· 6 years ago · Dec 10, 2019, 12:28 AM
1######################################################################################################################################
2======================================================================================================================================
3Hostname www.mlit.go.jp ISP NTT Communications Corporation
4Continent Asia Flag
5JP
6Country Japan Country Code JP
7Region Unknown Local time 10 Dec 2019 08:31 JST
8City Unknown Postal Code Unknown
9IP Address 210.248.150.33 Latitude 35.69
10 Longitude 139.69
11======================================================================================================================================
12######################################################################################################################################
13> www.mlit.go.jp
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18www.mlit.go.jp canonical name = www-vip.mlit.go.jp.
19Name: www-vip.mlit.go.jp
20Address: 210.248.150.33
21>
22######################################################################################################################################
23Domain Information:
24a. [Domain Name] MLIT.GO.JP
25g. [Organization] Ministry of Land, Infrastructure, Transport and Tourism
26l. [Organization Type] Government
27m. [Administrative Contact] EK13872JP
28n. [Technical Contact] HA14662JP
29p. [Name Server] ns6-tk01.ocn.ad.jp
30p. [Name Server] ns6-tk02.ocn.ad.jp
31s. [Signing Key]
32[State] Connected (2020/11/30)
33[Registered Date] 2000/11/30
34[Connected Date] 2000/12/15
35[Last Update] 2019/12/01 01:06:39 (JST)
36######################################################################################################################################
37[+] Target : www.mlit.go.jp
38
39[+] IP Address : 210.248.150.33
40
41[+] Headers :
42
43[+] Date : Mon, 09 Dec 2019 23:35:31 GMT
44[+] Last-Modified : Mon, 09 Dec 2019 08:34:41 GMT
45[+] ETag : "b580-599414451cb92"
46[+] Accept-Ranges : bytes
47[+] Keep-Alive : timeout=10, max=500
48[+] Connection : Keep-Alive
49[+] Content-Type : text/html
50[+] Transfer-Encoding : chunked
51
52[+] SSL Certificate Information :
53
54[+] countryName : JP
55[+] stateOrProvinceName : Tokyo-to
56[+] localityName : Chiyoda-ku
57[+] organizationName : Ministry of Land, Infrastructure, Transport and Tourism
58[+] commonName : www.mlit.go.jp
59[+] countryName : JP
60[+] organizationName : SECOM Trust Systems CO.,LTD.
61[+] commonName : SECOM Passport for Web SR 3.0 CA
62[+] Version : 3
63[+] Serial Number : 3DEC2F6DC55A6820
64[+] Not Before : Feb 13 10:37:28 2019 GMT
65[+] Not After : Feb 13 14:59:59 2021 GMT
66[+] OCSP : ('http://sr30.ocsp.secomtrust.net',)
67[+] subject Alt Name : (('DNS', 'www.mlit.go.jp'),)
68
69[+] Whois Lookup :
70
71[+] NIR : {'query': '210.248.150.33', 'raw': None, 'nets': [{'cidr': '210.248.150.0/25', 'name': 'FUJITSU LIMITED', 'handle': 'MLIT-NET', 'range': '210.248.150.1 - 210.248.150.127', 'country': 'JP', 'address': None, 'postal_code': None, 'nameservers': None, 'created': None, 'updated': '2014-10-29T08:44:04', 'contacts': {'admin': {'name': 'Matsumura, Hikoo', 'email': 'matsumura.hikoo@jp.fujitsu.com', 'reply_email': '', 'organization': 'FUJITSU LIMITED', 'division': '', 'title': '', 'phone': '03-3730-3271', 'fax': '', 'updated': '2014-10-29T08:44:06'}, 'tech': {'name': 'Matsumura, Hikoo', 'email': 'matsumura.hikoo@jp.fujitsu.com', 'reply_email': '', 'organization': 'FUJITSU LIMITED', 'division': '', 'title': '', 'phone': '03-3730-3271', 'fax': '', 'updated': '2014-10-29T08:44:06'}}}]}
72[+] ASN Registry : apnic
73[+] ASN : 4713
74[+] ASN CIDR : 210.248.0.0/16
75[+] ASN Country Code : JP
76[+] ASN Date : 1999-02-09
77[+] ASN Description : OCN NTT Communications Corporation, JP
78[+] cidr : 210.248.0.0/13
79[+] name : JPNIC-NET-JP
80[+] handle : JNIC1-AP
81[+] range : 210.248.0.0 - 210.255.255.255
82[+] description : Japan Network Information Center
83[+] country : JP
84[+] state : None
85[+] city : None
86[+] address : Urbannet-Kanda Bldg 4F, 3-6-2 Uchi-Kanda
87Chiyoda-ku, Tokyo 101-0047, Japan
88[+] postal_code : None
89[+] emails : ['hostmaster@nic.ad.jp']
90[+] created : None
91[+] updated : None
92
93[+] Crawling Target...
94
95[+] Looking for robots.txt........[ Not Found ]
96[+] Looking for sitemap.xml.......[ Not Found ]
97[+] Extracting CSS Links..........[ 8 ]
98[+] Extracting Javascript Links...[ 11 ]
99[+] Extracting Internal Links.....[ 55 ]
100[+] Extracting External Links.....[ 20 ]
101[+] Extracting Images.............[ 81 ]
102
103[+] Total Links Extracted : 175
104
105[+] Dumping Links in /opt/FinalRecon/dumps/www.mlit.go.jp.dump
106[+] Completed!
107######################################################################################################################################
108[i] Scanning Site: http://210.248.150.33
109
110
111
112B A S I C I N F O
113====================
114
115
116[+] Site Title: 国土交通省
117[+] IP address: 210.248.150.33
118[+] Web Server: Could Not Detect
119[+] CMS: Could Not Detect
120[+] Cloudflare: Not Detected
121[+] Robots File: Could NOT Find robots.txt!
122
123
124
125Network Information:
126a. [Network Number] 210.248.150.0/25
127b. [Network Name] MLIT-NET
128g. [Organization] FUJITSU LIMITED
129m. [Administrative Contact] HM21344JP
130n. [Technical Contact] HM21344JP
131p. [Nameserver]
132[Assigned Date] 2014/10/29
133[Return Date]
134[Last Update] 2014/10/29 17:44:04(JST)
135
136Less Specific Info.
137----------
138NTT COMMUNICATIONS CORPORATION
139 [Allocation] 210.248.0.0/16
140Open Computer Network
141 SUBA-131-2L0 [Sub Allocation] 210.248.150.0/24
142
143More Specific Info.
144----------
145No match!!
146
147
148
149
150G E O I P L O O K U P
151=========================
152
153[i] IP Address: 210.248.150.33
154[i] Country: Japan
155[i] State:
156[i] City:
157[i] Latitude: 35.69
158[i] Longitude: 139.69
159
160
161
162
163H T T P H E A D E R S
164=======================
165
166
167[i] HTTP/1.1 200 OK
168[i] Date: Mon, 09 Dec 2019 23:35:49 GMT
169[i] Last-Modified: Mon, 09 Dec 2019 08:34:41 GMT
170[i] ETag: "b580-599414451cb92"
171[i] Accept-Ranges: bytes
172[i] Content-Type: text/html
173
174
175
176
177D N S L O O K U P
178===================
179
180no records found
181
182
183
184S U B N E T C A L C U L A T I O N
185====================================
186
187Address = 210.248.150.33
188Network = 210.248.150.33 / 32
189Netmask = 255.255.255.255
190Broadcast = not needed on Point-to-Point links
191Wildcard Mask = 0.0.0.0
192Hosts Bits = 0
193Max. Hosts = 1 (2^0 - 0)
194Host Range = { 210.248.150.33 - 210.248.150.33 }
195
196
197
198N M A P P O R T S C A N
199============================
200
201Starting Nmap 7.70 ( https://nmap.org ) at 2019-12-09 23:35 UTC
202Nmap scan report for 210.248.150.33
203Host is up (0.15s latency).
204
205PORT STATE SERVICE
20621/tcp filtered ftp
20722/tcp filtered ssh
20823/tcp filtered telnet
20980/tcp open http
210110/tcp filtered pop3
211143/tcp filtered imap
212443/tcp open https
2133389/tcp filtered ms-wbt-server
214
215Nmap done: 1 IP address (1 host up) scanned in 3.03 seconds
216
217######################################################################################################################################
218[+] Starting At 2019-12-09 18:36:02.515412
219[+] Collecting Information On: http://www.mlit.go.jp/
220[#] Status: 200
221--------------------------------------------------
222[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
223- Date: Mon, 09 Dec 2019 23:36:03 GMT
224- Last-Modified: Mon, 09 Dec 2019 08:34:41 GMT
225- ETag: "b580-599414451cb92"
226- Accept-Ranges: bytes
227- Keep-Alive: timeout=10, max=500
228- Connection: Keep-Alive
229- Content-Type: text/html
230- Transfer-Encoding: chunked
231--------------------------------------------------
232[#] Finding Location..!
233[#] status: fail
234[#] message: invalid query
235[#] query: mlit.go.jp
236--------------------------------------------------
237[x] Didn't Detect WAF Presence on: http://www.mlit.go.jp/
238--------------------------------------------------
239[#] Starting Reverse DNS
240[-] Failed ! Fail
241--------------------------------------------------
242[!] Scanning Open Port
243--------------------------------------------------
244[+] Collecting Information Disclosure!
245[#] Detecting sitemap.xml file
246[-] sitemap.xml file not Found!?
247[#] Detecting robots.txt file
248[-] robots.txt file not Found!?
249[#] Detecting GNU Mailman
250[-] GNU Mailman App Not Detected!?
251--------------------------------------------------
252[+] Crawling Url Parameter On: http://www.mlit.go.jp/
253--------------------------------------------------
254[#] Searching Html Form !
255[-] No Html Form Found!?
256--------------------------------------------------
257[!] Found 4 dom parameter
258[#] http://www.mlit.go.jp//#disaster
259[#] http://www.mlit.go.jp///kanrenlink.html#1
260[#] http://www.mlit.go.jp/kanrenlink.html#1
261[#] http://www.mlit.go.jp//#wrapper
262--------------------------------------------------
263[-] No internal Dynamic Parameter Found!?
264--------------------------------------------------
265[-] No external Dynamic Paramter Found!?
266--------------------------------------------------
267[!] 184 Internal links Discovered
268[+] http://www.mlit.go.jp///com/17_cmn_layout.css
269[+] http://www.mlit.go.jp///com/pc_layout.css
270[+] http://www.mlit.go.jp///com/sp_layout.css
271[+] http://www.mlit.go.jp///com/17_cmn_style.css
272[+] http://www.mlit.go.jp///aly.css
273[+] http://www.mlit.go.jp///com/17_style.css
274[+] http://www.mlit.go.jp///com/pc_style.css
275[+] http://www.mlit.go.jp///com/sp_style.css
276[+] http://www.mlit.go.jp///report/index.html
277[+] http://www.mlit.go.jp///sogoseisaku/channel.html
278[+] http://www.mlit.go.jp///topics.rdf
279[+] http://www.mlit.go.jp///topics.html
280[+] http://www.mlit.go.jp///page/kanbo01_hy_007230_re.html
281[+] http://www.mlit.go.jp///page/kanbo01_hy_007230_re.html
282[+] http://www.mlit.go.jp///page/kanbo01_hy_007231_re.html
283[+] http://www.mlit.go.jp///page/kanbo01_hy_007231_re.html
284[+] http://www.mlit.go.jp///page/kanbo01_hy_007225_re.html
285[+] http://www.mlit.go.jp///page/kanbo01_hy_007225_re.html
286[+] http://www.mlit.go.jp///page/kanbo01_hy_007227_re.html
287[+] http://www.mlit.go.jp///page/kanbo01_hy_007227_re.html
288[+] http://www.mlit.go.jp///page/kanbo01_hy_007229_re.html
289[+] http://www.mlit.go.jp///page/kanbo01_hy_007229_re.html
290[+] http://www.mlit.go.jp///topics.html
291[+] http://www.mlit.go.jp///page/kanbo01_hy_007230_re.html
292[+] http://www.mlit.go.jp///page/kanbo01_hy_007231_re.html
293[+] http://www.mlit.go.jp///page/kanbo01_hy_007225_re.html
294[+] http://www.mlit.go.jp///page/kanbo01_hy_007227_re.html
295[+] http://www.mlit.go.jp///page/kanbo01_hy_007229_re.html
296[+] http://www.mlit.go.jp///page/kanbo01_hy_007226_re.html
297[+] http://www.mlit.go.jp/jutakukentiku/house/jutakukentiku_house_fr4_000036.html
298[+] http://www.mlit.go.jp/page/kanbo01_hy_20190802.html
299[+] http://www.mlit.go.jp/sogoseisaku/point/sosei_point_fr_000045.html
300[+] http://www.mlit.go.jp/sogoseisaku/point/sosei_point_tk_000029.html
301[+] http://www.mlit.go.jp/river/bousai/bousai-gensai/index.html
302[+] http://www.mlit.go.jp/river/bousai/earthquake/index.html
303[+] http://www.mlit.go.jp///pressrelease.rdf
304[+] http://www.mlit.go.jp///pressrelease.html
305[+] http://www.mlit.go.jp///sogoseisaku/index.html
306[+] http://www.mlit.go.jp///report/press/sogo03_hh_000229.html
307[+] http://www.mlit.go.jp///report/press/kaiji04_hh_000159.html
308[+] http://www.mlit.go.jp///sogoseisaku/index.html
309[+] http://www.mlit.go.jp///report/press/tokatsu01_hh_000481.html
310[+] http://www.mlit.go.jp///sogoseisaku/index.html
311[+] http://www.mlit.go.jp///report/press/sogo09_hh_000221.html
312[+] http://www.mlit.go.jp///totikensangyo/index.html
313[+] http://www.mlit.go.jp///report/press/totikensangyo13_hh_000658.html
314[+] http://www.mlit.go.jp///toshi/index.html
315[+] http://www.mlit.go.jp///report/press/toshi02_hh_000074.html
316[+] http://www.mlit.go.jp///toshi/index.html
317[+] http://www.mlit.go.jp///report/press/toshi09_hh_000057.html
318[+] http://www.mlit.go.jp///toshi/index.html
319[+] http://www.mlit.go.jp///report/press/toshi05_hh_000267.html
320[+] http://www.mlit.go.jp///road/kako_index.html
321[+] http://www.mlit.go.jp///report/press/road01_hh_001263.html
322[+] http://www.mlit.go.jp///jutakukentiku/index.html
323[+] http://www.mlit.go.jp///report/press/house01_hh_000094.html
324[+] http://www.mlit.go.jp///jutakukentiku/index.html
325[+] http://www.mlit.go.jp///report/press/house05_hh_000811.html
326[+] http://www.mlit.go.jp///jutakukentiku/index.html
327[+] http://www.mlit.go.jp///report/press/house04_hh_000907.html
328[+] http://www.mlit.go.jp///tetudo/index.html
329[+] http://www.mlit.go.jp///report/press/tetsudo07_hh_000166.html
330[+] http://www.mlit.go.jp///jidosha/index.html
331[+] http://www.mlit.go.jp///report/press/jidosha08_hh_003577.html
332[+] http://www.mlit.go.jp///jidosha/index.html
333[+] http://www.mlit.go.jp///report/press/jidosha03_hh_000315.html
334[+] http://www.mlit.go.jp///jidosha/index.html
335[+] http://www.mlit.go.jp///report/press/jidosha08_hh_003576.html
336[+] http://www.mlit.go.jp///report/press/kaiji02_hh_000247.html
337[+] http://www.mlit.go.jp///kowan/index.html
338[+] http://www.mlit.go.jp///report/press/port06_hh_000183.html
339[+] http://www.mlit.go.jp///koku/index.html
340[+] http://www.mlit.go.jp///report/press/kouku05_hh_000153.html
341[+] http://www.mlit.go.jp///koku/index.html
342[+] http://www.mlit.go.jp///report/press/kouku19_hh_000092.html
343[+] http://www.mlit.go.jp///kokusai/index.html
344[+] http://www.mlit.go.jp///report/press/sogo05_hh_000212.html
345[+] http://www.mlit.go.jp///pressrelease.html
346[+] http://www.mlit.go.jp///sogoseisaku/point/sosei_point_tk_000021.html
347[+] http://www.mlit.go.jp///sogoseisaku/point/closeup.html
348[+] http://www.mlit.go.jp/policy/file000003.html
349[+] http://www.mlit.go.jp///appli/file000006.html
350[+] http://www.mlit.go.jp/policy/file000004.html
351[+] http://www.mlit.go.jp///page/kanbo05_hy_001853.html
352[+] http://www.mlit.go.jp///page/kanbo05_hy_001637.html
353[+] http://www.mlit.go.jp///page/kanbo01_hy_007075.html
354[+] http://www.mlit.go.jp///page/kanbo01_hy_006468.html
355[+] http://www.mlit.go.jp/report/interview/daijin.html
356[+] http://www.mlit.go.jp///report/interview/daijin191203.html
357[+] http://www.mlit.go.jp///report/interview/daijin191129.html
358[+] http://www.mlit.go.jp///report/interview/daijin191126.html
359[+] http://www.mlit.go.jp///report/interview/daijin191122.html
360[+] http://www.mlit.go.jp///sogoseisaku/channel.html
361[+] http://www.mlit.go.jp///page/kanbo01_hy_006632.html
362[+] http://www.mlit.go.jp///policy/index.html
363[+] http://www.mlit.go.jp///page/policy2.html
364[+] http://www.mlit.go.jp/sogoseisaku/index.html
365[+] http://www.mlit.go.jp/kokusai/index.html
366[+] http://www.mlit.go.jp/seisakutokatsu/freight/index.html
367[+] http://www.mlit.go.jp/unyuanzen/index.html
368[+] http://www.mlit.go.jp/kikikanri/index.html
369[+] http://www.mlit.go.jp/kokudoseisaku/index.html
370[+] http://www.mlit.go.jp/totikensangyo/index.html
371[+] http://www.mlit.go.jp/toshi/index.html
372[+] http://www.mlit.go.jp/mizukokudo/index.html
373[+] http://www.mlit.go.jp/road/index.html
374[+] http://www.mlit.go.jp/jutakukentiku/index.html
375[+] http://www.mlit.go.jp/tetudo/index.html
376[+] http://www.mlit.go.jp/jidosha/index.html
377[+] http://www.mlit.go.jp/maritime/index.html
378[+] http://www.mlit.go.jp/kowan/index.html
379[+] http://www.mlit.go.jp/koku/index.html
380[+] http://www.mlit.go.jp/hkb/index.html
381[+] http://www.mlit.go.jp/seisakutokatsu/index.html
382[+] http://www.mlit.go.jp/gobuild/index.html
383[+] http://www.mlit.go.jp/tec/index.html
384[+] http://www.kaiho.mlit.go.jp/
385[+] http://www.mlit.go.jp/kankocho/index.html
386[+] http://www.mlit.go.jp/jtsb/index.html
387[+] http://www.mlit.go.jp/sogoseisaku/index.html
388[+] http://www.mlit.go.jp/kokusai/index.html
389[+] http://www.mlit.go.jp/seisakutokatsu/freight/index.html
390[+] http://www.mlit.go.jp/unyuanzen/index.html
391[+] http://www.mlit.go.jp/kikikanri/index.html
392[+] http://www.mlit.go.jp/kokudoseisaku/index.html
393[+] http://www.mlit.go.jp/totikensangyo/index.html
394[+] http://www.mlit.go.jp/toshi/index.html
395[+] http://www.mlit.go.jp/mizukokudo/index.html
396[+] http://www.mlit.go.jp/road/index.html
397[+] http://www.mlit.go.jp/jutakukentiku/index.html
398[+] http://www.mlit.go.jp/tetudo/index.html
399[+] http://www.mlit.go.jp/jidosha/index.html
400[+] http://www.mlit.go.jp/maritime/index.html
401[+] http://www.mlit.go.jp/kowan/index.html
402[+] http://www.mlit.go.jp/koku/index.html
403[+] http://www.mlit.go.jp/hkb/index.html
404[+] http://www.mlit.go.jp/seisakutokatsu/index.html
405[+] http://www.mlit.go.jp/gobuild/index.html
406[+] http://www.mlit.go.jp/tec/index.html
407[+] http://www.mlit.go.jp/policy/index.html
408[+] http://www.mlit.go.jp/page/policy2.html
409[+] http://www.kaiho.mlit.go.jp/
410[+] http://www.mlit.go.jp/kankocho/index.html
411[+] http://www.mlit.go.jp/jtsb/index.html
412[+] http://www.mlit.go.jp/river/bousai/education/index.html
413[+] http://www.mlit.go.jp/river/bousai/pch-tec/index.html
414[+] http://www.mlit.go.jp/sogoseisaku/point/sosei_point_tk_000024.html
415[+] http://www.mlit.go.jp/jidosha/anzen/bus/index.html
416[+] http://www.mlit.go.jp/mizukokudo/sewerage/mizukokudo_sewerage_tk_000411.html
417[+] http://www.mlit.go.jp/road/bicycleuse/
418[+] http://www.mlit.go.jp/road/sign/numbering/index.html
419[+] http://www.mlit.go.jp/sogoseisaku/im/index.html
420[+] http://www.mlit.go.jp/road/nyuusatsu/index.html
421[+] http://www.mlit.go.jp/sogoseisaku/region/stock/index.html
422[+] http://www.mlit.go.jp///koku/koku_tk10_000003.html
423[+] http://www.mlit.go.jp///tec/tec_tk_000098.html
424[+] http://www.mlit.go.jp/sogoseisaku/maintenance/index.html
425[+] http://www.mlit.go.jp/sogoseisaku/region/infratourism/index.html
426[+] http://www.mlit.go.jp///saigai/index.html
427[+] http://www.mlit.go.jp///saigai/saigai_190909.html
428[+] http://www.mlit.go.jp///saigai/saigai_190828.html
429[+] http://www.mlit.go.jp///saigai/index.html
430[+] http://www.mlit.go.jp///important.html
431[+] http://www.mlit.go.jp/page/kanbo01_hy_002322.html
432[+] http://www.mlit.go.jp///important.html
433[+] http://www.mlit.go.jp/river/bousai/olympic/index.html
434[+] http://www.mlit.go.jp/saigai/dimaps/index.html
435[+] http://www.mlit.go.jp/saiyojoho/index.html
436[+] http://www.mlit.go.jp/about/h31jinji.html
437[+] https://www.magazine.mlit.go.jp
438[+] http://www.mlit.go.jp///hotline/hotline.html
439[+] http://www.mlit.go.jp///page/kanbo01_hy_000973.html
440[+] http://www.mlit.go.jp///photo/index.html
441[+] http://www.mlit.go.jp///page/kanbo01_hy_002126.html
442[+] http://www.mlit.go.jp///page/rssinfo.html
443[+] http://www.mlit.go.jp/kids/index.html
444[+] http://www.mlit.go.jp/nega-inf/
445[+] https://www.monitor.mlit.go.jp/
446[+] http://www.mlit.go.jp///index.rdf
447[+] http://www.mlit.go.jp///news.html
448[+] http://www.mlit.go.jp///news.html
449[+] http://www.mlit.go.jp/mobile/top.html
450[+] http://www.mlit.go.jp///page/kanbo03_hy_000006.html
451[+] http://www.mlit.go.jp/totikensangyo/const/sosei_const_tk3_000131.html
452--------------------------------------------------
453[!] 21 External links Discovered
454[#] https://www.gsi.go.jp/chizuhensyu/chizuhensyu61003.html
455[#] http://www.jma.go.jp/jma/
456[#] http://www.gsi.go.jp/
457[#] http://www.jma.go.jp/jma/
458[#] http://www.gsi.go.jp/
459[#] http://disaportal.gsi.go.jp/
460[#] https://twitter.com/MLIT_JAPAN
461[#] https://twitter.com/MLIT_JAPAN
462[#] https://www.youtube.com/user/mlitchannel
463[#] https://www.youtube.com/user/mlitchannel
464[#] http://www.kantei.go.jp/jp/joho/index.html
465[#] https://www.e-gov.go.jp/index.html
466[#] http://www.kantei.go.jp/jp/headline/3_11_2013fukko.html
467[#] https://www.facebook.com/sourikantei
468[#] http://www.npa.go.jp/bureau/safetylife/bohankyoshitsu/2nd/
469[#] http://www.moj.go.jp/nyuukokukanri/kouhou/nyuukokukanri01_00111.html
470[#] http://genba-go.jp/
471[#] http://www.cas.go.jp/jp/seisaku/bangoseido/index.html
472[#] http://www.kantei.go.jp/jp/singi/nousui/yushutsuryoku.html
473[#] http://www.gov-online.go.jp/tokusyu/keigen_zeiritsu/index.html
474[#] http://www.nilim.go.jp/lab/qbg/bimcim/bimcimindex.html
475--------------------------------------------------
476[#] Mapping Subdomain..
477[-] No Any Subdomain Found
478[!] Found 0 Subdomain
479--------------------------------------------------
480[!] Done At 2019-12-09 18:36:17.846478
481######################################################################################################################################
482[INFO] ------TARGET info------
483[*] TARGET: http://www.mlit.go.jp/
484[*] TARGET IP: 210.248.150.33
485[INFO] NO load balancer detected for www.mlit.go.jp...
486[*] DNS servers: www-vip.mlit.go.jp.
487[*] TARGET server:
488[*] CC: JP
489[*] Country: Japan
490[*] RegionCode: 27
491[*] RegionName: Ōsaka
492[*] City: Osaka
493[*] ASN: AS4713
494[*] BGP_PREFIX: 210.248.0.0/16
495[*] ISP: OCN NTT Communications Corporation, JP
496[INFO] DNS enumeration:
497[*] www2.mlit.go.jp 210.248.150.33
498[INFO] Possible abuse mails are:
499[*] matsumura.hikoo@jp.fujitsu.com
500[INFO] NO PAC (Proxy Auto Configuration) file FOUND
501[INFO] Starting FUZZing in http://www.mlit.go.jp/FUzZzZzZzZz...
502[INFO] Status code Folders
503[ALERT] Look in the source code. It may contain passwords
504[INFO] SAME content in http://www.mlit.go.jp/ AND http://210.248.150.33/
505[INFO] Links found from http://www.mlit.go.jp/:
506[*] http://disaportal.gsi.go.jp/
507[*] http://genba-go.jp/
508[*] https://twitter.com/MLIT_JAPAN
509[*] https://www.e-gov.go.jp/index.html
510[*] https://www.facebook.com/sourikantei
511[*] https://www.gsi.go.jp/chizuhensyu/chizuhensyu61003.html
512[*] https://www.magazine.mlit.go.jp/
513[*] https://www.monitor.mlit.go.jp/
514[*] https://www.youtube.com/user/mlitchannel
515[*] http://www.cas.go.jp/jp/seisaku/bangoseido/index.html
516[*] http://www.gov-online.go.jp/tokusyu/keigen_zeiritsu/index.html
517[*] http://www.gsi.go.jp/
518[*] http://www.jma.go.jp/jma/
519[*] http://www.kaiho.mlit.go.jp/
520[*] http://www.kantei.go.jp/jp/headline/3_11_2013fukko.html
521[*] http://www.kantei.go.jp/jp/joho/index.html
522[*] http://www.kantei.go.jp/jp/singi/nousui/yushutsuryoku.html
523[*] http://www.mlit.go.jp/
524[*] http://www.mlit.go.jp/about/h31jinji.html
525[*] http://www.mlit.go.jp/appli/file000006.html
526[*] http://www.mlit.go.jp/#disaster
527[*] http://www.mlit.go.jp/gobuild/index.html
528[*] http://www.mlit.go.jp/hkb/index.html
529[*] http://www.mlit.go.jp/hotline/hotline.html
530[*] http://www.mlit.go.jp/important.html
531[*] http://www.mlit.go.jp/index.rdf
532[*] http://www.mlit.go.jp/jidosha/anzen/bus/index.html
533[*] http://www.mlit.go.jp/jidosha/index.html
534[*] http://www.mlit.go.jp/jtsb/index.html
535[*] http://www.mlit.go.jp/jutakukentiku/house/jutakukentiku_house_fr4_000036.html
536[*] http://www.mlit.go.jp/jutakukentiku/index.html
537[*] http://www.mlit.go.jp/kankocho/index.html
538[*] http://www.mlit.go.jp/kanrenlink.html#1
539[*] http://www.mlit.go.jp/kids/index.html
540[*] http://www.mlit.go.jp/kikikanri/index.html
541[*] http://www.mlit.go.jp/kokudoseisaku/index.html
542[*] http://www.mlit.go.jp/koku/index.html
543[*] http://www.mlit.go.jp/koku/koku_tk10_000003.html
544[*] http://www.mlit.go.jp/kokusai/index.html
545[*] http://www.mlit.go.jp/kowan/index.html
546[*] http://www.mlit.go.jp/maritime/index.html
547[*] http://www.mlit.go.jp/mizukokudo/index.html
548[*] http://www.mlit.go.jp/mizukokudo/sewerage/mizukokudo_sewerage_tk_000411.html
549[*] http://www.mlit.go.jp/mobile/top.html
550[*] http://www.mlit.go.jp/nega-inf/
551[*] http://www.mlit.go.jp/news.html
552[*] http://www.mlit.go.jp/page/kanbo01_hy_000973.html
553[*] http://www.mlit.go.jp/page/kanbo01_hy_002126.html
554[*] http://www.mlit.go.jp/page/kanbo01_hy_002322.html
555[*] http://www.mlit.go.jp/page/kanbo01_hy_006468.html
556[*] http://www.mlit.go.jp/page/kanbo01_hy_006632.html
557[*] http://www.mlit.go.jp/page/kanbo01_hy_007075.html
558[*] http://www.mlit.go.jp/page/kanbo01_hy_007225_re.html
559[*] http://www.mlit.go.jp/page/kanbo01_hy_007226_re.html
560[*] http://www.mlit.go.jp/page/kanbo01_hy_007227_re.html
561[*] http://www.mlit.go.jp/page/kanbo01_hy_007229_re.html
562[*] http://www.mlit.go.jp/page/kanbo01_hy_007230_re.html
563[*] http://www.mlit.go.jp/page/kanbo01_hy_007231_re.html
564[*] http://www.mlit.go.jp/page/kanbo01_hy_20190802.html
565[*] http://www.mlit.go.jp/page/kanbo03_hy_000006.html
566[*] http://www.mlit.go.jp/page/kanbo05_hy_001637.html
567[*] http://www.mlit.go.jp/page/kanbo05_hy_001853.html
568[*] http://www.mlit.go.jp/page/policy2.html
569[*] http://www.mlit.go.jp/page/rssinfo.html
570[*] http://www.mlit.go.jp/photo/index.html
571[*] http://www.mlit.go.jp/policy/file000003.html
572[*] http://www.mlit.go.jp/policy/file000004.html
573[*] http://www.mlit.go.jp/policy/index.html
574[*] http://www.mlit.go.jp/pressrelease.html
575[*] http://www.mlit.go.jp/pressrelease.rdf
576[*] http://www.mlit.go.jp/report/index.html
577[*] http://www.mlit.go.jp/report/interview/daijin191122.html
578[*] http://www.mlit.go.jp/report/interview/daijin191126.html
579[*] http://www.mlit.go.jp/report/interview/daijin191129.html
580[*] http://www.mlit.go.jp/report/interview/daijin191203.html
581[*] http://www.mlit.go.jp/report/interview/daijin.html
582[*] http://www.mlit.go.jp/report/press/house01_hh_000094.html
583[*] http://www.mlit.go.jp/report/press/house04_hh_000907.html
584[*] http://www.mlit.go.jp/report/press/house05_hh_000811.html
585[*] http://www.mlit.go.jp/report/press/jidosha03_hh_000315.html
586[*] http://www.mlit.go.jp/report/press/jidosha08_hh_003576.html
587[*] http://www.mlit.go.jp/report/press/jidosha08_hh_003577.html
588[*] http://www.mlit.go.jp/report/press/kaiji02_hh_000247.html
589[*] http://www.mlit.go.jp/report/press/kaiji04_hh_000159.html
590[*] http://www.mlit.go.jp/report/press/kouku05_hh_000153.html
591[*] http://www.mlit.go.jp/report/press/kouku19_hh_000092.html
592[*] http://www.mlit.go.jp/report/press/port06_hh_000183.html
593[*] http://www.mlit.go.jp/report/press/road01_hh_001263.html
594[*] http://www.mlit.go.jp/report/press/sogo03_hh_000229.html
595[*] http://www.mlit.go.jp/report/press/sogo05_hh_000212.html
596[*] http://www.mlit.go.jp/report/press/sogo09_hh_000221.html
597[*] http://www.mlit.go.jp/report/press/tetsudo07_hh_000166.html
598[*] http://www.mlit.go.jp/report/press/tokatsu01_hh_000481.html
599[*] http://www.mlit.go.jp/report/press/toshi02_hh_000074.html
600[*] http://www.mlit.go.jp/report/press/toshi05_hh_000267.html
601[*] http://www.mlit.go.jp/report/press/toshi09_hh_000057.html
602[*] http://www.mlit.go.jp/report/press/totikensangyo13_hh_000658.html
603[*] http://www.mlit.go.jp/river/bousai/bousai-gensai/index.html
604[*] http://www.mlit.go.jp/river/bousai/earthquake/index.html
605[*] http://www.mlit.go.jp/river/bousai/education/index.html
606[*] http://www.mlit.go.jp/river/bousai/olympic/index.html
607[*] http://www.mlit.go.jp/river/bousai/pch-tec/index.html
608[*] http://www.mlit.go.jp/road/bicycleuse/
609[*] http://www.mlit.go.jp/road/index.html
610[*] http://www.mlit.go.jp/road/kako_index.html
611[*] http://www.mlit.go.jp/road/nyuusatsu/index.html
612[*] http://www.mlit.go.jp/road/sign/numbering/index.html
613[*] http://www.mlit.go.jp/saigai/dimaps/index.html
614[*] http://www.mlit.go.jp/saigai/index.html
615[*] http://www.mlit.go.jp/saigai/saigai_190828.html
616[*] http://www.mlit.go.jp/saigai/saigai_190909.html
617[*] http://www.mlit.go.jp/saiyojoho/index.html
618[*] http://www.mlit.go.jp/seisakutokatsu/freight/index.html
619[*] http://www.mlit.go.jp/seisakutokatsu/index.html
620[*] http://www.mlit.go.jp/sogoseisaku/channel.html
621[*] http://www.mlit.go.jp/sogoseisaku/im/index.html
622[*] http://www.mlit.go.jp/sogoseisaku/index.html
623[*] http://www.mlit.go.jp/sogoseisaku/maintenance/index.html
624[*] http://www.mlit.go.jp/sogoseisaku/point/closeup.html
625[*] http://www.mlit.go.jp/sogoseisaku/point/sosei_point_fr_000045.html
626[*] http://www.mlit.go.jp/sogoseisaku/point/sosei_point_tk_000021.html
627[*] http://www.mlit.go.jp/sogoseisaku/point/sosei_point_tk_000024.html
628[*] http://www.mlit.go.jp/sogoseisaku/point/sosei_point_tk_000029.html
629[*] http://www.mlit.go.jp/sogoseisaku/region/infratourism/index.html
630[*] http://www.mlit.go.jp/sogoseisaku/region/stock/index.html
631[*] http://www.mlit.go.jp/tec/index.html
632[*] http://www.mlit.go.jp/tec/tec_tk_000098.html
633[*] http://www.mlit.go.jp/tetudo/index.html
634[*] http://www.mlit.go.jp/topics.html
635[*] http://www.mlit.go.jp/topics.rdf
636[*] http://www.mlit.go.jp/toshi/index.html
637[*] http://www.mlit.go.jp/totikensangyo/const/sosei_const_tk3_000131.html
638[*] http://www.mlit.go.jp/totikensangyo/index.html
639[*] http://www.mlit.go.jp/unyuanzen/index.html
640[*] http://www.mlit.go.jp/#wrapper
641[*] http://www.moj.go.jp/nyuukokukanri/kouhou/nyuukokukanri01_00111.html
642[*] http://www.nilim.go.jp/lab/qbg/bimcim/bimcimindex.html
643[*] http://www.npa.go.jp/bureau/safetylife/bohankyoshitsu/2nd/
644cut: intervalle de champ incorrecte
645Saisissez « cut --help » pour plus d'informations.
646[INFO] Shodan detected the following opened ports on 210.248.150.33:
647[*] 443
648[*] 80
649[INFO] ------VirusTotal SECTION------
650[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
651[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
652[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
653[INFO] ------Alexa Rank SECTION------
654[INFO] Percent of Visitors Rank in Country:
655[INFO] Percent of Search Traffic:
656[INFO] Percent of Unique Visits:
657[INFO] Total Sites Linking In:
658[*] Total Sites
659[INFO] Useful links related to www.mlit.go.jp - 210.248.150.33:
660[*] https://www.virustotal.com/pt/ip-address/210.248.150.33/information/
661[*] https://www.hybrid-analysis.com/search?host=210.248.150.33
662[*] https://www.shodan.io/host/210.248.150.33
663[*] https://www.senderbase.org/lookup/?search_string=210.248.150.33
664[*] https://www.alienvault.com/open-threat-exchange/ip/210.248.150.33
665[*] http://pastebin.com/search?q=210.248.150.33
666[*] http://urlquery.net/search.php?q=210.248.150.33
667[*] http://www.alexa.com/siteinfo/www.mlit.go.jp
668[*] http://www.google.com/safebrowsing/diagnostic?site=www.mlit.go.jp
669[*] https://censys.io/ipv4/210.248.150.33
670[*] https://www.abuseipdb.com/check/210.248.150.33
671[*] https://urlscan.io/search/#210.248.150.33
672[*] https://github.com/search?q=210.248.150.33&type=Code
673[INFO] Useful links related to AS4713 - 210.248.0.0/16:
674[*] http://www.google.com/safebrowsing/diagnostic?site=AS:4713
675[*] https://www.senderbase.org/lookup/?search_string=210.248.0.0/16
676[*] http://bgp.he.net/AS4713
677[*] https://stat.ripe.net/AS4713
678[INFO] Date: 09/12/19 | Time: 18:37:57
679[INFO] Total time: 1 minute(s) and 48 second(s)
680#######################################################################################################################################
681Trying "mlit.go.jp"
682;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31782
683;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 0
684
685;; QUESTION SECTION:
686;mlit.go.jp. IN ANY
687
688;; ANSWER SECTION:
689mlit.go.jp. 300 IN TXT "VPA6HUOUCKK6RX2EN2RP6RXRUSU2KY86LK7VJTZ2"
690mlit.go.jp. 300 IN TXT "LIUMRWEOAS1YQ9SE3WJ654GZGR3Y40ZHCVHZOWF2"
691mlit.go.jp. 300 IN TXT "v=spf1 include:_spf1.mlit.go.jp include:_spf2.mlit.go.jp include:smp.ne.jp include:spf.tricorn.net -all"
692mlit.go.jp. 1800 IN MX 10 mxeast.mlit.go.jp.
693mlit.go.jp. 1800 IN MX 20 mxwest.mlit.go.jp.
694mlit.go.jp. 300 IN SOA ns6-tk01.ocn.ad.jp. root.ocn.ad.jp. 2019120501 5400 1200 604800 900
695mlit.go.jp. 300 IN NS ns6-tk01.ocn.ad.jp.
696mlit.go.jp. 300 IN NS ns6-tk02.ocn.ad.jp.
697
698Received 390 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 206 ms
699######################################################################################################################################
700; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace mlit.go.jp any
701;; global options: +cmd
702. 81829 IN NS i.root-servers.net.
703. 81829 IN NS a.root-servers.net.
704. 81829 IN NS c.root-servers.net.
705. 81829 IN NS e.root-servers.net.
706. 81829 IN NS k.root-servers.net.
707. 81829 IN NS j.root-servers.net.
708. 81829 IN NS f.root-servers.net.
709. 81829 IN NS d.root-servers.net.
710. 81829 IN NS h.root-servers.net.
711. 81829 IN NS g.root-servers.net.
712. 81829 IN NS m.root-servers.net.
713. 81829 IN NS b.root-servers.net.
714. 81829 IN NS l.root-servers.net.
715. 81829 IN RRSIG NS 8 0 518400 20191222200000 20191209190000 22545 . oFjpaiOrIyVtwQnFEplvddWLnFqsySkEnXvxO6GhQFokS2ezjolDtHHy 0vM3Uo2HdJA31le+XPFQyotAsORD2cbGxwq4G+oFLDAqVtv3TqyH4EjP xOl4pJsr4WAjN4a3GgguuoY1MTX0E469XMHIDzQLknB06/3Ln17sKoPG vpCQlMbGbGVY7rkYiaMZY7+5dgjC8f5OabkzmIubZsJo3F0N5dTzc67q 8Ha70louxQ8Vqk/lNAh2YSMpLwxUK9ReNC9iJblq5FiNXYnGjdKOs9I9 /Vz5VO+yt/37NcVPlZBY1ekJf+ugiKkpNCigIEJAwN8eLQiQ0o3PlUW5 du90oA==
716;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 206 ms
717
718jp. 172800 IN NS c.dns.jp.
719jp. 172800 IN NS d.dns.jp.
720jp. 172800 IN NS e.dns.jp.
721jp. 172800 IN NS a.dns.jp.
722jp. 172800 IN NS b.dns.jp.
723jp. 172800 IN NS f.dns.jp.
724jp. 172800 IN NS h.dns.jp.
725jp. 172800 IN NS g.dns.jp.
726jp. 86400 IN DS 39595 8 1 1CC05D3654844B375BE8FDFB8933A21C9E9897DD
727jp. 86400 IN DS 39595 8 2 2871D562754FD45AC0452440D806ABB8E6BA967B2032B166FD2761E8 73553387
728jp. 86400 IN RRSIG DS 8 1 86400 20191222200000 20191209190000 22545 . FNN6/UEwSIBGKzL5ZHLNP66MLm475uFYuLnsiSA0T4bdc8gkh6+3ZAr3 FbVumKmhceYjuDxBf1HyrX3GuK+zlafZ0BQjs32VN6gW+TvVkwAZYQrW IIEu4+qBYz3O30xaOttzq9uif2BhQP0cmOQkd1rNPfxu3UIxsY4+3qnz IOznKZfc8s6+JDC94OMJjIdAuRqJBlIJ+VmGmEtVC6dyICRIjbq3hSI+ X2AdHNhS72hjPEqMZKd8Z3r4qWT2COuHcHfVUw/3pSRxvWmHhpnnKqyW EpRyx/F1r8V6sRzTVvK+xakbVlCbG0gaIuHUnFh9PoP6p3y600TSLneE qFPOvA==
729;; Received 866 bytes from 192.36.148.17#53(i.root-servers.net) in 360 ms
730
731mlit.go.jp. 86400 IN NS ns6-tk01.ocn.ad.jp.
732mlit.go.jp. 86400 IN NS ns6-tk02.ocn.ad.jp.
733M3UFP3SIRB5TOPLK8D23NRU92P8UKD1D.jp. 900 IN NSEC3 1 1 8 F88064C7C0 M3V4RU1IT77MOC9TALE7SHQ9LJ33DMAQ TXT RRSIG
734M3UFP3SIRB5TOPLK8D23NRU92P8UKD1D.jp. 900 IN RRSIG NSEC3 8 2 900 20200106174502 20191207174502 40236 jp. aqlEtn+wwxjv9kIMb507SXuxyl6C+smGKFoT9YqBKUdGk+uZZZN9XZun qU+4rkfJ0eZC+yiLCxFk7PjbILKYq4jDzh3cLsbvTqDsUIDBwfpnCc4n wI3Y6NbhIgMdPKumLQwlJh6zn1nfaG13cNX7Y0vujiXLKHHlFo3DO8eb PbE=
735TMUH0JS0VE0CEBN35N2PHBVRHRHIGGF7.jp. 900 IN NSEC3 1 1 8 F88064C7C0 TN2M18C8J1AN3O85H60KSRTGL2CQA5FT TXT RRSIG
736TMUH0JS0VE0CEBN35N2PHBVRHRHIGGF7.jp. 900 IN RRSIG NSEC3 8 2 900 20200106174502 20191207174502 40236 jp. WLLVhtKPW+1O69e8FJpwMA/8HlJehsvzchGOUFugTjaL2i48HJ1uUNW/ JKO4XY7ggzn2CRGtO7FWu9KU588gJqAhM6PBNe6utGlVOjVCgMXWY9uq NwwgAGdVSHBUZyApwbORqTNA5kf7tpvA+3tw5zqWQPqDK28iLdUxFi/F h9Y=
737;; Received 612 bytes from 2001:2f8:0:100::153#53(f.dns.jp) in 175 ms
738
739mlit.go.jp. 300 IN SOA ns6-tk01.ocn.ad.jp. root.ocn.ad.jp. 2019120501 5400 1200 604800 900
740mlit.go.jp. 300 IN TXT "LIUMRWEOAS1YQ9SE3WJ654GZGR3Y40ZHCVHZOWF2"
741mlit.go.jp. 300 IN TXT "VPA6HUOUCKK6RX2EN2RP6RXRUSU2KY86LK7VJTZ2"
742mlit.go.jp. 300 IN TXT "v=spf1 include:_spf1.mlit.go.jp include:_spf2.mlit.go.jp include:smp.ne.jp include:spf.tricorn.net -all"
743mlit.go.jp. 1800 IN MX 10 mxeast.mlit.go.jp.
744mlit.go.jp. 1800 IN MX 20 mxwest.mlit.go.jp.
745mlit.go.jp. 300 IN NS ns6-tk02.ocn.ad.jp.
746mlit.go.jp. 300 IN NS ns6-tk01.ocn.ad.jp.
747;; Received 401 bytes from 2001:380:0:1::1053#53(ns6-tk02.ocn.ad.jp) in 192 ms
748#####################################################################################################################################
749[*] Performing General Enumeration of Domain: mlit.go.jp
750[-] DNSSEC is not configured for mlit.go.jp
751[*] SOA ns6-tk01.ocn.ad.jp 61.207.9.4
752[*] NS ns6-tk02.ocn.ad.jp 61.207.9.36
753[*] Bind Version for 61.207.9.36 unknown
754[*] NS ns6-tk02.ocn.ad.jp 2001:380:0:1::1053
755[*] Bind Version for 2001:380:0:1::1053 unknown
756[*] NS ns6-tk01.ocn.ad.jp 61.207.9.4
757[*] Bind Version for 61.207.9.4 unknown
758[*] NS ns6-tk01.ocn.ad.jp 2001:380::1053
759[*] Bind Version for 2001:380::1053 unknown
760[*] MX mxwest.mlit.go.jp 153.151.5.51
761[*] MX mxeast.mlit.go.jp 153.151.3.183
762[*] TXT mlit.go.jp LIUMRWEOAS1YQ9SE3WJ654GZGR3Y40ZHCVHZOWF2
763[*] TXT mlit.go.jp VPA6HUOUCKK6RX2EN2RP6RXRUSU2KY86LK7VJTZ2
764[*] TXT mlit.go.jp v=spf1 include:_spf1.mlit.go.jp include:_spf2.mlit.go.jp include:smp.ne.jp include:spf.tricorn.net -all
765[*] Enumerating SRV Records
766[-] No SRV Records Found for mlit.go.jp
767[+] 0 Records Found
768######################################################################################################################################
769[*] Processing domain mlit.go.jp
770[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
771[+] Getting nameservers
77261.207.9.36 - ns6-tk02.ocn.ad.jp
77361.207.9.4 - ns6-tk01.ocn.ad.jp
774[-] Zone transfer failed
775
776[+] TXT records found
777"LIUMRWEOAS1YQ9SE3WJ654GZGR3Y40ZHCVHZOWF2"
778"VPA6HUOUCKK6RX2EN2RP6RXRUSU2KY86LK7VJTZ2"
779"v=spf1 include:_spf1.mlit.go.jp include:_spf2.mlit.go.jp include:smp.ne.jp include:spf.tricorn.net -all"
780
781[+] MX records found, added to target list
78210 mxeast.mlit.go.jp.
78320 mxwest.mlit.go.jp.
784
785[*] Scanning mlit.go.jp for A records
786153.151.5.51 - mxwest.mlit.go.jp
787153.151.3.183 - mxeast.mlit.go.jp
788210.248.150.33 - www.mlit.go.jp
789210.248.150.32 - www1.mlit.go.jp
790210.248.150.33 - www2.mlit.go.jp
791
792#######################################################################################################################################
793 AVAILABLE PLUGINS
794 -----------------
795
796 CertificateInfoPlugin
797 SessionRenegotiationPlugin
798 SessionResumptionPlugin
799 CompressionPlugin
800 HeartbleedPlugin
801 EarlyDataPlugin
802 OpenSslCipherSuitesPlugin
803 RobotPlugin
804 HttpHeadersPlugin
805 OpenSslCcsInjectionPlugin
806 FallbackScsvPlugin
807
808
809
810 CHECKING HOST(S) AVAILABILITY
811 -----------------------------
812
813 210.248.150.33:443 => 210.248.150.33
814
815
816
817
818 SCAN RESULTS FOR 210.248.150.33:443 - 210.248.150.33
819 ----------------------------------------------------
820
821 * Downgrade Attacks:
822 TLS_FALLBACK_SCSV: OK - Supported
823
824 * SSLV2 Cipher Suites:
825 Server rejected all cipher suites.
826
827 * OpenSSL CCS Injection:
828 OK - Not vulnerable to OpenSSL CCS injection
829
830 * Session Renegotiation:
831 Client-initiated Renegotiation: OK - Rejected
832 Secure Renegotiation: OK - Supported
833
834 * TLSV1_3 Cipher Suites:
835 Server rejected all cipher suites.
836
837 * TLS 1.2 Session Resumption Support:
838 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
839 With TLS Tickets: OK - Supported
840
841 * Deflate Compression:
842 OK - Compression disabled
843
844 * OpenSSL Heartbleed:
845 OK - Not vulnerable to Heartbleed
846
847 * TLSV1_1 Cipher Suites:
848 Server rejected all cipher suites.
849
850 * TLSV1_2 Cipher Suites:
851 Forward Secrecy OK - Supported
852 RC4 OK - Not Supported
853
854 Preferred:
855 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
856 Accepted:
857 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
858 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
859 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
860 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
861 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
862 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
863 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
864 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
865 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
866 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
867 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
868 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
869
870 * ROBOT Attack:
871 OK - Not vulnerable
872
873 * Certificate Information:
874 Content
875 SHA1 Fingerprint: 00dcab1e8bc1379dd7b8c752af4e827d11843aef
876 Common Name: www.mlit.go.jp
877 Issuer: SECOM Passport for Web SR 3.0 CA
878 Serial Number: 4461993479326296096
879 Not Before: 2019-02-13 10:37:28
880 Not After: 2021-02-13 14:59:59
881 Signature Algorithm: sha256
882 Public Key Algorithm: RSA
883 Key Size: 2048
884 Exponent: 65537 (0x10001)
885 DNS Subject Alternative Names: ['www.mlit.go.jp']
886
887 Trust
888 Hostname Validation: FAILED - Certificate does NOT match 210.248.150.33
889 Android CA Store (9.0.0_r9): OK - Certificate is trusted
890 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
891 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
892 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
893 Windows CA Store (2019-05-27): OK - Certificate is trusted
894 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
895 Received Chain: www.mlit.go.jp --> SECOM Passport for Web SR 3.0 CA --> countryName=JP, organizationName=SECOM Trust Systems CO.,LTD., organizationalUnitName=Security Communication RootCA2
896 Verified Chain: www.mlit.go.jp --> SECOM Passport for Web SR 3.0 CA --> countryName=JP, organizationName=SECOM Trust Systems CO.,LTD., organizationalUnitName=Security Communication RootCA2
897 Received Chain Contains Anchor: WARNING - Received certificate chain contains the anchor certificate
898 Received Chain Order: OK - Order is valid
899 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
900
901 Extensions
902 OCSP Must-Staple: NOT SUPPORTED - Extension not found
903 Certificate Transparency: OK - 3 SCTs included
904
905 OCSP Stapling
906 NOT SUPPORTED - Server did not send back an OCSP response
907
908 * TLSV1 Cipher Suites:
909 Server rejected all cipher suites.
910
911 * SSLV3 Cipher Suites:
912 Server rejected all cipher suites.
913
914
915 SCAN COMPLETED IN 41.52 S
916 -------------------------
917######################################################################################################################################
918traceroute to www.mlit.go.jp (210.248.150.33), 30 hops max, 60 byte packets
919 1 10.207.200.1 (10.207.200.1) 155.246 ms 155.242 ms 155.238 ms
920 2 * * *
921 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 161.135 ms 161.131 ms 161.127 ms
922 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 161.035 ms 160.939 ms 160.955 ms
923 5 be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 165.720 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 165.651 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 165.690 ms
924 6 be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1) 187.823 ms 179.308 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105) 179.298 ms
925 7 be3027.ccr21.prg01.atlas.cogentco.com (130.117.1.206) 186.876 ms be3029.ccr21.prg01.atlas.cogentco.com (154.54.59.62) 187.805 ms be3027.ccr21.prg01.atlas.cogentco.com (130.117.1.206) 191.811 ms
926 8 be3044.ccr21.bts01.atlas.cogentco.com (154.54.59.98) 196.600 ms 196.618 ms be3045.ccr22.bts01.atlas.cogentco.com (154.54.59.106) 200.040 ms
927 9 be2988.ccr51.vie01.atlas.cogentco.com (154.54.59.86) 193.951 ms be3463.ccr52.vie01.atlas.cogentco.com (154.54.59.185) 194.588 ms 194.605 ms
92810 ae-7.r01.vienat01.at.bb.gin.ntt.net (129.250.9.149) 197.627 ms 201.282 ms ae-14.r01.vienat01.at.bb.gin.ntt.net (129.250.9.129) 193.518 ms
92911 ae-1.r00.vienat01.at.bb.gin.ntt.net (129.250.2.36) 473.785 ms 463.781 ms 472.160 ms
93012 ae-10.r25.frnkge08.de.bb.gin.ntt.net (129.250.4.145) 212.041 ms 209.884 ms 206.629 ms
93113 ae-8.r22.asbnva02.us.bb.gin.ntt.net (129.250.4.96) 297.208 ms 295.430 ms *
93214 ae-5.r23.lsanca07.us.bb.gin.ntt.net (129.250.3.189) 354.952 ms 356.177 ms 359.800 ms
93315 ae-12.r31.tokyjp05.jp.bb.gin.ntt.net (129.250.3.192) 468.295 ms 472.920 ms 484.101 ms
93416 ae-3.r02.tokyjp05.jp.bb.gin.ntt.net (129.250.3.28) 473.226 ms 460.128 ms 465.418 ms
93517 ae-1.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.22) 467.147 ms ae-3.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.30) 471.744 ms ae-1.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.22) 472.254 ms
93618 60.37.54.162 (60.37.54.162) 465.934 ms 122.1.245.66 (122.1.245.66) 461.277 ms 461.539 ms
93719 125.206.183.34 (125.206.183.34) 468.307 ms 471.637 ms 463.579 ms
93820 210.248.150.33 (210.248.150.33) 459.644 ms 464.243 ms 454.094 ms
939######################################################################################################################################
940----- mlit.go.jp -----
941
942
943Host's addresses:
944__________________
945
946
947
948Name Servers:
949______________
950
951ns6-tk02.ocn.ad.jp. 85409 IN A 61.207.9.36
952ns6-tk01.ocn.ad.jp. 76624 IN A 61.207.9.4
953
954
955Mail (MX) Servers:
956___________________
957
958mxwest.mlit.go.jp. 300 IN A 153.151.5.51
959mxeast.mlit.go.jp. 30 IN A 153.151.3.183
960
961
962Trying Zone Transfers and getting Bind Versions:
963_________________________________________________
964
965
966Trying Zone Transfer for mlit.go.jp on ns6-tk01.ocn.ad.jp ...
967AXFR record query failed: REFUSED
968
969Trying Zone Transfer for mlit.go.jp on ns6-tk02.ocn.ad.jp ...
970AXFR record query failed: REFUSED
971
972
973Scraping mlit.go.jp subdomains from Google:
974____________________________________________
975
976
977 ---- Google search page: 1 ----
978
979 wwwtb
980
981 ---- Google search page: 2 ----
982
983 wwwtb
984
985 ---- Google search page: 3 ----
986
987 wwwtb
988 wwwtb
989 wwwtb
990 wwwtb
991
992 ---- Google search page: 4 ----
993
994 wwwtb
995 wwwtb
996
997 ---- Google search page: 5 ----
998
999 wwwtb
1000 wwwtb
1001 gaikuchosa
1002 wwwtb
1003 ocab
1004
1005
1006Google Results:
1007________________
1008
1009ocab.mlit.go.jp. 300 IN A 60.43.157.78
1010gaikuchosa.mlit.go.jp. 300 IN A 210.165.45.243
1011wwwtb.mlit.go.jp. 30 IN A 210.248.150.33
1012
1013
1014Brute forcing with /usr/share/dnsenum/dns.txt:
1015_______________________________________________
1016
1017www.mlit.go.jp. 117 IN CNAME www-vip.mlit.go.jp.
1018www-vip.mlit.go.jp. 30 IN A 210.248.150.33
1019www2.mlit.go.jp. 30 IN A 210.248.150.33
1020
1021
1022Launching Whois Queries:
1023_________________________
1024
1025 whois ip result: 210.248.150.0 -> 210.248.150.0/25
1026 c class default: 60.43.157.0 -> 60.43.157.0/24 (whois netrange operation failed)
1027 c class default: 153.151.3.0 -> 153.151.3.0/24 (whois netrange operation failed)
1028 whois ip result: 153.151.5.0 -> 153.151.5.0/27
1029 whois ip result: 210.165.45.0 -> 210.165.45.0/26
1030
1031
1032mlit.go.jp__________
1033
1034 60.43.157.0/24
1035 153.151.5.0/27
1036 210.165.45.0/26
1037 210.248.150.0/25
1038 153.151.3.0/24
1039
1040#####################################################################################################################################
1041WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1042Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-09 18:39 EST
1043Nmap scan report for 210.248.150.33
1044Host is up (0.25s latency).
1045Not shown: 320 closed ports, 174 filtered ports
1046Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1047PORT STATE SERVICE
104880/tcp open http
1049443/tcp open https
1050
1051Nmap done: 1 IP address (1 host up) scanned in 17.31 seconds
1052######################################################################################################################################
1053HTTP/1.1 200 OK
1054Date: Mon, 09 Dec 2019 23:39:29 GMT
1055Last-Modified: Mon, 09 Dec 2019 08:34:41 GMT
1056ETag: "b580-599414451cb92"
1057Accept-Ranges: bytes
1058Content-Length: 46464
1059Content-Type: text/html
1060
1061Allow: OPTIONS,GET,HEAD,POST
1062######################################################################################################################################
1063<!-- wrapper start --><div id="wrapper">
1064 <!-- #contentsIndexTop start --><div id="contentsIndexTop" class="clearfix">
1065 <!-- /linkList01 --></ul>
1066 <!-- /indexH203 --></div>
1067 <!-- #topicsSlideWrap start --><div id="topicsSlideWrap">
1068 <!-- #topicsSlide start --><div id="topicsSlide">
1069<!-- #slideshow start --><div id="slideshow">
1070<!-- / #slideshow end --></div>
1071<!-- / #topicsSlide end --></div>
1072<!-- / #topicsSlideWrap end --></div>
1073<!-- #topicsListWrap start --><div id="topicsListWrap">
1074<!-- #topicsList start --><div id="topicsList">
1075 <!-- / #topicsList end --></div>
1076 <!-- / #topicsListWrap end --></div>
1077 <!-- #contentsIndexTop end --></div>
1078 <!-- #contents start --><div id="contents">
1079 <!-- #twoColumnWrapTop start --><div id="twoColumnWrapTop">
1080 <!-- #contentsColumnWrapTop start --><div id="contentsColumnWrapTop">
1081 <!-- #newsticker start -->
1082 </div><!--/#newsticker -->
1083 <!-- #liquidColumnLeft start --><div id="liquidColumnLeft">
1084 <!-- #liquidColumnLeftIn start --><div id="liquidColumnLeftIn">
1085 <!-- .section start --><div class="section pressrelease">
1086 <!-- 重要なお知らせ start -->
1087 <!-- /indexH201 --></div>
1088 <!-- 重要なお知らせ end -->
1089<!-- .section end --></div>
1090 <!-- .section start --><div class="section pressrelease">
1091 <!-- プレスリリース start -->
1092 <!-- /linkList01 --></ul>
1093 <!-- /indexH204 --></div>
1094 <!-- /categoryIcon0X --></div>
1095 <!-- /text --></div>
1096 <!-- /categoryIcon0X --></div>
1097 <!-- /text --></div>
1098 <!-- /categoryIcon0X --></div>
1099 <!-- /text --></div>
1100 <!-- /categoryIcon0X --></div>
1101 <!-- /text --></div>
1102 <!-- /categoryIcon0X --></div>
1103 <!-- /text --></div>
1104 <!-- /categoryIcon0X --></div>
1105 <!-- /text --></div>
1106 <!-- /categoryIcon0X --></div>
1107 <!-- /text --></div>
1108 <!-- /categoryIcon0X --></div>
1109 <!-- /text --></div>
1110 <!-- /categoryIcon0X --></div>
1111 <!-- /text --></div>
1112 <!-- /categoryIcon0X --></div>
1113 <!-- /text --></div>
1114 <!-- /categoryIcon0X --></div>
1115 <!-- /text --></div>
1116 <!-- /categoryIcon0X --></div>
1117 <!-- /text --></div>
1118 <!-- /categoryIcon0X --></div>
1119 <!-- /text --></div>
1120 <!-- /categoryIcon0X --></div>
1121 <!-- /text --></div>
1122 <!-- /categoryIcon0X --></div>
1123 <!-- /text --></div>
1124 <!-- /categoryIcon0X --></div>
1125 <!-- /text --></div>
1126 <!-- /categoryIcon0X --></div>
1127 <!-- /text --></div>
1128 <!-- /categoryIcon0X --></div>
1129 <!-- /text --></div>
1130 <!-- /categoryIcon0X --></div>
1131 <!-- /text --></div>
1132 <!-- /categoryIcon0X --></div>
1133 <!-- /text --></div>
1134 <!-- /categoryIcon0X --></div>
1135 <!-- /text --></div>
1136 <!-- /indexPressRelease01 --></div>
1137 <!-- プレスリリース end -->
1138 <!-- .section end --></div>
1139 <!-- #liquidColumnLeftIn end --></div>
1140 <!-- #liquidColumnLeft end --></div>
1141 <!-- #NonLiquidColumnRight start --><div id="NonLiquidColumnRight">
1142 <!-- #NonLiquidColumnRightIn start --><div id="NonLiquidColumnRightIn">
1143 <!-- .section start --><div class="section" id="policyInfoListInline">
1144 <!-- 政策情報 start -->
1145 <!-- /indexH205 --></div>
1146 <!-- /indexPolicyInfoListInline01 --></div>
1147 <!-- 政策情報 end -->
1148 <!-- .section end --></div>
1149 <!-- .section start --><div class="section" id="policyInfoCategory">
1150 <!-- 政策情報・分野別一覧 start -->
1151 <!-- /linkList03 --></ul>
1152 <!-- /indexH206 --></div>
1153 <!-- PC start -->
1154<!-- /indexPolicyInfoCategory01 --></div>
1155<!-- PC end -->
1156<!-- SP start -->
1157<!-- /indexPolicyInfoCategory01 --></div>
1158<!-- SP end -->
1159 <!-- 政策情報・分野別一覧 end -->
1160 <!-- .section end --></div>
1161 <!-- #NonLiquidColumnRightIn end --></div>
1162 <!-- #NonLiquidColumnRight end --></div>
1163 <!-- .section start --><div id="pickupInfo" class="section">
1164 <!-- #remarkableWords .section end --></div>
1165 <!-- #contentsColumnWrapTop end --></div>
1166 <!-- #twoColumnWrapTop end --></div>
1167 <!-- #rightColumn start --><div id="rightColumnTop">
1168 <!-- 災害・防災情報 一覧 start -->
1169 <!-- .indexDisaster01 start --><div class="indexDisaster01" id="disaster">
1170 <!-- /categoryBtm --></div>
1171 <!-- /categoryTop --></div>
1172 <!-- /categoryType0X --></div>
1173 <!-- /info --></div>
1174 <!-- /categoryBtm --></div>
1175 <!-- /categoryTop --></div>
1176 <!-- /categoryType0X --></div>
1177 <!-- /info --></div>
1178 <!-- /indexDisasterList01 --></div>
1179 <!-- 災害・防災情報 一覧 end -->
1180 <!-- /indexDisasterList02 --></div>
1181 <!-- .indexDisaster01 end --></div>
1182 <!-- 災害・防災情報 一覧 end -->
1183 <!-- サイドバナー一覧 start -->
1184 <!-- サイドバナー一覧 end -->
1185 <!-- 広報・広聴 start -->
1186 <!-- .indexPublicity01 start --><div class="indexPublicity01">
1187 <!-- /indexPublicityList01 --></div>
1188 <!-- .indexPublicity01 end --></div>
1189 <!-- 広報・広聴 end -->
1190 <!-- おしらせ start -->
1191 <!-- .indexNotification01 start --><div class="indexNotification01">
1192 <!-- /linkList01 --></ul>
1193 <!-- /indexH207 --></div>
1194 <!-- /indexNotificationList01 --></div>
1195 <!-- .indexNotification01 end --></div>
1196 <!-- おしらせ end -->
1197 <!-- 国土交通省携帯サイト start -->
1198 <!-- .indexQr01 start --><div class="indexQr01">
1199 <!-- /text --></div>
1200 <!-- .indexQr01 end --></div>
1201 <!-- 国土交通省携帯サイト end -->
1202 <!-- #rightColumn end --></div>
1203 <!-- #contents end --></div>
1204 <!-- /pageTopWrap --></div>
1205<!-- wrapper end --></div>
1206<!-- .relatedLink01 start --><div class="relatedLink01">
1207 <!-- /flImgL --></div>
1208 <!-- /relatedLinkList01 --></div>
1209<!-- .relatedLink01 end --></div>
1210######################################################################################################################################
1211/appli/file000006.html
1212/common/000235517.gif
1213/common/000235571.png
1214/common/001032568.png
1215/common/001069864.gif
1216/content/001308647.jpg
1217http://genba-go.jp/
1218https://www.e-gov.go.jp/index.html
1219https://www.facebook.com/sourikantei
1220https://www.gsi.go.jp/chizuhensyu/chizuhensyu61003.html
1221http://www.cas.go.jp/jp/seisaku/bangoseido/index.html
1222http://www.gov-online.go.jp/tokusyu/keigen_zeiritsu/index.html
1223http://www.gsi.go.jp/
1224http://www.jma.go.jp/jma/
1225http://www.kaiho.mlit.go.jp/
1226http://www.kantei.go.jp/jp/headline/3_11_2013fukko.html
1227http://www.kantei.go.jp/jp/joho/index.html
1228http://www.kantei.go.jp/jp/singi/nousui/yushutsuryoku.html
1229http://www.mlit.go.jp/gobuild/index.html
1230http://www.mlit.go.jp/hkb/index.html
1231http://www.mlit.go.jp/jidosha/anzen/bus/index.html
1232http://www.mlit.go.jp/jidosha/index.html
1233http://www.mlit.go.jp/jtsb/index.html
1234http://www.mlit.go.jp/jutakukentiku/house/jutakukentiku_house_fr4_000036.html
1235http://www.mlit.go.jp/jutakukentiku/index.html
1236http://www.mlit.go.jp/kankocho/index.html
1237http://www.mlit.go.jp/kanrenlink.html#1
1238http://www.mlit.go.jp/kikikanri/index.html
1239http://www.mlit.go.jp/kokudoseisaku/index.html
1240http://www.mlit.go.jp/koku/index.html
1241http://www.mlit.go.jp/kokusai/index.html
1242http://www.mlit.go.jp/kowan/index.html
1243http://www.mlit.go.jp/maritime/index.html
1244http://www.mlit.go.jp/mizukokudo/index.html
1245http://www.mlit.go.jp/mizukokudo/sewerage/mizukokudo_sewerage_tk_000411.html
1246http://www.mlit.go.jp/mobile/top.html
1247http://www.mlit.go.jp/page/kanbo01_hy_20190802.html
1248http://www.mlit.go.jp/page/policy2.html
1249http://www.mlit.go.jp/policy/file000003.html
1250http://www.mlit.go.jp/policy/file000004.html
1251http://www.mlit.go.jp/policy/index.html
1252http://www.mlit.go.jp/report/interview/daijin.html
1253http://www.mlit.go.jp/river/bousai/bousai-gensai/index.html
1254http://www.mlit.go.jp/river/bousai/earthquake/index.html
1255http://www.mlit.go.jp/river/bousai/education/index.html
1256http://www.mlit.go.jp/river/bousai/pch-tec/index.html
1257http://www.mlit.go.jp/road/bicycleuse/
1258http://www.mlit.go.jp/road/index.html
1259http://www.mlit.go.jp/road/nyuusatsu/index.html
1260http://www.mlit.go.jp/road/sign/numbering/index.html
1261http://www.mlit.go.jp/seisakutokatsu/freight/index.html
1262http://www.mlit.go.jp/seisakutokatsu/index.html
1263http://www.mlit.go.jp/sogoseisaku/im/index.html
1264http://www.mlit.go.jp/sogoseisaku/index.html
1265http://www.mlit.go.jp/sogoseisaku/maintenance/index.html
1266http://www.mlit.go.jp/sogoseisaku/point/sosei_point_fr_000045.html
1267http://www.mlit.go.jp/sogoseisaku/point/sosei_point_tk_000024.html
1268http://www.mlit.go.jp/sogoseisaku/point/sosei_point_tk_000029.html
1269http://www.mlit.go.jp/sogoseisaku/region/infratourism/index.html
1270http://www.mlit.go.jp/sogoseisaku/region/stock/index.html
1271http://www.mlit.go.jp/tec/index.html
1272http://www.mlit.go.jp/tetudo/index.html
1273http://www.mlit.go.jp/toshi/index.html
1274http://www.mlit.go.jp/totikensangyo/const/sosei_const_tk3_000131.html
1275http://www.mlit.go.jp/totikensangyo/index.html
1276http://www.mlit.go.jp/unyuanzen/index.html
1277http://www.moj.go.jp/nyuukokukanri/kouhou/nyuukokukanri01_00111.html
1278http://www.nilim.go.jp/lab/qbg/bimcim/bimcimindex.html
1279http://www.npa.go.jp/bureau/safetylife/bohankyoshitsu/2nd/
1280http://www.w3.org/1999/xhtml
1281/important.html
1282/jidosha/index.html
1283/jutakukentiku/index.html
1284/kanrenlink.html#1
1285/koku/index.html
1286/koku/koku_tk10_000003.html
1287/kokusai/index.html
1288/kowan/index.html
1289/page/kanbo01_hy_006468.html
1290/page/kanbo01_hy_007075.html
1291/page/kanbo01_hy_007225_re.html
1292/page/kanbo01_hy_007226_re.html
1293/page/kanbo01_hy_007227_re.html
1294/page/kanbo01_hy_007229_re.html
1295/page/kanbo01_hy_007230_re.html
1296/page/kanbo01_hy_007231_re.html
1297/page/kanbo03_hy_000006.html
1298/page/kanbo05_hy_001637.html
1299/page/kanbo05_hy_001853.html
1300/report/index.html
1301/report/interview/daijin191122.html
1302/report/interview/daijin191126.html
1303/report/interview/daijin191129.html
1304/report/interview/daijin191203.html
1305/report/press/house01_hh_000094.html
1306/report/press/house04_hh_000907.html
1307/report/press/house05_hh_000811.html
1308/report/press/jidosha03_hh_000315.html
1309/report/press/jidosha08_hh_003576.html
1310/report/press/jidosha08_hh_003577.html
1311/report/press/kaiji02_hh_000247.html
1312/report/press/kaiji04_hh_000159.html
1313/report/press/kouku05_hh_000153.html
1314/report/press/kouku19_hh_000092.html
1315/report/press/port06_hh_000183.html
1316/report/press/road01_hh_001263.html
1317/report/press/sogo03_hh_000229.html
1318/report/press/sogo05_hh_000212.html
1319/report/press/sogo09_hh_000221.html
1320/report/press/tetsudo07_hh_000166.html
1321/report/press/tokatsu01_hh_000481.html
1322/report/press/toshi02_hh_000074.html
1323/report/press/toshi05_hh_000267.html
1324/report/press/toshi09_hh_000057.html
1325/report/press/totikensangyo13_hh_000658.html
1326/road/kako_index.html
1327/sogoseisaku/channel.html
1328/sogoseisaku/index.html
1329/sogoseisaku/point/closeup.html
1330/sogoseisaku/point/sosei_point_tk_000021.html
1331/tec/tec_tk_000098.html
1332/tetudo/index.html
1333text/javascript
1334/toshi/index.html
1335/totikensangyo/index.html
1336-//W3C//DTD XHTML 1.0 Transitional//EN
1337#######################################################################################################################################
1338http://210.248.150.33 [200 OK] Country[JAPAN][JP], IP[210.248.150.33], JQuery, Script[text/javascript], Title[国土交通省]
1339#######################################################################################################################################
1340
1341wig - WebApp Information Gatherer
1342
1343
1344Scanning http://210.248.150.33...
1345_________________ SITE INFO __________________
1346IP Title
1347210.248.150.33 国土交通省
1348
1349__________________ VERSION ___________________
1350Name Versions Type
1351jQuery 1.4.2 JavaScript
1352
1353______________________________________________
1354Time: 91.1 sec Urls: 698 Fingerprints: 40401
1355######################################################################################################################################
1356Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-09 18:41 EST
1357NSE: Loaded 163 scripts for scanning.
1358NSE: Script Pre-scanning.
1359Initiating NSE at 18:41
1360Completed NSE at 18:41, 0.00s elapsed
1361Initiating NSE at 18:41
1362Completed NSE at 18:41, 0.00s elapsed
1363Initiating Parallel DNS resolution of 1 host. at 18:41
1364Completed Parallel DNS resolution of 1 host. at 18:41, 0.02s elapsed
1365Initiating SYN Stealth Scan at 18:41
1366Scanning 210.248.150.33 [1 port]
1367Discovered open port 80/tcp on 210.248.150.33
1368Completed SYN Stealth Scan at 18:41, 0.49s elapsed (1 total ports)
1369Initiating Service scan at 18:41
1370Scanning 1 service on 210.248.150.33
1371Completed Service scan at 18:41, 6.93s elapsed (1 service on 1 host)
1372Initiating OS detection (try #1) against 210.248.150.33
1373Retrying OS detection (try #2) against 210.248.150.33
1374Initiating Traceroute at 18:41
1375Completed Traceroute at 18:41, 3.48s elapsed
1376Initiating Parallel DNS resolution of 19 hosts. at 18:41
1377Completed Parallel DNS resolution of 19 hosts. at 18:41, 0.94s elapsed
1378NSE: Script scanning 210.248.150.33.
1379Initiating NSE at 18:41
1380Completed NSE at 18:46, 293.41s elapsed
1381Initiating NSE at 18:46
1382Completed NSE at 18:46, 1.90s elapsed
1383Nmap scan report for 210.248.150.33
1384Host is up (0.46s latency).
1385
1386PORT STATE SERVICE VERSION
138780/tcp open http Fortinet FortiGate 50B or FortiWifi 60C or 80C firewall http config
1388| http-brute:
1389|_ Path "/" does not require authentication
1390|_http-chrono: Request times for /; avg: 2613.54ms; min: 2475.74ms; max: 2757.79ms
1391|_http-csrf: Couldn't find any CSRF vulnerabilities.
1392|_http-date: Mon, 09 Dec 2019 23:42:10 GMT; -2s from local time.
1393|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1394|_http-dombased-xss: Couldn't find any DOM based XSS.
1395|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1396| http-errors:
1397| Spidering limited to: maxpagecount=40; withinhost=210.248.150.33
1398| Found the following error pages:
1399|
1400| Error Code: 404
1401|_ http://210.248.150.33:80/road/kako_index.html
1402|_http-exif-spider: ERROR: Script execution failed (use -d to debug)
1403|_http-feed: Couldn't find any feeds.
1404|_http-fetch: Please enter the complete path of the directory to save data in.
1405| http-headers:
1406| Date: Mon, 09 Dec 2019 23:42:09 GMT
1407| Last-Modified: Mon, 09 Dec 2019 08:34:41 GMT
1408| ETag: "b580-599414451cb92"
1409| Accept-Ranges: bytes
1410| Content-Length: 46464
1411| Content-Type: text/html
1412| Connection: close
1413|
1414|_ (Request type: HEAD)
1415|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1416| http-methods:
1417|_ Supported Methods: OPTIONS GET HEAD POST
1418|_http-mobileversion-checker: No mobile version detected.
1419|_http-security-headers:
1420| http-sitemap-generator:
1421| Directory structure:
1422| /
1423| Other: 1; css: 1
1424| /appli/
1425| html: 1
1426| /com/
1427| js: 3
1428| /common/
1429| gif: 3
1430| /jutakukentiku/
1431| html: 1
1432| /koku/
1433| html: 1
1434| /kokusai/
1435| html: 1
1436| /page/
1437| html: 4
1438| /report/press/
1439| html: 4
1440| Longest directory structure:
1441| Depth: 2
1442| Dir: /report/press/
1443| Total files found (by extension):
1444|_ Other: 1; css: 1; gif: 3; html: 12; js: 3
1445|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1446|_http-title: \xE5\x9B\xBD\xE5\x9C\x9F\xE4\xBA\xA4\xE9\x80\x9A\xE7\x9C\x81
1447| http-vhosts:
1448|_127 names had status 200
1449| http-waf-detect: IDS/IPS/WAF detected:
1450|_210.248.150.33:80/?p4yl04d3=<script>alert(document.cookie)</script>
1451|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1452|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1453|_http-xssed: No previously reported XSS vuln.
1454| vulscan: VulDB - https://vuldb.com:
1455| [135959] Fortinet FortiOS 6.0.0/6.0.1/6.0.2/6.0.3/6.0.4 SSL VPN Web Portal HTTP Requests Reflected cross site scripting
1456| [135957] Fortinet FortiOS up to 6.0.4 SSL VPN Web Portal HTTP Requests Reflected cross site scripting
1457| [135936] Fortinet FortiOS up to 6.0.4 SSL VPN Web Portal HTTP Requests Password privilege escalation
1458| [134428] Sierra Wireless AirLink ES450 4.9.3 ACEManager HTTP Request Config information disclosure
1459| [127885] Siemens SINUMERIK 828D/SINUMERIK 840D sl Firewall Configuration 5900/tcp Network Request unknown vulnerability
1460| [122507] Agiletestware Pangolin Connector for TestRail Plugin up to 2.1 on Jenkins GlobalConfig.java HTTP Requests privilege escalation
1461| [120079] Fortinet FortiManager up to 6.0.0 CLI Config Installation Log cross site scripting
1462| [118205] Fortinet FortiOS up to 5.6.2 SSL VPN Web Portal Config information disclosure
1463| [113051] Fortinet Fortigate FortiDB up to 4.4.1 admin/auditTrail.jsf Parameter cross site scripting
1464| [113003] Fortinet FortiOS up to 4.3.5 on Fortigate UTM Endpoint Monitor user/auth/list Parameter cross site scripting
1465| [112985] Cisco RV132W Configuration Parameter HTTP Response information disclosure
1466| [112626] Fortinet FortiOS up to 5.2/5.4.7/5.6.2 HTTP Header HTTP Requests cross site scripting
1467| [110192] Synology Photo Station up to 6.3/6.8.1 HTTP Config File .htaccess information disclosure
1468| [109217] Circle with Disney 2.0.1 HTTP Request /api/CONFIG/restore Network Packet privilege escalation
1469| [109204] Circle with Disney 2.0.1 HTTP Request /api/CONFIG/restore Network Packet privilege escalation
1470| [108655] Fortinet FortiMail up to 5.1/5.2.9/5.3.9 Webmail Login HTTP Requests Reflected cross site scripting
1471| [108654] Fortinet FortiWLC up to 6.1-5/7.0-10/8.2/8.3.2 WebUI HTTP Requests privilege escalation
1472| [108653] Fortinet FortiWLC up to 8.3.2 HTTP POST Request cross site scripting
1473| [106866] Polycom RealPresence Resource Manager up to 8.3 PlcmRmWeb/JConfigManager HTTP POST Request information disclosure
1474| [101723] Fortinet FortiOS up to 5.2.10 Configuration Setting Stored cross site scripting
1475| [100725] Fortinet FortiOS up to 5.2.10 Firewall Policy Creator srcintf cross site scripting
1476| [97936] Intel VirusScan Enterprise Linux up to 2.0.3 HTTP Header NailsConfig.html information disclosure
1477| [81137] phpMyAdmin up to 4.5.5.0 X.509 Certificate Validation Config.class.php checkHTTP information disclosure
1478| [76065] Async Http Client up to 1.8.x X.509 Certificate Validator AsyncHttpClientConfig.java spoofing
1479| [75232] Fortinet FortiWeb up to 5.3.4 Autolearn Configuration Page cross site scripting
1480| [13156] Fortinet FortiWeb 5.1.0/5.1.1/5.1.2/5.1.3/5.1.4 /system/config/adminadd cross site request forgery
1481| [12387] Fortinet FortiWeb 5.0.2 HTTP Header cross site scripting
1482| [6883] Fortinet FortiOS self-signed Fortigate CA certificate information disclosure
1483| [6620] Fortinet FortiOS 4.3.8 /firewall/policy/policy6 cross site scripting
1484| [4707] Novell ZENworks Configuration Management up to 10.3.4 HTTP Trace unknown vulnerability
1485| [10180] Thomas R. Pasawicz HyperBook Guestbook 1.30 Password Database data/gbconfiguration.dat HTTP GET Request information disclosure
1486| [141903] OpenConnect up to 8.04 process_http_response memory corruption
1487| [141896] wp-cerber Plugin up to 2.6 on WordPress HTTP Header cross site scripting
1488| [141818] dwnldr Plugin up to 1.00 on WordPress HTTP Header cross site scripting
1489| [141814] wsecure Plugin up to 2.3 on WordPress wsecure-config.php Shell Metacharacter Code Execution
1490| [141806] api-bearer-auth Plugin on WordPress swagger-config.yaml.php Parameter cross site scripting
1491| [141526] Couchbase Server 5.1.2/5.5.0 HTTP Server Port 8092 cross site scripting
1492| [141337] pecl-http extension up to 2.6.0beta2/3.1.0beta2 php_http_params.c merge_param() HTTP Requests memory corruption
1493| [141321] IBM Jazz for Service Management 1.1.3 Cache HTTP GET Request Header Injection privilege escalation
1494| [141275] Cisco Industrial Network Director Plug-and-Play Service HTTP Request information disclosure
1495| [141159] Mulesoft/Mulesoft API Gateway APIkit/http-connector/OAuth2 Provider directory traversal
1496| [141062] WebTorrent up to 0.107.5 HTTP Server cross site scripting
1497| [141014] Fortinet FortiWeb up to 6.0.2 Report Message cross site scripting
1498| [140773] GNUBOARD5 up to 5.3.1.x Homepage Title config_form_update.php Parameter cross site scripting
1499| [140756] Fortinet FortiManager VM up to 6.2.0 Integrity Check Image privilege escalation
1500| [140755] Fortinet FortiNAC up to 8.5.0 Web Page Generator Reflected cross site scripting
1501| [140754] Fortinet FortiOS IPS Engine POODLE weak encryption
1502| [140737] Swoole up to 4.2.12 swPort_http_static_handler directory traversal
1503| [140533] Cisco Firepower Threat Defense Application Policy Configuration information disclosure
1504| [140050] SAP Gateway 750/751/752/753 OData Request HTTP Header information disclosure
1505| [140033] all-in-one-wp-security-and-firewall Plugin up to 4.0.6 on WordPress sql injection
1506| [140032] all-in-one-wp-security-and-firewall Plugin up to 4.0.8 on WordPress sql injection
1507| [140018] all-in-one-wp-security-and-firewall Plugin up to 3.9.0 on WordPress sql injection
1508| [139986] UniSign up to 2.0.4.0 HTTPS Packet Stack-based memory corruption
1509| [139976] all-in-one-wp-security-and-firewall Plugin up to 4.0.5 on WordPress Settings Page cross site scripting
1510| [139975] all-in-one-wp-security-and-firewall Plugin up to 4.1.x on WordPress cross site scripting
1511| [139850] all-in-one-wp-security-and-firewall Plugin up to 4.0.4 on WordPress Settings Page cross site scripting
1512| [139841] all-in-one-wp-security-and-firewall Plugin up to 3.9.4 on WordPress add_query_arg/remove_query_arg cross site scripting
1513| [139840] all-in-one-wp-security-and-firewall Plugin up to 3.9.7 on WordPress Unlock Request cross site scripting
1514| [139781] HPE Command View Advanced Edition up to 8.6.1-01 Config information disclosure
1515| [140698] Fortinet FortiOS up to 6.2.0 Admin Web Interface Javascript File information disclosure
1516| [139716] Deny All Firewall Plugin up to 1.1.6 on WordPress options-general.php cross site request forgery
1517| [139697] Neet AirStream NAS1.1 Configuration Page Password Default Admin Password weak authentication
1518| [139676] go-camo up to 1.1.4 Internal Endpoint HTTP Requests Server-Side Request Forgery
1519| [139644] KDE Frameworks KConfig up to 5.60.x Configuration File libKF5ConfigCore.so Code Execution
1520| [139641] Relution Enterprise Appstore Publisher Plugin up to 1.24 on Jenkins Permission Check HTTP privilege escalation
1521| [139633] Google Cloud Messaging Notification Plugin up to 1.0 on Jenkins Global Configuration information disclosure
1522| [139629] File System SCM Plugin up to 2.1 on Jenkins Job Configuration information disclosure
1523| [139574] MicroDigital N-Series Camera up to 6400.0.8.5 httpd upload.php Filename memory corruption
1524| [139568] MicroDigital N-Series Camera up to 6400.0.8.5 HTTPD Parameter Time-Based information disclosure
1525| [139553] Schben Adive 2.0.7 config.php cross site request forgery
1526| [139540] cPanel up to 60.0.24 Apache HTTP Server Key information disclosure
1527| [139499] Octopus Deploy up to 2019.6.6/2019.7.7 Configuration Page API Call information disclosure
1528| [139448] Magento up to 2.1.17/2.2.8/2.3.1 Metadata HTTP Request information disclosure
1529| [139256] cPanel up to 68.0.26 WHM Apache Configuration Include Editor cross site scripting
1530| [139239] cPanel up to 70.0.22 Apache HTTP Server Log information disclosure
1531| [139181] cPanel up to 11.54.0.3 WHM PHP Configuration Editor Interface cross site scripting
1532| [139083] Skytap Cloud CI Plugin up to 2.06 on Jenkins Job config.xml information disclosure
1533| [139079] Configuration as Code Plugin up to 1.24 on Jenkins Configuration Import Environment Variable information disclosure
1534| [139070] Configuration as Code Plugin up to 1.24 on Jenkins Permission Check information disclosure
1535| [138915] PrinterOn Central Print Services up to 4.1.4 HTTP GET Request information disclosure
1536| [138851] MikroTik RouterOS up to 6.44.4 HTTP Server HTTP Request Memory Exhaustion denial of service
1537| [138850] MikroTik RouterOS up to 6.44.4 HTTP Server HTTP Request Memory Exhaustion denial of service
1538| [138830] Axway SecureTransport up to 5.5 API Configuration XML Data XML External Entity
1539| [138823] Mitsubishi Electric FR Configurator2 up to 1.16S frc2 File XML privilege escalation
1540| [138821] Mitsubishi Electric FR Configurator2 up to 1.16S frc2 File Project File CPU Exhaustion denial of service
1541| [138824] Proxygen HTTP Header Crafted Packet Out-of-Bounds memory corruption
1542| [138520] GNUBOARD5 5.3.1.9 Extra Contents config_form_update.php Parameter cross site scripting
1543| [138505] Mozilla Firefox up to 67.x HTTP Alternative Services Header Portscan privilege escalation
1544| [138466] OSS Http Request 6 on Cordova SSL Certificate Validator spoofing
1545| [138465] Linagora Hublin 72ead897082403126bf8df9264e70f0a9de247ff HTTP Request directory traversal
1546| [138358] Credentials Binding Plugin 1.17 on Jenkins Password Storage config-variables.jelly weak encryption
1547| [138340] antSword up to 2.0.x Database Configuration index.js cross site scripting
1548| [138299] MailCleaner NewslettersController.php allowAction() HTTP GET Request information disclosure
1549| [138271] Cisco Vision Dynamic Signage Director REST API HTTP Requests weak authentication
1550| [138242] FANUC Robotics Virtual Robot Controller 8.23 Remote Admin Webserver HTTP Request memory corruption
1551| [138241] FANUC Robotics Virtual Robot Controller 8.23 HTTP Request directory traversal
1552| [138214] CentOS-WebPanel.com CentOS Web Panel 0.9.8.846 Login HTTP Response Username information disclosure
1553| [138146] Oracle Sun ZFS Storage Appliance Kit (AK) 8.8.3 HTTP data path subsystems unknown vulnerability
1554| [138129] Oracle Retail Xstore Point of Service 7.0/7.1 Apache HTTP Server denial of service
1555| [138025] Oracle HTTP Server 12.1.3.0.0/12.2.1.3.0 jQuery information disclosure
1556| [138012] Oracle Outside In Technology 8.5.4 Apache HTTP Server unknown vulnerability
1557| [138009] Oracle Outside In Technology 8.5.4 Apache HTTP Server unknown vulnerability
1558| [137967] Oracle up to 8.0.7 Apache httpd unknown vulnerability
1559| [137911] Oracle E-Business Suite up to 12.2.8 Apache HTTP Server unknown vulnerability
1560| [137901] Oracle Primavera Unifier up to 18.8 Apache HTTP Server unknown vulnerability
1561| [137850] http-file-server up to 0.2.6 on NPM directory traversal
1562| [137804] Python up to 3.7.2 Domain Validator Lib/http/cookiejar.py http.cookiejar.DefaultPolicy.domain_return_ok Hostname privilege escalation
1563| [137788] IBM Content Navigator 3.0CD Configuration File information disclosure
1564| [137767] Squid Proxy up to 2.7.STABLE9/3.5.28/4.7 HTTP Header Authorization Header memory corruption
1565| [137766] Squid Proxy up to 4.7.0 HttpHeader::getAuth Header memory corruption
1566| [137716] Port Allocator Plugin on Jenkins config.xml weak encryption
1567| [137715] Dependency Graph Viewer Plugin up to 0.13 on Jenkins Job Configuration Stored cross site scripting
1568| [137699] Mongoose 6.15 mongoose.c mq_parse_http memory corruption
1569| [137667] eQ-3 Homematic CCU2/Homematic CCU3 ReGa ise GmbH HTTP-Server Code Execution memory corruption
1570| [137420] Cisco Small Business 200 Managed Switch Management Web Interface HTTPS Packet memory corruption
1571| [137281] JetBrains Ktor Framework up to 1.0.x Artifact Resolver HTTP weak encryption
1572| [137260] Moxa OnCell G3100-HSPA up to 1.6 Build 17100315 Monitoring Protocol HTTP weak encryption
1573| [137243] Amcrest IPM-721S Amcrest_IPC-AWXX_Eng_N_V2.420.AC00.17.R.20170322 HTTP API HTTP Requests Stack-based memory corruption
1574| [137171] Blipcare BP700 10.1 Wireless Network HTTP Request memory corruption
1575| [137093] Synology Calendar up to 2.3.1 HTTP Header drivers_syno_import_user.php Command privilege escalation
1576| [137014] Google Chrome XMLHttpRequest HTML Page Cross-Origin information disclosure
1577| [136928] Cisco Data Center Network Manager Web-based Management Interface HTTP Request weak authentication
1578| [136885] IBM API Connect up to 5.0.8.6 HTTP Requests information disclosure
1579| [136867] IBM API Connect up to 2018.4.1.5 HTTP Request information disclosure
1580| [136858] MakerBot Replicator 5G Printer Apache HTTP Server information disclosure
1581| [136854] ABB IDAL HTTP Server Host Header memory corruption
1582| [136847] Phoenix Contact PC Worx/PC Worx Express/Config+ up to 1.86 Project File Use-After-Free memory corruption
1583| [136846] Phoenix Contact PC Worx/PC Worx Express/Config+ up to 1.86 Project File Uninitialized Pointer memory corruption
1584| [136845] Phoenix Contact PC Worx/PC Worx Express/Config+ up to 1.86 Project File Out-of-Bounds memory corruption
1585| [136783] b3log Solo 2.9.3 Publish Articles Menu HTTP Request Stored cross site scripting
1586| [136781] TP-LINK WR1043ND 3 HTTPd Server MediaServerFoldersCfgRpm.htm memory corruption
1587| [136780] Sophos XG Firewall 17.0.8 MR-8 API Configuration APIController HTTP Header privilege escalation
1588| [136779] Sophos XG Firewall 17.0.8 MR-8 Admin Portal /webconsole/Controller Shell Metacharacter privilege escalation
1589| [136778] Sophos XG Firewall 17.0.8 MR-8 Admin Portal AccountStatus.jsp GET Parameter sql injection
1590| [136741] Cisco RV110W/RV130W/RV215W HTTP Request information disclosure
1591| [136740] Cisco RV110W/RV130W/RV215W Web-based Management Interface HTTP Request information disclosure
1592| [136729] Cisco Integrated Management Controller Web-based Management Interface HTTP Request information disclosure
1593| [136727] Cisco Integrated Management Controller Configuration Import Utility privilege escalation
1594| [136666] Nagios XI up to 5.5.3 Access Control coreconfigsnapshot.php privilege escalation
1595| [136582] IBM Cognos Controller 10.2.0/10.2.1/10.3.0/10.3.1/10.4.0 HTTP Method HTTP Request information disclosure
1596| [136529] OrangeHRM up to 4.3.0 listMailConfiguration Parameter privilege escalation
1597| [136513] EmbedThis GoAhead up to 4.1.0/5.0.0 Header Parsing http.c memory corruption
1598| [136250] Cesanta Mongoose Embedded Web Server Library up to 6.13 mongoose.c mg_http_free_proto_data_cgi memory corruption
1599| [136249] Cesanta Mongoose Embedded Web Server Library up to 6.13 mongoose.c mg_http_free_proto_data_cgi memory corruption
1600| [136248] Cesanta Mongoose Embedded Web Server Library up to 6.13 mongoose.c mg_http_get_proto_data memory corruption
1601| [136247] Cesanta Mongoose Embedded Web Server Library up to 6.13 mongoose.c mg_http_get_proto_data memory corruption
1602| [136229] Google Android up to 9.0 Proxy Configuration hydrogen-alias-analysis.h HAliasAnalyzer.Query memory corruption
1603| [136206] Moxa AWK-3121 1.14 Session Cookie httponly information disclosure
1604| [136203] Gemalto Admin Control Center up to 7.91 Cookie httponly information disclosure
1605| [136190] ENTTEC Datagate Mk2 70044_update_05032019-482 Web Configuration Stored cross site scripting
1606| [136020] Gardener up to 0.19.x Access Control HTTP GET Request information disclosure
1607| [136019] GrandNode 4.40 LetsEncryptController.cs LetsEncryptController HTTP Requests directory traversal
1608| [135864] AUO Solar Data Recorder up to 1.2.x protect/config.htm Parameter cross site scripting
1609| [135863] AUO Solar Data Recorder up to 1.2.x HTTP Basic Authentication weak authentication
1610| [135777] NUUO Network Video Recorder up to 3.3.x handle_load_config.php Shell Metacharacter privilege escalation
1611| [135769] InfluxDB Plugin up to 1.21 on Jenkins Global Configuration Credentials information disclosure
1612| [135755] Pydio 8.2.2 Configuration information disclosure
1613| [135680] Auerswald COMfort 1200 IP Phone 3.4.4.1-10589 Configuration Interface POST Request Code Execution
1614| [135679] Auerswald COMfort 1200 IP Phone 3.4.4.1-10589 FTP Upgrade Configuration Interface POST Request command injection
1615| [135673] Fortinet FortiOS up to 6.0.4 SSL VPN Web Portal Heap-based memory corruption
1616| [135672] Fortinet FortiOS up to 5.6.5/6.0.1 Application Control Block Page Internal information disclosure
1617| [135670] Fortinet FortiClient Online Installer up to 6.0.5 on Windows DLL Loader FortiClientOnlineInstaller.exe Search Path memory corruption
1618| [135660] Fortinet FortiAnalyzer/FortiManager up to 5.6.0 DHCP Request Parameter cross site scripting
1619| [135934] Fortinet FortiOS up to 6.0.4 SSL VPN Web Portal Parameter cross site scripting
1620| [135933] Fortinet FortiOS up to 6.0.4 SSL VPN Web Portal directory traversal
1621| [135446] Zoho ManageEngine Applications Manager 12.3 Domain Name userconfiguration.do information disclosure
1622| [135366] JIRA up to 7.13.2/8.1.0 ConfigurePortalPages.jspa Parameter cross site scripting
1623| [135364] Emerson Network Power Liebert Challenger 5.1E0.5 httpGetSet/httpGet.htm Parameter cross site scripting
1624| [135289] IBM Storwize V7000 1.6 Configuration Version information disclosure
1625| [135261] GoHTTP up to 2017-07-25 Header Stack-based memory corruption
1626| [135958] Fortinet FortiOS up to 6.0.4 VM Application Image Code Execution
1627| [135937] Fortinet FortiOS up to 6.0.4 SSL VPN Web Portal Host Header Open Redirect
1628| [135935] Fortinet FortiOS up to 6.0.4 SSL VPN Web Portal Message memory corruption
1629| [135214] GoHTTP up to 2017-07-25 sendHeader memory corruption
1630| [135213] GoHTTP up to 2017-07-25 scan Long URL memory corruption
1631| [135212] GoHTTP up to 2017-07-25 Extension GetExtension memory corruption
1632| [135142] Cisco AnyConnect Secure Mobility Client on Linux HostScan HTTP Traffic information disclosure
1633| [135136] Cisco Prime Infrastructure/Evolved Programmable Network Web-based Management Interface HTTP Request SQL privilege escalation
1634| [135135] Cisco Prime Infrastructure/Evolved Programmable Network Web-based Management Interface HTTP Request SQL privilege escalation
1635| [135131] Cisco Prime Infrastructure/Evolved Programmable Network Web-based Management Interface HTTP Request privilege escalation
1636| [135130] Cisco Prime Infrastructure/Evolved Programmable Network Web-based Management Interface HTTP Request privilege escalation
1637| [135129] Cisco Prime Infrastructure/Evolved Programmable Network Web-based Management Interface HTTP Request privilege escalation
1638| [135017] Enghouse Cloud Contact Center Platform 7.2.5 XML Data ClientServiceConfigController.cs XML External Entity
1639| [135014] Kyocera TASKalfa 4002i/TASKalfa 6002i DoBox_CstmBox_Info.model.htm HTTP Request information disclosure
1640| [134841] Apple macOS up to 10.14.4 Application Firewall memory corruption
1641| [134652] LG GAMP-7100/GAPM-7200/GAPM-8000 Log File gapm7100_${today's_date}.log HTTP Request information disclosure
1642| [134596] University of Cambridge mod_ucam_webauth up to 2.0.1 HTTP Response directory traversal
1643| [134584] NetApp OnCommand Insight up to 7.3.4 HTTP Security Header information disclosure
1644| [134583] NetApp OnCommand Unified Manager up to 9.4 HTTP Security Header information disclosure
1645| [134582] NetApp OnCommand Unified Manager up to 5.2.3 HTTP Security Header information disclosure
1646| [134565] IBM Cloud App Management V2018.2.0/V2018.4.0/V2018.4.1 HTTP Request information disclosure
1647| [134527] Apache Karaf up to 4.2.4 Config Service directory traversal
1648| [134502] Google Anroid up to 9.0 Proxy Auto Config spaces.h heap Config File information disclosure
1649| [134499] Google Android up to 9.0 Proxy Auto-Config ic.cc UpdateLoadElement memory corruption
1650| [134498] Google Android up to 9.0 Proxy Auto-Config objects.cc CalculateInstanceSizeForDerivedClass memory corruption
1651| [134497] Google Android 7.0/7.1.1/7.1.2/8.1/9.0 Proxy Auto-Config typer.cc JSCallTyper memory corruption
1652| [134458] Hisilicon HI3516 RTSP HTTP Packet memory corruption
1653| [134427] Sierra Wireless AirLink ES450 4.9.3 ACEManager template_load.cgi HTTP Request information disclosure
1654| [134426] Sierra Wireless AirLink ES450 up to 4.9.3 ACEManager HTTP Request cross site request forgery
1655| [134397] Spring Cloud Config up to 1.4.5/2.0.3/2.1.1 spring-cloud-config-server directory traversal
1656| [134366] Cisco Expressway Management Web Interface HTTP Request directory traversal
1657| [134315] Zoho ManageEngine Firewall Analyzer up to 12.2 Default Report sql injection
1658| [134314] Zoho ManageEngine Firewall Analyzer up to 12.2 Custom Report Import XML External Entity
1659| [134313] Zoho ManageEngine Firewall Analyzer up to 12.2 DNS Name Stored cross site scripting
1660| [134292] Rockwellautomation Armor Compact GuardLogix 5370 Web Server HTTP/HTTPS Request Stack-based memory corruption
1661| [134282] Crestron AM-100/AM-101 login.cgi HTTP POST Request information disclosure
1662| [134267] doorGets 7.0 configurationRequest.php directory traversal
1663| [134266] doorGets 7.0 configurationRequest.php sql injection
1664| [134264] doorGets 7.0 configurationRequest.php sql injection
1665| [134262] doorGets 7.0 configurationRequest.php sql injection
1666| [134260] doorGets 7.0 configurationRequest.php cross site request forgery
1667| [134223] Azure AD Plugin up to 0.3.3 on Jenkins Configuration File config.xml information disclosure
1668| [134221] Aqua MicroScanner Plugin up to 1.0.5 on Jenkins Global Configuration Credentials information disclosure
1669| [134218] Twitter Plugin on Jenkins Global Configuration Credentials information disclosure
1670| [134212] Static Analysis Utilities Plugin up to 1.95 on Jenkins DefaultGraphConfigurationView#doSave cross site request forgery
1671| [134104] SimplyBook.me Enterprise Password Reset Link HTTP GET Request privilege escalation
1672| [134076] Fortinet FortiManager up to 5.4.1 Man-in-the-Middle weak encryption
1673| [134017] Google TensorFlow up to 1.7.0 XLA Compiler Configuration File Heap-based memory corruption
1674| [133994] Hisilicon HI3510 Web Management Portal HTTP Request Credentials information disclosure
1675| [133960] Tildeslash Monit up to 5.25.2 HTTP Basic Authentication http/cervlet.c _viewlog Authorization Header cross site scripting
1676| [133923] Kubernetes up to 1.13.0 rest.AnonymousClientConfig() information disclosure
1677| [133874] Google Android up to 9.0 l2c_utils.cc l2cu_send_peer_config_rej information disclosure
1678| [133861] CloudBees Jenkins Operations Center 2.150.2.3 Configuration Page Credentials information disclosure
1679| [133826] jira-ext Plugin up to 0.8 on Jenkins Global Configuration Credentials information disclosure
1680| [133435] CP 1604/CP 1616 up to 2.7 Configuration Web Server Request cross site request forgery
1681| [133432] Fortinet FortiSIEM up to 5.2.0 HTML Source Code Password information disclosure
1682| [133752] Oracle Configurator 12.1/12.2 Active Model Generation information disclosure
1683| [133387] Xerox ColorQube 9303 on Linux HTTP Request OS Command Injection privilege escalation
1684| [133368] JFrog Artifactory 6.7.3 HTTP Header Password Reset privilege escalation
1685| [133330] lighttpd up to 1.4.53 burl.c burl_normalize_2F_to_slash_fix HTTP GET Request memory corruption
1686| [133328] WebKitGTK/WPE WebKit up to 2.24.0 HTTP Proxy Setting Deanonymization information disclosure
1687| [133315] Apache Airflow up to 1.10.2 HTTP Endpoint cross site request forgery
1688| [133277] TIBCO ActiveMatrix BusinessWorks up to 6.4.2 HTTP Connector HTTP Requests privilege escalation
1689| [133270] Forcepoint Email Security 8.4.x/8.5.x Configuration unknown vulnerability
1690| [133241] Fortinet FortiSandbox up to 2.x File Scan Parameter Reflected cross site scripting
1691| [133240] Fortinet FortiOS up to 5.6.7/6.0.1 PPTP Hostname information disclosure
1692| [133239] Fortinet FortiOS up to 6.1.x privilege escalation
1693| [133103] IBM Business Automation Workflow 18.0.0.0/18.0.0.1/18.0.0.2 HTTP Request information disclosure
1694| [133009] Gearman Plugin on Jenkins GearmanPluginConfig#doTestConnection cross site request forgery
1695| [132995] VMware vRealize Automation Plugin on Jenkins config.xml information disclosure
1696| [132823] http-live-simulator 1.0.5 on npm directory traversal
1697| [132739] CNCF CNI 0.7.4 Network Firewall privilege escalation
1698| [132709] IBM InfoSphere Information Server 11.3/11.5/11.7 HTTP Request unknown vulnerability
1699| [132660] Synology Router Manager up to 1.1.7 Configuration File /usr/syno/etc/mount.conf information disclosure
1700| [132659] Synology DiskStation Manager up to 6.2.1 Configuration File /usr/syno/etc/mount.conf information disclosure
1701| [132595] F5 BIG-IP ASM up to 11.5.8/11.6.3/12.1.3/13.1.1.3/14.0.0.2 Configuration Utility Stored cross site scripting
1702| [132587] Node.js up to 6.16.x/8.15.0/10.15.1/11.10.0 HTTP Connection Header Slowloris denial of service
1703| [132230] Green Hills INTEGRITY RTOS 5.0.4 Interpeak IPWEBS HTTP Header Stack-based memory corruption
1704| [132191] Verix Multi-app Conductor Application 2.7 Configuration Key memory corruption
1705| [132344] Apple macOS up to 10.14.3 configd memory corruption
1706| [132285] Apple tvOS up to 12.1.2 configd memory corruption
1707| [132234] Apple iOS up to 12.1.4 configd memory corruption
1708| [132174] Fortinet FortiPortal up to 4.0.0 Password Recovery privilege escalation
1709| [132173] Fortinet FortiPortal up to 4.0.0 FortiView Parameter cross site scripting
1710| [132166] Opto 22 PAC Project Professional Configuration File OPCTest.exe memory corruption
1711| [132106] PowerDNS Authoritative Server up to 4.0.6/4.1.6 HTTP Connector HTTP Request privilege escalation
1712| [131982] CUJO Smart Firewall 7003 mdnscap mDNS Resource Record Heap-based memory corruption
1713| [131981] CUJO Smart Firewall mdnscap mDNS Packet Double-Free memory corruption
1714| [131916] Wowza Streaming Engine 4.7.4.01 REST API HTTP Request directory traversal
1715| [131857] Insteon Hub 2245-222 up to 1012 PubNub Message HTTP Request Stack-based memory corruption
1716| [131856] Insteon Hub 2245-222 up to 1012 PubNub Message HTTP Request Stack-based memory corruption
1717| [131855] Insteon Hub 2245-222 up to 1012 PubNub Message HTTP Request Stack-based memory corruption
1718| [131811] Cobham Satcom Sailor 800/Satcom Sailor 900 Configuration File Persistent cross site scripting
1719| [131810] Cobham Satcom Sailor 800/Satcom Sailor 900 Configuration File denial of service
1720| [131794] Openwsman up to 2.6.9 openwsmand HTTP Request File directory traversal
1721| [131489] Email Extension Plugin up to 2.64 on Jenkins ExtendedEmailPublisher.java Config memory corruption
1722| [131479] Apache Solr up to 7.6 HTTP GET Request Server-Side Request Forgery
1723| [131340] Alcatel-Lucent I-240W-Q GPON ONT 3FE54567BOZJ19 /GponForm/fsetup_Form HTTP POST Request memory corruption
1724| [131339] Alcatel-Lucent I-240W-Q GPON ONT 3FE54567BOZJ19 HTTP POST Request memory corruption
1725| [131297] Glen Dimplex Deutschland GmbH Carel pCOWeb Configuration Tool Service Port 10000 privilege escalation
1726| [131173] D-Link DIR-878 1.12B01 HTTP Header strncpy memory corruption
1727| [131096] Netis WF2880/WF2411 2.1.36123 HTTP Header /bin/boa GET Request memory corruption
1728| [130870] UA-Parser UAP-Core up to 0.5.x regex.yaml HTTP Header denial of service
1729| [130849] Joomla CMS up to 3.9.2 Global Configuration Stored cross site scripting
1730| [130752] Live555 0.95 Content-Length Header handleRequestBytes HTTP Header memory corruption
1731| [130677] Fortinet FortiOS 5.6.0 SSH Variable Format String
1732| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
1733| [130643] Kentico CMS 10.0.42 SMTP Configuration Page Cleartext information disclosure
1734| [130635] Cisco Aironet Active Sensor Default Configuration Restart denial of service
1735| [130618] libcURL up to 7.63.x lib/vauth/ntlm.c Curl_auth_create_ntlm_type3_message HTTP Header memory corruption
1736| [130612] OpenId Connect Authentication Plugin up to 1.4 on Jenkins config.jelly information disclosure
1737| [130611] Kanboard Plugin up to 1.5.10 on Jenkins KanboardGlobalConfiguration.java GET Request Server-Side Request Forgery
1738| [130609] GitHub Authentication Plugin up to 0.29 on Jenkins config.jelly information disclosure
1739| [130464] Helm ChartMuseum up to 0.8.0 HTTP API POST Request directory traversal
1740| [130388] http-live-simulator up to 1.0.6 URL directory traversal
1741| [130329] Apache HTTP Server 2.4.37 mod_http2 Slowloris denial of service
1742| [129979] Fortinet FortiOS up to 5.6.7/6.0.2 Access Control Credentials information disclosure
1743| [129977] Axway File Transfer Direct 2.7.1 HTTP GET Request directory traversal
1744| [129821] Joomla CMS up to 3.9.1 Global Configuration Stored cross site scripting
1745| [129820] Joomla CMS up to 3.9.1 Global Configuration Stored cross site scripting
1746| [129792] NTPsec up to 1.1.2 ntpd ntp_config.c Request memory corruption
1747| [129717] Oracle Secure Global Desktop 5.4 Apache HTTP Server denial of service
1748| [129573] Oracle WebLogic Server 10.3.6.0 Apache HTTP Server denial of service
1749| [129474] Oracle Communications Diameter Signaling Router up to 8.2 Apache HTTP Server information disclosure
1750| [129762] Juniper Junos Packet Forwarding Engine HTTP Packet Pointer Dereference denial of service
1751| [129757] Juniper Junos Dynamic VLAN Configuration Malformed Packet Loop denial of service
1752| [129749] Oxid eSales 4.10.6 DB Abstraction Layer core/oxconfig.php getRequestParameter() Parameter sql injection
1753| [128847] Job Config History Plugin up to 2.18 on Jenkins Reflected cross site scripting
1754| [128845] Config File Provider Plugin up to 3.1 on Jenkins ConfigFilesManagement.java cross site request forgery
1755| [128836] Cybozu Dezie up to 8.1.2 HTTP Requests directory traversal
1756| [128834] Cybozu Office up to 10.8.1 HTTP Requests directory traversal
1757| [128809] Aterm W300P up to 1.0.13 HTTP Request memory corruption
1758| [128691] Webroot BrightCloud SDK Header bc_http_read_header HTTP Header memory corruption
1759| [128680] MiniShare up to 1.4.1 HTTP POST Request memory corruption
1760| [128679] MiniShare up to 1.4.1 HTTP HEAD Request memory corruption
1761| [128606] Proxygen HTTP2 Priority Setting denial of service
1762| [128578] UCMDB Configuration Management Service up to 2018.11 directory traversal
1763| [128422] Craft CMS up to 3.0.34 craft.app.config.DB.user information disclosure
1764| [128325] Ambit DDW2600/DDW2602/T60C926/U10C019 SNMP Request Credentials information disclosure
1765| [128204] WebID 1.2.2 getthumb.php HTTP GET Request directory traversal
1766| [128146] aio-libs aiohttp-session up to 2.6.0 EncryptedCookieStorage/NaClCookieStorage Cookie weak authentication
1767| [128135] D-Link DIR-816 A2 1.10 form2userconfig.cgi Long Password memory corruption
1768| [127994] WordPress up to 5.0.0 on Apache httpd MIME Restriction cross site scripting
1769| [127898] IBM BigFix Platform up to 9.5.9 Cookie httponly privilege escalation
1770| [127895] IBM BigFix Platform up to 9.5.9 HTTP Response Splitting privilege escalation
1771| [127866] urllib3 up to 1.22 Authorization HTTP Header Credentials information disclosure
1772| [127745] Google Android 9.0 impd_drc_gain_decoder.c impd_init_drc_decode_post_config memory corruption
1773| [127656] Moxa NPort W2x50A up to 2.1 Web Server webSettingProfileSecurity HTTP POST Request privilege escalation
1774| [127655] Moxa NPort W2x50A up to 2.1 Web Server net_WebPingGetValue HTTP POST Request privilege escalation
1775| [127532] IBM Maximo Asset Management 7.6 HTTP Request Username information disclosure
1776| [127456] simplehttpserver up to 0.2.1 directory traversal
1777| [127366] TP-LINK TL-R600VPN HTTP Server Web Request directory traversal
1778| [127374] Modicon M340, Premium, Quantum PLCs and BMXNOR0200 Embedded Web Server HTTP Response Response Splitting privilege escalation
1779| [127297] OCS Inventory NG File Upload HTTP Requests Code Execution
1780| [127268] Cisco Prime License Manager Web Framework HTTP POST Request sql injection
1781| [127261] Node.js up to 6.14.x/8.13.x/10.13.x/10.2.x HTTP Header Slowloris denial of service
1782| [127208] Fortinet FortiOS up to 5.2/5.4.7/5.6.3 Web Pages Uninitialized Memory information disclosure
1783| [127056] PRTG Network Monitor up to 18.2.40 /api/addusers HTTP Request privilege escalation
1784| [127055] PRTG Network Monitor up to 18.2.40 /public/login.htm HTTP Request privilege escalation
1785| [127040] Loadbalancer.org Enterprise VA MAX up to 8.3.2 Apache HTTP Server Log cross site scripting
1786| [126970] ZTE ZXHN F670 V1.1.10P3T18 appviahttp Service information disclosure
1787| [126881] Google Android 9.0 tpdec_asc.cpp AudioSpecificConfig_Parse memory corruption
1788| [126702] PHP-Proxy 5.1.0 config.php information disclosure
1789| [126669] PRTG Network Monitor up to 18.3 HTTP Advanced Sensor HttpAdvancedSensor.exe POST Parameter privilege escalation
1790| [126668] PRTG Network Monitor up to 18.2 PRTG Core Server Service HTTP Request denial of service
1791| [126530] lighttpd up to 1.4.49 mod_alias_physical_handler mod_alias.c directory traversal
1792| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
1793| [126472] Zoho ManageEngine Network Configuration Manager/OpManager up to 12.3.213 ProcessRequest.do GET Request XML External Entity
1794| [126071] Acme mini_httpd up to 1.29 directory traversal
1795| [125841] Advantech WebAccess up to 8.3.2 opcImg.asp HTTP Request memory corruption
1796| [125828] LIVE555 RTSP Server 0.92 HTTP Packet Parser Crafted Packet Stack-based memory corruption
1797| [125726] Cisco Enterprise NFV Infrastructure Software Management Interface HTTP Requests cross site request forgery
1798| [125710] Cisco Wireless LAN Controller Software Web-based Interface HTTP Request information disclosure
1799| [125698] Linksys E1200/E2500 Network Configuration apply.cgi command injection
1800| [125668] D-Link DWR-111 Web Interface HTTP Request directory traversal
1801| [125569] Oracle PeopleSoft Enterprise PeopleTools 8.55/8.56 Apache HTTP Server information disclosure
1802| [125443] Oracle HTTP Server 12.2.1.3 Web Listener memory corruption
1803| [125414] Oracle Configuration Manager 12.1.2.0.2/12.1.2.0.5 Collector of Config and Diag unknown vulnerability
1804| [125186] EpiCentro E_7.3.2+ httpd GET Request memory corruption
1805| [125185] EpiCentro E_7.3.2+ httpd GET Request memory corruption
1806| [124952] wp-slimstat Plugin up to 4.1.6.0 on WordPress HTTP Referer Header cross site scripting
1807| [124931] Cisco HyperFlex HX Data Platform Web-based UI HTTP Requests information disclosure
1808| [124907] Cisco Integrated Management Controller Web Interface HTTP Request information disclosure
1809| [124873] Pivotal Operations Manager up to 1.11.x/2.0.15/2.1.10/2.2.0 Config information disclosure
1810| [124862] Cisco IOS XE Web Framework HTTP Packet memory corruption
1811| [124839] Cisco Data Center Network Manager Web Interface HTTP Request privilege escalation
1812| [124821] Cisco RV180W/RV220W Web Framework HTTP Request directory traversal
1813| [124617] zzcms 8.3 user/ztconfig.php Modify Request directory traversal
1814| [124496] AssoCIateD Postman up to up to 6.3.0 X.509 Certificate Validation HTTPS Request Man-in-the-Middle information disclosure
1815| [124469] Philips e-Alert Unit up to R2.1 HTTP Response Header Banner information disclosure
1816| [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
1817| [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
1818| [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
1819| [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
1820| [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
1821| [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
1822| [124366] Avaya Aura Orchestration Designer 7.2.1 Runtime Config cross site scripting
1823| [124365] Avaya Aura Orchestration Designer 7.2.1 Runtime Config cross site request forgery
1824| [124351] Wallabag 2.2.3 Configuration Page Stored cross site scripting
1825| [124346] Apache Mesos pre-1.4.2/1.5.0/1.5.1/1.6.0 on Executor HTTP API String Comparison validation JSON Web Token information disclosure
1826| [124237] Foscam C1 Indoor HD Camera 2.52.2.43 Web Management Interface HTTP Request memory corruption
1827| [124233] Foscam C1 Indoor HD Camera 2.52.2.43 Web Management Interface HTTP Request command injection
1828| [124214] Circontrol CirCarLife/PowerStudio Open Charge Point Protocol config.xml information disclosure
1829| [124159] Oracle WebCenter Interaction Portal 10.3.3 Session Cookie httponly privilege escalation
1830| [124139] Foscam C1 Indoor HD Camera 2.52.2.43 Recovery Procedure HTTP Request privilege escalation
1831| [124133] Insteon Hub 1012 HTTP Server GET Parameter information disclosure
1832| [124081] D-Link DIR-816 A2 1.10 B05 /goform/sylogapply handler HTTP Request command injection
1833| [124077] LG SuperSign CMS Service Port 9080 reboot HTTP Request denial of service
1834| [123905] xunfeng 0.2.0 views/lib/AntiCSRF.py HTTP Header cross site request forgery
1835| [123754] OctoPrint up to 1.3.9 Service Port 8081 HTTP Requests privilege escalation
1836| [123644] Fortinet FortiOS up to 5.4.9/6.0.1 RSA PKCS #1 v1.5 Man-in-the-Middle weak encryption
1837| [123643] Fortinet FortiOS up to 5.4.9/6.0.1 RSA PKCS #1 Man-in-the-Middle weak encryption
1838| [123600] Fortinet FortiManager up to 6.0.1 Interface information disclosure
1839| [123537] Gogs 0.11.53 HTTP GET Request Server-Side Request Forgery
1840| [123464] simplehttpserver up to 0.2.0 Listing directory traversal
1841| [123379] Cybrotech CyBroHttpServer 1.0.3 URI directory traversal
1842| [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
1843| [123336] D-Link DIR-615 HTTP Header memory corruption
1844| [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
1845| [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
1846| [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
1847| [123279] ASUSTOR Data Master up to 3.1.5 Configuration File cross site scripting
1848| [123204] D-Link EyeOn Baby Monitor DCS-825L 1.08.1 Web Service Framework HTTP Requests command injection
1849| [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
1850| [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
1851| [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
1852| [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
1853| [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
1854| [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
1855| [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
1856| [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
1857| [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
1858| [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
1859| [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
1860| [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
1861| [123159] MikroTik RouterOS up to 6.40.8/6.42.6 HTTP Server HTTP POST Request Memory Exhaustion denial of service
1862| [123156] Insteon Hub 2245-222 1012 PubNub Service HTTP Request Stack-based memory corruption
1863| [122914] HPE XP P9000 Command View Advanced Edition up to 8.5.x Device Manager/Configuration Manager information disclosure
1864| [122911] Sony IPELA E Network Camera G5 1.87.00 GET Request HTTP Request command injection
1865| [122808] Zipato Zipabox Smart Home Controller Board Rev 1 118 Configuration Storage privilege escalation
1866| [122790] IBM UrbanCode Deploy up to 6.9.6.0 Configuration information disclosure
1867| [122650] Insteon Hub up to 1012 PubNub Service HTTP Request Stack-based memory corruption
1868| [122649] Insteon Hub up to 1012 PubNub Message HTTP Request Stack-based memory corruption
1869| [122581] OCS Inventory 2.4.1 XML Parser HTTP Request privilege escalation
1870| [122593] PHP up to 7.0.26/7.1.12/7.2.0 http_fopen_wrapper.c HTTP Response memory corruption
1871| [122545] SAP BPC Reporting HTTP Requests XML External Entity
1872| [122544] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1873| [122543] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1874| [122542] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1875| [122541] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1876| [122540] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1877| [122539] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1878| [122538] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1879| [122537] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1880| [122536] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1881| [122535] Insteon Hub 1012 HTTP Server HTTP Request memory corruption
1882| [122534] Insteon Hub 1012 HTTP Server HTTP GET Request Stack-based memory corruption
1883| [122533] Insteon Hub 1012 HTTP Server HTTP GET Request memory corruption
1884| [122532] Insteon Hub 1012 HTTP Server HTTP GET Request memory corruption
1885| [122501] TraceTronic ECU-TEST Plugin up to 2.3 on Jenkins ATXPublisher.java HTTP Requests Server-Side Request Forgery
1886| [122471] Ceph 1.3.x Object Gateway HTTP Requests CORS denial of service
1887| [122217] EAP up to 7.0.8 Configuration File information disclosure
1888| [122199] F5 BIG-IP up to 11.6.3.2/12.1.3.6/13.0.1 HTTP Health Monitor unknown vulnerability
1889| [122106] Jenkins up to 2.121.1/2.132 Stapler Web Framework Stapler.java HTTP Requests directory traversal
1890| [122017] IBM Sterling B2B Integrator up to 5.2.6 HTTP Requests information disclosure
1891| [121953] Wireshark up to 2.6.1 HTTP2 Dissector packet-http2.c Packet denial of service
1892| [121870] Oracle Sun ZFS Storage Appliance Kit (AK) up to 8.7.17 HTTP Data Path Subsystems unknown vulnerability
1893| [121736] Oracle Hospitality OPERA 5 Property Services 5.5.x Report Server Config unknown vulnerability
1894| [121729] Oracle Hospitality Reporting and Analytics 9.0.0 Configuration unknown vulnerability
1895| [121540] Play Framework 2.6.12/2.6.13/2.6.14/2.6.15 on Windows Assets Controller HTTP Requests directory traversal
1896| [121514] Fortinet FortiManager/FortiAnalyzer up to 5.6.4/6.0.0 Certificates cross site scripting
1897| [121481] VelotiSmart WiFi B-380 Camera 1.0.0 uc-http Service directory traversal
1898| [121447] Imagely NextGEN Gallery up to 2.1.56 on WordPress HTTP POST Request privilege escalation
1899| [121194] Intel Manageability Engine up to 11.x Active Management Technology HTTP Request memory corruption
1900| [120438] Fortinet FortiOS up to 6.0.0 Single Sign-On information disclosure
1901| [120282] SICLOCK TC100/TC400 Configuration File Password weak encryption
1902| [120152] ECESSA ShieldLink SL175EHQ 10.7.4 util_configlogin_act cross site request forgery
1903| [120033] Fortinet FortiManager/FortiAnalyzer up to 6.0.0 FortiView PDF Document Open Redirect
1904| [120032] Fortinet FortiManager/FortiAnalyzer up to 6.0.0 Access Control privilege escalation
1905| [119992] AXIS IP Camera httpd memory corruption
1906| [119982] Configuration as Code Plugin up to 0.7-alpha on Jenkins DataBoundConfigurator.java information disclosure
1907| [119981] Configuration as Code Plugin up to 0.7-alpha on Jenkins ConfigurationAsCode.java information disclosure
1908| [119975] Openstack Cloud Plugin up to 2.35 on Jenkins BootSource.java HTTP Requests information disclosure
1909| [119967] Trovebox up to 4.0.0-rc6 Password Reset HTTP Request privilege escalation
1910| [119966] Trovebox up to 4.0.0-rc6 HTTP Request Server-Side Request Forgery
1911| [119962] Wekan 1.04.0 HTTP Request User information disclosure
1912| [119864] NuCom WR644GACV Config information disclosure
1913| [119842] Spring Framework up to 4.3.17/5.0.6 MVC HTTP Request cross site scripting
1914| [119841] IPConfigure Orchid Core VMS 2.0.5 directory traversal
1915| [119837] DIGISOL DG-BR4000NG Authorization Header HTTP Header memory corruption
1916| [119811] MISP 2.4.92 Brute-Force Protection UsersController.php HTTP PUT Request privilege escalation
1917| [119764] Cisco FXOS/UCS Fabric Interconnect Software Web UI HTTP Packet memory corruption
1918| [119747] Cisco NX-OS NX-API Subsystem HTTP Packet memory corruption
1919| [119690] Mongoose 6.11 HTTP Request mongoose.c mbuf_insert memory corruption
1920| [119676] Linaro Lava Submit Page HTTP Request File information disclosure
1921| [119660] PortSwigger Burp Suite Community Edition 1.7.32/1.7.33 Server Certificate Validator HTTPS Request Man-in-the-Middle weak encryption
1922| [119658] Pulp up to 2.16.1 API override_config information disclosure
1923| [119595] McAfee ePolicy Orchestrator up to 5.9.1 Application Protection HTTP Request privilege escalation
1924| [119545] Huawei HG255s-10 V100R001C163B025SP02 HTTP Requests directory traversal
1925| [119437] Microsoft Windows up to Server 2016 HTTP Protocol Stack Http.sys memory corruption
1926| [119376] McAfee Network Security Management up to 8.2.7 Web Interface HTTP Request privilege escalation
1927| [119280] XiongMai uc-httpd 1.0.0 memory corruption
1928| [119218] https-proxy-agent up to 2.1.0 on Node.js JSON Parameter Memory Leak denial of service
1929| [119215] https-proxy-agent on Node.js Memory Leak denial of service
1930| [119195] angular-http-server on Node.js URL directory traversal
1931| [119152] 360class.jansenhm on Node.js URL directory traversal
1932| [119121] fast-http-cli on Node.js URL directory traversal
1933| [119101] http_static_simple on Node.js URL directory traversal
1934| [119096] HTTP Client Module on Node.js ZIP Archive Memory Consumption denial of service
1935| [119065] tiny-http on Node.js URL directory traversal
1936| [119062] iter-http on Node.js URL directory traversal
1937| [119009] ABB IP Gateway up to 3.39 Configuration File Password weak encryption
1938| [118985] Jenkins up to 2.120/LTS 2.107.2 ZipExtractionInstaller.java HTTP GET Request Server-Side Request Forgery
1939| [118974] GitHub Plugin up to 1.29.0 on Jenkins GitHubPluginConfig.java GET Request Server-Side Request Forgery
1940| [118973] GitHub Plugin up to 1.29.0 on Jenkins GitHubServerConfig.java information disclosure
1941| [118904] Http-proxy up to 0.6.x on Node.js Error Crash denial of service
1942| [118634] F5 BIG-IP up to 11.2.1/11.5.5/11.6.3.1/12.1.2/13.0.0 Configuration Utility information disclosure
1943| [118617] Nikto up to 2.1.6 CSV Report HTTP Response Header privilege escalation
1944| [118483] Fortinet FortiAuthenticator 5.3.0 Referer Header cross site scripting
1945| [118220] HAProxy up to 1.8.9 Authorization Header proto_http.c check_request_for_cacheability information disclosure
1946| [118123] Trend Micro Email Encryption Gateway 5.5 formConfiguration sql injection
1947| [117947] Phoenix Contact FL SWITCH 3xxx/FL SWITCH 4xxx/FL SWITCH 48xx up to 1.33 Configuration File information disclosure
1948| [117782] Intelbras NCLOUD 300 1.0 ExportSettings.sh HTTP POST Request weak authentication
1949| [117769] Jenkins 2.32.1/2.43 Remote API Config information disclosure
1950| [117662] D-Link DIR-816 A2 CN 1.10B05 GoAhead Web Server websRedirect HTTP Host Header memory corruption
1951| [117410] Fortinet FortiWLC 8.3.3 Default Credentials weak authentication
1952| [117409] Fortinet FortiWLC up to 7.0.11 Default Credentials weak authentication
1953| [117403] Liferay up to 6.2.x FCKeditor Configuration browser.html privilege escalation
1954| [117347] Apache Ambari up to 2.6.1 HTTP Request directory traversal
1955| [117212] 389 Directory Server up to 1.3.5 LDAP Service uiduniq.c uniqueness_entry_to_config() denial of service
1956| [117202] Wavpack up to 5.1.0 W64 Parser wave64.c ParseWave64HeaderConfig memory corruption
1957| [117200] Wavpack up to 5.1.0 WAV riff.c ParseRiffHeaderConfig memory corruption
1958| [117198] Wavpack up to 5.1.0 WAV Parser riff.c ParseRiffHeaderConfig memory corruption
1959| [117179] CMS Made Simple up to 2.2.7 Admin Dashboard config.php Directory privilege escalation
1960| [117164] Edimax IC-3140W/5150W/IC-6220DC getsysyeminfo.cgi strcpy() HTTP Request memory corruption
1961| [117148] Fortinet FortiClient weak encryption
1962| [117054] GNOME libsoup 2.58 HTTP Request Stack-based memory corruption
1963| [117046] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request command injection
1964| [117045] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request command injection
1965| [116954] Ericsson-LG iPECS NMS A.1Ac HTTP POST Request information disclosure
1966| [116923] Belkin N750 1.10.22 HTTP Request proxy.cgi memory corruption
1967| [116884] Cisco MATE Live Web Interface HTTP Requests information disclosure
1968| [116586] Schneider Electric BMXNOR0200 Request Parser HTTP Request Code Execution
1969| [116564] gunicorn 19.4.5 gunicorn/http/wsgi.py process_headers HTTP Header privilege escalation
1970| [116561] Fyodor Nmap up to 7.60 http-fetch directory traversal
1971| [116443] Google Android on Qualcomm XPU Config memory corruption
1972| [116322] Mautic up to 2.12.x Theme Config File Stored cross site scripting
1973| [116311] Nagios XI up to 5.2.x/5.4.12 Core Config Manager Parameter sql injection
1974| [116310] Nagios XI up to 5.2.x/5.4.12 Core Config Manager sql injection
1975| [116818] Oracle Sun ZFS Storage Appliance Kit up to 8.7.16 HTTP data path subsystems information disclosure
1976| [116815] Oracle Sun ZFS Storage Appliance Kit up to 8.7.16 HTTP data path subsystems denial of service
1977| [116790] Oracle Retail Insights 14.0/14.1/15.0/16.0 ODI Configuration unknown vulnerability
1978| [116700] Oracle HTTP Server 12.1.3/12.2.1.2 OSSL Module information disclosure
1979| [116680] Oracle Real-Time Decisions (RTD) Solutions 3.2.0.0.0 Configuration unknown vulnerability
1980| [116309] Appear TV XC5000/XC5100 3.26.217 Web Server HTTP GET Request directory traversal
1981| [116302] TIBCO JasperReports up to 6.4.2 Spring Web Flows Configuration File privilege escalation
1982| [116218] CyberArk Password Vault Web Access up to 9.9.4 REST API HTTP Header privilege escalation
1983| [116140] Kaazing Gateway/Gateway JMS Edition 4.0.2/4.0.3/4.0.4 WebSocket HTTP Request Response Splitting information disclosure
1984| [116100] ubiQuoss VP5208A /cgi-bin/bcm_password HTTP Request information disclosure
1985| [115924] Zabbix Server 2.4.x iConfig Proxy Request information disclosure
1986| [115904] Moxa MXView 2.8 Private Key HTTP GET Request information disclosure
1987| [115757] Google Android up to 8.1 tpdec_asc.cpp CProgramConfig_ReadHeightExt memory corruption
1988| [115670] D-Link DSL-3782 1.01 Diagnostics /userfs/bin/tcapi Diagnostics_Entry HTTP Request memory corruption
1989| [115665] Ruby up to 2.2.9/2.3.6/2.4.3/2.5.0 WEBrick Server HTTP Request Memory Consumption denial of service
1990| [115496] SickRage HTTP Response Credentials information disclosure
1991| [115232] Google Android msm_ispif_config_stereo() Parameter memory corruption
1992| [114947] IBM Jazz Foundation HTTP Request information disclosure
1993| [114926] Geutebruck G-Cam EFD-2250/Topline TopFD-2125 Access Control Config information disclosure
1994| [114803] Fortinet FortiWeb 5.6.0 Access Control Cookie privilege escalation
1995| [114689] Dell Storage Manager up to 16.3.19 EMConfigMigration directory traversal
1996| [114628] Webmin 1.840/1.880 Default Configuration /etc/shadow GET Request information disclosure
1997| [114463] ajenti 2 /etc/ajenti/config.yml information disclosure
1998| [114395] brianleroux tiny-json-http SSL Certificate Validator Man-in-the-Middle weak authentication
1999| [114369] Flexense SyncBreeze Enterprise 10.6.24 Web Server syncbrs.exe HTTP Requests memory corruption
2000| [114341] WebLog Expert Web Server Enterprise 9.4 Service Port 9991 HTTP Accept Header Crash denial of service
2001| [114056] Wowza Streaming Engine up to 4.7.0 HTTP Request directory traversal
2002| [114018] NetIQ Identity Manager up to 4.5 XML Config Password information disclosure
2003| [113991] PHP up to 5.6.33/7.0.27/7.1.14/7.2.2 http_fopen_wrapper.c php_stream_url_wrap_http_ex HTTP Response memory corruption
2004| [113988] Tenda Ac9 V15.03.05.14_EN httpd Stack-based memory corruption
2005| [113985] Wowza Streaming Engine up to 4.7.0 HTTP Request Memory Consumption denial of service
2006| [113650] wpa_supplicant up to 2.5 Network Configuration eap_peer/eap_pwd.c eap_pwd_perform_confirm_exchange denial of service
2007| [113649] wpa_supplicant up to 2.5 Network Configuration eap_peer/eap_pwd.c eap_pwd_process EAP-pwd Message denial of service
2008| [113602] FSX-P3Dv4 Installer 2.0.1.231 HTTP Traffic Cleartext information disclosure
2009| [126696] Thomson TCW710 ST5D.10.05 /goform/RGFirewallEL POST Request cross site scripting
2010| [113601] Wavpack 5.1.0 CAF File cli/caff.c ParseCaffHeaderConfig memory corruption
2011| [113600] Wavpack 5.1.0 DSDIFF File cli/dsdiff.c ParseDsdiffHeaderConfig memory corruption
2012| [113599] Anchor 0.12.3 Error Log config/error.php information disclosure
2013| [113553] iDashboards 9.6b idb/config Request information disclosure
2014| [113552] iDashboards 9.6b idashboards/config.xml Request information disclosure
2015| [113481] Jenkins up to 2.106/LTS 2.89.3 HTTP GET Request information disclosure
2016| [113382] Huawei DP300/RP200/TE30/TE40/TE50/TE60/TX50 HTTP Message memory corruption
2017| [113381] Huawei DP300/RP200/TE30/TE40/TE50/TE60/TX50 HTTP Message memory corruption
2018| [113380] Huawei DP300/RP200/TE30/TE40/TE50/TE60/TX50 HTTP Message memory corruption
2019| [113350] Smiths-Medical Medfusion 4000 Wireless Syringe Infusion Pump 1.1 Network Configuration Default Credentials weak authentication
2020| [113348] Smiths-Medical Medfusion 4000 Wireless Syringe Infusion Pump 1.1/1.5/1.6 Configuration File Password information disclosure
2021| [113050] Fortinet FortiWeb up to 4.4.3 validate cross site scripting
2022| [112984] Cisco RV132W 1.0.1.11 Web Interface HTTP Request memory corruption
2023| [112981] Cisco Unified Communications Manager Web Framework HTTP Requests sql injection
2024| [112920] Saifor CVMS HUB 1.3.1 HTTP Parameter secciones.xhtml sql injection
2025| [112896] Wavpack 5.1.0 RF64 File cli/riff.c ParseRiffHeaderConfig Header memory corruption
2026| [112878] mini_httpd/thttpd htpasswd memory corruption
2027| [112793] edX Configuration Report Page Account spoofing
2028| [112747] Atlassian Bamboo up to 6.3.0 saveConfigureSecurity cross site request forgery
2029| [113803] uTorrent Web HTTP RPC Server privilege escalation
2030| [112675] Asus AsusWRT up to 3.0.0.4.376.x HTTPd Server memory corruption
2031| [112650] BMC Track-It! up to 11.4 HF2 ConfigurationService Credentials information disclosure
2032| [112508] Email Subscribers & Newsletters Plugin up to 3.4.7 on WordPress HTTP POST User information disclosure
2033| [112434] SugarCRM Community Edition up to up to 6.5.26 Configurator Tracker.php Parameter sql injection
2034| [112405] RAVPower FileHub 2.000.056 HTTP Request information disclosure
2035| [112400] libcURL up to 7.57.0 HTTP Header HTTP Requests information disclosure
2036| [112398] libcURL up to 7.57.0 HTTP2 Out-of-Bounds memory corruption
2037| [112253] Apache Hadoop up to 0.23.x/2.7.4/2.8.2 MapReduce Job History Server Configuration File privilege escalation
2038| [112191] Cisco Switch Web Framework HTTP Response Splitting privilege escalation
2039| [112028] Oracle HTTP Server Web Listener denial of service
2040| [112022] Oracle HTTP Server Web Listener information disclosure
2041| [111945] Asus Router AsusWRT-Merlin router/httpd/web.c ej_update_variables Variable memory corruption
2042| [111936] Master IPCAMERA01 3.3.4.2103 HTTP Request information disclosure
2043| [111934] Master IPCAMERA01 3.3.4.2103 Config restore.cgi privilege escalation
2044| [111897] Open On-Chip Debugger 0.10.0 Service Port 4444 HTTP POST Request privilege escalation
2045| [111709] Yawcam up to 0.6.0 HTTP Server directory traversal
2046| [111707] Palo Alto PAN-OS up to 8.0.6 Captive Portal Config cross site scripting
2047| [111339] Inteno iopsys 2.0-3.14/4.0 Configuration /etc/uci-defaults Directory privilege escalation
2048| [111297] Commsy 9.0.0 Configuration Import XML External Entity
2049| [111242] rust-base64 up to 0.5.1 encode_config_buf/encode_config memory corruption
2050| [111226] FLIR Brickstream 2300 4.1.53.166 Access Control getConfigExportFile.cgi information disclosure
2051| [111181] NetTransport Download Manager up to 2.96L NetTransport.exe HTTP Response memory corruption
2052| [111053] GetGo Download Manager up to 5.3.0.2712 HTTP Server memory corruption
2053| [110968] Piwigo 2.9.2 Configuration /admin.php cross site request forgery
2054| [110814] Piwigo 2.9.2 admin/configuration.php cross site request forgery
2055| [110734] ACTi Camera A1D-500-V6.11.31-AC HTTP GET information disclosure
2056| [110719] Meinberg Lantime up to 6.24 Web Configuration Utility directory traversal
2057| [110718] Meinberg Lantime up to 6.24 Web Configuration Utility cgi-bin/mainv2 Parameter information disclosure
2058| [110717] Mckesson Conserus Workflow Intelligence 2.0.2 HTTP GET Request weak authentication
2059| [110715] Fortinet FortiClient up to 5.6.0 information disclosure
2060| [110705] Fortinet FortiClient up to 5.4.3/5.5.x on Windows Security Alert privilege escalation
2061| [110704] Rapid7 Nexpose up to 6.4.65 Web Application HTTP Requests cross site request forgery
2062| [110670] vBulletin up to 5.3.x on Windows HTTP Request directory traversal
2063| [110672] Fortinet FortiOS up to 5.2/5.4.2/5.6.2 SSL VPN Web Portal Session information disclosure
2064| [110470] puppet up to 3.6.1 Configuration File Revoked Certificate information disclosure
2065| [110437] Adobe Experience Manager 6.0/6.1/6.2/6.3 Token HTTP GET Request information disclosure
2066| [110336] Fossil up to 2.3 SSH Sync Protocol http_transport.c Hostname privilege escalation
2067| [110238] Dell Storage Manager up to 16.3.19 SMI-S Service HTTP Requests denial of service
2068| [110186] ZKTime Web 2.0.1.12280 Modify Password password_change() HTTP Request cross site request forgery
2069| [110108] Restlet Framework up to 2.3.11 REST API HTTP Request XML External Entity
2070| [110107] Restlet Framework up to 2.3.10 SimpleXMLProvider REST API HTTP Request XML External Entity
2071| [110081] Cisco Secure Access Control System Web Interface HTTP Requests information disclosure
2072| [110075] Cisco Data Center Network Manager Configuration Parameter cross site scripting
2073| [110074] Cisco Data Center Network Manager Configuration Parameter cross site scripting
2074| [110073] Cisco Data Center Network Manager Configuration Parameter cross site scripting
2075| [110072] Cisco Data Center Network Manager Configuration Parameter cross site scripting
2076| [110071] Cisco Data Center Network Manager Configuration Parameter cross site scripting
2077| [110048] Fortinet FortiWebManager 5.8.0 Access Control weak authentication
2078| [110047] Fortinet FortiOS 5.0/5.2.12/5.4.6/5.6.2 Web Portal Parameter cross site scripting
2079| [109978] TP-LINK TL-WVR/TL-WAR/TL-ER/TL-R uhttpd cgi-bin/luci HTTP Header information disclosure
2080| [109879] Huawei HedEx Configuration File Stored cross site scripting
2081| [109856] Fortinet FortiWeb webUI Certificate View Page up to 5.7.1/5.8.0 Cert Import Stored cross site scripting
2082| [109484] Varnish HTTP Cache up to 4.1.8/5.2.0 cache_fetch.c vbf_stp_error information disclosure
2083| [109404] b3log Symphony 2.2.0 Admin Console AdminProcessor.java HTTP Header cross site scripting
2084| [109326] Ulterius up to 1.8.4 HTTP Server HttpServer.cs Process directory traversal
2085| [109259] SuSEfirewall2 up to 3.6.312-2.13.0 on SuSE Linux portmap Service Bypass privilege escalation
2086| [109205] Cesanta Mongoose 6.8 HTTP Server HTTP POST Request Use-After-Free memory corruption
2087| [109227] Fortinet FortiOS up to 5.2.11/up to 5.4.5/5.6.0 Reflected cross site scripting
2088| [108907] Cisco WebEx Meetings Server HTTP Header Reply HTTP Response information disclosure
2089| [108868] SSH Plugin on Jenkins Configuration File Password weak encryption
2090| [108795] Apache Traffic Server up to 5.3.0 HTTP2 set_dynamic_table_size memory corruption
2091| [108738] Fortinet FortiOS up to 5.6.0 WebUI Parameter cross site scripting
2092| [108711] Fortinet FortiOS up to 5.4.5 Web API Parameter denial of service
2093| [108657] GNU wget up to 1.19.1 HTTP Chunk Size src/retr.c fd_read_body memory corruption
2094| [108656] GNU wget up to 1.19.1 HTTP Chunk Size src/http.c skip_short_body memory corruption
2095| [108593] Redis up to 3.2.6 networking.c HTTP Request privilege escalation
2096| [108580] phpMyFAQ up to 2.9.8 admin/ajax.config.php cross site request forgery
2097| [108269] Cisco Network Analysis Module Web Interface HTTP Requests directory traversal
2098| [108250] Oracle Secure Global Desktop 5.3 Apache HTTP Server memory corruption
2099| [108100] Oracle HTTP Server OSSL Module information disclosure
2100| [108096] Oracle HTTP Server 11.1.1.9.0/12.1.3.0.0 Web Listener information disclosure
2101| [108091] Oracle HTTP Server Web Listener information disclosure
2102| [108037] Oracle Advanced Outbound Telephony 12.2.3/12.2.4/12.2.5/12.2.6/12.2.7 Setup/Configuration unknown vulnerability
2103| [108036] Oracle Advanced Outbound Telephony 12.2.3/12.2.4/12.2.5/12.2.6/12.2.7 Setup/Configuration unknown vulnerability
2104| [107848] Juniper Junos on SRX HTTPS Certificate Validator Man-in-the-Middle weak authentication
2105| [107806] EMC Network Configuration Manager 9.3.x/9.4.0.x/9.4.1.x/9.4.2.x Reflected cross site scripting
2106| [107554] http gem up to 0.7.2 on Ruby Hostname Validator SSL Connection weak authentication
2107| [107489] Cisco License Manager Web Interface HTTP Request directory traversal
2108| [107474] Jenkin Datadog Plugin Config information disclosure
2109| [107462] Google Go 1.6.3/1.7.3 net-http RequestParseMultipartForm File Descriptor denial of service
2110| [107305] Intelbras WRN 150 Configuration File RouterCfm.cfg Request information disclosure
2111| [107286] EGroupware Community Edition up to 16.1 HTTP Header Stored cross site scripting
2112| [107265] Multitech FaxFinder up to 4.1.1 LDAP Configuration Page Password information disclosure
2113| [107181] FFmpeg up to 3.3.3 SDP File rtpdec_h264.c sdp_parse_fmtp_config_h264 Parameter memory corruption
2114| [106968] Pure-FTPd 1.0.46-1 on Fedora Config privilege escalation
2115| [106931] Cisco Unified Customer Voice Portal 10.5 OAMP Reset HTTP Request privilege escalation
2116| [106867] Polycom RealPresence Resource Manager up to 8.3 Session Identifier HTTP GET Request information disclosure
2117| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
2118| [106644] tcpdump up to 4.9.1 PPP Parser print-ppp.c print_ccp_config_options() memory corruption
2119| [106546] Axesstel MU553S MU55XS-V1.14 cgi-bin/ConfigSet cross site request forgery
2120| [106229] dayrui FineCMS 5.0.11 controllers/Form.php call_msg HTTP Header cross site scripting
2121| [106184] FiberHome AN1020-25 Default Configuration /restoreinfo.cgi denial of service
2122| [106183] Lexmark Scan To Network up to 3.2.9 Network Configuration snfDestServlet Request information disclosure
2123| [106154] Froxlor up to 0.9.33.1 Default Configuration /logs/sql-error.log information disclosure
2124| [105734] D-Link DNR-320L/DNS-320LW/DNR-322L/DNR-326/DNS-327L HTTP Header login_mgr.cgi memory corruption
2125| [105423] Cisco WebEx Meetings Server 1.0.0.30/1.0.0.33/1.0.1.9/1.0.1.16 Web Interface HTTP Response information disclosure
2126| [105231] Fortinet FortiManager up to 5.0.10/5.2.1 Parameter sql injection
2127| [105230] Fortinet FortiManager up to 5.0.10/5.2.1 Parameter cross site scripting
2128| [105229] Fortinet FortiManager up to 5.0.10/5.2.1 File information disclosure
2129| [105219] Apache Tomcat up to 8.5.15/9.0.0.M21 HTTP2 Bypass directory traversal
2130| [105216] Fortinet FortiWeb up to 5.8.2 HTML Source Code Password information disclosure
2131| [105205] Apache CXF up to 3.0.11/3.1.8 HTTP Transport Module Parameter cross site scripting
2132| [105191] Asus RT-N300 up to 380.67_0RT-AC5300 httpd HTTP GET Request Stack-based memory corruption
2133| [105135] Novell ZENworks Configuration Management Preboot Policy Service Stack-based memory corruption
2134| [105134] Novell ZENworks Configuration Management Variable information disclosure
2135| [105133] Novell ZENworks Configuration Management Rtrlet.class ShowLogins Variable information disclosure
2136| [105132] Novell ZENworks Configuration Management FileViewer Variable information disclosure
2137| [105131] Novell ZENworks Configuration Management ScheduleQuery sql injection
2138| [105130] Novell ZENworks Configuration Management doPost directory traversal
2139| [105129] Novell ZENworks Configuration Management GetReRequestData sql injection
2140| [105214] Fortinet FortiOS 5.4.4/5.6.0 IKE VendorID Packet Version information disclosure
2141| [104960] Loginizer Plugin up to 1.3.5 on WordPress HTTP Header sql injection
2142| [104723] Trend Micro Deep Discovery Director 1.1 Configuration Console command injection
2143| [105287] Fortinet FortiOS up to 5.6.0 cross site scripting
2144| [105286] Fortinet FortiOS up to 5.6.0 cross site scripting
2145| [105285] Fortinet FortiOS 5.4.0/5.5.0/5.6.0 cross site scripting
2146| [104417] Fortinet FortiWLM up to 8.3.0 Upgrade Account Default Credentials weak authentication
2147| [104309] D-Link DIR-600M form2userconfig.cgi Parameter cross site scripting
2148| [103987] Oracle Retail Customer Insights 15.0/16.0 ODI Configuration unknown vulnerability
2149| [103963] Oracle Hospitality Inventory Management 8.5.1/9.0.0 Settings and Config unknown vulnerability
2150| [103835] Oracle Configuration Manager up to 12.1.2 Installation unknown vulnerability
2151| [103779] Geneko GWR Configuration File directory traversal
2152| [103593] Oracle GlassFish Server Open Source Edition 4.1 HTTP GET Request directory traversal
2153| [103557] Foreman up to 1.8.x HTTP Redirect weak encryption
2154| [103521] Apache HTTP Server 2.4.26 HTTP2 Free memory corruption
2155| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
2156| [103410] FineCMS Logging HTTP Request Stored cross site scripting
2157| [103441] Microsoft Windows up to Server 2016 Object HTTP.sys information disclosure
2158| [103292] Etherpad up to 1.1.1 HTTP API Request node/utils/Minify.js directory traversal
2159| [103275] FineCMS HTTP Host Header get_image_data.php Server-Side Request Forgery
2160| [102926] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request memory corruption
2161| [102925] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface pureftpd.passwd HTTP Request privilege escalation
2162| [102924] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request Shell privilege escalation
2163| [102923] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request Shell privilege escalation
2164| [102922] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request Shell privilege escalation
2165| [102921] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request Shell privilege escalation
2166| [102920] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request privilege escalation
2167| [102919] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request privilege escalation
2168| [102904] sthttpd up to 2.27.0 libhttpd.c de_dotdot Filename memory corruption
2169| [102891] FFmpeg up to 2.8.11/3.0.7/3.1.7/3.2.4/3.3.0 HTTP Live Streaming Filename Extension Name information disclosure
2170| [102865] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request privilege escalation
2171| [102864] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request privilege escalation
2172| [102863] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request privilege escalation
2173| [102851] Zoho ManageEngine Firewall Analyzer up to 7.x directory traversal
2174| [102782] Vivotek IB8369/FD8164/FD816BA Web Service downloadMedias.cgi HTTP Request directory traversal
2175| [102774] IBM Sterling B2B Integrator Standard Edition 5.2 HTTP GET Request information disclosure
2176| [102772] IBM Sterling B2B Integrator Standard Edition 5.2 HTTP information disclosure
2177| [102721] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request memory corruption
2178| [102720] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request memory corruption
2179| [102719] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request directory traversal
2180| [102718] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request Shell privilege escalation
2181| [102717] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface HTTP Request command injection
2182| [102716] Foscam C1 Indoor HD Camera Web Management Interface HTTP Request Stack-based memory corruption
2183| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
2184| [102697] Apache HTTP Server 2.2.24/2.2.32 HTTP Strict Parsing ap_find_token Request Header memory corruption
2185| [102572] Fortinet FortiOS up to 5.4.4 cross site scripting
2186| [102571] Fortinet FortiOS 5.4.0/5.4.1/5.4.2/5.4.3/5.4.4 cross site scripting
2187| [102340] Red Hat QuickStart Cloud Installer engine-DC-config.py information disclosure
2188| [101836] Open vSwitch 2.6.1 Firewall lib/conntrack.c extract_l3_ipv6/extract_l4_tcp/extract_l4_udp IP Packet memory corruption
2189| [101809] Fortinet FortiPortal up to 4.0.0 Password Recovery information disclosure
2190| [101807] Fortinet FortiPortal up to 4.0.0 Open Redirect
2191| [101806] Fortinet FortiPortal up to 4.0.0 Add Revision Backup cross site scripting
2192| [101805] Fortinet FortiPortal up to 4.0.0 Password Management information disclosure
2193| [101804] Fortinet FortiPortal up to 4.0.0 Access Control getAdomVersion privilege escalation
2194| [101801] Fortinet FortiWLC-SD up to 8.2.4 CLI Command privilege escalation
2195| [101800] Fortinet FortiWeb 5.7.1 Publisher cross site scripting
2196| [101796] Fortinet FortiOS 5.4.3 FortiClient SSL_VPN Linux privilege escalation
2197| [101795] Fortinet FortiOS 5.4.2 FortiClient SSL_VPN Linux privilege escalation
2198| [101745] Trend Micro ServerProtect for Linux 3.0 Update HTTP weak authentication
2199| [101737] Open vSwitch 2.7.0 OFP Message lib/ofp-util.c ofputil_pull_queue_get_config_reply10 memory corruption
2200| [101642] Vanilla Forums up to 2.3.0 Password Reset class.email.php from HTTP Host Header information disclosure
2201| [101561] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
2202| [101560] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
2203| [101559] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
2204| [101558] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
2205| [101557] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
2206| [101556] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
2207| [101554] Cisco Prime Collaboration Provisioning up to 11.0 Role-Based Access Control HTTP Requests directory traversal
2208| [101553] Cisco Prime Collaboration Provisioning up to 11.0 Role-Based Access Control HTTP Requests directory traversal
2209| [101552] Cisco Prime Collaboration Provisioning up to 12.0 Role-Based Access Control HTTP Requests directory traversal
2210| [101529] PlaySMS 1.4 Phonebook Import import.php HTTP Header privilege escalation
2211| [101527] Secure Bytes Secure Cisco Auditor 3.0 Cisco Configuration Manager directory traversal
2212| [101484] WordPress up to 4.7.4 HTTP Class Open Redirect
2213| [101483] WordPress up to 4.7.4 XML-RPC API HTTP POST Request privilege escalation
2214| [101480] WordPress up to 4.7.4 XML-RPC API HTTP POST Request unknown vulnerability
2215| [101474] Cisco Prime Collaboration Provisioning up to 12.0 Web Interface HTTP Request weak authentication
2216| [101473] Cisco Prime Collaboration Provisioning up to 10.6 Web Interface HTTP Request information disclosure
2217| [101439] McAfee Network Data Loss Prevention 9.3.x Web Server HTTP Method information disclosure
2218| [101438] McAfee Network Data Loss Prevention 9.3.x HTTP Response Header Clickjacking privilege escalation
2219| [101436] McAfee Network Data Loss Prevention 9.3.x HTTP Response Header Banner information disclosure
2220| [101435] McAfee Network Data Loss Prevention 9.3.x HTTP Request information disclosure
2221| [101434] McAfee Network Data Loss Prevention 9.3.x HTTP Header cross site scripting
2222| [101428] Authconfig 6.2.8 SSSD Authentication Username information disclosure
2223| [101424] Edgewater Edgemarc HTTP Web-Management Backdoor privilege escalation
2224| [101236] Moodle 2.x/3.x Configuration Setting cross site request forgery
2225| [101242] Simple Invoices 2013.1.beta.8 Configuration Parameter cross site request forgery
2226| [101052] Asus RT-AC/RT-N up to 3.0.0.4 JSONP Config information disclosure
2227| [101008] Microsoft Internet Explorer 9/10/11 HTTPS Bypass privilege escalation
2228| [100899] Dahua DH-IPC-Hxxxxxxxxx Password Configuration File privilege escalation
2229| [100898] Hikvision DS-2CDxxxxx 5.2.0/5.3.0/5.4.0 Password Configuration File privilege escalation
2230| [100856] WordPress up to 4.8.3 Password Reset wp-login.php mail HTTP Header Open Redirect
2231| [100827] Opsview Monitor Pro up to 4.5.x/4.6.4/5.0.2/5.1.0 HTTP GET Request directory traversal
2232| [101791] Fortinet FortiManager/FortiAnalyzer 5.4.0/5.4.1/5.4.2 SecurityWall.co Open Redirect
2233| [100528] D-Link DVGN5402SP W1000CN00/W1000CN03/W2000EN00 Configuration Backup Plaintext information disclosure
2234| [100513] Juniper NorthStar Controller Application up to 2.1.0 Firewall Bypass privilege escalation
2235| [100410] Cisco FindIT Network Probe Software 1.0.0 Role-Based Access Control HTTP Request information disclosure
2236| [100315] Mozilla Firefox up to 52 application/http-index-format Uninitialized Memory unknown vulnerability
2237| [100305] Mozilla Firefox up to 52 application/http-index-format memory corruption
2238| [100191] Oracle Secure Global Desktop 4.71/5.2/5.3 Web Server (Apache HTTP Server) information disclosure
2239| [100110] Oracle Retail Analytic Parameter Calculator - RO 15.0 Installation/Configuration unknown vulnerability
2240| [100090] Oracle Hospitality OPERA 5 Property Services up to 5.5.1.x OPERA License code configuration unknown vulnerability
2241| [99898] flatCore 1.4.6 CMS Configuration cross site request forgery
2242| [99792] SeaWell Networks Spectrum SDC 02.05.00 configure_manage.php directory traversal
2243| [99710] Fortinet FortiMail up to 5.2.9/5.3.8 cross site scripting
2244| [99553] Cesanta MongooseOS/Mongoose Embedded Web Server Library mongoose.c mg_http_multipart_wait_for_boundary POST Request denial of service
2245| [99366] XiongMai uc-httpd HTTP Request directory traversal
2246| [99345] Spiceworks Inventory 7.5 TFTP Server data\configurations privilege escalation
2247| [99263] Cougar-LG Default Configuration Private Key information disclosure
2248| [99112] MantisBT up to 1.3.8/2.1.2/2.2.2 Configuration Report Page adm_config_report.php) cross site scripting
2249| [99108] MantisBT up to 1.3.7/2.1.1/2.2.1 Configuration Report Page adm_config_report.php) cross site scripting
2250| [99570] Apache Tomcat up to 6.0.52/7.0.76/8.0.42/8.5.12/9.0.0.M18 HTTP Connector Cache information disclosure
2251| [99099] Fortinet FortiOS up to 5.2.10 Session Bypass privilege escalation
2252| [98998] OpenBSD 5.9 httpd Memory Consumption denial of service
2253| [98498] libgit2 up to 0.24.5/0.25.0 transports/http.c http_connect spoofing
2254| [98933] Solare Solar-Log 2.8.4-56/3.5.2-85 Network Config privilege escalation
2255| [98929] Solare Solar-Log 2.8.4-56/3.5.2-85 Config information disclosure
2256| [98312] IBM Algorithmics One-Algo Risk Application 4.9.1/5.0/5.1.0 Report HTTP Request information disclosure
2257| [98155] Fatek Automation PLC Ethernet Module up to V3.6 Configuration Tool Stack-based memory corruption
2258| [97930] Intel VirusScan Enterprise Linux up to 2.0.3 NailsConfig.html cross site request forgery
2259| [97929] Intel VirusScan Enterprise Linux up to 2.0.3 Webserver NailsConfig.html information disclosure
2260| [97928] Intel VirusScan Enterprise Linux up to 2.0.3 NailsConfig.html information disclosure
2261| [97905] Intel Analysis and Deconstructive Services up to 1.0.0.3x/1.0.0.4d Configuration Error privilege escalation
2262| [97892] Apache Tomcat up to 9.0.0.M15 Reverse-Proxy Http11InputBuffer.java information disclosure
2263| [97879] Goahead Web Server HTTP GET Request system.ini information disclosure
2264| [97809] EvoStream Media Server 1.7.1 HTTP Request memory corruption
2265| [97800] EpicEditor up to 0.2.3 Configuration marked.js IMG Element cross site scripting
2266| [97727] IBM Tivoli Monitoring 6.2/6.3 Host Header HTTP Poisoning privilege escalation
2267| [97776] Mozilla Firefox up to 51.x HTTP Digest Authorization Response Out-of-Bounds memory corruption
2268| [97834] Dahua DVR/NVR/IPC HTTP Service Backdoor privilege escalation
2269| [97832] Epson TMNet WebConfig 1.00 /Forms/oadmin_1 cross site scripting
2270| [97037] SAP Kernel 7.21-7.49 Message Server HTTP Daemon msgserver/group memory corruption
2271| [96912] Eaton EAMxxx up to 2013 Config File directory traversal
2272| [96889] Fortinet FortiManager TLS Certificate weak authentication
2273| [96781] Fortinet Connect 14.2/14.10/15.10/16.7 Theme privilege escalation
2274| [96750] FFmpeg up to 2.8.9/3.0.4/3.1.5/3.2.1 HTTP Response libavformat/http.c memory corruption
2275| [96723] IBM Sterling B2B Integrator Standard Edition HTTP OPTIONS information disclosure
2276| [96716] IBM Security Access Manager Config File Password information disclosure
2277| [96667] Fortinet FortiWLC ANSI X9.31 RNG weak encryption
2278| [96511] EMC Network Configuration Manager 9.3.x/9.4.0.x/9.4.1.x/9.4.2.x weak authentication
2279| [96510] EMC Network Configuration Manager 9.3.x/9.4.0.x/9.4.1.x/9.4.2.x Java RMI privilege escalation
2280| [96457] Fortinet FortiWLC Default Credentials weak authentication
2281| [96323] MyBB/MyBB Merge System up to 1.6.17/1.8.5 Forum Password xmlhttp.php privilege escalation
2282| [96099] Huawei OceanStor 5800 HTTP Flooding denial of service
2283| [96017] Mozilla Firefox up to 50 Proxy Auto-Config information disclosure
2284| [95851] Zoho WebNMS Framework 5.2/5.2 SP1 HTTP Header privilege escalation
2285| [95841] pecl_http up to 3.0.0 URL Parser memory corruption
2286| [95808] PRTG Network Monitor up to 16.2 HTTP XML REST Value Sensor 16.2.23.3077/3078 XML External Entity
2287| [95365] DiskBoss Enterprise HTTP GET memory corruption
2288| [95212] OpenStack Puppet Module for Gerrit Configuration cross site scripting
2289| [95194] DiskBoss Enterprise 7.5.12 HTTP POST Request memory corruption
2290| [95119] Python Priority Library up to 1.1.x HTTP/2 CPU Exhaustion denial of service
2291| [95070] Pidgin MXIT Protocol HTTP Response Out-of-Bounds memory corruption
2292| [94635] Netgear WNR2000v3/WNR2000v4/WNR2000v5 uhttpd /apply.cgi memory corruption
2293| [93903] Boa Webserver 0.92r HTTP GET send_redirect memory corruption
2294| [93658] All In One WP Security & Firewall Plugin up to 4.1.9 on WordPress cross site scripting
2295| [93194] DokuWiki 2016-06-26a Media File Fetching /inc/HTTPClient.php HttpClient information disclosure
2296| [93141] Cisco IP Interoperability and Collaboration System Config privilege escalation
2297| [93095] daloRADIUS 0.9-9 config-maint-disconnect-user.php privilege escalation
2298| [93021] IBM Security Guardium Database Activity Monitor up to 9.4/10.0.0.1 HTTP Request privilege escalation
2299| [93038] Mozilla Firefox up to 49.0.1 HTTP Cache information disclosure
2300| [92998] Cisco ASA Identity Firewall NetBIOS Packet memory corruption
2301| [92936] Oracle E-Business Suite 12.1.3 HTTP Server information disclosure
2302| [92503] Fortinet FortiManager up to 5.0.11/5.2.2 Report Filter cross site scripting
2303| [92488] IBM Sterling Secure Proxy up to 3.4.2.0 iFix 7/3.4.3.0 Configuration Manager information disclosure
2304| [92487] IBM Sterling Secure Proxy up to 3.4.2.0 iFix 7/3.4.3.0 Configuration Manager information disclosure
2305| [92485] IBM Sterling Secure Proxy up to 3.4.2.0 iFix 7/3.4.3.0 Configuration Manager directory traversal
2306| [92452] Fortinet FortiWLC up to 8.2-4-0 pam.log information disclosure
2307| [92451] Fortinet FortiWLC up to 8.2-4-0 rsyncd Server Default Credentials weak authentication
2308| [92420] Serimux SSH Console Switch 2.4 portconfiguration.asp cross site scripting
2309| [92328] Drupal up to 8.1.9 Configuration Export system.temporary information disclosure
2310| [92230] D-Link DWR-932B HTTP Service Default Admin Password privilege escalation
2311| [91831] Apache Jackrabbit up to 2.13.2 HTTP Header cross site request forgery
2312| [91824] Fortinet FortiWan up to 4.2.4 getconn.php cross site scripting
2313| [91823] Fortinet FortiWan up to 4.2.4 Cookie admin_global GET Request information disclosure
2314| [91822] Fortinet FortiWan up to 4.2.4 script/cfg_show.php information disclosure
2315| [91821] Fortinet FortiWan up to 4.2.4 diagnosis_control.php GET Request privilege escalation
2316| [91820] Fortinet FortiWan up to 4.2.4 nslookup diagnosis_control.php privilege escalation
2317| [91693] AVer Information EH6108H+ X9.03.24.00.07l HTTP Cookie Password weak encryption
2318| [91684] Trane Tracer SC up to 4.2.1134 Web Server Config information disclosure
2319| [91662] Pivotal Cloud Foundry Elastic Runtime up to 1.6.37/1.7.18 PHP Buildpack HTTP GET Request information disclosure
2320| [91511] Cisco Hosted Collaboration Mediation Fulfillment up to 10.6(3) HTTP Request directory traversal
2321| [91399] Fortinet FortiSwitch FSW up to 3.4.0 Managed Mode Default Admin Password weak authentication
2322| [90955] F5 BIG-IP up to 12.0.0 Configuration Utility information disclosure
2323| [90929] Fortinet FortiOS up to 4.1.10/4.2.12/4.3.8 Cookie Parser memory corruption
2324| [90885] Foreman up to 1.11.3/1.12.0 Preview Provisioning Template Config information disclosure
2325| [90882] Fortinet FortiManager/FortiAnalyzer up to 5.0.11/5.2.5 Web-UI cross site scripting
2326| [90881] Fortinet FortiManager/FortiAnalyzer up to 5.0.11/5.2.5 Address Page cross site scripting
2327| [90880] Fortinet FortiManager/FortiAnalyzer up to 5.0.11/5.2.5/5.4.0 cross site scripting
2328| [90892] IBM WebSphere Application Server 7.0/8.0/8.5/8.5.5 HttpSessionIdReuse memory corruption
2329| [90604] Fortinet FortiAnalyzer/FortiManager up to 5.5.5 Upload Image cross site scripting
2330| [91303] Opera Web Browser HTTP/2 HEIST information disclosure
2331| [91302] Mozilla Firefox HTTP/2 HEIST information disclosure
2332| [91301] Microsoft Edge HTTP/2 HEIST information disclosure
2333| [91300] Microsoft Internet Explorer HTTP/2 HEIST information disclosure
2334| [91299] Google Chrome HTTP/2 HEIST information disclosure
2335| [91298] Apple Safari HTTP/2 HEIST information disclosure
2336| [91297] Opera Web Browser HTTPS HEIST information disclosure
2337| [91296] Mozilla Firefox HTTPS HEIST information disclosure
2338| [91295] Microsoft Edge HTTPS HEIST information disclosure
2339| [91294] Microsoft Internet Explorer HTTPS HEIST information disclosure
2340| [91293] Google Chrome HTTPS HEIST information disclosure
2341| [91292] Apple Safari HTTPS HEIST information disclosure
2342| [90391] Novell Filr up to 2.0 Security Update 1 vaconfig/time Request cross site request forgery
2343| [90374] Cisco FireSIGHT System Software 5.3.0/5.3.1/5.4.0/6.0/6.0.1 Snort Rule HTTP Header privilege escalation
2344| [90363] International Components for Unicode up to 57.1 common/uloc.cpp uloc_acceptLanguageFromHTTP memory corruption
2345| [90213] PHP up to 5.5.37/5.6.23/7.0.8 locale_methods.c locale_accept_from_http memory corruption
2346| [90015] Oracle Health Sciences Clinical Development Center 3.1.1.x/3.1.2.x Installation and configuration memory corruption
2347| [90014] Oracle Health Sciences Clinical Development Center 3.1.1.x/3.1.2.x Installation and configuration memory corruption
2348| [89932] Oracle Applications Technology Stack 12.1.3/12.2.3/12.2.4/12.2.5 Configuration information disclosure
2349| [89910] Oracle HTTP Server 11.1.1.9/12.1.3.0 SSL/TLS Module information disclosure
2350| [89216] Fortinet FortiWeb up to 5.5.2 Autolearn directory traversal
2351| [89214] Fortinet FortiWeb up to 5.5.2 cross site request forgery
2352| [89143] Blue Coat PacketShaper up to 11.5.3.1 HTTPS Server information disclosure
2353| [88519] Micro Focus RUMBA up to 9.4 iconfig.dll Load memory corruption
2354| [88515] Cisco RV110W/RV215W HTTP Request memory corruption
2355| [88532] IBM TRIRIGA Application Platform up to 3.3.2.5/3.4.2.3/3.5.0.1 HTTP Response information disclosure
2356| [91845] Pidgin up to 2.10.x HTTP Content-Length memory corruption
2357| [88051] H2O up to 1.7.2/2.0.0-beta4 HTTP2 Connection lib/http2/connection.c memory corruption
2358| [88036] Trend Micro Worry-Free Business Security 9.0 HTTP Header cross site scripting
2359| [87923] Huawei Honor WS851 up to 1.1.21.1 Config Data Injection privilege escalation
2360| [87881] EMC RSA Archer eGRC 5.5.x Backup File web.config information disclosure
2361| [87727] Cisco Prime Network Analysis Module up to 6.1/6.2 HTTP Request Command privilege escalation
2362| [87716] Cisco Prime Network Analysis Module up to 6.1/6.2 HTTP Request Command privilege escalation
2363| [87684] Moxa MiiNePort Config File Cleartext information disclosure
2364| [87673] Moxa EDR-G903 up to 3.4.11 Configuration File Password information disclosure
2365| [87627] Fortinet FortiSandbox up to 2.0 Web UI alerts/summary/profile/ cross site scripting
2366| [87584] WordPress up to 4.4.1 wp-includes/http.php wp_http_validate_url Server-Side Request Forgery
2367| [87549] Cisco Web Security Appliance up to 8.8 HTTP Response Code Memory denial of service
2368| [87419] CloudBees Jenkins up to 2.2/LTS 1.651.1 Job Configuration Password information disclosure
2369| [87407] PHP up to 5.4.43/5.5.27/5.6.11 ext/soap/php_http.c SoapClient::__call memory corruption
2370| [83737] HTTPS NIO Connector Socket Timeout denial of service
2371| [83741] ImageMagick up to 6.9.3-9/7.0.1 HTTP/FTP Coder cross site request forgery
2372| [82748] Ecava IntegraXor up to 5.0 HTTPOnly Cookie information disclosure
2373| [82747] Ecava IntegraXor up to 5.0 HTTP Header CRLF privilege escalation
2374| [82741] Accuenergy Acuvim II NET/Acuvim IIR NET 3.08 AXM-NET Module Config information disclosure
2375| [82732] Cisco Wireless LAN Controller up to 8.0.x HTTP Request memory corruption
2376| [82619] Oracle Configurator 12.1/12.2 JRAD Heartbeat cross site scripting
2377| [82607] Oracle HTTP Server 12.1.2.0 OSSL Module unknown vulnerability
2378| [82395] Huawei S5300EI HTTPS/FTP Server Memory Leak denial of service
2379| [82092] Trend Micro Password Manager Pro HTTP Server openUrlInDefaultBrowser privilege escalation
2380| [82051] MantisBT up to 1.2.x Blacklist Filter config_api.php config_is_private SOAP API Request information disclosure
2381| [81880] SAP Java AS 7.4 Java Startup Framework jstart HTTP Request denial of service
2382| [81878] Fortinet FortiOS Web User Interface cross site scripting
2383| [81636] Cisco Prime Infrastructure up to 2.2.2 HTTP POST Request memory corruption
2384| [81626] Cisco TelePresence Server/Mobility Services Engine HTTP Memory Consumption denial of service
2385| [81563] Snort IDS up to 2.9.8.1 Malware Detection HTTP Header privilege escalation
2386| [81487] Apple iOS up to 9.2 HTTPProtocol memory corruption
2387| [81436] Apple Mac OS X up to 10.11.3 HTTPProtocol memory corruption
2388| [81387] PHP 5.5.32 SOAP Request make_http_soap_request memory corruption
2389| [81316] Cisco DPC2203/EPC2203 r 1 Web Server HTTP Request memory corruption
2390| [81314] Cisco DPC3939/DPC3941 Admin Interface HTTPS Request information disclosure
2391| [81313] Cisco ASA 5500 up to 6.6 HTTPS Packet Memory Consumption denial of service
2392| [81100] Wireshark 2.0.0/2.0.1 HTTP2 Dissector packet-http2.c denial of service
2393| [81016] Novell ZENworks Configuration Management 11.3/11.4 RPC ChangePassword privilege escalation
2394| [81002] SAP NetWeaver 7.4 Universal Worklist Configuration information disclosure
2395| [80937] Netgear Management System NMS300 up to 1.5.0.11 data/config/image.do directory traversal
2396| [80616] SAP HANA XS Engine HTTP Request memory corruption
2397| [80615] CGit up to 0.11 HTTP Header authenticate_post memory corruption
2398| [80577] Oracle Secure Global Desktop 4.63/4.71/5.2 Apache HTTP Server denial of service
2399| [80507] Oracle Supply Chain 11.5.10.2/12.1/12.2 Configurator information disclosure
2400| [80506] Oracle Supply Chain 11.5.10.2/12.1/12.2 Configurator information disclosure
2401| [80477] Oracle E-Business Suite 11.5.10.2 HTTP Server denial of service
2402| [80476] Oracle E-Business Suite 12.1.1/12.1.2/12.1.3 HCM Configuration Workbench information disclosure
2403| [80296] Fortinet FortiOS up to 5.0.7 SSH Server Default Credentials weak authentication
2404| [80279] FFmpeg 2.x HTTP Live Stream M3U8 File Cross-Origin privilege escalation
2405| [80278] FFmpeg 2.x HTTP Live Stream M3U8 File Cross-Origin privilege escalation
2406| [80203] Prosody up to 0.9.8 mod_http_files File directory traversal
2407| [80199] nghttp2 up to 1.5.x Idle Stream Use-After-Free memory corruption
2408| [80175] IBM WebSphere Message Broker up to 7.0.0.7/8.0.0.5 HTTP Server information disclosure
2409| [79958] OrientDB Server Community Edition up to 2.0.14/2.1.0 Studio OHttpSessionManager.java weak authentication
2410| [79893] eWON Device up to 10.1s0 HTTP GET Request information disclosure
2411| [79868] Cisco DPQ3925 HTTP Request information disclosure
2412| [79594] Apple iOS up to 9.1 CFNetwork HTTPProtocol privilege escalation
2413| [79542] Apple Mac OS X up to 10.11.1 CFNetwork HTTPProtocol privilege escalation
2414| [79280] Apple iOS up to 8.x CFNetwork HTTPProtocol information disclosure
2415| [79074] IBM Security Access Manager For Web up to 7.0.0.15/8.0.1.2 WebSEAL HTTPTransformation Request File privilege escalation
2416| [78997] Fortinet FortiManager up to 5.2.3 Graphical User Interface SOMServiceObjDialog cross site scripting
2417| [78996] Fortinet FortiManager up to 5.2.3 Graphical User Interface FGDMngUpdHistory cross site scripting
2418| [78925] Allen-Bradley MicroLogix 1100/1400 HTTP Request memory corruption
2419| [78902] AFNetworking Framework up to 2.5.2 Configuration weak encryption
2420| [78861] IniNet embeddedWebServer up to 2.01 HTTP Request Stack-Based memory corruption
2421| [78853] ntpd 4.2.8 Configuration Directive directory traversal
2422| [78848] ntpd 4.2.8 URL Request save_config directory traversal
2423| [78787] Apple Mac OS X up to 10.11.0 configd Heap-based memory corruption
2424| [78727] Apple iOS up to 9.0 configd Heap-based memory corruption
2425| [78604] Oracle Configurator 12.0.6/12.1.3/12.2.3/12.2.4 unknown vulnerability
2426| [78602] Oracle Configurator 12.0.6/12.1.3/12.2.3/12.2.4 unknown vulnerability
2427| [78578] Oracle Fusion Middleware 11.1.1.9 HTTP Server denial of service
2428| [78577] Oracle Fusion Middleware 10.1.3.5/11.1.1.7/11.1.1.9/12.1.2.0/12.1.3.0 HTTP Server denial of service
2429| [78571] Oracle Fusion Middleware 11.1.1.7/12.1.2.0/12.1.3.0 HTTP Server denial of service
2430| [78565] Oracle Fusion Middleware 10.1.3.5/11.1.1.7/11.1.1.9/12.1.2.0/12.1.3.0 HTTP Server denial of service
2431| [78876] Red Hat JBoss Enterprise Application Platform up to 6.4.3 HTTP Management Interface Large Header Memory Exhaustion privilege escalation
2432| [78486] Fortinet FortiOS 5.2.3 ZebOS Shell weak authentication
2433| [78164] Google Android up to 5.1.0 BpMediaHTTPConnection IMediaHTTPConnection.cpp readAt memory corruption
2434| [78145] TIBCO Managed File Transfer Internet Server up to 7.2.4 HTTP Request information disclosure
2435| [77726] WP Limit Login Attempts Plugin up to 2.0.0 on WordPress HTTP Header wp-limit-login-attempts.php getip sql injection
2436| [77703] Asus TM-AC1900 Router HTTP Header Stack-Based memory corruption
2437| [77660] F5 BIG-IP up to 11.x Configuration Utility directory traversal
2438| [77659] Cisco Email Security Appliance 7.6.0/8.0.0 HTTP Request memory corruption
2439| [77649] SPICE 0.12.4 worker_update_monitors_config memory corruption
2440| [77492] OkCupid OK Web Server 404 Error Message libahttp/err.c cross site scripting
2441| [77402] MantisBT 1.2.13/1.2.14/1.2.15/1.2.16/1.2.17 Configuration Report Page adm_config_report.php cross site scripting
2442| [77340] Cisco TelePresence Video Communication Server X8.5.2 Configuration Log File information disclosure
2443| [77298] HTTP Strict Transport Security Module up to 6.x-1.0/7.x-1.1 on Drupal Subdomain weak encryption
2444| [77263] VideoLAN VLC Media Player up to 2.1.x network/httpd.c httpd_HtmlError cross site scripting
2445| [77171] Apple iOS up to 8.4.0 Sandbox_profiles Config information disclosure
2446| [77075] Mozilla Firefox 39 XMLHttpRequest::Open memory corruption
2447| [76965] Fortinet FortiOS up to 4.3.12 SSL-VPN spoofing
2448| [77656] IBM HTTP Server 6.1/7.0/8.0/8.5/8.5.5 Stack-Based memory corruption
2449| [76852] Fortinet FortiOS up to 5.2.3 DHCP Monitor Web UI cross site scripting
2450| [76835] Fortinet FortiOS up to 5.2.3 FortiGuard Communication SSL weak encryption
2451| [76737] Cisco Prime Collaboration 10.0 HTTP Request Outage denial of service
2452| [76701] Oracle MySQL Server up to 5.6.24 Firewall denial of service
2453| [76699] Oracle MySQL Server up to 5.6.24 Firewall denial of service
2454| [76626] Oracle MySQL Server up to 5.6.24 Firewall information disclosure
2455| [76582] Oracle Fusion Middleware 11.1.2.2 Configuration Service denial of service
2456| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
2457| [76064] Async Http Client up to 1.8.x X.509 Certificate Validator spoofing
2458| [76043] cURL/libcURL up to 7.42.1 HTTP Basic Authentication Credentials information disclosure
2459| [75886] ISPConfig up to 3.0.5.4 admin/users_edit.php cross site request forgery
2460| [75878] Sinapsi eSolar Light up to 2.0.3970 Mail Configuration Page Password information disclosure
2461| [75827] XCloner Plugin 3.1.1 on WordPress/Joomla! Configuration Panel Password information disclosure
2462| [75724] Novell ZENworks Configuration Management up to 10.x/11.3.1 UploadServlet WAR File directory traversal
2463| [75723] Cisco TelePresence up to 6.3.3/7.3.2 on Integrator C SX20 CRLF HTTP Response Splitting privilege escalation
2464| [75717] Novell ZENworks Configuration Management up to 10.2 Remote Management Component UploadServlet WAR File directory traversal
2465| [75716] Novell ZENworks Configuration Management up to 10.2 Remote Management Component UploadServlet WAR File privilege escalation
2466| [75647] Moodle up to 2.5.9/2.6.6/2.7.3/2.8.1 lib/configonlylib.php min_get_slash_argument directory traversal
2467| [75620] Cisco Conductor for Videoscape/Headend System Release 3.0 HTTP Cookie privilege escalation
2468| [75609] Wavelink ConnectPro TermProxy Service WLTermProxyService.exe HTTP Header memory corruption
2469| [75608] Wavelink Terminal Emulation License Server LicenseServer.exe HTTP Header memory corruption
2470| [75560] phpMyAdmin up to 4.0.10.9/4.2.13.2/4.3.13.0/4.4.5 Config File cross site request forgery
2471| [75566] lighttpd 1.4.35 Log File http_auth.c information disclosure
2472| [75548] HP Network Virtualization 8.61/11.52 HttpServlet/NetworkEditorController File privilege escalation
2473| [75242] OpenStack Identity up to 2014.1.4/2014.2.3 Configuration Log information disclosure
2474| [75231] Fortinet FortiADC up to 4.1 cross site scripting
2475| [75174] cURL/libcURL up to 7.42.0 HTTP Header Proxy information disclosure
2476| [75116] TVMOBiLi up to 2.1.0.3973 HTTP Request HttpUtils.dll memory corruption
2477| [74872] Fortinet FortiMail up to 5.2.3 diag Debug Application Credentials information disclosure
2478| [74714] Apple MacOS X up to 10.10.2 CFNetwork HTTPProtocol Cookie privilege escalation
2479| [74683] McAfee Advanced Threat Defense up to 3.4.4.62 Web Interface Config information disclosure
2480| [74473] Solarwinds Firewall Security Manager up to 6.6.4 Privileges userlogin.jsp memory corruption
2481| [74076] Citrix Command Center 5.1 build 33.3 Config File information disclosure
2482| [74440] Fortinet Single Sign On up to 4.2 Agent collectoragent.exe memory corruption
2483| [75375] Solarwinds Orion Network Performance Monitor 2015.1 Configuration Manager sql injection
2484| [74381] Webgate Embedded Standard Protocol Sdk WESPCONFIGLib.UserItem ConnectEx3 memory corruption
2485| [74359] Tips and Tricks All In One Wordpress Security And Firewall up to 3.8.8 Authentication cross site request forgery
2486| [74358] Tips and Tricks All In One Wordpress Security And Firewall up to 3.8.6 sql injection
2487| [69250] Fortinet Fortimail up to 5.2.2 Reflected cross site scripting
2488| [75201] Fortinet FortiOS up to 5.2.2 Advanced Dataset Reports Page cross site scripting
2489| [75200] Fortinet FortiOS 5.2.0/5.2.1/5.2.2 VPN Template Menu cross site scripting
2490| [75199] Fortinet FortiOS 5.2.0/5.2.1/5.2.2 User Group Menu cross site scripting
2491| [75198] Fortinet FortiOS 5.2.0/5.2.1/5.2.2 SSLVPN Login Page, cross site scripting
2492| [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
2493| [69235] Jetty httpd up to 9.2.8 HttpParser Memory information disclosure
2494| [69217] Mozilla Firefox 35 XMLHttpRequest Calls memory corruption
2495| [74199] HP Universal Configuration Management Database 10.11 Trace information disclosure
2496| [74157] Fortinet FortiOS 5.0.7 Installation spoofing
2497| [74156] Fortinet FortiClient 5.2.3.091 Certificates spoofing
2498| [74155] Fortinet FortiClient 5.2.028 Certificates spoofing
2499| [74152] Acme Mini HTTPd up to 1.21 Protocol Out-of-Bounds information disclosure
2500| [73860] Fortinet FortiAuthenticator 3.0.0 cross site scripting
2501| [73857] Fortinet FortiAuthenticator 3.0.0 Cleartext information disclosure
2502| [73856] Fortinet FortiAuthenticator 3.0.0 cross site scripting
2503| [73834] Fortinet FortiClient 5.2.3.091 Encryption Key weak encryption
2504| [73833] Fortinet FortiOS 5.0.7 denial of service
2505| [73832] Fortinet FortiOS 5.0.7 cross site scripting
2506| [73818] IBM WebSphere Message Broker up to 8.0.0.4 HTTPInput Node information disclosure
2507| [69024] Fortinet FortiOS 5.0 cross site scripting
2508| [69023] Fortinet FortiOS 5.0 DTLS privilege escalation
2509| [69014] libcURL 7.30.0/7.31.0 HTTP Proxy cross site request forgery
2510| [68721] Oracle Siebel 8.1.1/8.2.2 Config Scripting unknown vulnerability
2511| [68700] Oracle E-Business Suite up to 12.2.4 HCM Configuration Workbench information disclosure
2512| [68677] Oracle HTTP Server 11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener denial of service
2513| [68676] Oracle HTTP Server 11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener denial of service
2514| [68675] Oracle HTTP Server 11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener parser.c xmlParserHandlePEReference denial of service
2515| [68668] Oracle HTTP Server 10.1.3.5.0/11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener cross site request forgery
2516| [68667] Oracle HTTP Server 10.1.3.5.0/11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener denial of service
2517| [68666] Oracle HTTP Server 10.1.3.5.0/11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener denial of service
2518| [68665] Oracle HTTP Server 11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener denial of service
2519| [68659] Oracle HTTP Server 11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener memory corruption
2520| [68658] Oracle HTTP Server 10.1.3.5.0/11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener mod_status.c lua_ap_scoreboard_worker memory corruption
2521| [68657] Oracle WebLogic Server 10.3.6.0/12.1.1.0/12.1.2.0/12.1.3.0 WLS Config/WLS Console privilege escalation
2522| [68650] Oracle HTTP Server 11.1.1.7.0/12.1.2.0/12.1.3.0 Web Listener memory corruption
2523| [73529] VDG Security SENSE 2.3.13 Configuration File Cleartext information disclosure
2524| [68456] NTP Daemon up to 4.2.7 Random Generator ntp_config.c config_auth weak authentication
2525| [73245] Zenoss Core up to 3.0.1 Default Configuration unknown vulnerability
2526| [73182] XFree86/X11 SProcRRConfigureOutputProperty memory corruption
2527| [73076] Huawei Honor Cube Wireless Router WS860s Firewall File Upload memory corruption
2528| [68565] WordPress up to 4.0 wp-includes/http.php privilege escalation
2529| [72981] MantisBT 1.2.13/1.2.14/1.2.15/1.2.16/1.2.17 adm_config_report.php cross site scripting
2530| [68198] F5 BIG-IP 10.2.1 HTTP POST Request properties.jsp directory traversal
2531| [68128] cURL/libcURL 7.20.0/7.21.0/7.31.0 HTTP POST curl_easy_duphandle information disclosure
2532| [68454] NTP Daemon up to 4.2.7 configure memory corruption
2533| [72776] FortiNet Fortiadc-400e Firmware unknown vulnerability
2534| [68100] Linksys EA up to 2.0.14294 SMART WiFi Firmware HTTP POST Request information disclosure
2535| [68104] Fortinet FortiAnalyzer/FortiManager 5.0.6 Reflected cross site scripting
2536| [68103] Fortinet FortiAnalyzer/FortiManager 5.0.6 Reflected cross site scripting
2537| [68102] Fortinet FortiAnalyzer/FortiManager 5.0.6 Reflected cross site scripting
2538| [68088] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1 HTTP Cookie httponly information disclosure
2539| [68028] Apple Mac OS X up to 10.9.3 MCX Desktop Config Profiles information disclosure
2540| [71913] Rejetto HTTP File Server up to 2.3c memory corruption
2541| [71766] Tips And Tricks All In One Wordpress Security And Firewall up to 3.8.1 cross site request forgery
2542| [71693] HAProxy 1.5.0/1.5.1/1.5.2/1.5.3 proto_http.c http_request_forward_body memory corruption
2543| [67680] Debian apt 1.0.1 HTTP Transport Code memory corruption
2544| [68080] F5 BIG-IP Configuration Utility XXE information disclosure
2545| [68079] F5 Enterprise Manager up to 2.3.0/3.1.1 Configuration Utility XXE information disclosure
2546| [67458] Netgear ProSafe Plus Configuration Utility Backup Password weak encryption
2547| [67675] Fortinet FortiOS up to 5.0.7 FortiManager Service weak authentication
2548| [67407] Fortinet FortiOS up to 5.0.7 FortiManager Protocol Service denial of service
2549| [70556] SolarWinds Network Configuration Manager up to 7.2.1 memory corruption
2550| [70534] Yealink SIP-T38G dumpConfigFile directory traversal
2551| [70449] ACME Micro Httpd memory corruption
2552| [67212] NetBSD 5.1/5.2/6.0/6.1 bozohttpd snprintf information disclosure
2553| [67172] Cisco DPC3010/DPC3212/EPC3010/EPC3212 HTTP Request memory corruption
2554| [67086] Oracle HTTP Server 11.1.1.7.0/12.1.2.0 Plugin 1.1 information disclosure
2555| [67085] Oracle HTTP Server 11.1.1.7.0/12.1.2.0 Plugin 1.1 unknown vulnerability
2556| [67180] Apache HTTP Server up to 2.4.9 WinNT MPM Memory Leak denial of service
2557| [67185] Apache HTTP Server up to 2.4.9 mod_status Heap-Based memory corruption
2558| [67182] Apache HTTP Server up to 2.4.9 mod_deflate Memory Consumption denial of service
2559| [67040] Fortinet FortiWeb up to 5.2.0 Web Management Interface cross site scripting
2560| [70290] HP Universal Configuration Management Database 10.01 memory corruption
2561| [70289] HP Universal Configuration Management Database 10.01 memory corruption
2562| [70288] HP Universal Configuration Management Database 10.01 memory corruption
2563| [70155] EMC Smarts Network Configuration Manager up to 9.0 unknown vulnerability
2564| [70036] Monkey HTTP Daemon mk_request.c mk_request_header_process memory corruption
2565| [70016] Castor 1.3/1.3.1/1.3.2 Default Configuration unknown vulnerability
2566| [13595] TP-LINK TD-8817/TD-8840G/TD-W8101G/TD-W8901G 3.11.2 HTTP POST /Forms/tools_test_1 denial of service
2567| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
2568| [13337] IBM WebSphere Portal 6.1.0/7.0/8.0 boot_config.jsp cross site scripting
2569| [13153] Cisco ASA 9.1(1) HTTP Server information disclosure
2570| [69541] Fortinet FortiAuthenticator 2.2 Command Line Interface unknown vulnerability
2571| [13044] Apple iOS up to 7.1 CFNetwork HTTPProtocol information disclosure
2572| [13029] Apple Mac OS X up to 10.7.5/10.8.5/10.9.2 CFNetwork HTTPProtocol information disclosure
2573| [69411] HP Universal Configuration Management Database 10.10 memory corruption
2574| [69401] HP Universal Configuration Management Database 10.10 information disclosure
2575| [69365] Gopivotal Grails-resources up to 1.2.5 Default Configuration information disclosure
2576| [69364] Gopivotal Grails-resources up to 1.2.5 Default Configuration directory traversal
2577| [13167] Netgear N600 WNDR3400 up to 1.0.0.38 Config File Upload /genie_restore.htm privilege escalation
2578| [12893] Oracle Containers for J2EE 10.1.3.5 HTTP Request unknown vulnerability
2579| [12892] Oracle Containers for J2EE 10.1.3.5 HTTP Request unknown vulnerability
2580| [12884] Oracle Containers for J2EE 10.1.3.5 HTTP Request unknown vulnerability
2581| [66921] SAP Enterprise Portal Federation Configuration Page unknown vulnerability
2582| [12839] Fortinet FortiBalancer 400/1000/2000/4000 SSH Permission weak authentication
2583| [12838] Fortinet FortiBalancer 400/1000/2000/4000 SSH Key weak authentication
2584| [12837] Fortinet FortiBalancer 400/1000/2000/4000 SSH Authentication weak authentication
2585| [12691] VideoLAN VLC Media Player up to 2.1.3 src/network/httpd.c GET Request cross site scripting
2586| [12672] Cisco WebEx Meeting Center HTTP GET information disclosure
2587| [66642] lighttpd up to 1.4.34 mod_evhost directory traversal
2588| [67208] Avaya IP Office one-X Portal 9.0 UserConfigurationService memory corruption
2589| [12614] lighttpd 1.4.34 mod_evhost/mod_simple_vhost directory traversal
2590| [12641] Digium Asterisk 12.0.0 Cookie main/http.c memory corruption
2591| [66537] MantisBT 1.2.13/1.2.14/1.2.15/1.2.16 adm_config_report.php sql injection
2592| [12525] Novell ZENworks Configuration Management 11.2 PreBoot Service directory traversal
2593| [12448] Cisco Unified Contact Center Express 10.0(1) CCMConfig Page information disclosure
2594| [12457] HP Service Manager 9.30/9.31/9.32/9.33 HTTP Request cross site request forgery
2595| [12388] Fortinet FortiWeb 5.0.2 Access Control privilege escalation
2596| [12386] Fortinet FortiWeb 5.0.2 URL cross site scripting
2597| [12318] D-Link DSL-2750B EU_2.02 Web Admin Interface /scdmz.cmd cross site request forgery
2598| [12271] Microsoft .NET Framework up to 4.5.1 HTTP POST denial of service
2599| [12224] Fortinet FortiOS 5.0.5 recurrdlg cross site scripting
2600| [12223] Fortinet FortiWeb 5.0.3 /user/ldap_user/add cross site scripting
2601| [12191] Fortinet FortiWeb 5.0.3 user/ldap_user/add cross site scripting
2602| [12189] Fortinet FortiOS 5.0.5 recurrdlg cross site scripting
2603| [12144] IBM InfoSphere 9.0/9.1/10.0/10.1/11.0 HTTP Request cross site request forgery
2604| [12202] TYPO3 6.1 CMS Configuration Module cross site request forgery
2605| [12119] Pidgin 2.10.7 HTTP Response Negative Value memory corruption
2606| [12117] Pidgin up to 2.10.7 Gadu-Gadu HTTP Response Integer memory corruption
2607| [12115] Pidgin 2.10.7 HTTP Response memory corruption
2608| [12230] Fortinet FortiWeb 5.0.3 Web Administration Interface cross site scripting
2609| [11998] VMware vCloud Director 5.1.2 HTTP Request cross site request forgery
2610| [11829] Oracle HTTP Server 11.1.1.6.0/11.1.1.7.0/11.1.2.1 OSSL Module Stored privilege escalation
2611| [11821] Oracle HTTP Server 11.1.1.6.0/11.1.1.7.0/11.1.2.1 Web Listener cross site scripting
2612| [11817] Oracle HTTP Server 11.1.1.6.0/11.1.1.7.0/11.1.2.1 OSSL Module information disclosure
2613| [11816] Oracle HTTP Server 10.1.3.5.0/11.1.1.6.0/11.1.1.7.0/11.1.2.1 OSSL Module memory corruption
2614| [11814] Oracle HTTP Server 11.1.1.6.0/11.1.1.7.0/11.1.2.1/12.1.2.0 Web Listener privilege escalation
2615| [11812] Oracle HTTP Server 11.1.1.6.0/11.1.1.7.0/11.1.2.1 OSSL Module memory corruption
2616| [12123] Motorola SBG6580 6.5.0.0-GA-00-226-NOSH Web Access /goform/login HTTP POST Request denial of service
2617| [11676] FFmpeg 2.1 libavformat/isom.c ff_mp4_read_dec_config_descr unknown vulnerability
2618| [11657] FFmpeg 2.1 libavformat/isom.c mp4_read_dec_config_descr unknown vulnerability
2619| [11609] cPanel WHM 11.36.2.9/11.38.2.12/11.40.0.28/11.40.1.2 Config cross site request forgery
2620| [65756] GNU libmicrohttpd up to 0.9.31 MHD_digest_auth_check memory corruption
2621| [11415] Zend Framework Configuration File /configs/application.ini information disclosure
2622| [65578] Gummy Bear FTP Drive + HTTP Server up to 1.0.4 directory traversal
2623| [11327] Palo Alto PAN-OS 5.0.8 Firewall Web Interface Stored cross site scripting
2624| [11218] Fortinet Manager 5.0.4 SYSAdminUserDialog weak authentication
2625| [11182] Google Chrome 30.0.1599.101 HTTP 1xx Parsing http_stream_parser.cc QuickGetNext memory corruption
2626| [65451] Cisco Prime Central for Hosted Collaboration Solution HTTP Service Flooding denial of service
2627| [11098] Apache Tomcat 5.5.25 HTTP Request cross site request forgery
2628| [11062] Cisco IOS XE 3.4.1S/3.5.0S Zone Based Firewall ICMP Error Packet denial of service
2629| [11663] Python 2.7.5/3.3.3 RC 1 Lib/CGIHTTPServer.py CGIHTTPRequestHandler directory traversal
2630| [11066] Novell ZENworks Configuration Management 11.2.3 zenworks-unmaninv directory traversal
2631| [11082] Novell ZENworks Configuration Management 11.2 weak authentication
2632| [11080] Novell ZENworks Configuration Management 11.2 CSRF Prevention Filter cross site request forgery
2633| [11079] Novell ZENworks Configuration Management 11.2 cross site request forgery
2634| [11078] Novell ZENworks Configuration Management 11.2 cross site scripting
2635| [65364] nginx up to 1.1.13 Default Configuration information disclosure
2636| [10691] Juniper Junos 12.1x44/12.1x45 Configuration Validator weak authentication
2637| [10660] Cisco ASA up to 9.1(1.1) HTTP Deep Packet Inspection Malformed Response denial of service
2638| [11250] HP 2620 Switch HTTP Request html/json.html cross site request forgery
2639| [65031] Open-Xchange AppSuite 7.0.1/7.0.2/7.2.0/7.2.1 Network Configuration information disclosure
2640| [65021] IBM Optim Performance Manager Configuration Manager unknown vulnerability
2641| [65020] IBM Optim Performance Manager Configuration Manager information disclosure
2642| [11227] Nagios Core Config Manager 3.0.3 nagiosql/index.php sql injection
2643| [10503] Blue Coat Security Gateway OS up to 6.5.1 HTTP RW Pipeline Pre-Fetch Requests Memory Leak memory corruption
2644| [10842] Google Chrome 30.0.1599.69 xml/XMLHttpRequest.cpp internalAbort memory corruption
2645| [64872] Supermicro H8dgu-f Intelligent Platform Management Interface config_date_time.cgi privilege escalation
2646| [9891] Apache HTTP Server 2.2.22 suEXEC Feature .htaccess information disclosure
2647| [9895] Nmap 6.25 http-domino-enum-passwords.nse privilege escalation
2648| [64597] Vector Ultra Mini HTTPD 1.21 Stack-based memory corruption
2649| [64582] phpMyAdmin up to 3.5.8.1 Error Message config.default.php information disclosure
2650| [10481] Linksys EA6500 Configuration Validator privilege escalation
2651| [9758] Symantec Web Gateway up to 5.1.0 networkConfig.php privilege escalation
2652| [64504] Parallels Plesk Panel 9.0 Default Configuration memory corruption
2653| [9606] Oracle HTTP Server 10.1.3.5.0 Web Listener information disclosure
2654| [9605] Oracle HTTP Server 10.1.3.5.0 Web Listener Out-of-Bounds cross site scripting
2655| [9604] Oracle HTTP Server Web Listener Memory Consumption denial of service
2656| [9603] Oracle HTTP Server Web Listener denial of service
2657| [9602] Oracle HTTP Server Web Listener cross site scripting
2658| [9601] Oracle HTTP Server 10.1.3.5.0 Web Listener cross site scripting
2659| [9600] Oracle HTTP Server 10.1.3.5.0 Web Listener cross site scripting
2660| [9599] Oracle HTTP Server 10.1.3.5.0 Web Listener cross site scripting
2661| [9597] Oracle HTTP Server 10.1.3.5.0 Web Listener memory corruption
2662| [9596] Oracle HTTP Server Web Listener Memory Consumption denial of service
2663| [9595] Oracle HTTP Server Web Listener Crash denial of service
2664| [9594] Oracle HTTP Server 2.2.9 Proxy Plug-In mod_proxy_http.c information disclosure
2665| [9510] Juniper Junos 10.4/11.4/12.1/12.1x44 HTTP Request memory corruption
2666| [9456] Google Chrome up to 27.0.1453.116 HTTP over SSL information disclosure
2667| [64447] WordPress up to 2.3.1 Default Configuration cross site scripting
2668| [9309] Fortinet FortiOS 4.3.10/4.3.12/5.0/5.0.1 System functions shutdown URL cross site request forgery
2669| [9279] Cisco Web/Mail Security Appliance up to 7.7/8.1 Web Framework HTTP/HTTPS Request denial of service
2670| [9288] Mozilla Firefox up to 21.0 XHR HEAD Request XMLHttpRequest (XHR) HEAD cross site request forgery
2671| [64289] Novell ZENworks Configuration Management up to 11.2.0 cross site scripting
2672| [64288] Novell ZENworks Configuration Management up to 11.2.0 cross site scripting
2673| [64287] Novell ZENworks Configuration Management up to 11.2.0 cross site scripting
2674| [64286] Novell ZENworks Configuration Management up to 11.2.0 Login Page fwdToURL cross site scripting
2675| [9190] Fortinet FortiOS 5.0.1/5.0.2 Permission weak authentication
2676| [9079] Wireshark up to 1.8.7 Assa Abloy R3 Dissector packet-assa_r3.c dissect_r3_upstreamcommand_queryconfig Zero-Length Item denial of service
2677| [9076] Wireshark up to 1.8.7 HTTP Dissector packet-http.c http_payload_subdissector Crafted Packet denial of service
2678| [8915] IBM WebSphere Portal up to 8.0 HTTP spoofing
2679| [8878] X.Org libXt up to 1.1.3 Graphical Library XtResourceConfigurationEH memory corruption
2680| [8813] thttpd 2.25b WebService information disclosure
2681| [8770] Huawei Quidway Switch Firewall Module information disclosure
2682| [64102] Gwos GroundWork Monitor 6.7.0 Configuration File information disclosure
2683| [64100] Gwos GroundWork Monitor 6.7.0 Configuration File unknown vulnerability
2684| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
2685| [8609] D-Link DSL-320B 1.25 config.bin information disclosure
2686| [8583] Fortinet FortiClient 2.0/4.0.2/4.0.2012/4.3.3.445 Authentication Cleartext information disclosure
2687| [8314] Oracle HTTP Server 11.1.1.6.0 Web Listener cross site scripting
2688| [8313] Oracle HTTP Server Web Listener Heap-based denial of service
2689| [8310] Oracle HTTP Server Web Listener information disclosure
2690| [8309] Oracle HTTP Server Web Listener information disclosure
2691| [8308] Oracle HTTP Server Web Listener denial of service
2692| [8307] Oracle HTTP Server 10.1.3.5/11.1.1.5.0/11.1.1.6.0 Web Listener unknown vulnerability
2693| [8306] Oracle HTTP Server Web Listener denial of service
2694| [8305] Oracle HTTP Server Web Listener information disclosure
2695| [8304] Oracle HTTP Server Web Listener information disclosure
2696| [8303] Oracle HTTP Server 11.1.1.6.0 ModSecurity denial of service
2697| [8300] Oracle HTTP Server Web Listener denial of service
2698| [8299] Oracle HTTP Server Web Listener denial of service
2699| [8298] Oracle HTTP Server Web Listener denial of service
2700| [8294] Oracle Database Server up to 4.2.1 HTTP unknown vulnerability
2701| [8293] Oracle Database Server 11.2.0.2/11.2.0.3 HTTP memory corruption
2702| [12069] Cisco Linksys EA6500 Restore Router Configuration Backup File privilege escalation
2703| [9046] FFmpeg Channel libavcodec/aacdec.c che_configure memory corruption
2704| [63967] John Nunemaker httparty up to 0.2.0 memory corruption
2705| [63910] Novell ZENworks Configuration Management up to 10.3.3 ActiveX Control ISProxy.dll directory traversal
2706| [63900] EMC Smarts Network Configuration Manager up to 9.2 unknown vulnerability
2707| [63898] EMC Smarts Network Configuration Manager up to 9.0 memory corruption
2708| [8105] Google Chrome up to 25.0.1364.172 Web Store misconfiguration
2709| [8096] McAfee ePolicy Orchestrator McHealthCheck.dll Save() misconfiguration
2710| [63811] Puppetlabs Puppet up to 2.7.10 Default Configuration memory corruption
2711| [8049] Samba 4.0.0/4.0.1/4.0.2/4.0.3 Active Directory Domain Controller misconfiguration
2712| [63740] Red Hat JBoss Enterprise Application Platform 4.3.0 Default Configuration unknown vulnerability
2713| [7843] D-Link DIR-645 Firmware 1.02 Authentication /getcfg.php HTTP Request information disclosure
2714| [63630] Infradead OpenConnect up to 4.07 http.c memory corruption
2715| [7817] SAP Enterprise Portal Federation Configuration Page information disclosure
2716| [7784] Alt-N MDaemon up to 13.0.3 HTTP Requests Sanitizer WorldClient.dll information disclosure
2717| [7733] Pidgin 2.10.6 http.c mxit_cb_http_read memory corruption
2718| [7732] Pidgin 2.10.6 http.c mxit_cb_http_read memory corruption
2719| [63507] Fortinet FortiMail 3.0/4.0 Encryption cross site scripting
2720| [63432] GE 3.5 Configuration File information disclosure
2721| [7510] Microsoft Internet Explorer 8/9 HTTP/HTTPS Request spoofing
2722| [7451] Barracuda Firewall up to 2.0.5 Default Account Login Account Backdoor weak authentication
2723| [7465] Cisco Wireless LAN Controller up to 7.2 HTTP Profiling Feature memory corruption
2724| [7343] Microsoft Lync 2012 HTTP Format String
2725| [7202] Apache HTTP Server 2.4.2 on Oracle Solaris ld_library_path cross site scripting
2726| [7209] NetIQ eDirectory up to 8.8.7.1 on Windows HTTP Request Crash denial of service
2727| [10527] Blue Coat Reporter 9.3 HTTP Traffic weak encryption
2728| [8189] Apple CUPS 1.6.1 cups/http-support.c http_resolve_cb denial of service
2729| [7094] IBM Tivoli Monitoring up to 6.2.3 HTTP Service Console cross site scripting
2730| [63133] Coleman Watts Webform CiviCRM Default Configuration unknown vulnerability
2731| [7098] Diga plc Qt 4.8.3 XmlHttpRequest Object information disclosure
2732| [6996] Opera Web Browser 12.10 HTTP Response Heap-based memory corruption
2733| [62981] django up to 1.4.1 django.http.HttpRequest.get_host cross site request forgery
2734| [7220] Novell NetIQ 2.3.0/2.3.1 Privileged User Manager unifid.exe set_log_config directory traversal
2735| [6748] Oracle Central Designer 1.3/1.4/1.4.2 HTTP unknown vulnerability
2736| [6681] Cisco Firewall Services Module up to 4.1 DCERPC Inspection Engine Network Packet Crash denial of service
2737| [6680] Cisco Firewall Services Module up to 4.1 DCERPC Inspection Engine Network Packet Crash denial of service
2738| [6679] Cisco Firewall 4.1 DCERPC Inspection Engine Stack-based memory corruption
2739| [62616] Bernhard Wymann TORCS 1.2.3/1.2.4/1.3.0/1.3.1/1.3.2 Configuration File Stack-based memory corruption
2740| [62608] Barracudanetworks Spam & Virus Firewall up to 4.0.1.009 cross site scripting
2741| [62558] Cerberus FTP Server up to 2.41 Default Configuration information disclosure
2742| [6562] Novell GroupWise 2012/8.0/8.00/8.01/8.02 HTTP interfaces Integer directory traversal
2743| [62314] Siemens SIMATIC PCS7 up to 8.0 Configuration File information disclosure
2744| [6297] Novell GroupWise up to 2012 Web Admin Interface gwia.exe HTTP Header memory corruption
2745| [6300] Apache HTTP Server mod_pagespeed Hostname information disclosure
2746| [6537] Fortinet FortiOS 4.3.8 objusagedlg cross site scripting
2747| [6535] Fortinet FortiOS 4.3.8 displaymessage cross site scripting
2748| [6068] Mozilla Firefox 14 HTTPMonitor Extension Use-After-Free privilege escalation
2749| [61757] Websense Web Security 7.0 Default Configuration information disclosure
2750| [61742] McAfee Firewall Reporter up to 5.1.0.5 unknown vulnerability
2751| [61731] phpMyAdmin 3.5.0.0/3.5.1.0/3.5.2.0 Error Message show_config_errors.php information disclosure
2752| [61664] Tridium Niagra Ax Framework up to 3.6 Default Configuration Cleartext information disclosure
2753| [6092] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_ajp.c information disclosure
2754| [6090] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_http.c information disclosure
2755| [5907] Novell Remote Manager 2.0.2 Release 99.10 Small Http Interface Daemon ProcessAuthorizationFailure HTTP Header denial of service
2756| [61439] Novell ZENworks Configuration Management 10.3 ActiveX Control ISGrid2.dll DoFindReplace memory corruption
2757| [61438] Novell ZENworks Configuration Management 10.3 ActiveX Control mscomct2.ocx memory corruption
2758| [61437] Novell ZENworks Configuration Management 10.3 ActiveX Control LaunchHelp.dll LaunchProcess directory traversal
2759| [5764] Oracle Solaris 10 Apache HTTP Server information disclosure
2760| [5729] Oracle E-Business Suite 11.5.10.2 on Oracle9i Application Server 1.0.2.2 HTTP Server memory corruption
2761| [5726] Oracle E-Business Suite 11.5.10.2 on Oracle9i Application Server 1.0.2.2 HTTP Server information disclosure
2762| [5707] Oracle Fusion Middleware 10.1.3.5/11.1.1.5/11.1.1.6/11.1.2.0 HTTP Server memory corruption
2763| [5704] Oracle Fusion Middleware 10.1.3.5/11.1.1.5/11.1.2.0 HTTP Server information disclosure
2764| [61224] Elitecore Cyberoam Unified Threat Management Default Configuration spoofing
2765| [5572] Python up to 2.7.2 SimpleHTTPServer Module SimpleHTTPServer.py list_directory cross site scripting
2766| [60862] CVS 1.11/1.12 HTTP Proxy Server proxy_connect memory corruption
2767| [5397] Avsoft Kerio WinRoute Firewall 5 Embedded Web Server information disclosure
2768| [5309] Mozilla Firefox 11.0 HTTP Redirects & Remote Content information disclosure
2769| [60606] Nsoftware Unitronics UniOPC up to 1.3.7 https50.ocx unspecified memory corruption
2770| [5100] Oracle Enterprise Manager 10.2.0.5/11.1.0.1 Config Management unknown vulnerability
2771| [5086] Oracle Enterprise Manager Config Management unknown vulnerability
2772| [5085] Oracle Database Server 11.1.0.7/11.2.0.2 Enterprise Manager Base Platform compareWizFirstConfig sql injection
2773| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
2774| [60568] Novell ZENworks Configuration Management 11.1a Preboot Service directory traversal
2775| [60567] phpMyAdmin up to 3.4.10.1 Error Message show_config_errors.php information disclosure
2776| [4955] Apache Traffic Server 3.0.3/3.1.2 HTTP Header Parser memory corruption
2777| [60495] Fortinet Antivirus 4.2.254.0/5.0.2.03300/10.0.2.7 Malware Detection unknown vulnerability
2778| [60493] Fortinet Antivirus 4.2.254.0/10.0.2.7 Malware Detection unknown vulnerability
2779| [4942] Fortinet Antivirus up to 36.1.8511 CAB File Parser privilege escalation
2780| [4925] Fortinet Antivirus 4.2.254.0/10.0.2.7/22.83.00.03 ELF File privilege escalation
2781| [4921] Fortinet Antivirus up to 5795 TAR File Parser privilege escalation
2782| [5320] Check Point Firewall on NGX R65/R71 information disclosure
2783| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
2784| [4840] VMware vCenter 4.0/4.1 Web Configuration Tool vCenter information disclosure
2785| [4913] IBM Tivoli Endpoint Manager 8.1 HTTPOnly Flag Cookie Handling information disclosure
2786| [6538] Check Point Firewall/VPN-1 NGX R65/R71 Topology Request information disclosure
2787| [4850] Apple Safari up to 5.1.4 WebKit HTTP Authorization HTTP Header Logging unknown vulnerability
2788| [4795] Apple iOS up to 5.01 Racoon Configuration File Format String
2789| [60358] Movabletype Movable Type Enterprise up to 4.1 Default Configuration directory traversal
2790| [91967] Endian UTM Firewall 2.4.x/2.5.x /cgi-bin/changepw.cgi cross site request forgery
2791| [91966] Endian UTM Firewall 2.4.x/2.5.x hotspot-changepw.cgi cross site request forgery
2792| [4872] Novell ZENworks Configuration Management up to 11.2 Preboot Service 0x6c / 0x4c Opcode Stack-based memory corruption
2793| [4871] Novell ZENworks Configuration Management up to 11.2 Preboot Service 0x21 Opcode Stack-based privilege escalation
2794| [4591] Mozilla Firefox up to 3.6.26/6.0 IPv6 Proxy XMLHttpRequest Object information disclosure
2795| [60036] Sitracker Support Incident Tracker 3.65 config.php memory corruption
2796| [91315] Fortinet FortiOS List field sorted Reflected cross site scripting
2797| [91314] Fortinet FortiOS Endpoint Reflected cross site scripting
2798| [91313] Fortinet FortiOS Log and Report Persistent cross site scripting
2799| [91312] Fortinet FortiOS Dailup List Persistent cross site scripting
2800| [91311] Fortinet FortiOS Endpoint Monitor Persistent cross site scripting
2801| [91246] Zoho ManageEngine Monitoring Manager 9.x/10.x ThresholdActionConfiguration.jsp cross site scripting
2802| [4582] Apache HTTP Server up to 2.2.21 protocol.c information disclosure
2803| [4581] WordPress up to 3.3.1 setup-config.php cross site scripting
2804| [59566] HP Laserjet M9040 Default Configuration memory corruption
2805| [59556] Apache HTTP Server up to 2.0.53 mod_proxy information disclosure
2806| [59468] VMware vCenter Update Manager Default Configuration directory traversal
2807| [59361] Cisco Small Business Srp520 up to 1.01.x Configuration Utility cross site request forgery
2808| [58863] Cisco Firewall Services Module Software up to 4.0 memory corruption
2809| [58597] 60cycle CMS 2.5.2 Error Message information disclosure
2810| [91317] Fortinet FortiAnalyzer Appliance Edit Device Group Reflected cross site scripting
2811| [91316] Fortinet FortiAnalyzer Appliance Filter Value on Log Access IPS Attack Listing Persistent cross site scripting
2812| [58397] Linux Kernel 2.6.16.9 l2cap_config_req memory corruption
2813| [58200] Avaya Secure Access Link Gateway 1.8 Default Configuration information disclosure
2814| [58199] shttpd 1.42 Embedded Web Server mongoose.c _shttpd_put_dir memory corruption
2815| [58129] Sunwayland ForceControl 6.1 httpsvr.exe memory corruption
2816| [58125] CA Gateway Security up to 8.0 Icihttp.exe memory corruption
2817| [57936] phpMyAdmin up to 3.4.3.0 ConfigGenerator.class.php cross site scripting
2818| [57888] Apache HttpClient 4.0/4.0.1/4.1 Authorization information disclosure
2819| [57879] Digium Asterisk up to 1.4.24.1 Default Configuration information disclosure
2820| [57550] Cisco WRVS4400N 1.1/1.3.0.5/1.3.1.0/1.3.2.0/2.0.0.3 Backup Configuration File memory corruption
2821| [57512] EMC SourceOne Email Management up to 6.6.0.1208 Default Configuration ExShortcut\Web.config information disclosure
2822| [57139] Novell ZENworks Configuration Management up to 10.3.0 memory corruption
2823| [57051] NetGear ProSafe WNAP210 Configuration File BackupConfig.php information disclosure
2824| [56944] Debian tex-common up to 0.16 Default Configuration memory corruption
2825| [56938] HP Discovery & Dependency Mapping Inventory 7.61 Default Configuration information disclosure
2826| [56545] novell ZENworks Configuration Manager up to 10.3.1 novell-tftp.exe memory corruption
2827| [4265] Opera Web Browser up to 11.01 on Windows HTTP HTTP Replies/Redirects memory corruption
2828| [56055] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
2829| [56054] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
2830| [56052] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
2831| [56051] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
2832| [56056] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
2833| [56053] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
2834| [62185] Geeklog up to 1.35 CSRF Protection admin/configuration.php cross site request forgery
2835| [55976] GNU gimp 2.6.11 Configuration File gfig-style.c gfig_read_parameter_gimp_rgb memory corruption
2836| [55975] GNU GIMP 2.6.11 Configuration File sphere-designer.c loadit memory corruption
2837| [55974] GNU GIMP 2.6.11 Configuration File lighting-ui.c load_preset_response memory corruption
2838| [62295] SilverStripe up to 2.4.3 Error RequestHandler.php httpError cross site scripting
2839| [55607] Artica Pandora FMS up to 2.1.1 Default Configuration index.php weak authentication
2840| [55556] Apache Tomcat up to 6.0.29 Default Configuration information disclosure
2841| [55550] vtiger CRM up to 5.2.0 config.template.php memory corruption
2842| [55498] HP LaserJet MFP Default Configuration directory traversal
2843| [4892] WordPress 2.0.2 Comment HTTP Request privilege escalation
2844| [54856] FreePBX 2.8.0 Configuration Interface page.recordings.php directory traversal
2845| [54841] Salvo Tomaselli Weborf HTTP Server up to 0.12.2 instance.c modURL directory traversal
2846| [54301] Red Hat JBoss Enterprise SOA Platform up to 5.0.0 Default Configuration unknown vulnerability
2847| [4163] Microsoft XML Core Services 3.x HTTP HTTP Response memory corruption
2848| [54148] HP OpenView Network Node Manager 7.53 nnmrptconfig.exe memory corruption
2849| [53798] Salvo Tomaselli Weborf HTTP Server up to 0.12.1 Connection Header Unicode Crash denial of service
2850| [53611] Standards Based Linux Instrumentation Sblim-sfcb 1.3.4/1.3.5/1.3.6/1.3.7 httpAdapter.c memory corruption
2851| [53610] Standards Based Linux Instrumentation Sblim-sfcb 1.3.4/1.3.5/1.3.6/1.3.7 httpAdapter.c memory corruption
2852| [53674] Symantec Sygate Personal Firewall 5.6 ActiveX Control SSHelper.dll memory corruption
2853| [53534] Salvo Tomaselli Weborf HTTP Server up to 0.12.0 Range Header Crash denial of service
2854| [53377] Cisco Mediator Framework up to 2.1 Configuration File unknown vulnerability
2855| [53367] Microsoft .NET Framework 1.0 Default Configuration cross site scripting
2856| [52826] Jasper httpdx 1.4/1.4.5/1.4.6/1.4.6b/1.5 Default Password weak authentication
2857| [53237] 60cycle CMS 2.5.2 news.php directory traversal
2858| [52646] Joomlanook Com Hsconfig 1.5 index.php directory traversal
2859| [52199] DZCP deV!L`z Clanportal 1.5.2 inc/config.php privilege escalation
2860| [52112] Samba up to 3.5.0 Default Configuration Symlink directory traversal
2861| [52925] Dragonfrugal DFD Cart up to 1.192 admin/configure.php cross site request forgery
2862| [51887] Google Chrome up to 2.0.172.32 HTTP Logging information disclosure
2863| [51734] lighttpd up to 1.1.1 Memory Consumption denial of service
2864| [51717] Apache HTTP Server up to 1.3.3 mod_proxy ap_proxy_send_fb memory corruption
2865| [51347] Intellicom NetBiterConfig 1.3.0 NetBiterConfig.exe memory corruption
2866| [51161] Moodle up to 1.9.6 config.php cross site request forgery
2867| [51348] Intellicom Netbiter Webscada Ws200 Network Configuration weak authentication
2868| [51105] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
2869| [51104] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe vsprintf memory corruption
2870| [51055] Frank Yaul CoreHTTP 0.5.3.1 Off-By-One memory corruption
2871| [86836] httpdx HTTP Server tolog Format String
2872| [52825] Jasper httpdx 1.4/1.4.5/1.4.6/1.4.6b/1.5 tolog memory corruption
2873| [50745] Sun OpenJDK Subsystem getConfigurations memory corruption
2874| [50726] Cherokee httpd 0.5.4 directory traversal
2875| [50427] Jdtmmsm ezRecipe-Zee 91 config/config.php directory traversal
2876| [50469] Jasper httpdx 1.4/1.4.3 http.cpp h_handlepeer memory corruption
2877| [50409] Jasper httpdx 1.4 http.c h_readrequest memory corruption
2878| [49935] Silcnet Silc Toolkit up to 1.0 silchttpserver.c silc_http_server_parse memory corruption
2879| [4030] Microsoft Windows Server 2008/Vista Wireless LAN AutoConfig Service Heap-based memory corruption
2880| [49814] Fortinet FortiOS 3.00 URL Filter unknown vulnerability
2881| [49716] Sun OpenSolaris up to Snv 85 Accelerator nl7c_http_log denial of service
2882| [49622] IBM WebSphere Commerce Suite Configuration File Net.Commerce information disclosure
2883| [49549] ntop 3.3.10 Authorization http.c checkHTTPpassword denial of service
2884| [49520] fhttpd 0.4.2 Authorization Crash denial of service
2885| [49127] Merlix Educate Server config.asp information disclosure
2886| [49025] Oracle Enterprise Manager 10.2.0.4 configHistory unknown vulnerability
2887| [86754] WordPress Plugin Configuration Module cross site scripting
2888| [48963] WordPress up to 1.1 Configuration File admin.php cross site scripting
2889| [48864] Axesstel MV 410R Default Configuration information disclosure
2890| [48810] Huawei D100 Router Default Configuration information disclosure
2891| [3992] Google Chrome up to 2.0.172 HTTP Response memory corruption
2892| [3983] Microsoft Internet Explorer 6/7 xmlHttpRequest memory corruption
2893| [48338] BaoFeng Storm 2.7.9 8/2.7.9 10/2.8/2.9/3.09.04.17 Config.dll memory corruption
2894| [48260] Armorlogic Profense Web Application Firewall up to 2.2.20 weak authentication
2895| [48257] Armorlogic Profense Web Application Firewall up to 2.2.20 cross site scripting
2896| [48256] Armorlogic Profense Web Application Firewall up to 2.2.20 cross site scripting
2897| [48034] Keir Davis X-Forum 0.6.2 Config.php memory corruption
2898| [47904] Wonko NotFTP 1.3.1 config.php directory traversal
2899| [47829] Sebastian Fernandez Zervit 0.02 libz/misc.c http_parse_hex memory corruption
2900| [3950] Microsoft Windows HTTP Service memory corruption
2901| [47486] Check Point Firewall-1 PKI Web Service Authorization memory corruption
2902| [86695] HP Embedded Web Server config cross site request forgery
2903| [86694] HP Embedded Web Server config cross site request forgery
2904| [46826] Cisco Application Networking Manager up to 1.1 Configuration File denial of service
2905| [46772] MyKtools 3.0 configuration_script.php directory traversal
2906| [46944] ZNC 0.056/0.058/0.062 Configuration File znc.conf memory corruption
2907| [46361] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe information disclosure
2908| [3930] Mozilla Firefox up to 3.0.5 HTTP Directive information disclosure
2909| [3929] Mozilla Firefox 3.0 HTTPOnly Cookie information disclosure
2910| [46438] Armorlogic Profense Web Application Firewall 2.6.2 ajax.html cross site request forgery
2911| [46437] Armorlogic Profense Web Application Firewall 2.6.2 proxy.html cross site scripting
2912| [45740] Invisible-island xterm Default Configuration memory corruption
2913| [45683] WordPress Page Flip Image Gallery plugin up to 0.1 getConfig.php directory traversal
2914| [45598] Barracuda Spam Firewall up to 3.0.01.7 Error Message index.cgi cross site scripting
2915| [45426] Fortinet Fortiguard Antivirus 3.113.0.0 unknown vulnerability
2916| [45270] Apple iPhone Configuration Web Utility 1.0 directory traversal
2917| [45187] Streamripper 1.63.5 lib/http.c http_get_m3u memory corruption
2918| [49380] Infireal mxCamArchive 2.2 archive/config.ini information disclosure
2919| [45030] Novell eDirectory up to 8.8.2 HTTP Protocol Stack Stack-Based cross site scripting
2920| [45029] Novell eDirectory up to 85.20 HTTP Protocol Stack Stack-based memory corruption
2921| [48414] A-LINK WL54AP2 up to 1.4.1 Network Configuration cross site request forgery
2922| [44397] phpAbook 0.8.4b/0.8.6b/0.8.7b/0.8.8b config.inc.php directory traversal
2923| [44318] lighttpd up to 1.1.9 Access Restriction information disclosure
2924| [44288] Apple Mac OS X 10.5.5 Default Configuration information disclosure
2925| [44123] Red Hat JBoss Enterprise Application Platform up to 4.1 Default Configuration information disclosure
2926| [43994] Gmanedit2 gmanedit 0.4.1 Configuration File callbacks.c open_man_file memory corruption
2927| [43452] Calacode Atmail 5.41 WebAdmin config.php information disclosure
2928| [43389] Mantis up to 0.17.3 adm_config_set.php memory corruption
2929| [43023] MM Chat 1.5 chatconfig.php directory traversal
2930| [42752] Lavrsen Motion up to 3.2.10 webhttpd.c read_client memory corruption
2931| [42656] CA eTrust Secure Content Manager 8.0 icihttp.exe memory corruption
2932| [42475] ca BrightStor ARCServe Backup R11.0 Configuration File directory traversal
2933| [42325] Apache HTTP Server up to 2.1.8 Error Page cross site scripting
2934| [42215] Peercast 0.1218 http::getauthuserpass memory corruption
2935| [42027] LinPHA up to 1.3.2 Configuration File directory traversal
2936| [42179] Motorola Surfboard Sb5100 configdata.html cross site request forgery
2937| [41925] Achmad Zaenuri ezRADIUS 0.1 config.ini information disclosure
2938| [41833] Perlbal 1.60 clienthttpbase.pm _serve_request_multiple directory traversal
2939| [41748] Microsoft Internet Explorer 7 XMLHttpRequest Calls privilege escalation
2940| [41747] Microsoft Internet Explorer 6 XMLHttpRequest Calls information disclosure
2941| [47400] MoinMo MoinMoin 1.6.1 config/multiconfig.py password_checker denial of service
2942| [41601] VMware Workstation/Player/ACE Default Configuration memory corruption
2943| [41346] Simm-comm SCI Photo Chat up to 3.4.9 Embedded HTTP Server directory traversal
2944| [41329] lighttpd 1.4.18 mod_cgi information disclosure
2945| [41162] Now Sms Mms Gateway up to 2007.06.27 HTTP Service Stack-based memory corruption
2946| [41035] Group Logic ExtremeZ-IP File and Print Server up to 5.1.2 Embedded HTTP Server directory traversal
2947| [40725] HFS HTTP File Server up to 2.x information disclosure
2948| [40720] HFS HTTP File Server up to 2.x directory traversal
2949| [40663] BitDefender Update Server Enterprise Manager http.exe directory traversal
2950| [40602] MiniWeb HTTP Server 0.8.19 http.c mwgetlocalfilename directory traversal
2951| [40601] MiniWeb HTTP Server 0.8.19 http.c _mwprocessreadsocket memory corruption
2952| [40502] Apache HTTP Server up to 2.2.5 mod_proxy_balancer memory corruption
2953| [40501] Apache HTTP Server 2.2.6 mod_proxy_balancer cross site request forgery
2954| [40406] SNETWORKS PHP CLASSIFIEDS 5.0 config.inc.php privilege escalation
2955| [40345] SourceForge Creammonkey 0.9/1.0/1.1 gm_xmlhttprequest privilege escalation
2956| [86365] RunCMS forum_config.php unknown vulnerability
2957| [40575] VideoLAN VLC 0.8.6d network/httpd.c httpd_filecallback memory corruption
2958| [40221] Apache HTTP Server 2.2.6 information disclosure
2959| [40148] PeerCast 0.1211/0.1212/0.1215/0.1217/Svn 344 servhs.cpp handshakehttp memory corruption
2960| [40147] Raiden Professional Servers raidenhttpd 2.0.19 Admin Function workspace.php webadmin directory traversal
2961| [40094] Gadu-Gadu Instant Messenger 7.7 gg.exe handleemotsconfig memory corruption
2962| [40087] Sergey Lyubka HTTPD up to 1.38 directory traversal
2963| [39968] SonicWALL GLobal VPN Client 4.0.0.810 Configuration File memory corruption
2964| [39825] Wireshark up to 0.99.6 HTTP Dissector memory corruption
2965| [3456] PHP 5.2.4 httpd.conf memory corruption
2966| [47424] Anonymityanywhere TorK 0.22 Configuration File privilege escalation
2967| [39574] EDraw Flowchart ActiveX 2.3 ActiveX Control edimage.ocx HttpDownloadFile() directory traversal
2968| [39523] FireConfig 0.5 dl.php directory traversal
2969| [39576] Django 0.96 Default Configuration cross site request forgery
2970| [39435] Serverkit shttp 0.0.4 safe_path directory traversal
2971| [39348] Juniper HTTP Service Heap-based memory corruption
2972| [39136] Zomplog 3.8.1 Default Configuration upload information disclosure
2973| [3358] Ruby 1.8.5/1.8.6 Common Name Verificator Net::HTTPS Schwache Verschl\xC3\xBCsselung
2974| [3334] Barracuda Spam Firewall Monitor Web Syslog cross site scripting
2975| [3327] Xitami HTTP Server HTTP Request If-Modified-Since Stack-Based memory corruption
2976| [38970] Wordsmith 1.0 Rc1 config.inc.php directory traversal
2977| [38969] Wordsmith 1.0 Rc1 config.inc.php privilege escalation
2978| [38913] AirDefense Airsensor M520 HTTPS Service adlog.cgi memory corruption
2979| [3298] Jan Kneschke lighttpd 1.4.15 mod_fastcgi memory corruption
2980| [85754] InterWorx SiteWorx httpd.php cross site scripting
2981| [85740] InterWorx NodeWorx firewall.php cross site scripting
2982| [85732] InterWorx NodeWorx http.php cross site scripting
2983| [86054] phpBG intern/config/forum.php unknown vulnerability
2984| [38320] Streamripper up to 1.62 lib/http.c httplib_parse_sc_header memory corruption
2985| [38170] TIBCO Rendezvous 7.5.2 HTTP Administration Interface index.html information disclosure
2986| [38069] Frank Yaul corehttp 0.5.3 Alpha http.c HttpSprockMake memory corruption
2987| [37918] Kaspersky Anti-Virus for Check Point FireWall 5.5 denial of service
2988| [38161] Visionsoft Audit 12.4.0.0 Configuration File information disclosure
2989| [37792] HP OpenVMS 8.3 Default Configuration information disclosure
2990| [37574] Htmlpurifier 2.0.0 configForm.php cross site scripting
2991| [37471] Sergey Lyubka Simple HTTPD 1.38 information disclosure
2992| [37393] Bughunter HTTP Server 1.6.2 httpsv.exe information disclosure
2993| [3132] Microsoft Internet Explorer 7 HTTP Basic Authentication IDN privilege escalation
2994| [37006] NavBoard 16 admin_config.php memory corruption
2995| [36844] Symantec Norton Personal Firewall 2004 ActiveX Control islalert.dll Get memory corruption
2996| [36821] BEA WebLogic Server 9.0 Configuration File information disclosure
2997| [36725] Firebird 2.1 config\configfile.cpp memory corruption
2998| [36738] Jakub Steiner original 0.11 inc/config.inc.php privilege escalation
2999| [36679] VersalSoft HTTP File Upload ActiveX control ActiveX Control ufileuploaderd.dll addfile memory corruption
3000| [36638] PHP up to 5.2.1 make_http_soap_request memory corruption
3001| [36508] Wserve HTTP Server 4.6 wserve_console.exe memory corruption
3002| [36420] Built2Go PHP Link Portal 1.79 config.php privilege escalation
3003| [36300] BMC Performance Manager Configuration File patrolagent.exe memory corruption
3004| [36315] Gracenote CDDBControl ActiveX control Configuration Parameter memory corruption
3005| [36079] Daniel Naber LanguageTool 0.8.8 Error Message httpserver.java cross site scripting
3006| [2997] Apache httpd/Tomcat 5.5/6.0 directory traversal
3007| [35846] Microsoft Windows 2000/Server 2003 Default Configuration information disclosure
3008| [35820] ManageEngine Firewall Analyzer 4.0 information disclosure
3009| [85275] CARE2X inc_config_color.php privilege escalation
3010| [85480] Fantastico includes/mysqlconfig.php directory traversal
3011| [35512] Icecast ezstream up to 0.2.1 Configuration File src/ezstream.c replacestring memory corruption
3012| [35435] Cynux Softwares PHPMyDesk 1.0 Beta pmd-config.php directory traversal
3013| [35506] Apple AirPort Extreme Default Configuration privilege escalation
3014| [34961] Nabocorp nabopoll 1.1/1.2 config_edit.php unknown vulnerability
3015| [35336] Web-app.org WebAPP up to 0.9.9.4 Default Configuration unknown vulnerability
3016| [34816] phpGraphy up to 0.9.13 config.php memory corruption
3017| [34783] Wireshark 0.99.3/0.99.4 HTTP Dissector Crash denial of service
3018| [34796] Cronosys Cadre PHP Framework 22020724 class.Quick_Config_Browser.php privilege escalation
3019| [34687] Rp World 1.0.2 config.php privilege escalation
3020| [34513] Maxum Development Rumpus FTP Server up to 5.1 HTTP Service Heap-based memory corruption
3021| [85115] Oracle HTTP Server information disclosure
3022| [85114] Oracle HTTP Server denial of service
3023| [85113] Oracle HTTP Server denial of service
3024| [85112] Oracle HTTP Server unknown vulnerability
3025| [85111] Oracle HTTP Server unknown vulnerability
3026| [34434] Oracle HTTP Server 9.2.0.8 unknown vulnerability
3027| [34481] InGate Firewall and SIParator up to 4.5.0 Authentication Mechanism privilege escalation
3028| [34346] TIS Internet Firewall Toolkit 2.1 cmd_usr memory corruption
3029| [85194] Magic Photo Storage Website include/db_config.php privilege escalation
3030| [85193] Magic Photo Storage Website include/config.php privilege escalation
3031| [34214] Karl Dahlke Edbrowse 3.1.3 http.c memory corruption
3032| [34043] Http explorer Http Explorer Web Server 1.02 directory traversal
3033| [2758] GNOME Display Manager up to 2.17 Face Browser Configuration GUI Format String
3034| [33781] Xerox WorkCentre 13.050.02.000/14.050.02.000 httpd.conf unknown vulnerability
3035| [33524] enomphp 4.0 Restore config.php directory traversal
3036| [33106] ECI Telecom B-focus Wireless 802.11bg Adsl2+ Router Configuration File information disclosure
3037| [33019] MiniHTTP Web Forum File Sharing Sever Powerpack 4.0 User Account join.asp privilege escalation
3038| [33012] Wireshark 0.99.3 HTTP Dissector Crash denial of service
3039| [2626] Novell eDirectory up to 8.7.3.8 Presp9 HTTP Protocol Stack BuildRedirectURL memory corruption
3040| [2621] Adobe Flash Player up to 9.0.16 HTTP XML Request XML.addRequestHeader cross site request forgery
3041| [32803] Oracle HTTP Server 9.2.0.7 unknown vulnerability
3042| [32801] Oracle HTTP Server 9.2.0.7 unknown vulnerability
3043| [2611] Apache HTTP Server up to 1.0.1 set_var Format String
3044| [32669] Sergey Lyubka Simple HTTPD 1.34 Stack-based memory corruption
3045|
3046| MITRE CVE - https://cve.mitre.org:
3047| [CVE-2013-1414] Multiple cross-site request forgery (CSRF) vulnerabilities in Fortinet FortiOS on FortiGate firewall devices before 4.3.13 and 5.x before 5.0.2 allow remote attackers to hijack the authentication of administrators for requests that modify (1) settings or (2) policies, or (3) restart the device via a rebootme action to system/maintenance/shutdown.
3048| [CVE-2012-4948] The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.
3049| [CVE-2012-2439] The default configuration of the NETGEAR ProSafe FVS318N firewall enables web-based administration on the WAN interface, which allows remote attackers to establish an HTTP connection and possibly have unspecified other impact via unknown vectors.
3050| [CVE-2008-7161] Fortinet FortiGuard Fortinet FortiGate-1000 3.00 build 040075,070111 allows remote attackers to bypass URL filtering via fragmented GET or POST requests that use HTTP/1.0 without the Host header. NOTE: this issue might be related to CVE-2005-3058.
3051| [CVE-2005-3058] Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
3052| [CVE-2002-2405] Check Point FireWall-1 4.1 and Next Generation (NG), with UserAuth configured to proxy HTTP traffic only, allows remote attackers to pass unauthorized HTTPS, FTP and possibly other traffic through the firewall.
3053| [CVE-2001-0483] Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set.
3054| [CVE-2013-4604] Fortinet FortiOS before 5.0.3 on FortiGate devices does not properly restrict Guest capabilities, which allows remote authenticated users to read, modify, or delete the records of arbitrary users by leveraging the Guest role.
3055| [CVE-2013-3454] Cisco TelePresence System Software 1.10.1 and earlier on 500, 13X0, 1X00, 30X0, and 3X00 devices, and 6.0.3 and earlier on TX 9X00 devices, has a default password for the pwrecovery account, which makes it easier for remote attackers to modify the configuration or perform arbitrary actions via HTTPS requests, aka Bug ID CSCui43128.
3056| [CVE-2013-3239] phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
3057| [CVE-2013-2961] The internal web server in the Basic Services component in IBM Tivoli Monitoring (ITM) 6.2.0 through FP3, 6.2.1 through FP4, 6.2.2 through FP9, and 6.2.3 before FP3, as used in IBM Application Manager for Smart Business (formerly Tivoli Foundations Application Manager) 1.2.1 before 1.2.1.0-TIV-IAMSB-FP0004 and other products, allows remote attackers to perform unspecified redirection of HTTP requests, and bypass the proxy-server configuration, via crafted HTTP traffic.
3058| [CVE-2013-1896] mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
3059| [CVE-2013-1451] Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not ensure that the SSL lock icon is consistent with the Address bar, which makes it easier for remote attackers to spoof web sites via a crafted HTML document that triggers many HTTPS requests to an arbitrary host, followed by an HTTPS request to a trusted host and then an HTTP request to an untrusted host, a related issue to CVE-2013-1450.
3060| [CVE-2013-1450] Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not properly reuse TCP sessions to the proxy server, which allows remote attackers to obtain sensitive information intended for a specific host via a crafted HTML document that triggers many HTTPS requests and then triggers an HTTP request to that host, as demonstrated by reading a Cookie header, aka MSRC 12096gd.
3061| [CVE-2013-1427] The configuration file for the FastCGI PHP support for lighthttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.
3062| [CVE-2013-1222] The Tomcat Web Management feature in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 does not properly configure Tomcat components, which allows remote attackers to launch arbitrary custom web applications via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCub38379.
3063| [CVE-2013-1221] The Tomcat Web Management feature in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 does not properly configure Tomcat components, which allows remote attackers to execute arbitrary code via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCub38384.
3064| [CVE-2013-0947] EMC RSA Authentication Manager 8.0 before P1 allows local users to discover cleartext operating-system passwords, HTTP plug-in proxy passwords, and SNMP communities by reading a (1) log file or (2) configuration file.
3065| [CVE-2012-6551] The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests.
3066| [CVE-2012-5316] Multiple cross-site scripting (XSS) vulnerabilities in Barracuda Spam & Virus Firewall 600 Firmware 4.0.1.009 and earlier allow remote authenticated users to inject arbitrary web script or HTML via (1) Troubleshooting in the Trace route Device module or (2) LDAP Username in the LDAP Configuration module.
3067| [CVE-2012-2440] The default configuration of the TP-Link 8840T router enables web-based administration on the WAN interface, which allows remote attackers to establish an HTTP connection and possibly have unspecified other impact via unknown vectors.
3068| [CVE-2012-2223] The xplat agent in Novell ZENworks Configuration Management (ZCM) 10.3.x before 10.3.4 and 11.x before 11.2 enables the HTTP TRACE method, which might make it easier for remote attackers to conduct cross-site tracing (XST) attacks via unspecified vectors.
3069| [CVE-2012-2213] ** DISPUTED ** Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br.
3070| [CVE-2012-2212] ** DISPUTED ** McAfee Web Gateway 7.0 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher did not provide configuration details for the vulnerable system, and the observed behavior might be consistent with a configuration that was (perhaps inadvertently) designed to allow access based on Host HTTP headers.
3071| [CVE-2012-0387] Memory leak in the HTTP Inspection Engine feature in the Zone-Based Firewall in Cisco IOS 12.4, 15.0, 15.1, and 15.2 allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted transit HTTP traffic, aka Bug ID CSCtq36153.
3072| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
3073| [CVE-2012-0147] Microsoft Forefront Unified Access Gateway (UAG) 2010 SP1 and SP1 Update 1 does not properly configure the default web site, which allows remote attackers to obtain sensitive information via a crafted HTTPS request, aka "Unfiltered Access to UAG Default Website Vulnerability."
3074| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
3075| [CVE-2011-5100] The web interface in McAfee Firewall Reporter before 5.1.0.13 does not properly implement cookie authentication, which allows remote attackers to obtain access, and disable anti-virus functionality, via an HTTP request.
3076| [CVE-2011-5033] Stack-based buffer overflow in CFS.c in ConfigServer Security & Firewall (CSF) before 5.43, when running on a DirectAdmin server, allows local users to cause a denial of service (crash) via a long string in an admin.list file.
3077| [CVE-2011-4899] ** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue
3078| [CVE-2011-4500] The UPnP IGD implementation on the Cisco Linksys WRT54GX with firmware 2.00.05, when UPnP is enabled, configures the SOAP server to listen on the WAN port, which allows remote attackers to administer the firewall via SOAP requests.
3079| [CVE-2011-4449] actions/files/files.php in WikkaWiki 1.3.1 and 1.3.2, when INTRANET_MODE is enabled, supports file uploads for file extensions that are typically absent from an Apache HTTP Server TypesConfig file, which makes it easier for remote attackers to execute arbitrary PHP code by placing this code in a file whose name has multiple extensions, as demonstrated by a (1) .mm or (2) .vpp file.
3080| [CVE-2011-4404] The default configuration of the HTTP server in Jetty in vSphere Update Manager in VMware vCenter Update Manager 4.0 before Update 4 and 4.1 before Update 2 allows remote attackers to conduct directory traversal attacks and read arbitrary files via unspecified vectors, a related issue to CVE-2009-1523.
3081| [CVE-2011-4317] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
3082| [CVE-2011-4140] The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
3083| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
3084| [CVE-2011-3389] The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
3085| [CVE-2011-3368] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
3086| [CVE-2011-3348] The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
3087| [CVE-2011-3297] Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.
3088| [CVE-2011-3281] Unspecified vulnerability in Cisco IOS 15.0 through 15.1, in certain HTTP Layer 7 Application Control and Inspection configurations, allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTP packet, aka Bug ID CSCto68554.
3089| [CVE-2011-3273] Memory leak in Cisco IOS 15.0 through 15.1, when IPS or Zone-Based Firewall (aka ZBFW) is configured, allows remote attackers to cause a denial of service (memory consumption or device crash) via vectors that trigger many session creation flows, aka Bug ID CSCti79848.
3090| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
3091| [CVE-2011-1582] Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419.
3092| [CVE-2011-1499] acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
3093| [CVE-2011-1406] Mahara before 1.3.6 does not properly handle an https URL in the wwwroot configuration setting, which makes it easier for user-assisted remote attackers to obtain credentials by sniffing the network at a time when an http URL is used for a login.
3094| [CVE-2011-1183] Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011-1419.
3095| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
3096| [CVE-2011-0767] Cross-site scripting (XSS) vulnerability in the management GUI in the MX Management Server in Imperva SecureSphere Web Application Firewall 6.2, 7.x, and 8.x allows remote attackers to inject arbitrary web script or HTML via an HTTP request to a firewalled server, aka Bug ID 31759.
3097| [CVE-2011-0393] Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707.
3098| [CVE-2010-4312] The default configuration of Apache Tomcat 6.x does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie.
3099| [CVE-2010-2704] Buffer overflow in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long HTTP request to nnmrptconfig.exe.
3100| [CVE-2010-2493] The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) the jbpm-console application, (7) the contract application, and (8) the uddi-console application in JBoss Enterprise SOA Platform before 5.0.2 contains GET and POST http-method elements, which allows remote attackers to bypass intended access restrictions via a crafted HTTP request.
3101| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
3102| [CVE-2010-2054] Integer overflow in httpAdapter.c in httpAdapter in SBLIM SFCB 1.3.4 through 1.3.7, when the configuration sets httpMaxContentLength to a zero value, allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via a large integer in the Content-Length HTTP header, aka bug #3001915. NOTE: some of these details are obtained from third party information.
3103| [CVE-2010-0643] Google Chrome before 4.0.249.89 attempts to make direct connections to web sites when all configured proxy servers are unavailable, which allows remote HTTP servers to obtain potentially sensitive information about the identity of a client user via standard HTTP logging, as demonstrated by a proxy server that was configured for the purpose of anonymity.
3104| [CVE-2010-0600] Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not properly restrict network access to an unspecified configuration file, which allows remote attackers to read passwords and unspecified other account details via a (1) XML RPC or (2) XML RPC over HTTPS session, aka Bug ID CSCtb83512.
3105| [CVE-2010-0597] Unspecified vulnerability in Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 allows remote authenticated users to read or modify the device configuration, and gain privileges or cause a denial of service (device reload), via a (1) XML RPC or (2) XML RPC over HTTPS request, aka Bug ID CSCtb83618.
3106| [CVE-2010-0596] Unspecified vulnerability in Cisco Mediator Framework 2.2 before 2.2.1.dev.1 and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 allows remote authenticated users to read or modify the device configuration, and gain privileges, via a (1) HTTP or (2) HTTPS request, aka Bug ID CSCtb83607.
3107| [CVE-2010-0386] The default configuration of Sun Java System Application Server 7 and 7 2004Q2 enables the HTTP TRACE method, which makes it easier for remote attackers to steal cookies and authentication credentials via a cross-site tracing (XST) attack, a related issue to CVE-2004-2763 and CVE-2005-3398.
3108| [CVE-2009-4786] Multiple cross-site scripting (XSS) vulnerabilities in Pligg before 1.0.3 allow remote attackers to inject arbitrary web script or HTML via the HTTP Referer header to (1) admin/admin_config.php, (2) admin/admin_modules.php, (3) delete.php, (4) editlink.php, (5) submit.php, (6) submit_groups.php, (7) user_add_remove_links.php, and (8) user_settings.php.
3109| [CVE-2009-3890] Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.
3110| [CVE-2009-3457] Cisco ACE XML Gateway (AXG) and ACE Web Application Firewall (WAF) before 6.1 allow remote attackers to obtain sensitive information via an HTTP request that lacks a handler, as demonstrated by (1) an OPTIONS request or (2) a crafted GET request, leading to a Message-handling Errors message containing a certain client intranet IP address, aka Bug ID CSCtb82159.
3111| [CVE-2009-3250] The saveForwardAttachments procedure in the Compose Mail functionality in vtiger CRM 5.0.4 allows remote authenticated users to execute arbitrary code by composing an e-mail message with an attachment filename ending in (1) .php in installations based on certain Apache HTTP Server configurations, (2) .php. on Windows, or (3) .php/ on Linux, and then making a direct request to a certain pathname under storage/.
3112| [CVE-2009-2820] The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
3113| [CVE-2009-2299] The Artofdefence Hyperguard Web Application Firewall (WAF) module before 2.5.5-11635, 3.0 before 3.0.3-11636, and 3.1 before 3.1.1-11637, a module for the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via an HTTP request with a large Content-Length value but no POST data.
3114| [CVE-2009-1890] The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
3115| [CVE-2009-1227] ** DISPUTED ** NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFAs. The issue was not reproduced. We have conducted a thorough analysis of the relevant code and verified that we are secure against this attack. We consider this attack to pose no risk to Check Point customers." In addition, the original researcher, whose reliability is unknown as of 20090407, also states that the issue "was discovered during a pen-test where the client would not allow further analysis."
3116| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
3117| [CVE-2009-1167] Unspecified vulnerability on the Cisco Wireless LAN Controller (WLC) platform 4.x before 4.2.205.0 and 5.x before 5.2.191.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to modify the configuration via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCsy44672.
3118| [CVE-2009-1156] Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series devices 8.0 before 8.0(4)25 and 8.1 before 8.1(2)15, when an SSL VPN or ASDM access is configured, allows remote attackers to cause a denial of service (device reload) via a crafted (1) SSL or (2) HTTP packet.
3119| [CVE-2009-1048] The web interface on the snom VoIP phones snom 300, snom 320, snom 360, snom 370, and snom 820 with firmware 6.5 before 6.5.20, 7.1 before 7.1.39, and 7.3 before 7.3.14 allows remote attackers to bypass authentication, and reconfigure the phone or make arbitrary use of the phone, via a (1) http or (2) https request with 127.0.0.1 in the Host header.
3120| [CVE-2009-0803] SmoothWall SmoothGuardian, as used in SmoothWall Firewall, NetworkGuardian, and SchoolGuardian 2008, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.
3121| [CVE-2009-0471] Cross-site request forgery (CSRF) vulnerability in the HTTP server in Cisco IOS 12.4(23) allows remote attackers to execute arbitrary commands, as demonstrated by executing the hostname command with a level/15/configure/-/hostname request.
3122| [CVE-2009-0468] Multiple cross-site request forgery (CSRF) vulnerabilities in ajax.html in Profense Web Application Firewall 2.6.2 and 2.6.3 allow remote attackers to hijack the authentication of administrators for requests that (1) shutdown the server, (2) send ping packets, (3) enable network services, (4) configure a proxy server, and (5) modify other settings via parameters in the query string.
3123| [CVE-2008-7253] The default configuration of the web server in IBM Lotus Domino Server, possibly 6.0 through 8.0, enables the HTTP TRACE method, which makes it easier for remote attackers to steal cookies and authentication credentials via a cross-site tracing (XST) attack, a related issue to CVE-2004-2763 and CVE-2005-3398.
3124| [CVE-2008-6171] includes/bootstrap.inc in Drupal 5.x before 5.12 and 6.x before 6.6, when the server is configured for "IP-based virtual hosts," allows remote attackers to include and execute arbitrary files via the HTTP Host header.
3125| [CVE-2008-5696] Novell NetWare 6.5 before Support Pack 8, when an OES2 Linux server is installed into the NDS tree, does not require a password for the ApacheAdmin console, which allows remote attackers to reconfigure the Apache HTTP Server via console operations.
3126| [CVE-2008-5266] Cross-site scripting (XSS) vulnerability in configuration/httpListenerEdit.jsf in the GlassFish 2 UR2 b04 webadmin interface in Sun Java System Application Server 9.1_01 build b09d-fcs and 9.1_02 build b04-fcs allows remote attackers to inject arbitrary web script or HTML via the name parameter, a different vector than CVE-2008-2751.
3127| [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
3128| [CVE-2008-4360] mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.
3129| [CVE-2008-4359] lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive information or possibly modify data.
3130| [CVE-2008-4128] Multiple cross-site request forgery (CSRF) vulnerabilities in the HTTP Administration component in Cisco IOS 12.4 on the 871 Integrated Services Router allow remote attackers to execute arbitrary commands via (1) a certain "show privilege" command to the /level/15/exec/- URI, and (2) a certain "alias exec" command to the /level/15/exec/-/configure/http URI. NOTE: some of these details are obtained from third party information.
3131| [CVE-2008-3866] The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configuration GUI, which allows local users to bypass intended access restrictions and change firewall settings by using a modified client to send crafted packets.
3132| [CVE-2008-3812] Cisco IOS 12.4, when IOS firewall Application Inspection Control (AIC) with HTTP Deep Packet Inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed HTTP transit packet.
3133| [CVE-2008-2735] The HTTP server in Cisco Adaptive Security Appliance (ASA) 5500 devices 8.0 before 8.0(3)15 and 8.1 before 8.1(1)5, when configured as a clientless SSL VPN endpoint, does not properly process URIs, which allows remote attackers to cause a denial of service (device reload) via a URI in a crafted SSL or HTTP packet, aka Bug ID CSCsq19369.
3134| [CVE-2008-2734] Memory leak in the crypto functionality in Cisco Adaptive Security Appliance (ASA) 5500 devices 7.2 before 7.2(4)2, 8.0 before 8.0(3)14, and 8.1 before 8.1(1)4, when configured as a clientless SSL VPN endpoint, allows remote attackers to cause a denial of service (memory consumption and VPN hang) via a crafted SSL or HTTP packet, aka Bug ID CSCso66472.
3135| [CVE-2008-2384] SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
3136| [CVE-2008-1263] The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI.
3137| [CVE-2008-0410] HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as <id>%version%</id> in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL.
3138| [CVE-2007-6724] Vidalia bundle before 0.1.2.18, when running on Windows, installs Privoxy with a configuration file (config.txt or config) that contains an insecure enable-remote-http-toggle setting, which allows remote attackers to bypass intended access restrictions and modify configuration.
3139| [CVE-2007-6640] Creammonkey 0.9 through 1.1 and GreaseKit 1.2 through 1.3 does not properly prevent access to dangerous functions, which allows remote attackers to read the configuration, modify the configuration, or send an HTTP request via the (1) GM_addStyle, (2) GM_log, (3) GM_openInTab, (4) GM_setValue, (5) GM_getValue, or (6) GM_xmlhttpRequest function within a web page on which a userscript is configured.
3140| [CVE-2007-6385] The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries.
3141| [CVE-2007-5900] PHP before 5.2.5 allows local users to bypass protection mechanisms configured through php_admin_value or php_admin_flag in httpd.conf by using ini_set to modify arbitrary configuration variables, a different issue than CVE-2006-4625.
3142| [CVE-2007-5413] httpd.tkd in Radia Integration Server in Hewlett-Packard (HP) OpenView Configuration Management (CM) Infrastructure 4.0 through 4.2i and Client Configuration Manager (CCM) 2.0 allows remote attackers to read arbitrary files via URLs containing tilde (~) references to home directories, as demonstrated by ~root.
3143| [CVE-2007-4822] Cross-site request forgery (CSRF) vulnerability in the device management interface in Buffalo AirStation WHR-G54S 1.20 allows remote attackers to make configuration changes as an administrator via HTTP requests to certain HTML pages in the res parameter with an inp req parameter to cgi-bin/cgi, as demonstrated by accessing (1) ap.html and (2) filter_ip.html.
3144| [CVE-2007-4174] Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node.
3145| [CVE-2007-3948] connections.c in lighttpd before 1.4.16 might accept more connections than the configured maximum, which allows remote attackers to cause a denial of service (failed assertion) via a large number of connection attempts.
3146| [CVE-2007-3009] Format string vulnerability in the MprLogToFile::logEvent function in Mbedthis AppWeb 2.0.5-4, when the build supports logging but the configuration disables logging, allows remote attackers to cause a denial of service (daemon crash) via format string specifiers in the HTTP scheme, as demonstrated by a "GET %n://localhost:80/" request.
3147| [CVE-2007-1743] suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
3148| [CVE-2007-1742] suexec in Apache HTTP Server (httpd) 2.2.3 uses a partial comparison for verifying whether the current directory is within the document root, which might allow local users to perform unauthorized operations on incorrect directories, as demonstrated using "html_backup" and "htmleditor" under an "html" directory. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
3149| [CVE-2007-1741] Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
3150| [CVE-2007-1459] Multiple PHP remote file inclusion vulnerabilities in WebCreator 0.2.6-rc3 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the moddir parameter to (1) content/load.inc.php, (2) config/load.inc.php, (3) http/load.inc.php, and unspecified other files.
3151| [CVE-2007-1168] Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 allows remote attackers to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp).
3152| [CVE-2007-0966] Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.11), when the HTTPS server is enabled, allows remote attackers to cause a denial of service (device reboot) via certain HTTPS traffic.
3153| [CVE-2007-0965] Cisco FWSM 3.x before 3.1(3.2), when authentication is configured to use "aaa authentication match" or "aaa authentication include", allows remote attackers to cause a denial of service (device reboot) via a long HTTP request.
3154| [CVE-2007-0964] Cisco FWSM 3.x before 3.1(3.18), when authentication is configured to use "aaa authentication match" or "aaa authentication include", allows remote attackers to cause a denial of service (device reboot) via a malformed HTTPS request.
3155| [CVE-2007-0528] The admin web console implemented by the Centrality Communications (aka Aredfox) PA168 chipset and firmware 1.54 and earlier, as provided by various IP phones, does not require passwords or authentication tokens when using HTTP, which allows remote attackers to connect to existing superuser sessions and obtain sensitive information (passwords and configuration data).
3156| [CVE-2007-0086] ** DISPUTED ** The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal.
3157| [CVE-2006-6477] FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and configured to use only HTTP, allows local users to modify requests and responses between a client and an agent by hijacking an HTTP FRAgent daemon and conducting a man-in-the-middle (MITM) attack.
3158| [CVE-2006-6472] The httpd.conf file in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 configures port 443 to be always active, which has unknown impact and remote attack vectors.
3159| [CVE-2006-5711] ECI Telecom B-FOCuS Wireless 802.11b/g ADSL2+ Router allows remote attackers to read arbitrary files via a certain HTTP request, as demonstrated by a request for a router configuration file, related to the /html/defs/ URI.
3160| [CVE-2006-4674] Direct static code injection vulnerability in doku.php in DokuWiki before 2006-030-09c allows remote attackers to execute arbitrary PHP code via the X-FORWARDED-FOR HTTP header, which is stored in config.php.
3161| [CVE-2006-3838] Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe)
3162| [CVE-2006-3595] The default configuration of IOS HTTP server in Cisco Router Web Setup (CRWS) before 3.3.0 build 31 does not require credentials, which allows remote attackers to access the server with arbitrary privilege levels, aka bug CSCsa78190.
3163| [CVE-2006-3551] NCP Secure Enterprise Client (aka VPN/PKI client) 8.30 Build 59, and possibly earlier versions, when the Link Firewall and Personal Firewall are both configured to block all inbound and outbound network traffic, allows context-dependent attackers to send inbound UDP traffic with source port 67 and destination port 68, and outbound UDP traffic with source port 68 and destination port 67.
3164| [CVE-2006-3222] The FTP proxy module in Fortinet FortiOS (FortiGate) before 2.80 MR12 and 3.0 MR2 allows remote attackers to bypass anti-virus scanning via the Enhanced Passive (EPSV) FTP mode.
3165| [CVE-2006-2341] The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI.
3166| [CVE-2006-2113] The embedded HTTP server in Fuji Xerox Printing Systems (FXPS) print engine, as used in products including (1) Dell 3000cn through 5110cn and (2) Fuji Xerox DocuPrint firmware before 20060628 and Network Option Card firmware before 5.13, does not properly perform authentication for HTTP requests, which allows remote attackers to modify system configuration via crafted requests, including changing the administrator password or causing a denial of service to the print server.
3167| [CVE-2006-1079] htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
3168| [CVE-2006-1078] Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
3169| [CVE-2006-1003] The backup configuration option in NETGEAR WGT624 Wireless Firewall Router stores sensitive information in cleartext, which allows remote attackers to obtain passwords and gain privileges.
3170| [CVE-2006-0760] LightTPD 1.4.8 and earlier, when the web root is on a case-insensitive filesystem, allows remote attackers to bypass URL checks and obtain sensitive information via file extensions with unexpected capitalization, as demonstrated by a request for index.PHP when the configuration invokes the PHP interpreter only for ".php" names.
3171| [CVE-2006-0248] Virata-EmWeb web server 6_1_0, as used in (1) Intracom JetSpeed 500 and 520 and (2) Allied Data Technologies CopperJet 811 RouterPlus, allows remote attackers to access privileged information, such as user lists and configuration settings, via direct HTTP requests.
3172| [CVE-2005-4836] The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information.
3173| [CVE-2005-4731] The Next action in PEAR HTML_QuickForm_Controller 1.0.4 includes the SID in the URL even when session.use_only_cookies is configured, which allows remote attackers to obtain the SID via an HTTP Referer field and possibly other vectors.
3174| [CVE-2005-4660] Race condition in IPCop (aka IPCop Firewall) before 1.4.10 might allow local users to overwrite system configuration files and gain privileges by replacing a backup archive during the time window when the archive is owned by "nobody" but not yet encrypted, then executing ipcoprscfg to restore from this backup.
3175| [CVE-2005-4659] IPCop (aka IPCop Firewall) before 1.4.10 has world-readable permissions for the backup.key file, which might allow local users to overwrite system configuration files and gain privileges by creating a malicious encrypted backup archive owned by "nobody", then executing ipcoprscfg to restore from this backup.
3176| [CVE-2005-4146] Lyris ListManager before 8.9b allows remote attackers to obtain sensitive information via a request to the TCLHTTPd status module, which provides sensitive server configuration information.
3177| [CVE-2005-3751] HTTP request smuggling vulnerability in Pound before 1.9.4 allows remote attackers to poison web caches, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with conflicting Content-length and Transfer-encoding headers.
3178| [CVE-2005-3721] The default configuration of the HTTP server in Hitachi IP5000 VOIP WIFI Phone 1.5.6 does not require authentication for sensitive configuration pages, which allows remote attackers to modify configuration.
3179| [CVE-2005-3630] Fedora Directory Server before 10 allows remote attackers to obtain sensitive information, such as the password from adm.conf via an IFRAME element, probably involving an Apache httpd.conf configuration that orders "allow" directives before "deny" directives.
3180| [CVE-2005-3398] The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote attackers to obtain sensitive information such as cookies and authentication data from HTTP headers.
3181| [CVE-2005-3118] Mason before 1.0.0 does not install the init script after the user uses Mason to configure a firewall, which causes the system to run without a firewall after a reboot.
3182| [CVE-2005-3057] The FTP component in FortiGate 2.8 running FortiOS 2.8MR10 and v3beta, and other versions before 3.0 MR1, allows remote attackers to bypass the Fortinet FTP anti-virus engine by sending a STOR command and uploading a file before the FTP server response has been sent, as demonstrated using LFTP.
3183| [CVE-2005-2916] Linksys WRT54G 3.01.03, 3.03.6, 4.00.7, and possibly other versions before 4.20.7, does not verify user authentication until after an HTTP POST request has been processed, which allows remote attackers to (1) modify configuration using restore.cgi or (2) upload new firmware using upgrade.cgi.
3184| [CVE-2005-2149] config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.
3185| [CVE-2005-2094] Sun SunONE web server 6.1 SP1 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes SunONE to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
3186| [CVE-2005-2093] Oracle 9i Application Server (Oracle9iAS) 9.0.2 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Application Server to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
3187| [CVE-2005-2092] BEA Systems WebLogic 8.1 SP1 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebLogic to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
3188| [CVE-2005-2091] IBM WebSphere 5.1 and WebSphere 5.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebSphere to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
3189| [CVE-2005-2090] Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
3190| [CVE-2005-2089] Microsoft IIS 5.0 and 6.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes IIS to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
3191| [CVE-2005-2088] The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
3192| [CVE-2005-1837] Fortinet firewall running FortiOS 2.x contains a hardcoded username with the password set to the serial number, which allows local users with console access to gain privileges.
3193| [CVE-2005-1517] Unknown vulnerability in Cisco Firewall Services Module (FWSM) 2.3.1 and earlier, when using URL, FTP, or HTTPS filtering exceptions, allows certain TCP packets to bypass access control lists (ACLs).
3194| [CVE-2005-1345] Squid 2.5.STABLE9 and earlier does not trigger a fatal error when it identifies missing or invalid ACLs in the http_access configuration, which could lead to less restrictive ACLs than intended by the administrator.
3195| [CVE-2005-0618] The SMTP binding function in Symantec Firewall/VPN Appliance 200/200R firmware after 1.5Z and before 1.68, Gateway Security 360/360R and 460/460R firmware before vuild 858, and Nexland Pro800turbo, when configured for load balancing between two WANs, might send SMTP traffic to a trusted network through an untrusted network.
3196| [CVE-2004-2763] The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
3197| [CVE-2004-2506] Unparsed web content delivery vulnerability in WIKINDX before 0.9.9g allows remote attackers to obtain sensitive information via a direct HTTP request to the config.inc file.
3198| [CVE-2004-2329] Kerio Personal Firewall (KPF) 2.1.5 allows local users to execute arbitrary code with SYSTEM privileges via the Load button in the Firewall Configuration Files option, which does not drop privileges before opening the file loading dialog box.
3199| [CVE-2004-2320] The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
3200| [CVE-2004-2176] The Internet Connection Firewall (ICF) in Microsoft Windows XP SP2 is configured by default to trust sessmgr.exe, which allows local users to use sessmgr.exe to create a local listening port that bypasses the ICF access controls.
3201| [CVE-2004-2126] The upgrade for BlackICE PC Protection 3.6 and earlier sets insecure permissions for .INI files such as (1) blackice.ini, (2) firewall.ini, (3) protect.ini, or (4) sigs.ini, which allows local users to modify BlackICE configuration or possibly execute arbitrary code by exploiting vulnerabilities in the .INI parsers.
3202| [CVE-2004-2100] GeoHttpServer, when configured to authenticate users, allows remote attackers to bypass authentication and access unauthorized files via a URL that contains %0a%0a (encoded newlines).
3203| [CVE-2004-1984] Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) phpinfo.php, (2) addpic.php, (3) config.php, (4) db_input.php, (5) displayecard.php, (6) ecard.php, (7) crop.inc.php, which reveal the full path in a PHP error message.
3204| [CVE-2004-1749] Attack Mitigator IPS 5500 3.11.008, and possibly other versions, when configured in a one-armed routing configuration, allows remote attackers to cause a denial of service (CPU consumption) via a large number of HTTP requests.
3205| [CVE-2004-1714] BlackICE PC Protection and Server Protection installs (1) firewall.ini, (2) blackice.ini, (3) sigs.ini and (4) protect.ini with Everyone Full Control permissions, which allows local users to cause a denial of service (crash) or modify configuration, as demonstrated by modifying firewall.ini to contain a large firewall rule.
3206| [CVE-2004-1557] MyWebServer 1.0.3 allows remote attackers to bypass authentication, modify configuration, and read arbitrary files via a direct HTTP request to (1) /admin or (2) ServerProperties.html.
3207| [CVE-2004-1540] ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.
3208| [CVE-2004-1528] The Event Calendar module 2.13 for PHP-Nuke allows remote attackers to gain sensitive information via an HTTP request to (1) config.php, (2) index.php, or (3) submit.php, which reveal the full path in an error message.
3209| [CVE-2004-1474] Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file.
3210| [CVE-2004-1023] Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration.
3211| [CVE-2004-0819] The bridge functionality in OpenBSD 3.4 and 3.5, when running a gateway configured as a bridging firewall with the link2 option for IPSec enabled, allows remote attackers to cause a denial of service (crash) via an ICMP echo (ping) packet.
3212| [CVE-2004-0335] LAN SUITE Web Mail 602Pro, when configured to use the "Directory browsing" feature, allows remote attackers to obtain a directory listing via an HTTP request to (1) index.html, (2) cgi-bin/, or (3) users/.
3213| [CVE-2004-0039] Multiple format string vulnerabilities in HTTP Application Intelligence (AI) component in Check Point Firewall-1 NG-AI R55 and R54, and Check Point Firewall-1 HTTP Security Server included with NG FP1, FP2, and FP3 allows remote attackers to execute arbitrary code via HTTP requests that cause format string specifiers to be used in an error message, as demonstrated using the scheme of a URI.
3214| [CVE-2004-0031] PHPGEDVIEW 2.61 allows remote attackers to reinstall the software and change the administrator password via a direct HTTP request to editconfig.php.
3215| [CVE-2003-1569] GoAhead WebServer before 2.1.5 on Windows 95, 98, and ME allows remote attackers to cause a denial of service (daemon crash) via an HTTP request with a (1) con, (2) nul, (3) clock$, or (4) config$ device name in a path component, different vectors than CVE-2001-0385.
3216| [CVE-2003-1001] Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
3217| [CVE-2003-0904] Microsoft Exchange 2003 and Outlook Web Access (OWA), when configured to use NTLM authentication, does not properly reuse HTTP connections, which can cause OWA users to view mailboxes of other users when Kerberos has been disabled as an authentication method for IIS 6.0, e.g. when SharePoint Services 2.0 is installed.
3218| [CVE-2003-0249] ** DISPUTED ** PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report."
3219| [CVE-2003-0240] The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash).
3220| [CVE-2003-0106] The HTTP proxy for Symantec Enterprise Firewall (SEF) 7.0 allows proxy users to bypass pattern matching for blocked URLs via requests that are URL-encoded with escapes, Unicode, or UTF-8.
3221| [CVE-2002-2355] Netgear FM114P firmware 1.3 wireless firewall, when configured to backup configuration information, stores DDNS (DynDNS) user name and password, MAC address filtering table and possibly other information in cleartext, which could allow local users to obtain sensitive information.
3222| [CVE-2002-2336] Norton Personal Firewall 2002 4.0, when configured to automatically block attacks, allows remote attackers to block IP addresses and cause a denial of service via spoofed packets.
3223| [CVE-2002-2307] The default configuration of BenHur Firewall release 3 update 066 fix 2 allows remote attackers to access arbitrary services by connecting from source port 20.
3224| [CVE-2002-2191] Lotus Domino 5.0.9a and earlier, even when configured with the 'DominoNoBanner=1' option, allows remote attackers to obtain potential sensitive information such as the version via a request for a non-existent .nsf database, which leaks the version in the HTTP banner.
3225| [CVE-2002-2140] Buffer overflow in Cisco PIX Firewall 5.2.x to 5.2.8, 6.0.x to 6.0.3, 6.1.x to 6.1.3, and 6.2.x to 6.2.1 allows remote attackers to cause a denial of service via HTTP traffic authentication using (1) TACACS+ or (2) RADIUS.
3226| [CVE-2002-1937] Symantec Firewall/VPN Appliance 100 through 200R hardcodes the administrator's MAC address inside the firewall's configuration, which allows remote attackers to spoof the administrator's MAC address and perform an ARP poisoning man-in-the-middle attack to obtain the administrator's password.
3227| [CVE-2002-1635] The Apache configuration file (httpd.conf) in Oracle 9i Application Server (9iAS) uses a Location alias for /perl directory instead of a ScriptAlias, which allows remote attackers to read the source code of arbitrary CGI files via a URL containing the /perl directory instead of /cgi-bin.
3228| [CVE-2002-1098] Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the concentrator.
3229| [CVE-2002-0778] The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP.
3230| [CVE-2002-0769] The web-based configuration interface for the Cisco ATA 186 Analog Telephone Adaptor allows remote attackers to bypass authentication via an HTTP POST request with a single byte, which allows the attackers to (1) obtain the password from the login screen, or (2) reconfigure the adaptor by modifying certain request parameters.
3231| [CVE-2002-0736] Microsoft BackOffice 4.0 and 4.5, when configured to be accessible by other systems, allows remote attackers to bypass authentication and access the administrative ASP pages via an HTTP request with an authorization type (auth_type) that is not blank.
3232| [CVE-2002-0663] Buffer overflow in HTTP Proxy for Symantec Norton Personal Internet Firewall 3.0.4.91 and Norton Internet Security 2001 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large outgoing HTTP request.
3233| [CVE-2002-0602] Snapgear Lite+ firewall 1.5.4 and 1.5.3 allows remote attackers to cause a denial of service (crash) via a large number of connections to (1) the HTTP web management port, or (2) the PPTP port.
3234| [CVE-2002-0562] The default configuration of Oracle 9i Application Server 1.0.2.x running Oracle JSP or SQLJSP stores globals.jsa under the web root, which allows remote attackers to gain sensitive information including usernames and passwords via a direct HTTP request to globals.jsa.
3235| [CVE-2002-0532] EMU Webmail allows local users to execute arbitrary programs via a .. (dot dot) in the HTTP Host header that points to a Trojan horse configuration file that contains a pageroot specifier that contains shell metacharacters.
3236| [CVE-2002-0428] Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
3237| [CVE-2002-0408] htcgibin.exe in Lotus Domino server 5.0.9a and earlier, when configured with the NoBanner setting, allows remote attackers to determine the version number of the server via a request that generates an HTTP 500 error code, which leaks the version in a hard-coded error message.
3238| [CVE-2002-0349] Tiny Personal Firewall (TPF) 2.0.15, under certain configurations, will pop up an alert to the system even when the screen is locked, which could allow an attacker with physical access to the machine to hide activities or bypass access restrictions.
3239| [CVE-2002-0309] SMTP proxy in Symantec Enterprise Firewall (SEF) 6.5.x includes the firewall's physical interface name and address in an SMTP protocol exchange when NAT translation is made to an address other than the firewall, which could allow remote attackers to determine certain firewall configuration information.
3240| [CVE-2002-0250] Web configuration utility in HP AdvanceStack hubs J3200A through J3210A with firmware version A.03.07 and earlier, allows unauthorized users to bypass authentication via a direct HTTP request to the web_access.html file, which allows the user to change the switch's configuration and modify the administrator password.
3241| [CVE-2002-0240] PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.
3242| [CVE-2001-1431] Nokia Firewall Appliances running IPSO 3.3 and VPN-1/FireWall-1 4.1 Service Pack 3, IPSO 3.4 and VPN-1/FireWall-1 4.1 Service Pack 4, and IPSO 3.4 or IPSO 3.4.1 and VPN-1/FireWall-1 4.1 Service Pack 5, when SYN Defender is configured in Active Gateway mode, does not properly rewrite the third packet of a TCP three-way handshake to use the NAT IP address, which allows remote attackers to gain sensitive information.
3243| [CVE-2001-1303] The default configuration of SecuRemote for Check Point Firewall-1 allows remote attackers to obtain sensitive configuration information for the protected network without authentication.
3244| [CVE-2001-1087] The default configuration of the config.http.tunnel.allow_ports option on NetCache devices is set to +all, which allows remote attackers to connect to arbitrary ports on remote systems behind the device.
3245| [CVE-2001-0821] The default configuration of DCShop 1.002 beta places sensitive files in the cgi-bin directory, which could allow remote attackers to read sensitive data via an HTTP GET request for (1) orders.txt or (2) auth_user_file.txt.
3246| [CVE-2001-0448] Web configuration server in 602Pro LAN SUITE allows remote attackers to cause a denial of service via an HTTP GET HTTP request to the aux directory, and possibly other directories with legacy DOS device names.
3247| [CVE-2000-1239] The HTTP interface of Tivoli Lightweight Client Framework (LCF) in IBM Tivoli Management Framework 3.7.1 sets http_disable to zero at install time, which allows remote authenticated users to bypass file permissions on Tivoli Endpoint Configuration data files via an unspecified manipulation of log files.
3248| [CVE-2000-1235] The default configurations of (1) the port listener and (2) modplsql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allow remote attackers to view privileged database information via HTTP requests for Database Access Descriptor (DAD) files.
3249| [CVE-2000-1215] The default configuration of Lotus Domino server 5.0.8 includes system information (version, operating system, and build date) in the HTTP headers of replies, which allows remote attackers to obtain sensitive information.
3250| [CVE-2000-1206] Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files.
3251| [CVE-2000-1100] The default configuration for PostACI webmail system installs the /includes/global.inc configuration file within the web root, which allows remote attackers to read sensitive information such as database usernames and passwords via a direct HTTP GET request.
3252| [CVE-2000-1016] The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL.
3253| [CVE-2000-0894] HTTP server on the WatchGuard SOHO firewall does not properly restrict access to administrative functions such as password resets or rebooting, which allows attackers to cause a denial of service or conduct unauthorized activities.
3254| [CVE-2000-0869] The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary diretories via the PROPFIND HTTP request method.
3255| [CVE-2000-0859] The web configuration server for NTMail V5 and V6 allows remote attackers to cause a denial of service via a series of partial HTTP requests.
3256| [CVE-2000-0642] The default configuration of WebActive HTTP Server 1.00 stores the web access log active.log in the document root, which allows remote attackers to view the logs by directly requesting the page.
3257| [CVE-1999-1582] By design, the "established" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality.
3258| [CVE-1999-1527] Internal HTTP server in Sun Netbeans Java IDE in Netbeans Developer 3.0 Beta and Forte Community Edition 1.0 Beta does not properly restrict access to IP addresses as specified in its configuration, which allows arbitrary remote attackers to access the server.
3259| [CVE-1999-0865] Buffer overflow in CommuniGatePro via a long string to the HTTP configuration port.
3260|
3261| SecurityFocus - https://www.securityfocus.com/bid/:
3262| [92523] Fortinet FortiGate Cookie Parser Buffer Overflow Vulnerability
3263| [89900] Fortinet Firewall CVE-2005-1837 Remote Security Vulnerability
3264| [55591] Multiple Fortinet FortiGate Appliances Multiple Cross Site Scripting Vulnerabilities
3265| [55529] Fortinet Multiple FortiGate Appliances Multiple HTML Injection Vulnerabilities
3266| [32017] Fortinet FortiGate Unspecified Cross Site Scripting Vulnerability
3267| [27276] Fortinet Fortigate CRLF Characters URL Filtering Bypass Vulnerability
3268| [18570] Fortinet FortiGate FTP Proxy Antivirus Engine Bypass Vulnerability
3269| [16599] Fortinet FortiGate URL Filtering Bypass Vulnerability
3270| [16597] Fortinet FortiGate Antivirus Engine Bypass Vulnerability
3271| [9964] Kerio WinRoute Firewall Unspecified Malformed HTTP Header Denial of Service Vulnerability
3272| [9581] Multiple Check Point Firewall-1 HTTP Security Server Remote Format String Vulnerabilities
3273| [9033] FortiGate Firewall Web Interface Cross-Site Scripting Vulnerabilities
3274| [8750] FortiGate Firewall Web Filter Logs HTML Injection Vulnerability
3275| [7245] Kerio WinRoute Firewall Malformed HTTP GET Request Denial of Service Vulnerability
3276| [6684] SyGate Insecure UDP Source Port Firewall Bypass Weak Default Configuration Vulnerability
3277| [5744] Check Point Firewall-1 HTTP Proxy Server Unauthorized Protocol Access Vulnerability
3278| [2517] Raptor Firewall HTTP Request Proxying Vulnerability
3279| [104546] Fortinet FortiAnalyzer and FortiManager CVE-2018-1355 Open Redirect Vulnerability
3280| [104537] Fortinet FortiAnalyzer and FortiManager CVE-2018-1354 Access Bypass Vulnerability
3281| [104535] Fortinet FortiOS CVE-2018-9185 Information Disclosure Vulnerability
3282| [104533] Fortinet FortiManager CVE-2018-1351 Cross Site Scripting Vulnerability
3283| [104371] Fortinet FortiAuthenticator CVE-2018-9186 Cross Site Scripting Vulnerability
3284| [104312] Fortinet FortiOS CVE-2017-14187 Local Privilege Escalation Vulnerability
3285| [104288] Fortinet FortiOS CVE-2017-14185 Information Disclosure Vulnerability
3286| [104119] Fortinet FortiWLC Hardcoded Credentials Multiple Information Disclosure Vulnerabilities
3287| [103826] Oracle HTTP Server CVE-2018-2760 Remote Security Vulnerability
3288| [103430] Fortinet Fortiweb CVE-2017-14191 Access Bypass Vulnerability
3289| [102779] Fortinet FortiOS CVE-2017-14190 HTML Injection Vulnerability
3290| [102565] Oracle HTTP Server CVE-2018-2561 Remote Security Vulnerability
3291| [102176] Fortinet FortiClient CVE-2017-7344 Privilege Escalation Vulnerability
3292| [102151] Fortinet FortiOS CVE-2017-7738 Information Disclosure Vulnerability
3293| [102123] Fortinet FortiClient CVE-2017-14184 Local Information Disclosure Vulnerability
3294| [102022] Linux Kernel 'drivers/usb/core/config.c' Local Denial of Service Vulnerability
3295| [101955] Fortinet FortiOS CVE-2017-14186 URI Redirection and Cross Site Scripting Vulnerabilities
3296| [101953] Fortinet FortiWebManager CVE-2017-14189 Security Bypass Vulnerability
3297| [101916] Fortinet Fortiweb CVE-2017-7736 HTML Injection Vulnerability
3298| [101784] Authconfig CVE-2017-7488 Information Disclosure Vulnerability
3299| [101682] Fortinet FortiClient CVE-2016-8493 Privilege Escalation Vulnerability
3300| [101679] Fortinet FortiOS CVE-2017-7739 Cross Site Scripting Vulnerability
3301| [101563] Fortinet FortiOS CVE-2017-7733 Cross Site Scripting Vulnerability
3302| [101559] Fortinet FortiOS 'params' Parameter Denial of Service Vulnerability
3303| [101287] Fortinet FortiWLC CVE-2017-7335 Multiple Cross Site Scripting Vulnerabilities
3304| [101278] Fortinet FortiMail CVE-2017-7732 Cross Site Scripting Vulnerability
3305| [101273] Fortinet FortiWLC CVE-2017-7341 OS Command Injection Vulnerability
3306| [101194] EMC Network Configuration Manager CVE-2017-8017 Cross Site Scripting Vulnerability
3307| [100872] Apache HTTP Server CVE-2017-9798 Information Disclosure Vulnerability
3308| [100472] Fortinet FortiOS Local Privilege Escalation Vulnerability
3309| [100324] Jenkins Config File Provider Plugin CVE-2017-1000104 Information Disclosure Vulnerability
3310| [100211] Fortinet FortiOS CVE-2017-3130 Information Disclosure Vulnerability
3311| [100205] Fortinet Fortiweb CVE-2017-7737 Information Disclosure Vulnerability
3312| [99569] Apache HTTP Server CVE-2017-9788 Memory Corruption Vulnerability
3313| [99429] Microsoft Windows Https.sys Component CVE-2017-8582 Information Disclosure Vulnerability
3314| [98738] Fortinet FortiClient SSLVPN CVE-2016-8496 Remote Code Execution Vulnerability
3315| [98514] Fortinet FortiOS CVE-2017-3128 HTML Injection Vulnerability
3316| [98382] Fortinet Fortiweb CVE-2017-3129 Cross Site Scripting Vulnerability
3317| [98048] Fortinet FortiOS CVE-2017-3127 Cross Site Scripting Vulnerability
3318| [97603] Fortinet FortiWLC-SD CVE-2017-3134 Privilege Escalation Vulnerability
3319| [97474] Fortinet FortiMail CVE-2017-3125 Unspecified Cross Site Scripting Vulnerability
3320| [96816] Juniper Networks IDP Appliance Configuration Manager Cross Site Scripting Vulnerability
3321| [96159] Fortinet Connect CVE-2016-8494 Remote Code Execution Vulnerability
3322| [95938] EMC Smarts Network Configuration Manager CVE-2017-2767 Remote Code Execution Vulnerability
3323| [95936] EMC Smarts Network Configuration Manager CVE-2017-2768 Remote Security Bypass Vulnerability
3324| [95359] libgit2 'src/transports/http.c' Security Bypass Vulnerability
3325| [95084] Sophos XG Firewall '/userportal/Controller' Endpoint SQL Injection Vulnerability
3326| [94953] Squid HTTP proxy Multiple Information Disclosure Vulnerabilities
3327| [94690] Fortinet FortiOS CVE-2016-7542 Local Information Disclosure Vulnerability
3328| [94480] Fortinet FortiOS CVE-2016-8492 Information Disclosure Vulnerability
3329| [94477] Fortinet FortiOS CVE-2016-7541 Security Bypass Vulnerability
3330| [93347] IBM Sterling Secure Proxy Configuration Manager CVE-2016-6023 Directory Traversal Vulnerability
3331| [92977] Fortinet FortiClient Local Information Disclosure Vulnerability
3332| [92976] Fortinet FortiClient DLL Loading Remote Code Execution Vulnerability
3333| [92894] RedHat JBoss Enterprise Application Platform CVE-2016-4993 HTTP Header Injection Vulnerability
3334| [92794] Infoblox Network Automation CVE-2016-6484 HTTP Response Splitting Vulnerability
3335| [92781] Fortinet FortiWAN CVE-2016-4966 Authentication Bypass Vulnerability
3336| [92779] Fortinet FortiWAN VU#724487 Multiple Security Vulnerabilities
3337| [92773] HTTP/2 CVE-2016-7153 Information Disclosure Vulnerability
3338| [92769] HTTPS CVE-2016-7152 Information Disclosure Vulnerability
3339| [92726] Fortinet FortiClient SSLVPN Local Information Disclosure Vulnerability
3340| [92457] Fortinet FortiCloud Multiple HTML Injection Vulnerabilities
3341| [92455] Fortinet FortiVoice Multiple HTML Injection Vulnerabilities
3342| [92450] Fortinet FortiSwitch CVE-2016-4573 Security Bypass Vulnerability
3343| [92203] Multiple Fortinet Products Security Bypass Vulnerability
3344| [92026] Oracle HTTP Server CVE-2016-3482 Remote Security Vulnerability
3345| [91771] Fortinet FortiWeb CVE-2016-5092 Directory Traversal Vulnerability
3346| [91768] Fortinet FortiWeb CVE-2016-4066 Cross Site Request Forgery Vulnerability
3347| [91523] Cisco Configuration Assistant CVE-2016-1441 Unauthorized Access Vulnerability
3348| [90265] Sami Http Server CVE-2005-0450 Directory Traversal Vulnerability
3349| [89281] Fortinet Antivirus CVE-2005-3221 Security Bypass Vulnerability
3350| [89236] Fortinet CVE-2005-3400 Security Bypass Vulnerability
3351| [87659] Fortinet28 CVE-2006-1966 Denial-Of-Service Vulnerability
3352| [87170] Norton Personal Firewall 2006 CVE-2006-3725 Denial-Of-Service Vulnerability
3353| [86993] Dnhttpd CVE-2001-1266 Directory Traversal Vulnerability
3354| [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
3355| [85710] Fortinet FortiClient SSLVPN CVE-2015-7362 Local Privilege Escalation Vulnerability
3356| [84429] Fortinet FortiOS Open Redirection Vulnerability
3357| [84192] Osu Httpd CVE-2006-4907 Information Disclosure Vulnerability
3358| [84189] Osu Httpd CVE-2006-4908 Information Disclosure Vulnerability
3359| [83238] Novell ZENworks Configuration Management CVE-2015-5970 XPath Injection Vulnerability
3360| [83219] SAP Universal Worklist Configuration Unspecified Information Disclosure Vulnerability
3361| [83140] ManageEngine Network Configuration Manager Privilege Escalation Vulnerability
3362| [81264] Oracle Configurator CVE-2016-0541 Remote Security Vulnerability
3363| [81261] Oracle Configurator CVE-2016-0540 Remote Security Vulnerability
3364| [80581] Fortinet FortiOS SSH Undocumented Interactive Login Security Bypass Vulnerability
3365| [78211] ManageEngine Firewall Analyzer CVE-2015-7780 Directory Traversal Vulnerability
3366| [78189] ZENworks Configuration Management CVE-2012-2223 Remote Security Vulnerability
3367| [76850] Fortinet FortiManager Cross Site Scripting and HTML Injection Vulnerabilities
3368| [76847] Fortinet FortiManager Multiple Cross Site Scripting Vulnerabilities
3369| [76832] Apache cordova-plugin-file-transfer CVE-2015-5204 HTTP Header Injection Vulnerability
3370| [76676] SPICE 'worker_update_monitors_config()' Function Heap Memory Corruption Vulnerability
3371| [76541] Fortinet FortiClient CVE-2015-4077 Multiple Local Information Disclosure Vulnerabilities
3372| [76539] Fortinet FortiClient CVE-2015-5735 Multiple Local Security Bypass Vulnerabilities
3373| [76168] GE Healthcare Discovery NM 750b CVE-2013-7404 Hardcoded Password Security Bypass Vulnerability
3374| [76065] Fortinet FortiOS SSL-VPN Man in The Middle Security Bypass Vulnerability
3375| [76047] Fortinet FortiOS CVE-2015-2323 Weak Cipher Security Bypass Weakness
3376| [76046] Fortinet FortiOS CVE-2015-3626 HTML Injection Vulnerability
3377| [76045] Fortinet FortiSandbox Multiple Cross Site Scripting Vulnerabilities
3378| [76044] Fortinet FortiOS Security Bypass Vulnerability
3379| [75276] Drupal HTTP Strict Transport Security Module Security Bypass Vulnerability
3380| [75126] ISPConfig SQL Injection and Cross Site Request Forgery Vulnerabilities
3381| [75051] Novell ZENworks Configuration Management CVE-2010-5323 Directory Traversal Vulnerability
3382| [75026] Cisco TelePresence Integrator C Series CVE-2015-0770 HTTP Response Splitting Vulnerability
3383| [74919] Cisco Videoscape Conductor and Headend System Release HTTP Header Injection Vulnerability
3384| [74875] Sierra Wireless AirCard 'export.cfg' HTTP Header Injection Vulnerability
3385| [74679] Fortinet FortiWeb CVE-2014-8619 Multiple Cross Site Scripting Vulnerabilities
3386| [74678] Fortinet FortiADC D Models CVE-2014-8618 Cross Site Scripting Vulnerability
3387| [74652] Fortinet FortiOS CVE-2015-1880 Cross Site Scripting Vulnerability
3388| [74195] Fortinet Fortiweb Multiple Security Vulnerabilities
3389| [73949] Novell ZENworks Configuration Management CVE-2015-0779 Remote File Upload Vulnerability
3390| [73450] mini_httpd CVE-2015-1548 Information Disclosure Vulnerability
3391| [73404] GoAhead WebServer 'src/http.c' Directory Traversal Vulnerability
3392| [73366] Fortinet FortiOS CVE-2015-1571 SSL Server Spoof Security Bypass Vulnerability
3393| [73361] Fortinet FortiClient CVE-2015-1570 SSL Certificate Validation Security Bypass Vulnerability
3394| [73327] ManageEngine Network Configuration Manager Multiple Security Vulnerabilities
3395| [73206] Multiple Fortinet Single Sign On Products CVE-2015-2281 Stack Buffer Overflow Vulnerability
3396| [72820] Fortinet FortiMail Web Action Quarantine Release Feature Cross Site Scripting Vulnerability
3397| [72749] Mozilla Firefox 'nsXMLHttpRequest::GetResponse' Heap Double Free Memory Corruption Vulnerability
3398| [72562] Fortinet FortiOS CVE-2014-8616 Multiple Cross Site Scripting Vulnerabilities
3399| [72548] MantisBT 'adm_config_report.php' Cross Site Scripting Vulnerability
3400| [72383] Fortinet FortiOS Multiple Security Vulnerabilities
3401| [72377] Fortinet FortiClient Multiple Security Vulnerabilities
3402| [72193] Oracle HTTP Server CVE-2015-0386 Remote Security Vulnerability
3403| [72143] Oracle HTTP Server CVE-2014-6571 Remote Security Vulnerability
3404| [71913] TP-Link TL-WR840N 'Import Configuration' Option Cross Site Request Forgery Vulnerability
3405| [71868] xbindkeys-config '/tmp/xbindkeysrc-tmp' Insecure Temporary File Creation Vulnerability
3406| [71535] Zenoss Core 'HTTPOnly' Cookie Flag Information Disclosure Vulnerability
3407| [71353] Apache HTTP Server 'LuaAuthzProvider' Authorization Bypass Vulnerability
3408| [71197] MantisBT 'adm_config_report.php' Cross Site Scripting Vulnerability
3409| [71184] MantisBT 'adm_config_report.php' Cross Site Scripting Vulnerability
3410| [70915] WordPress Wordfence Firewall Plugin 'wp-admin/admin.php' Cross Site Scripting Vulnerability
3411| [70727] IBM Tivoli Integrated Portal CVE-2014-6151 HTTP Response Splitting Vulnerability
3412| [70658] ZTE ZXDSL 931VII 'manager_dev_config_t.gch' Information Disclosure Vulnerability
3413| [69754] Fortinet FortiOS CVE-2014-0351 Man in the Middle Information Disclosure Vulnerability
3414| [69666] Netgear ProSafe Plus Configuration Utility CVE-2014-4864 Information Disclosure Vulnerability
3415| [69338] Fortinet FortiOS CVE-2014-2216 Denial of Service Vulnerability
3416| [68878] Barracuda Firewall 'cert_error' Parameter Cross Site Scripting Vulnerability
3417| [68652] Oracle HTTP Server CVE-2014-4222 Remote Security Vulnerability
3418| [68650] Oracle HTTP Server CVE-2014-4251 Remote Security Vulnerability
3419| [68528] Fortinet Fortiweb Multiple Cross Site Scripting Vulnerabilities
3420| [68259] EMC Smarts Network Configuration Manager CVE-2014-2509 Session Fixation Vulnerability
3421| [68147] Python CGIHTTPServer Module Path Separators Handling Information Disclosure Vulnerability
3422| [67615] Pimcore 'Zend_Http_Response_Stream' PHP Object Injection Vulnerability
3423| [67612] Pyplate HTTPOnly Cookie Flag Information Disclosure Weakness
3424| [67558] Cisco TelePresence System HTTPS Communication Information Disclosure Vulnerability
3425| [67419] IBM WebSphere Portal 'boot_config.jsp' Cross Site Scripting Vulnerability
3426| [67235] Fortinet FortiWeb CVE-2014-3115 Multiple Cross Site Request Forgery Vulnerabilities
3427| [66962] HP Universal Configuration Management Database CVE-2013-6214 Information Disclosure Vulnerability
3428| [66642] Fortinet FortiADC 'locale' Parameter Cross Site Scripting Vulnerability
3429| [66307] VLC Media Player 'src/network/httpd.c' Cross Site Scripting Vulnerability
3430| [66223] HostBill Email Templates Configuration Page Cross Site Request Forgery Vulnerability
3431| [66157] lighttpd CVE-2014-2324 Multiple Directory Traversal Vulnerabilities
3432| [66009] HostBill Email Templates Configuration Page Cross Site Request Forgery Vulnerability
3433| [65912] Novell ZENworks Configuration Management CVE-2013-3706 Directory Traversal Vulnerability
3434| [65903] MantisBT 'adm_config_report.php' SQL Injection Vulnerability
3435| [65800] WordPress Feedweb Plugin '_wp_http_referer' Parameter Cross Site Scripting Vulnerability
3436| [65695] Barracuda Networks Web Firewall Multiple HTML Injection Vulnerabilities
3437| [65660] Fortinet Fortiweb Multiple Security Vulnerabilities
3438| [65630] Code Aurora Multiple Products 'CONFIG_STRICT_MEMORY_RWX' Security Bypass Vulnerability
3439| [65496] D-Link DSL-2750B Cross Site Request Forgery Vulnerability
3440| [65354] Fortinet Fortiweb CVE-2014-1458 HTML Injection Vulnerability
3441| [65308] Fortinet FortiOS 'mkey' Parameter Cross Site Scripting Vulnerability
3442| [65303] Fortinet Fortiweb 'filter' Parameter Cross Site Scripting Vulnerability
3443| [65227] Cisco Identity Services Engine HTTP Control Interface for NAC Web Cross Site Scripting Vulnerability
3444| [65047] WordPress Wordfence Security Plugin 'User-Agent' HTTP Header HTML Injection Vulnerability
3445| [65026] Moodle Config Changes Report Password Disclosure Vulnerability
3446| [64693] SPAMINA Cloud Email Firewall Directory Traversal Vulnerability
3447| [64615] Python 'Lib/CGIHTTPServer.py' Script Directory Traversal Vulnerability
3448| [64610] Fortinet FortiAuthenticator Unspecified Local Privilege Escalation Vulnerability
3449| [64537] Caucho Resin 'ioc-appconfig' Full Path Information Disclosure Vulnerability
3450| [64410] Valve Bug Reporter '.valve-bugreporter.cfg' Configuration File Information Disclosure Vulnerability
3451| [64264] Monitorix HTTP Server CVE-2013-7072 Multiple Unspecified Security Vulnerabilities
3452| [64178] Monitorix HTTP Server 'handle_request()' Remote Command Execution Vulnerability
3453| [63917] FTP Drive + HTTP Server for iOS Directory Traversal Vulnerability
3454| [63913] Monitorix HTTP Server 'handle_request()' Session Fixation and Cross Site Scripting Vulnerabilities
3455| [63663] Fortinet FortiAnalyzer Cross Site Request Forgery Vulnerability
3456| [63573] Drupal Secure Pages Module HTTP Redirection Information Disclosure Vulnerability
3457| [63499] Novell ZENworks Configuration Management CVE-2013-6345 Unspecified Security Vulnerability
3458| [63498] Novell ZENworks Configuration Management CVE-2013-6346 Cross Site Request Forgery Vulnerability
3459| [63497] Novell ZENworks Configuration Management CVE-2013-6344 Cross Frame Scripting Vulnerability
3460| [63495] Novell ZENworks Configuration Management CVE-2013-6347 Session Fixation Vulnerability
3461| [63433] Novell ZENworks Configuration Management CVE-2013-1084 Directory Traversal Vulnerability
3462| [63372] FortKnox Personal Firewall 'fortknoxfw.sys' Driver Local Privilege Escalation Vulnerability
3463| [62043] Linux Kernel CONFIG_HID Local Memory Corruption Vulnerability
3464| [60861] Fortinet FortiOS CVE-2013-1414 Cross Site Request Forgery Vulnerability
3465| [60571] Fortinet FortiOS CVE-2013-4604 Security Bypass Vulnerability
3466| [60322] Novell ZENworks Configuration Management CVE-2013-1095 Cross-Site Scripting Vulnerability
3467| [60320] Novell ZENworks Configuration Management CVE-2013-1097 Multiple Cross-Site Scripting Vulnerabilities
3468| [60319] Novell ZENworks Configuration Management CVE-2013-1093 Open Redirection Vulnerability
3469| [60318] Novell ZENworks Configuration Management CVE-2013-1094 Cross-Site Scripting Vulnerability
3470| [60201] IBM WebSphere Portal CVE-2013-2950 HTTP Response Splitting Vulnerability
3471| [60137] X.Org libXt '_XtResourceConfigurationEH()' Function Remote Code Execution Vulnerability
3472| [60012] Juniper Networks Junos Firewall Bypass Denial of Service Vulnerability
3473| [60010] RETIRED: Acme thttpd HTTP Server Directory Traversal Vulnerability
3474| [60009] SoftBank Wi-Fi Spot Configuration Software CVE-2013-2310 Information Disclosure Vulnerability
3475| [59934] Jojo CMS 'X-Forwarded-For' HTTP header SQL-Injection Vulnerability
3476| [59738] Cisco Unified Customer Voice Portal 'Tomcat Configuration' Remote Privilege Escalation Vulnerability
3477| [59604] Fortinet FortiClient VPN Client SSL Certificate Validation Security Bypass Vulnerability
3478| [59132] Oracle WebCenter Sites CVE-2013-1509 HTTP Header Injection Vulnerability
3479| [58893] MantisBT 'adm_config_report.php' HTML Injection Vulnerability
3480| [58891] MantisBT 'adm_config_report.php' HTML Injection Vulnerability
3481| [58788] EMC Smarts Network Configuration Manager CVE-2013-2717 Multiple Unspecified Security Vulnerabilities
3482| [58741] Cisco IOS Zone-Based Policy Firewall SIP CVE-2013-1145 Memory Leak Denial of Service Vulnerability
3483| [58716] EMC Smarts Network Configuration Manager CVE-2013-0935 Authentication Bypass Vulnerability
3484| [58528] lighttpd CVE-2013-1427 Insecure Temporary File Creation Vulnerability
3485| [58322] Squid 'httpMakeVaryMark()' Function Memory Corruption Vulnerability
3486| [58104] Aeolus Configuration Server CVE-2012-6117 Information Disclosure Vulnerability
3487| [58102] Aeolus Configuration Server CVE-2012-5509 Information Disclosure Vulnerability
3488| [58062] Drupal Varnish HTTP Accelerator Integration Module Cross Site Scripting Vulnerability
3489| [57601] Multiple Fortinet FortiMail IBE Appliances Multiple Security Vulnerabilities
3490| [57361] Oracle Enterprise Manager Grid Control CVE-2013-0354 HTTP Response Splitting Vulnerability
3491| [57151] Anacrypt '.tuz' Configuraton File Information Disclosure Vulnerability
3492| [56809] IBM Tivoli Monitoring HTTP Monitoring Console Cross Site Scripting Vulnerability
3493| [56807] Qt 'XmlHttpRequest' Object Insecure Redirection Information Disclosure Vulnerability
3494| [56775] Multiple Fortinet FortiDB Appliances Cross Site Scripting Vulnerability
3495| [56774] Multiple Fortinet FortiWeb Appliances Multiple Cross Site Scripting Vulnerabilities
3496| [56682] EMC Smarts Network Configuration Manager (NCM) Multiple Security Bypass Vulnerabilities
3497| [56382] Fortigate UTM appliances CA SSL Certificate Creation Security Bypass Vulnerability
3498| [56245] IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Methods Information Disclosure Vulnerability
3499| [56146] Django 'HttpRequest.get_host()' Information Disclosure Vulnerability
3500| [55934] Red Hat Network Configuration Client Insecure File Permissions Vulnerability
3501| [55648] Novell GroupWise HTTP Interfaces Directory Traversal Vulnerability
3502| [55635] Monkey HTTP Daemon Local Information Disclosure Vulnerability
3503| [55621] Technicolor THOMSON TWG850-4 HTTP Authentication Bypass Vulnerability
3504| [55475] FireWall KNock OPerator 'expand_acc_string_list()' Function Buffer Overflow Vulnerability
3505| [55131] Apache HTTP Server HTML-Injection And Information Disclosure Vulnerabilities
3506| [55057] phpMyAdmin CVE-2012-4219 'show_config_errors.php' Full Path Information Disclosure Vulnerability
3507| [54994] Group-Office HTTPOnly Cookies Flag Information Disclosure Vulnerabilities
3508| [54704] Ruby on Rails 'authenticate_or_request_with_http_digest' Method Denial Of Service Vulnerability
3509| [54641] @mail 'dbconfig.ini' Information Disclosure Vulnerability
3510| [54344] Mono 'HttpForbiddenHandler.cs' Cross-Site Scripting Vulnerability
3511| [54083] Python SimpleHTTPServer 'list_directory()' Function Cross Site Scripting Vulnerability
3512| [53897] F5 Multiple Products SSH Configuration Remote Unauthorized Access Vulnerability
3513| [53612] Tornado 'tornado.web.RequestHandler.set_header()' HTTP Response Splitting Vulnerability
3514| [53416] Node.js HTTP Parser Information Disclosure Vulnerability
3515| [53361] Perl Config::IniFiles Module Insecure Temporary File Creation Vulnerability
3516| [53263] ACTi Web Configurator 'cgi-bin' Directory Traversal Vulnerability
3517| [53093] Oracle Database Server CVE-2012-0527 Remote HTTP Response Splitting Vulnerability
3518| [53084] Oracle Database Server CVE-2012-0526 Remote HTTP Response Splitting Vulnerability
3519| [52858] phpMyAdmin 'show_config_errors.php' Full Path Information Disclosure Vulnerability
3520| [52853] NetGear ProSafe Wireless-N 8-port Gigabit VPN Firewall FVS318N Router Security Bypass Vulnerability
3521| [52659] Novell ZENworks Configuration Management Multiple Security Vulnerabilities
3522| [52430] Multiple Check Point Firewall Products Information Disclosure Vulnerability
3523| [52421] WebKit HTTP Authentication Credentials Information Disclosure Vulnerability
3524| [52291] Novell ZENworks Configuration Management Unspecified Vulnerability
3525| [52263] Endian UTM Firewall Cross Site Request Forgery and HTML Injection Vulnerabilities
3526| [51708] Fortigate UTM WAF Appliances Cross Site Scripting and HTML Injection Vulnerabilities
3527| [51706] Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability
3528| [51703] Wicd 'wicd/configmanager.py' Local Information Disclosure Vulnerability
3529| [51407] Apache HTTP Server Scoreboard Local Security Bypass Vulnerability
3530| [51353] libvirt 'bridge' Forward Mode 'iptables' Firewall Rules Security Bypass Weakness
3531| [51049] HP OpenView Network Node Manager 'nnmRptConfig.exe' Remote Code Execution Vulnerability
3532| [50576] Novell ZENworks Configuration Management 'DoFindReplace()' Method Buffer Overflow Vulnerability
3533| [50363] Novell XTier Framework HTTP Header Remote Integer Overflow Vulnerability
3534| [50274] Novell ZENworks Configuration Management AdminStudio Remote Code Execution Vulnerabilities
3535| [50092] Apple Mac OS X Application Firewall (CVE-2011-0185) Format String Vulnerability
3536| [49985] WordPress Redirection Plug-in HTTP Referrer Header HTML Injection Vulnerability
3537| [49979] Microsoft Forefront Unified Access Gateway (CVE-2011-1895) HTTP Response Splitting Vulnerability
3538| [49957] Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
3539| [49633] Oracle Application Server 9i 'httpd.conf' Information Disclosure Vulnerability
3540| [48790] Oracle Sun Solaris Kernel USB Configuration Descriptor Local Buffer Overflow Vulnerability
3541| [48735] Oracle Database Server CVE-2011-0811 Local Enterprise Config Management Vulnerability
3542| [48733] Oracle Database Server CVE-2011-0831 Remote Enterprise Config Management Vulnerability
3543| [48614] Aruba Networks ArubaOS HTTP Response Splitting and HTML Injection Vulnerabilities
3544| [48567] Ingate Firewall and SIParator SIP Module Remote Denial of Service Vulnerability
3545| [48460] D-Bus Configuration Insecure Temporary File Creation Vulnerability
3546| [48211] Microsoft Internet Explorer HTTP Redirect Uninitialized Memory Remote Code Execution Vulnerability
3547| [48181] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Memory Corruption Vulnerability
3548| [48038] Fortinet FortiClient SSL VPN Insecure Temporary File Creation Vulnerability
3549| [48022] Lil' HTTP Server Source Code Information Disclosure Vulnerability
3550| [47306] McAfee Firewall Reporter 'GernalUtilities.pm' Authentication Bypass Vulnerability
3551| [47295] Novell ZENworks Configuration Management ZAM File Remote Code Execution Vulnerability
3552| [47199] Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
3553| [47075] jHTTPd Directory Traversal Vulnerability
3554| [47057] Alkacon OpenCms HTTPOnly Cookie Flag Information Disclosure Weakness
3555| [47002] PHP-Nuke 'HTTP_REFERER' Header Cross Site Request Forgery Vulnerability
3556| [46974] Apache HttpComponents 'HttpClient' Information Disclosure Vulnerability
3557| [46880] nostromo nhttpd Directory Traversal Remote Command Execution Vulnerability
3558| [46541] Python CGIHTTPServer Module Information Disclosure Vulnerability
3559| [46434] Novell ZENworks Configuration Management TFTPD Remote Code Execution Vulnerability
3560| [46054] Weborf 'get_param_value()' Function HTTP Header Handling Denial Of Service Vulnerability
3561| [45848] Oracle Fusion Middleware CVE-2010-4455 Remote Oracle HTTP Server Vulnerability
3562| [45794] Contao 'X_FORWARDED_FOR' HTTP Header Arbitrary Script Injection Vulnerability
3563| [45599] httpdASM Directory Traversal Vulnerability
3564| [45078] MemHT Portal User-Agent HTTP Header HTML Injection Vulnerability
3565| [45058] Linux Kernel 'SNDRV_HDSP_IOCTL_GET_CONFIG_INFO' IOCTL Local Information Disclosure Vulnerability
3566| [44629] NetSupport Manager Gateway HTTP Protocol Information disclosure vulnerability
3567| [44506] Weborf HTTP Request Denial Of Service Vulnerability
3568| [44439] httpdx FTP Server Multiple Directory Traversal Vulnerabilities
3569| [44119] httpdx 'tolog' Function Multiple Remote Format String Vulnerabilities
3570| [44027] Oracle Java SE and Java for Business CVE-2010-3549 HTTP Response Splitting Vulnerability
3571| [43962] Oracle Fusion Middleware CVE-2010-2413 BI Publisher HTTP Response Splitting Vulnerability
3572| [43830] Visual Synapse HTTP Server Directory Directory Traversal Vulnerability
3573| [43808] Linux Kernel 'SNDRV_HDSP_IOCTL_GET_CONFIG' IOCTL Information Disclosure Vulnerability
3574| [43520] Barracuda Networks Spam & Virus Firewall 'view_help.cgi' Directory Traversal Vulnerability
3575| [43390] Cisco IOS SSL VPN HTTP Redirect Memory Leak Remote Denial of Service Vulnerability
3576| [43104] Multiple Mozilla Products 'XMLHttpRequest' Cross Domain Information Disclosure Vulnerability
3577| [43043] Integard Home and Pro 'password' Parameter HTTP POST Request Remote Buffer Overflow Vulnerability
3578| [43016] Weborf HTTP 'modURL()' Function Directory Traversal Vulnerability
3579| [42886] httpdx 'h_readrequest()' Remote Format String Vulnerability
3580| [42700] GFI WebMonitor Configuration UI Arbitrary Script Injection Vulnerabilit
3581#######################################################################################################################################
3582 Anonymous JTSEC #OpWhales Full Recon #9