWBwBeK-BX3obmKdETAPl_qwPi5sWDVZ-itnPeEYUQouDvZ8k1XmjC6LPNHADZWLN1vSVSPnZOGvXlHc-vaV_a4fJJBCjkDWbX_DNHQ2Vzh52l42Rf3i3WYWJaVNS4p9nv7nYN_2up2V9X9eKOt7r6NuKktxuXlXH0MrxmW_9L57_FQ_g
4493[*] https://www.facebook.com/milliegitimbakanligi
4494[*] https://www.kultureserleri.meb.gov.tr/
4495[*] https://www.meb.gov.tr/sinavlar/sonuc/sorgu.php?SINAV_ID=2DDA45DA9F3B28EBF92501E5C4112FF4
4496[*] https://www.meb.gov.tr/sinavlar/sonuc/sorgu.php?SINAV_ID=83CFADE46B6C6730846439E82B483F31
4497[*] https://www.meb.gov.tr/sinavlar/sonuc/sorgu.php?SINAV_ID=DC461E4B5B5043EAD3E23BE7FC4094A0
4498[*] https://www.teknofestistanbul.org/
4499[*] https://www.turkiye.gov.tr/
4500[*] https://www.twitter.com/tcmeb
4501[*] http://www.eba.gov.tr/
4502[*] http://www.edchreturkey-eu.coe.int/default_TU.asp
4503[*] http://www.instagram.com/tcmeb
4504[*] http://www.kdkcocuk.gov.tr/
4505[*] http://www.meb.gov.tr/
4506[*] http://www.meb.gov.tr/11-milyon-agac-bugun-fidan-yarin-nefes/haber/19673/tr
4507[*] http://www.meb.gov.tr/#announcement-sinav-duyurulari
4508[*] http://www.meb.gov.tr/#announcement-yaklasan-sinavlar
4509[*] http://www.meb.gov.tr/#apps-kurumsal-projeler
4510[*] http://www.meb.gov.tr/#apps-mobil-uygulamalar
4511[*] http://www.meb.gov.tr/ara-tatilde-okullarin-kapilari-dogaya-spora-kulture-sanata-aciliyor/haber/19647/tr
4512[*] http://www.meb.gov.tr/bakan-selcuk-arnavutluk-egitim-bakani-shahini-ile-gorustu/haber/19679/tr
4513[*] http://www.meb.gov.tr/basin-aciklamasi/haber/17902/tr
4514[*] http://www.meb.gov.tr/basin-aciklamasi/haber/18718/tr
4515[*] http://www.meb.gov.tr/basin-aciklamasi/haber/19162/tr
4516[*] http://www.meb.gov.tr/basin-aciklamasi/haber/19452/tr
4517[*] http://www.meb.gov.tr/belediyelerimizle-daha-buyuk-bir-is-birligine-ihtiyacimiz-var/haber/19657/tr
4518[*] http://www.meb.gov.tr/destek-egitim-programlari-guncellendi/haber/19670/tr
4519[*] http://www.meb.gov.tr/dortmund-turk-egitim-merkezi-27-yasinda/haber/19672/tr
4520[*] http://www.meb.gov.tr/duyurular/duyurular2012/basinmus/mebim.php
4521[*] http://www.meb.gov.tr/en
4522[*] http://www.meb.gov.tr/eposta/
4523[*] http://www.meb.gov.tr/guzel-sanatlar-liselerini-guclendirecek-hamle/haber/19669/tr
4524[*] http://www.meb.gov.tr/hicbir-cocugumuzun-ayrimciliga-maruz-kalmasina-asla-musaade-etmeyiz/haber/19654/tr
4525[*] http://www.meb.gov.tr/index.php
4526[*] http://www.meb.gov.tr/karanligi-aydinlananlar-oyku-yarismasinin-sonuclari-belli-oldu/haber/19671/tr
4527[*] http://www.meb.gov.tr/meb_duyuruindex.php
4528[*] http://www.meb.gov.tr/meb_duyuruindex.php?KATEGORI=2265
4529[*] http://www.meb.gov.tr/meb_duyuruindex.php?KATEGORI=2304
4530[*] http://www.meb.gov.tr/meb_haberindex.php?KATEGORI=286
4531[*] http://www.meb.gov.tr/meb_iys_dosyalar/2019_10/25151315_Kalfalik_ve_Ustalik_Teorik__e-Sinav__Kilavuzu_2019-2020.pdf
4532[*] http://www.meb.gov.tr/meb_sinavindex.php
4533[*] http://www.meb.gov.tr/#mobile-menu
4534[*] http://www.meb.gov.tr/#news-basin-aciklamalari
4535[*] http://www.meb.gov.tr/rehberlik-ve-arastirma-merkezleri-gucleniyor/haber/19678/tr
4536[*] http://www.meb.gov.tr/#search
4537[*] http://www.meb.gov.tr/sistem-bakim-calismasi/duyuru/19650/tr
4538[*] http://www.trafikdedektifleri.com/
4539[*] http://yyegm.meb.gov.tr/www/2019-ylsy-yurt-disina-lisansustu-ogrenim-gormek-uzere-gonderilecek-ogrencilerin-sozlu-sinav-sonuclari-aciklanmistir/icerik/432
4540cut: intervalle de champ incorrecte
4541Saisissez « cut --help » pour plus d'informations.
4542[INFO] Shodan detected the following opened ports on 212.174.189.120:
4543[*] 80
4544[INFO] ------VirusTotal SECTION------
4545[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
4546[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
4547[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
4548[INFO] ------Alexa Rank SECTION------
4549[INFO] Percent of Visitors Rank in Country:
4550[INFO] Percent of Search Traffic:
4551[INFO] Percent of Unique Visits:
4552[INFO] Total Sites Linking In:
4553[*] Total Sites
4554[INFO] Useful links related to www.meb.gov.tr - 212.174.189.120:
4555[*] https://www.virustotal.com/pt/ip-address/212.174.189.120/information/
4556[*] https://www.hybrid-analysis.com/search?host=212.174.189.120
4557[*] https://www.shodan.io/host/212.174.189.120
4558[*] https://www.senderbase.org/lookup/?search_string=212.174.189.120
4559[*] https://www.alienvault.com/open-threat-exchange/ip/212.174.189.120
4560[*] http://pastebin.com/search?q=212.174.189.120
4561[*] http://urlquery.net/search.php?q=212.174.189.120
4562[*] http://www.alexa.com/siteinfo/www.meb.gov.tr
4563[*] http://www.google.com/safebrowsing/diagnostic?site=www.meb.gov.tr
4564[*] https://censys.io/ipv4/212.174.189.120
4565[*] https://www.abuseipdb.com/check/212.174.189.120
4566[*] https://urlscan.io/search/#212.174.189.120
4567[*] https://github.com/search?q=212.174.189.120&type=Code
4568[INFO] Useful links related to AS9121 - 212.174.0.0/15:
4569[*] http://www.google.com/safebrowsing/diagnostic?site=AS:9121
4570[*] https://www.senderbase.org/lookup/?search_string=212.174.0.0/15
4571[*] http://bgp.he.net/AS9121
4572[*] https://stat.ripe.net/AS9121
4573[INFO] Date: 12/11/19 | Time: 21:41:35
4574[INFO] Total time: 1 minute(s) and 46 second(s)
4575#######################################################################################################################################
4576Trying "meb.gov.tr"
4577;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55218
4578;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 2, ADDITIONAL: 2
4579
4580;; QUESTION SECTION:
4581;meb.gov.tr. IN ANY
4582
4583;; ANSWER SECTION:
4584meb.gov.tr. 3600 IN TXT "adobe-idp-site-verification=29678fb148b362521305f146f13f245956ef66b528571d1818bb8e6f8f25d41a"
4585meb.gov.tr. 3600 IN TXT "v=spf1 ip4:212.175.170.105 a mx ~all"
4586meb.gov.tr. 3600 IN MX 10 mebfmgw.meb.gov.tr.
4587meb.gov.tr. 3600 IN SOA papatya.meb.gov.tr. ays.meb.gov.tr. 2016121325 14400 3600 1296000 3600
4588meb.gov.tr. 3600 IN A 212.174.189.120
4589meb.gov.tr. 3600 IN NS papatya.meb.gov.tr.
4590meb.gov.tr. 3600 IN NS papatya2.meb.gov.tr.
4591
4592;; AUTHORITY SECTION:
4593meb.gov.tr. 3600 IN NS papatya.meb.gov.tr.
4594meb.gov.tr. 3600 IN NS papatya2.meb.gov.tr.
4595
4596;; ADDITIONAL SECTION:
4597papatya2.meb.gov.tr. 42773 IN A 212.174.189.113
4598papatya.meb.gov.tr. 42773 IN A 212.174.189.114
4599
4600Received 367 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 1772 ms
4601#######################################################################################################################################
4602; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace meb.gov.tr any
4603;; global options: +cmd
4604. 84703 IN NS h.root-servers.net.
4605. 84703 IN NS f.root-servers.net.
4606. 84703 IN NS k.root-servers.net.
4607. 84703 IN NS l.root-servers.net.
4608. 84703 IN NS d.root-servers.net.
4609. 84703 IN NS m.root-servers.net.
4610. 84703 IN NS i.root-servers.net.
4611. 84703 IN NS a.root-servers.net.
4612. 84703 IN NS j.root-servers.net.
4613. 84703 IN NS c.root-servers.net.
4614. 84703 IN NS g.root-servers.net.
4615. 84703 IN NS e.root-servers.net.
4616. 84703 IN NS b.root-servers.net.
4617. 84703 IN RRSIG NS 8 0 518400 20191125170000 20191112160000 22545 . GHUYJ8KxOGsGBbSRjytOq4i5OmkN/Q9H8pbRQe1chD5X20XeX4u4UnlL c/bYeJ320KIkuYi1rjVD4elc3hT07Dasgefz4Tu7v0MHgAbLCynsHa7S MQWS5XL4wXn8ohUEfYIq3BN2RjgHoxpoqBp6qEDJCjkhocjGYDwnShDE THMhMQpUwTr1nImR6Z4DgnBNVZ2T4QvqIzymBgiWMdHevBU2NTtJ1CAZ hmyjhwB9dC0b07g5mb4cWG8x7uuIlq3uu963JCaArl+/4u3HDj/xumk4 wGXUPtbL2dtNraKbXpvilBE6yfMRMDj/JNp+LdPLCa6UI8EBPDYlsaUu hjTs0A==
4618;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 186 ms
4619
4620tr. 172800 IN NS ns21.nic.tr.
4621tr. 172800 IN NS ns22.nic.tr.
4622tr. 172800 IN NS ns31.nic.tr.
4623tr. 172800 IN NS ns41.nic.tr.
4624tr. 172800 IN NS ns42.nic.tr.
4625tr. 172800 IN NS ns91.nic.tr.
4626tr. 172800 IN NS ns92.nic.tr.
4627tr. 86400 IN NSEC trade. NS RRSIG NSEC
4628tr. 86400 IN RRSIG NSEC 8 1 86400 20191125170000 20191112160000 22545 . mXpR5gKtKvZgUFRTx/JAX833k0PStiSRbLepShS06kBgmswWQB5OqqzN 4jkcMDcmz03oaryB4qPrg3waVya3+OFQZR1yavmN1x3WGawvODMEF3j5 0AtKDhPs5bAviuhroY4xQ2qf+mLPaqUqcNnlNUxSqCPSMpBPZAz/AFkt M6gtz3mS6y6YpAVV4Rn3Usf6/QzPDE9wKSNZAZ5WmG1mapsNy4bQSbxE pF86GqqjfZNo9wgdkGSg3SCBm/dbbgZM88/LX1wwOL5sHUUqvjeKIORZ sW6npULZEMdUxXUiEY6biZLAHHNAqAKmGEDx58KVg240KEve4a5gBuzK IdNz5Q==
4629;; Received 714 bytes from 192.58.128.30#53(j.root-servers.net) in 203 ms
4630
4631meb.gov.tr. 43200 IN NS papatya.meb.gov.tr.
4632meb.gov.tr. 43200 IN NS papatya2.meb.gov.tr.
4633;; Received 116 bytes from 213.14.246.6#53(ns22.nic.tr) in 229 ms
4634
4635;; communications error to 212.174.189.114#53: connection reset
4636#######################################################################################################################################
4637[*] Performing General Enumeration of Domain: meb.gov.tr
4638[-] DNSSEC is not configured for meb.gov.tr
4639[*] SOA papatya.meb.gov.tr 212.174.189.114
4640[*] NS papatya.meb.gov.tr 212.174.189.114
4641[*] NS papatya2.meb.gov.tr 212.174.189.113
4642[*] A meb.gov.tr 212.174.189.120
4643[*] TXT meb.gov.tr adobe-idp-site-verification=29678fb148b362521305f146f13f245956ef66b528571d1818bb8e6f8f25d41a
4644[*] TXT meb.gov.tr v=spf1 ip4:212.175.170.105 a mx ~all
4645[*] Enumerating SRV Records
4646[*] SRV _sipfederationtls._tcp.meb.gov.tr sip.meb.gov.tr 212.175.133.100 5061 0
4647[+] 1 Records Found
4648######################################################################################################################################
4649[*] Processing domain meb.gov.tr
4650[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
4651[+] Getting nameservers
4652212.174.189.114 - papatya.meb.gov.tr
4653212.174.189.113 - papatya2.meb.gov.tr
4654[-] Zone transfer failed
4655
4656[+] TXT records found
4657"adobe-idp-site-verification=29678fb148b362521305f146f13f245956ef66b528571d1818bb8e6f8f25d41a"
4658"v=spf1 ip4:212.175.170.105 a mx ~all"
4659
4660[+] MX records found, added to target list
466110 mebfmgw.meb.gov.tr.
4662
4663[*] Scanning meb.gov.tr for A records
4664212.175.170.105 - mebfmgw.meb.gov.tr
4665212.174.189.120 - meb.gov.tr
466695.0.196.23 - ads.meb.gov.tr
466795.0.196.30 - autodiscover.meb.gov.tr
4668212.175.133.102 - av.meb.gov.tr
4669212.175.132.139 - cal.meb.gov.tr
4670212.175.132.137 - demo.meb.gov.tr
467195.0.196.62 - dev.meb.gov.tr
467295.0.196.212 - e.meb.gov.tr
4673212.175.170.116 - ftp.meb.gov.tr
4674212.175.132.137 - la.meb.gov.tr
4675212.174.189.120 - mail.meb.gov.tr
467695.0.196.212 - mobil.meb.gov.tr
4677212.175.133.100 - sip.meb.gov.tr
467895.0.196.134 - sslvpn.meb.gov.tr
467995.0.196.29 - stat.meb.gov.tr
468095.0.196.194 - tv.meb.gov.tr
4681212.175.133.101 - webconf.meb.gov.tr
4682212.174.189.120 - www.meb.gov.tr
4683######################################################################################################################################
4684
4685 AVAILABLE PLUGINS
4686 -----------------
4687
4688 OpenSslCcsInjectionPlugin
4689 HttpHeadersPlugin
4690 SessionRenegotiationPlugin
4691 SessionResumptionPlugin
4692 EarlyDataPlugin
4693 FallbackScsvPlugin
4694 OpenSslCipherSuitesPlugin
4695 CertificateInfoPlugin
4696 HeartbleedPlugin
4697 CompressionPlugin
4698 RobotPlugin
4699
4700
4701
4702 CHECKING HOST(S) AVAILABILITY
4703 -----------------------------
4704
4705 212.174.189.120:443 => 212.174.189.120
4706
4707
4708
4709
4710 SCAN RESULTS FOR 212.174.189.120:443 - 212.174.189.120
4711 ------------------------------------------------------
4712
4713 * SSLV2 Cipher Suites:
4714 Server rejected all cipher suites.
4715
4716 * OpenSSL CCS Injection:
4717 OK - Not vulnerable to OpenSSL CCS injection
4718
4719 * TLS 1.2 Session Resumption Support:
4720 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
4721 With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
4722
4723 * Certificate Information:
4724 Content
4725 SHA1 Fingerprint: b027b2ede667796aebd4c545ca76e776aa141529
4726 Common Name: *.meb.gov.tr
4727 Issuer: GlobalSign Organization Validation CA - SHA256 - G2
4728 Serial Number: 21331925167356761564868098540
4729 Not Before: 2017-12-19 15:34:35
4730 Not After: 2021-03-08 15:02:14
4731 Signature Algorithm: sha256
4732 Public Key Algorithm: RSA
4733 Key Size: 2048
4734 Exponent: 65537 (0x10001)
4735 DNS Subject Alternative Names: ['*.meb.gov.tr', 'meb.gov.tr']
4736
4737 Trust
4738 Hostname Validation: FAILED - Certificate does NOT match 212.174.189.120
4739 Android CA Store (9.0.0_r9): OK - Certificate is trusted
4740 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
4741 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
4742 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
4743 Windows CA Store (2019-05-27): OK - Certificate is trusted
4744 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
4745 Received Chain: *.meb.gov.tr --> GlobalSign Organization Validation CA - SHA256 - G2 --> GlobalSign Root CA
4746 Verified Chain: *.meb.gov.tr --> GlobalSign Organization Validation CA - SHA256 - G2 --> GlobalSign Root CA
4747 Received Chain Contains Anchor: WARNING - Received certificate chain contains the anchor certificate
4748 Received Chain Order: OK - Order is valid
4749 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
4750
4751 Extensions
4752 OCSP Must-Staple: NOT SUPPORTED - Extension not found
4753 Certificate Transparency: OK - 4 SCTs included
4754
4755 OCSP Stapling
4756 NOT SUPPORTED - Server did not send back an OCSP response
4757
4758 * Session Renegotiation:
4759 Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
4760 Secure Renegotiation: OK - Supported
4761
4762 * TLSV1_3 Cipher Suites:
4763 Server rejected all cipher suites.
4764
4765 * Deflate Compression:
4766 OK - Compression disabled
4767
4768 * Downgrade Attacks:
4769 TLS_FALLBACK_SCSV: OK - Supported
4770
4771 * SSLV3 Cipher Suites:
4772 Forward Secrecy OK - Supported
4773 RC4 OK - Not Supported
4774
4775 Preferred:
4776 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4777 Accepted:
4778 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4779 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4780 TLS_DH_anon_WITH_AES_256_CBC_SHA ANONYMOUS HTTP 200 OK
4781 TLS_DH_anon_WITH_AES_128_CBC_SHA ANONYMOUS HTTP 200 OK
4782 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4783 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4784
4785 * TLSV1_2 Cipher Suites:
4786 Forward Secrecy OK - Supported
4787 RC4 OK - Not Supported
4788
4789 Preferred:
4790 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
4791 Accepted:
4792 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
4793 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
4794 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4795 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
4796 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
4797 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4798 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
4799 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
4800 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4801 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
4802 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
4803 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4804 TLS_DH_anon_WITH_AES_256_GCM_SHA384 ANONYMOUS HTTP 404 Not Found
4805 TLS_DH_anon_WITH_AES_128_GCM_SHA256 ANONYMOUS HTTP 200 OK
4806 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
4807 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
4808 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4809 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
4810 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
4811 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
4812 Undefined - An unexpected error happened:
4813 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
4814
4815 * TLSV1_1 Cipher Suites:
4816 Forward Secrecy OK - Supported
4817 RC4 OK - Not Supported
4818
4819 Preferred:
4820 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4821 Accepted:
4822 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4823 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4824 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4825 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4826 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4827 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4828
4829 * OpenSSL Heartbleed:
4830 OK - Not vulnerable to Heartbleed
4831
4832 * TLSV1 Cipher Suites:
4833 Forward Secrecy OK - Supported
4834 RC4 OK - Not Supported
4835
4836 Preferred:
4837 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4838 Accepted:
4839 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4840 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4841 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4842 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
4843 TLS_DH_anon_WITH_AES_256_CBC_SHA ANONYMOUS HTTP 200 OK
4844 TLS_DH_anon_WITH_AES_128_CBC_SHA ANONYMOUS HTTP 200 OK
4845 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
4846 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
4847
4848 * ROBOT Attack:
4849 OK - Not vulnerable
4850
4851
4852 SCAN COMPLETED IN 31.36 S
4853 -------------------------
4854#######################################################################################################################################
4855
4856Domains still to check: 1
4857 Checking if the hostname meb.gov.tr. given is in fact a domain...
4858
4859Analyzing domain: meb.gov.tr.
4860 Checking NameServers using system default resolver...
4861 IP: 212.174.189.113 (Turkey)
4862 HostName: papatya2.meb.gov.tr Type: NS
4863 IP: 212.174.189.114 (Turkey)
4864 HostName: papatya.meb.gov.tr Type: NS
4865 HostName: papatya.meb.gov.tr Type: PTR
4866
4867 Checking MailServers using system default resolver...
4868 IP: 212.175.170.105 (Turkey)
4869 HostName: mebfmgw.meb.gov.tr Type: MX
4870 HostName: zambak.meb.gov.tr Type: PTR
4871
4872 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
4873 No zone transfer found on nameserver 212.174.189.114
4874 No zone transfer found on nameserver 212.174.189.113
4875
4876 Checking SPF record...
4877
4878 Checking 192 most common hostnames using system default resolver...
4879 IP: 212.174.189.120 (Turkey)
4880 HostName: www.meb.gov.tr. Type: A
4881 IP: 212.175.170.116 (Turkey)
4882 HostName: ftp.meb.gov.tr. Type: A
4883 IP: 212.174.189.120 (Turkey)
4884 HostName: www.meb.gov.tr. Type: A
4885 HostName: mail.meb.gov.tr. Type: A
4886 HostName: bem.meb.gov.tr Type: PTR
4887
4888 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
4889 Checking netblock 212.174.189.0
4890 Checking netblock 212.175.170.0
4891
4892 Searching for meb.gov.tr. emails in Google
4893 dogm_materyal@meb.gov.tr
4894 pictes@meb.gov.tr.
4895
4896 Checking 5 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
4897 Host 212.174.189.114 is up (reset ttl 64)
4898 Host 212.174.189.120 is up (reset ttl 64)
4899 Host 212.175.170.105 is up (reset ttl 64)
4900 Host 212.175.170.116 is up (reset ttl 64)
4901 Host 212.174.189.113 is up (reset ttl 64)
4902
4903 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
4904 Scanning ip 212.174.189.114 (papatya.meb.gov.tr (PTR)):
4905 53/tcp open tcpwrapped syn-ack ttl 46
4906 Scanning ip 212.174.189.120 (bem.meb.gov.tr (PTR)):
4907 Scanning ip 212.175.170.105 (zambak.meb.gov.tr (PTR)):
4908 80/tcp open http syn-ack ttl 47
4909 | fingerprint-strings:
4910 | GetRequest:
4911 | HTTP/1.1 200 OK
4912 | Content-Length: 3099
4913 | Connection: Close
4914 | Cache-Control: no-cache
4915 | Content-Type: text/html; charset=utf-8
4916 | X-Frame-Options: SAMEORIGIN
4917 | <html>
4918 | <head>
4919 | <title>
4920 | ..::T.C. M
4921 | BAKANLI
4922 | I::..
4923 | </title>
4924 | </head>
4925 | <body>
4926 | <font size=2>
4927 | <table width="100%">
4928 | <tr>
4929 | bgcolor=#B40404 align="center" colspan=2>
4930 | <font color=#ffffff>
4931 | VENL
4932 | STEM
4933 | TARAFINDAN BLOKLANDINIZ
4934 | </b>
4935 | </font>
4936 | </td>
4937 | </tr>
4938 | <tr>
4939 | align="center" colspan=2>
4940 | <font face="tahoma" size="4" color="cadetblue">
4941 | <br>
4942 | <center>
4943 |_ <iframe align="center" framebor
4944 Scanning ip 212.175.170.116 (ftp.meb.gov.tr.):
4945 80/tcp open http syn-ack ttl 47
4946 | fingerprint-strings:
4947 | GetRequest:
4948 | HTTP/1.1 200 OK
4949 | Content-Length: 3099
4950 | Connection: Close
4951 | Cache-Control: no-cache
4952 | Content-Type: text/html; charset=utf-8
4953 | X-Frame-Options: SAMEORIGIN
4954 | <html>
4955 | <head>
4956 | <title>
4957 | ..::T.C. M
4958 | BAKANLI
4959 | I::..
4960 | </title>
4961 | </head>
4962 | <body>
4963 | <font size=2>
4964 | <table width="100%">
4965 | <tr>
4966 | bgcolor=#B40404 align="center" colspan=2>
4967 | <font color=#ffffff>
4968 | VENL
4969 | STEM
4970 | TARAFINDAN BLOKLANDINIZ
4971 | </b>
4972 | </font>
4973 | </td>
4974 | </tr>
4975 | <tr>
4976 | align="center" colspan=2>
4977 | <font face="tahoma" size="4" color="cadetblue">
4978 | <br>
4979 | <center>
4980 |_ <iframe align="center" framebor
4981 Scanning ip 212.174.189.113 (papatya2.meb.gov.tr):
4982 53/tcp open tcpwrapped syn-ack ttl 46
4983 WebCrawling domain's web servers... up to 50 max links.
4984
4985 + URL to crawl: http://mebfmgw.meb.gov.tr
4986 + Date: 2019-11-12
4987
4988 + Crawling URL: http://mebfmgw.meb.gov.tr:
4989 + Links:
4990 + Crawling http://mebfmgw.meb.gov.tr
4991 + Crawling http://mebfmgw.meb.gov.tr/XX/YY/ZZ/CI/NGFGCGMGPGHGPGCD (File! Not crawling it.)
4992 + Searching for directories...
4993 - Found: http://mebfmgw.meb.gov.tr/XX/
4994 - Found: http://mebfmgw.meb.gov.tr/XX/YY/
4995 - Found: http://mebfmgw.meb.gov.tr/XX/YY/ZZ/
4996 - Found: http://mebfmgw.meb.gov.tr/XX/YY/ZZ/CI/
4997 + Searching open folders...
4998 - http://mebfmgw.meb.gov.tr/XX/ (No Open Folder)
4999 - http://mebfmgw.meb.gov.tr/XX/YY/ (No Open Folder)
5000 - http://mebfmgw.meb.gov.tr/XX/YY/ZZ/ (No Open Folder)
5001 - http://mebfmgw.meb.gov.tr/XX/YY/ZZ/CI/ (No Open Folder)
5002
5003
5004 + URL to crawl: http://ftp.meb.gov.tr.
5005 + Date: 2019-11-12
5006
5007 + Crawling URL: http://ftp.meb.gov.tr.:
5008 + Links:
5009 + Crawling http://ftp.meb.gov.tr.
5010 + Crawling http://ftp.meb.gov.tr./XX/YY/ZZ/CI/NGFGCGMGPGHGPGCD (File! Not crawling it.)
5011 + Searching for directories...
5012 - Found: http://ftp.meb.gov.tr./XX/
5013 - Found: http://ftp.meb.gov.tr./XX/YY/
5014 - Found: http://ftp.meb.gov.tr./XX/YY/ZZ/
5015 - Found: http://ftp.meb.gov.tr./XX/YY/ZZ/CI/
5016 + Searching open folders...
5017 - http://ftp.meb.gov.tr./XX/ (No Open Folder)
5018 - http://ftp.meb.gov.tr./XX/YY/ (No Open Folder)
5019 - http://ftp.meb.gov.tr./XX/YY/ZZ/ (No Open Folder)
5020 - http://ftp.meb.gov.tr./XX/YY/ZZ/CI/ (No Open Folder)
5021
5022--Finished--
5023Summary information for domain meb.gov.tr.
5024-----------------------------------------
5025 Domain Specific Information:
5026 Email: dogm_materyal@meb.gov.tr
5027 Email: pictes@meb.gov.tr.
5028
5029 Domain Ips Information:
5030 IP: 212.174.189.114
5031 HostName: papatya.meb.gov.tr Type: NS
5032 HostName: papatya.meb.gov.tr Type: PTR
5033 Country: Turkey
5034 Is Active: True (reset ttl 64)
5035 Port: 53/tcp open tcpwrapped syn-ack ttl 46
5036 IP: 212.174.189.120
5037 HostName: www.meb.gov.tr. Type: A
5038 HostName: mail.meb.gov.tr. Type: A
5039 HostName: bem.meb.gov.tr Type: PTR
5040 Country: Turkey
5041 Is Active: True (reset ttl 64)
5042 IP: 212.175.170.105
5043 HostName: mebfmgw.meb.gov.tr Type: MX
5044 HostName: zambak.meb.gov.tr Type: PTR
5045 Type: SPF
5046 Country: Turkey
5047 Is Active: True (reset ttl 64)
5048 Port: 80/tcp open http syn-ack ttl 47
5049 Script Info: | fingerprint-strings:
5050 Script Info: | GetRequest:
5051 Script Info: | HTTP/1.1 200 OK
5052 Script Info: | Content-Length: 3099
5053 Script Info: | Connection: Close
5054 Script Info: | Cache-Control: no-cache
5055 Script Info: | Content-Type: text/html; charset=utf-8
5056 Script Info: | X-Frame-Options: SAMEORIGIN
5057 Script Info: | <html>
5058 Script Info: | <head>
5059 Script Info: | <title>
5060 Script Info: | ..::T.C. M
5061 Script Info: | BAKANLI
5062 Script Info: | I::..
5063 Script Info: | </title>
5064 Script Info: | </head>
5065 Script Info: | <body>
5066 Script Info: | <font size=2>
5067 Script Info: | <table width="100%">
5068 Script Info: | <tr>
5069 Script Info: | bgcolor=#B40404 align="center" colspan=2>
5070 Script Info: | <font color=#ffffff>
5071 Script Info: | VENL
5072 Script Info: | STEM
5073 Script Info: | TARAFINDAN BLOKLANDINIZ
5074 Script Info: | </b>
5075 Script Info: | </font>
5076 Script Info: | </td>
5077 Script Info: | </tr>
5078 Script Info: | <tr>
5079 Script Info: | align="center" colspan=2>
5080 Script Info: | <font face="tahoma" size="4" color="cadetblue">
5081 Script Info: | <br>
5082 Script Info: | <center>
5083 Script Info: |_ <iframe align="center" framebor
5084 IP: 212.175.170.116
5085 HostName: ftp.meb.gov.tr. Type: A
5086 Country: Turkey
5087 Is Active: True (reset ttl 64)
5088 Port: 80/tcp open http syn-ack ttl 47
5089 Script Info: | fingerprint-strings:
5090 Script Info: | GetRequest:
5091 Script Info: | HTTP/1.1 200 OK
5092 Script Info: | Content-Length: 3099
5093 Script Info: | Connection: Close
5094 Script Info: | Cache-Control: no-cache
5095 Script Info: | Content-Type: text/html; charset=utf-8
5096 Script Info: | X-Frame-Options: SAMEORIGIN
5097 Script Info: | <html>
5098 Script Info: | <head>
5099 Script Info: | <title>
5100 Script Info: | ..::T.C. M
5101 Script Info: | BAKANLI
5102 Script Info: | I::..
5103 Script Info: | </title>
5104 Script Info: | </head>
5105 Script Info: | <body>
5106 Script Info: | <font size=2>
5107 Script Info: | <table width="100%">
5108 Script Info: | <tr>
5109 Script Info: | bgcolor=#B40404 align="center" colspan=2>
5110 Script Info: | <font color=#ffffff>
5111 Script Info: | VENL
5112 Script Info: | STEM
5113 Script Info: | TARAFINDAN BLOKLANDINIZ
5114 Script Info: | </b>
5115 Script Info: | </font>
5116 Script Info: | </td>
5117 Script Info: | </tr>
5118 Script Info: | <tr>
5119 Script Info: | align="center" colspan=2>
5120 Script Info: | <font face="tahoma" size="4" color="cadetblue">
5121 Script Info: | <br>
5122 Script Info: | <center>
5123 Script Info: |_ <iframe align="center" framebor
5124 IP: 212.174.189.113
5125 HostName: papatya2.meb.gov.tr Type: NS
5126 Country: Turkey
5127 Is Active: True (reset ttl 64)
5128 Port: 53/tcp open tcpwrapped syn-ack ttl 46
5129
5130--------------End Summary --------------
5131-----------------------------------------
5132#######################################################################################################################################
5133----- meb.gov.tr -----
5134
5135
5136Host's addresses:
5137__________________
5138
5139
5140
5141Name Servers:
5142______________
5143
5144papatya.meb.gov.tr. 43197 IN A 212.174.189.114
5145papatya2.meb.gov.tr. 43192 IN A 212.174.189.113
5146
5147
5148Mail (MX) Servers:
5149___________________
5150
5151mebfmgw.meb.gov.tr. 3600 IN A 212.175.170.105
5152
5153
5154
5155
5156Scraping meb.gov.tr subdomains from Google:
5157____________________________________________
5158
5159
5160 ---- Google search page: 1 ----
5161
5162 yenice78
5163 kilimli
5164 kocarli
5165 osmaniyearge
5166 baku
5167
5168 ---- Google search page: 2 ----
5169
5170 usakisg
5171 cankiriarge
5172 keskin
5173 karpuzlu
5174 kemer15
5175 aydintepe
5176
5177 ---- Google search page: 3 ----
5178
5179 lacin
5180 zonguldakarge
5181 erzurumodm
5182 altieylul
5183
5184
5185Google Results:
5186________________
5187
5188keskin.meb.gov.tr. 3600 IN A 212.175.132.136
5189kemer15.meb.gov.tr. 3600 IN A 212.175.132.140
5190yenice78.meb.gov.tr. 3600 IN A 212.175.132.136
5191karpuzlu.meb.gov.tr. 3600 IN A 212.175.132.139
5192altieylul.meb.gov.tr. 3600 IN A 212.175.132.137
5193osmaniyearge.meb.gov.tr. 3600 IN A 212.175.132.135
5194erzurumodm.meb.gov.tr. 3600 IN A 212.175.132.133
5195zonguldakarge.meb.gov.tr. 3600 IN A 212.175.132.134
5196cankiriarge.meb.gov.tr. 3600 IN A 212.175.132.132
5197baku.meb.gov.tr. 3600 IN A 212.175.132.137
5198kilimli.meb.gov.tr. 3600 IN A 212.175.132.140
5199aydintepe.meb.gov.tr. 3600 IN A 212.175.132.136
5200kocarli.meb.gov.tr. 3600 IN A 212.175.132.139
5201lacin.meb.gov.tr. 3600 IN A 212.175.132.140
5202usakisg.meb.gov.tr. 3600 IN A 212.175.132.134
5203
5204
5205Brute forcing with /usr/share/dnsenum/dns.txt:
5206_______________________________________________
5207
5208ads.meb.gov.tr. 3600 IN A 95.0.196.23
5209av.meb.gov.tr. 3600 IN A 212.175.133.102
5210e.meb.gov.tr. 3600 IN A 95.0.196.212
5211ftp.meb.gov.tr. 3600 IN A 212.175.170.116
5212mail.meb.gov.tr. 3600 IN A 212.174.189.120
5213rdb.meb.gov.tr. 3600 IN A 212.175.132.130
5214www.meb.gov.tr. 3600 IN A 212.174.189.120
5215
5216
5217Launching Whois Queries:
5218_________________________
5219
5220 whois ip result: 212.175.133.0 -> 212.174.0.0/15
5221 whois ip result: 95.0.196.0 -> 95.0.196.0/24
5222 whois ip result: 212.174.189.0 -> 212.174.189.0/26
5223 whois ip result: 212.175.170.0 -> 212.175.170.0/27
5224
5225
5226meb.gov.tr__________
5227
5228 212.174.0.0/15
5229 212.175.170.0/27
5230 212.174.189.0/26
5231 95.0.196.0/24
5232#######################################################################################################################################
5233 1 10.213.200.1 (10.213.200.1) 139.692 ms 139.660 ms 139.643 ms
5234 2 * * *
5235 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 142.905 ms 143.024 ms 143.006 ms
5236 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 142.983 ms 142.761 ms 142.742 ms
5237 5 be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 148.274 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 148.402 ms 148.222 ms
5238 6 be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105) 166.744 ms 162.089 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1) 162.034 ms
5239 7 be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209) 170.617 ms 170.790 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205) 174.777 ms
5240 8 be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241) 171.356 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6) 175.098 ms 171.293 ms
5241 9 ntt.ams03.atlas.cogentco.com (130.117.15.130) 175.279 ms 171.297 ms 171.697 ms
524210 ae-10.r24.amstnl02.nl.bb.gin.ntt.net (129.250.3.44) 171.303 ms 187.664 ms ae-5.r25.amstnl02.nl.bb.gin.ntt.net (129.250.3.104) 170.805 ms
524311 ae-5.r02.amstnl02.nl.bb.gin.ntt.net (129.250.2.179) 174.373 ms 171.608 ms 180.401 ms
524412 ae-0.turk-telekom.amstnl02.nl.bb.gin.ntt.net (81.20.64.102) 175.406 ms 179.820 ms 175.550 ms
524513 06-ebgp-ulus1-k---302-ams-col-3.statik.turktelekom.com.tr (212.156.102.118) 240.138 ms 06-ebgp-ulus1-k---302-ams-col-3.statik.turktelekom.com.tr (212.156.102.114) 228.217 ms 34-acibadem-xrs-t2-2---302-ams-col-3.statik.turktelekom.com.tr (212.156.102.169) 214.616 ms
524614 212.156.117.186.29-gumushane-t3-1.25-erzurum-t2-1.statik.turktelekom.com.tr (212.156.117.186) 225.073 ms 233.494 ms 224.453 ms
524715 06-ulus-xrs-t2-1---06-umitkoy-t2-1.statik.turktelekom.com.tr (81.212.31.240) 226.670 ms 06-ulus-xrs-t2-1---06-ebgp-ulus1-k.statik.turktelekom.com.tr (81.212.197.36) 225.302 ms 226.714 ms
524816 21-avea-t3-1---21-diclekent-t2-1.statik.turktelekom.com.tr (212.156.119.186) 232.736 ms 06-ulus-xrs-t2-1---34-acibadem-xrs-t2-1.statik.turktelekom.com.tr (195.175.166.207) 222.700 ms 21-avea-t3-1---21-diclekent-t2-1.statik.turktelekom.com.tr (212.156.119.186) 229.497 ms
5249#######################################################################################################################################
5250Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-13 05:11 EST
5251Nmap scan report for mail.meb.gov.tr (212.174.189.120)
5252Host is up (0.23s latency).
5253Not shown: 994 filtered ports, 4 closed ports
5254Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5255PORT STATE SERVICE
525680/tcp open http
5257443/tcp open https
5258
5259Nmap done: 1 IP address (1 host up) scanned in 15.53 seconds
5260######################################################################################################################################
5261Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-13 05:12 EST
5262Nmap scan report for bem.meb.gov.tr (212.174.189.120)
5263Host is up (0.14s latency).
5264Not shown: 2 filtered ports
5265PORT STATE SERVICE
526653/udp open|filtered domain
526767/udp open|filtered dhcps
526868/udp open|filtered dhcpc
526969/udp open|filtered tftp
527088/udp open|filtered kerberos-sec
5271123/udp open|filtered ntp
5272139/udp open|filtered netbios-ssn
5273161/udp open|filtered snmp
5274162/udp open|filtered snmptrap
5275389/udp open|filtered ldap
5276500/udp open|filtered isakmp
5277520/udp open|filtered route
52782049/udp open|filtered nfs
5279
5280Nmap done: 1 IP address (1 host up) scanned in 4.27 seconds
5281######################################################################################################################################
5282Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-13 06:09 EST
5283Nmap scan report for bem.meb.gov.tr (212.174.189.120)
5284Host is up (0.22s latency).
5285Not shown: 994 filtered ports
5286PORT STATE SERVICE
528725/tcp closed smtp
528880/tcp open http
5289113/tcp closed ident
5290139/tcp closed netbios-ssn
5291443/tcp open https
5292445/tcp closed microsoft-ds
5293
5294Host script results:
5295| dns-brute:
5296| DNS Brute-force hostnames:
5297| ads.meb.gov.tr - 95.0.196.23
5298| internet.meb.gov.tr - 212.175.132.129
5299| mail.meb.gov.tr - 212.174.189.120
5300| ftp.meb.gov.tr - 212.175.170.116
5301| www.meb.gov.tr - 212.174.189.120
5302| sip.meb.gov.tr - 212.175.133.100
5303| demo.meb.gov.tr - 212.175.132.137
5304|_ dev.meb.gov.tr - 95.0.196.62
5305#######################################################################################################################################
5306Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-13 05:40 EST
5307Nmap scan report for mail.meb.gov.tr (212.174.189.120)
5308Host is up (0.17s latency).
5309Not shown: 997 filtered ports
5310PORT STATE SERVICE VERSION
531180/tcp open http Microsoft IIS httpd 7.5
5312|_http-server-header: Microsoft-IIS/7.5
5313| vulscan: VulDB - https://vuldb.com:
5314| [68404] Microsoft IIS 7.5 Error Message mypage cross site scripting
5315| [6924] Microsoft IIS 7.5 Log File Permission information disclosure
5316| [5623] Microsoft IIS up to 7.5 File Name Tilde privilege escalation
5317| [4234] Microsoft IIS 7.5 FTP Server Telnet IAC Character Heap-based denial of service
5318| [4179] Microsoft IIS 7.5 FastCGI Request Header memory corruption
5319| [98097] Microsoft IIS 7.0/7.5/8.0/8.5/10 /uncpath/ cross site scripting
5320| [6925] Microsoft IIS 7.0/7.5 FTP Command information disclosure
5321| [4484] Microsoft Windows Phone 7.5 SMS Service denial of service
5322|
5323| MITRE CVE - https://cve.mitre.org:
5324| [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
5325| [CVE-2012-2531] Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka "Password Disclosure Vulnerability."
5326| [CVE-2010-3972] Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
5327| [CVE-2010-2730] Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
5328| [CVE-2010-1899] Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
5329| [CVE-2010-1256] Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
5330| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
5331| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
5332| [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
5333| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
5334| [CVE-2009-2521] Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
5335| [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
5336| [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
5337| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
5338| [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
5339| [CVE-2007-1278] Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root.
5340| [CVE-2006-5858] Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.
5341| [CVE-2006-5028] Directory traversal vulnerability in filemanager/filemanager.php in SWsoft Plesk 7.5 Reload and Plesk 7.6 for Microsoft Windows allows remote attackers to list arbitrary directories via a ../ (dot dot slash) in the file parameter in a chdir action.
5342| [CVE-2006-0363] The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE.
5343|
5344| SecurityFocus - https://www.securityfocus.com/bid/:
5345| [55569] Microsoft Windows Phone 7 SSL Certificate 'Common Name' Validation Security Bypass Vulnerability
5346| [28820] Microsoft Works 7 'WkImgSrv.dll' ActiveX Control Remote Code Execution Vulnerability
5347| [28498] Microsoft Internet Explorer 7 Popup Window Address Bar URI Spoofing Vulnerability
5348| [24483] Microsoft Internet Explorer 7 HTTP Authentication International Domain Name Spoofing Weakness
5349| [20728] Microsoft Internet Explorer 7 Popup Window Address Bar Spoofing Weakness
5350| [18736] Microsoft Internet Explorer 7 Denial of Service Vulnerability
5351| [5877] Microsoft SQL Server 7.0/2000 DBCC Buffer Overflow Vulnerability
5352| [4108] Microsoft Visual C++ 7/Visual C++.Net Buffer Overflow Protection Weakness
5353| [1714] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
5354| [1444] Microsoft SQL Server 7.0 Stored Procedure Vulnerability
5355| [1281] Microsoft SQL Server 7.0 System Administrator Password Disclosure Vulnerability
5356| [817] Microsoft SQL Server 7.0 NULL Data DoS Vulnerability
5357| [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
5358| [86059] Microsoft IIS CVE-1999-0561 Remote Security Vulnerability
5359| [56440] Microsoft IIS FTP Service CVE-2012-2532 Remote Command Injection Vulnerability
5360| [56439] Microsoft IIS CVE-2012-2531 Password Information Disclosure Vulnerability
5361| [54276] Microsoft IIS Multiple FTP Command Request Denial of Service Vulnerability
5362| [54251] Microsoft IIS File Enumeration Weakness
5363| [53906] Microsoft IIS Authentication Bypass and Source Code Disclosure Vulnerabilities
5364| [45542] Microsoft IIS FTP Service Remote Buffer Overflow Vulnerability
5365| [43140] Microsoft IIS Repeated Parameter Request Denial of Service Vulnerability
5366| [43138] Microsoft IIS Request Header Buffer Overflow Vulnerability
5367| [41314] Microsoft IIS 5.1 Alternate Data Stream Authentication Bypass Vulnerability
5368| [40573] Microsoft IIS Authentication Remote Code Execution Vulnerability
5369| [37460] RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability
5370| [36276] RETIRED: Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
5371| [36273] Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
5372| [36189] Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability
5373| [35232] Microsoft IIS 5.0 WebDAV Authentication Bypass Vulnerability
5374| [34993] Microsoft IIS Unicode Requests to WebDAV Multiple Authentication Bypass Vulnerabilities
5375| [33374] Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
5376| [27101] Microsoft IIS File Change Notification Local Privilege Escalation Vulnerability
5377| [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
5378| [18858] Microsoft IIS ASP Remote Code Execution Vulnerability
5379| [14764] Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
5380| [10706] Microsoft IIS 4 Redirect Remote Buffer Overflow Vulnerability
5381| [9660] Microsoft IIS Unspecified Remote Denial Of Service Vulnerability
5382| [9313] Microsoft IIS Failure To Log Undocumented TRACK Requests Vulnerability
5383| [8244] Microsoft Multiple IIS 6.0 Web Admin Vulnerabilities
5384| [8092] Microsoft IIS _VTI_BOT Malicious WebBot Elevated Permissions Vulnerability
5385| [8035] Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability
5386| [7735] Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
5387| [7734] Microsoft IIS SSINC.DLL Server Side Includes Buffer Overflow Vulnerability
5388| [7733] Microsoft IIS ASP Header Denial Of Service Vulnerability
5389| [7731] Microsoft IIS Redirection Error Page Cross-Site Scripting Vulnerability
5390| [7492] Microsoft IIS User Existence Disclosure Vulnerability
5391| [6795] Microsoft IIS False Logging Weakness
5392| [6789] Microsoft IIS Malformed HTTP Get Request Denial Of Service Vulnerability
5393| [6072] Microsoft IIS Administrative Pages Cross Site Scripting Vulnerabilities
5394| [6071] Microsoft IIS Script Source Access File Upload Vulnerability
5395| [6070] Microsoft IIS WebDAV Denial Of Service Vulnerability
5396| [6069] Microsoft IIS Out Of Process Privilege Escalation Vulnerability
5397| [6068] Multiple Microsoft IIS Vulnerabilities
5398| [5907] Microsoft IIS Malformed HTTP HOST Header Field Denial Of Service Vulnerability
5399| [5900] Microsoft IIS IDC Extension Cross Site Scripting Vulnerability
5400| [5213] Microsoft IIS SMTP Service Encapsulated SMTP Address Vulnerability
5401| [4855] Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability
5402| [4846] Microsoft IIS 5.0 Denial Of Service Vulnerability
5403| [4543] Microsoft IIS CodeBrws.ASP File Extension Check Out By One Vulnerability
5404| [4525] Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability
5405| [4490] Microsoft IIS Chunked Encoding Heap Overflow Variant Vulnerability
5406| [4487] Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability
5407| [4486] Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability
5408| [4485] Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability
5409| [4483] Microsoft IIS Help File Search Cross Site Scripting Vulnerability
5410| [4482] Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
5411| [4479] Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability
5412| [4478] Microsoft IIS ASP Server-Side Include Buffer Overflow Vulnerability
5413| [4476] Microsoft IIS HTTP Header Field Delimiter Buffer Overflow Vulnerability
5414| [4474] Microsoft IIS HTR ISAPI Extension Buffer Overflow Vulnerability
5415| [4235] Microsoft IIS Authentication Method Disclosure Vulnerability
5416| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
5417| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
5418| [3667] Microsoft IIS False Content-Length Field DoS Vulnerability
5419| [3195] Microsoft IIS MIME Header Denial of Service Vulnerability
5420| [3194] Microsoft IIS WebDAV Invalid Request Denial of Service Vulnerability
5421| [3193] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
5422| [3191] Microsoft IIS 4.0 URL Redirection DoS Vulnerability
5423| [3190] Microsoft IIS SSI Buffer Overrun Privelege Elevation Vulnerability
5424| [2977] Microsoft IIS Device File Remote DoS Vulnerability
5425| [2973] Microsoft IIS Device File Local DoS Vulnerability
5426| [2909] Microsoft IIS Unicode .asp Source Code Disclosure Vulnerability
5427| [2719] Microsoft IIS Various Domain User Account Access Vulnerability
5428| [2717] Microsoft IIS FTP Denial of Service Vulnerability
5429| [2690] Microsoft IIS WebDAV 'Propfind' Server Restart Vulnerability
5430| [2674] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
5431| [2654] Microsoft IIS Long URL Denial of Service Vulnerability
5432| [2483] Microsoft IIS WebDAV 'Search' Denial of Service Vulnerability
5433| [2453] Microsoft IIS WebDAV Denial of Service Vulnerability
5434| [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
5435| [2440] Microsoft IIS Multiple Invalid URL Request DoS Vulnerability
5436| [2313] Microsoft IIS File Fragment Disclosure Vulnerability
5437| [2280] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
5438| [2218] Microsoft IIS '../..' Denial of Service Vulnerability
5439| [2144] Microsoft IIS Front Page Server Extension DoS Vulnerability
5440| [2110] Microsoft IIS 4.0 IISADMPWD Proxied Password Attack
5441| [2100] Microsoft IIS Far East Edition DBCS File Disclosure Vulnerability
5442| [2074] Microsoft IIS Appended Dot Script Source Disclosure Vulnerability
5443| [1912] Microsoft IIS Executable File Parsing Vulnerability
5444| [1911] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
5445| [1832] Microsoft IIS 4.0/5.0 Session ID Cookie Disclosure Vulnerability
5446| [1819] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
5447| [1818] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
5448| [1814] Microsoft IIS 3.0 %2e ASP Source Disclosure Vulnerability
5449| [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
5450| [1806] Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability
5451| [1756] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
5452| [1642] Microsoft NT 4.0 and IIS 4.0 Invalid URL Request DoS Vulnerability
5453| [1595] Microsoft IIS Cross Site Scripting .shtml Vulnerability
5454| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
5455| [1578] Microsoft IIS 5.0 Translate: f Source Disclosure Vulnerability
5456| [1565] Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability
5457| [1499] Microsoft IIS Internal IP Address Disclosure Vulnerability
5458| [1488] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
5459| [1476] Microsoft IIS 3.0 .htr Missing Variable Denial of Service Vulnerability
5460| [1193] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
5461| [1191] Microsoft IIS 4.0/5.0 Malformed .htr Request Vulnerability
5462| [1190] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
5463| [1101] Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability
5464| [1081] Microsoft IIS UNC Mapped Virtual Host Vulnerability
5465| [1066] Microsoft IIS 4.0 Chunked Transfer Encoding Buffer Overflow Vulnerability
5466| [1065] Microsoft IIS UNC Path Disclosure Vulnerability
5467| [886] Microsoft IIS Escape Character Parsing Vulnerability
5468| [882] Microsoft IIS Virtual Directory Naming Vulnerability
5469| [658] Microsoft IIS FTP NO ACCESS Read/Delete File Vulnerability
5470| [657] Microsoft IIS 4.0 Domain Resolution Vulnerability
5471| [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
5472| [190] Microsoft VisualInterDev 6.0 - IIS4- Management With No Authentication Vulnerability
5473|
5474| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5475| [78620] Microsoft Windows Phone 7 domain name spoofing
5476| [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
5477| [29670] Microsoft Internet Explorer 7 is installed
5478| [76716] Microsoft IIS FTP denial of service
5479| [76664] Microsoft IIS tilde information disclosure
5480| [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
5481| [58864] Microsoft Internet Information Services (IIS) authentication code execution
5482| [55031] Microsoft Internet Information Services (IIS) filenames security bypass
5483| [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
5484| [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
5485| [52243] Microsoft IIS With .NET Path Disclosure
5486| [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
5487| [52240] Microsoft IIS Sample Application Physical Path Disclosure
5488| [52233] Microsoft IIS With .NET Path Disclosure
5489| [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
5490| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
5491| [42899] Microsoft IIS HTTP request smuggling
5492| [39235] Microsoft IIS root folders file change notification privilege escalation
5493| [39230] Microsoft IIS HTML encoded ASP code execution
5494| [34434] Microsoft IIS Hit-highlighting security bypass
5495| [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
5496| [32074] Microsoft IIS iissamples directory present
5497| [31644] Microsoft IIS Web server access.cnf file detected
5498| [31642] Microsoft IIS Web server service.cnf file detected
5499| [31638] Microsoft IIS Web server svcacl.cnf file detected
5500| [31630] Microsoft Internet Information Services IISAdmin directory detected
5501| [27854] Microsoft IIS ASP cache virtual server information disclosure
5502| [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
5503| [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
5504| [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
5505| [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
5506| [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
5507| [13116] Microsoft IIS MS03-018 patch is not installed on the system
5508| [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
5509| [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
5510| [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
5511| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
5512| [12100] Microsoft IIS long WebDAV requests containing XML denial of service
5513| [12099] Microsoft IIS Response.AddHeader denial of service
5514| [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
5515| [12097] Microsoft IIS redirect error cross-site scripting
5516| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
5517| [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
5518| [11537] Microsoft IIS WebDAV service is running on the system
5519| [11533] Microsoft IIS WebDAV long request buffer overflow
5520| [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
5521| [10504] Microsoft IIS script source access could be bypassed to upload .COM files
5522| [10503] Microsoft IIS WebDAV memory allocation denial of service
5523| [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
5524| [10501] Microsoft IIS administrative Web pages cross-site scripting
5525| [10370] Microsoft IIS HTTP HOST header denial of service
5526| [10294] Microsoft IIS .idc extension error message cross-site scripting
5527| [10184] Microsoft IIS 5.0 resource utilization denial of service
5528| [9791] Microsoft Exchange IIS license exhaustion denial of service
5529| [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
5530| [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
5531| [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
5532| [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
5533| [8811] Microsoft IIS MS02-018 patch is not installed on the system
5534| [8804] Microsoft IIS redirected URL error cross-site scripting
5535| [8803] Microsoft IIS HTTP error page cross-site scripting
5536| [8802] Microsoft IIS Help File search cross-site scripting
5537| [8801] Microsoft IIS FTP session status request denial of service
5538| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
5539| [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
5540| [8798] Microsoft IIS SSI safety check buffer overflow
5541| [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
5542| [8796] Microsoft IIS ASP data transfer heap buffer overflow
5543| [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
5544| [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
5545| [8385] Microsoft IIS specially-crafted request reveals IP address
5546| [8382] Microsoft IIS authentication error messages reveal configuration information
5547| [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
5548| [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
5549| [8056] Microsoft IIS is running on the system
5550| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
5551| [7691] Microsoft IIS HTTP GET request with false "
5552| [7640] Microsoft IIS is present on the system
5553| [7613] Microsoft IIS allows attackers to create fake log entries
5554| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
5555| [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
5556| [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
5557| [7202] Microsoft IIS 4.0/5.0 escaped percent found
5558| [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
5559| [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
5560| [6995] Microsoft IIS %u Unicode wide character encoding detected
5561| [6994] Microsoft IIS %u Unicode encoding detected
5562| [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
5563| [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
5564| [6983] Microsoft IIS invalid MIME header denial of service
5565| [6982] Microsoft IIS WebDAV long invalid request denial of service
5566| [6981] Microsoft IIS URL redirection denial of service
5567| [6963] Microsoft IIS HTTPS connection could reveal internal IP address
5568| [6858] Microsoft IIS cross-site scripting patch denial of service
5569| [6800] Microsoft IIS device file request can crash the ASP processor
5570| [6742] Microsoft IIS reveals .asp source code with Unicode extensions
5571| [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
5572| [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
5573| [6545] Microsoft IIS FTP weak domain authentication
5574| [6535] Microsoft IIS FTP wildcard processing function denial of service
5575| [6534] Microsoft IIS URL decoding error could allow remote code execution
5576| [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
5577| [6205] Microsoft IIS WebDAV denial of service
5578| [6171] Microsoft IIS and Exchange malformed URL request denial of service
5579| [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
5580| [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
5581| [5823] Microsoft IIS Web form submission denial of service
5582| [5729] Microsoft IIS Far East editions file disclosure
5583| [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
5584| [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
5585| [5441] Microsoft IIS .htw cross-site scripting
5586| [5377] Microsoft IIS Unicode translation error allows remote command execution
5587| [5335] Microsoft IIS Index Server directory traversal
5588| [5202] Microsoft IIS invalid URL allows attackers to crash service
5589| [5156] Microsoft IIS Cross-Site Scripting
5590| [5106] Microsoft IIS 4.0 discloses internal IP addresses
5591| [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
5592| [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
5593| [4960] Microsoft IIS on Win2kPro security button restriction
5594| [4951] Microsoft IIS absent directory browser argument
5595| [4790] Microsoft IIS \mailroot\pickup directory denial of service
5596| [4757] Microsoft IIS server-side includes (SSI) #exec directive
5597| [4558] Microsoft IIS is installed on a domain controller
5598| [4448] Microsoft IIS ISM.DLL could allow users to read file contents
5599| [4430] Microsoft IIS malformed URL extension data denial of service
5600| [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
5601| [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
5602| [4279] Microsoft IIS escape characters denial of service
5603| [4204] Microsoft IIS virtual UNC share source read
5604| [4183] Microsoft IIS could disclose path of network shares
5605| [4117] Microsoft IIS chunked encoding post or put denial of service
5606| [3986] Microsoft IIS ASP could be used to gain sensitive information
5607| [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
5608| [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
5609| [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
5610| [2675] Microsoft IIS 4.0 samples installation on Web server
5611| [2673] Microsoft IIS samples installation on Web server
5612| [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
5613| [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
5614| [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
5615| [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
5616| [2662] Microsoft IIS CGI overflow
5617| [2412] Microsoft IIS account is member of Domain Users
5618| [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
5619| [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
5620| [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
5621| [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
5622| [2229] Microsoft IIS ExAir sample site denial of service
5623| [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
5624| [1823] Microsoft IIS long GET request denial of service
5625| [1735] Microsoft IIS with Visual InterDev no authentication
5626| [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
5627| [1654] Microsoft IIS remote FTP buffer overflow
5628| [1638] Microsoft IIS crashes processing some GET commands
5629| [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
5630| [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
5631| [1273] Microsoft IIS special characters allowed in shell
5632| [1272] Microsoft IIS CGI scripts run as system
5633| [1271] Microsoft IIS version 2 installed
5634| [1270] Microsoft IIS incorrect permissions on restricted item
5635| [1269] Microsoft IIS incorrect Web permissions
5636| [1268] Microsoft IIS SSI #exec enabled
5637| [1216] Microsoft IIS SSL patch not applied
5638| [1215] Microsoft IIS Passive FTP patch not applied
5639| [1212] Microsoft IIS unauthorized ODBC data access with RDS
5640| [1125] Microsoft IIS ASP DATA issue could reveal source code
5641| [949] Microsoft IIS server script debugging enabled
5642| [948] Microsoft IIS samples installed on Web server
5643| [936] Microsoft IIS NTFS insecure permissions
5644| [935] Microsoft IIS executable paths
5645| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
5646| [336] Microsoft IIS ASP dot bug
5647| [256] Microsoft IIS can be remotely crashed by excessively long client requests
5648| [7] Microsoft IIS ASP source visible
5649|
5650| Exploit-DB - https://www.exploit-db.com:
5651| [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
5652| [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
5653|
5654| OpenVAS (Nessus) - http://www.openvas.org:
5655| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
5656| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
5657| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
5658| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
5659| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
5660| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
5661| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
5662| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
5663| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
5664| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
5665| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
5666| [100952] Microsoft IIS FTPd NLST stack overflow
5667| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
5668| [10680] Test Microsoft IIS Source Fragment Disclosure
5669| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
5670| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
5671| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
5672| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
5673| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
5674| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
5675| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
5676| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
5677| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
5678| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
5679| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
5680| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
5681| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
5682| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
5683| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
5684| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
5685| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
5686| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
5687| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
5688| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
5689| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
5690| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
5691| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
5692| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
5693| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
5694| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
5695| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
5696| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
5697| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
5698| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
5699| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
5700| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
5701| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
5702| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
5703| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
5704| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
5705| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
5706| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
5707| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
5708| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
5709| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
5710| [902798] Microsoft SMB Signing Enabled and Not Required At Server
5711| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
5712| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
5713| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
5714| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
5715| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
5716| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
5717| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
5718| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
5719| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
5720| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
5721| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
5722| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
5723| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
5724| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
5725| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
5726| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
5727| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
5728| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
5729| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
5730| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
5731| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
5732| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
5733| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
5734| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
5735| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
5736| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
5737| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
5738| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
5739| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
5740| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
5741| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
5742| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
5743| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
5744| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
5745| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
5746| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
5747| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
5748| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
5749| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
5750| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
5751| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
5752| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
5753| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
5754| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
5755| [902518] Microsoft .NET Framework Security Bypass Vulnerability
5756| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
5757| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
5758| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
5759| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
5760| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
5761| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
5762| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
5763| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
5764| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
5765| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
5766| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
5767| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
5768| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
5769| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
5770| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
5771| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
5772| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
5773| [902425] Microsoft Windows SMB Accessible Shares
5774| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
5775| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
5776| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
5777| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
5778| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
5779| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
5780| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
5781| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
5782| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
5783| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
5784| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
5785| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
5786| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
5787| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
5788| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
5789| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
5790| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
5791| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
5792| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
5793| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
5794| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
5795| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
5796| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
5797| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
5798| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
5799| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
5800| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
5801| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
5802| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
5803| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
5804| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
5805| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
5806| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
5807| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
5808| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
5809| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
5810| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
5811| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
5812| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
5813| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
5814| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
5815| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
5816| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
5817| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
5818| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
5819| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
5820| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
5821| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
5822| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
5823| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
5824| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
5825| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
5826| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
5827| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
5828| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
5829| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
5830| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
5831| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
5832| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
5833| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
5834| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
5835| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
5836| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
5837| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
5838| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
5839| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
5840| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
5841| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
5842| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
5843| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
5844| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
5845| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
5846| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
5847| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
5848| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
5849| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
5850| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
5851| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
5852| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
5853| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
5854| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
5855| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
5856| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
5857| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
5858| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
5859| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
5860| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
5861| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
5862| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
5863| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
5864| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
5865| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
5866| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
5867| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
5868| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
5869| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
5870| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
5871| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
5872| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
5873| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
5874| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
5875| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
5876| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
5877| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
5878| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
5879| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
5880| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
5881| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
5882| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
5883| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
5884| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
5885| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
5886| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
5887| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
5888| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
5889| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
5890| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
5891| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
5892| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
5893| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
5894| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
5895| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
5896| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
5897| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
5898| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
5899| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
5900| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
5901| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
5902| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
5903| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
5904| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
5905| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
5906| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
5907| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
5908| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
5909| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
5910| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
5911| [900808] Microsoft Visual Products Version Detection
5912| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
5913| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
5914| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
5915| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
5916| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
5917| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
5918| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
5919| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
5920| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
5921| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
5922| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
5923| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
5924| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
5925| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
5926| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
5927| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
5928| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
5929| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
5930| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
5931| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
5932| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
5933| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
5934| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
5935| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
5936| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
5937| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
5938| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
5939| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
5940| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
5941| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
5942| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
5943| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
5944| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
5945| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
5946| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
5947| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
5948| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
5949| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
5950| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
5951| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
5952| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
5953| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
5954| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
5955| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
5956| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
5957| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
5958| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
5959| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
5960| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
5961| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
5962| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
5963| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
5964| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
5965| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
5966| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
5967| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
5968| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
5969| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
5970| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
5971| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
5972| [900173] Microsoft Windows Media Player Version Detection
5973| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
5974| [900170] Microsoft iExplorer '&NBSP
5975| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
5976| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
5977| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
5978| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
5979| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
5980| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
5981| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
5982| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
5983| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
5984| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
5985| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
5986| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
5987| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
5988| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
5989| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
5990| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
5991| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
5992| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
5993| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
5994| [900025] Microsoft Office Version Detection
5995| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
5996| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
5997| [855384] Solaris Update for snmp/mibiisa 108870-36
5998| [855273] Solaris Update for snmp/mibiisa 108869-36
5999| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
6000| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
6001| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
6002| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
6003| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
6004| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
6005| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
6006| [802726] Microsoft SMB Signing Disabled
6007| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
6008| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
6009| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
6010| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
6011| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
6012| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
6013| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
6014| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
6015| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
6016| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
6017| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
6018| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
6019| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
6020| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
6021| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
6022| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
6023| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
6024| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
6025| [801934] Microsoft Silverlight Version Detection
6026| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
6027| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
6028| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
6029| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
6030| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
6031| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
6032| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
6033| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
6034| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
6035| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
6036| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
6037| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
6038| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
6039| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
6040| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
6041| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
6042| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
6043| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
6044| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
6045| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
6046| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
6047| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
6048| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
6049| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
6050| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
6051| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
6052| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
6053| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
6054| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
6055| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
6056| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
6057| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
6058| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
6059| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
6060| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
6061| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
6062| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
6063| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
6064| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
6065| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
6066| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
6067| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
6068| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
6069| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
6070| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
6071| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
6072| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
6073| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
6074| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
6075| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
6076| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
6077| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
6078| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
6079| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
6080| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
6081| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
6082| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
6083| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
6084| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
6085| [800742] Microsoft Internet Explorer Unspecified vulnerability
6086| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
6087| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
6088| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
6089| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
6090| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
6091| [800504] Microsoft Windows XP SP3 denial of service vulnerability
6092| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
6093| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
6094| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
6095| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
6096| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
6097| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
6098| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
6099| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
6100| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
6101| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
6102| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
6103| [800331] Microsoft Windows Live Messenger Client Version Detection
6104| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
6105| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
6106| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
6107| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
6108| [800217] Microsoft Money Version Detection
6109| [800209] Microsoft Internet Explorer Version Detection (Win)
6110| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
6111| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
6112| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
6113| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
6114| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
6115| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
6116| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
6117| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
6118| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
6119| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
6120| [101017] Microsoft MS03-018 security check
6121| [101016] Microsoft MS03-022 security check
6122| [101015] Microsoft MS03-034 security check
6123| [101014] Microsoft MS00-078 security check
6124| [101012] Microsoft MS03-051 security check
6125| [101010] Microsoft Security Bulletin MS05-004
6126| [101009] Microsoft Security Bulletin MS06-033
6127| [101007] Microsoft dotNET version grabber
6128| [101006] Microsoft Security Bulletin MS06-056
6129| [101005] Microsoft Security Bulletin MS07-040
6130| [101004] Microsoft MS04-017 security check
6131| [101003] Microsoft MS00-058 security check
6132| [101000] Microsoft MS00-060 security check
6133| [100950] Microsoft DNS server internal hostname disclosure detection
6134| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
6135| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
6136| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
6137| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
6138| [100062] Microsoft Remote Desktop Protocol Detection
6139| [90024] Windows Vulnerability in Microsoft Jet Database Engine
6140| [80007] Microsoft MS00-06 security check
6141| [13752] Denial of Service (DoS) in Microsoft SMS Client
6142| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
6143| [11874] IIS Service Pack - 404
6144| [11808] Microsoft RPC Interface Buffer Overrun (823980)
6145| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
6146| [11217] Microsoft's SQL Version Query
6147| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
6148| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
6149| [11142] IIS XSS via IDC error
6150| [11067] Microsoft's SQL Hello Overflow
6151| [11003] IIS Possible Compromise
6152| [10993] IIS ASP.NET Application Trace Enabled
6153| [10991] IIS Global.asa Retrieval
6154| [10936] IIS XSS via 404 error
6155| [10862] Microsoft's SQL Server Brute Force
6156| [10755] Microsoft Exchange Public Folders Information Leak
6157| [10732] IIS 5.0 WebDav Memory Leakage
6158| [10699] IIS FrontPage DoS II
6159| [10695] IIS .IDA ISAPI filter applied
6160| [10674] Microsoft's SQL UDP Info Query
6161| [10673] Microsoft's SQL Blank Password
6162| [10671] IIS Remote Command Execution
6163| [10667] IIS 5.0 PROPFIND Vulnerability
6164| [10661] IIS 5 .printer ISAPI filter applied
6165| [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
6166| [10585] IIS FrontPage DoS
6167| [10576] Check for dangerous IIS default files
6168| [10575] Check for IIS .cnf file leakage
6169| [10573] IIS 5.0 Sample App reveals physical path of web root
6170| [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
6171| [10537] IIS directory traversal
6172| [10492] IIS IDA/IDQ Path Disclosure
6173| [10491] ASP/ASA source using Microsoft Translate f: bug
6174| [10144] Microsoft SQL TCP/IP listener is running
6175|
6176| SecurityTracker - https://www.securitytracker.com:
6177| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
6178| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
6179| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
6180| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
6181| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
6182| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
6183| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
6184| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
6185| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
6186| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
6187| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
6188| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
6189| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
6190| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
6191| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
6192| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
6193| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
6194| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
6195| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
6196| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
6197| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
6198| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
6199| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
6200| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
6201| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
6202| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
6203| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
6204| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
6205| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
6206| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
6207| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
6208| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
6209| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
6210| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
6211| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
6212| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
6213| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
6214| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
6215| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
6216| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
6217| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
6218| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
6219| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
6220| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
6221| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
6222| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
6223| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
6224| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
6225| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
6226| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
6227| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
6228| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
6229| [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6230| [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
6231| [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
6232| [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
6233| [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
6234| [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
6235| [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
6236| [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
6237| [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
6238| [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
6239| [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
6240| [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
6241| [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
6242| [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
6243| [1028560] Microsoft Visio Discloses Information to Remote Users
6244| [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
6245| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
6246| [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
6247| [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
6248| [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
6249| [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
6250| [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
6251| [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
6252| [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
6253| [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
6254| [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
6255| [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
6256| [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
6257| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
6258| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
6259| [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
6260| [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
6261| [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
6262| [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
6263| [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
6264| [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
6265| [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
6266| [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
6267| [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
6268| [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
6269| [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6270| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
6271| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
6272| [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
6273| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
6274| [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
6275| [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
6276| [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
6277| [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
6278| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
6279| [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
6280| [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
6281| [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
6282| [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
6283| [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
6284| [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
6285| [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
6286| [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
6287| [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
6288| [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
6289| [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
6290| [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
6291| [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
6292| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
6293| [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
6294| [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
6295| [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
6296| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
6297| [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
6298| [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
6299| [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6300| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
6301| [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
6302| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6303| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6304| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6305| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6306| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6307| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6308| [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
6309| [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
6310| [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
6311| [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
6312| [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
6313| [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
6314| [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
6315| [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
6316| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
6317| [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
6318| [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
6319| [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
6320| [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
6321| [1027114] Microsoft Windows Includes Some Invalid Certificates
6322| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
6323| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
6324| [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6325| [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
6326| [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
6327| [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
6328| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
6329| [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
6330| [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
6331| [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
6332| [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
6333| [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
6334| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6335| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6336| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6337| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6338| [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
6339| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6340| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
6341| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
6342| [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
6343| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
6344| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
6345| [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
6346| [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
6347| [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
6348| [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
6349| [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
6350| [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
6351| [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
6352| [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
6353| [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
6354| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
6355| [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
6356| [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
6357| [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
6358| [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
6359| [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
6360| [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
6361| [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
6362| [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
6363| [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
6364| [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
6365| [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6366| [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
6367| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
6368| [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
6369| [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
6370| [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
6371| [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
6372| [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
6373| [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
6374| [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
6375| [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
6376| [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
6377| [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
6378| [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
6379| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
6380| [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
6381| [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
6382| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
6383| [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
6384| [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
6385| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
6386| [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
6387| [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
6388| [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
6389| [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
6390| [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
6391| [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
6392| [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
6393| [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
6394| [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
6395| [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
6396| [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
6397| [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
6398| [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
6399| [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
6400| [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
6401| [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
6402| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
6403| [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
6404| [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
6405| [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
6406| [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
6407| [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
6408| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
6409| [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
6410| [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
6411| [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6412| [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
6413| [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
6414| [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
6415| [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
6416| [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
6417| [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
6418| [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
6419| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
6420| [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
6421| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
6422| [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
6423| [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
6424| [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
6425| [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
6426| [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
6427| [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
6428| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
6429| [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
6430| [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
6431| [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
6432| [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
6433| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
6434| [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
6435| [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
6436| [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
6437| [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
6438| [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6439| [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6440| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
6441| [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
6442| [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
6443| [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
6444| [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
6445| [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
6446| [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
6447| [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
6448| [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
6449| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
6450| [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
6451| [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
6452| [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
6453| [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
6454| [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
6455| [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
6456| [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
6457| [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
6458| [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
6459| [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
6460| [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
6461| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
6462| [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
6463| [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
6464| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
6465| [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
6466| [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
6467| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
6468| [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
6469| [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
6470| [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
6471| [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
6472| [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
6473| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
6474| [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
6475| [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
6476| [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
6477| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
6478| [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
6479| [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
6480| [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
6481| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
6482| [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
6483| [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
6484| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
6485| [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
6486| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
6487| [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
6488| [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
6489| [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
6490| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6491| [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
6492| [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
6493| [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
6494| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
6495| [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
6496| [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
6497| [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
6498| [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
6499| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
6500| [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
6501| [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
6502| [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
6503| [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
6504| [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
6505| [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
6506| [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
6507| [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
6508| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
6509| [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
6510| [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
6511| [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
6512| [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
6513| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
6514| [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
6515| [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
6516| [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
6517| [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
6518| [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
6519| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
6520| [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
6521| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
6522| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
6523| [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
6524| [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
6525| [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
6526| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
6527| [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
6528| [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
6529| [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6530| [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
6531| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
6532| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
6533| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
6534| [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
6535| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
6536| [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
6537| [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
6538| [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
6539| [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
6540| [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
6541| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
6542| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
6543| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6544| [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
6545| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
6546| [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
6547| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
6548| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
6549| [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
6550| [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
6551| [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
6552| [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
6553| [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
6554| [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
6555| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
6556| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
6557| [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
6558| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
6559| [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
6560| [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
6561| [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
6562| [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
6563| [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
6564| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
6565| [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
6566| [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
6567| [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
6568| [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
6569| [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
6570| [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
6571| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
6572| [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
6573| [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
6574| [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
6575| [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
6576| [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
6577| [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
6578| [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
6579| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
6580| [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
6581| [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
6582| [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
6583| [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
6584| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
6585| [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
6586| [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
6587| [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
6588| [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
6589| [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
6590| [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6591| [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
6592| [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
6593| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
6594| [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
6595| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
6596| [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
6597| [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
6598| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
6599| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
6600| [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
6601| [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
6602| [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
6603| [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
6604| [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
6605| [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
6606| [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
6607| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
6608| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
6609| [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
6610| [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
6611| [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
6612| [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
6613| [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
6614| [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
6615| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
6616| [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
6617| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
6618| [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
6619| [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
6620| [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
6621| [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
6622| [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
6623| [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
6624| [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
6625| [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
6626| [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
6627| [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6628| [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
6629| [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
6630| [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
6631| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
6632| [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
6633| [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
6634| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
6635| [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
6636| [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
6637| [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
6638| [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
6639| [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
6640| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
6641| [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
6642| [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
6643| [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
6644| [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
6645| [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
6646| [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
6647| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
6648| [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
6649| [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
6650| [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
6651| [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
6652| [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
6653| [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
6654| [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
6655| [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
6656| [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
6657| [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
6658| [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
6659| [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
6660| [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
6661| [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
6662| [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
6663| [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
6664| [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
6665| [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
6666| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
6667| [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
6668| [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
6669| [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
6670| [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
6671| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
6672| [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
6673| [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
6674| [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
6675| [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
6676| [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
6677| [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
6678| [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
6679| [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
6680| [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
6681| [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
6682| [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
6683| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
6684| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
6685| [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
6686| [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
6687| [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
6688| [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
6689| [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
6690| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
6691| [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
6692| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6693| [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
6694| [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
6695| [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
6696| [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
6697| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
6698| [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
6699| [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
6700| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6701| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
6702| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
6703| [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
6704| [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
6705| [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6706| [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
6707| [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
6708| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
6709| [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
6710| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
6711| [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
6712| [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
6713| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
6714| [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
6715| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
6716| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
6717| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
6718| [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
6719| [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
6720| [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
6721| [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
6722| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
6723| [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
6724| [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
6725| [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
6726| [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
6727| [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
6728| [1017752] Adobe JRun IIS Connector Bug Lets Remote Users Deny Service
6729| [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
6730| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
6731| [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
6732| [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
6733| [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6734| [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6735| [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6736| [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
6737| [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6738| [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6739| [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
6740| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
6741| [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
6742| [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
6743| [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
6744| [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
6745| [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
6746| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
6747| [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
6748| [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
6749| [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
6750| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
6751| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
6752| [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
6753| [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
6754| [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
6755| [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
6756| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
6757| [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
6758| [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
6759| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
6760| [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
6761| [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
6762| [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
6763| [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
6764| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
6765| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
6766| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
6767| [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
6768| [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
6769| [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
6770| [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
6771| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
6772| [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
6773| [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
6774| [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
6775| [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
6776| [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
6777| [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
6778| [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
6779| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
6780| [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
6781| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
6782| [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
6783| [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
6784| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
6785| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
6786| [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
6787| [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
6788| [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
6789| [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
6790| [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
6791| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
6792| [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
6793| [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
6794| [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
6795| [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
6796| [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
6797| [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
6798| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
6799| [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
6800| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
6801| [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
6802| [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
6803| [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
6804| [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
6805| [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
6806| [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
6807| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
6808| [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
6809| [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
6810| [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
6811| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
6812| [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
6813| [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
6814| [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
6815| [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
6816| [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
6817| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
6818| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
6819| [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
6820| [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
6821| [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
6822| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
6823| [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
6824| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
6825| [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
6826| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
6827| [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
6828| [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
6829| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
6830| [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
6831| [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
6832| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
6833| [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
6834| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
6835| [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
6836| [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
6837| [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
6838| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
6839| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
6840| [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
6841| [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
6842| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
6843| [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
6844| [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
6845| [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
6846| [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
6847| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
6848| [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
6849| [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
6850| [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
6851| [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
6852| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
6853| [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
6854| [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
6855| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
6856| [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
6857| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
6858| [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
6859| [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
6860| [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
6861| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
6862| [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
6863| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
6864| [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
6865| [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
6866| [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
6867| [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
6868| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
6869| [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
6870| [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
6871| [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
6872| [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
6873| [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
6874| [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
6875| [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
6876| [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
6877| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
6878| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
6879| [1014501] Hosting Controller 'IISActions.asp' Script Lets Remote Authenticated Users Add Domains/Subdomains
6880| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
6881| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
6882| [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
6883| [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
6884| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
6885| [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
6886| [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
6887| [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
6888| [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
6889| [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
6890| [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
6891| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
6892| [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
6893| [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
6894| [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
6895| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
6896| [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
6897| [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
6898| [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
6899| [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
6900| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
6901| [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
6902| [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
6903| [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
6904| [1013724] RSA Authentication Agent for Web for IIS Input Validation Bug Lets Remote Users Conduct Cross-Site Scripting Attacks
6905| [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
6906| [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
6907| [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
6908| [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
6909| [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
6910| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
6911| [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
6912| [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
6913| [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
6914| [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
6915| [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
6916| [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
6917| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
6918| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
6919| [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
6920| [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
6921| [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
6922| [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
6923| [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
6924| [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
6925| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
6926| [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
6927| [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
6928| [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
6929| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
6930| [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
6931| [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
6932| [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
6933| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
6934| [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
6935| [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
6936| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
6937| [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
6938| [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
6939| [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
6940| [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
6941| [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
6942| [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
6943| [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
6944| [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
6945| [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
6946| [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
6947| [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
6948| [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
6949| [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
6950| [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
6951| [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
6952| [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
6953| [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
6954| [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
6955| [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
6956| [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
6957| [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
6958| [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
6959| [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
6960| [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
6961| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
6962| [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
6963| [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
6964| [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
6965| [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
6966| [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
6967| [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
6968| [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
6969| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
6970| [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
6971| [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
6972| [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
6973| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
6974| [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
6975| [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
6976| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
6977| [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
6978| [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
6979| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
6980| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
6981| [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
6982| [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
6983| [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
6984| [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
6985| [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
6986| [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
6987| [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
6988| [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
6989| [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
6990| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
6991| [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
6992| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
6993| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
6994| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
6995| [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
6996| [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
6997| [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
6998| [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
6999| [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
7000| [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
7001| [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
7002| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
7003| [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
7004| [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
7005| [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
7006| [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
7007| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
7008| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
7009| [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
7010| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
7011| [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
7012| [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
7013| [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
7014| [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
7015| [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
7016| [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
7017| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
7018| [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
7019| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
7020| [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
7021| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
7022| [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
7023| [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
7024| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
7025| [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
7026| [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
7027| [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
7028| [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
7029| [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
7030| [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
7031| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
7032| [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
7033| [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
7034| [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
7035| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
7036| [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
7037| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
7038| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
7039| [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
7040| [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
7041| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
7042| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
7043| [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
7044| [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
7045| [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
7046| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
7047| [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
7048| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
7049| [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
7050| [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
7051| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
7052| [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
7053| [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
7054| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
7055| [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
7056| [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
7057| [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
7058| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
7059| [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
7060| [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
7061| [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
7062| [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
7063| [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
7064| [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
7065| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
7066| [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
7067| [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
7068| [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
7069| [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
7070| [1008586] Microsoft Office Security Features Can Be Bypassed
7071| [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
7072| [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
7073| [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
7074| [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
7075| [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
7076| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
7077| [1008425] Microsoft IE Does Not Properly Display Some URLs
7078| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
7079| [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
7080| [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
7081| [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
7082| [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
7083| [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
7084| [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
7085| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
7086| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
7087| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
7088| [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
7089| [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
7090| [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
7091| [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
7092| [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
7093| [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
7094| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
7095| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
7096| [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
7097| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
7098| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
7099| [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
7100| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
7101| [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
7102| [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
7103| [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
7104| [1007651] RealSecure Server Sensor Unicode Flaw Lets Remote Users Crash the IIS Web Service
7105| [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
7106| [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
7107| [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
7108| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
7109| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
7110| [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
7111| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
7112| [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
7113| [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
7114| [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
7115| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
7116| [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
7117| [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
7118| [1007364] IISShield May Fail to Drop a Specific Malformed HTTP Request
7119| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
7120| [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
7121| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
7122| [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
7123| [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
7124| [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
7125| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
7126| [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
7127| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
7128| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
7129| [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
7130| [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
7131| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
7132| [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
7133| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
7134| [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
7135| [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
7136| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
7137| [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
7138| [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
7139| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
7140| [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
7141| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
7142| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
7143| [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
7144| [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
7145| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
7146| [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
7147| [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
7148| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
7149| [1006894] iisCART2000 Upload Authentication Error Lets Remote Users Upload and Execute Arbitrary Scripts
7150| [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
7151| [1006829] iisPROTECT Input Validation Hole Lets Remote Users Execute SQL Stored Procedures
7152| [1006815] iisPROTECT Lets Remote Users Access Protected Files Using URL Encoding
7153| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
7154| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
7155| [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
7156| [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
7157| [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
7158| [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
7159| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
7160| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
7161| [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
7162| [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
7163| [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
7164| [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
7165| [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
7166| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
7167| [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
7168| [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
7169| [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
7170| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
7171| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
7172| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
7173| [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
7174| [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
7175| [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
7176| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
7177| [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
7178| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
7179| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
7180| [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
7181| [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
7182| [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
7183| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
7184| [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
7185| [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
7186| [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
7187| [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
7188| [1006023] ColdFusion MX Configuration Error When Used With IIS and NT Authentication May Grant Unauthorized Access to Remote Authenticated Users
7189| [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
7190| [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
7191| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
7192| [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
7193| [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
7194| [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
7195| [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
7196| [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
7197| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
7198| [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
7199| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
7200| [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
7201| [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
7202| [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
7203| [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
7204| [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
7205| [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
7206| [1005627] IISPop EMail Server Can Be Crashed By Remote Users
7207| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
7208| [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
7209| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
7210| [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
7211| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
7212| [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
7213| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
7214| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
7215| [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
7216| [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
7217| [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
7218| [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
7219| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
7220| [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
7221| [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
7222| [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
7223| [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
7224| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
7225| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
7226| [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
7227| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
7228| [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
7229| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
7230| [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
7231| [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
7232| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
7233| [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
7234| [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
7235| [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
7236| [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
7237| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
7238| [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
7239| [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
7240| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
7241| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
7242| [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
7243| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
7244| [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
7245| [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
7246| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
7247| [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
7248| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
7249| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
7250| [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
7251| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
7252| [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
7253| [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
7254| [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
7255| [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
7256| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
7257| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
7258| [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
7259| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
7260| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
7261| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
7262| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
7263| [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
7264| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
7265| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
7266| [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
7267| [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
7268| [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
7269| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
7270| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
7271| [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
7272| [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
7273| [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
7274| [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
7275| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
7276| [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
7277| [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
7278| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
7279| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
7280| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
7281| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
7282| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
7283| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
7284| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
7285| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
7286| [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
7287| [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
7288| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
7289| [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
7290| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
7291| [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
7292| [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
7293| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
7294| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
7295| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
7296| [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
7297| [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
7298| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
7299| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
7300| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
7301| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
7302| [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
7303| [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
7304| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
7305| [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
7306| [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
7307| [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
7308| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
7309| [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
7310| [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
7311| [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
7312| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
7313| [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
7314| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
7315| [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
7316| [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
7317| [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
7318| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
7319| [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
7320| [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
7321| [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
7322| [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
7323| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
7324| [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
7325| [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
7326| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
7327| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
7328| [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
7329| [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
7330| [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
7331| [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
7332| [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
7333| [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
7334| [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
7335| [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
7336| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
7337| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
7338| [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
7339| [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
7340| [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
7341| [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
7342| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
7343| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
7344| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
7345| [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
7346| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
7347| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
7348| [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
7349| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
7350| [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
7351| [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
7352| [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
7353| [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
7354| [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
7355| [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
7356| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
7357| [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
7358| [1003538] NetWin CWMail Web-Mail Server Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With the Privileges of the IIS Web Server
7359| [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
7360| [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
7361| [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
7362| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
7363| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
7364| [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
7365| [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
7366| [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
7367| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
7368| [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
7369| [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
7370| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
7371| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
7372| [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
7373| [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
7374| [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
7375| [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
7376| [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
7377| [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
7378| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
7379| [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
7380| [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
7381| [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
7382| [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
7383| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
7384| [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
7385| [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
7386| [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
7387| [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
7388| [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
7389| [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
7390| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
7391| [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
7392| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
7393| [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
7394| [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
7395| [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
7396| [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
7397| [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
7398| [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
7399| [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
7400| [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
7401| [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
7402| [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
7403| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
7404| [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
7405| [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
7406| [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
7407| [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
7408| [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
7409| [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
7410| [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
7411| [1002773] Titan Application Firewall for IIS Web Server Fails to Decode URLs, Letting Remote Users Bypass URL-based Firewall Restrictions
7412| [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
7413| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
7414| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
7415| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
7416| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
7417| [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
7418| [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
7419| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
7420| [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
7421| [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
7422| [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
7423| [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
7424| [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
7425| [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
7426| [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
7427| [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
7428| [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
7429| [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
7430| [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
7431| [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
7432| [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
7433| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
7434| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
7435| [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
7436| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
7437| [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
7438| [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
7439| [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
7440| [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
7441| [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
7442| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
7443| [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
7444| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
7445| [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
7446| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
7447| [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
7448| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
7449| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
7450| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
7451| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
7452| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
7453| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
7454| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
7455| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
7456| [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
7457| [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
7458| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
7459| [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
7460| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
7461| [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
7462| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
7463| [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
7464| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
7465| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
7466| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
7467| [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
7468| [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
7469| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
7470| [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
7471| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
7472| [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
7473| [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
7474| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
7475| [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
7476| [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
7477| [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
7478| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
7479| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
7480| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
7481| [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
7482| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
7483| [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
7484| [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
7485| [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
7486| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
7487| [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
7488| [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
7489| [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
7490| [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
7491| [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
7492| [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
7493| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
7494| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
7495| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
7496| [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
7497| [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
7498| [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
7499| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
7500| [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
7501| [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
7502| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
7503| [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
7504| [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
7505| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
7506| [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
7507| [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
7508| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
7509| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
7510| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
7511|
7512| OSVDB - http://www.osvdb.org:
7513| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
7514| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
7515| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
7516| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
7517| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
7518| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
7519| [87262] Microsoft IIS FTP Command Injection Information Disclosure
7520| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
7521| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
7522| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
7523| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
7524| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
7525| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
7526| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
7527| [71856] Microsoft IIS Status Header Handling Remote Overflow
7528| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
7529| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
7530| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
7531| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
7532| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
7533| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
7534| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
7535| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
7536| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
7537| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
7538| [59892] Microsoft IIS Malformed Host Header Remote DoS
7539| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
7540| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
7541| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
7542| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
7543| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
7544| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
7545| [55269] Microsoft IIS Traversal GET Request Remote DoS
7546| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
7547| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
7548| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
7549| [52238] Microsoft IIS IDC Extension XSS
7550| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
7551| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
7552| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
7553| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
7554| [43451] Microsoft IIS HTTP Request Smuggling
7555| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
7556| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
7557| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
7558| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
7559| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
7560| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
7561| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
7562| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
7563| [27152] Microsoft Windows IIS ASP Page Processing Overflow
7564| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
7565| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
7566| [21805] Microsoft IIS Crafted URL Remote DoS
7567| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
7568| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
7569| [17124] Microsoft IIS Malformed WebDAV Request DoS
7570| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
7571| [17122] Microsoft IIS Permission Weakness .COM File Upload
7572| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
7573| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
7574| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
7575| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
7576| [13760] Microsoft IIS Malformed URL Request DoS
7577| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
7578| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
7579| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
7580| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
7581| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
7582| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
7583| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
7584| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
7585| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
7586| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
7587| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
7588| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
7589| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
7590| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
7591| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
7592| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
7593| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
7594| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
7595| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
7596| [11257] Microsoft IIS Malformed GET Request DoS
7597| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
7598| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
7599| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
7600| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
7601| [9200] Microsoft IIS Unspecified XSS Variant
7602| [9199] Microsoft IIS shtml.dll XSS
7603| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
7604| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
7605| [7737] Microsoft IIS ASP Redirection Function XSS
7606| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
7607| [5851] Microsoft IIS Single Dot Source Code Disclosure
7608| [5736] Microsoft IIS Relative Path System Privilege Escalation
7609| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
7610| [5633] Microsoft IIS Invalid WebDAV Request DoS
7611| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
7612| [5584] Microsoft IIS URL Redirection Malformed Length DoS
7613| [5566] Microsoft IIS Form_VBScript.asp XSS
7614| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
7615| [4864] Microsoft IIS TRACK Logging Failure
7616| [4863] Microsoft IIS Active Server Page Header DoS
7617| [4791] Microsoft IIS Response Object DoS
7618| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
7619| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
7620| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
7621| [3500] Microsoft IIS fpcount.exe Remote Overflow
7622| [3341] Microsoft IIS Redirect Response XSS
7623| [3339] Microsoft IIS HTTP Error Page XSS
7624| [3338] Microsoft IIS Help File XSS
7625| [3328] Microsoft IIS FTP Status Request DoS
7626| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
7627| [3325] Microsoft IIS HTR ISAPI Overflow
7628| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
7629| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
7630| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
7631| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
7632| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
7633| [3231] Microsoft IIS Log Bypass
7634| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
7635| [1931] Microsoft IIS MIME Content-Type Header DoS
7636| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
7637| [1826] Microsoft IIS Domain Guest Account Disclosure
7638| [1824] Microsoft IIS FTP DoS
7639| [1804] Microsoft IIS Long Request Parsing Remote DoS
7640| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
7641| [1750] Microsoft IIS File Fragment Disclosure
7642| [1543] Microsoft NT/IIS Invalid URL Request DoS
7643| [1504] Microsoft IIS File Permission Canonicalization Bypass
7644| [1465] Microsoft IIS .htr Missing Variable DoS
7645| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
7646| [1322] Microsoft IIS Malformed .htr Request DoS
7647| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
7648| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
7649| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
7650| [1170] Microsoft IIS Escape Character URL Access Bypass
7651| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
7652| [1082] Microsoft IIS Domain Resolution Access Bypass
7653| [1041] Microsoft IIS Malformed HTTP Request Header DoS
7654| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
7655| [930] Microsoft IIS Shared ASP Cache Information Disclosure
7656| [929] Microsoft IIS FTP Server NLST Command Overflow
7657| [928] Microsoft IIS Long Request Log Evasion
7658| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
7659| [814] Microsoft IIS global.asa Remote Information Disclosure
7660| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
7661| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
7662| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
7663| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
7664| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
7665| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
7666| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
7667| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
7668| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
7669| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
7670| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
7671| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
7672| [473] Microsoft IIS Multiple .cnf File Information Disclosure
7673| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
7674| [470] Microsoft IIS Form_JScript.asp XSS
7675| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
7676| [436] Microsoft IIS Unicode Remote Command Execution
7677| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
7678| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
7679| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
7680| [308] Microsoft IIS Malformed File Extension URL DoS
7681| [285] Microsoft IIS repost.asp File Upload
7682| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
7683| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
7684| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
7685| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
7686| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
7687| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
7688| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
7689| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
7690| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
7691| [98] Microsoft IIS perl.exe HTTP Path Disclosure
7692| [97] Microsoft IIS ISM.DLL HTR Request Overflow
7693| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
7694| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
7695| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
7696| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
7697| [2] Microsoft IIS ExAir search.asp Direct Request DoS
7698|_
7699113/tcp closed ident
7700443/tcp open ssl/http Microsoft IIS httpd 10.0
7701| http-server-header:
7702| Microsoft-HTTPAPI/2.0
7703|_ Microsoft-IIS/7.5
7704| vulscan: VulDB - https://vuldb.com:
7705| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
7706| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
7707| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
7708| [139953] Microsoft Internet Explorer 10/11 memory corruption
7709| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
7710| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
7711| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
7712| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
7713| [136279] Microsoft Internet Explorer 10/11 memory corruption
7714| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
7715| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7716| [134682] Microsoft Internet Explorer 10/11 memory corruption
7717| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7718| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7719| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
7720| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
7721| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7722| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7723| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7724| [131678] Microsoft Internet Explorer 10/11 memory corruption
7725| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
7726| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
7727| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
7728| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7729| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7730| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7731| [131618] Microsoft Internet Explorer 10/11 memory corruption
7732| [130827] Microsoft Internet Explorer 10/11 information disclosure
7733| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
7734| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
7735| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
7736| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
7737| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
7738| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
7739| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
7740| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
7741| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
7742| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
7743| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7744| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
7745| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
7746| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
7747| [122846] Microsoft Internet Explorer 10/11 memory corruption
7748| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
7749| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7750| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
7751| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
7752| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
7753| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
7754| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
7755| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
7756| [115997] Microsoft Internet Explorer 10/11 memory corruption
7757| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
7758| [114567] Microsoft Internet Explorer 10/11 information disclosure
7759| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
7760| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
7761| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
7762| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
7763| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
7764| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
7765| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
7766| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
7767| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
7768| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
7769| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
7770| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
7771| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
7772| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
7773| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
7774| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7775| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7776| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
7777| [109365] Microsoft Internet Explorer 10/11 memory corruption
7778| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
7779| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
7780| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
7781| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
7782| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
7783| [102461] Microsoft Internet Explorer 10/11 memory corruption
7784| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
7785| [101007] Microsoft Internet Explorer 10/11 memory corruption
7786| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
7787| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
7788| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
7789| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
7790| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
7791| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
7792| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
7793| [97967] Microsoft Internet Explorer 10/11 memory corruption
7794| [97965] Microsoft Internet Explorer 10/11 memory corruption
7795| [94436] Microsoft Windows 10 Graphics memory corruption
7796| [94421] Microsoft Internet Explorer 10/11 information disclosure
7797| [94418] Microsoft Internet Explorer 10/11 privilege escalation
7798| [93427] Microsoft Internet Explorer 10/11 memory corruption
7799| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
7800| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
7801| [92561] Microsoft Internet Explorer 10/11 privilege escalation
7802| [92560] Microsoft Internet Explorer 10/11 privilege escalation
7803| [92557] Microsoft Internet Explorer 10/11 memory corruption
7804| [91560] Microsoft Windows 10 Object denial of service
7805| [91517] Microsoft Internet Explorer 10/11 memory corruption
7806| [91516] Microsoft Internet Explorer 10/11 privilege escalation
7807| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
7808| [90683] Microsoft Internet Explorer 10/11 information disclosure
7809| [89020] Microsoft Internet Explorer 10/11 information disclosure
7810| [89010] Microsoft Internet Explorer 10/11 memory corruption
7811| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
7812| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
7813| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
7814| [87139] Microsoft Internet Explorer 10/11 information disclosure
7815| [82246] Microsoft Internet Explorer 10/11 memory corruption
7816| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
7817| [81271] Microsoft Windows 10 PDF Library memory corruption
7818| [81249] Microsoft Internet Explorer 10/11 memory corruption
7819| [81243] Microsoft Internet Explorer 10 memory corruption
7820| [80845] Microsoft Internet Explorer 10 memory corruption
7821| [80843] Microsoft Internet Explorer 10 memory corruption
7822| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
7823| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
7824| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
7825| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
7826| [79515] Microsoft Windows 10 Kernel memory corruption
7827| [79473] Microsoft Internet Explorer 10 memory corruption
7828| [79466] Microsoft Internet Explorer 10/11 memory corruption
7829| [79463] Microsoft Internet Explorer 10 memory corruption
7830| [79158] Microsoft Internet Explorer 10/11 memory corruption
7831| [79157] Microsoft Internet Explorer 10/11 memory corruption
7832| [79139] Microsoft Internet Explorer 10/11 memory corruption
7833| [78383] Microsoft Internet Explorer 10/11 privilege escalation
7834| [78382] Microsoft Internet Explorer 10 memory corruption
7835| [77643] Microsoft Internet Explorer 10/11 memory corruption
7836| [77597] Microsoft Internet Explorer 10/11 File denial of service
7837| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
7838| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
7839| [77005] Microsoft Internet Explorer 10/11 memory corruption
7840| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
7841| [76488] Microsoft Internet Explorer 10/11 File information disclosure
7842| [76487] Microsoft Internet Explorer 10/11 memory corruption
7843| [76475] Microsoft Internet Explorer 10/11 memory corruption
7844| [76436] Microsoft Internet Explorer 10/11 memory corruption
7845| [75781] Microsoft Internet Explorer 10/11 memory corruption
7846| [75777] Microsoft Internet Explorer 10 memory corruption
7847| [75767] Microsoft Internet Explorer 10/11 privilege escalation
7848| [75766] Microsoft Internet Explorer 10/11 memory corruption
7849| [75765] Microsoft Internet Explorer 10/11 memory corruption
7850| [75762] Microsoft Internet Explorer 10/11 memory corruption
7851| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
7852| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
7853| [75324] Microsoft Internet Explorer 10/11 memory corruption
7854| [74857] Microsoft Internet Explorer 10/11 memory corruption
7855| [73944] Microsoft Internet Explorer 10/11 memory corruption
7856| [73942] Microsoft Internet Explorer 10 memory corruption
7857| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
7858| [69144] Microsoft Internet Explorer 10/11 memory corruption
7859| [69141] Microsoft Internet Explorer 10/11 privilege escalation
7860| [69138] Microsoft Internet Explorer 10/11 memory corruption
7861| [69126] Microsoft Internet Explorer 10/11 memory corruption
7862| [69122] Microsoft Internet Explorer 10/11 memory corruption
7863| [69117] Microsoft Internet Explorer 10/11 memory corruption
7864| [69115] Microsoft Internet Explorer 10 memory corruption
7865| [69114] Microsoft Internet Explorer 10 memory corruption
7866| [68398] Microsoft Internet Explorer 10 memory corruption
7867| [68180] Microsoft Internet Explorer 10/11 privilege escalation
7868| [68179] Microsoft Internet Explorer 10/11 privilege escalation
7869| [68168] Microsoft Internet Explorer 10/11 memory corruption
7870| [67810] Microsoft Internet Explorer 10/11 memory corruption
7871| [67504] Microsoft Internet Explorer 10/11 memory corruption
7872| [67495] Microsoft Internet Explorer 10 memory corruption
7873| [67493] Microsoft Internet Explorer 10/11 memory corruption
7874| [67491] Microsoft Internet Explorer 10/11 memory corruption
7875| [67486] Microsoft Internet Explorer 10 memory corruption
7876| [67482] Microsoft Internet Explorer 10/11 memory corruption
7877| [67352] Microsoft Internet Explorer 10/11 memory corruption
7878| [67347] Microsoft Internet Explorer 10/11 memory corruption
7879| [67344] Microsoft Internet Explorer 10/11 memory corruption
7880| [67341] Microsoft Internet Explorer 10/11 memory corruption
7881| [67334] Microsoft Internet Explorer 10 memory corruption
7882| [67330] Microsoft Internet Explorer 10/11 memory corruption
7883| [67329] Microsoft Internet Explorer 10/11 memory corruption
7884| [67004] Microsoft Internet Explorer 10/11 memory corruption
7885| [13537] Microsoft Internet Explorer 10/11 memory corruption
7886| [13535] Microsoft Internet Explorer 10/11 memory corruption
7887| [13530] Microsoft Internet Explorer 10/11 memory corruption
7888| [13529] Microsoft Internet Explorer 10/11 memory corruption
7889| [13523] Microsoft Internet Explorer 10/11 memory corruption
7890| [13516] Microsoft Internet Explorer 10/11 memory corruption
7891| [13513] Microsoft Internet Explorer 10/11 memory corruption
7892| [13510] Microsoft Internet Explorer 10/11 memory corruption
7893| [13507] Microsoft Internet Explorer 10 memory corruption
7894| [13506] Microsoft Internet Explorer 10 memory corruption
7895| [13498] Microsoft Internet Explorer 10/11 memory corruption
7896| [13495] Microsoft Internet Explorer 10/11 information disclosure
7897| [13491] Microsoft Internet Explorer 10/11 memory corruption
7898| [12546] Microsoft Internet Explorer 10/11 memory corruption
7899| [12544] Microsoft Internet Explorer 10/11 memory corruption
7900| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
7901| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
7902| [11433] Microsoft Internet Explorer 10 memory corruption
7903| [10625] Microsoft Internet Explorer 10 memory corruption
7904| [10624] Microsoft Internet Explorer 10 memory corruption
7905| [10621] Microsoft Internet Explorer 10 memory corruption
7906| [10620] Microsoft Internet Explorer 10 memory corruption
7907| [10219] Microsoft Internet Explorer 10 memory corruption
7908| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
7909| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
7910| [9411] Microsoft Internet Explorer 10 memory corruption
7911| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
7912| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
7913| [9090] Microsoft Internet Explorer 10 memory corruption
7914| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
7915| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
7916| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
7917| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
7918| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
7919| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
7920| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
7921|
7922| MITRE CVE - https://cve.mitre.org:
7923| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
7924| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
7925| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
7926| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
7927| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
7928| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
7929| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
7930| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
7931| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
7932| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
7933| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
7934| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12,
7935#######################################################################################################################################
7936 Anonymous JTSEC #OpTurkey Full Recon #6