· 6 years ago · Aug 07, 2019, 12:19 AM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.boe.gov.sa ISP King Abdul Aziz City for Science and Technology
4Continent Asia Flag
5SA
6Country Saudi Arabia Country Code SA
7Region Unknown Local time 07 Aug 2019 01:27 +03
8City Unknown Postal Code Unknown
9IP Address 212.138.117.248 Latitude 25
10 Longitude 45
11=======================================================================================================================================
12#######################################################################################################################################
13> www.boe.gov.sa
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18www.boe.gov.sa canonical name = boe.gov.sa.
19Name: boe.gov.sa
20Address: 212.138.117.248
21>
22#######################################################################################################################################
23[+] Target : www.boe.gov.sa
24
25[+] IP Address : 212.138.117.248
26
27[+] Headers :
28
29[+] Cache-Control : private, max-age=0
30[+] Content-Type : text/html; charset=utf-8
31[+] Expires : Mon, 22 Jul 2019 22:28:48 GMT
32[+] Last-Modified : Tue, 06 Aug 2019 22:28:48 GMT
33[+] X-SharePointHealthScore : 0
34[+] SPRequestGuid : 97b3f79e-e306-704f-ba15-a19a9c6ac36b
35[+] request-id : 97b3f79e-e306-704f-ba15-a19a9c6ac36b
36[+] X-FRAME-OPTIONS : SAMEORIGIN
37[+] SPRequestDuration : 93
38[+] SPIisLatency : 1
39[+] X-Content-Type-Options : nosniff
40[+] X-MS-InvokeApp : 1; RequireReadOnly
41[+] X-XSS-Protection : 1; mode=block
42[+] Content-Security-Policy : script-src 'self' 'unsafe-inline' 'unsafe-eval' https://*.google-analytics.com *.googletagmanager.com https://static.addtoany.com https://graph.facebook.com; style-src 'self' 'unsafe-inline' ;
43[+] Strict-Transport-Security : max-age=31536000
44[+] Date : Tue, 06 Aug 2019 22:28:48 GMT
45[+] Content-Length : 13300
46
47[+] SSL Certificate Information :
48
49[+] countryName : SA
50[+] localityName : Riyadh
51[+] organizationName : Bureau of Experts At The Council of Ministers
52[+] organizationalUnitName : IT
53[+] commonName : *.boe.gov.sa
54[+] countryName : US
55[+] organizationName : DigiCert Inc
56[+] commonName : DigiCert SHA2 Secure Server CA
57[+] Version : 3
58[+] Serial Number : 06F8AC0C56991B65E47322B57E2EF5AA
59[+] Not Before : Aug 6 00:00:00 2018 GMT
60[+] Not After : Aug 10 12:00:00 2020 GMT
61[+] OCSP : ('http://ocsp.digicert.com',)
62[+] subject Alt Name : (('DNS', '*.boe.gov.sa'), ('DNS', 'boe.gov.sa'))
63[+] CA Issuers : ('http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt',)
64[+] CRL Distribution Points : ('http://crl3.digicert.com/ssca-sha2-g6.crl', 'http://crl4.digicert.com/ssca-sha2-g6.crl')
65
66[+] Whois Lookup :
67
68[+] NIR : None
69[+] ASN Registry : ripencc
70[+] ASN : 8895
71[+] ASN CIDR : 212.138.117.0/24
72[+] ASN Country Code : SA
73[+] ASN Date : 1999-01-28
74[+] ASN Description : ISU Internet Services Unit (ISU), SA
75[+] cidr : 212.138.112.0/22, 212.138.116.0/23
76[+] name : ISU-8
77[+] handle : KR6046-RIPE
78[+] range : 212.138.112.0 - 212.138.117.255
79[+] description : Internet Service Unit ISU
80[+] country : SA
81[+] state : None
82[+] city : None
83[+] address : Saudi Network Information Center, ISU
84King Abdulaziz City for Science and Technology,
85P.O.Box 6086, Riyadh 11442, Saudi Arabia.
86[+] postal_code : None
87[+] emails : ['abuse@isu.net.sa']
88[+] created : 2004-08-03T12:57:57Z
89[+] updated : 2005-04-13T10:18:31Z
90
91[+] Crawling Target...
92
93[+] Looking for robots.txt........[ Found ]
94[+] Extracting robots Links.......[ 0 ]
95[+] Looking for sitemap.xml.......[ Found ]
96[+] Extracting sitemap Links......[ 0 ]
97[+] Extracting CSS Links..........[ 4 ]
98[+] Extracting Javascript Links...[ 13 ]
99[+] Extracting Internal Links.....[ 1 ]
100[+] Extracting External Links.....[ 0 ]
101[+] Extracting Images.............[ 7 ]
102
103[+] Total Links Extracted : 25
104
105[+] Dumping Links in /opt/FinalRecon/dumps/www.boe.gov.sa.dump
106[+] Completed!
107#######################################################################################################################################
108[+] Starting At 2019-08-06 18:32:50.507547
109[+] Collecting Information On: https://www.boe.gov.sa/ar/Pages/default.aspx
110[#] Status: 200
111--------------------------------------------------
112[+] Xss Protection Detected !
113- Cache-Control: private, max-age=0
114- Content-Type: text/html; charset=utf-8
115- Expires: Mon, 22 Jul 2019 22:28:48 GMT
116- Last-Modified: Tue, 06 Aug 2019 22:28:48 GMT
117- X-SharePointHealthScore: 0
118- SPRequestGuid: 97b3f79e-930b-704f-057a-1ecd02244fb4
119- request-id: 97b3f79e-930b-704f-057a-1ecd02244fb4
120- X-FRAME-OPTIONS: SAMEORIGIN
121- SPRequestDuration: 68
122- SPIisLatency: 0
123- X-Content-Type-Options: nosniff
124- X-MS-InvokeApp: 1; RequireReadOnly
125- X-XSS-Protection: 1; mode=block
126- Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' https://*.google-analytics.com *.googletagmanager.com https://static.addtoany.com https://graph.facebook.com; style-src 'self' 'unsafe-inline' ;
127- Strict-Transport-Security: max-age=31536000
128- Date: Tue, 06 Aug 2019 22:28:48 GMT
129- Content-Length: 14095
130--------------------------------------------------
131[#] Finding Location..!
132[#] message: invalid query
133[#] query: boe.gov.sa
134[#] status: fail
135--------------------------------------------------
136[x] Didn't Detect WAF Presence on: https://www.boe.gov.sa/ar/Pages/default.aspx
137--------------------------------------------------
138[#] Starting Reverse DNS
139[-] Failed ! Fail
140--------------------------------------------------
141[!] Scanning Open Port
142[#] 80/tcp open http
143[#] 443/tcp open https
144--------------------------------------------------
145[+] Collecting Information Disclosure!
146[#] Detecting sitemap.xml file
147[-] sitemap.xml file not Found!?
148[#] Detecting robots.txt file
149[-] robots.txt file not Found!?
150[#] Detecting GNU Mailman
151[-] GNU Mailman App Not Detected!?
152--------------------------------------------------
153[+] Crawling Url Parameter On: https://www.boe.gov.sa/ar/Pages/default.aspx
154--------------------------------------------------
155[#] Searching Html Form !
156[+] Html Form Discovered
157[#] action: ./default.aspx
158[#] class: None
159[#] id: aspnetForm
160[#] method: post
161--------------------------------------------------
162[!] Found 3 dom parameter
163[#] https://www.boe.gov.sa/ar/Pages/default.aspx/#login
164[#] https://www.boe.gov.sa/ar/Pages/default.aspx/../../_catalogs/masterpage/#
165[#] https://www.boe.gov.sa/ar/Pages/default.aspx/#!
166--------------------------------------------------
167[!] 2 Internal Dynamic Parameter Discovered
168[+] https://www.boe.gov.sa/ar/Pages/default.aspx//_layouts/15/BOE/css/styles_ar.css?rev=1.0.0.0
169[+] https://validator.w3.org/nu/?doc=https://www.boe.gov.sa/ar/Pages/default.aspx
170--------------------------------------------------
171[-] No external Dynamic Paramter Found!?
172--------------------------------------------------
173[!] 12 Internal links Discovered
174[+] https://www.boe.gov.sa/ar/Pages/default.aspx//_layouts/15/BOE/images/favicon.ico
175[+] https://www.boe.gov.sa:443/ar/Pages/default.aspx
176[+] https://www.boe.gov.sa/ar/Pages/default.aspx//_layouts/15/BOE/css/font-awesome.min.css
177[+] https://www.boe.gov.sa/ar/Pages/default.aspx//_layouts/15/BOE/css/fonts.css
178[+] https://www.boe.gov.sa/ar/Pages/default.aspx//_layouts/15/BOE/css/colorbox.css
179[+] https://www.boe.gov.sa/ar/Pages/default.aspx//ar
180[+] https://www.boe.gov.sa/ar/Pages/default.aspx/javascript:void(0);
181[+] https://www.boe.gov.sa/ar/Pages/default.aspx//ar/GeneralServices/Pages/SiteMap.aspx
182[+] https://www.boe.gov.sa/ar/Pages/default.aspx//ar/Help/ContactUs
183[+] https://www.boe.gov.sa/ar/Pages/default.aspx//_layouts/15/BOE/404/under_construction.aspx
184[+] https://www.boe.gov.sa/ar/Pages/default.aspx/" title=
185[+] https://www.boe.gov.sa/ar/Pages/default.aspx//ar
186--------------------------------------------------
187[-] No External Link Found!?
188--------------------------------------------------
189[#] Mapping Subdomain..
190[!] Found 8 Subdomain
191- boe.gov.sa
192- ns1.boe.gov.sa
193- ns2.boe.gov.sa
194- old.boe.gov.sa
195- cloud.boe.gov.sa
196- mail.boe.gov.sa
197- mx1.boe.gov.sa
198- mx2.boe.gov.sa
199--------------------------------------------------
200[!] Done At 2019-08-06 18:33:33.357538
201#######################################################################################################################################
202[i] Scanning Site: https://www.boe.gov.sa
203
204
205
206B A S I C I N F O
207====================
208
209
210[+] Site Title:
211
212 هيئة الخبراء بمجلس الوزراء :: الصفحة الرئيسية
213
214
215[+] IP address: 212.138.117.248
216[+] Web Server: Could Not Detect
217[+] CMS: Could Not Detect
218[+] Cloudflare: Not Detected
219[+] Robots File: Could NOT Find robots.txt!
220
221
222
223
224
225G E O I P L O O K U P
226=========================
227
228[i] IP Address: 212.138.117.248
229[i] Country: Saudi Arabia
230[i] State:
231[i] City:
232[i] Latitude: 25.0
233[i] Longitude: 45.0
234
235
236
237
238H T T P H E A D E R S
239=======================
240
241
242[i] HTTP/1.1 302 Redirect
243[i] Content-Type: text/html; charset=UTF-8
244[i] Location: https://www.boe.gov.sa/ar/Pages/default.aspx
245[i] X-SharePointHealthScore: 0
246[i] SPRequestGuid: 37b4f79e-f308-704f-ba15-a74f3813acd0
247[i] request-id: 37b4f79e-f308-704f-ba15-a74f3813acd0
248[i] X-FRAME-OPTIONS: SAMEORIGIN
249[i] SPRequestDuration: 15
250[i] SPIisLatency: 1
251[i] X-Content-Type-Options: nosniff
252[i] X-MS-InvokeApp: 1; RequireReadOnly
253[i] X-XSS-Protection: 1; mode=block
254[i] Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' https://*.google-analytics.com *.googletagmanager.com https://static.addtoany.com https://graph.facebook.com; style-src 'self' 'unsafe-inline' ;
255[i] Strict-Transport-Security: max-age=31536000
256[i] Date: Tue, 06 Aug 2019 22:39:43 GMT
257[i] Connection: close
258[i] Content-Length: 167
259[i] HTTP/1.1 200 OK
260[i] Cache-Control: private, max-age=0
261[i] Content-Type: text/html; charset=utf-8
262[i] Expires: Mon, 22 Jul 2019 22:39:45 GMT
263[i] Last-Modified: Tue, 06 Aug 2019 22:39:45 GMT
264[i] X-SharePointHealthScore: 0
265[i] SPRequestGuid: 37b4f79e-3361-704f-057a-1b1d8d8789c4
266[i] request-id: 37b4f79e-3361-704f-057a-1b1d8d8789c4
267[i] X-FRAME-OPTIONS: SAMEORIGIN
268[i] SPRequestDuration: 72
269[i] SPIisLatency: 1
270[i] X-Content-Type-Options: nosniff
271[i] X-MS-InvokeApp: 1; RequireReadOnly
272[i] X-XSS-Protection: 1; mode=block
273[i] Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' https://*.google-analytics.com *.googletagmanager.com https://static.addtoany.com https://graph.facebook.com; style-src 'self' 'unsafe-inline' ;
274[i] Strict-Transport-Security: max-age=31536000
275[i] Date: Tue, 06 Aug 2019 22:39:45 GMT
276[i] Connection: close
277[i] Content-Length: 13300
278
279
280
281
282D N S L O O K U P
283===================
284
285boe.gov.sa. 299 IN A 212.138.117.248
286boe.gov.sa. 299 IN NS ns1.isu.net.sa.
287boe.gov.sa. 299 IN NS ns2.boe.gov.sa.
288boe.gov.sa. 299 IN NS ns1.boe.gov.sa.
289boe.gov.sa. 299 IN SOA ns1.boe.gov.sa. hostmaster.boe.gov.sa. 2015110580 900 600 86400 300
290boe.gov.sa. 299 IN MX 20 email02.nic.gov.sa.
291boe.gov.sa. 299 IN MX 20 email01.nic.gov.sa.
292boe.gov.sa. 299 IN TXT "v=spf1 mx ptr ip4:212.26.56.10 ip4:212.26.56.11 a:mx2.boe.gov.sa a:mx1.boe.gov.sa mx:mx1.boe.gov.sa mx:mx2.boe.gov.sa ip4:212.26.56.1/25 ~all"
293
294
295
296
297S U B N E T C A L C U L A T I O N
298====================================
299
300Address = 212.138.117.248
301Network = 212.138.117.248 / 32
302Netmask = 255.255.255.255
303Broadcast = not needed on Point-to-Point links
304Wildcard Mask = 0.0.0.0
305Hosts Bits = 0
306Max. Hosts = 1 (2^0 - 0)
307Host Range = { 212.138.117.248 - 212.138.117.248 }
308
309
310
311N M A P P O R T S C A N
312============================
313
314Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 22:43 UTC
315Nmap scan report for boe.gov.sa (212.138.117.248)
316Host is up (0.16s latency).
317
318PORT STATE SERVICE
31921/tcp filtered ftp
32022/tcp filtered ssh
32123/tcp filtered telnet
32280/tcp open http
323110/tcp filtered pop3
324143/tcp filtered imap
325443/tcp open https
3263389/tcp filtered ms-wbt-server
327
328Nmap done: 1 IP address (1 host up) scanned in 5.30 seconds
329
330
331
332S U B - D O M A I N F I N D E R
333==================================
334
335
336[i] Total Subdomains Found : 7
337
338[+] Subdomain: ns1.boe.gov.sa
339[-] IP: 212.138.117.125
340
341[+] Subdomain: mx1.boe.gov.sa
342[-] IP: 212.26.56.10
343
344[+] Subdomain: ns2.boe.gov.sa
345[-] IP: 212.138.117.126
346
347[+] Subdomain: mx2.boe.gov.sa
348[-] IP: 212.26.56.11
349
350[+] Subdomain: old.boe.gov.sa
351[-] IP: 212.138.117.127
352
353[+] Subdomain: cloud.boe.gov.sa
354[-] IP: 212.138.118.120
355
356[+] Subdomain: mail.boe.gov.sa
357[-] IP: 212.26.56.9
358#######################################################################################################################################
359[INFO] ------TARGET info------
360[*] TARGET: https://www.boe.gov.sa/ar/Pages/default.aspx
361[*] TARGET IP: 212.138.117.248
362[INFO] NO load balancer detected for www.boe.gov.sa...
363[*] DNS servers: boe.gov.sa.
364[*] TARGET server:
365[*] CC: SA
366[*] Country: Saudi Arabia
367[*] RegionCode: 01
368[*] RegionName: Ar Riyāḑ
369[*] City: Riyadh
370[*] ASN: AS9044
371[*] BGP_PREFIX: 192.0.0.0/3
372[*] ISP: SOLNET BSE Software GmbH, CH
373[INFO] SSL/HTTPS certificate detected
374[*] Issuer: issuer=C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
375[*] Subject: subject=C = SA, L = Riyadh, O = Bureau of Experts At The Council of Ministers, OU = IT, CN = *.boe.gov.sa
376[INFO] DNS enumeration:
377[*] mail.boe.gov.sa 212.26.56.9
378[*] mx2.boe.gov.sa 212.26.56.11
379[*] ns1.boe.gov.sa 212.138.117.125
380[*] ns2.boe.gov.sa 212.138.117.126
381[*] old.boe.gov.sa 212.138.117.127
382[INFO] Possible abuse mails are:
383[*] abuse@boe.gov.sa
384[*] abuse@isu.net.sa
385[*] abuse@www.boe.gov.sa
386[INFO] NO PAC (Proxy Auto Configuration) file FOUND
387[INFO] Checking for HTTP status codes recursively from /ar/Pages/default.aspx
388[INFO] Status code Folders
389[*] 200 http://www.boe.gov.sa/ar/
390[*] 401 http://www.boe.gov.sa/ar/Pages/
391[ALERT] robots.txt file FOUND in http://www.boe.gov.sa/robots.txt
392[INFO] Checking for HTTP status codes recursively from http://www.boe.gov.sa/robots.txt
393[INFO] Status code Folders
394[INFO] Starting FUZZing in http://www.boe.gov.sa/FUzZzZzZzZz...
395[INFO] Status code Folders
396[*] 200 http://www.boe.gov.sa/index
397[*] 200 http://www.boe.gov.sa/images
398[*] 200 http://www.boe.gov.sa/download
399[*] 200 http://www.boe.gov.sa/2006
400[*] 200 http://www.boe.gov.sa/news
401[*] 200 http://www.boe.gov.sa/crack
402[*] 200 http://www.boe.gov.sa/serial
403[*] 200 http://www.boe.gov.sa/warez
404[*] 200 http://www.boe.gov.sa/full
405[*] 200 http://www.boe.gov.sa/12
406[ALERT] Look in the source code. It may contain passwords
407[INFO] Links found from https://www.boe.gov.sa/ar/Pages/default.aspx http://212.138.117.248/:
408[*] http://212.138.117.248/ar
409[*] http://212.138.117.248/ar/GeneralServices/Pages/SiteMap.aspx
410[*] http://212.138.117.248/ar/Help/ContactUs
411[*] http://212.138.117.248/ar/Pages/default.aspx
412[*] http://212.138.117.248/_catalogs/masterpage/
413[*] https://validator.w3.org/nu/?doc=https://www.boe.gov.sa/ar/Pages/default.aspx
414[*] https://www.boe.gov.sa/ar
415[*] https://www.boe.gov.sa/ar/GeneralServices/Pages/SiteMap.aspx
416[*] https://www.boe.gov.sa/ar/Help/ContactUs
417[*] https://www.boe.gov.sa/ar/Pages/default.aspx
418[*] https://www.boe.gov.sa/_catalogs/masterpage/
419[INFO] GOOGLE has 49,000,000 results (0.20 seconds) about http://www.boe.gov.sa/
420[INFO] Shodan detected the following opened ports on 212.138.117.248:
421[*] 0
422[*] 3
423[*] 443
424[*] 5
425[*] 50
426[*] 6
427[*] 80
428[*] 9
429[INFO] ------VirusTotal SECTION------
430[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
431[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
432[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
433[INFO] ------Alexa Rank SECTION------
434[INFO] Percent of Visitors Rank in Country:
435[INFO] Percent of Search Traffic:
436[INFO] Percent of Unique Visits:
437[INFO] Total Sites Linking In:
438[*] Total Sites
439[INFO] Useful links related to www.boe.gov.sa - 212.138.117.248:
440[*] https://www.virustotal.com/pt/ip-address/212.138.117.248/information/
441[*] https://www.hybrid-analysis.com/search?host=212.138.117.248
442[*] https://www.shodan.io/host/212.138.117.248
443[*] https://www.senderbase.org/lookup/?search_string=212.138.117.248
444[*] https://www.alienvault.com/open-threat-exchange/ip/212.138.117.248
445[*] http://pastebin.com/search?q=212.138.117.248
446[*] http://urlquery.net/search.php?q=212.138.117.248
447[*] http://www.alexa.com/siteinfo/www.boe.gov.sa
448[*] http://www.google.com/safebrowsing/diagnostic?site=www.boe.gov.sa
449[*] https://censys.io/ipv4/212.138.117.248
450[*] https://www.abuseipdb.com/check/212.138.117.248
451[*] https://urlscan.io/search/#212.138.117.248
452[*] https://github.com/search?q=212.138.117.248&type=Code
453[INFO] Useful links related to AS9044 - 192.0.0.0/3:
454[*] http://www.google.com/safebrowsing/diagnostic?site=AS:9044
455[*] https://www.senderbase.org/lookup/?search_string=192.0.0.0/3
456[*] http://bgp.he.net/AS9044
457[*] https://stat.ripe.net/AS9044
458[INFO] Date: 06/08/19 | Time: 18:45:23
459[INFO] Total time: 1 minute(s) and 59 second(s)
460#######################################################################################################################################
461Trying "boe.gov.sa"
462;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30306
463;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 3, ADDITIONAL: 4
464
465;; QUESTION SECTION:
466;boe.gov.sa. IN ANY
467
468;; ANSWER SECTION:
469boe.gov.sa. 300 IN TXT "v=spf1 mx ptr ip4:212.26.56.10 ip4:212.26.56.11 a:mx2.boe.gov.sa a:mx1.boe.gov.sa mx:mx1.boe.gov.sa mx:mx2.boe.gov.sa ip4:212.26.56.1/25 ~all"
470boe.gov.sa. 300 IN MX 20 email02.nic.gov.sa.
471boe.gov.sa. 300 IN MX 20 email01.nic.gov.sa.
472boe.gov.sa. 300 IN SOA ns1.boe.gov.sa. hostmaster.boe.gov.sa. 2015110580 900 600 86400 300
473boe.gov.sa. 300 IN A 212.138.117.248
474boe.gov.sa. 300 IN NS ns1.boe.gov.sa.
475boe.gov.sa. 300 IN NS ns2.boe.gov.sa.
476boe.gov.sa. 300 IN NS ns1.isu.net.sa.
477
478;; AUTHORITY SECTION:
479boe.gov.sa. 300 IN NS ns2.boe.gov.sa.
480boe.gov.sa. 300 IN NS ns1.boe.gov.sa.
481boe.gov.sa. 300 IN NS ns1.isu.net.sa.
482
483;; ADDITIONAL SECTION:
484ns1.isu.net.sa. 2349 IN A 212.26.18.3
485ns1.isu.net.sa. 2349 IN AAAA 2001:1490:0:800::3
486ns2.boe.gov.sa. 3599 IN A 212.138.117.126
487ns1.boe.gov.sa. 3599 IN A 212.138.117.125
488
489Received 477 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 543 ms
490######################################################################################################################################
491; <<>> DiG 9.11.5-P4-5.1-Debian <<>> +trace boe.gov.sa
492;; global options: +cmd
493. 83179 IN NS c.root-servers.net.
494. 83179 IN NS d.root-servers.net.
495. 83179 IN NS h.root-servers.net.
496. 83179 IN NS f.root-servers.net.
497. 83179 IN NS g.root-servers.net.
498. 83179 IN NS m.root-servers.net.
499. 83179 IN NS k.root-servers.net.
500. 83179 IN NS a.root-servers.net.
501. 83179 IN NS b.root-servers.net.
502. 83179 IN NS j.root-servers.net.
503. 83179 IN NS l.root-servers.net.
504. 83179 IN NS e.root-servers.net.
505. 83179 IN NS i.root-servers.net.
506. 83179 IN RRSIG NS 8 0 518400 20190819210000 20190806200000 59944 . qe2K90gOqdrqIk4QOnxSpe0HkjoILJRZhKYrIjmhoVC14zDHA7MWdF8w f737RFRyihDR/cdyXDl1gWxivI+VZ/Kfs7Dd5jN96MtSgBmW8Edg3fpt Lcnffs/8IS7trqx6c6ejFt6VIB1rYAjKQKmOBXyWCU7jfXO7U3Lf2C6e ISHLfLuVoNT4ujPHqKd3IxyT07EgTzqA6kYFteHYal+peBjhqxsHcKH+ CUdTF/o4dkY/6Z6TtCkl3iAl8Krp384BACO4G7b8rM9Ue03rBKkg67a4 gCfQouI38ghJ27hNjxP/l6mxsMcU24p89xz5M/rLnb3BYqvR5biLjtuG n8MD0g==
507;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 220 ms
508
509sa. 172800 IN NS s.nic.net.sa.
510sa. 172800 IN NS ns2.nic.net.sa.
511sa. 172800 IN NS ns1.nic.net.sa.
512sa. 172800 IN NS p.nic.net.sa.
513sa. 172800 IN NS n.nic.net.sa.
514sa. 172800 IN NS s2.nic.net.sa.
515sa. 172800 IN NS i.nic.net.sa.
516sa. 86400 IN DS 30574 8 2 02FC3370C8453439627440B913A8C0A6A4698F9E503F6BBB553D75D7 7E34367E
517sa. 86400 IN RRSIG DS 8 1 86400 20190819210000 20190806200000 59944 . tEOpKhE+ex34f9DdHvKUXuDttnBz5p6bfqPV7YxFQ++FZ6avdotknZR6 fejUrNK6FgQYzBsS82eruDqiHg6onWVRAWwrxmaUv7NcpBunC1KaxlPn ofcpDiTOMosyn36MuEB1PhJ2fM0yWwRSgOkURSvbqJX1CHjQh/Cq352X GSFoAtyk43nv4ZcDnsCO+XnoDVzL/HQGfCJ82uTJWac5qRqnpeRCfdhC L8zoUTUAlAIhYcsZRaoQ1Dfhx38uT/qWcVrNLIj7Toe10myB6aCe+D7j 7mjos3uiOmIwzv4KEZo0f3RgFAvsZBc5IK4usG6/c0B+qSDMnq2Beaju BOCAAg==
518;; Received 835 bytes from 2001:500:200::b#53(b.root-servers.net) in 69 ms
519
520boe.gov.sa. 3600 IN NS ns2.boe.gov.sa.
521boe.gov.sa. 3600 IN NS ns1.boe.gov.sa.
522bjfg8gjvd7q16kjknk05880pjdglhplj.gov.sa. 3600 IN NSEC3 1 1 5 63938D6D460D499A BUN018SJTB1EJDD6K0KPA1HN7VG9FNKD NS SOA RRSIG DNSKEY NSEC3PARAM
523bjfg8gjvd7q16kjknk05880pjdglhplj.gov.sa. 3600 IN RRSIG NSEC3 8 3 3600 20190820155402 20190806145354 65268 gov.sa. RBKZlI0Ry7G7fTxXvR8X77uXPDRPO5Uhp4p9S3+r47etfPPrMeslv1bY lS1XHOQbwATniG8jiuJd3bDBr1TUh/oDX+JVSfK5SZqi+rVGsSMI2O08 JU3hrFpJs5ys2L6gbZvYvxKFlfPDfQlS5lmgZPzOlttdP4vK9mIfyBAt EzPkHKTjlR39OVzHurc/kqn/wKoaWuYBroZBfXNr9TdBHg60l0cvWmFH rQV0ckDBJYWJDhm52hIucBkkCM3H1HDREcLuu8eq4s5bZOF0a9o2PMda hDSvlWL20/hh0s7fO4/L2lJOEvELjf+doX1wLzXKIi/fj9BhuTGhnGKh 92rK6Q==
524dgndoj4a2ah90usv4lrv07cmafv9pc6r.gov.sa. 3600 IN NSEC3 1 1 5 63938D6D460D499A I1G2LVFS4I6KOEJHRNHJCNPDAVJUECGL NS DS RRSIG
525dgndoj4a2ah90usv4lrv07cmafv9pc6r.gov.sa. 3600 IN RRSIG NSEC3 8 3 3600 20190820155320 20190806145354 65268 gov.sa. U82l/8tm7hWuHeu4aZGCzfmHUHX08Fufe2sJYEsPgR/PqaER2uvZc3jq TQDGBlpDviJUMcCwyAoroxVAJTsKKtzoBXiGnOeVBmNWmPsqCenHo1rA AawX+T2Yi1d790crP+WLjhR4ac4bNqlKrkg23vJT628kZiPzO+fzAlTf jSg2sZvuk9UA7rQ+VJbeIoEE80lUrx/60cZ0laaGy+bFuNsZtpSg0fwC SCFptAjXfOpVLyhj3pmxmn/0OcvtJ1JYBdHlWwOA0gSzbZ7e4ujZS9uf Lle7LyzT4xV2L/uv39DCutGGaF05ORbn5TX4JY9wuOA9JetESiA/Pk93 5xMz6w==
526;; Received 898 bytes from 2001:16a0:2:3002::2#53(s2.nic.net.sa) in 187 ms
527
528boe.gov.sa. 300 IN A 212.138.117.248
529;; Received 83 bytes from 212.138.117.126#53(ns2.boe.gov.sa) in 288 ms
530
531######################################################################################################################################
532[*] Performing General Enumeration of Domain: boe.gov.sa
533[-] DNSSEC is not configured for boe.gov.sa
534[*] SOA ns1.boe.gov.sa 212.138.117.125
535[*] NS ns2.boe.gov.sa 212.138.117.126
536[*] NS ns1.boe.gov.sa 212.138.117.125
537[*] MX email02.nic.gov.sa 78.93.109.80
538[*] MX email01.nic.gov.sa 78.93.109.82
539[*] A boe.gov.sa 212.138.117.248
540[*] TXT boe.gov.sa v=spf1 mx ptr ip4:212.26.56.10 ip4:212.26.56.11 a:mx2.boe.gov.sa a:mx1.boe.gov.sa mx:mx1.boe.gov.sa mx:mx2.boe.gov.sa ip4:212.26.56.1/25 ~all
541[*] Enumerating SRV Records
542[*] SRV _autodiscover._tcp.boe.gov.sa autodiscover.cloud.moi.gov.sa 78.93.109.89 443 0
543[+] 1 Records Found
544#######################################################################################################################################
545[*] Processing domain boe.gov.sa
546[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
547[+] Getting nameservers
548212.138.117.126 - ns2.boe.gov.sa
549212.138.117.125 - ns1.boe.gov.sa
550[-] Zone transfer failed
551
552[+] TXT records found
553"v=spf1 mx ptr ip4:212.26.56.10 ip4:212.26.56.11 a:mx2.boe.gov.sa a:mx1.boe.gov.sa mx:mx1.boe.gov.sa mx:mx2.boe.gov.sa ip4:212.26.56.1/25 ~all"
554
555[+] MX records found, added to target list
55620 email02.nic.gov.sa.
55720 email01.nic.gov.sa.
558
559[*] Scanning boe.gov.sa for A records
560212.138.117.248 - boe.gov.sa
56178.93.109.89 - autodiscover.boe.gov.sa
562212.138.118.120 - cloud.boe.gov.sa
563212.26.56.9 - mail.boe.gov.sa
564212.26.56.10 - mx1.boe.gov.sa
565212.26.56.11 - mx2.boe.gov.sa
566212.138.117.125 - ns1.boe.gov.sa
567212.138.117.126 - ns2.boe.gov.sa
568212.138.117.127 - old.boe.gov.sa
569212.138.117.248 - www.boe.gov.sa
570#######################################################################################################################################
571Domains still to check: 1
572 Checking if the hostname boe.gov.sa. given is in fact a domain...
573
574Analyzing domain: boe.gov.sa.
575 Checking NameServers using system default resolver...
576 IP: 212.138.117.126 (Saudi Arabia)
577 HostName: ns2.boe.gov.sa Type: NS
578 IP: 212.138.117.125 (Saudi Arabia)
579 HostName: ns1.boe.gov.sa Type: NS
580
581 Checking MailServers using system default resolver...
582 IP: 78.93.109.80 (Saudi Arabia)
583 HostName: email02.nic.gov.sa Type: MX
584 HostName: email02.cppa.gov.sa Type: PTR
585 IP: 78.93.109.82 (Saudi Arabia)
586 HostName: email01.nic.gov.sa Type: MX
587 HostName: email01.cppa.gov.sa Type: PTR
588
589 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
590 No zone transfer found on nameserver 212.138.117.125
591 No zone transfer found on nameserver 212.138.117.126
592
593 Checking SPF record...
594 New IP found: 212.26.56.10
595 New IP found: 212.26.56.11
596 New hostname found: mx2
597 New hostname found: mx1
598 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 212.26.56.1/25, but only the network IP
599 New IP found: 212.26.56.1
600
601 Checking 194 most common hostnames using system default resolver...
602 IP: 212.138.117.248 (Saudi Arabia)
603 HostName: www.boe.gov.sa. Type: A
604 IP: 212.26.56.9 (Saudi Arabia)
605 HostName: mail.boe.gov.sa. Type: A
606 IP: 212.138.117.125 (Saudi Arabia)
607 HostName: ns1.boe.gov.sa Type: NS
608 HostName: ns1.boe.gov.sa. Type: A
609 IP: 212.138.117.126 (Saudi Arabia)
610 HostName: ns2.boe.gov.sa Type: NS
611 HostName: ns2.boe.gov.sa. Type: A
612 IP: 212.138.117.127 (Saudi Arabia)
613 HostName: old.boe.gov.sa. Type: A
614 IP: 212.26.56.11 (Saudi Arabia)
615 Type: SPF
616 HostName: mx2.boe.gov.sa. Type: A
617 HostName: mx2.boe.gov.sa Type: PTR
618 IP: 212.26.56.10 (Saudi Arabia)
619 Type: SPF
620 HostName: mx1.boe.gov.sa. Type: A
621 HostName: mx1.boe.gov.sa Type: PTR
622
623 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
624 Checking netblock 78.93.109.0
625 Checking netblock 212.138.117.0
626 Checking netblock 212.26.56.0
627
628 Searching for boe.gov.sa. emails in Google
629 info@boe.gov.sa&
630
631 Checking 10 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
632 Host 78.93.109.82 is up (reset ttl 64)
633 Host 78.93.109.80 is up (reset ttl 64)
634 Host 212.138.117.126 is up (reset ttl 64)
635 Host 212.138.117.127 is up (reset ttl 64)
636 Host 212.26.56.1 is up (reset ttl 64)
637 Host 212.138.117.125 is up (reset ttl 64)
638 Host 212.26.56.11 is up (reset ttl 64)
639 Host 212.26.56.10 is up (reset ttl 64)
640 Host 212.26.56.9 is up (reset ttl 64)
641 Host 212.138.117.248 is up (reset ttl 64)
642
643 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
644 Scanning ip 78.93.109.82 (email01.cppa.gov.sa (PTR)):
645 Scanning ip 78.93.109.80 (email02.cppa.gov.sa (PTR)):
646 Scanning ip 212.138.117.126 (ns2.boe.gov.sa.):
647 53/tcp open domain? syn-ack ttl 115
648 Device type: general purpose|WAP
649 Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), Microsoft Windows 2012 (85%)
650 Scanning ip 212.138.117.127 (old.boe.gov.sa.):
651 80/tcp open http syn-ack ttl 115 Microsoft IIS httpd 8.5
652 | http-methods:
653 |_ Supported Methods: GET HEAD POST OPTIONS
654 |_http-server-header: Microsoft-IIS/8.5
655 |_http-title: Did not follow redirect to https://old.boe.gov.sa/
656 443/tcp open ssl/http syn-ack ttl 116 Microsoft IIS httpd 8.5
657 | http-methods:
658 | Supported Methods: OPTIONS TRACE GET HEAD POST
659 |_ Potentially risky methods: TRACE
660 |_http-server-header: Microsoft-IIS/8.5
661 | http-title: \xD9\x85\xD9\x88\xD9\x82\xD8\xB9 \xD9\x87\xD9\x8A\xD8\xA6\xD8\xA9 \xD8\xA7\xD9\x84\xD8\xAE\xD8\xA8\xD8\xB1\xD8\xA7\xD8\xA1 \xD8\xA8\xD9\x85\xD8\xAC\xD9\x84\xD8\xB3 \xD8\xA7\xD9\x84\xD9\x88\xD8\xB2\xD8\xB1\xD8\xA7\xD8\xA1
662 |_Requested resource was /M/Default.aspx
663 | ssl-cert: Subject: commonName=*.boe.gov.sa/organizationName=Bureau of Experts At The Council of Ministers/countryName=SA
664 | Subject Alternative Name: DNS:*.boe.gov.sa, DNS:boe.gov.sa
665 | Issuer: commonName=DigiCert SHA2 Secure Server CA/organizationName=DigiCert Inc/countryName=US
666 | Public Key type: rsa
667 | Public Key bits: 2048
668 | Signature Algorithm: sha256WithRSAEncryption
669 | Not valid before: 2018-08-06T00:00:00
670 | Not valid after: 2020-08-10T12:00:00
671 | MD5: b688 5d5d b0f9 a687 c2ac 1af7 1107 13ef
672 |_SHA-1: 1eac aba0 2cd2 f259 98e8 2670 1476 5169 ca06 b296
673 Device type: general purpose|WAP
674 Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), Microsoft Windows 2012 (85%)
675 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
676 Scanning ip 212.26.56.1 ():
677 22/tcp open ssh syn-ack ttl 242 Cisco SSH 1.25 (protocol 1.99)
678 | ssh-hostkey:
679 |_ 1024 a6:2e:fa:5f:17:e2:1d:82:6e:c1:7d:d8:dc:b0:70:c2 (RSA1)
680 |_sshv1: Server supports SSHv1
681 23/tcp open telnet syn-ack ttl 242 Cisco router telnetd
682 80/tcp open http syn-ack ttl 243 Cisco IOS http config
683 | http-auth:
684 | HTTP/1.1 401 Unauthorized\x0D
685 |_ Basic realm=level_15_access
686 | http-methods:
687 |_ Supported Methods: POST
688 |_http-server-header: cisco-IOS
689 |_http-title: Site doesn't have a title.
690 Device type: WAP|router
691 OS Info: Service Info: OS: IOS; Device: router; CPE: cpe:/o:cisco:ios
692 Scanning ip 212.138.117.125 (ns1.boe.gov.sa.):
693 Scanning ip 212.26.56.11 (mx2.boe.gov.sa (PTR)):
694 Scanning ip 212.26.56.10 (mx1.boe.gov.sa (PTR)):
695 Scanning ip 212.26.56.9 (mail.boe.gov.sa.):
696 Scanning ip 212.138.117.248 (www.boe.gov.sa.):
697 80/tcp open http-proxy syn-ack ttl 51 HAProxy http proxy 1.3.1 or later
698 |_http-favicon: Unknown favicon MD5: 278B38D133C0EF355BD76236C08EFC80
699 | http-methods:
700 |_ Supported Methods: GET HEAD POST OPTIONS
701 | http-title: \xD9\x87\xD9\x8A\xD8\xA6\xD8\xA9 \xD8\xA7\xD9\x84\xD8\xAE\xD8\xA8\xD8\xB1\xD8\xA7\xD8\xA1 \xD8\xA8\xD9\x85\xD8\xAC\xD9\x84\xD8\xB3 \xD8\xA7\xD9\x84\xD9\x88\xD8\xB2\xD8\xB1\xD8\xA7\xD8\xA1 :: \xD8\xA7\xD9\x84\xD8...
702 |_Requested resource was http://212.138.117.248/ar/Pages/default.aspx
703 |_http-trane-info: Problem with XML parsing of /evox/about
704 443/tcp open ssl syn-ack ttl 53 Microsoft SChannel TLS
705 | fingerprint-strings:
706 | TLSSessionReq:
707 | \xef
708 | DigiCert Inc1'0%
709 | DigiCert SHA2 Secure Server CA0
710 | 180806000000Z
711 | 200810120000Z0z1
712 | Riyadh1604
713 | -Bureau of Experts At The Council of Ministers1
714 | *.boe.gov.sa0
715 | /dr4
716 | jin}.
717 | R\x20n
718 | MB0#
719 | *.boe.gov.sa
720 | boe.gov.sa0
721 | d0b0/
722 | )http://crl3.digicert.com/ssca-sha2-g6.crl0/
723 |_ )http:
724 | http-methods:
725 |_ Supported Methods: GET HEAD POST OPTIONS
726 | ssl-cert: Subject: commonName=*.boe.gov.sa/organizationName=Bureau of Experts At The Council of Ministers/countryName=SA
727 | Subject Alternative Name: DNS:*.boe.gov.sa, DNS:boe.gov.sa
728 | Issuer: commonName=DigiCert SHA2 Secure Server CA/organizationName=DigiCert Inc/countryName=US
729 | Public Key type: rsa
730 | Public Key bits: 2048
731 | Signature Algorithm: sha256WithRSAEncryption
732 | Not valid before: 2018-08-06T00:00:00
733 | Not valid after: 2020-08-10T12:00:00
734 | MD5: b688 5d5d b0f9 a687 c2ac 1af7 1107 13ef
735 |_SHA-1: 1eac aba0 2cd2 f259 98e8 2670 1476 5169 ca06 b296
736 |_ssl-date: 2019-08-06T23:08:01+00:00; -4m03s from scanner time.
737 | tls-alpn:
738 | h2
739 |_ http/1.1
740 OS Info: Service Info: OS: Windows; Device: load balancer; CPE: cpe:/o:microsoft:windows
741 WebCrawling domain's web servers... up to 50 max links.
742
743 + URL to crawl: http://old.boe.gov.sa.
744 + Date: 2019-08-06
745
746 + Crawling URL: http://old.boe.gov.sa.:
747 + Links:
748 + Crawling http://old.boe.gov.sa. (400 Bad Request)
749 + Searching for directories...
750 + Searching open folders...
751
752
753 + URL to crawl: https://old.boe.gov.sa.
754 + Date: 2019-08-06
755
756 + Crawling URL: https://old.boe.gov.sa.:
757 + Links:
758 + Crawling https://old.boe.gov.sa.
759 + Searching for directories...
760 + Searching open folders...
761
762
763 + URL to crawl: http://www.boe.gov.sa.
764 + Date: 2019-08-06
765
766 + Crawling URL: http://www.boe.gov.sa.:
767 + Links:
768 + Crawling http://www.boe.gov.sa. (400 Bad Request)
769 + Searching for directories...
770 + Searching open folders...
771
772--Finished--
773Summary information for domain boe.gov.sa.
774-----------------------------------------
775 Domain Specific Information:
776 Email: info@boe.gov.sa&
777
778 Domain Ips Information:
779 IP: 78.93.109.82
780 HostName: email01.nic.gov.sa Type: MX
781 HostName: email01.cppa.gov.sa Type: PTR
782 Country: Saudi Arabia
783 Is Active: True (reset ttl 64)
784 IP: 78.93.109.80
785 HostName: email02.nic.gov.sa Type: MX
786 HostName: email02.cppa.gov.sa Type: PTR
787 Country: Saudi Arabia
788 Is Active: True (reset ttl 64)
789 IP: 212.138.117.126
790 HostName: ns2.boe.gov.sa Type: NS
791 HostName: ns2.boe.gov.sa. Type: A
792 Country: Saudi Arabia
793 Is Active: True (reset ttl 64)
794 Port: 53/tcp open domain? syn-ack ttl 115
795 Script Info: Device type: general purpose|WAP
796 Script Info: Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), Microsoft Windows 2012 (85%)
797 IP: 212.138.117.127
798 HostName: old.boe.gov.sa. Type: A
799 Country: Saudi Arabia
800 Is Active: True (reset ttl 64)
801 Port: 80/tcp open http syn-ack ttl 115 Microsoft IIS httpd 8.5
802 Script Info: | http-methods:
803 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
804 Script Info: |_http-server-header: Microsoft-IIS/8.5
805 Script Info: |_http-title: Did not follow redirect to https://old.boe.gov.sa/
806 Port: 443/tcp open ssl/http syn-ack ttl 116 Microsoft IIS httpd 8.5
807 Script Info: | http-methods:
808 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
809 Script Info: |_ Potentially risky methods: TRACE
810 Script Info: |_http-server-header: Microsoft-IIS/8.5
811 Script Info: | http-title: \xD9\x85\xD9\x88\xD9\x82\xD8\xB9 \xD9\x87\xD9\x8A\xD8\xA6\xD8\xA9 \xD8\xA7\xD9\x84\xD8\xAE\xD8\xA8\xD8\xB1\xD8\xA7\xD8\xA1 \xD8\xA8\xD9\x85\xD8\xAC\xD9\x84\xD8\xB3 \xD8\xA7\xD9\x84\xD9\x88\xD8\xB2\xD8\xB1\xD8\xA7\xD8\xA1
812 Script Info: |_Requested resource was /M/Default.aspx
813 Script Info: | ssl-cert: Subject: commonName=*.boe.gov.sa/organizationName=Bureau of Experts At The Council of Ministers/countryName=SA
814 Script Info: | Subject Alternative Name: DNS:*.boe.gov.sa, DNS:boe.gov.sa
815 Script Info: | Issuer: commonName=DigiCert SHA2 Secure Server CA/organizationName=DigiCert Inc/countryName=US
816 Script Info: | Public Key type: rsa
817 Script Info: | Public Key bits: 2048
818 Script Info: | Signature Algorithm: sha256WithRSAEncryption
819 Script Info: | Not valid before: 2018-08-06T00:00:00
820 Script Info: | Not valid after: 2020-08-10T12:00:00
821 Script Info: | MD5: b688 5d5d b0f9 a687 c2ac 1af7 1107 13ef
822 Script Info: |_SHA-1: 1eac aba0 2cd2 f259 98e8 2670 1476 5169 ca06 b296
823 Script Info: Device type: general purpose|WAP
824 Script Info: Running (JUST GUESSING): Linux 2.6.X|2.4.X (90%), Microsoft Windows 2012 (85%)
825 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
826 IP: 212.26.56.1
827 Type: SPF
828 Is Active: True (reset ttl 64)
829 Port: 22/tcp open ssh syn-ack ttl 242 Cisco SSH 1.25 (protocol 1.99)
830 Script Info: | ssh-hostkey:
831 Script Info: |_ 1024 a6:2e:fa:5f:17:e2:1d:82:6e:c1:7d:d8:dc:b0:70:c2 (RSA1)
832 Script Info: |_sshv1: Server supports SSHv1
833 Port: 23/tcp open telnet syn-ack ttl 242 Cisco router telnetd
834 Port: 80/tcp open http syn-ack ttl 243 Cisco IOS http config
835 Script Info: | http-auth:
836 Script Info: | HTTP/1.1 401 Unauthorized\x0D
837 Script Info: |_ Basic realm=level_15_access
838 Script Info: | http-methods:
839 Script Info: |_ Supported Methods: POST
840 Script Info: |_http-server-header: cisco-IOS
841 Script Info: |_http-title: Site doesn't have a title.
842 Script Info: Device type: WAP|router
843 Os Info: OS: IOS; Device: router; CPE: cpe:/o:cisco:ios
844 IP: 212.138.117.125
845 HostName: ns1.boe.gov.sa Type: NS
846 HostName: ns1.boe.gov.sa. Type: A
847 Country: Saudi Arabia
848 Is Active: True (reset ttl 64)
849 IP: 212.26.56.11
850 Type: SPF
851 HostName: mx2.boe.gov.sa. Type: A
852 HostName: mx2.boe.gov.sa Type: PTR
853 Country: Saudi Arabia
854 Is Active: True (reset ttl 64)
855 IP: 212.26.56.10
856 Type: SPF
857 HostName: mx1.boe.gov.sa. Type: A
858 HostName: mx1.boe.gov.sa Type: PTR
859 Country: Saudi Arabia
860 Is Active: True (reset ttl 64)
861 IP: 212.26.56.9
862 HostName: mail.boe.gov.sa. Type: A
863 Country: Saudi Arabia
864 Is Active: True (reset ttl 64)
865 IP: 212.138.117.248
866 HostName: www.boe.gov.sa. Type: A
867 Country: Saudi Arabia
868 Is Active: True (reset ttl 64)
869 Port: 80/tcp open http-proxy syn-ack ttl 51 HAProxy http proxy 1.3.1 or later
870 Script Info: |_http-favicon: Unknown favicon MD5: 278B38D133C0EF355BD76236C08EFC80
871 Script Info: | http-methods:
872 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
873 Script Info: | http-title: \xD9\x87\xD9\x8A\xD8\xA6\xD8\xA9 \xD8\xA7\xD9\x84\xD8\xAE\xD8\xA8\xD8\xB1\xD8\xA7\xD8\xA1 \xD8\xA8\xD9\x85\xD8\xAC\xD9\x84\xD8\xB3 \xD8\xA7\xD9\x84\xD9\x88\xD8\xB2\xD8\xB1\xD8\xA7\xD8\xA1 :: \xD8\xA7\xD9\x84\xD8...
874 Script Info: |_Requested resource was http://212.138.117.248/ar/Pages/default.aspx
875 Script Info: |_http-trane-info: Problem with XML parsing of /evox/about
876 Port: 443/tcp open ssl syn-ack ttl 53 Microsoft SChannel TLS
877 Script Info: | fingerprint-strings:
878 Script Info: | TLSSessionReq:
879 Script Info: | \xef
880 Script Info: | DigiCert Inc1'0%
881 Script Info: | DigiCert SHA2 Secure Server CA0
882 Script Info: | 180806000000Z
883 Script Info: | 200810120000Z0z1
884 Script Info: | Riyadh1604
885 Script Info: | -Bureau of Experts At The Council of Ministers1
886 Script Info: | *.boe.gov.sa0
887 Script Info: | /dr4
888 Script Info: | jin}.
889 Script Info: | R\x20n
890 Script Info: | MB0#
891 Script Info: | *.boe.gov.sa
892 Script Info: | boe.gov.sa0
893 Script Info: | d0b0/
894 Script Info: | )http://crl3.digicert.com/ssca-sha2-g6.crl0/
895 Script Info: |_ )http:
896 Script Info: | http-methods:
897 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
898 Script Info: | ssl-cert: Subject: commonName=*.boe.gov.sa/organizationName=Bureau of Experts At The Council of Ministers/countryName=SA
899 Script Info: | Subject Alternative Name: DNS:*.boe.gov.sa, DNS:boe.gov.sa
900 Script Info: | Issuer: commonName=DigiCert SHA2 Secure Server CA/organizationName=DigiCert Inc/countryName=US
901 Script Info: | Public Key type: rsa
902 Script Info: | Public Key bits: 2048
903 Script Info: | Signature Algorithm: sha256WithRSAEncryption
904 Script Info: | Not valid before: 2018-08-06T00:00:00
905 Script Info: | Not valid after: 2020-08-10T12:00:00
906 Script Info: | MD5: b688 5d5d b0f9 a687 c2ac 1af7 1107 13ef
907 Script Info: |_SHA-1: 1eac aba0 2cd2 f259 98e8 2670 1476 5169 ca06 b296
908 Script Info: |_ssl-date: 2019-08-06T23:08:01+00:00; -4m03s from scanner time.
909 Script Info: | tls-alpn:
910 Script Info: | h2
911 Script Info: |_ http/1.1
912 Os Info: OS: Windows; Device: load balancer; CPE: cpe:/o:microsoft:windows
913#######################################################################################################################################
914Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 18:52 EDT
915Nmap scan report for 212.138.117.248
916Host is up (0.23s latency).
917Not shown: 470 filtered ports, 4 closed ports
918Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
919PORT STATE SERVICE
92080/tcp open http
921443/tcp open https
922#######################################################################################################################################
923Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 18:53 EDT
924Nmap scan report for 212.138.117.248
925Host is up (0.17s latency).
926Not shown: 2 filtered ports
927PORT STATE SERVICE
92853/udp open|filtered domain
92967/udp open|filtered dhcps
93068/udp open|filtered dhcpc
93169/udp open|filtered tftp
93288/udp open|filtered kerberos-sec
933123/udp open|filtered ntp
934139/udp open|filtered netbios-ssn
935161/udp open|filtered snmp
936162/udp open|filtered snmptrap
937389/udp open|filtered ldap
938520/udp open|filtered route
9392049/udp open|filtered nfs
940#######################################################################################################################################
941Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 18:53 EDT
942Nmap scan report for 212.138.117.248
943Host is up.
944
945PORT STATE SERVICE VERSION
94667/udp open|filtered dhcps
947|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
948Too many fingerprints match this host to give specific OS details
949
950TRACEROUTE (using proto 1/icmp)
951HOP RTT ADDRESS
9521 164.21 ms 10.247.200.1
9532 174.54 ms 213.184.122.97
9543 164.34 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
9554 164.61 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
9565 165.01 ms bzq-179-124-54.cust.bezeqint.net (212.179.124.54)
9576 204.14 ms ix-ae-4-0.tcore2.wyn-marseille.as6453.net (80.231.200.73)
9587 203.21 ms if-ae-2-2.tcore1.wyn-marseille.as6453.net (80.231.217.1)
9598 288.07 ms 80.231.217.99
9609 ...
96110 291.29 ms 212.26.63.252
96211 ... 30
963#######################################################################################################################################
964Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 18:55 EDT
965Nmap scan report for 212.138.117.248
966Host is up.
967
968PORT STATE SERVICE VERSION
96968/udp open|filtered dhcpc
970Too many fingerprints match this host to give specific OS details
971
972TRACEROUTE (using proto 1/icmp)
973HOP RTT ADDRESS
9741 170.14 ms 10.247.200.1
9752 171.19 ms 213.184.122.97
9763 170.21 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
9774 170.61 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
9785 165.21 ms bzq-179-124-54.cust.bezeqint.net (212.179.124.54)
9796 203.66 ms ix-ae-4-0.tcore2.wyn-marseille.as6453.net (80.231.200.73)
9807 203.63 ms if-ae-2-2.tcore1.wyn-marseille.as6453.net (80.231.217.1)
9818 288.08 ms 80.231.217.99
9829 ...
98310 291.26 ms 212.26.63.252
98411 ... 30
985#######################################################################################################################################
986Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 18:56 EDT
987Nmap scan report for 212.138.117.248
988Host is up.
989
990PORT STATE SERVICE VERSION
99169/udp open|filtered tftp
992Too many fingerprints match this host to give specific OS details
993
994TRACEROUTE (using proto 1/icmp)
995HOP RTT ADDRESS
9961 165.74 ms 10.247.200.1
9972 166.72 ms 213.184.122.97
9983 165.81 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
9994 166.99 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
10005 166.35 ms bzq-179-124-54.cust.bezeqint.net (212.179.124.54)
10016 204.42 ms ix-ae-4-0.tcore2.wyn-marseille.as6453.net (80.231.200.73)
10027 204.39 ms if-ae-2-2.tcore1.wyn-marseille.as6453.net (80.231.217.1)
10038 289.49 ms 80.231.217.99
10049 ...
100510 292.76 ms 212.26.63.252
100611 ... 30
1007#######################################################################################################################################
1008Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 18:59 EDT
1009Nmap scan report for 212.138.117.248
1010Host is up (0.29s latency).
1011
1012PORT STATE SERVICE VERSION
101380/tcp open http-proxy HAProxy http proxy 1.3.1 or later
1014|_http-trane-info: Problem with XML parsing of /evox/about
1015| http-vuln-cve2010-0738:
1016|_ /jmx-console/: Authentication was not required
1017|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
1018|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
1019| vulscan: VulDB - https://vuldb.com:
1020| [112920] Saifor CVMS HUB 1.3.1 HTTP Parameter secciones.xhtml sql injection
1021| [65806] IBM Sterling Connect Enterprise Http Option up to 1.3.1 cross site scripting
1022| [124580] Telegram Desktop 1.3.16 Alpha Proxy Cleartext weak encryption
1023| [82327] Cisco Unified Computing System up to 1.3(1b) HTTP Request Command privilege escalation
1024| [6748] Oracle Central Designer 1.3/1.4/1.4.2 HTTP unknown vulnerability
1025| [51717] Apache HTTP Server up to 1.3.3 mod_proxy ap_proxy_send_fb memory corruption
1026|
1027| MITRE CVE - https://cve.mitre.org:
1028| [CVE-2011-4451] ** DISPUTED ** libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter.
1029| [CVE-2011-4449] actions/files/files.php in WikkaWiki 1.3.1 and 1.3.2, when INTRANET_MODE is enabled, supports file uploads for file extensions that are typically absent from an Apache HTTP Server TypesConfig file, which makes it easier for remote attackers to execute arbitrary PHP code by placing this code in a file whose name has multiple extensions, as demonstrated by a (1) .mm or (2) .vpp file.
1030| [CVE-2011-4140] The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
1031| [CVE-2011-4139] Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.
1032| [CVE-2009-4492] WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
1033| [CVE-2008-1385] Cross-site scripting (XSS) vulnerability in the Top Referrers (aka referrer) plugin in Serendipity (S9Y) before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via the Referer HTTP header.
1034| [CVE-2007-5273] Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
1035| [CVE-2007-0760] EQdkp 1.3.1 and earlier authenticates administrative requests by verifying that the HTTP Referer header specifies an admin/ URL, which allows remote attackers to read or modify account names and passwords via a spoofed Referer.
1036| [CVE-2004-2124] The register_globals simulation capability in Gallery 1.3.1 through 1.4.1 allows remote attackers to modify the HTTP_POST_VARS variable and conduct a PHP remote file inclusion attack via the GALLERY_BASEDIR parameter, a different vulnerability than CVE-2002-1412.
1037| [CVE-2001-0399] Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request.
1038| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
1039| [CVE-2011-4317] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
1040| [CVE-2011-3368] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
1041| [CVE-2010-3574] Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
1042| [CVE-2010-3553] Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
1043| [CVE-2010-3549] Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
1044| [CVE-2010-3541] Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
1045| [CVE-2010-1623] Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
1046| [CVE-2010-0010] Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow.
1047| [CVE-2009-3877] Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
1048| [CVE-2009-0164] The web interface for CUPS before 1.3.10 does not validate the HTTP Host header in a client request, which makes it easier for remote attackers to conduct DNS rebinding attacks.
1049| [CVE-2005-2088] The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
1050| [CVE-2005-1760] sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.
1051| [CVE-2004-2762] The server in IBM Tivoli Storage Manager (TSM) 4.2.x on MVS, 5.1.9.x before 5.1.9.1, 5.1.x before 5.1.10, 5.2.2.x before 5.2.2.3, 5.2.x before 5.2.3, 5.3.x before 5.3.0, and 6.x before 6.1, when the HTTP communication method is enabled, allows remote attackers to cause a denial of service (daemon crash or hang) via unspecified HTTP traffic, as demonstrated by the IBM port scanner 1.3.1.
1052| [CVE-2004-0700] Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
1053| [CVE-2004-0492] Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
1054| [CVE-2003-1580] The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via crafted DNS responses containing numerical top-level domains, as demonstrated by a forged 123.123.123.123 domain name, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
1055| [CVE-2002-2012] Unknown vulnerability in Apache 1.3.19 running on HP Secure OS for Linux 1.0 allows remote attackers to cause "unexpected results" via an HTTP request.
1056| [CVE-2002-0177] Buffer overflows in icecast 1.3.11 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request from an MP3 client.
1057| [CVE-2001-1083] Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
1058| [CVE-2001-0925] The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex.
1059| [CVE-2001-0129] Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request.
1060| [CVE-2000-1206] Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files.
1061| [CVE-2000-0869] The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary diretories via the PROPFIND HTTP request method.
1062|
1063| SecurityFocus - https://www.securityfocus.com/bid/:
1064| [37966] Apache 1.3 mod_proxy HTTP Chunked Encoding Integer Overflow Vulnerability
1065| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
1066|
1067| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1068| [28893] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow variant
1069| [28522] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow
1070| [10107] Trend Micro InterScan VirusWall HTTP 1.0 gzip content encoding protection bypass
1071| [10106] Trend Micro InterScan VirusWall HTTP 1.1 chunked transfer encoding protection bypass
1072| [85605] Stage File Proxy module for Drupal repeated HTTP request denial of service
1073| [85020] HAProxy denial of service
1074| [83211] HAProxy tcp-request content denial of service
1075| [77913] Apache HTTP Server mod_proxy_ajp information disclosure
1076| [76095] SEIL routers HTTP-Proxy/Gateway security bypass
1077| [75777] HAProxy trash buffer overflow
1078| [71617] Apache HTTP Server mod_proxy module information disclosure
1079| [71445] Apache HTTP Server mod_proxy security bypass
1080| [70336] Apache HTTP Server mod_proxy information disclosure
1081| [69804] Apache HTTP Server mod_proxy_ajp denial of service
1082| [66665] HAProxy manage_server_side_cookies() denial of service
1083| [66640] Apache HttpComponents HttpClient Proxy-Authorization information disclosure
1084| [63651] Google Chrome HTTP proxy authentication denial of service
1085| [60883] Apache mod_proxy_http information disclosure
1086| [59413] Apache mod_proxy_http timeout information disclosure
1087| [56623] Apache HTTP Server mod_proxy_ajp denial of service
1088| [53453] Cisco IOS Authentication Proxy for HTTP security bypass
1089| [53124] mod_proxy_ftp module for Apache HTTP header security bypass
1090| [52604] HTTP request forwarding (Web Proxy) detected
1091| [51532] mod_proxy module for the Apache HTTP Server stream_reqbody_cl denial of service
1092| [47305] Live Chat component for Joomla! xmlhttp.php open proxy
1093| [44467] HTTP Anti Virus Proxy (HAVP) sockethandler.cpp denial of service
1094| [44223] Apache HTTP Server mod_proxy_ftp cross-site scripting
1095| [42987] Apache HTTP Server mod_proxy module denial of service
1096| [40694] BEA WebLogic Server and WebLogic Express HttpClusterServlet and HttpProxyServlet privilege escalation
1097| [39615] Apache HTTP Server mod_proxy_ftp.c UTF-7 cross-site scripting
1098| [39612] Apache HTTP Server mod_proxy_balancer buffer overflow
1099| [39474] Apache HTTP Server mod_proxy_balancer cross-site scripting
1100| [37405] DeleGate HTTP cache proxy denial of service
1101| [36354] Apache HTTP Server mod_proxy module denial of service
1102| [36352] Apache HTTP Server ap_proxy_date_canon() denial of service
1103| [34884] Astaro Secure Gateway HTTP proxy denial of service
1104| [34282] BEA WebLogic Server and WebLogic Express HttpProxyServlet and HttpClusterServlet unauthorized access
1105| [26970] WinGate HTTP proxy buffer overflow
1106| [26370] Symantec Enterprise Firewall HTTP proxy internal IP disclosure
1107| [23997] Blue Coat WinProxy SecureSuite HTTP request denial of service
1108| [23451] Microsoft Internet Explorer HTTPS proxy authentication information disclosure
1109| [22016] Simpleproxy HTTP Proxy reply format string
1110| [20391] Apple Mac OS X HTTP proxy service security bypass
1111| [20339] Squid Web Proxy Cache HTTP header cache poisoning
1112| [20334] Squid Web Proxy Cache httpProcessReplyHeader security bypass
1113| [19868] HTTP Anti Virus Proxy cab and zip files bypass filtering
1114| [19060] Squid Web Proxy Cache HTTP header cache poisoning
1115| [18308] Jana Server http-server and pna-proxy denial of service
1116| [16751] AnomicHTTPProxy "
1117| [16750] AnomicHTTPProxy allows elevated privileges
1118| [16749] AnomicHTTPProxy administration interface denial of service
1119| [16387] Apache HTTP Server mod_proxy Content-Length buffer overflow
1120| [15952] proxy server using the HTTP CONNECT directive has been detected
1121| [15277] Proxy-Pro GateKeeper Pro long HTTP GET buffer overflow
1122| [15275] PSOProxy long HTTP GET request buffer overflow
1123| [14955] ProxyNow! HTTP GET stack based buffer overflow or heap-based buffer overflow
1124| [14947] Gaim HTTP proxy buffer overflow
1125| [12681] Apache HTTP Server mod_proxy could allow mail relaying
1126| [12552] Apache HTTP Server FTP proxy server denial of service
1127| [11143] Astaro Security Linux HTTP Proxy can be used to make unauthorized TCP connections
1128| [10139] Check Point FireWall-1 HTTP proxy could allow HTTPS and FTP traffic to bypass the firewall
1129| [9914] Jigsaw HTTP Proxy server cross-site scripting
1130| [9834] CERN HTTPD proxy server cross-site scripting
1131| [9683] Jana Server HTTP GET proxy buffer overflow
1132| [9579] Symantec Norton Personal Firewall and Norton Internet Security HTTP proxy buffer overflow
1133| [9455] AnalogX Proxy malformed HTTP request buffer overflow
1134| [8425] Trend Micro InterScan VirusWall could allow virus infected Web pages to bypass the HTTP proxy filtering
1135| [7964] BlackJumboDog HTTP proxy buffer overflow
1136| [7916] Avirt SOHO, Gateway, and Gateway Suite HTTP proxy buffer overflow
1137| [4460] CProxy proxy server HTTP port denial of service
1138| [153] HTTP proxy penetrated
1139| [60] HTTP proxy detected
1140|
1141| Exploit-DB - https://www.exploit-db.com:
1142| [21978] Linksys WAP11 1.3/1.4,D-Link DI-804 4.68/Dl-704 2.56 b5 Embedded HTTP Server DoS Vulnerability
1143| [20595] NCSA 1.3/1.4.x/1.5,Apache httpd 0.8.11/0.8.14 ScriptAlias Source Retrieval Vulnerability
1144| [5215] Ruby 1.8.6 (Webrick Httpd 1.3.1) Directory Traversal Vulnerability
1145| [30229] SHTTPD 1.38 Filename Parse Error Information Disclosure Vulnerability
1146| [26156] CPaint 1.3 xmlhttp Request Input Validation Vulnerability
1147| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
1148| [24402] Axis Network Camera 2.x And Video Server 1-3 HTTP Authentication Bypass
1149| [23676] MaxWebPortal 1.3x down.asp HTTP_REFERER XSS
1150| [21955] AN HTTPD 1.38/1.39/1.40/1.41 Malformed SOCKS4 Request Buffer Overflow Vulnerability
1151| [21145] IBM HTTP Server 1.3.x Source Code Disclosure Vulnerability
1152| [20559] tinyproxy tinyproxy 1.3.2/1.3.3 Heap Overflow Vulnerability
1153| [20531] IBM HTTP Server 1.3 AfpaCache/WebSphereNet.Data DoS Vulnerability
1154| [16759] SHTTPD <= 1.34 URI-Encoded POST Request Overflow (win32)
1155| [16199] Icy Phoenix 1.3.0.53a HTTP Referer stored XSS
1156| [4700] simple httpd <= 1.38 Multiple Vulnerabilities
1157| [2482] SHTTPD 1.34 (POST) Remote Buffer Overflow Exploit
1158| [1174] ZipTorrent <= 1.3.7.3 - Local Proxy Password Disclosure Exploit
1159|
1160| OpenVAS (Nessus) - http://www.openvas.org:
1161| [66806] Debian Security Advisory DSA 1987-1 (lighttpd)
1162| [66557] Fedora Core 12 FEDORA-2009-12606 (httpd)
1163| [66498] Fedora Core 10 FEDORA-2009-12604 (httpd)
1164| [64741] Fedora Core 11 FEDORA-2009-8812 (httpd)
1165| [61364] Debian Security Advisory DSA 1540-3 (lighttpd)
1166| [61357] Debian Security Advisory DSA 1609-1 (lighttpd)
1167| [60793] Debian Security Advisory DSA 1540-2 (lighttpd)
1168| [60786] Debian Security Advisory DSA 1540-1 (lighttpd)
1169| [60573] Debian Security Advisory DSA 1521-1 (lighttpd)
1170| [60499] Debian Security Advisory DSA 1513-1 (lighttpd)
1171| [58644] Debian Security Advisory DSA 1362-2 (lighttpd)
1172| [58581] Debian Security Advisory DSA 1362-1 (lighttpd)
1173| [57684] Debian Security Advisory DSA 1205-2 (thttpd)
1174| [53726] Debian Security Advisory DSA 145-1 (tinyproxy)
1175| [11129] HTTP 1.1 header overflow
1176| [11127] HTTP 1.0 header overflow
1177| [902825] at32 Reverse Proxy Multiple HTTP Header Fields Denial Of Service Vulnerability
1178| [900325] Qbik WinGate HTTP Proxy Server Access Controls Bypass Vulnerability
1179| [900222] IBM HTTP Server mod_proxy Interim Responses DoS Vulnerability
1180| [864812] Fedora Update for haproxy FEDORA-2012-16033
1181| [864801] Fedora Update for haproxy FEDORA-2012-16056
1182| [800827] Apache 'mod_proxy_http.c' Denial Of Service Vulnerability
1183| [103293] Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
1184| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
1185| [100083] HTTP Proxy Server Detection
1186| [71366] FreeBSD Ports: haproxy
1187| [11715] Header overflow against HTTP proxy
1188|
1189| SecurityTracker - https://www.securitytracker.com:
1190| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
1191| [1015870] Cisco 11500 Content Services Switch HTTP Compression Bug Lets Remote Users Deny Service
1192| [1028638] RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files
1193| [1027165] Squid XMLHttpRequest Allows Remote Users to Obtain the Target User's Proxy Username and Password
1194| [1026054] Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service
1195| [1024096] Apache mod_proxy_http May Return Results for a Different Request
1196| [1020900] HTTP Anti Virus Proxy Bug in 'sockethandler.cpp' Lets Remote Users Deny Service
1197| [1017586] Blue Coat WinProxy Heap Overflow in Processing HTTP CONNECT Requests May Let Remote Users Execute Arbitrary Code
1198| [1017324] Sun Java System Web Proxy Server Lets Remote Users Conduct HTTP Request Smuggling Attacks
1199| [1016239] WinGate Buffer Overflow in HTTP Proxy Lets Remote Users Execute Arbitrary Code
1200| [1016058] Symantec Gateway Security HTTP Proxy May Disclose Internal NAT Addresses
1201| [1016057] Symantec Enterprise Firewall HTTP Proxy May Disclose Internal NAT Addresses
1202| [1014359] DeleGate Proxy Lets Remote Users Conduct HTTP Request Smuggling Attacks
1203| [1014358] Sun Java System Web Proxy Server Lets Remote Users Conduct HTTP Request Smuggling Attacks
1204| [1013370] HTTP Anti Virus Proxy May Not Detect Viruses in Certain Archives
1205| [1012365] JanaServer 2 http-server and pna-proxy Flaws Let Remote Users Deny Service
1206| [1007712] Nokia Electronic Documentation Default Configuration Permits Remote HTTP Proxy Services
1207| [1007146] Apache HTTP Server FTP Proxy Bug May Cause Denial of Service Conditions
1208| [1006833] EServ Can Be Used as HTTP and FTP Proxy Even When Not Configured as a Proxy
1209| [1005253] Check Point FireWall-1 HTTP Proxy Default Configuration May Allow HTTPS and FTP Traffic to Pass Through the Proxy
1210| [1005026] CERN HTTP Proxy Server Input Validation Hole Lets Remote Users Conduct Cross-site Scripting Attacks
1211| [1004780] Norton Personal Firewall Buffer Overflow in HTTP Proxy May Allow Remote Users to Execute Arbitrary Code on the System
1212| [1004779] Norton Internet Security Buffer Overflow in HTTP Proxy May Allow Remote Users to Execute Arbitrary Code on the System
1213| [1003875] HP Webproxy for HP-UX VVOS Operating System May Forward Certain HTTP Requests to the Internal Network Without Fully Processing the Packet Against the Rule Set
1214| [1003600] Check Point FireWall-1 HTTP Proxy Bug Lets Remote Users Bypass Some Access Controls and Connect to Arbitrary Ports on Internal/Protected Hosts
1215|
1216| OSVDB - http://www.osvdb.org:
1217| [91975] HAProxy HTTP Content Inspection Mechanism HTTP Request Handling Remote Overflow DoS
1218| [84399] Huawei AR 18 / 29 Routers HTTP Server Pre-auth Multiple URL Handling Remote Overflow
1219| [82774] HAProxy http_auth_group() Function User Parsing Weakness
1220| [82768] HAProxy Secure / HttpOnly Flag Cookie Weakness
1221| [79018] Links HTTP 100 Response Handling DoS
1222| [74826] Pidgin libpurple MSN Protocol Plugin httpconn.c msn_httpconn_parse_data Function HTTP 100 Response Remote DoS
1223| [74346] HAProxy src/proto_http.c manage_server_side_cookies() Function HTTP Set-Cookie Header Remote DoS
1224| [64275] NIBE RCU 11 Heat Pump HTTP Request Arbitrary Administrative Account Creation
1225| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
1226| [24433] Cisco 11500 Content Services Switch HTTP Compression DoS
1227| [8854] Cisco CSS 11000 Web Interface HTTPS POST DoS
1228| [94328] HAProxy Header Field Handling Remote DoS
1229| [93048] IBM Sterling Secure Proxy HTTP Header Web Server Version Disclosure
1230| [91613] Zend Framework Multiple Class HTTP Header Proxy Information Handling Spoofing Weakness
1231| [90557] Apache HTTP Server mod_proxy_balancer balancer-manager Interface Multiple Parameter XSS
1232| [90422] Mozilla Multiple Product Proxy 407 Response HTTPS Address Spoofing
1233| [89275] Apache HTTP Server mod_proxy_ajp Module Expensive Request Parsing Remote DoS
1234| [88581] Squid Web Proxy HTTP Accelerator Mode Proxied Port Scan Weakness
1235| [88287] Squid Crafted XMLHttpRequest Remote Proxy-Authorization Cleartext Credential Disclosure
1236| [88016] BlackJumboDog HTTP Proxy Multiple String Parsing Remote Overflow
1237| [87958] IBM WebSphere Message Broker ProxyServlet / MQ HTTP Connection Cleartext Credential Disclosure
1238| [87457] Tor Directory Connection HttpProxyAuthenticator Remote Fingerprinting Weakness
1239| [85838] 602Pro LAN SUITE HTTP Proxy-Authorization Header Handling Remote Overflow DoS
1240| [85090] Apache HTTP Server mod_proxy_ajp.c mod_proxy_ajp Module Proxy Functionality Cross-client Information Disclosure
1241| [85089] Apache HTTP Server mod_proxy_http.c mod_proxy_http Module Cross-client Information Disclosure
1242| [82773] HAProxy buffer_ignore Function Unspecified Issue
1243| [82772] HAProxy Crafted Response Cookie Handling Remote DoS
1244| [82771] HAProxy Invalid Response Handling Remote DoS
1245| [82770] HAProxy appsession Cookie Matching Weakness
1246| [82769] HAProxy Session Freeing Unspecified DoS
1247| [82767] HAProxy poll/epoll Unspecified Memory Corruption DoS
1248| [82766] HAProxy send_syslog() Function Overflow Local DoS
1249| [82651] SEIL Routers HTTP-Proxy/Gateway HTTP Request Parsing URL Filter Bypass
1250| [82092] HAProxy Boundary Error Trash Buffer Data Copying Remote Overflow
1251| [81164] Squid Proxy HTTP Header Host Field Parsing URL Filter Bypass
1252| [78987] CVS src/client.c proxy_connect() Function HTTP Version Response Parsing Remote Overflow
1253| [78774] Mozilla Multiple Products IPv6 Proxy Generated XMLHttpRequest Object Handling Remote Information Disclosure
1254| [78667] Oracle Java SE / Java for Business java:classes_net HttpsUrlConnection Authenticated Proxy Tunnel Handling Overflow
1255| [77444] Apache HTTP Server mod_proxy Mdule Web Request HTTP/0.9 Protocol URL Parsing Proxy Remote Security Bypass
1256| [77310] Apache HTTP Server mod_proxy Reverse Proxy Mode Security Bypass Weakness (2011-4317)
1257| [76079] Apache HTTP Server mod_proxy Mdule Web Request URL Parsing Proxy Remote Security Bypass (2011-3368)
1258| [75647] Apache HTTP Server mod_proxy_ajp Module mod_proxy_balancer HTTP Request Remote DoS
1259| [73624] PHP Streams Component HTTP Proxy FTP Wrapper ftp:// URL DoS
1260| [73354] IBM WebSphere Application Server (WAS) HTTP Transport SIP Proxy UDP Message Saturation Remote DoS
1261| [71647] Apache HttpComponents HttpClient Proxy-Authorization Credentials Remote Disclosure
1262| [69667] Google Chrome HTTP Proxy Authentication Required Response Handling DoS
1263| [68162] OmniVista 4760 HTTP Proxy Crafted HTTP Request Remote Overflow
1264| [67270] Blue Coat ProxySG HTTPS Privilege Enforcement Bypass
1265| [65654] Apache HTTP Server mod_proxy_http mod_proxy_http.c Timeout Detection Weakness HTTP Request Response Disclosure
1266| [62676] Apache HTTP Server mod_proxy_ajp Module Crafted Request Remote DoS
1267| [62009] Apache HTTP Server src/modules/proxy/proxy_util.c mod_proxy ap_proxy_send_fb() Function Overflow
1268| [60010] HP Praesidium Webproxy Crafted HTTP Request Forwarding Weakness
1269| [59022] Apache Shindig ConcatProxyServlet HTTP Header Response Splitting
1270| [57882] Apache HTTP Server mod_proxy_ftp Authorization HTTP Header Arbitrary FTP Command Injection
1271| [57851] Apache HTTP Server mod_proxy_ftp EPSV Command NULL Dereference Remote DoS
1272| [56712] Live Chat Component for Joomla! xmlhttp.php Open HTTP Proxy
1273| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
1274| [56488] Google Chrome Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
1275| [56487] Opera Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
1276| [55553] Apache HTTP Server mod_proxy Module mod_proxy_http.c stream_reqbody_cl Function CPU Consumption DoS
1277| [55133] Mozilla Firefox HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
1278| [55132] Google Chrome src/net/http/http_transaction_winhttp.cc HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
1279| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
1280| [53921] Apache HTTP Server mod_proxy_ajp Cross Thread/Session Information Disclosure
1281| [52413] Blue Coat ProxySG Transparent Interception Mode HTTP Host Header Dependancy Media Access Control Bypass
1282| [52412] Ziproxy Transparent Interception Mode HTTP Host Header Dependancy Media Access Control Bypass
1283| [48528] CCProxy HTTP Proxy CONNECT Request Handling Remote Overflow
1284| [47512] HTTP Anti Virus Proxy (HAVP) Infinite Loop Connection Saturation DoS
1285| [47474] Apache HTTP Server mod_proxy_ftp Directory Component Wildcard Character XSS
1286| [46085] Apache HTTP Server mod_proxy ap_proxy_http_process_response() Function Interim Response Forwarding Remote DoS
1287| [44135] Nortel VPN Gateway Malformed HTTP Request SSL Proxy Remote DoS
1288| [44132] Nortel iSD-SSL Malformed HTTP Request SSL Proxy Remote DoS
1289| [43259] Apache HTTP Server on Windows mod_proxy_balancer URL Handling Remote Memory Corruption
1290| [42937] Apache HTTP Server mod_proxy_balancer balancer-manager Unspecified CSRF
1291| [42214] Apache HTTP Server mod_proxy_ftp UTF-7 Encoded XSS
1292| [42122] Kerio WinRoute Firewall Proxy Server Unspecified HTTP Fallback
1293| [41862] DeleGate HTTP Cache Proxy Unspecified DoS
1294| [40264] Apache HTTP Server mod_proxy_balancer balancer_handler Function bb Variable Remote DoS
1295| [40263] Apache HTTP Server mod_proxy_balancer balancer-manager Multiple Parameter XSS
1296| [39291] ELinks https Proxy CONNECT Request Cleartext Information Disclosure
1297| [37345] Astaro Security Gateway (ASG) HTTP Proxy Unspecified DoS
1298| [37051] Apache HTTP Server mod_proxy modules/proxy/proxy_util.c Crafted Header Remote DoS
1299| [36980] 3Proxy HTTP Redirection Unspecified DoS
1300| [36074] BEA WebLogic HttpClusterServlet / HttpProxyServlet SecureProxy Admin Functionality Access
1301| [35237] 3Proxy HTTP Proxy Crafted Transparent Request Remote Overflow
1302| [33097] Blue Coat WinProxy HTTP CONNECT Request Overflow
1303| [26300] Mozilla Multiple Products via Proxy Server HTTP Response Smuggling
1304| [26008] PHPGallue Proxy Cache HTTP Header Information Disclosure
1305| [25565] phpBB usercp_avatar.php Arbitrary HTTP Proxy
1306| [22876] HTTP Anti Virus Proxy Multiple AV Scanner Failure
1307| [22853] Blue Coat ProxySG SGOS HTTP Proxy Arbitrary Port Connection
1308| [22237] Blue Coat WinProxy HTTP Request Overflow DoS
1309| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
1310| [19008] Simpleproxy HTTP Proxy Reply Remote Format String
1311| [18284] Netquery HTTP GET Request Panel Unauthorized Proxy
1312| [16388] Mozilla with Proxy HTTP Header Arbitrary Cookie Disclosure
1313| [16082] Apple Mac OS X Server HTTP Proxy Unrestricted Access
1314| [16014] IBM Web Traffic Express Caching Proxy Server HTTP GET Request XSS
1315| [14573] HTTP Anti Virus Proxy Archive Scanning Failure
1316| [14270] Sun Java JRE HTTP Proxy Java Applet Session Hijack
1317| [14155] BitlBee HTTP Proxy Support Unspecified Security Issue
1318| [12558] Apache HTTP Server IPv6 FTP Proxy Socket Failure DoS
1319| [11593] CCProxy Logging Component HTTP GET Request Remote Overflow
1320| [9742] Apache HTTP Server mod_ssl char_buffer_read Function Reverse Proxy DoS
1321| [9688] Apache HTTP Server mod_proxy Malformed FTP Command DoS
1322| [7929] Apache HTTP Server mod_ssl ssl_engine_log.c mod_proxy Hook Function Remote Format String
1323| [7714] AnomicHTTPProxy Invalid HTTP Command Proxy Localhost Block
1324| [7713] AnomicHTTPProxy Administration Password Dementia
1325| [7709] AnomicHTTPProxy Double Dot Arbitrary File Access
1326| [6839] Apache HTTP Server mod_proxy Content-Length Overflow
1327| [6804] Avirt Gateway/Gateway Suite/SOHO HTTP Proxy Overflow
1328| [6187] Trend Micro InterScan VirusWall HTTP CONNECT Proxying
1329| [6162] Trend Micro InterScan VirusWall HTTP Proxy Content Scanning Circumvention
1330| [4433] Check Point FireWall-1 HTTP Proxy Traffic Bypass
1331| [4366] Symantec Personal Firewalls HTTP Proxy Remote Overflow
1332| [4028] PSOProxy Long HTTP Request Overflow
1333| [4015] Jigsaw HTTP Proxy Error Page XSS
1334| [3732] Gaim HTTP Proxy Connect Overflow
1335| [3723] ProxyNow! HTTP Request Overflow
1336| [3718] Finjan SurfinGate Proxy FHTTP Command Admin Functions Authentication Bypass
1337| [2764] Plug and Play Web Server Proxy Service HTTP Request Handling DoS
1338| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
1339| [1429] SapporoWorks WinProxy Malformed HTTP GET Request DoS
1340| [1336] CProxy SP2 Long HTTP Request DoS
1341| [787] Compaq Web-enabled Management Software HTTP Server Arbitrary Traffic Proxy
1342|_
1343Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1344Device type: general purpose
1345Running (JUST GUESSING): Linux 3.X|4.X (86%)
1346OS CPE: cpe:/o:linux:linux_kernel:3.18 cpe:/o:linux:linux_kernel:4.9
1347Aggressive OS guesses: Linux 3.18 (86%), Linux 4.9 (86%)
1348No exact OS matches for host (test conditions non-ideal).
1349Network Distance: 11 hops
1350Service Info: Device: load balancer
1351
1352TRACEROUTE (using port 80/tcp)
1353HOP RTT ADDRESS
13541 165.87 ms 10.247.200.1
13552 168.43 ms 213.184.122.97
13563 165.96 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
13574 166.31 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
13585 166.67 ms bzq-179-124-54.cust.bezeqint.net (212.179.124.54)
13596 204.46 ms ix-ae-4-0.tcore2.wyn-marseille.as6453.net (80.231.200.73)
13607 205.29 ms if-ae-2-2.tcore1.wyn-marseille.as6453.net (80.231.217.1)
13618 289.71 ms 80.231.217.99
13629 ...
136310 293.12 ms 212.26.63.252
136411 295.33 ms 212.138.117.248
1365#######################################################################################################################################
1366
1367wig - WebApp Information Gatherer
1368
1369
1370Scanning http://212.138.117.248...
1371___________________________________ SITE INFO ___________________________________
1372IP Title
1373212.138.117.248 هيئة الخبراء بمجلس الوزراء :: الصفحة الرئيسية
1374
1375____________________________________ VERSION ____________________________________
1376Name Versions Type
1377SharePoint 16.0.0.4681 CMS
1378
1379_____________________________________ TOOLS _____________________________________
1380Name Link Software
1381sparty https://github.com/alias1/sparty SharePoint
1382spscan https://github.com/toddsiegel/spscan SharePoint
1383Sharepoint URL Brute http://www.bishopfox.com/download/414/ SharePoint
1384
1385_________________________________________________________________________________
1386Time: 83.5 sec Urls: 241 Fingerprints: 40401
1387#######################################################################################################################################
1388HTTP/1.1 302 Redirect
1389Content-Length: 167
1390Content-Type: text/html; charset=UTF-8
1391Location: http://212.138.117.248/ar/Pages/default.aspx
1392X-SharePointHealthScore: 0
1393SPRequestGuid: 51b5f79e-63a2-704f-ba15-a8d5d2764c26
1394request-id: 51b5f79e-63a2-704f-ba15-a8d5d2764c26
1395X-FRAME-OPTIONS: SAMEORIGIN
1396SPRequestDuration: 40
1397SPIisLatency: 1
1398MicrosoftSharePointTeamServices: 16.0.0.4681
1399X-Content-Type-Options: nosniff
1400X-MS-InvokeApp: 1; RequireReadOnly
1401X-XSS-Protection: 1; mode=block
1402Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' https://*.google-analytics.com *.googletagmanager.com https://static.addtoany.com https://graph.facebook.com; style-src 'self' 'unsafe-inline' ;
1403Date: Tue, 06 Aug 2019 22:59:01 GMT
1404
1405HTTP/1.1 302 Redirect
1406Content-Length: 167
1407Content-Type: text/html; charset=UTF-8
1408Location: http://212.138.117.248/ar/Pages/default.aspx
1409X-SharePointHealthScore: 0
1410SPRequestGuid: 51b5f79e-03cb-704f-057a-1bb7c3564a86
1411request-id: 51b5f79e-03cb-704f-057a-1bb7c3564a86
1412X-FRAME-OPTIONS: SAMEORIGIN
1413SPRequestDuration: 41
1414SPIisLatency: 0
1415MicrosoftSharePointTeamServices: 16.0.0.4681
1416X-Content-Type-Options: nosniff
1417X-MS-InvokeApp: 1; RequireReadOnly
1418X-XSS-Protection: 1; mode=block
1419Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' https://*.google-analytics.com *.googletagmanager.com https://static.addtoany.com https://graph.facebook.com; style-src 'self' 'unsafe-inline' ;
1420Date: Tue, 06 Aug 2019 22:59:02 GMT
1421
1422HTTP/1.1 200 OK
1423Cache-Control: private, max-age=0
1424Content-Length: 13300
1425Content-Type: text/html; charset=utf-8
1426Expires: Mon, 22 Jul 2019 22:59:02 GMT
1427Last-Modified: Tue, 06 Aug 2019 22:59:02 GMT
1428X-SharePointHealthScore: 0
1429SPRequestGuid: 51b5f79e-e3e0-704f-ba15-a44be1871450
1430request-id: 51b5f79e-e3e0-704f-ba15-a44be1871450
1431X-FRAME-OPTIONS: SAMEORIGIN
1432SPRequestDuration: 107
1433SPIisLatency: 1
1434MicrosoftSharePointTeamServices: 16.0.0.4681
1435X-Content-Type-Options: nosniff
1436X-MS-InvokeApp: 1; RequireReadOnly
1437X-XSS-Protection: 1; mode=block
1438Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' https://*.google-analytics.com *.googletagmanager.com https://static.addtoany.com https://graph.facebook.com; style-src 'self' 'unsafe-inline' ;
1439Date: Tue, 06 Aug 2019 22:59:02 GMT
1440#######################################################################################################################################
1441Font Awesome
1442 Microsoft SharePoint 16.0.0.4681
1443 Slick
1444 Microsoft ASP.NET
1445 jQuery 1.11.0
1446 request-id: 52b5f79e-c352-704f-057a-1aa1b3c4e637
1447 SPRequestDuration: 101
1448 SPIisLatency: 0
1449 X-MS-InvokeApp: 1; RequireReadOnly
1450########################################################################################################################################
1451Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 19:03 EDT
1452Nmap scan report for 212.138.117.248
1453Host is up.
1454
1455PORT STATE SERVICE VERSION
1456123/udp open|filtered ntp
1457Too many fingerprints match this host to give specific OS details
1458
1459TRACEROUTE (using proto 1/icmp)
1460HOP RTT ADDRESS
14611 170.73 ms 10.247.200.1
14622 172.33 ms 213.184.122.97
14633 171.61 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
14644 171.57 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
14655 171.66 ms bzq-179-124-54.cust.bezeqint.net (212.179.124.54)
14666 209.00 ms ix-ae-4-0.tcore2.wyn-marseille.as6453.net (80.231.200.73)
14677 208.97 ms if-ae-2-2.tcore1.wyn-marseille.as6453.net (80.231.217.1)
14688 294.02 ms 80.231.217.99
14699 ...
147010 290.87 ms 212.26.63.252
147111 ... 30
1472#######################################################################################################################################
1473Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 19:05 EDT
1474Nmap scan report for 212.138.117.248
1475Host is up (0.29s latency).
1476
1477PORT STATE SERVICE VERSION
1478443/tcp open ssl Microsoft SChannel TLS
1479| fingerprint-strings:
1480| TLSSessionReq:
1481| DigiCert Inc1'0%
1482| DigiCert SHA2 Secure Server CA0
1483| 180806000000Z
1484| 200810120000Z0z1
1485| Riyadh1604
1486| -Bureau of Experts At The Council of Ministers1
1487| *.boe.gov.sa0
1488| /dr4
1489| jin}.
1490| R\x20n
1491| MB0#
1492| *.boe.gov.sa
1493| boe.gov.sa0
1494| d0b0/
1495| )http://crl3.digicert.com/ssca-sha2-g6.crl0/
1496|_ )http:
1497| vulscan: VulDB - https://vuldb.com:
1498| [79184] Microsoft Windows up to Vista TLS Schannel spoofing
1499| [114386] libcURL up to 7.30.0 on WinCE lib/vtls/schannel.c verify_certificate Certificate memory corruption
1500| [114385] libcURL up to 7.30.0 on WinCE lib/vtls/schannel.c verify_certificate weak authentication
1501| [87168] Microsoft .NET Framework up to 4.6.1 TLS/SSL information disclosure
1502| [75327] Microsoft Windows up to Vista SP2 Schannel weak encryption
1503| [68183] Microsoft Windows up to Vista Schannel memory corruption
1504| [13490] Microsoft Internet Explorer up to 11 TLS Certificate information disclosure
1505| [7258] Microsoft Windows up to 8/Server 2012 SSL/TLS race condition
1506| [4431] Microsoft Windows SSL/TLS IV memory corruption
1507| [4194] Microsoft Windows Vista/7/Server 2008 SChannel Client Certificate Request denial of service
1508| [4161] Microsoft Windows TLS/SSL Session TLS/SSL Session Renegotiation cross site scripting
1509|
1510| MITRE CVE - https://cve.mitre.org:
1511| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
1512| [CVE-2010-2566] The Secure Channel (aka SChannel) security package in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, does not properly validate certificate request messages from TLS and SSL servers, which allows remote servers to execute arbitrary code via a crafted SSL response, aka "SChannel Malformed Certificate Request Remote Code Execution Vulnerability."
1513| [CVE-2009-0085] The Secure Channel (aka SChannel) authentication component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, when certificate authentication is used, does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages, which allows remote attackers to spoof authentication by crafting a TLS packet based on knowledge of the certificate but not the private key, aka "SChannel Spoofing Vulnerability."
1514| [CVE-2013-0013] The SSL provider component in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle encrypted packets, which allows man-in-the-middle attackers to conduct SSLv2 downgrade attacks against (1) SSLv3 sessions or (2) TLS sessions by intercepting handshakes and injecting content, aka "Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability."
1515| [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
1516| [CVE-2012-1870] The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."
1517| [CVE-2010-3140] Untrusted search path vulnerability in Microsoft Windows Internet Communication Settings on Windows XP SP3 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll that is located in the same folder as an ISP file.
1518| [CVE-2010-0025] The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2000 SP3, does not properly allocate memory for SMTP command replies, which allows remote attackers to read fragments of e-mail messages by sending a series of invalid commands and then sending a STARTTLS command, aka "SMTP Memory Allocation Vulnerability."
1519| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
1520| [CVE-2007-5633] Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \Device\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.
1521| [CVE-2007-2593] The Terminal Server in Microsoft Windows 2003 Server, when using TLS, allows remote attackers to bypass SSL and self-signed certificate requirements, downgrade the server security, and possibly conduct man-in-the-middle attacks via unspecified vectors, as demonstrated using the Remote Desktop Protocol (RDP) 6.0 client. NOTE: a third party claims that the vendor may have fixed this in approximately 2006.
1522| [CVE-2007-2218] Unspecified vulnerability in the Windows Schannel Security Package for Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, allows remote servers to execute arbitrary code or cause a denial of service via crafted digital signatures that are processed during an SSL handshake.
1523| [CVE-2005-1794] Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks.
1524| [CVE-2002-1824] Microsoft Internet Explorer 6.0, when handling an expired CA-CERT in a webserver's certificate chain during a SSL/TLS handshake, does not prompt the user before searching for and finding a newer certificate, which may allow attackers to perform a man-in-the-middle attack. NOTE: it is not clear whether this poses a vulnerability.
1525|
1526| SecurityFocus - https://www.securityfocus.com/bid/:
1527| [43780] Microsoft Windows SChannel TLSv1 Remote Denial of Service Vulnerability
1528| [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
1529| [77484] Microsoft Windows SChannel CVE-2015-6112 Man in the Middle Security Bypass Vulnerability
1530| [57144] Microsoft Windows SSLv3/TLS CVE-2013-0013 Security Bypass Vulnerability
1531| [54304] Microsoft Windows TLS Protocol CBC Mode Information Disclosure Vulnerability
1532| [42246] Microsoft Windows SChannel Certificate Request Remote Code Execution Vulnerability
1533| [34015] Microsoft Windows SChannel Authentication Spoofing Vulnerability
1534| [24416] Microsoft Windows SChannel Security Remote Code Execution Vulnerability
1535| [5274] Microsoft Outlook Express SMTP Over TLS Information Disclosure Vulnerability
1536|
1537| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1538| [80860] Microsoft Windows SSL/TLS security bypass
1539| [76701] Microsoft Windows TLS information disclosure
1540| [63787] Microsoft Windows Internet Communication Settings dynamic-linked library (schannel.dll) code execution
1541| [62148] Microsoft Windows SChannel denial of service
1542| [60718] Microsoft Windows SChannel code execution
1543| [48307] Microsoft Windows SChannel certificate spoofing
1544| [34636] Microsoft Windows Schannel code execution
1545| [21954] Microsoft Windows Remote Desktop Protocol mstlsapi.dll Man-in-the-Middle
1546| [86256] Microsoft Windows Knowledge Base Article 2876063 update is not installed
1547| [86097] Microsoft Windows Knowledge Base Article 2859537 update is not installed
1548| [86096] Microsoft Windows NTVDM privilege escalation 3
1549| [86095] Microsoft Windows NTVDM privilege escalation 2
1550| [86094] Microsoft Windows NTVDM privilege escalation 1
1551| [86091] Microsoft Windows Knowledge Base Article 2868623 update is not installed
1552| [86090] Microsoft Windows ICMPv6 denial of service
1553| [86089] Microsoft Windows Knowledge Base Article 2862772 update is not installed
1554| [86088] Microsoft Internet Explorer CVE-2013-3199 code execution
1555| [86087] Microsoft Internet Explorer CVE-2013-3194 code execution
1556| [86086] Microsoft Internet Explorer CVE-2013-3193 code execution
1557| [86085] Microsoft Internet Explorer CVE-2013-3191 code execution
1558| [86084] Microsoft Internet Explorer CVE-2013-3190 code execution
1559| [86083] Microsoft Internet Explorer CVE-2013-3189 code execution
1560| [86082] Microsoft Internet Explorer CVE-2013-3188 code execution
1561| [86081] Microsoft Internet Explorer CVE-2013-3187 code execution
1562| [86080] Microsoft Internet Explorer CVE-2013-3184 code execution
1563| [86079] Microsoft Internet Explorer EUC-JP information disclosure
1564| [86078] Microsoft Internet Explorer integrity level privilege escalation
1565| [86075] Microsoft Windows Knowledge Base Article 2850869 update is not installed
1566| [86074] Microsoft Windows Unicode code execution
1567| [86073] Microsoft Windows Knowledge Base Article 2873872 update is not installed
1568| [86072] Microsoft Windows Active Directory Federation Services information disclosure
1569| [86070] Microsoft Windows Knowledge Base Article 2849568 update is not installed
1570| [86069] Microsoft Windows Windows NAT Driver denial of service
1571| [85802] Microsoft PowerPoint denial of service
1572| [85801] Microsoft Windows Movie Maker .wav denial of service
1573| [85762] Microsoft Internet Explorer sandbox bypass
1574| [85245] Microsoft Windows Knowledge Base Article 2848295 update is not installed
1575| [85244] Microsoft Windows Knowledge Base Article 2847927 update is not installed
1576| [85243] Microsoft Windows Knowledge Base Article 2861561 update is not installed
1577| [85242] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
1578| [85241] Microsoft .NET Framework and Microsoft Silverlight code execution
1579| [85240] Microsoft .NET Framework and Microsoft Silverlight code execution
1580| [85239] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
1581| [85238] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
1582| [85237] Microsoft .NET Framework and Microsoft Silverlight code execution
1583| [85236] Microsoft Windows Knowledge Base Article 2850851 update is not installed
1584| [85234] Microsoft Windows privilege escalation
1585| [85233] Microsoft Windows denial of service
1586| [85232] Microsoft Windows privilege escalation
1587| [85231] Microsoft Windows TrueType font file code execution
1588| [85230] Microsoft Windows privilege escalation
1589| [85229] Microsoft Windows privilege escalation
1590| [85228] Microsoft Windows privilege escalation
1591| [85227] Microsoft Windows Knowledge Base Article 2847883 update is not installed
1592| [85226] Microsoft Windows Media Format Runtime code execution
1593| [85224] Microsoft Windows DefenderCVE-2013-3154 privilege escalation
1594| [85223] Microsoft Windows Knowledge Base Article 2846071 update is not installed
1595| [85222] Microsoft Internet Explorer Shift JIS information disclosure
1596| [85221] Microsoft Internet Explorer CVE-2013-3164 code execution
1597| [85220] Microsoft Internet Explorer CVE-2013-3163 code execution
1598| [85219] Microsoft Internet Explorer CVE-2013-3162 code execution
1599| [85218] Microsoft Internet Explorer CVE-2013-3161 code execution
1600| [85217] Microsoft Internet Explorer CVE-2013-3153 code execution
1601| [85216] Microsoft Internet Explorer CVE-2013-3152 code execution
1602| [85215] Microsoft Internet Explorer CVE-2013-3151 code execution
1603| [85214] Microsoft Internet Explorer CVE-2013-3150 code execution
1604| [85213] Microsoft Internet Explorer CVE-2013-3149 code execution
1605| [85212] Microsoft Internet Explorer CVE-2013-3148 code execution
1606| [85211] Microsoft Internet Explorer CVE-2013-3147 code execution
1607| [85210] Microsoft Internet Explorer CVE-2013-3146 code execution
1608| [85209] Microsoft Internet Explorer CVE-2013-3145 code execution
1609| [85208] Microsoft Internet Explorer CVE-2013-3144 code execution
1610| [85207] Microsoft Internet Explorer CVE-2013-3143 code execution
1611| [85206] Microsoft Internet Explorer CVE-2013-3115 code execution
1612| [85205] Microsoft Windows Knowledge Base Article 2845187 update is not installed
1613| [85204] Microsoft DirectShow code execution
1614| [85133] Microsoft Outlook phishing
1615| [84965] Microsoft Sharepoint Online cross site scripting
1616| [84916] Microsoft Internet Explorer ASLR information disclosure
1617| [84714] GnuTLS denial of service
1618| [84691] Microsoft Internet Explorer code execution
1619| [84690] Microsoft Internet Explorer code execution
1620| [84647] telepathy-gabble TLS security bypass
1621| [84621] Microsoft Windows Knowledge Base Article 2845690 update is not installed
1622| [84620] Microsoft Windows kernel denial of service
1623| [84619] Microsoft Windows Knowledge Base Article 2839894 update is not installed
1624| [84618] Microsoft Windows Print Spooler privilege escalation
1625| [84617] Microsoft Windows Knowledge Base Article 2839571 update is not installed
1626| [84616] Microsoft Office code execution
1627| [84615] Microsoft Windows Knowledge Base Article 2839229 update is not installed
1628| [84614] Microsoft Windows kernel information disclosure
1629| [84613] Microsoft Windows Knowledge Base Article 2838727 update is not installed
1630| [84612] Microsoft Internet Explorer code execution
1631| [84611] Microsoft Internet Explorer code execution
1632| [84610] Microsoft Internet Explorer code execution
1633| [84609] Microsoft Internet Explorer code execution
1634| [84608] Microsoft Internet Explorer code execution
1635| [84607] Microsoft Internet Explorer code execution
1636| [84606] Microsoft Internet Explorer code execution
1637| [84605] Microsoft Internet Explorer code execution
1638| [84604] Microsoft Internet Explorer code execution
1639| [84603] Microsoft Internet Explorer code execution
1640| [84602] Microsoft Internet Explorer code execution
1641| [84601] Microsoft Internet Explorer code execution
1642| [84599] Microsoft Internet Explorer code execution
1643| [84598] Microsoft Internet Explorer code execution
1644| [84597] Microsoft Internet Explorer code execution
1645| [84596] Microsoft Internet Explorer code execution
1646| [84595] Microsoft Internet Explorer code execution
1647| [84571] Microsoft Windows denial of service
1648| [84546] Microsoft Windows Media Player .wav denial of service
1649| [84391] Microsoft Windows win32k.sys privilege escalation
1650| [84267] Microsoft Windows Update file detected
1651| [84266] Multiple Microsoft products code execution
1652| [84156] Microsoft Windows Knowledge Base Article 2847204 update is not installed
1653| [84019] Microsoft Internet Explorer MSXML information disclosure
1654| [84011] Microsoft Security Essentials privilege escalation
1655| [84007] Microsoft Internet Explorer CGenericElement object code execution
1656| [83995] Microsoft Internet Explorer code execution
1657| [83912] Microsoft Windows Knowledge Base Article 2829254 update is not installed
1658| [83911] Microsoft Windows denial of service
1659| [83910] Microsoft Windows Knowledge Base Article 2829530 update is not installed
1660| [83909] Microsoft Internet Explorer code execution
1661| [83908] Microsoft Internet Explorer code execution
1662| [83907] Microsoft Internet Explorer code execution
1663| [83906] Microsoft Internet Explorer code execution
1664| [83905] Microsoft Internet Explorer code execution
1665| [83904] Microsoft Internet Explorer code execution
1666| [83903] Microsoft Internet Explorer code execution
1667| [83902] Microsoft Internet Explorer code execution
1668| [83901] Microsoft Internet Explorer code execution
1669| [83900] Microsoft Internet Explorer code execution
1670| [83899] Microsoft Internet Explorer information disclosure
1671| [83898] Microsoft Windows Knowledge Base Article 2830397 update is not installed
1672| [83897] Microsoft Publisher buffer underflow
1673| [83896] Microsoft Publisher code execution
1674| [83895] Microsoft Publisher code execution
1675| [83894] Microsoft Publisher code execution
1676| [83893] Microsoft Publisher code execution
1677| [83892] Microsoft Publisher code execution
1678| [83891] Microsoft Publisher buffer overflow
1679| [83890] Microsoft Publisher code execution
1680| [83889] Microsoft Publisher code execution
1681| [83888] Microsoft Publisher integer overflow
1682| [83887] Microsoft Publisher code execution
1683| [83886] Microsoft Windows Knowledge Base Article 2830399 update is not installed
1684| [83885] Microsoft Word code execution
1685| [83884] Microsoft Windows Knowledge Base Article 2834692 update is not installed
1686| [83883] Microsoft Visio information disclosure
1687| [83882] Microsoft Windows Knowledge Base Article 2834695 update is not installed
1688| [83881] Microsoft Lync code execution
1689| [83880] Microsoft Windows Knowledge Base Article 2836440 update is not installed
1690| [83879] Microsoft .NET Framework security bypass
1691| [83878] Microsoft .NET Framework spoofing
1692| [83876] Microsoft Windows Knowledge Base Article 2840221 update is not installed
1693| [83875] Microsoft Windows privilege escalation
1694| [83874] Microsoft Windows privilege escalation
1695| [83873] Microsoft Windows privilege escalation
1696| [83192] Microsoft Windows Knowledge Base Article 2817183 update is not installed
1697| [83191] Microsoft Internet Explorer code execution
1698| [83190] Microsoft Internet Explorer code execution
1699| [83100] Microsoft Windows Knowledge Base Article 2830914 update is not installed
1700| [83099] Microsoft Windows denial of service
1701| [83098] Microsoft Windows Knowledge Base Article 2829996 update is not installed
1702| [83097] Microsoft Windows privilege escalation
1703| [83096] Microsoft Windows privilege escalation
1704| [83095] Microsoft Windows denial of service
1705| [83094] Microsoft Windows privilege escalation
1706| [83093] Microsoft Windows Knowledge Base Article 2828223 update is not installed
1707| [83092] Microsoft Remote Desktop ActiveX control code execution
1708| [83091] Microsoft Windows Knowledge Base Article 2813170 update is not installed
1709| [83090] Microsoft Windows privilege escalation
1710| [83089] Microsoft Windows privilege escalation
1711| [83088] Microsoft Windows Knowledge Base Article 2827663 update is not installed
1712| [83087] Microsoft SharePoint information disclosure
1713| [83086] Microsoft Windows Knowledge Base Article 2823482 update is not installed
1714| [83085] Microsoft Antimalware Client privilege escalation
1715| [83084] Microsoft Windows Knowledge Base Article 2821818 update is not installed
1716| [83083] Microsoft SharePoint and Microsoft Office Web Apps privilege escalation
1717| [83082] Microsoft Windows Knowledge Base Article 2820917 update is not installed
1718| [83081] Microsoft Windows Client/Server Run-time Subsystem privilege escalation
1719| [83063] Microsoft Windows Modern Mail spoofing
1720| [83009] IBM Tivoli Directory Server SSL/TLS denial of service
1721| [82884] TLS protocol RC4 information disclosure
1722| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
1723| [82775] Microsoft Windows kernel privilege escalation
1724| [82774] Microsoft Windows ASLR and DEP security bypass
1725| [82772] Microsoft Windows ASLR security bypass
1726| [82771] Microsoft Internet Explorer sandbox denial of service
1727| [82769] Microsoft Windows TTF denial of service
1728| [82731] Microsoft Internet Explorer CTreeNode code execution
1729| [82640] Wireshark DTLS dissector denial of service
1730| [82600] Microsoft Windows Knowledge Base Article 2813707 update is not installed
1731| [82599] Microsoft Windows Live Essentials information disclosure
1732| [82523] RSA Authentication Agent for Microsoft Windows Quick Pin security bypass
1733| [82443] Microsoft Office code execution
1734| [82424] Microsoft Windows Knowledge Base Article 2814124 update is not installed
1735| [82423] Microsoft Silverlight code execution
1736| [82422] Microsoft Windows Knowledge Base Article 2780176 update is not installed
1737| [82421] Microsoft SharePoint W3WP denial of service
1738| [82420] Microsoft SharePoint input privilege escalation
1739| [82419] Microsoft SharePoint JavaScript privilege escalation
1740| [82418] Microsoft SharePoint Callback privilege escalation
1741| [82417] Microsoft Windows Knowledge Base Article 2801261 update is not installed
1742| [82416] Microsoft Visio Viewer memory code execution
1743| [82415] Microsoft Windows Knowledge Base Article 2807986 update is not installed
1744| [82414] Microsoft Windows USB device privilege escalation
1745| [82413] Microsoft Windows USB device privilege escalation
1746| [82412] Microsoft Windows USB device privilege escalation
1747| [82410] Microsoft Windows Knowledge Base Article 2809289 update is not installed
1748| [82409] Microsoft Internet Explorer removeChild code execution
1749| [82408] Microsoft Internet Explorer onBeforeCopy code execution
1750| [82407] Microsoft Internet Explorer GetMarkupPtr code execution
1751| [82406] Microsoft Internet Explorer CElement code execution
1752| [82405] Microsoft Internet Explorer CCaret code execution
1753| [82404] Microsoft Internet Explorer CMarkupBehaviorContext code execution
1754| [82403] Microsoft Internet Explorer saveHistory code execution
1755| [82402] Microsoft Internet Explorer OnResize code execution
1756| [82401] Microsoft Windows Knowledge Base Article 2813682 update is not installed
1757| [82400] Microsoft Office for Mac information disclosure
1758| [82399] Microsoft Windows Knowledge Base Article 2816264 update is not installed
1759| [82398] Microsoft Office OneNote information disclosure
1760| [82367] MDaemon STARTTLS command execution
1761| [82089] Microsoft Windows ZwSetInformationProcess() denial of service
1762| [81912] Network Security Services TLS information disclosure
1763| [81911] GnuTLS CBC information disclosure
1764| [81906] PolarSSL TLS denial of service
1765| [81905] PeerSec MatrixSSL TLS information disclosure
1766| [81900] Microsoft Skype GiftCards cross-site scripting
1767| [81859] Microsoft Windows Knowledge Base Article 2802968 update is not installed
1768| [81858] Microsoft Windows OLE code execution
1769| [81857] Microsoft Windows Knowledge Base Article 2809279 update is not installed
1770| [81728] Microsoft Internet Explorer SRC information disclosure
1771| [81706] Microsoft Internet Explorer SSL lock spoofng
1772| [81705] Microsoft Internet Explorer TCP sessions information disclosure
1773| [81683] Microsoft Windows Knowledge Base Article 2780091 update is not installed
1774| [81682] Microsoft Windows .MPG code execution
1775| [81681] Microsoft Windows Knowledge Base Article 2784242 update is not installed
1776| [81680] Microsoft Windows Knowledge Base Article 2790113 update is not installed
1777| [81679] Microsoft Windows Client/Server Run-time Subsystem memory privilege escalation
1778| [81678] Microsoft Windows Knowledge Base Article 2790655 update is not installed
1779| [81677] Microsoft Windows TCP/IP sequence denial of service
1780| [81676] Microsoft Windows Knowledge Base Article 2790978 update is not installed
1781| [81675] Microsoft Windows NFS server denial of service
1782| [81674] Microsoft Windows Knowledge Base Article 2797052 update is not installed
1783| [81673] Microsoft Windows Vector Markup Language code execution
1784| [81672] Microsoft Windows Knowledge Base Article 2799494 update is not installed
1785| [81671] Microsoft Windows kernel privilege escalation
1786| [81670] Microsoft Windows kernel privilege escalation
1787| [81669] Microsoft Windows kernel privilege escalation
1788| [81668] Microsoft Windows Knowledge Base Article 2800277 update is not installed
1789| [81667] Microsoft .NET Framework WinForms privilege escalation
1790| [81666] Microsoft Windows Knowledge Base Article 2778344 update is not installed
1791| [81665] Microsoft Windows CVE-2013-1277 privilege escalation
1792| [81664] Microsoft Windows CVE-2013-1276 privilege escalation
1793| [81663] Microsoft Windows CVE-2013-1275 privilege escalation
1794| [81662] Microsoft Windows CVE-2013-1274 privilege escalation
1795| [81661] Microsoft Windows CVE-2013-1273 privilege escalation
1796| [81660] Microsoft Windows CVE-2013-1272 privilege escalation
1797| [81659] Microsoft Windows CVE-2013-1271 privilege escalation
1798| [81658] Microsoft Windows CVE-2013-1270 privilege escalation
1799| [81657] Microsoft Windows CVE-2013-1269 privilege escalation
1800| [81656] Microsoft Windows CVE-2013-1268 privilege escalation
1801| [81655] Microsoft Windows CVE-2013-1267 privilege escalation
1802| [81654] Microsoft Windows CVE-2013-1266 privilege escalation
1803| [81653] Microsoft Windows CVE-2013-1265 privilege escalation
1804| [81652] Microsoft Windows CVE-2013-1264 privilege escalation
1805| [81651] Microsoft Windows CVE-2013-1263 privilege escalation
1806| [81650] Microsoft Windows CVE-2013-1262 privilege escalation
1807| [81649] Microsoft Windows CVE-2013-1261 privilege escalation
1808| [81648] Microsoft Windows CVE-2013-1260 privilege escalation
1809| [81647] Microsoft Windows CVE-2013-1259 privilege escalation
1810| [81646] Microsoft Windows CVE-2013-1258 privilege escalation
1811| [81645] Microsoft Windows CVE-2013-1257 privilege escalation
1812| [81644] Microsoft Windows CVE-2013-1256 privilege escalation
1813| [81643] Microsoft Windows CVE-2013-1255 privilege escalation
1814| [81642] Microsoft Windows CVE-2013-1254 privilege escalation
1815| [81641] Microsoft Windows CVE-2013-1253 privilege escalation
1816| [81640] Microsoft Windows CVE-2013-1252 privilege escalation
1817| [81639] Microsoft Windows CVE-2013-1251 privilege escalation
1818| [81638] Microsoft Windows CVE-2013-1250 privilege escalation
1819| [81637] Microsoft Windows CVE-2013-1249 privilege escalation
1820| [81636] Microsoft Windows CVE-2013-1248 privilege escalation
1821| [81634] Microsoft Windows Knowledge Base Article 2792100 update is not installed
1822| [81633] Microsoft Internet Explorer CObjectElement code execution
1823| [81631] Microsoft Internet Explorer InsertElement code execution
1824| [81630] Microsoft Internet Explorer SLayoutRun code execution
1825| [81629] Microsoft Internet Explorer pasteHTML code execution
1826| [81628] Microsoft Internet Explorer CDispNode code execution
1827| [81627] Microsoft Internet Explorer LsGetTrailInfo code execution
1828| [81626] Microsoft Internet Explorer vtable code execution
1829| [81625] Microsoft Internet Explorer CMarkup code execution
1830| [81624] Microsoft Internet Explorer COmWindowProxy code execution
1831| [81623] Microsoft Internet Explorer SetCapture code execution
1832| [81622] Microsoft Internet Explorer Shift JIS information disclosure
1833| [81617] Wireshark DTLS dissector denial of service
1834| [81411] tls-extra library for Haskell SSL spoofing
1835| [81339] Microsoft Windows Knowledge Base Article 2799329 update is not installed
1836| [81212] Microsoft Lync User-Agent cross-site scripting
1837| [80918] Microsoft Windows digital certificate spoofing
1838| [80885] Microsoft Internet Explorer CDwnBindInfo code execution
1839| [80875] Microsoft Windows Knowledge Base Article 2756145 update is not installed
1840| [80874] Microsoft Windows XML code execution
1841| [80873] Microsoft Windows XML content code execution
1842| [80872] Microsoft Windows Knowledge Base Article 2769324 update is not installed
1843| [80871] Microsoft .NET Framework permission privilege escalation
1844| [80870] Microsoft .NET Framework S.D.S.P. privilege escalation
1845| [80869] Microsoft .NET Framework Windows Forms privilege escalation
1846| [80868] Microsoft .NET Framework information disclosure
1847| [80867] Microsoft Windows Knowledge Base Article 2769327 update is not installed
1848| [80866] Microsoft .NET Framework OData denial of service
1849| [80865] Microsoft Windows Knowledge Base Article 2769369 update is not installed
1850| [80864] Microsoft Windows print spooler code execution
1851| [80863] Microsoft Windows Knowledge Base Article 2778930 update is not installed
1852| [80862] Microsoft Windows broadcast privilege escalation
1853| [80861] Microsoft Windows Knowledge Base Article 2785220 update is not installed
1854| [80750] Microsoft Internet Explorer denial of service
1855| [80647] Microsoft Internet Explorer cursor information disclosure
1856| [80523] Microsoft Exchange Server RSS feeds denial of service
1857| [80488] radsecproxy DTLS security bypass
1858| [80365] Microsoft Windows Knowledge Base Article 2761465 update is not installed
1859| [80364] Microsoft Internet Explorer improper ref counting code execution
1860| [80363] "Microsoft Internet Explorer CMarkup code execution"
1861| [80362] Microsoft Internet Explorer InjectHTMLStream code execution
1862| [80360] Microsoft Windows Knowledge Base Article 2765809 update is not installed
1863| [80359] Microsoft Windows IPHTTPS security bypass
1864| [80358] Microsoft Windows Knowledge Base Article 2770660 update is not installed
1865| [80357] Microsoft Windows DirectPlay buffer overflow
1866| [80356] Microsoft Windows Knowledge Base Article 2780642 update is not installed
1867| [80355] Microsoft Word RTF code execution
1868| [80352] Microsoft Windows Knowledge Base Article 2783534 update is not installed
1869| [80351] Microsoft Windows TrueType Fonts files code execution
1870| [80350] Microsoft Windows OpenType Font code execution
1871| [80349] Microsoft Windows Knowledge Base Article 2784126 update is not installed
1872| [80310] Microsoft Internet Explorer CHTML code execution
1873| [80149] Microsoft Office OneNote code execution
1874| [79998] Microsoft Excel file code execution
1875| [79997] Microsoft Visio code execution
1876| [79996] Microsoft Publisher code execution
1877| [79990] Microsoft Excel xls code execution
1878| [79749] Microsoft Internet Explorer multiple unspecified code execution
1879| [79748] Microsoft Internet Explorer memory code execution
1880| [79693] Microsoft Windows Knowledge Base Article 2745030 update is not installed
1881| [79692] Microsoft .NET Framework reflection privilege escalation
1882| [79691] Microsoft .NET Framework Web proxy code execution
1883| [79690] Microsoft .NET Framework DLL code execution
1884| [79689] Microsoft .NET Framework output information disclosure
1885| [79688] Microsoft .NET Framework reflection privilege escalation
1886| [79687] Microsoft Windows Knowledge Base Article 2761451 update is not installed
1887| [79686] Microsoft Internet Explorer CTreeNode code execution
1888| [79685] Microsoft Internet Explorer CTreePos code execution
1889| [79684] Microsoft Internet Explorer CFormElement code execution
1890| [79683] Microsoft Windows Knowledge Base Article 2761226 update is not installed
1891| [79682] Microsoft Windows font code execution
1892| [79681] Microsoft Windows kernel privilege escalation
1893| [79680] Microsoft Windows kernel privilege escalation
1894| [79679] Microsoft Windows Knowledge Base Article 2758857 update is not installed
1895| [79678] Microsoft Windows filenames code execution
1896| [79677] Microsoft Windows Knowledge Base Article 2727528 update is not installed
1897| [79676] Microsoft Windows Briefcase integer overflow
1898| [79675] Microsoft Windows Briefcase integer underflow
1899| [79674] Microsoft Excel data structure buffer overflow
1900| [79651] Microsoft Paint .bmp denial of service
1901| [79650] Microsoft Excel code execution
1902| [79649] Microsoft Office Publisher denial of service
1903| [79648] Microsoft Windows Help Viewer denial of service
1904| [79614] Microsoft Internet Explorer scrollIntoView code execution
1905| [79599] Microsoft Office Picture Manager code execution
1906| [79590] Microsoft Word .doc buffer overflow
1907| [79552] ssmtp TLS certificate spoofing
1908| [79492] Microsoft Internet Explorer filter cross-site scripting
1909| [79479] Microsoft Windows Media Player .avi denial of service
1910| [79251] Microsoft Internet Explorer CPasteCommand code execution
1911| [79231] EMC NetWorker Module for Microsoft Applications (NMM) administrator credential disclosure
1912| [79230] EMC NetWorker Module for Microsoft Applications (NMM) communication channel code execution
1913| [79198] Microsoft Excel code execution
1914| [79124] Microsoft Windows IKE privilege escalation
1915| [79104] hostapd EAP-TLS message denial of service
1916| [78864] Microsoft Windows Knowledge Base Article 2754670 update is not installed
1917| [78863] Microsoft Works RTF code execution
1918| [78862] Microsoft Windows Knowledge Base Article 2743555 update is not installed
1919| [78861] Microsoft Windows Kerberos denial of service
1920| [78858] Microsoft Windows Knowledge Base Article 2754849 update is not installed
1921| [78857] Microsoft SQL Server cross-site scripting
1922| [78856] Microsoft Windows Knowledge Base Article 2724197 update is not installed
1923| [78855] Microsoft Windows kernel privilege escalation
1924| [78853] Microsoft Windows Knowledge Base Article 2741517 update is not installed
1925| [78852] Microsoft Lync and Microsoft SharePoint privilege escalation
1926| [78851] Microsoft Windows Knowledge Base Article 2742319 update is not installed
1927| [78850] Microsoft Office RTF fiiles code execution
1928| [78849] Microsoft Word PAPX code execution
1929| [78848] Microsoft Windows Knowledge Base Article 2742321 update is not installed
1930| [78807] TLS protocol information disclosure
1931| [78804] SPDY TLS encrypted data information disclosure
1932| [78760] Microsoft Windows Knowledge Base Article 2744842 update is not installed
1933| [78759] Microsoft Internet Explorer cloneNode() code execution
1934| [78758] Microsoft Internet Explorer Layout object code execution
1935| [78757] Microsoft Internet Explorer Event Listener code execution
1936| [78756] Microsoft Internet Explorer onMove() code execution
1937| [78672] Cisco IOS SSL VPN DTLS enabled denial of service
1938| [78670] Cisco IOS SSL VPN DTLS denial of service
1939| [78620] Microsoft Windows Phone 7 domain name spoofing
1940| [78598] Microsoft Internet Explorer use-after-free code execution
1941| [78408] FreeRADIUS cbtls_verify() buffer overflow
1942| [78077] Microsoft Windows Knowledge Base Article 2741528 update is not installed
1943| [78076] Microsoft System Center Configuration Manager cross-site scripting
1944| [78075] Microsoft Windows Knowledge Base Article 2720184 update is not installed
1945| [78074] Microsoft Excel SST Invalid Length code execution
1946| [78073] Microsoft Excel code execution
1947| [78071] Microsoft Windows Knowledge Base Article 2748552 update is not installed
1948| [78070] Microsoft System Center Operations Manager cross-site scripting
1949| [78069] Microsoft System Center Operations Manager cross-site scripting
1950| [77993] Microsoft Indexing Service ActiveX control denial of service
1951| [77919] ISC InterNetNews STARTTLS command execution
1952| [77878] Microsoft MS-CHAP v2 information disclosure
1953| [77512] Microsoft Windows Knowledge Base Article 2740358 update is not installed
1954| [77362] Microsoft Windows Knowledge Base Article 2733918 update is not installed
1955| [77361] Microsoft Visio DXF buffer overflow
1956| [77360] Microsoft Windows Knowledge Base Article 2733829 update is not installed
1957| [77359] Microsoft Internet Information Services FTP information disclosure
1958| [77358] Microsoft Internet Information Services log files information disclosure
1959| [77357] Microsoft Windows Knowledge Base Article 2733594 update is not installed
1960| [77356] Microsoft Windows RAP response packet buffer overflow
1961| [77355] Microsoft Windows RAP response packet buffer overflow
1962| [77354] Microsoft Windows Print Spooler service format string
1963| [77353] Microsoft Windows Remote Administration Protocol denial of service
1964| [77352] Microsoft Windows Knowledge Base Article 2731879 update is not installed
1965| [77351] Microsoft Office CGM code execution
1966| [77350] Microsoft Windows Knowledge Base Article 2731847 update is not installed
1967| [77349] Microsoft Windows memory privilege escalation
1968| [77348] Microsoft Windows Knowledge Base Article 2723135 update is not installed
1969| [77347] Microsoft Windows Remote Desktop Protocol code execution
1970| [77346] Microsoft Windows Knowledge Base Article 2722913 update is not installed
1971| [77345] Microsoft Internet Explorer virtual function table code execution
1972| [77344] Microsoft Internet Explorer null object code execution
1973| [77343] Microsoft Internet Explorer layout memory code execution
1974| [77342] Microsoft Windows Knowledge Base Article 2720573 update is not installed
1975| [77341] Microsoft Windows ActiveX control code execution
1976| [77325] Microsoft Windows Knowledge Base Article 2719584 update is not installed
1977| [77324] Microsoft Visual Studio Team Foundation Server cross-site scripting
1978| [77323] Microsoft Windows Knowledge Base Article 2706045 update is not installed
1979| [77322] Microsoft Windows VBScript and JScript and Microsoft Internet Explorer object integer overflow
1980| [77244] nginx and Microsoft Windows request security bypass
1981| [76808] Microsoft Windows Knowledge Base Article 2721015 update is not installed
1982| [76807] Microsoft Office for Mac privilege escalation
1983| [76743] Microsoft .NET Framework tilde denial of service
1984| [76725] Microsoft Windows Knowledge Base Article 2722479 update is not installed
1985| [76724] Microsoft Windows Knowledge Base Article 2719177 update is not installed
1986| [76723] Microsoft Internet Explorer attribute code execution
1987| [76722] Microsoft Internet Explorer cached code execution
1988| [76721] Microsoft Windows Knowledge Base Article 2718523 update is not installed
1989| [76720] Microsoft Windows hook procedure privilege escalation
1990| [76719] Microsoft Windows keyboard privilege escalation
1991| [76718] Microsoft Windows Knowledge Base Article 2698365 update is not installed
1992| [76717] Microsoft Data Access Components XML code execution
1993| [76716] Microsoft IIS FTP denial of service
1994| [76711] Microsoft Windows Knowledge Base Article 2695502 update is not installed
1995| [76710] Microsoft SharePoint JavaScript cross-site scripting
1996| [76709] Microsoft SharePoint URL spoofing
1997| [76708] Microsoft SharePoint JavaScript cross-site scripting
1998| [76707] Microsoft Windows search scopes information disclosure
1999| [76706] Microsoft SharePoint scriptresx.ashx cross-site scripting
2000| [76704] Microsoft Windows Knowledge Base Article 2691442 update is not installed
2001| [76703] Microsoft Windows file code execution
2002| [76702] Microsoft Windows Knowledge Base Article 2655992 update is not installed
2003| [76664] Microsoft IIS tilde information disclosure
2004| [76223] Microsoft Windows .otf denial of service
2005| [76221] Microsoft Windows XML Core Services code execution
2006| [76185] Microsoft Internet Information Server ASPX information disclosure
2007| [76184] Microsoft Internet Information Server INDEX_ALLOCATION security bypass
2008| [76183] Microsoft Internet Information Server INDEX_ALLOCATION security bypass
2009| [76182] Microsoft Internet Information Server request security bypass
2010| [76026] Microsoft Windows Microsoft Certificate Authority spoofing
2011| [75996] Multiple IBM products GSKit SSL/TLS record layer processing denial of service
2012| [75977] Microsoft WordPad .doc denial of service
2013| [75963] Microsoft Windows Knowledge Base Article 2699988 update is not installed
2014| [75962] Microsoft Internet Explorer Scrolling Events information disclosure
2015| [75961] Microsoft Internet Explorer OnRowsInserted Event code execution
2016| [75960] Microsoft Internet Explorer insertRow code execution
2017| [75959] Microsoft Internet Explorer insertAdjacentText code execution
2018| [75958] Microsoft Internet Explorer OnBeforeDeactivate Event code execution
2019| [75957] Microsoft Internet Explorer Title Element Change code execution
2020| [75956] Microsoft Internet Explorer Col Element code execution
2021| [75955] Microsoft Internet Explorer same id property code execution
2022| [75954] Microsoft Internet Explorer Developer Toolbar code execution
2023| [75953] Microsoft Internet Explorer process memory information disclosure
2024| [75952] Microsoft Internet Explorer EUC-JP character information disclosure
2025| [75950] Microsoft Internet Explorer Center Element code execution
2026| [75949] Microsoft Windows Knowledge Base Article 2707960 update is not installed
2027| [75948] Microsoft Visual Basic for Applications DLL code execution
2028| [75942] Microsoft Windows Knowledge Base Article 2706726 update is not installed
2029| [75941] Microsoft .NET Framework function code execution
2030| [75939] Microsoft Windows Knowledge Base Article 2685939 update is not installed
2031| [75938] Microsoft Windows RDP code execution
2032| [75934] Microsoft Windows Knowledge Base Article 2709162 update is not installed
2033| [75933] Microsoft Windows thread privilege escalation
2034| [75932] Microsoft Windows font privilege escalation
2035| [75931] "Microsoft Windows Clipboard Format Atom Name privilege escalation"
2036| [75930] Microsoft Windows String Atom Class Name privilege escalation
2037| [75929] Microsoft Windows String Atom Class Name privilege escalation
2038| [75928] Microsoft Windows Knowledge Base Article 2711167 update is not installed
2039| [75927] Microsoft Windows User Mode Scheduler privilege escalation
2040| [75926] Microsoft Windows Knowledge Base Article 2709100 update is not installed
2041| [75925] Microsoft Dynamics AX Enterprise Portal cross-site scripting
2042| [75905] Microsoft Windows Knowledge Base Article 2707956 update is not installed
2043| [75904] Microsoft Lync HTML information disclosure
2044| [75903] Microsoft Lync DLL code execution
2045| [75772] Microsoft Windows keyboard layout privilege escalation
2046| [75525] OpenSSL TLS record denial of service
2047| [75329] Microsoft Windows xxxCreateWindowEx() denial of service
2048| [75163] Microsoft Visual Studio linker buffer overflow
2049| [75140] Microsoft Windows scrollbar calculation privilege escalation
2050| [75139] Microsoft Windows Keyboard Layout files privilege escalation
2051| [75138] Microsoft Windows messages privilege escalation
2052| [75136] Microsoft Windows Knowledge Base Article 2693777 update is not installed
2053| [75135] Microsoft Silverlight XAML code execution
2054| [75134] Microsoft .NET Framework index denial of service
2055| [75133] Microsoft .NET Framework buffer code execution
2056| [75132] Microsoft Windows Knowledge Base Article 2690533 update is not installed
2057| [75131] Microsoft Windows Plug and Play (PnP) privilege escalation
2058| [75130] Microsoft Windows Knowledge Base Article 2688338 update is not installed
2059| [75129] Microsoft Windows IPv6 address privilege escalation
2060| [75128] Microsoft Windows broadcast packets security bypass
2061| [75127] Microsoft Windows Knowledge Base Article 2681578 update is not installed
2062| [75126] Microsoft Windows GDI+ EMF buffer overflow
2063| [75125] Microsoft Windows GDI+ EMF code execution
2064| [75124] Microsoft Windows TrueType code execution
2065| [75123] Microsoft Windows Knowledge Base Article 2680352 update is not installed
2066| [75122] Microsoft Office RTF code execution
2067| [75119] Microsoft Excel series record code execution
2068| [75118] Microsoft Excel MergeCells buffer overflow
2069| [75117] Microsoft Excel SXLI code execution
2070| [75116] Microsoft Windows Knowledge Base Article 2597981 update is not installed
2071| [75115] Microsoft Visio Viewer memory code execution
2072| [75098] Microsoft .NET Framework EncoderParameter buffer overflow
2073| [74556] Microsoft Windows Knowledge Base Article 2639185 update is not installed
2074| [74555] Microsoft Office WPS Converter buffer overflow
2075| [74384] Microsoft Windows Knowledge Base Article 2675157 update is not installed
2076| [74383] Microsoft Internet Explorer VML code execution
2077| [74382] Microsoft Internet Explorer SelectAll code execution
2078| [74381] "Microsoft Internet Explorer OnReadyStateChange code execution"
2079| [74380] Microsoft Internet Explorer JScript9 code execution
2080| [74379] Microsoft Internet Explorer HTML page code execution
2081| [74378] Microsoft Windows Knowledge Base Article 2671605 update is not installed
2082| [74377] Microsoft .NET Framework parameter code execution
2083| [74376] Microsoft .NET Framework input code execution
2084| [74375] Microsoft .NET Framework serialization code execution
2085| [74373] Microsoft Windows Knowledge Base Article 2664258 update is not installed
2086| [74372] Microsoft Windows MSCOMCTL.OCX ActiveX control code execution
2087| [74369] Microsoft Windows Knowledge Base Article 2663860 update is not installed
2088| [74368] Microsoft Forefront Unified Access Gateway information disclosure
2089| [74367] Microsoft Forefront Unified Access Gateway spoofing
2090| [74167] GnuTLS record denial of service
2091| [74166] GnuTLS libtasn1 code execution
2092| [74165] Aruba Mobility Controller EAP-TLS 802.1X security bypass
2093| [74099] GnuTLS libgnutls certificate list denial of service
2094| [73870] Microsoft Internet Explorer Protected Mode denial of service
2095| [73869] Microsoft Internet Explorer unspecified buffer overflow
2096| [73543] Microsoft Windows Knowledge Base Article 2671387 update is not installed
2097| [73542] Microsoft Windows Remote Desktop Protocol denial of service
2098| [73541] Microsoft Windows Remote Desktop Protocol code execution
2099| [73540] Microsoft Windows Knowledge Base Article 2665364 update is not installed
2100| [73539] Microsoft DirectWrite denial of service
2101| [73538] Microsoft Windows Knowledge Base Article 2651019 update is not installed
2102| [73537] Microsoft Visual Studio privilege escalation
2103| [73536] Microsoft Windows Knowledge Base Article 2651018 update is not installed
2104| [73535] Microsoft Expression Design code execution
2105| [73533] Microsoft Windows Knowledge Base Article 2647170 update is not installed
2106| [73532] Microsoft Windows DNS Server denial of service
2107| [73530] Microsoft Windows Knowledge Base Article 2641653 update is not installed
2108| [73529] Microsoft Windows PostMessage function privilege escalation
2109| [73356] Microsoft Windows DNS security bypass
2110| [73029] Microsoft Internet Explorer BODY denial of service
2111| [72950] Microsoft Windows IPv6 information disclosure
2112| [72887] Microsoft Windows Knowledge Base Article 2663841 update is not installed
2113| [72886] Microsoft SharePoint wizardlist.aspx cross-site scripting
2114| [72885] Microsoft SharePoint themeweb.aspx cross-site scripting
2115| [72884] Microsoft SharePoint inplview.aspx cross-site scripting
2116| [72873] Microsoft Windows Knowledge Base Article 2663830 update is not installed
2117| [72872] Microsoft Excel bytes code execution
2118| [72871] Microsoft Excel OBJECTLINK record code execution
2119| [72870] Microsoft Excel file code execution
2120| [72867] Microsoft Windows Knowledge Base Article 2663510 update is not installed
2121| [72864] Microsoft Visio attributes code execution
2122| [72863] Microsoft Visio code execution
2123| [72862] Microsoft Visio Viewer code execution
2124| [72861] Microsoft Visio attributes code execution
2125| [72860] Microsoft Visio Viewer code execution
2126| [72857] Microsoft Windows Knowledge Base Article 2661637 update is not installed
2127| [72855] Microsoft Windows Knowledge Base Article 2660465 update is not installed
2128| [72854] Microsoft Windows keyboard privilege escalation
2129| [72853] Microsoft Windows Knowledge Base Article 2653956 update is not installed
2130| [72852] Microsoft Windows Authenticode code execution
2131| [72851] Microsoft Windows Knowledge Base Article 2654428 update is not installed
2132| [72850] Microsoft Windows msvcrt dynamic link library buffer overflow
2133| [72849] Microsoft Windows Knowledge Base Article 2651026 update is not installed
2134| [72848] Microsoft .NET Framework buffer overflow
2135| [72847] Microsoft .NET Framework and Microsoft Silverlight unmanaged objects code execution
2136| [72846] Microsoft Windows Knowledge Base Article 2647516 update is not installed
2137| [72845] Microsoft Internet Explorer VML code execution
2138| [72844] Microsoft Internet Explorer memory information disclosure
2139| [72843] Microsoft Internet Explorer HtmlLayout code execution
2140| [72842] Microsoft Internet Explorer copy and paste information disclosure
2141| [72841] Microsoft Windows Knowledge Base Article 2645640 update is not installed
2142| [72840] Microsoft Windows Ancillary Function Driver privilege escalation
2143| [72839] Microsoft Windows Ancillary Function Driver privilege escalation
2144| [72838] Microsoft Windows Knowledge Base Article 2643719 update is not installed
2145| [72657] TLS Zero Length Record
2146| [72560] Microsoft Windows Media Format ASF invalid stream
2147| [72458] OpenSSL DTLS denial of service
2148| [72346] Microsoft Windows Explorer denial of service
2149| [72201] GnuTLS CBC mode information disclosure
2150| [72120] spamdyke STARTTLS command execution
2151| [72029] Microsoft Windows Knowledge Base Article 2638420 update is not installed
2152| [72028] Microsoft ASP.NET forms authentication open redirect
2153| [72027] Microsoft ASP.NET forms authentication security bypass
2154| [72026] Microsoft ASP.NET forms authentication ticket caching privilege escalation
2155| [72003] Microsoft Windows Knowledge Base Article 2646524 update is not installed
2156| [72002] Microsoft Windows Client/Server Run-time Subsystem Unicode privilege escalation
2157| [71998] Microsoft Windows Knowledge Base Article 2644615 update is not installed
2158| [71997] Microsoft Windows SafeSEH security bypass
2159| [71995] Microsoft Windows Knowledge Base Article 2643584 update is not installed
2160| [71994] Microsoft Windows Knowledge Base Article 2636391 update is not installed
2161| [71993] Microsoft Windows DirectShow code execution
2162| [71992] Microsoft Windows Media Player MIDI code execution
2163| [71991] Microsoft Windows Knowledge Base Article 2607664 update is not installed
2164| [71990] Microsoft Anti-Cross Site Scripting Library security bypass
2165| [71989] Microsoft ASP.NET CaseInsensitiveHashProvider.getHashCode() function denial of service
2166| [71966] Microsoft Windows Media Player access denial of service
2167| [71944] Microsoft Windows Phone messages denial of service
2168| [71873] Microsoft Windows win32k.sys code execution
2169| [71817] Microsoft Internet Explorer CSS information disclosure
2170| [71813] Microsoft Internet Explorer getComputedStyle information disclosure
2171| [71808] Microsoft .NET Framework SaveAs() security bypass
2172| [71733] Microsoft Windows sandbox privilege escalation
2173| [71635] Microsoft Internet Explorer cache objects information disclosure
2174| [71565] Microsoft Windows Knowledge Base Article 2648048 update is not installed
2175| [71564] Microsoft Windows Media Player DVR-MS code execution
2176| [71562] Microsoft Windows Knowledge Base Article 2640241 update is not installed
2177| [71561] Microsoft Excel record memory code execution
2178| [71560] Microsoft Windows Knowledge Base Article 2640045 update is not installed
2179| [71559] Microsoft Windows Active Directory buffer overflow
2180| [71558] Microsoft Windows Knowledge Base Article 2639417 update is not installed
2181| [71557] Microsoft Windows Knowledge Base Article 2639142 update is not installed
2182| [71556] Microsoft PowerPoint record code execution
2183| [71555] Microsoft PowerPoint DLL code execution
2184| [71554] Microsoft Windows Knowledge Base Article 2633171 update is not installed
2185| [71553] Microsoft Windows kernel privilege escalation
2186| [71552] Microsoft Windows Knowledge Base Article 2624667 update is not installed
2187| [71551] Microsoft Windows OLE object code execution
2188| [71550] Microsoft Windows Knowledge Base Article 2620712 update is not installed
2189| [71549] Microsoft Windows Client/Server Run-time Subsystem Csrsrv.dll privilege escalation
2190| [71548] Microsoft Windows Knowledge Base Article 2618451 update is not installed
2191| [71547] Microsoft Time binary code execution
2192| [71546] Microsoft Windows Knowledge Base Article 2618444 update is not installed
2193| [71545] Microsoft Internet Explorer Content-Disposition information disclosure
2194| [71544] Microsoft Internet Explorer HTML DLL code execution
2195| [71543] Microsoft Internet Explorer cross-site scripting filter information disclosure
2196| [71542] Microsoft Windows Knowledge Base Article 2607702 update is not installed
2197| [71541] Microsoft Publisher memory code execution
2198| [71540] Microsoft Publisher pointer code execution
2199| [71539] Microsoft Publisher out-of-bounds code execution
2200| [71538] Microsoft Windows Knowledge Base Article 2590602 update is not installed
2201| [71537] Microsoft Word memory code execution
2202| [71418] Microsoft Windows keyboard layout denial of service
2203| [71291] Microsoft Windows Server AppLocker security bypass
2204| [71227] GnuTLS gnutls_session_get_data() buffer overflow
2205| [71117] Microsoft Excel vbscript macro code execution
2206| [71073] Microsoft Windows kernel Duqu code execution
2207| [71068] Transport Layer Security (TLS) protocol SSL negotiation handshake denial of service
2208| [71022] Tor TLS certificate information disclosure
2209| [70951] Microsoft Windows Knowledge Base Article 2630837 update is not installed
2210| [70950] Microsoft Windows Active Directory privilege escalation
2211| [70949] Microsoft Windows Knowledge Base Article 2620704 update is not installed
2212| [70948] Microsoft Windows Mail and Windows Meeting Space code execution
2213| [70947] Microsoft Windows Knowledge Base Article 2617657 update is not installed
2214| [70946] Microsoft Windows TrueType denial of service
2215| [70945] Microsoft Windows Knowledge Base Article 2603381 update is not installed
2216| [70944] Microsoft Windows Object Packager code execution
2217| [70943] Microsoft Windows Knowledge Base Article 2588516 update is not installed
2218| [70942] Microsoft Windows TCP/IP code execution
2219| [70940] Microsoft Windows ClickOnce code execution
2220| [70565] Microsoft Publisher pubconv.dll buffer overflow
2221| [70337] OpenOffice.org Microsoft Word .doc sprm file parser denial of service
2222| [70152] Microsoft Windows Knowledge Base Article 2623699 update is not installed
2223| [70150] Microsoft Windows Knowledge Base Article 2607670 update is not installed
2224| [70148] Microsoft Host Integration Server UDP denial of service
2225| [70143] Microsoft Windows Media Center DLL code execution
2226| [70140] Microsoft Windows Knowledge Base Article 2652016 update is not installed
2227| [70139] Microsoft Office IME privilege escalation
2228| [70137] Microsoft Windows Ancillary Function Driver privilege escalation
2229| [70130] Microsoft Windows Knowledge Base Article 2586448 update is not installed
2230| [70128] Microsoft Internet Explorer Body Element code execution
2231| [70126] "Microsoft Internet Explorer Jscript9.dll code execution"
2232| [70125] Microsoft Internet Explorer Onload Event code execution
2233| [70124] Microsoft Internet Explorer Option Element code execution
2234| [70123] "Microsoft Internet Explorer OLEAuto32.dll code execution"
2235| [70122] Microsoft Internet Explorer Scroll Event code execution
2236| [70115] Microsoft Windows Knowledge Base Article 2567053 update is not installed
2237| [70114] Microsoft Windows use-after-free privilege escalation
2238| [70113] Microsoft Windows .fon buffer overflow
2239| [70112] Microsoft Windows TrueType denial of service
2240| [70107] Microsoft Forefront Unified Access Gateway NULL denial of service
2241| [70106] Microsoft Forefront Unified Access Gateway applet code execution
2242| [70105] Microsoft Forefront Unified Access Gateway cross-site scripting
2243| [70104] Microsoft Forefront Unified Access Gateway ExcelTable cross-site scripting
2244| [70103] Microsoft Forefront Unified Access Gateway ExcelTable response splitting
2245| [69826] Microsoft SharePoint Server Source open redirect
2246| [69638] Microsoft Windows csrss.exe denial of service
2247| [69558] Microsoft Windows Script Host DLL code execution
2248| [69501] Microsoft Windows Knowledge Base Article 2587634 update is not installed
2249| [69500] Microsoft Office object pointer code execution
2250| [69499] Microsoft Office DLL code execution
2251| [69498] Microsoft Windows Knowledge Base Article 2587505 update is not installed
2252| [69497] Microsoft Excel integer code execution
2253| [69496] Microsoft Excel expression code execution
2254| [69495] Microsoft Excel records code execution
2255| [69494] Microsoft Excel array code execution
2256| [69493] Microsoft Excel WriteAV code execution
2257| [69492] Microsoft Windows Knowledge Base Article 2571621 update is not installed
2258| [69491] Microsoft Windows WINS privilege escalation
2259| [69490] Microsoft Windows Knowledge Base Article 2570947 update is not installed
2260| [69489] Microsoft Windows components DLL code execution
2261| [69344] Microsoft compound document detected
2262| [69293] Microsoft Internet Explorer HTTPS security bypass
2263| [69215] Microsoft Windows DHCPv6 denial of service
2264| [69214] Microsoft Internet Explorer Iedvtool.dll denial of service
2265| [69009] Microsoft Windows Client/Server Run-time Subsystem information disclosure
2266| [68840] Microsoft Windows Knowledge Base Article 2451858 update is not installed
2267| [68838] Microsoft SharePoint and Windows SharePoint Services cross-site scripting
2268| [68837] Microsoft SharePoint and Windows SharePoint Services XML file disclosure
2269| [68836] Microsoft SharePoint and Windows SharePoint Services contact details cross-site scripting
2270| [68835] Microsoft SharePoint EditForm.aspx cross-site scripting
2271| [68834] Microsoft SharePoint cross-site scripting
2272| [68833] Microsoft Windows Knowledge Base Article 2567943 update is not installed
2273| [68832] Microsoft Chart control information disclosure
2274| [68831] Microsoft Windows Knowledge Base Article 2570222 update is not installed
2275| [68830] Microsoft Windows Remote Desktop Protocol denial of service
2276| [68829] Microsoft Windows Knowledge Base Article 2567951 update is not installed
2277| [68828] Microsoft .NET Framework socket information disclosure
2278| [68827] Microsoft Windows Knowledge Base Article 2578230 update is not installed
2279| [68826] Microsoft Report Viewer information disclosure
2280| [68825] Microsoft Windows Knowledge Base Article 2546250 update is not installed
2281| [68824] Microsoft Windows Remote Desktop Web Access privilege escalation
2282| [68823] Microsoft Windows Knowledge Base Article 2559049 update is not installed
2283| [68822] Microsoft Internet Explorer style code execution
2284| [68821] Microsoft Internet Explorer xslt code execution
2285| [68820] Microsoft Internet Explorer character sequences information
2286| [68819] Microsoft Internet Explorer telnet URI code execution
2287| [68818] Microsoft Internet Explorer event handlers information disclosure
2288| [68817] Microsoft Internet Explorer race condition code execution
2289| [68816] Microsoft Windows Knowledge Base Article 2556532 update is not installed
2290| [68815] Microsoft Windows kernel meta-data denial of service
2291| [68814] Microsoft Windows Knowledge Base Article 2560656 update is not installed
2292| [68813] Microsoft Windows Data Access code execution
2293| [68812] Microsoft Windows Knowledge Base Article 2560978 update is not installed
2294| [68811] Microsoft Visio pStream code execution
2295| [68810] Microsoft Visio Move Around the Block code execution
2296| [68809] Microsoft Windows Knowledge Base Article 2562485 update is not installed
2297| [68808] Microsoft Windows DNS Server denial of service
2298| [68807] Microsoft Windows DNS Server code execution
2299| [68806] Microsoft Windows Knowledge Base Article 2566454 update is not installed
2300| [68805] Microsoft Windows NDISTAPI privilege escalation
2301| [68804] Microsoft Windows Knowledge Base Article 2563894 update is not installed
2302| [68803] Microsoft Windows TCP/IP QoS denial of service
2303| [68802] Microsoft Windows TCP/IP ICMP denial of service
2304| [68801] Microsoft Windows Knowledge Base Article 2567680 update is not installed
2305| [68800] Microsoft Windows Client/Server Run-time Subsystem Winsrv.dl privilege escalation
2306| [68786] Microsoft Internet Explorer EUC-JP cross-site scripting
2307| [68498] Microsoft Internet Explorer memory layout information disclosure
2308| [68469] Microsoft Windows GPU denial of service
2309| [68467] Microsoft Windows NVIDIA Geforce 310 denial of service
2310| [68465] Microsoft Windows Intel G41 denial of service
2311| [68368] Ingate Firewall and SIParator TLS denal of service
2312| [68315] Microsoft Windows Knowledge Base Article 2555917 update is not installed
2313| [68314] Microsoft Windows win32k.sys privilege escalation
2314| [68313] Microsoft Windows win32k.sys privilege escalation
2315| [68312] Microsoft Windows win32k.sys information disclosure
2316| [68311] Microsoft Windows NULL privilege escalation
2317| [68310] Microsoft Windows win32k.sys privilege escalation
2318| [68309] Microsoft Windows win32k.sys privilege escalation
2319| [68308] Microsoft Windows win32k.sys privilege escalation
2320| [68307] Microsoft Windows NULL pointer privilege escalation
2321| [68306] Microsoft Windows NULL pointer privilege escalation
2322| [68305] Microsoft Windows kernel-mode driver privilege escalation
2323| [68304] Microsoft Windows kernel-mode driver privilege escalation
2324| [68303] Microsoft Windows kernel-mode driver privilege escalation
2325| [68302] Microsoft Windows win32k.sys privilege escalation
2326| [68301] Microsoft Windows win32k.sys privilege escalation
2327| [68300] Microsoft Windows win32k.sys privilege escalation
2328| [68299] Microsoft Windows Knowledge Base Article 2566220 update is not installed
2329| [68298] Microsoft Windows Bluetooth stack code execution
2330| [68283] Microsoft Windows Knowledge Base Article 2560847 update is not installed
2331| [68226] Apple Mac OS X QuickLook Microsoft Office files code execution
2332| [68024] Microsoft Office XP remote code execution
2333| [68007] Microsoft Word wdGetApplicationObject() code execution
2334| [68002] Microsoft Windows Media Player klite denial of service
2335| [67991] Microsoft Lync Server ReachJoin.aspx command execution
2336| [67989] Microsoft Windows tskill privilege escalation
2337| [67955] Microsoft Windows Knowledge Base Article 2530548 update is not installed
2338| [67954] Microsoft Internet Explorer HTTP redirect code execution
2339| [67953] Microsoft Internet Explorer selection object code execution
2340| [67952] Microsoft Internet Explorer layout code execution
2341| [67951] Microsoft Internet Explorer drag and drop information disclosure
2342| [67950] Microsoft Internet Explorer DOM code execution
2343| [67949] Microsoft Internet Explorer time element code execution
2344| [67948] Microsoft Internet Explorer drag and drop code execution
2345| [67947] Microsoft Internet Explorer toStaticHTML API information disclosure
2346| [67946] Microsoft Internet Explorer DOM code execution
2347| [67945] Microsoft Internet Explorer link properties code execution
2348| [67944] Microsoft Internet Explorer Web pages information disclosure
2349| [67943] Microsoft Windows Knowledge Base Article 2544521 update is not installed
2350| [67942] Microsoft Windows Vector Markup Language (VML) code execution
2351| [67890] Microsoft Internet Explorer cross-zone drag-and-drop information disclosure
2352| [67867] Cyrus IMAP Server STARTTLS command execution
2353| [67795] Microsoft Windows Live Messenger dwmapi.dll code execution
2354| [67762] Microsoft Windows Knowledge Base Article 2543893 update is not installed
2355| [67761] Microsoft XML Editor Web Service Discovery information disclosure
2356| [67759] Microsoft Windows Knowledge Base Article 2544893 update is not installed
2357| [67758] Microsoft Windows MHTML information disclosure
2358| [67757] Microsoft Windows Knowledge Base Article 2476490 update is not installed
2359| [67756] Microsoft Windows Object Linking and Embedding WMF code execution
2360| [67755] Microsoft Windows Knowledge Base Article 2503665 update is not installed
2361| [67754] Microsoft Windows Ancillary Function Driver privilege escalation
2362| [67753] Microsoft Windows Knowledge Base Article 2514842 update is not installed
2363| [67752] Microsoft .NET Framework and Microsoft Silverlight XAML code execution
2364| [67751] Microsoft Windows Knowledge Base Article 2518295 update is not installed
2365| [67750] Microsoft Windows Active Directory Certificate Services Web Enrollment cross-site scripting
2366| [67749] Microsoft Windows Knowledge Base Article 2507938 update is not installed
2367| [67748] Microsoft Windows SrvWriteConsoleOutputString privilege escalation
2368| [67747] Microsoft Windows SrvWriteConsoleOutput privilege escalation
2369| [67746] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand privilege escalation
2370| [67745] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC privilege escalation
2371| [67744] Microsoft Windows CSRSS AllocConsole privilege escalation
2372| [67737] Microsoft Windows Knowledge Base Article 2520426 update is not installed
2373| [67736] Microsoft Forefront Threat Management Gateway TMG Firewall Client buffer overflow
2374| [67733] Microsoft Windows Knowledge Base Article 2525694 update is not installed
2375| [67732] Microsoft Windows Win32k OTF code execution
2376| [67731] Microsoft Windows Knowledge Base Article 2525835 update is not installed
2377| [67730] Microsoft Windows Server Hyper-V VMBus denial of service
2378| [67729] WatchGuard XCS STARTTLS command execution
2379| [67728] Microsoft Windows Knowledge Base Article 2535512 update is not installed
2380| [67727] Microsoft Windows DFS denial of service
2381| [67726] Microsoft Windows DFS code execution
2382| [67725] Microsoft Windows Knowledge Base Article 2536275 update is not installed
2383| [67724] Microsoft Windows SMB request denial of service
2384| [67722] Microsoft Windows Knowledge Base Article 2536276 update is not installed
2385| [67721] Microsoft Windows SMB responses code execution
2386| [67718] Microsoft Windows Knowledge Base Article 2537146 update is not installed
2387| [67717] Microsoft Excel WriteAV code execution
2388| [67716] Microsoft Excel WriteAV code execution
2389| [67715] Microsoft Excel information code execution
2390| [67714] Microsoft Excel record information buffer overflow
2391| [67713] Microsoft Excel record buffer overflow
2392| [67712] Microsoft Excel array code execution
2393| [67711] Microsoft Excel information code execution
2394| [67710] Microsoft Excel Excel record code execution
2395| [67709] Microsoft Windows Knowledge Base Article 2538814 update is not installed
2396| [67700] Fetchmail STARTTLS denial of service
2397| [67520] Microsoft Windows Vista nsiproxy.sys denial of service
2398| [67411] Microsoft .NET Framework JIT compiler code execution
2399| [67302] Microsoft Windows Knowledge Base Article 2545814 update is not installed
2400| [67301] Microsoft PowerPoint presentation code execution
2401| [67300] Microsoft PowerPoint presentation code execution
2402| [67101] Microsoft Windows Knowledge Base Article 2524426 update is not installed
2403| [67100] Microsoft Windows Windows Internet Name Service code execution
2404| [66991] Microsoft Internet Explorer CSS address bar spoofing
2405| [66856] Microsoft Windows Media Player .avi buffer overflow
2406| [66855] Microsoft Windows Media Player .ogg denial of service
2407| [66845] Microsoft Windows Knowledge Base Article 2506014 update is not installed
2408| [66844] Microsoft Windows Knowledge Base Article 2501584 update is not installed
2409| [66835] Microsoft Windows and Internet Explorer msxml.dll information disclosure
2410| [66729] Microsoft HTML Help CHM buffer overflow
2411| [66710] Microsoft Reader aud_file.dll code execution
2412| [66709] Microsoft Reader eBook buffer overflow
2413| [66708] Microsoft Reader msreader.exe buffer overflow
2414| [66639] Microsoft Windows XP afd.sys denial of service
2415| [66544] A Microsoft FAX cover sheet has been detected
2416| [66469] Microsoft Windows Explorer Shmedia.dll denial of service
2417| [66448] Microsoft Windows Knowledge Base Article 2508272 update is not installed
2418| [66447] Microsoft Windows Messenger ActiveX control code execution
2419| [66446] Microsoft Windows Knowledge Base Article 2514666 update is not installed
2420| [66445] Microsoft Windows VBScript and Jscript code execution
2421| [66444] Microsoft Windows Knowledge Base Article 2511455 update is not installed
2422| [66443] Microsoft Windows SMB response code execution
2423| [66442] Microsoft Windows Knowledge Base Article 2509553 update is not installed
2424| [66441] Microsoft Windows DNS resolution code execution
2425| [66440] Microsoft Windows Knowledge Base Article 2508429 update is not installed
2426| [66439] Microsoft Windows SMB protocol code execution
2427| [66438] Microsoft Windows Knowledge Base Article 2507618 update is not installed
2428| [66437] Microsoft Windows OpenType buffer overflow
2429| [66436] Microsoft Windows Knowledge Base Article 2497640 update is not installed
2430| [66435] Microsoft Internet Explorer Javascript information disclosure
2431| [66434] Microsoft Internet Explorer frame tag information disclosure
2432| [66433] Microsoft Internet Explorer layout code execution
2433| [66432] Microsoft Windows Knowledge Base Article 2527308 update is not installed
2434| [66431] Microsoft Windows Fax Cover Page Editor code execution
2435| [66430] Microsoft Windows Knowledge Base Article 2503658 update is not installed
2436| [66428] Microsoft Windows Knowledge Base Article 2489979 update is not installed
2437| [66427] Microsoft Windows GDI+ EMF code execution
2438| [66426] Microsoft Office DLL code execution
2439| [66425] Microsoft Windows Knowledge Base Article 2506223 update is not installed
2440| [66424] Microsoft Windows kernel-mode driver (win32k.sys) variant 30 privilege escalation
2441| [66423] Microsoft Windows kernel-mode driver (win32k.sys) variant 29 privilege escalation
2442| [66422] Microsoft Windows kernel-mode driver (win32k.sys) variant 28 privilege escalation
2443| [66421] Microsoft Windows kernel-mode driver (win32k.sys) variant 27 privilege escalation
2444| [66420] Microsoft Windows kernel-mode driver (win32k.sys) variant 26 privilege escalation
2445| [66419] Microsoft Windows kernel-mode driver (win32k.sys) variant 25 privilege escalation
2446| [66418] Microsoft Windows kernel-mode driver (win32k.sys) variant 24 privilege escalation
2447| [66417] Microsoft Windows kernel-mode driver (win32k.sys) variant 23 privilege escalation
2448| [66416] Microsoft Windows kernel-mode driver (win32k.sys) variant 22 privilege escalation
2449| [66415] Microsoft Windows kernel-mode driver (win32k.sys) variant 21 privilege escalation
2450| [66414] Microsoft Windows kernel-mode driver (win32k.sys) variant 20 privilege escalation
2451| [66413] Microsoft Windows kernel-mode driver (win32k.sys) variant 19 privilege escalation
2452| [66412] Microsoft Windows kernel-mode driver (win32k.sys) variant 18 privilege escalation
2453| [66411] Microsoft Windows kernel-mode driver (win32k.sys) variant 17 privilege escalation
2454| [66410] Microsoft Windows kernel-mode driver (win32k.sys) variant 16 privilege escalation
2455| [66409] Microsoft Windows kernel-mode driver (win32k.sys) variant 15 privilege escalation
2456| [66408] Microsoft Windows kernel-mode driver (win32k.sys) variant 14 privilege escalation
2457| [66407] Microsoft Windows kernel-mode driver (win32k.sys) variant 13 privilege escalation
2458| [66406] Microsoft Windows kernel-mode driver (win32k.sys) variant 12 privilege escalation
2459| [66405] Microsoft Windows kernel-mode driver (win32k.sys) variant 11 privilege escalation
2460| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
2461| [66403] Microsoft Windows kernel-mode driver (win32k.sys) variant 9 privilege escalation
2462| [66402] Microsoft Windows kernel-mode driver (win32k.sys) variant 8 privilege escalation
2463| [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
2464| [66400] Microsoft Windows kernel-mode driver (win32k.sys) variant 6 privilege escalation
2465| [66399] Microsoft Windows kernel-mode driver (win32k.sys) variant 5 privilege escalation
2466| [66398] Microsoft Windows kernel-mode driver (win32k.sys) variant 4 privilege escalation
2467| [66397] Microsoft Windows kernel-mode driver (win32k.sys) variant 3 privilege escalation
2468| [66396] Microsoft Windows kernel-mode driver (win32k.sys) variant 2 privilege escalation
2469| [66395] Microsoft Windows kernel-mode driver (win32k.sys) variant 1 privilege escalation
2470| [66394] Microsoft Windows Knowledge Base Article 2485663 update is not installed
2471| [66393] Microsoft WordPad code execution
2472| [66312] Microsoft Windows Media Player .ape buffer overflow
2473| [66254] Microsoft Windows certificates spoofing
2474| [66140] Asterisk handle_tcptls_connection() denial of service
2475| [66137] Microsoft Source Code Analyzer for SQL injection privilge escalation
2476| [66064] Microsoft Internet Explorer unspecified code execution
2477| [66063] Microsoft Internet Explorer unspecified code execution
2478| [66062] Microsoft Internet Explorer unspecified code execution
2479| [66025] Microsoft Internet Explorer XSLT information disclosure
2480| [66015] Mutt SMTP TLS certificate weak security
2481| [65972] Microsoft Windows mscorsvw.exe privilege escalation
2482| [65932] Multiple vendors STARTTLS command execution
2483| [65918] Microsoft Internet Explorer address bar spoofing
2484| [65867] Microsoft Visual Studio project file buffer overflow
2485| [65626] Microsoft Malware Protection Engine privilege escalation
2486| [65588] Microsoft Windows Knowledge Base Article 2489279 update is not installed
2487| [65587] Microsoft Excel data code execution
2488| [65586] Microsoft Excel memory record buffer overflow
2489| [65585] Microsoft Excel memory corruption code execution
2490| [65584] Microsoft Excel WriteAV code execution
2491| [65583] Microsoft Excel memory buffer overflow
2492| [65582] Microsoft Excel buffer code execution
2493| [65581] Microsoft Windows Knowledge Base Article 2510030 update is not installed
2494| [65580] Microsoft Windows Knowledge Base Article 2489283 update is not installed
2495| [65579] Microsoft PowerPoint persist directory code execution
2496| [65578] Microsoft PowerPoint Techno-color code execution
2497| [65575] Microsoft Windows Knowledge Base Article 2489293 update is not installed
2498| [65573] Microsoft Windows Knowledge Base Article 2494047 update is not installed
2499| [65572] Microsoft Office Groove DLL code execution
2500| [65570] Microsoft Windows Knowledge Base Article 2500212 update is not installed
2501| [65568] Microsoft Windows Knowledge Base Article 2508062 update is not installed
2502| [65567] Microsoft Windows RDC code execution
2503| [65495] Microsoft Windows HID weak security
2504| [65383] Microsoft Windows Graphics Rendering Engine height integer overflow
2505| [65382] Microsoft Windows Graphics Rendering Engine BMP integer overflow
2506| [65381] Microsoft Windows Graphics Rendering Engine biCompression buffer overflow
2507| [65376] Microsoft Windows Server CIFS code execution
2508| [65192] Microsoft PowerPoint OfficeArt code execution
2509| [65191] Microsoft Office graphic code execution
2510| [65190] Microsoft Excel Axis properties code execution
2511| [65188] Microsoft Excel art object code execution
2512| [65187] Microsoft Excel object code execution
2513| [65169] Microsoft Windows Azure information disclosure
2514| [65096] Aruba Mobility Controller EAP-TLS security bypass
2515| [65000] Microsoft Windows MHTML information disclosure
2516| [64973] Microsoft Windows Knowledge Base Article 2478960 update is not installed
2517| [64972] Microsoft Windows LSASS privilege escalation
2518| [64971] Microsoft Windows Knowledge Base Article 2479628 update is not installed
2519| [64970] Microsoft Windows Win32k.sys privilege escalation
2520| [64969] Microsoft Windows classpointer privilege escalation
2521| [64968] Microsoft Windows pointer privilege escalation
2522| [64967] Microsoft Windows Win32k.sys privilege escalation
2523| [64966] Microsoft Windows Win32k.sys privilege escalation
2524| [64927] Microsoft Windows Knowledge Base Article 2393802 update is not installed
2525| [64926] Microsoft Windows kernel privilege escalation
2526| [64925] Microsoft Windows Knowledge Base Article 2451879 update is not installed
2527| [64924] Microsoft Visio data type code execution
2528| [64923] Microsoft Visio object code execution
2529| [64921] Microsoft Windows Media Player and Windows Media Center DVR-MS code execution
2530| [64920] Microsoft Windows Knowledge Base Article 2475792 update is not installed
2531| [64919] Microsoft Windows VBScript and JScript information disclosure
2532| [64918] Microsoft Windows Knowledge Base Article 2476687 update is not installed
2533| [64917] Microsoft Windows CSRSS privilege escalation
2534| [64916] Microsoft Windows Knowledge Base Article 2478953 update is not installed
2535| [64915] Microsoft Windows Active Directory denial of service
2536| [64914] Microsoft Windows Knowledge Base Article 2482017 update is not installed
2537| [64913] Microsoft Internet Explorer DLL code execution
2538| [64912] Microsoft Internet Explorer code execution
2539| [64911] Microsoft Internet Explorer code execution
2540| [64910] Microsoft Windows Knowledge Base Article 2483185 update is not installed
2541| [64909] Microsoft Windows Knowledge Base Article 2484015 update is not installed
2542| [64908] Microsoft .NET Framework JIT code execution
2543| [64907] Microsoft Windows Knowledge Base Article 2485376 update is not installed
2544| [64906] Microsoft Windows OpenType Compact Font Format code execution
2545| [64905] Microsoft Windows Knowledge Base Article 2489256 update is not installed
2546| [64903] Microsoft DirectShow DLL code execution
2547| [64902] Microsoft Windows Knowledge Base Article 2496930 update is not installed
2548| [64901] Microsoft Windows Kerberos spoofing
2549| [64900] Microsoft Windows Kerberos checksum privilege escalation
2550| [64837] Microsoft Windows Fax Cover Page Editor code execution
2551| [64583] Microsoft Windows Neighbor Discovery (ND) protocol denial of service
2552| [64571] Microsoft Internet Explorer GUI weak security
2553| [64482] Microsoft Internet Explorer ReleaseInterface() code execution
2554| [64474] Microsoft Windows Remote Access Phonebook code execution
2555| [64446] Microsoft Windows Contacts DLL code execution
2556| [64382] Microsoft Windows Graphics Rendering Engine buffer overflow
2557| [64342] Microsoft Windows Knowledge Base Article 2451910 update is not installed
2558| [64341] Microsoft Data Access Components (MDAC) ADO record code execution
2559| [64340] Microsoft Data Access Components (MDAC) ODBC buffer overflow
2560| [64339] Microsoft Windows Knowledge Base Article 2478935 update is not installed
2561| [64307] Microsoft Windows Windows Fax Cover Page Editor component buffer overflow
2562| [64250] Microsoft WMI Administrative Tools ActiveX control (WBEMSingleView.ocx) code execution
2563| [64248] Microsoft Internet Information Services TELNET_STREAM_CONTEXT::OnSendData buffer overflow
2564| [64140] echoping TLS_readline() buffer overflow
2565| [64083] Microsoft Foundation Class DLL code execution
2566| [64037] Desktop dynamic-linked library (schannel.dll) code execution
2567| [63915] Microsoft Data Access Objects (DAO) dynamic-linked library (DLL) code execution
2568| [63913] Orbit Downloader dynamic-linked library (schannel.dll) code execution
2569| [63909] Microsoft Windows dynamic-linked library (oci.dll) code execution
2570| [63866] Microsoft Visio dynamic-linked library (DLL) code execution
2571| [63840] Microsoft Visual C++ 2008 Redistributable Package dynamic-linked library (DLL) code execution
2572| [63816] Microsoft Windows Media Encoder 9 dynamic-linked library (DLL) code execution
2573| [63815] Microsoft Remote Desktop Protocol dynamic-linked library (ieframe.dll) code execution
2574| [63807] Microsoft Windows Mail dynamic-linked library (wab32res.dll) code execution
2575| [63805] Gretech GOM Player dynamic-linked library (schannel.dll) code execution
2576| [63803] Microsoft Windows Live Messenger dynamic-linked library (msgsres.dll) code execution
2577| [63802] Microsoft Visio dynamic-linked library (dwmapi.dll) code execution
2578| [63800] Adobe Flash Player dynamic-linked library (schannel.dll) code execution
2579| [63788] Microsoft Windows Backup dynamic-linked library (fveapi.dll) code execution
2580| [63780] Microsoft PowerPoint 2007 dynamic-linked library (rpawinet.dll) code execution
2581| [63779] Microsoft Windows Indeo Filter dynamic-linked library (iacenc.dll) code execution
2582| [63776] Microsoft Windows Program Group Converter dynamic-linked library (DLL) code execution
2583| [63775] Microsoft Visio 2003 dynamic-linked library (mfc71enu.dll) code execution
2584| [63773] Microsoft Windows Address Book dynamic-linked library (wab32res.dll) code execution
2585| [63749] Microsoft Internet Explorer CSS code execution
2586| [63586] Microsoft Windows Knowledge Base Article 2207559 update is not installed
2587| [63585] Microsoft Windows Netlogon denial of service
2588| [63584] Microsoft Windows Knowledge Base Article 2424434 update is not installed
2589| [63583] Microsoft Windows Movie Maker insecure library loading code execution
2590| [63582] Microsoft Windows Knowledge Base Article 2423089 update is not installed
2591| [63581] Microsoft Address Book insecure library loading code execution
2592| [63580] Microsoft Windows Knowledge Base Article 2436673 update is not installed
2593| [63579] Microsoft Windows user mode privilege escalation
2594| [63578] Microsoft Windows cursor privilege escalation
2595| [63577] Microsoft Windows WriteAV privilege escalation
2596| [63576] Microsoft Windows pointer privilege escalation
2597| [63575] Microsoft Windows double free privilege escalation
2598| [63574] Microsoft Windows kernel-mode drivers buffer overflow
2599| [63573] Microsoft Windows Knowledge Base Article 2407132 update is not installed
2600| [63572] Microsoft Exchange Server RPC denial of service
2601| [63571] Microsoft Windows Knowledge Base Article 2440591 update is not installed
2602| [63570] Microsoft Windows NDProxy buffer overflow
2603| [63569] Microsoft Windows Knowledge Base Article 2385678 update is not installed
2604| [63568] Microsoft Windows BranchCache code execution
2605| [63566] Microsoft Windows Knowledge Base Article 2442962 update is not installed
2606| [63565] Microsoft Windows Consent User Interface privilege escalation
2607| [63564] Microsoft Windows Knowledge Base Article 2345316 update is not installed
2608| [63563] Microsoft Windows Server Hyper-V VMBus denial of service
2609| [63562] Microsoft Windows Knowledge Base Article 2296199 update is not installed
2610| [63561] Microsoft Windows OpenType Font (OTF) CMAP code execution
2611| [63560] Microsoft Windows OpenType Font (OTF) format driver code execution
2612| [63559] Microsoft Windows OpenType Font (OTF) format driver code execution
2613| [63558] Microsoft Windows Knowledge Base Article 2416400 update is not installed
2614| [63557] Microsoft Internet Explorer information disclosure
2615| [63556] Microsoft Internet Explorer element code execution
2616| [63555] Microsoft Internet Explorer HTML element code execution
2617| [63553] Microsoft Internet Explorer object code execution
2618| [63552] Microsoft Internet Explorer script information disclosure
2619| [63551] Microsoft Internet Explorer HTML object code execution
2620| [63550] Microsoft Windows Knowledge Base Article 2447961 update is not installed
2621| [63549] Microsoft Windows Media Encoder code execution
2622| [63548] Microsoft Windows Knowledge Base Article 2443105 update is not installed
2623| [63547] Microsoft Windows Internet Signup code execution
2624| [63546] Microsoft Windows Knowledge Base Article 2455005 update is not installed
2625| [63545] Microsoft Sharepoint SOAP code execution
2626| [63544] Microsoft Windows Knowledge Base Article 2292970 update is not installed
2627| [63543] Microsoft Publisher array indexing memory corruption code execution
2628| [63542] Microsoft Publisher memory corruption code execution
2629| [63541] Microsoft Publisher pubconv.dll code execution
2630| [63540] Microsoft Publisher pubconv.dll buffer overflow
2631| [63539] Microsoft Publisher pubconv.dll code execution
2632| [63538] Microsoft Windows Knowledge Base Article 968095 update is not installed
2633| [63536] Microsoft Office FlashPix code execution
2634| [63535] Microsoft Office FlashPix buffer overflow
2635| [63534] Microsoft Office TIFF image code execution
2636| [63533] Microsoft Office TIFF image files
2637| [63532] Microsoft Office TIFF image buffer overflow
2638| [63531] Microsoft Office PICT code execution
2639| [63530] Microsoft Office CGM Image buffer overflow
2640| [63514] Microsoft Outlook file attachment denial of service
2641| [63450] Microsoft Windows REG_BINARY privilege escalation
2642| [63293] OpenSSL TLS server extension buffer overflow
2643| [62962] Microsoft Internet Explorer invalid flag code execution
2644| [62805] Microsoft Windows Knowledge Base Article 2316074 update is not installed
2645| [62804] Microsoft Forefront Unified Access Gateway Sginurl.asp cross-site scripting
2646| [62803] Microsoft Forefront Unified Access Gateway Mobile Portal cross-site scripting
2647| [62802] Microsoft Forefront Unified Access Gateway Web monitor cross-site scripting
2648| [62801] Microsoft Forefront Unified Access Gateway spoofing
2649| [62797] Microsoft Windows Knowledge Base Article 2305420 update is not installed
2650| [62796] Microsoft Windows Task Scheduler privilege escalation
2651| [62793] Microsoft Windows Knowledge Base Article 2293386 update is not installed
2652| [62792] Microsoft PowerPoint underflow code execution
2653| [62791] Microsoft PowerPoint PowerPoint buffer overflow
2654| [62789] Microsoft Windows Knowledge Base Article 2423930 update is not installed
2655| [62788] Microsoft Office DLL code execution
2656| [62787] Microsoft Office SPID code execution
2657| [62786] Microsoft Office drawing code execution
2658| [62785] Microsoft Office art drawing code execution
2659| [62784] Microsoft Office RTF buffer overflow
2660| [62737] Microsoft WindowsTask Scheduler service privilege escalation
2661| [62728] Microsoft Internet Explorer window.onerror information disclosure
2662| [62716] Microsoft Windows Mobile .vcf denial of service
2663| [62643] Microsoft Windows unspecified privilege escalation
2664| [62642] Microsoft Windows unspecified privilege escalation
2665| [62579] OpenConnect DTLS Cipher denial of service
2666| [62312] TLS weak certificate
2667| [62186] Microsoft Internet Information Services directory names code execution
2668| [62170] Microsoft Windows Knowledge Base Article 2296011 update is not installed
2669| [62169] Microsoft Windows Explorer buffer overflow
2670| [62166] Microsoft Windows Knowledge Base Article 2294255 update is not installed
2671| [62165] Microsoft Windows Failover Cluster Manager insecure permissions
2672| [62163] Microsoft Windows Knowledge Base Article 2281679 update is not installed
2673| [62162] Microsoft Windows Media Player RTSP code execution
2674| [62154] Microsoft Windows Knowledge Base Article 2279986 update is not installed
2675| [62153] Microsoft Windows OpenType Font fonts privilege escalation
2676| [62152] Microsoft Windows OpenType Font privilege escalation
2677| [62149] Microsoft Windows Knowledge Base Article 2207566 update is not installed
2678| [62147] Microsoft Windows Knowledge Base Article 2160841 update is not installed
2679| [62146] Microsoft .NET Framework JIT compiler code execution
2680| [62143] Microsoft Windows Knowledge Base Article 982132 update is not installed
2681| [62142] Microsoft Windows OpenType table code execution
2682| [62138] Microsoft Windows Knowledge Base Article 981957 update is not installed
2683| [62137] Microsoft Windows class privilege escalation
2684| [62135] Microsoft Windows keyboard privilege escalation
2685| [62134] Microsoft Windows Knowledge Base Article 2412048 update is not installed
2686| [62133] Microsoft Windows Knowledge Base Article 2405882 update is not installed
2687| [62129] Microsoft Windows Knowledge Base Article 2387149 update is not installed
2688| [62128] Microsoft Foundation Class (MFC) library title buffer overflow
2689| [62126] Microsoft Windows Knowledge Base Article 2378111 update is not installed
2690| [62125] Microsoft Windows Media Player code execution
2691| [62123] Microsoft Windows Knowledge Base Article 2360937 update is not installed
2692| [62118] Microsoft Windows Knowledge Base Article 2293211 update is not installed
2693| [62117] Microsoft Excel ghost record type parsing code execution
2694| [62116] Microsoft Excel out-of-bounds memory write in parsing code execution
2695| [62115] Microsoft Excel real time data array record code execution
2696| [62114] Microsoft Excel extra out of boundary record parsing code execution
2697| [62113] Microsoft Excel negative future function code execution
2698| [62112] Microsoft Excel merge cell record pointer code execution
2699| [62111] Microsoft Excel out of bounds array code execution
2700| [62110] Microsoft Excel formula biff record code execution
2701| [62109] Microsoft Excel formula substream memory corruption code execution
2702| [62108] Microsoft Excel Lotus 1-2-3 file parsing code execution
2703| [62107] Microsoft Excel file format parsing code execution
2704| [62106] Microsoft Excel record parsing memory corruption code execution
2705| [62105] Microsoft Excel record parsing integer overflow code execution
2706| [62104] Microsoft Windows Knowledge Base Article 2360131 update is not installed
2707| [62103] Microsoft Windows LPC message privilege escalation
2708| [62098] Microsoft Windows Knowledge Base Article 2293194 update is not installed
2709| [62097] Microsoft Word Word file code execution
2710| [62096] Microsoft Word file code execution
2711| [62095] Microsoft Word indexes code execution
2712| [62094] Microsoft Word records buffer overflow
2713| [62093] Microsoft Word pointers code execution
2714| [62090] Microsoft Internet Explorer deleted object code execution
2715| [62089] Microsoft Internet Explorer script information disclosure
2716| [62088] Microsoft Internet Explorer deleted object code execution
2717| [62087] Microsoft Internet Explorer object code execution
2718| [62086] Microsoft Internet Explorer Anchor element information disclosure
2719| [62085] Microsoft Internet Explorer deleted object code execution
2720| [62084] Microsoft Internet Explorer CSS information disclosure
2721| [62083] Microsoft Internet Explorer toStaticHTML API information disclosure
2722| [62082] Microsoft Internet Explorer AutoComplete information disclosure
2723| [62079] Microsoft Word bookmarks code execution
2724| [62078] Microsoft Word return values code execution
2725| [62077] Microsoft Word stack code execution
2726| [62076] Microsoft Word index code execution
2727| [62075] Microsoft Word boundary check code execution
2728| [62074] Microsoft Word pointer code execution
2729| [62069] Microsoft Windows Knowledge Base Article 2418042 update is not installed
2730| [62006] Microsoft Windows unspecified privilege escalation
2731| [61994] Microsoft Windows MPEG Layer-3 Audio Decoder denial of service
2732| [61937] Microsoft Word MSO.dll denial of service
2733| [61916] Microsoft DRM technology ActiveX control code execution
2734| [61913] Microsoft Internet Explorer toStaticHTML cross-site scripting
2735| [61898] Microsoft ASP.NET padding information disclosure
2736| [61894] Microsoft Paint BMP denial of service
2737| [61636] Microsoft Exchange Server Outlook Web Access cross-site request forgery
2738| [61519] Microsoft Windows Knowledge Base Article 2121546 update is not installed
2739| [61518] Microsoft Windows CSRSS privilege escalation
2740| [61517] Microsoft Windows Knowledge Base Article 2259922 update is not installed
2741| [61516] Microsoft WordPad Word 97 code execution
2742| [61514] Microsoft Windows Knowledge Base Article 2267960 update is not installed
2743| [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
2744| [61512] Microsoft Internet Information Services request header buffer overflow
2745| [61511] Microsoft Internet Information Services repeated POST denial of service
2746| [61510] Microsoft Windows Knowledge Base Article 2315011 update is not installed
2747| [61509] Microsoft Outlook Online Mode buffer overflow
2748| [61507] Microsoft Windows Knowledge Base Article 2320113 update is not installed
2749| [61506] Microsoft Windows Unicode Scripts Processor code execution
2750| [61504] Microsoft Windows Knowledge Base Article 2347290 update is not installed
2751| [61503] Microsoft Windows Print Spooler service code execution
2752| [61501] Microsoft Windows Knowledge Base Article 975558 update is not installed
2753| [61500] Microsoft Windows MPEG-4 code execution
2754| [61499] Microsoft Windows Knowledge Base Article 982802 update is not installed
2755| [61498] Microsoft Windows RPC code execution
2756| [61258] Microsoft Windows IcmpSendEcho2Ex denial of service
2757| [61187] Microsoft Windows xxxRealDrawMenuItem() privilege escalation
2758| [61184] Microsoft Windows win32k!GreStretchBltInternal() denial of service
2759| [61129] Microsoft Windows Kerberos security bypass
2760| [61046] Cisco Unified Wireless Network (UWN) Solution TLS and SSL unspecified
2761| [60975] Microsoft Windows CreateDIBPalette() buffer overflow
2762| [60916] Cisco ASA TLS denial of service
2763| [60915] Cisco ASA TLS denial of service
2764| [60914] Cisco ASA TLS denial of service
2765| [60739] Microsoft Internet Explorer frame.frameBorder denial of service
2766| [60736] Microsoft Windows Knowledge Base Article 2265906 update is not installed
2767| [60735] Microsoft .NET Framework CLR code execution
2768| [60734] Microsoft Windows Knowledge Base Article 2269638 update is not installed
2769| [60733] Microsoft Word HTML linked objects code execution
2770| [60732] Microsoft Word RTF buffer overflow
2771| [60731] Microsoft Word RTF code execution
2772| [60730] Microsoft Word record code execution
2773| [60728] Microsoft Windows Knowledge Base Article 2269707 update is not installed
2774| [60727] Microsoft Excel Excel file code execution
2775| [60724] Microsoft Windows Knowledge Base Article 2286198 update is not installed
2776| [60723] Microsoft Windows Knowledge Base Article 978886 update is not installed
2777| [60722] Microsoft Windows TCP/IP input buffer privilege escalation
2778| [60721] Microsoft WindowsTCP/IP IPv6 denial of service
2779| [60719] Microsoft Windows Knowledge Base Article 980436 update is not installed
2780| [60713] Microsoft Windows Knowledge Base Article 2183461 update is not installed
2781| [60712] Microsoft Internet Explorer uninitialized memory corruption code execution
2782| [60711] Microsoft Internet Explorer uninitialized memory corruption code execution
2783| [60710] Microsoft Internet Explorer race condition memory corruption code execution
2784| [60709] Microsoft Internet Explorer uninitialized memory corruption code execution
2785| [60708] Microsoft Internet Explorer uninitialized memory corruption code execution
2786| [60707] Microsoft Internet Explorer mouse information disclosure
2787| [60705] Microsoft Windows Knowledge Base Article 981852 update is not installed
2788| [60704] Microsoft Windows kernel ACL denial of service
2789| [60703] Microsoft Windows kernel errors privilege escalation
2790| [60702] Microsoft Windows kernel threads privilege escalation
2791| [60701] Microsoft Windows Knowledge Base Article 981997 update is not installed
2792| [60700] Microsoft Windows Movie Maker code execution
2793| [60698] Microsoft Windows Knowledge Base Article 2160329 update is not installed
2794| [60697] Microsoft Windows kernel-mode drivers window privilege escalation
2795| [60696] Microsoft Windows kernel-mode drivers input privilege escalation
2796| [60695] Microsoft Windows kernel-mode drivers memory privilege escalation
2797| [60694] Microsoft Windows kernel-mode drivers exception privilege escalation
2798| [60693] Microsoft Windows kernel-mode drivers denial of service
2799| [60692] Microsoft Windows Knowledge Base Article 982214 update is not installed
2800| [60691] Microsoft Windows SMB stack denial of service
2801| [60690] Microsoft Windows SMB variable denial of service
2802| [60689] Microsoft Windows SMB pool code execution
2803| [60688] Microsoft Windows Knowledge Base Article 982665 update is not installed
2804| [60687] Microsoft Windows Cinepak Codec code execution
2805| [60686] Microsoft Windows Knowledge Base Article 2115168 update is not installed
2806| [60685] Microsoft Windows MPEG Layer-3 Codecs code execution
2807| [60684] Microsoft Windows Knowledge Base Article 2079403 update is not installed
2808| [60683] Microsoft Windows XML Core Services (MSXML) code execution
2809| [60682] Microsoft Windows Knowledge Base Article 982799 update is not installed
2810| [60681] Microsoft Windows Tracing Feature privilege escalation
2811| [60680] Microsoft Windows Knowledge Base Article 2264072 update is not installed
2812| [60679] Microsoft Windows registry key ACL privilege escalation
2813| [60678] Microsoft Windows Service Isolation privilege escalation
2814| [60677] Microsoft Windows Knowledge Base Article 983539 update is not installed
2815| [60676] Microsoft Windows LSASS privilege escalation
2816| [60561] Microsoft Exchange Server Outlook Web Access cross-site request forgery
2817| [60522] Microsoft Clip Organizer ActiveX control denial of service
2818| [60478] A file containing Microsoft LNK data was detected
2819| [60422] Microsoft Windows .lnk file code execution
2820| [60164] Microsoft Exchange Server OWA cross-site request forgery
2821| [60156] Microsoft Word Word file code execution
2822| [60120] Microsoft Windows NtUserCheckAccessForIntegrityLevel() privilege escalation
2823| [60095] Microsoft Windows UpdateFrameTitleForDocument() buffer overflow
2824| [59974] Cisco ASA DTLS denial of service
2825| [59948] Microsoft Internet Explorer mshtml.dll information disclosure
2826| [59901] Microsoft Windows Knowledge Base Article 2229593 update is not installed
2827| [59898] Microsoft Windows Knowledge Base Article 2229593 update is not installed
2828| [59895] Microsoft Windows Knowledge Base Article 978212 update is not installed
2829| [59894] Microsoft Outlook SMB code execution
2830| [59891] Microsoft Windows Knowledge Base Article 982335 update is not installed
2831| [59889] Microsoft Office ActiveX control code execution
2832| [59768] Microsoft Internet Explorer IFRAME information disclosure
2833| [59447] Microsoft Windows Help and Support Center GetServerName cross-site scripting
2834| [59267] Microsoft Windows helpctr.exe command execution
2835| [59088] Microsoft Internet Explorer nntp:// URIs denial of service
2836| [59087] Microsoft Internet Explorer news:// URIs denial of service
2837| [59069] Microsoft Internet Explorer CSS expression denial of service
2838| [59060] Microsoft ASP.NET view state cross-site scripting
2839| [59057] Microsoft ASP.NET EnableViewStateMac cross-site scripting
2840| [59055] Microsoft ASP.NET InnerHtml property cross-site scripting
2841| [58954] Microsoft Dynamics GP password security bypass
2842| [58944] Microsoft Windows Knowledge Base Article 979902 update not installed
2843| [58943] Microsoft Windows MJPEG code execution
2844| [58942] Microsoft Windows media files code execution
2845| [58913] Microsoft Windows Knowledge Base Article 2027452 update is not installed
2846| [58912] Microsoft Excel Office XML privilege escalation
2847| [58911] Microsoft Excel ADO code execution
2848| [58910] Microsoft Excel string code execution
2849| [58909] Microsoft Excel stack code execution
2850| [58908] Microsoft Excel EDG code execution
2851| [58907] Microsoft Excel Excel code execution
2852| [58906] Microsoft Excel HFPicture code execution
2853| [58905] Microsoft Excel Excel file code execution
2854| [58904] Microsoft Excel RTD code execution
2855| [58903] Microsoft Excel Excel code execution
2856| [58902] Microsoft Excel format code execution
2857| [58901] Microsoft Excel chart sheet substreams code execution
2858| [58900] Microsoft Excel object buffer overflow
2859| [58899] Microsoft Excel record code execution
2860| [58891] Microsoft Windows Knowledge Base Article 2028554 update is not installed
2861| [58890] Microsoft SharePoint help page denial of service
2862| [58887] Microsoft Windows kernel-mode drivers TrueType privilege escalation
2863| [58885] Microsoft Windows Knowledge Base Article 980218 update is not installed
2864| [58884] Microsoft Windows OpenType Compact Font Format privilege escalation
2865| [58883] Microsoft Windows Knowledge Base Article 981343 update is not installed
2866| [58871] Microsoft Windows Knowledge Base Article 982381 update is not installed
2867| [58870] Microsoft Internet Explorer deleted object code execution
2868| [58869] Microsoft Internet Explorer IE8 Developer Toolbar code execution
2869| [58868] Microsoft Internet Explorer HTML element code execution
2870| [58867] Microsoft Internet Explorer object code execution
2871| [58866] Microsoft Internet Explorer toStaticHTML information disclosure
2872| [58865] Microsoft Windows Knowledge Base Article 982666 update is not installed
2873| [58864] Microsoft Internet Information Services (IIS) authentication code execution
2874| [58863] Microsoft Windows Knowledge Base Article 983235 update is not installed
2875| [58862] Microsoft Office COM code execution
2876| [58849] GnuTLS X.509 denial of service
2877| [58835] Microsoft Outlook Web Access (OWA) id cross-site scripting
2878| [58833] Microsoft Dynamics GP cipher information disclosure
2879| [58757] Microsoft Internet Explorer IFRAME element denial of service
2880| [58622] Microsoft Windows Canonical Display Driver (cdd.dll) code execution
2881| [58496] Microsoft Internet Explorer Invisible Hand extension information disclosure
2882| [58346] Microsoft Visio DXF buffer overflow
2883| [58345] Microsoft Windows SMTP Service query id spoofing
2884| [58344] Microsoft Windows SMTP Service DNS spoofing
2885| [58243] Microsoft Office SharePoint Server and Microsoft Windows SharePoint Services help.aspx cross-site scripting
2886| [58173] Microsoft Windows Knowledge Base Article 978542 update is not installed
2887| [58172] Microsoft Outlook Express and Windows Mail client integer overflow
2888| [58171] Microsoft Windows Knowledge Base Article 978213 update is not installed
2889| [58170] Microsoft Visual Basic for Applications (VBA) ActiveX control buffer overflow
2890| [58060] Microsoft Windows SfnINSTRING() privilege escalation
2891| [58059] Microsoft Windows SfnLOGONNOTIFY() denial of service
2892| [58044] Microsoft Internet Explorer filter cross-site scripting
2893| [57990] Microsoft Internet Explorer XML unspecified
2894| [57978] Microsoft wireless keyboard XOR weak security
2895| [57602] Miranda IM Use TLS weak security
2896| [57601] Microsoft Windows kernel exceptions denial of service
2897| [57600] Microsoft Windows kernel image file denial of service
2898| [57599] Microsoft Windows kernel path denial of service
2899| [57597] Microsoft Windows kernel registry keys denial of service
2900| [57596] Microsoft Windows kernel symbolic links denial of service
2901| [57595] Microsoft Windows kernel registry keys denial of service
2902| [57581] Microsoft Office Communicator SIP INVITE denial of service
2903| [57580] Microsoft Windows Knowledge Base Article 981210 update is not installed
2904| [57579] Microsoft Windows Cabinet File Viewer (cabview.dll) code execution
2905| [57578] Microsoft Windows WinVerifyTrust signature validation code execution
2906| [57401] Microsoft Internet Explorer data structures denial of service
2907| [57380] Microsoft Windows Knowledge Base Article 979683 update is not installed
2908| [57379] Microsoft Windows kernel symbolic link privilege escalation
2909| [57378] Microsoft Windows kernel memory privilege escalation
2910| [57377] Microsoft Windows Knowledge Base Article 979559 update is not installed
2911| [57376] Microsoft Windows kernel-mode drivers windows privilege escalation
2912| [57375] Microsoft Windows kernel-mode drivers objects privilege escalation
2913| [57374] Microsoft Windows Knowledge Base Article 977816 update is not installed
2914| [57373] Microsoft MPEG Layer-3 buffer overflow
2915| [57372] Microsoft Windows Knowledge Base Article 978338 update is not installed
2916| [57370] Microsoft Windows ISATAP IPv6 spoofing
2917| [57343] Microsoft Windows Knowledge Base Article 979402 update is not installed
2918| [57342] Microsoft Windows Media Player ActiveX control code execution
2919| [57341] Microsoft Windows Knowledge Base Article 980094 update is not installed
2920| [57340] Microsoft Visio index code execution
2921| [57339] Microsoft Visio attributes code execution
2922| [57338] Microsoft Internet Explorer 8 Developer Tools code execution
2923| [57337] Microsoft Windows Knowledge Base Article 980195 update is not installed
2924| [57336] Microsoft Windows Knowledge Base Article 980232 update is not installed
2925| [57335] Microsoft Windows SMB message code execution
2926| [57334] Microsoft Windows SMB transaction responses code execution
2927| [57333] Microsoft Windows SMB code execution
2928| [57332] Microsoft Windows SMB memory privilege escalation
2929| [57330] Microsoft Windows Knowledge Base Article 980858 update is not installed
2930| [57329] Microsoft Windows Media Services info packets buffer overflow
2931| [57328] Microsoft Windows Knowledge Base Article 981160 update is not installed
2932| [57327] Microsoft Office PublisherTextBox buffer overflow
2933| [57326] Microsoft Windows Knowledge Base Article 981169 update is not installed
2934| [57325] Microsoft Windows Knowledge Base Article 981832 update is not installed
2935| [57324] Microsoft Windows SMTP Service Simple Mail Transfer Protocol memory information disclosure
2936| [57323] Microsoft Windows SMTP Service and Microsoft Exchange SMTP DNS Mail Exchanger (MX) denial of service
2937| [57322] Microsoft Windows Knowledge Base Article 980182 update is not installed
2938| [57307] Microsoft Internet Explorer deleted object code execution
2939| [57306] Microsoft Internet Explorer URL code execution
2940| [57305] Microsoft Internet Explorer domain information disclosure
2941| [57304] Microsoft Internet Explorer HTML object code execution
2942| [57303] Microsoft Internet Explorer HTML object code execution
2943| [57302] Microsoft Internet Explorer deleted object code execution
2944| [57301] Microsoft Internet Explorer object code execution
2945| [57300] Microsoft Internet Explorer strings information disclosure
2946| [57299] Microsoft Internet Explorer object code execution
2947| [57269] Apple Mac OS X FreeRADIUS EAP-TLS security bypass
2948| [57205] Microsoft Windows Media Player .AVI code execution
2949| [57198] GnuTLS certificate revocation list (CRL) check buffer overflow
2950| [57197] Microsoft Internet Explorer unspecified code execution
2951| [57196] Microsoft Internet Explorer base address buffer overflow
2952| [57080] Miranda IM Use TLS weak security
2953| [56994] Microsoft Virtual PC and Microsoft Virtual Server Virtual Machine Monitor security bypass
2954| [56853] Microsoft Windows MS HTML Help ActiveX control (hhctrl.ocx) HtmlHelpA() code execution
2955| [56808] Microsoft Office AccWizObjects code execution
2956| [56772] Microsoft Internet Explorer use-after-free code execution
2957| [56756] Microsoft Windows .ani file denial of service
2958| [56651] Microsoft Internet Information Services DNS cross-site scripting
2959| [56597] Microsoft Sharepoint Upload.aspx cross-site scripting
2960| [56591] Microsoft Windows API denial of service
2961| [56560] Microsoft Windows winhlp32.exe buffer overflow
2962| [56558] Microsoft Windows MsgBox() code execution
2963| [56470] Microsoft Windows Knowledge Base Article 980150 update is not installed
2964| [56469] Microsoft Excel DbOrParamQry code execution
2965| [56468] Microsoft Excel XLSX code execution
2966| [56467] Microsoft Excel FNGROUPNAME code execution
2967| [56466] Microsoft Excel MDXSET buffer overflow
2968| [56465] Microsoft Excel MDXTUPLE buffer overflow
2969| [56464] Microsoft Excel object type code execution
2970| [56463] Microsoft Excel record memory code execution
2971| [56461] Microsoft Windows Knowledge Base Article 975561 update is not installed
2972| [56460] Microsoft Movie Maker and and Microsoft Producer buffer overflow
2973| [56435] Microsoft Windows Media Player .mpg denial of service
2974| [56431] Microsoft Internet Explorer CSS stylesheets information disclosure
2975| [56339] Cisco ASA 5500 WebVPN DTLS denial of service
2976| [56241] OpenOffice.org Microsoft Word file sprmTSetBrc buffer overflow
2977| [56240] OpenOffice.org Microsoft Word file sprmTDefTable buffer overflow
2978| [56218] Microsoft Windows DNS weak security
2979| [56093] Microsoft Internet Explorer URLMON security bypass
2980| [55935] Microsoft Windows Knowledge Base Article 975713 update is not installed
2981| [55934] Microsoft Windows Knowledge Base Article 978037 update is not installed
2982| [55933] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) privilege escalation
2983| [55932] Microsoft Windows Knowledge Base Article 978214 update is not installed
2984| [55931] Microsoft Office Office files buffer overflow
2985| [55930] Microsoft Windows Knowledge Base Article 977935 update is not installed
2986| [55929] Microsoft DirectShow AVI file buffer overflow
2987| [55928] Microsoft Windows Knowledge Base Article 978706 update is not installed
2988| [55927] Microsoft Paint JPEG integer overflow
2989| [55926] Microsoft Windows Knowledge Base Article 977894 update is not installed
2990| [55925] Microsoft Windows Hyper-V instruction set denial of service
2991| [55924] Microsoft Windows Knowledge Base Article 977377 update is not installed
2992| [55923] Microsoft Windows Knowledge Base Article 977290 update is not installed
2993| [55922] Microsoft Windows Kerberos Ticket-Granting-Ticket (TGT) denial of service
2994| [55921] Microsoft Windows Knowledge Base Article 977165 update is not installed
2995| [55920] Microsoft Windows kernel privilege escalation
2996| [55917] Microsoft Windows Knowledge Base Article 978262 update is not installed
2997| [55915] Microsoft Data Analyzer ActiveX Control code execution
2998| [55910] Microsoft Windows Knowledge Base Article 971468 update is not installed
2999| [55909] Microsoft Windows SMB NTLM privilege escalation
3000| [55908] Microsoft Windows SMB NULL denial of service
3001| [55907] Microsoft Windows SMB denial of service
3002| [55906] Microsoft Windows SMB pathname code execution
3003| [55900] Microsoft Internet Explorer createElement denial of service
3004| [55898] Microsoft Windows Knowledge Base Article 974145 update is not installed
3005| [55897] Microsoft Windows TCP/IP SACK denial of service
3006| [55896] Microsoft Windows TCP/IP Route Information code execution
3007| [55895] Microsoft Windows TCP/IP stack datagram code execution
3008| [55894] Microsoft Windows TCP/IP ICMPv6 code execution
3009| [55890] Microsoft Windows Knowledge Base Article 975416 update is not installed
3010| [55889] Microsoft PowerPoint ViewerTextCharsAtom buffer overflow
3011| [55888] Microsoft PowerPoint Viewer TextBytesAtom buffer overflow
3012| [55887] Microsoft PowerPoint OEPlaceholderAtom code execution
3013| [55886] Microsoft PowerPoint placementId code execution
3014| [55885] Microsoft PowerPoint LinkedSlideAtom buffer overflow
3015| [55884] Microsoft PowerPoint file path buffer overflow
3016| [55863] Microsoft Internet Explorer multiple unspecified denial of service
3017| [55779] Microsoft Windows Knowledge Base Article 978207 update is not installed
3018| [55778] Microsoft Internet Explorer object memory code execution
3019| [55777] Microsoft Internet Explorer uninitialized code execution
3020| [55776] Microsoft Internet Explorer deleted object code execution
3021| [55775] Microsoft Internet Explorer initialized memory code execution
3022| [55774] Microsoft Internet Explorer deleted object code execution
3023| [55773] Microsoft Internet Explorer URL code execution
3024| [55742] Microsoft Windows #GP trap handler privilege escalation
3025| [55680] Microsoft Windows Media Player ActiveX control code execution
3026| [55676] Microsoft Internet Explorer ActiveX Control code execution
3027| [55642] Microsoft Internet Explorer freed object code execution
3028| [55560] Microsoft Windows XP Flash Player code execution
3029| [55308] Microsoft Internet Information Services colon security bypass
3030| [55154] Microsoft Silverlight code execution
3031| [55153] Microsoft Windows Knowledge Base Article 978251 update is not installed
3032| [55152] Microsoft Windows Server Message Block client code execution
3033| [55151] Microsoft Windows Server Message Block pool code execution
3034| [55150] Microsoft Windows Knowledge Base Article 972270 update is not installed
3035| [55149] Microsoft Windows EOT font buffer overflow
3036| [55031] Microsoft Internet Information Services (IIS) filenames security bypass
3037| [54645] Microsoft Internet Explorer and Windows Media player Intel Indeo codec code execution
3038| [54644] Microsoft Internet Explorer and Windows Media player Intel Indeo codec code execution
3039| [54643] Microsoft Internet Explorer and Windows Media player Intel Indeo41 codec buffer overflow
3040| [54642] Microsoft Internet Explorer and Windows Media player Intel Indeo41 codec buffer overflow
3041| [54463] Microsoft Internet Explorer cross-site scripting filter information disclosure
3042| [54445] Microsoft Windows Knowledge Base Article 975539 update is not installed
3043| [54444] Microsoft WordPad and Office Text Converter Word 97 file code execution
3044| [54443] Microsoft Windows Knowledge Base Article 974392 update is not installed
3045| [54442] Microsoft Windows Local Security Authority Subsystem Service (LSASS) denial of service
3046| [54440] Microsoft Windows Knowledge Base Article 974318 update is not installed
3047| [54439] Microsoft Windows Internet Authentication Service (IAS) privilege escalation
3048| [54438] Microsoft Windows Internet Authentication Service (IAS) code execution
3049| [54427] Microsoft Windows Knowledge Base Article 971726 update is not installed
3050| [54426] Microsoft Windows Active Directory Federation Services (ADFS) code execution
3051| [54425] Microsoft Windows Active Directory Federation Services (ADFS) spoofing
3052| [54424] Microsoft Windows Knowledge Base Article 967183 update is not installed
3053| [54423] Microsoft Office Project project code execution
3054| [54422] Microsoft Windows Knowledge Base Article 976325 update is not installed
3055| [54421] Microsoft Internet Explorer deleted object code execution
3056| [54420] Microsoft Internet Explorer uninitialized object code execution
3057| [54418] Microsoft Internet Explorer uninitialized object code execution
3058| [54399] Microsoft Internet Explorer PDF information disclosure
3059| [54367] Microsoft Internet Explorer CSS/Style code execution
3060| [54317] Microsoft Internet Explorer setHomePage denial of service
3061| [54272] ngIRCd SSL/TLS denial of service
3062| [54217] Microsoft Windows KeAccumulateTicks() denial of service
3063| [54158] Transport Layer Security (TLS) handshake renegotiation weak security
3064| [54012] Microsoft Windows Knowledge Base Article 972652 update is not installed
3065| [54011] Microsoft Excel field code execution
3066| [54010] Microsoft Excel Excel records code execution
3067| [54009] Microsoft Excel Excel formulas code execution
3068| [54008] Microsoft Excel cell code execution
3069| [54007] Microsoft Excel BIFF records buffer overflow
3070| [54006] Microsoft Excel Featheader code execution
3071| [54005] Microsoft Excel SxView code execution
3072| [54004] Microsoft Excel cache code execution
3073| [53991] Microsoft Windows Knowledge Base Article 973309 update is not installed
3074| [53990] Microsoft Windows ADAM LDAP denial of service
3075| [53986] Microsoft Windows Knowledge Base Article 973565 update is not installed
3076| [53985] Microsoft Windows WSDAPI code execution
3077| [53981] Microsoft Windows Knowledge Base Article 974783 update is not installed
3078| [53980] Microsoft Windows 2000 License Logging Server buffer overflow
3079| [53977] Microsoft Windows Knowledge Base Article 976307 update is not installed
3080| [53976] Microsoft Word Word file code execution
3081| [53975] Microsoft Windows Knowledge Base Article 969947 update is not installed
3082| [53974] Microsoft Windows kernel font code execution
3083| [53973] Microsoft Windows kernel GDI privilege escalation
3084| [53972] Microsoft Windows kernel NULL pointer privilege escalation
3085| [53955] Microsoft SharePoint download feature information disclosure
3086| [53954] OpenLDAP tls_o.c security bypass
3087| [53936] ProFTPD mod_tls SSL certificate security bypass
3088| [53601] Microsoft Office 2008 for Mac user ID 502 security bypass
3089| [53551] Microsoft Windows Knowledge Base Article KB973525 update is not installed
3090| [53550] Microsoft Windows Knowledge Base Article 974112 update is not installed
3091| [53549] Microsoft Windows Media Player ASF file buffer overflow
3092| [53548] Microsoft Windows Knowledge Base Article 971486 update is not installed
3093| [53547] Microsoft Windows kernel exception handler denial of service
3094| [53546] Microsoft Windows kernel user mode privilege escalation
3095| [53545] Microsoft Windows kernel 64-bit truncation privilege escalation
3096| [53544] Microsoft Windows Knowledge Base Article 974455 update is not installed
3097| [53543] Microsoft Internet Explorer uninitialized object code execution
3098| [53542] Microsoft Internet Explorer uninitialized code execution
3099| [53541] Microsoft Windows Knowledge Base Article 969059 update is not installed
3100| [53540] Microsoft Windows Indexing Service ActiveX control code execution
3101| [53539] Microsoft Internet Explorer arguments code execution
3102| [53538] Microsoft Internet Explorer data stream headers code execution
3103| [53537] Microsoft Windows Knowledge Base Article 974571 update is not installed
3104| [53536] Microsoft Windows CryptoAPI ASN.1 spoofing
3105| [53535] Microsoft Windows CryptoAPI NULL spoofing
3106| [53534] Microsoft Windows Knowledge Base Article 975254 update is not installed
3107| [53533] Microsoft Windows Knowledge Base Article 957488 update is not installed
3108| [53532] Microsoft Office BMP image code execution
3109| [53531] Microsoft Windows GDI+ Microsoft Office file code execution
3110| [53530] Microsoft Windows GDI+ PNG image code execution
3111| [53529] Microsoft Windows GDI+ .NET Framework API code execution
3112| [53528] Microsoft Windows GDI+ TIFF image code execution
3113| [53527] Microsoft Windows GDI+ TIFF image buffer overflow
3114| [53526] Microsoft Windows GDI+ PNG image buffer overflow
3115| [53525] Microsoft Windows GDI+ WMF image code execution
3116| [53522] Microsoft Windows Knowledge Base Article 975517 update is not installed
3117| [53520] Microsoft Server Message Block (SMB) Protocol software command value code execution
3118| [53519] Microsoft Server Message Block (SMB) Protocol software denial of service
3119| [53517] Microsoft Windows Knowledge Base Article 975682 update is not installed
3120| [53516] Microsoft Windows Media Player audio files code execution
3121| [53514] Microsoft Windows Media Player ASF code execution
3122| [53512] Microsoft Windows Knowledge Base Article 975467 update is not installed
3123| [53511] Microsoft Windows Local Security Authority Subsystem Service (LSASS) denial of service
3124| [53417] Microsoft Internet KEYGEN denial of service
3125| [53414] Microsoft Internet window.print denial of service
3126| [53277] Wireshark TLS denial of service
3127| [53090] Microsoft Windows srv2.sys code execution
3128| [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
3129| [53005] Microsoft Internet Explorer window.open() spoofing
3130| [52948] Microsoft Windows Knowledge Base Article 973965 update is not installed
3131| [52926] Sophos PureMessage for Microsoft Exchange anti-virus and anti-spam unspecified vulnerability
3132| [52925] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe denial of service
3133| [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
3134| [52897] Microsoft Internet Explorer JavaScript code denial of service
3135| [52870] Microsoft Internet Explorer integer value denial of service
3136| [52780] Microsoft .NET Framework CLR code execution
3137| [52775] Microsoft Windows Knowledge Base Article 973812 update is not installed
3138| [52774] Microsoft Windows Media Format MP3 files code execution
3139| [52773] Microsoft Windows Media Format ASF files code execution
3140| [52771] Microsoft Windows Knowledge Base Article 971961 update is not installed
3141| [52770] Microsoft Windows Jscript code execution
3142| [52765] Microsoft Internet Explorer XML denial of service
3143| [52762] Microsoft Internet Explorer Unicode string denial of service
3144| [52722] Microsoft Internet Explorer DIV element denial of service
3145| [52590] Microsoft Internet Explorer JavaScript SetAttribute denial of service
3146| [52404] GnuTLS CN and SAN fields security bypass
3147| [52403] Microsoft Windows OpenType font engine denial of service
3148| [52249] Microsoft Internet Explorer mshtml.dll denial of service
3149| [52243] Microsoft IIS With .NET Path Disclosure
3150| [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
3151| [52240] Microsoft IIS Sample Application Physical Path Disclosure
3152| [52238] Microsoft FrontPage Server Extensions Vital Information Leakage
3153| [52237] Microsoft FrontPage Server Extensions To Do List Found
3154| [52236] Microsoft FrontPage Server Extensions Machine Name Disclosure
3155| [52235] Microsoft FrontPage Configuration Information Leakage
3156| [52234] Microsoft FrontPage '_vti_cnf' Information Leakage
3157| [52233] Microsoft IIS With .NET Path Disclosure
3158| [52137] Microsoft Windows Knowledge Base Article 969706 update is not installed
3159| [52131] Microsoft Windows Knowledge Base Article 972260 update is not installed
3160| [52128] Microsoft Windows Knowledge Base Article 967723 update is not installed
3161| [52127] Microsoft Windows TCP/IP orphaned connections denial of service
3162| [52126] Microsoft Windows TCP/IP timestamps code execution
3163| [52117] Microsoft Windows Knowledge Base Article 970927 update is not installed
3164| [52116] Microsoft Windows RDP Services Client ActiveX control buffer overflow
3165| [52115] Microsoft Windows Remote Desktop Connection RDP buffer overflow
3166| [52114] Microsoft Windows Knowledge Base Article 970957 update is not installed
3167| [52113] ASP.NET Framework component of Microsoft Windows HTTP denial of service
3168| [52111] Microsoft Windows Knowledge Base Article 969883 update is not installed
3169| [52110] Microsoft Windows Windows Internet Name Service (WINS) replication partner buffer overflow
3170| [52109] Microsoft Windows Windows Internet Name Service (WINS) replication buffer overflow
3171| [52108] Microsoft Windows Knowledge Base Article 960859 update is not installed
3172| [52107] Microsoft Windows Knowledge Base Article 971032 update is not installed
3173| [52106] Microsoft Message Queuing Service (MSMQ) IOCTL privilege escalation
3174| [52105] Microsoft Office Web Components ActiveX control buffer overflow
3175| [52104] Microsoft Windows telnet privilege escalation
3176| [52103] Microsoft Windows Knowledge Base Article 956844 update is not installed
3177| [52102] Microsoft Windows DHTML Editing Component ActiveX control code execution
3178| [52097] Microsoft Windows Knowledge Base Article 971557 update is not installed
3179| [52096] Microsoft Windows AVI validation integer overflow
3180| [52095] Microsoft Windows AVI code execution
3181| [52093] Microsoft Windows Knowledge Base Article 971657 update is not installed
3182| [52092] Microsoft Windows Workstation Service RPC message code execution
3183| [52089] Microsoft Windows Knowledge Base Article 973908 update is not installed
3184| [52087] Microsoft Active Template Library (ATL) variant code execution
3185| [52052] Microsoft Internet Explorer Active Template Library (ATL) ActiveX control killbit security bypass
3186| [52051] Microsoft Internet Explorer deleted objects code execution
3187| [52050] Microsoft Internet Explorer table operations code execution
3188| [52049] Microsoft Internet Explorer memory object code execution
3189| [52048] Microsoft Active Template Library (ATL) NULL string information disclosure
3190| [52047] Microsoft Active Template Library (ATL) object code execution
3191| [52044] Microsoft Active Template Library (ATL) header code execution
3192| [51637] Microsoft Internet Explorer AddFavorite buffer overflow
3193| [51636] Microsoft Windows Knowledge Base Article KB973346 update is not installed
3194| [51616] Microsoft Internet Explorer cached certificate weak security
3195| [51552] Microsoft Internet Explorer Refresh header cross-site scripting
3196| [51471] Microsoft Windows Knowledge Base Article 970811 update is not installed
3197| [51469] Microsoft Windows Knowledge Base Article 970710 update is not installed
3198| [51468] Microsoft Windows Wireless LAN AutoConfig service buffer overflow
3199| [51467] Microsoft ISA Server Radius One Time Password (OTP) privilege escalation
3200| [51465] Microsoft Windows Knowledge Base Article 969856 update is not installed
3201| [51464] Microsoft Virtual PC and Microsoft Virtual Server privilege escalation
3202| [51463] Microsoft Windows Knowledge Base Article 971633 update is not installed
3203| [51462] Microsoft Windows Knowledge Base Article 969516 update is not installed
3204| [51461] Microsoft DirectX DirectShow code execution
3205| [51460] Microsoft Publisher pointer dereference code execution
3206| [51458] Microsoft DirectX QuickTime code execution
3207| [51457] Microsoft Windows Knowledge Base Article 957638 update is not installed
3208| [51454] Microsoft Office Web Components ActiveX control buffer overflow
3209| [51452] Microsoft Office Web Components ActiveX control HTML code execution
3210| [51451] Microsoft Office Web Components ActiveX control code execution
3211| [51378] Microsoft Internet Explorer connect response weak security
3212| [51198] OpenSSL dtls1_retrieve_buffered_fragment function denial of service
3213| [51186] Microsoft Internet Explorer https security bypass
3214| [51097] Microsoft Windows atapi.sys privilege escalation
3215| [51034] Microsoft PowerPoint Freelance Windows buffer overflow
3216| [50973] Microsoft Windows Server 2003 and Vista win32k.sys denial of service
3217| [50903] Microsoft Windows SPI_SETDESKWALLPAPER SystemParametersInfo denial of service
3218| [50831] Microsoft DirectX quartz.dll code execution
3219| [50826] Microsoft Windows Knowledge Base Article 969898 update is not installed
3220| [50798] Microsoft Windows Knowledge Base Article 970238 update is not installed
3221| [50797] Microsoft Windows RPC Marshalling Engine code execution
3222| [50795] Microsoft Windows Knowledge Base Article 969514 update is not installed
3223| [50794] Microsoft Word Word file buffer overflow
3224| [50793] Microsoft Word Word file buffer overflow
3225| [50791] Microsoft Windows Knowledge Base Article 969462 update is not installed
3226| [50790] Microsoft Excel record pointer code execution
3227| [50789] Microsoft Excel record integer overflow
3228| [50788] Microsoft Excel field code execution
3229| [50787] Microsoft Excel string buffer overflow
3230| [50786] Microsoft Excel array indexing code execution
3231| [50785] Microsoft Excel object record code execution
3232| [50784] Microsoft Excel pointer code execution
3233| [50783] Microsoft Windows Knowledge Base Article 968537 update is not installed
3234| [50782] Microsoft Windows desktop parameter privilege escalation
3235| [50781] Microsoft Windows system call privilege escalation
3236| [50780] Microsoft Windows kernel pointer privilege escalation
3237| [50779] Microsoft Windows kernel kernel objects privilege escalation
3238| [50778] Microsoft Windows Knowledge Base Article 963093 update is not installed
3239| [50777] Microsoft Windows Search weak security
3240| [50776] Microsoft Windows Knowledge Base Article 969897 update is not installed
3241| [50775] Microsoft Internet Explorer HTML objects code execution
3242| [50774] Microsoft Internet Explorer HTML objects code execution
3243| [50773] Microsoft Internet Explorer HTML objects code execution
3244| [50772] Microsoft Internet Explorer object access code execution
3245| [50771] Microsoft Internet Explorer HTML code execution
3246| [50770] Microsoft Internet Explorer DHTML code execution
3247| [50769] Microsoft Internet Explorer cached data cross-domain security bypass
3248| [50768] Microsoft Windows Knowledge Base Article 970483 update is not installed
3249| [50767] Microsoft Windows Knowledge Base Article 971055 update is not installed
3250| [50766] Microsoft Windows Knowledge Base Article 961501 update is not installed
3251| [50765] Microsoft Windows Print Spooler service privilege escalation
3252| [50764] Microsoft Print Spooler service information disclosure
3253| [50763] Microsoft Windows Print Spooler service buffer overflow
3254| [50762] Microsoft Windows Knowledge Base Article 961371 update is not installed
3255| [50761] Microsoft Windows Active Directory LDAP denial of service
3256| [50760] Microsoft Windows Embedded OpenType (EOT) integer overflow
3257| [50759] Microsoft Windows 2000 Active Directory LDAP code execution
3258| [50758] Microsoft Windows EOT buffer overflow
3259| [50757] Microsoft Windows Knowledge Base Article 957632 update is not installed
3260| [50756] Microsoft Office Converter buffer overflow
3261| [50661] OpenSSL dtls1_retrieve_buffered_fragment denial of service
3262| [50578] OpenSSL DTLS messages denial of service
3263| [50577] OpenSSL DTLS epoch denial of service
3264| [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
3265| [50529] Apple Mac OS X Microsoft Office Spotlight Importer code execution variant 1
3266| [50494] Microsoft Internet Explorer utf-7 encoded characters cross-site scripting
3267| [50445] GnuTLS libgnutls denial of service
3268| [50425] Microsoft PowerPoint sound data code execution
3269| [50391] Microsoft Windows Media Player MID file denial of service
3270| [50354] McAfee GroupShield for Microsoft Exchange X- headers security bypass
3271| [50350] Microsoft Internet Explorer unprintable characters denial of service
3272| [50281] Microsoft Windows Knowledge Base Article 967340 update is not installed
3273| [50280] Microsoft PowerPoint atoms or data buffer overflow
3274| [50279] Microsoft PowerPoint notes buffer overflow
3275| [50278] Microsoft PowerPoint sound data buffer overflow
3276| [50277] Microsoft PowerPoint name strings buffer overflow
3277| [50276] Microsoft PowerPoint structures buffer overflow
3278| [50275] Microsoft PowerPoint string buffer overflow
3279| [50274] Microsoft PowerPoint sound PowerPoint 95 code execution
3280| [50273] Microsoft PowerPoint BuildList record code execution
3281| [50272] Microsoft PowerPoint sound data code execution
3282| [50271] Microsoft PowerPoint sound code execution
3283| [50270] Microsoft PowerPoint record types integer overflow
3284| [50269] Microsoft PowerPoint record header buffer overflow
3285| [50261] GnuTLS gnutls-cli spoofing
3286| [50260] GnuTLS DSA spoofing
3287| [50257] GnuTLS DSA code execution
3288| [50129] Microsoft Windows gdiplus.dll PNG denial of service
3289| [49888] Microsoft Intelligent Application Gateway Whale Client Components ActiveX control buffer overflow
3290| [49632] Microsoft PowerPoint index value code execution
3291| [49598] Microsoft Windows Knowledge Base Article 959426 update is not installed
3292| [49588] Microsoft Windows Knowledge Base Article 960477 update is not installed
3293| [49586] Microsoft Windows Knowledge Base Article 959454 update is not installed
3294| [49584] Microsoft Windows Threadpool ACL privilege escalation
3295| [49581] Microsoft Windows RPCSS privilege escalation
3296| [49578] Microsoft Windows WMI privilege escalation
3297| [49575] Microsoft Wordpad Word 97 buffer overflow
3298| [49573] Microsoft Office WordPerfect 6.x Converter code execution
3299| [49572] Microsoft WordPad and Office Text Converter file code execution
3300| [49570] Microsoft Windows Knowledge Base Article 961759 update is not installed
3301| [49569] Microsoft Windows Knowledge Base Article 960803 update is not installed
3302| [49567] Microsoft ISA Server and Microsoft Forefront TMG cookieauth.dll cross-site scripting
3303| [49566] Microsoft Windows HTTP services certificate spoofing
3304| [49564] Microsoft ISAServer and Microsoft Forefront TMG Web proxy TCP state denial of service
3305| [49562] Microsoft Windows HTTP services integer underflow
3306| [49560] Microsoft Windows Knowledge Base Article 961373 update is not installed
3307| [49559] Microsoft DirectShow MJPEG code execution
3308| [49558] Microsoft Windows Knowledge Base Article 963027 update is not installed
3309| [49557] Microsoft Internet Explorer uninitialized memory code execution
3310| [49555] Microsoft Internet Explorer deleted memory code execution
3311| [49554] Microsoft Internet Explorer uninitialized memory code execution
3312| [49552] Microsoft Internet Explorer page transition code execution
3313| [49549] Microsoft Internet Explorer WinINet code execution
3314| [49547] Microsoft Windows Knowledge Base Article 968557 update is not installed
3315| [49544] Microsoft Excel object code execution
3316| [49438] Microsoft Windows GDI+ EMF EmfPlusFont Object denial of service
3317| [49435] Microsoft Windows unlzh.c and unpack.c gzip code execution
3318| [49389] Microsoft Internet Explorer unspecified code execution
3319| [49109] OpenBSD and Microsoft Interix fts_build function denial of service
3320| [49107] FileZilla Server SSL/TLS denial of service
3321| [49079] Microsoft Windows DNS server memory leak denial of service
3322| [48960] TLS/SSL traffic over HTTP port 80 detected
3323| [48909] Microsoft Windows Knowledge Base Article 962238 update is not installed
3324| [48908] Microsoft Windows WINS server WPAD and ISATAP registration Web proxy spoofing
3325| [48907] Microsoft Windows DNS server WPAD registration Web proxy spoofing
3326| [48906] Microsoft Windows DNS server cache response spoofing
3327| [48905] Microsoft Windows DNS server query response spoofing
3328| [48875] Microsoft Excel unspecified code execution
3329| [48815] Microsoft XML Core Services HTTPOnly Set-Cookie2 HTTP response headers information disclosure
3330| [48595] Microsoft Word 2007 Email as PDF information disclosure
3331| [48542] Microsoft Internet Explorer onclick action click hijacking
3332| [48392] Microsoft Windows I/O information disclosure
3333| [48335] Microsoft Internet Explorer HTML form value denial of service
3334| [48326] Microsoft Windows Knowledge Base Article 960715 update is not installed
3335| [48312] Microsoft Windows Knowledge Base Article 959420 update is not installed
3336| [48311] Microsoft Windows Knowledge Base Article 961260 update not installed
3337| [48310] Microsoft Internet Explorer Cascading Style Sheets code execution
3338| [48309] Microsoft Internet Explorer CFunctionPointer code execution
3339| [48308] Microsoft Windows Knowledge Base Article 960225 update is not installed
3340| [48305] Microsoft Visio memory code execution
3341| [48303] Microsoft Visio object data copy code execution
3342| [48302] Microsoft Windows Knowledge Base Article 957634 update not installed
3343| [48301] Microsoft Windows Knowledge Base Article 958690 update is not installed
3344| [48300] Microsoft Windows kernel pointer validation privilege escalation
3345| [48299] Microsoft Windows kernel handle validation privilege escalation
3346| [48298] Microsoft Windows kernel GDI validation code execution
3347| [48296] Microsoft Visio object data validation code execution
3348| [48295] Microsoft Windows Knowledge Base Article 974378 update not installed
3349| [48294] Microsoft .NET Framework Type check code execution
3350| [48293] Microsoft .NET Framework CAS verification code execution
3351| [48189] Microsoft Windows AutoRun feature enabled
3352| [47868] Microsoft HTML Help Workshop .hhp buffer overflow
3353| [47867] Microsoft Windows .CHM file denial of service
3354| [47788] Microsoft Internet Explorer JavaScript onload=screen attribute denial of service
3355| [47774] Microsoft Internet Explorer Scripting.FileSystem security bypass
3356| [47760] Microsoft Windows Media Player WAV file code execution
3357| [47756] Microsoft Money prtstb06.dll ActiveX control denial of service
3358| [47738] Microsoft MSN Messenger IP address information disclosure
3359| [47676] Microsoft Windows Knowledge Base Article 958687 update not installed
3360| [47674] Microsoft Windows SMB NT Trans2 request code execution
3361| [47673] Microsoft Windows SMB NT Trans request buffer overflow
3362| [47672] Microsoft Windows Knowledge Base Article 959239 update not installed
3363| [47671] Microsoft Exchange Server EMSMDB2 invalid MAPI commands denial of service
3364| [47670] Microsoft Exchange Server TNEF decoding code execution
3365| [47664] Microsoft Windows Media Player WAV or SND file denial of service
3366| [47444] Microsoft Internet Explorer XDomainRequestAllowed header XSS filter bypass
3367| [47443] Microsoft Internet Explorer Location and Set-Cookie HTTP header XSS filter bypass
3368| [47442] Microsoft Internet Explorer X-XSS-Protection HTTP header XSS filter bypass
3369| [47441] Microsoft Internet Explorer Content-Type header XSS filter bypass
3370| [47428] Microsoft Windows Knowledge Base Article 960714 update is not installed
3371| [47277] Microsoft Internet Explorer CSS expression property XSS filter bypass
3372| [47246] Microsoft Wordpad Text Converter for Word 97 buffer overflow
3373| [47208] Microsoft Internet Explorer data binding code execution
3374| [47182] Microsoft SQL Server sp_replwritetovarbin() buffer overflow
3375| [46878] Microsoft Excel file record code execution
3376| [46870] Microsoft Windows Knowledge Base Article 959807 update is not installed
3377| [46869] Microsoft Windows Media Components ISATAP information disclosure
3378| [46868] Microsoft Windows Media Components SPN NTLM credentials code execution
3379| [46867] Microsoft Windows Knowledge Base Article 959349 update is not installed
3380| [46866] Microsoft Windows search-ms protocol code execution
3381| [46865] Microsoft Windows saved search file code execution
3382| [46864] Microsoft Windows Knowledge Base Article 959070 update is not installed
3383| [46863] Microsoft Excel NAME record code execution
3384| [46862] Microsoft Excel spreadsheet formula code execution
3385| [46861] Microsoft Windows Knowledge Base Article 958215 update not installed
3386| [46860] Microsoft Internet Explorer embedded object code execution
3387| [46859] Microsoft Internet Explorer deleted object code execution
3388| [46858] Microsoft Internet Explorer HTML objects uninitialized memory code execution
3389| [46857] Microsoft Internet Explorer parameter validation code execution
3390| [46856] Microsoft Windows Knowledge Base Article 957175 update is not installed
3391| [46854] Microsoft Office SharePoint access control privilege escalation
3392| [46853] Microsoft Windows Knowledge Base Article 957173 update not installed
3393| [46852] Microsoft Word document table property buffer overflow
3394| [46851] Microsoft Word RTF stylesheet control word buffer overflow
3395| [46850] Microsoft Word RTF group control word buffer overflow
3396| [46849] Microsoft Word RTF drawing object buffer overflow
3397| [46848] Microsoft Word RTF drawing object code execution
3398| [46847] Microsoft Word malformed value code execution
3399| [46846] Microsoft Word RTF polyline and polygon buffer overflow
3400| [46844] Microsoft Windows Knowledge Base Article 956802 update is not installed
3401| [46843] Microsoft Windows GDI WMF image file buffer overflow
3402| [46842] Microsoft Windows GDI WMF image file integer overflow
3403| [46742] Microsoft Windows Vista iphlpapi.dll buffer overflow
3404| [46695] Microsoft .NET Framework SN weak security
3405| [46673] Microsoft Communicator SIP INVITE message unspecified denial of service
3406| [46671] Microsoft Communicator emoticon unspecified denial of service
3407| [46670] Microsoft Communicator, Office Communications Server (OCS) and Windows Live Messenger RTCP unspecified denial of service
3408| [46628] Microsoft Active Directory username information disclosure
3409| [46590] Microsoft Sharepoint HTML document cross-site scripting
3410| [46506] Microsoft Windows UnhookWindowsHookEx() denial of service
3411| [46482] GnuTLS X509 name spoofing
3412| [46385] Microsoft Windows Media Player MIDI or DAT file denial of service
3413| [46309] Microsoft Debug Diagnostic Tool DebugDiag ActiveX control denial of service
3414| [46235] Microsoft Internet Explorer high-bit address bar spoofing
3415| [46234] Microsoft Internet Explorer non-breaking space address bar spoofing
3416| [46194] Microsoft Windows Knowledge Base Article 957097 update is not installed
3417| [46191] Microsoft Windows SMB NTLM credentials code execution
3418| [46190] Microsoft Windows Knowledge Base Article 932349 update is not installed
3419| [46189] Microsoft Visual Basic Charts ActiveX control code execution
3420| [46188] Microsoft Visual Basic Windows Common ActiveX control AVI buffer overflow
3421| [46187] Microsoft Visual Basic Hierarchical Flexgrid ActiveX control code execution
3422| [46183] Microsoft Visual Basic Flexgrid ActiveX control code execution
3423| [46178] Microsoft Visual Basic Datagrid ActiveX control code execution
3424| [46102] Microsoft Windows 2003 SP2 is not installed on the system
3425| [46101] Microsoft Windows 2003 SP1 is not installed on the system
3426| [46100] Microsoft Windows XP Service Pack 3 is not installed on the system
3427| [46099] Microsoft Windows XP Service Pack 1 is not installed on the system
3428| [46061] Microsoft Outlook Web Access (OWA) redir.asp phishing
3429| [46042] Microsoft Windows Knowledge Base Article 958644 update not installed
3430| [46040] Microsoft Windows Server Service RPC code execution
3431| [45857] Microsoft Windows Mobile HTC Hermes device security bypass
3432| [45854] Microsoft Internet Explorer script origin information disclosure
3433| [45746] Cisco Unity Microsoft API unspecified denial of service
3434| [45735] Microsoft PicturePusher ActiveX control file upload
3435| [45719] Microsoft Windows Vista page faults denial of service
3436| [45718] Microsoft Internet Explorer Extended HTML Form cross-site scripting
3437| [45639] Microsoft Internet Explorer alert function denial of service
3438| [45586] Microsoft Windows Knowledge Base Article 957280 update is not installed
3439| [45585] Microsoft Windows Active Directory LDAP search buffer overflow
3440| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
3441| [45582] Microsoft Windows Knowledge Base Article 956803 update is not installed
3442| [45581] Microsoft Windows Knowledge Base Article 956416 update is not installed
3443| [45580] Microsoft Excel REPT code execution
3444| [45579] Microsoft Excel spreadsheet BIFF file format buffer overflow
3445| [45578] Microsoft Windows Ancillary Function Driver privilege escalation
3446| [45572] Microsoft Windows Knowledge Base Article 9556841 update is not installed
3447| [45571] Microsoft Windows Memory Manager Virtual Address Descriptors privilege escalation
3448| [45566] Microsoft Excel calendar object code execution
3449| [45565] Microsoft Windows Knowledge Base Article 956390 update is not installed
3450| [45564] Microsoft Internet Explorer uninitialized memory code execution
3451| [45563] Microsoft Internet Explorer componentFromPoint() code execution
3452| [45562] Microsoft Internet Explorer event handling cross-domain security bypass
3453| [45561] Microsoft Windows Knowledge Base Article 957095 update is not installed
3454| [45560] Microsoft Windows SMB file name buffer underflow
3455| [45558] Microsoft Internet Explorer HTML cross-domain security bypass
3456| [45557] Microsoft Windows Knowledge Base Article 955218 update is not installed
3457| [45556] Microsoft IAS Helper COM ActiveX control denial of service
3458| [45555] Microsoft XML Core Services chunked transfer-encoding headers information disclosure
3459| [45554] Microsoft XML Core Services DTD information disclosure
3460| [45550] Microsoft Windows Knowledge Base Article 957699 update is not installed
3461| [45548] Microsoft Windows Knowledge Base Article 953155 update is not installed
3462| [45546] Microsoft Office Content-Disposition cdo:// protocol cross-site scripting
3463| [45545] Microsoft Windows Internet Printing Protocol code execution
3464| [45544] Microsoft Windows Knowledge Base Article 954211 update is not installed
3465| [45543] Microsoft Windows kernel input privilege escalation
3466| [45542] Microsoft Windows kernel system calls privilege escalation
3467| [45541] Microsoft Windows kernel new window privilege escalation
3468| [45538] Microsoft Windows Knowledge Base Article 951071 update is not installed
3469| [45537] Microsoft Message Queuing RPC code execution
3470| [45464] Microsoft Windows XP GDI+ .ICO denial of service
3471| [45463] Microsoft Windows Mobile bluetooth device name denial of service
3472| [45420] Microsoft WordPad .doc denial of service
3473| [45225] Microsoft Internet Explorer PNG file denial of service
3474| [45214] Microsoft Visio installed
3475| [45211] Microsoft Project installed
3476| [45209] Microsoft Windows Media Player installed
3477| [45208] Microsoft Office installed
3478| [45207] Microsoft Internet Explorer installed
3479| [45186] Microsoft SQL Server 2000 SQLVDIRLib.SQLVDirControl ActiveX control buffer overflow
3480| [45146] Microsoft Windows WRITE_ANDX SMB packet denial of service
3481| [45015] Microsoft Windows Image Aquisition Logger ActiveX control file overwrite
3482| [44993] Microsoft Organization Chart code execution
3483| [44775] PureMessage for Microsoft Exchange PMScanner.exe denial of service
3484| [44743] Microsoft ASP.NET ValidateRequest "
3485| [44741] Microsoft ASP.NET ValidateRequest "
3486| [44727] Microsoft Windows Knowledge Base Article 956391 update not installed
3487| [44716] Microsoft Windows Knowledge Base Article 954593 update not installed
3488| [44715] Microsoft Windows GDI+ BMP header buffer overflow
3489| [44714] Microsoft Windows GDI+ WMF buffer overflow
3490| [44713] Microsoft Windows GDI+ GIF index parsing buffer overflow
3491| [44711] Microsoft Windows GDI+ EMF code execution
3492| [44710] Microsoft Windows GDI+ VML gradient buffer overflow
3493| [44708] Microsoft Windows Knowledge Base Article 955047 update not installed
3494| [44707] Microsoft Office OneNote file Uniform Resource Locator code execution
3495| [44705] Microsoft Windows Knowledge Base Article 956695 update not installed
3496| [44704] Microsoft Host Integration Server SNA RPC code execution
3497| [44703] Microsoft Windows Knowledge Base Article 954156 update not installed
3498| [44700] Microsoft Windows Media Encoder wmex.dll ActiveX control buffer overflow
3499| [44625] Microsoft Windows ATL Load() code execution
3500| [44486] GnuTLS gnutls_handshake.c code execution
3501| [44444] Microsoft Visual Studio Masked Edit ActiveX control buffer overflow
3502| [44423] Microsoft Windows nslookup.exe code execution
3503| [44106] Microsoft Windows Knowledge Base Article 953839 update not installed
3504| [44099] Microsoft Windows Knowledge Base Article 953838 update not installed
3505| [44098] Microsoft Internet Explorer print preview argument code execution
3506| [44097] Microsoft Internet Explorer table layout code execution
3507| [44096] Microsoft Internet Explorer XHTML object code execution
3508| [44095] Microsoft Internet Explorer object access code execution
3509| [44094] Microsoft Internet Explorer uninitialized memory code execution
3510| [44093] Microsoft Internet Explorer uninitialized memory code execution
3511| [44092] Microsoft Windows Knowledge Base Article 954066 update not installed
3512| [44091] Microsoft Excel COUNTRY record value code execution
3513| [44090] Microsoft Excel FORMAT array index code execution
3514| [44089] Microsoft Excel chart AxesSet array index code execution
3515| [44088] Microsoft Excel credential caching unauthorized data access
3516| [44087] Microsoft Windows Knowledge Base Article 953733 update not installed
3517| [44086] Microsoft Windows IPSec policy information disclosure
3518| [44085] Microsoft Windows Knowledge Base Article 952954 update not installed
3519| [44084] Microsoft Image Color Management InternalOpenColorProfile() buffer overflow
3520| [44083] Microsoft Windows Knowledge Base Article 954154 update not installed
3521| [44082] Microsoft Windows Media Player sampling rate SSPL buffer overflow
3522| [44081] Microsoft Windows Knowledge Base Article 955048 update not installed
3523| [44080] Microsoft Windows Knowledge Base Article 955617 update not installed
3524| [44079] Microsoft Windows Knowledge Base Article 950974 update not installed
3525| [44078] Microsoft Event System index range code execution
3526| [44077] Microsoft Event System user subscriptions code execution
3527| [44069] Microsoft PowerPoint Viewer picture array index memory calculation code execution
3528| [44066] Microsoft PowerPoint Viewer CString object integer overflow
3529| [43950] Microsoft Internet Explorer cookie dot session hijacking
3530| [43869] F-PROT Antivirus Microsoft Office file denial of service
3531| [43676] Microsoft Internet Explorer frame String security bypass
3532| [43663] Microsoft Word record parsing code execution
3533| [43627] Microsoft Crypto API Certificate Revocation List (CRL) information disclosure
3534| [43613] Microsoft Snapshot Viewer ActiveX control code execution
3535| [43467] Microsoft Internet Explorer frame Object security bypass
3536| [43366] Microsoft Internet Explorer location and location.href security bypass
3537| [43354] Microsoft Office WPG image filter buffer overflow
3538| [43353] Microsoft Office BMP image filter buffer overflow
3539| [43352] Microsoft Office PICT bits_per_pixel buffer overflow
3540| [43340] Microsoft Windows Knowledge Base Article 950582 update not installed
3541| [43339] Microsoft Windows Explorer saved search file code execution
3542| [43336] Microsoft Windows Knowledge Base Article 953230 update not installed
3543| [43335] Microsoft Windows DNS Server cache poisoning
3544| [43330] Microsoft Windows Knowledge Base Article 953747 update not installed
3545| [43329] Microsoft Exchange Outlook Web Access HTML cross-site scripting
3546| [43328] Microsoft Exchange Outlook Web Access email fields cross-site scripting
3547| [43180] Microsoft Visual Basic Enterprise Edition vb6stkit.dll buffer overflow
3548| [43155] Microsoft Word unordered list code execution
3549| [42899] Microsoft IIS HTTP request smuggling
3550| [42887] Microsoft Windows Installer msiexec.exe GUID buffer overflow
3551| [42836] Cisco ASA and Cisco PIX Transport Layer Security (TLS) denial of service
3552| [42804] Microsoft Internet Explorer setRequestHeader chunk security bypass
3553| [42765] Apple Safari Microsoft Windows code execution
3554| [42701] Microsoft Windows Knowledge Base Article 950760 update not installed
3555| [42699] Microsoft Windows Vista speech recognition (sapi.dll) command execution
3556| [42697] Microsoft Windows Knowledge Base Article 950762 update not installed
3557| [42696] Microsoft Windows PGM fragment option denial of service
3558| [42695] Microsoft Windows PGM option length denial of service
3559| [42693] Microsoft Windows Knowledge Base Article 950759 update not installed
3560| [42692] Microsoft Internet Explorer substringData() buffer overflow
3561| [42691] Microsoft Windows Knowledge Base Article 949785 update not installed
3562| [42690] Microsoft PowerPoint list parsing code execution
3563| [42689] Microsoft Windows Knowledge Base Article 951066 update not installed bluetooth
3564| [42685] Microsoft Windows Knowledge Base Article 951376 update not installed
3565| [42684] Microsoft Windows Knowledge Base Article 948745 update not installed
3566| [42683] Microsoft WINS network packet source privilege escalation
3567| [42682] Microsoft Windows Bluetooth SDP code execution
3568| [42679] Microsoft Outlook Express MHTML information disclosure
3569| [42677] Microsoft Windows Knowledge Base Article 955702 update not installed
3570| [42676] Microsoft Windows Messenger ActiveX control information disclosure
3571| [42675] Microsoft Windows Knowledge Base Article 951698 update not installed
3572| [42674] Microsoft Windows DirectX SAMI buffer overflow
3573| [42672] Microsoft Windows Knowledge Base Article 953235 update not installed
3574| [42668] Microsoft Windows Active Directory LDAP request denial of service
3575| [42533] GnuTLS _gnutls_ciphertext2compressed() buffer overflow
3576| [42532] GnuTLS _gnutls_server_name_recv_params() buffer overflow
3577| [42530] GnuTLS _gnutls_recv_client_kx_message() denial of service
3578| [42416] Microsoft Internet Explorer "
3579| [42358] Microsoft Windows I2O Utility Filter driver (i2omgmt.sys) code execution
3580| [42338] Microsoft Internet Explorer res:// URI info disclosure
3581| [42334] Microsoft Windows CE JPEG and GIF code execution
3582| [42307] Microsoft Internet Explorer DisableCachingOfSSLPages weak security
3583| [42301] Microsoft OWA (Outlook Web Access) no-store information disclosure
3584| [42232] Microsoft Internet Explorer ActiveX string concatenation denial of service
3585| [42109] Microsoft Windows Knowledge Base Article 952044 update not installed
3586| [42108] Microsoft Malware Protection Engine data structure denial of service
3587| [42107] Microsoft Malware Protection Engine file denial of service
3588| [42103] Microsoft Windows Knowledge Base Article 951208 update not installed
3589| [42102] Microsoft Publisher object handler code execution
3590| [42101] Microsoft Windows Knowledge Base Article 951207 update not installed
3591| [42100] Microsoft Word malformed CSS code execution
3592| [42099] Microsoft Word .rtf string code execution
3593| [42095] Microsoft Windows Knowledge Base Article 950749 update not installed
3594| [41940] Microsoft HeartbeatCtl ActiveX control buffer overflow
3595| [41934] Microsoft SharePoint Services Picture Source cross-site scripting
3596| [41880] Microsoft Windows MSDTC privilege escalation
3597| [41876] Microsoft Works ActiveX control (WkImgSrv.dll) code execution
3598| [41826] Microsoft Visual InterDev .SLN file Project line buffer overflow
3599| [41481] Microsoft Windows Knowledge Base Article 945553 update not installed
3600| [41480] Microsoft Windows DNS client spoofing
3601| [41477] Microsoft Windows Knowledge Base Article 947864 update not installed
3602| [41476] Microsoft Internet Explorer data stream code execution
3603| [41473] Microsoft Windows Knowledge Base Article 948590 update not installed
3604| [41472] Microsoft Windows GDI EMF filename parameter buffer overflow
3605| [41471] Microsoft Windows GDI EMF and WMF header buffer overflow
3606| [41470] Microsoft Windows Knowledge Base Article 941693 update not installed
3607| [41469] Microsoft Windows kernel usermode privilege escalation
3608| [41465] Microsoft Windows Knowledge Base Article 948881 update not installed
3609| [41464] Microsoft Internet Explorer hxvz.dll object code execution
3610| [41463] Microsoft Windows Knowledge Base Article 941203 update not installed
3611| [41462] Microsoft SQL Server memory INSERT statement buffer overflow
3612| [41461] Microsoft SQL Server stored backup file data structure buffer overflow
3613| [41460] Microsoft SQL Server convert() buffer overflow
3614| [41459] Microsoft SQL Server memory page reuse information disclosure
3615| [41453] Microsoft Windows Knowledge Base Article 949032 update not installed
3616| [41452] Microsoft Visio file memory allocation code execution
3617| [41451] Microsoft Visio object header code execution
3618| [41448] Microsoft Windows Knowledge Base Article 950183 update not installed
3619| [41447] Microsoft Project file memory allocation code execution
3620| [41411] Microsoft Internet Explorer setRequestHeader security bypass
3621| [41380] Microsoft Jet Database Engine Word file buffer overflow
3622| [41349] Microsoft Windows AutoPlay NoDriveTypeAutoRun weak security
3623| [41338] Microsoft Internet Explorer CreateTextRange method denial of service
3624| [41147] Microsoft Internet Explorer FTP command execution
3625| [41057] Microsoft Internet Explorer Java and XML information disclosure
3626| [40937] Microsoft Windows Knowledge Base Article 815495 update not installed
3627| [40889] Microsoft Windows Knowledge Base Article 949030 update not installed
3628| [40888] Microsoft Office file allocation error code execution
3629| [40887] Microsoft Office Excel file cell parsing code execution
3630| [40886] Microsoft Windows Knowledge Base Article 949031 update not installed
3631| [40884] Microsoft Outlook mailto URI code execution
3632| [40879] Microsoft Windows Knowledge Base Article 949029 update not installed
3633| [40878] Microsoft Excel conditioning formatting code execution
3634| [40877] Microsoft Excel rich text code execution
3635| [40876] Microsoft Excel formula calcuation code execution
3636| [40875] Microsoft Excel Style record data code execution
3637| [40874] Microsoft Excel .slk file import code execution
3638| [40873] Microsoft Excel data validation code execution
3639| [40735] Microsoft Internet Explorer danim.dll and lmrt.dll unspecified
3640| [40693] Microsoft Windows Video Controller ActiveX Library for streaming video (msvidctl.dll) buffer overflow
3641| [40579] Microsoft Active Directory unspecified denial of service
3642| [40577] Microsoft Internet Explorer files denial of service
3643| [40400] Microsoft DirectSpeechSynthesis Module ActiveX control buffer overflow
3644| [40319] Microsoft Internet Explorer certificate spoofing
3645| [40316] Microsoft Works Converter section header index table information code execution
3646| [40314] Microsoft Publisher .pub invalid memory index code execution
3647| [40302] Microsoft MN-500 wireless base station configuration file information disclosure
3648| [40286] Microsoft Internet Explorer src attribute denial of service
3649| [40283] Microsoft Internet Explorer style attribute denial of service
3650| [40103] Microsoft Windows Knowledge Base Article 946538 update not installed
3651| [40102] Microsoft Windows Active Directory LDAP request denial of service
3652| [40101] Microsoft Windows Knowledge Base Article 947077 update not installed
3653| [40100] Microsoft Word malformed string code execution
3654| [40099] Microsoft Windows Knowledge Base Article 946456 update not installed
3655| [40098] Microsoft Windows Vista DHCP denial of service
3656| [40097] Microsoft Windows Knowledge Base Article 947081 update not installed
3657| [40096] Microsoft Works Converter field length information code execution
3658| [40095] Microsoft Works Converter section length header code execution
3659| [40094] Microsoft Windows Knowledge Base Article 947085 update not installed
3660| [40092] Microsoft Publisher .pub invalid memory reference code execution
3661| [40091] Microsoft Windows Knowledge Base Article 944533 update not installed
3662| [40090] Microsoft Internet Explorer argument data handling code execution
3663| [40089] Microsoft Internet Explorer property method code execution
3664| [40088] Microsoft Internet Explorer HTML layout positioning combination code execution
3665| [40087] Microsoft Internet Explorer multiple ActiveX control denial of service
3666| [40078] Microsoft Windows Knowledge Base Article 947108 update not installed
3667| [40066] Microsoft Word object code execution
3668| [40063] Microsoft Windows Knowledge Base Article 946026 update not installed
3669| [40062] Microsoft Windows WebDAV Mini-Redirector buffer overflow
3670| [40059] Microsoft Windows Knowledge Base Article 944338 update not installed
3671| [40056] Microsoft Windows VBScript and JScript engines code execution
3672| [40048] Microsoft Windows Knowledge Base Article 947890 update not installed
3673| [40043] Microsoft Windows OLE script request buffer overflow
3674| [39975] Microsoft Class Package Export Tool clspack.exe buffer overflow
3675| [39773] Microsoft Visual Basic Enterprise Edition .dsr file buffer overflow
3676| [39755] Microsoft Visual InterDev .SLN buffer overflow
3677| [39699] Microsoft Excel macro handling code execution
3678| [39637] OpenBSD SIOCGIFRTLABEL ioctls denial of service
3679| [39558] Microsoft FoxServer ActiveX control command execution
3680| [39557] Microsoft Rich Textbox ActiveX control file overwrite
3681| [39453] Microsoft Windows TCP/IP Source Specific Multicasting (SSM) MLDv2 buffer overflow
3682| [39452] Microsoft Windows TCP/IP Source Specific Multicasting (SSM) IGMPv3 buffer overflow
3683| [39254] Microsoft Windows TCP/IP ICMP denial of service
3684| [39238] Microsoft Windows Knowledge Base Article 941644 update not installed
3685| [39237] Microsoft Windows Knowledge Base Article 942831 update not installed
3686| [39236] Microsoft Windows Knowledge Base Article 943485 update not installed
3687| [39235] Microsoft IIS root folders file change notification privilege escalation
3688| [39233] Microsoft Windows LSASS LPC privilege escalation
3689| [39232] Microsoft Windows Knowledge Base Article 942830 update not installed
3690| [39230] Microsoft IIS HTML encoded ASP code execution
3691| [39209] Microsoft Word wordart denial of service
3692| [39208] Microsoft Office Publisher multiple denial of service
3693| [39161] Opera Web browser TLS certificate code execution
3694| [39113] Apple Mac OS X Microsoft Office Spotlight Importer code execution
3695| [39052] Microsoft Windows DirectX MJPEG decoder code execution
3696| [39021] Microsoft Office XML document weak security
3697| [38883] Microsoft Optical Desktop information disclosure
3698| [38865] Cisco Security Agent for Microsoft Windows SMB buffer overflow
3699| [38850] Microsoft Windows CryptGenRandom information disclosure
3700| [38830] Microsoft Windows Media File Format Stream Property error correction buffer overflow
3701| [38829] Microsoft Windows Media File Format Stream Property error correction and type-specific buffer overflow
3702| [38828] Microsoft Windows Media File Format audio_conceal_none buffer overflow
3703| [38827] Microsoft Windows Media File Format Degradable JPEG Media Stream buffer overflow
3704| [38826] Microsoft Internet Explorer WPAD information disclosure
3705| [38797] Microsoft Windows Media Player AIFF denial of service
3706| [38730] Microsoft Windows Knowledge Base Article 943078 update not installed
3707| [38729] Microsoft Windows Vista kernel ALPC privilege escalation
3708| [38728] Microsoft Windows Knowledge Base Article 944653 update not installed
3709| [38726] Microsoft Windows Knowledge Base Article 942624 update not installed
3710| [38725] Microsoft Windows Vista SMBv2 signing code execution
3711| [38723] Microsoft Windows Knowledge Base Article 941568 update not installed
3712| [38722] Microsoft DirectX DirectShow WAV and AVI code execution
3713| [38721] Microsoft DirectX DirectShow SAMI code execution
3714| [38717] Microsoft Windows Knowledge Base Article 942615 update not installed
3715| [38716] Microsoft Internet Explorer DHTML object code execution
3716| [38715] Microsoft Internet Explorer element tag code execution
3717| [38714] Microsoft Internet Explorer cloneNode and nodeValue code execution
3718| [38713] Microsoft Internet Explorer ActiveX setExpression code execution
3719| [38711] Microsoft Windows Knowledge Base Article 941569 update not installed
3720| [38499] Microsoft Jet Database Engine MDB file buffer overflow
3721| [38444] VTLS Web Gateway vtls.web.gateway.cgi cross-site scripting
3722| [38440] Microsoft Forms ActiveX control denial of service
3723| [38432] Microsoft SAFRCFileDlg.RASetting ActiveX control buffer overflow
3724| [38430] Microsoft Office Web Component OWC11.DataSourceControl ActiveX denial of service
3725| [38336] Microsoft Internet Explorer DNS same-origin policy security bypass
3726| [38324] Microsoft Outlook and Outlook Express URI handling command execution
3727| [38315] Microsoft Windows Knowledge Base Article 943460 update not installed
3728| [38292] Microsoft Sysinternals DebugView privilege escalation
3729| [37284] Microsoft Windows Macrovision secdrv.sys driver buffer overflow
3730| [37261] Microsoft Internet Explorer .exe file download warning bypass
3731| [37260] Cisco Adaptive Security Appliance (ASA) and PIX security appliances TLS denial of service
3732| [37249] Microsoft Windows Mobile SMS sender field obfuscation
3733| [37236] Microsoft SQL Slammer patch not installed
3734| [37230] Microsoft SQL Server MS00-092 patch not installed
3735| [37229] Microsoft SQL Server MS02-043 patch not installed
3736| [37228] Microsoft SQL Server MS02-034 patch not installed
3737| [37226] Microsoft Windows Knowledge Base Article 815495 update not installed
3738| [37223] Microsoft ActiveSync weak XOR encryption
3739| [37200] Microsoft SQL Server 2000 Service Pack 1 update is not installed
3740| [37198] Microsoft SQL Server 2000 Service Pack 3 update is not installed
3741| [37185] OpenSSL DTLS implementation code execution
3742| [37162] RHSA update for FreeRADIUS EAP-TTLS tunnel denial of service not installed
3743| [37044] Microsoft Expression Media password information disclosure
3744| [37035] Microsoft Visual FoxPro FPOLE.OCX ActiveX FoxDoCmd command execution
3745| [36980] Microsoft Windows Explorer PNG file denial of service
3746| [36965] Hitachi Cosminexus SSL/TLS handshake JSSE denial of service
3747| [36961] Microsoft Windows Explorer extended attributes multiple buffer overflows
3748| [36953] Microsoft DirectX Media SDK traffic detected
3749| [36848] Microsoft Internet Explorer OnKeyDown information disclosure
3750| [36819] Microsoft Windows Knowledge Base Article 939653 update not installed
3751| [36818] Microsoft Internet Explorer address bar spoofing
3752| [36817] Microsoft Internet Explorer script error code execution
3753| [36812] Microsoft Windows Knowledge Base Article 941202 update not installed
3754| [36811] Microsoft Outlook Express and Windows Mail NNTP response code execution
3755| [36807] Microsoft Windows Knowledge Base Article 933729 update not installed
3756| [36806] Microsoft Windows Knowledge Base Article 941672 update not installed
3757| [36805] Microsoft Windows DNS spoofing information disclosure
3758| [36804] Microsoft Windows Knowledge Base Article 942695 update not installed
3759| [36803] Microsoft Windows RPC NTLMSSP authentication denial of service
3760| [36801] Microsoft Word document workspace code execution
3761| [36800] Microsoft Windows Knowledge Base Article 923810 update not installed
3762| [36799] Microsoft Windows Kodak image Viewer code execution
3763| [36715] Microsoft Internet Security and Acceleration (ISA) Server SOCKS4 information disclosure
3764| [36676] Mozilla Firefox TLS certificate information disclosure
3765| [36662] Microsoft Windows Media Player meta file security bypass
3766| [36608] Microsoft Windows MFC ActiveX FindFile() buffer overflow
3767| [36572] Microsoft Visual Studio PDWizard ActiveX control code execution
3768| [36571] Microsoft Visual Studio VB To VSI Support Library ActiveX control file overwrite
3769| [36562] Microsoft Visual Basic .VBP file buffer overflow
3770| [36537] Microsoft MSN Messenger video request detected
3771| [36509] Microsoft SQL Server sqldmo.dll ActiveX buffer overflow
3772| [36496] Microsoft Visual FoxPro FPOLE.OCX ActiveX control buffer overflow
3773| [36494] Microsoft Internet Explorer saved pages cross-site scripting
3774| [36490] Microsoft Windows Knowledge Base Article 942099 update not installed
3775| [36455] HTML Microsoft Agent ActiveX detected
3776| [36381] Microsoft Windows Knowledge Base Article 939778 update not installed
3777| [36378] Microsoft Windows UNIX services setuid binary privilege escalation
3778| [36376] Microsoft Windows Knowledge Base Article 941522 update not installed
3779| [36351] Microsoft Internet Explorer with SeaMonkey command execution
3780| [36314] Microsoft MSN Messenger video conversations buffer overflow
3781| [36128] Microsoft Internet Explorer position:relative HTML style code denial of service
3782| [36027] Microsoft Internet Explorer ActiveX popup blocker denial of service
3783| [36003] Microsoft Internet Explorer Netscape command execution
3784| [35974] Microsoft Internet Explorer FTP username and password information disclosure
3785| [35970] Microsoft DirectX Media SDK DXSurface.LivePicture.FLashPix.1 (DXTLIPI.DLL) ActiveX control buffer overflow
3786| [35919] Microsoft Windows VML detected
3787| [35902] Microsoft Windows process scheduler denial of service
3788| [35897] Microsoft Windows Vista Weather Gadget code execution
3789| [35895] Microsoft Windows Media Player skin decompression code execution
3790| [35886] Microsoft Windows ARP request denial of service
3791| [35878] Microsoft Windows Media Player .AU file denial of service
3792| [35855] Microsoft Register Server DLL file denial of service
3793| [35853] Microsoft Windows Vista kernel unspecified vulnerability
3794| [35816] Microsoft Windows Knowledge Base Article 940965 update not installed
3795| [35815] Microsoft Excel index value attributes code execution
3796| [35802] Microsoft Windows Vista Calendar ICS denial of service
3797| [35771] Microsoft Windows Vista Contacts Gadget code execution
3798| [35770] Microsoft Windows Vista Feed Headlines Gadget code execution
3799| [35766] Microsoft Windows Knowledge Base Article 937894 update not installed
3800| [35764] Microsoft Message Queuing Service buffer overflow
3801| [35762] Microsoft Windows Knowledge Base Article 938127 update not installed
3802| [35761] Microsoft Windows VML vgx.dll buffer overflow
3803| [35760] Microsoft Windows Knowledge Base Article 937143 update not installed
3804| [35759] Microsoft Internet Explorer pdwizard.ocx code execution
3805| [35755] Microsoft Internet Explorer tblinf32.dll code execution
3806| [35753] Microsoft Windows Knowledge Base Article 938827 update not installed
3807| [35752] Microsoft Agent ActiveX control buffer overflow
3808| [35749] Microsoft Internet Explorer CSS string code execution
3809| [35746] Microsoft Windows Knowledge Base Article 938829 update not installed
3810| [35745] Microsoft Windows GDI WMF image code execution
3811| [35742] Microsoft Windows Knowledge Base Article 936782 update not installed
3812| [35741] Microsoft Windows Media Player skin parsing buffer overflow
3813| [35739] Microsoft Windows Knowledge Base Article 942017 update not installed
3814| [35582] Microsoft Windows URI protocol handling command execution
3815| [35538] Microsoft Windows Explorer GIF denial of service
3816| [35492] Microsoft DirectX Targa buffer overflow
3817| [35479] libcurl GnuTLS weak security
3818| [35455] Microsoft Internet Explorer Zone domain name denial of service
3819| [35421] Microsoft Internet Explorer document.open address bar spoofing
3820| [35397] Microsoft Windows Vista USER32.DLL denial of service
3821| [35346] Microsoft Internet Explorer FirefoxURL command execution
3822| [35333] Sun Java Secure Socket Extension (JSSE) SSL/TLS handshake denial of service
3823| [35322] Microsoft Windows Vista firewall information disclosure
3824| [35315] Microsoft Internet Explorer history.length information disclosure
3825| [35219] Microsoft Windows Knowledge Base Article 936542 update is not installed
3826| [35217] Microsoft Excel Workspace designation code execution
3827| [35216] Microsoft Windows Knowledge Base Article 933103 update not installed
3828| [35215] Microsoft Excel active worksheet code execution
3829| [35213] Microsoft Office Web Components DataSourceControl object code execution
3830| [35212] Microsoft Office Web Components Spreadsheet object code execution
3831| [35210] Microsoft Excel version code execution
3832| [35206] Microsoft Windows Knowledge Base Article 939373 update is not installed
3833| [35202] Microsoft Windows Knowledge Base Article 935807 update not installed
3834| [35199] Microsoft Windows Knowledge Base Article 936227 update not installed
3835| [35197] Microsoft Internet Information Services URL parser buffer overflow
3836| [35195] Microsoft XML Core Services (MSXML) memory request code execution
3837| [35190] Microsoft Windows Knowledge Base Article 936548 update not installed
3838| [35183] Microsoft Windows Knowledge Base Article 937986 update not installed
3839| [35182] Microsoft Virtual PC and Virtual Server guest operating system buffer overflow
3840| [35181] Microsoft Windows Knowledge Base Article 926122 update is not installed
3841| [35180] Microsoft Windows Active Directory LDAP denial of service
3842| [35179] Microsoft Windows Active Directory LDAP attribute buffer overflow
3843| [35163] Microsoft Internet Explorer file: URI information disclosure
3844| [35153] Microsoft Internet Explorer FTP implementation information disclosure
3845| [35132] Microsoft Excel sheet name buffer overflow
3846| [35064] Microsoft MSN Messenger SIP weak security
3847| [35059] Microsoft Windows TCP/IP Source Specific Multicasting (SSM) multiple buffer overflows
3848| [34989] Microsoft Internet Explorer resource:// information disclosure
3849| [34867] Microsoft Internet Explorer IDN authentication dialog spoofing
3850| [34849] Microsoft Office MSODataSourceControl ActiveX control buffer overflow
3851| [34755] Microsoft Internet Explorer Outlook Express Address Book object denial of service
3852| [34754] Microsoft Internet Explorer MSHtmlPopupWindow object denial of service
3853| [34743] Microsoft Windows GDI+ denial of service
3854| [34720] Microsoft FrontPage Personal Web Server CERN Image Map Dispatcher buffer overflow
3855| [34719] Microsoft FrontPage CERN Image Map Dispatcher information disclosure
3856| [34705] Microsoft Internet Explorer location URL spoofing
3857| [34696] Microsoft Internet Explorer page update cross-domain security bypass
3858| [34669] Linux kernel VFAT IOCTLs denial of service
3859| [34650] Microsoft Internet Explorer Javascript src attribute denial of service
3860| [34648] Microsoft Windows Knowledge Base Article 935839 update not installed
3861| [34645] Microsoft Windows Win32 API code execution
3862| [34642] Microsoft Windows Knowledge Base Article 935840 update not installed
3863| [34640] Microsoft Windows Knowledge Base Article 931212 update not installed .NET
3864| [34639] Microsoft .NET Framework JIT Compiler service buffer overflow
3865| [34638] Microsoft .NET Framework NULL byte termination information disclosure
3866| [34637] Microsoft .NET Framework PE Loader service buffer overflow
3867| [34634] Microsoft Windows Server 2003 Active Directory information disclosure
3868| [34633] Microsoft Windows Knowledge Base Article 933566 update not installed
3869| [34632] Microsoft Internet Explorer navigation cancel page spoofing
3870| [34630] Microsoft Internet Explorer Speech API ActiveX control code execution
3871| [34626] Microsoft Internet Explorer uninitialized object code execution
3872| [34624] Microsoft Windows Knowledge Base Article 929123 update not installed
3873| [34623] Microsoft Windows MHTML Content-Disposition information disclosure
3874| [34622] Microsoft Windows MHTML URL redirect information disclosure
3875| [34621] Microsoft Internet Explorer multiple language packs code execution
3876| [34619] Microsoft Internet Explorer CSS tag code execution
3877| [34618] Microsoft Windows Vista ACL user credentials information disclosure
3878| [34611] Microsoft Windows Knowledge Base Article 927051 update not installed
3879| [34610] Microsoft Visio compressed document packaging code execution
3880| [34607] Microsoft Visio version number code execution
3881| [34600] Microsoft VDT Database Designer VDT70.DLL ActiveX control buffer overflow
3882| [34599] Microsoft Windows Server 2003 terminal server security bypass
3883| [34564] PureTLS Extensions and Algorithm.Parameters value information disclosure
3884| [34476] Microsoft Visual Basic Company Name buffer overflow
3885| [34475] Microsoft Visual Basic project detail buffer overflow
3886| [34473] Microsoft Office 2000 ActiveX control buffer overflow
3887| [34444] Microsoft Windows unspecified code execution
3888| [34434] Microsoft IIS Hit-highlighting security bypass
3889| [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
3890| [34343] Microsoft SharePoint Server default.aspx PATH_INFO cross-site scripting
3891| [34032] Microsoft Windows Knowledge Base Article 935966 update not installed
3892| [33978] Microsoft Internet Explorer LF response splitting
3893| [33959] Microsoft Windows Virtual DOS Machine (VDM) VdmpInitialize privilege escalation
3894| [33916] Microsoft Windows Knowledge Base Article 934233 update not installed
3895| [33915] Microsoft Excel autofilter code execution
3896| [33914] Microsoft Excel placeholder data code execution
3897| [33913] Microsoft Excel BIFF file format buffer overflow
3898| [33909] Microsoft Windows Knowledge Base Article 934873 update not installed
3899| [33908] Microsoft Office drawing object code execution
3900| [33902] Microsoft Windows Knowledge Base Article 934232 update not installed
3901| [33901] Microsoft Word RTF parsing code execution
3902| [33899] Microsoft Word function call code execution
3903| [33891] Microsoft Windows Knowledge Base Article 931832 update not installed
3904| [33890] Microsoft Exchange IMAP command denial of service
3905| [33889] Microsoft Exchange MIME base64 code execution
3906| [33888] Microsoft Exchange iCal MODPROPS denial of service
3907| [33887] Microsoft Exchange UTF character set cross-site scripting
3908| [33715] Microsoft Internet Explorer unspecified JavaScript denial of service
3909| [33713] Microsoft Word 2007 multiple unspecified denial of service
3910| [33712] Microsoft Word 2007 wwlib.dll buffer overflow
3911| [33667] Microsoft Windows unspecified buffer overflow
3912| [33643] FreeRADIUS EAP-TTLS tunnel denial of service
3913| [33629] Microsoft Windows DNS Server RPC interface buffer overflow
3914| [33473] Microsoft Windows dynamic DNS update unauthorized access
3915| [33447] Microsoft security updates not available for version of Microsoft Data Access Components
3916| [33446] Microsoft security updates not available for Microsoft Internet Explorer version
3917| [33415] Microsoft Internet Explorer JavaScript DNS pinning code execution
3918| [33410] Microsoft Windows Vista LLTD Mapper host spoofing
3919| [33409] Microsoft Windows Vista LLTD Mapper bridge spoofing
3920| [33401] Microsoft Windows Vista LLTD Responder host spoofing
3921| [33399] Microsoft Windows Vista LLTD Mapper denial of service
3922| [33398] Microsoft Windows Vista Teredo address weak security
3923| [33396] Microsoft Windows Vista Meeting Space weak security
3924| [33395] Microsoft Windows Vista nonce spoofing
3925| [33394] Microsoft Windows Vista Neighbor Advertisements spoofing
3926| [33393] Microsoft Windows Vista ARP denial of service
3927| [33355] Microsoft Internet Explorer msauth.dll code execution
3928| [33317] Microsoft Internet Explorer UTF-7 encoded URL cross-site scripting
3929| [33301] Microsoft Windows animated cursor (ANI) buffer overflow
3930| [33300] Microsoft Windows Vista atikmdag.sys slideshow denial of service
3931| [33272] Microsoft Windows Vista CSRSS CsrFinalizeContext privilege escalation
3932| [33271] Microsoft Windows Knowledge Base Article 931784 update not installed
3933| [33270] Microsoft Windows kernel VDM mapped memory privilege escalation
3934| [33269] Microsoft Windows Knowledge Base Article 931261 update not installed
3935| [33268] Microsoft Windows Universal Plug and Play HTTP buffer overflow
3936| [33267] Microsoft Windows Knowledge Base Article 932168 update not installed
3937| [33266] Microsoft Windows Knowledge Base Article 925902 update not installed
3938| [33265] Microsoft Agent ActiveX control Character.Load() code execution
3939| [33264] Microsoft Windows TrueType Fonts rasterizer privilege escalation
3940| [33263] Microsoft Windows GDI color parameter buffer overflow
3941| [33261] Microsoft Windows GDI window size privilege escalation
3942| [33259] Microsoft Windows GDI EMF image buffer overflow
3943| [33258] Microsoft Windows GDI WMF image denial of service
3944| [33257] Microsoft Windows Knowledge Base Article 931768 update not installed
3945| [33256] Microsoft Internet Explorer HTML object freed memory code execution variant
3946| [33255] Microsoft Internet Explorer HTML object freed memory code execution
3947| [33254] Microsoft Internet Explorer CSS text style code execution
3948| [33253] Microsoft Internet Explorer HTML object uninitialized array member code execution
3949| [33252] Microsoft Internet Explorer chtskdic.dll COM object code execution
3950| [33244] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) information disclosure
3951| [33225] Microsoft Windows Media File Format ASF multiple buffer overflows
3952| [33167] Microsoft Windows Vista Mail Client code execution
3953| [33118] Microsoft Windows XP winmm.dll denial of service
3954| [33117] Microsoft Windows MFC AfxOleSetEditMenu() buffer overflow
3955| [33086] Microsoft Windows Ndistapi.sys driver denial of service
3956| [33071] Tor TLS weak security
3957| [33041] Microsoft Excel XML and XLS file denial of service
3958| [33039] Microsoft Office WMF file denial of service
3959| [33037] Microsoft Windows Explorer WMF file denial of service
3960| [32939] Microsoft Internet Explorer resizeTo denial of service
3961| [32921] Microsoft Windows ole32.dll library denial of service
3962| [32907] Microsoft Xbox 360 hypervisor code execution
3963| [32906] Microsoft Xbox 360 hypervisor security bypass
3964| [32831] Microsoft Internet Explorer BrowseDialog ActiveX control denial of service
3965| [32808] Microsoft Windows Shell User Logon ActiveX control shgina.dll unauthorized access
3966| [32769] Microsoft Publisher .pub file memory validation code execution
3967| [32740] Microsoft Windows Knowledge Base Article 931906 update not installed
3968| [32739] Microsoft Capicom Certificates ActiveX control code execution
3969| [32738] Microsoft Windows Knowledge Base Article 925939 update not installed
3970| [32737] Microsoft Content Management Server (MCMS) HTTP request cross-site scripting
3971| [32736] Microsoft Content Management Server (MCMS) HTTP GET code execution
3972| [32689] Putmail TLS password plaintext
3973| [32649] Microsoft Internet Explorer onUnload handler URL spoofing
3974| [32647] Microsoft Internet Explorer onUnload handler denial of service
3975| [32644] Microsoft Windows ReadDirectoryChangesW information disclosure
3976| [32631] Microsoft SQL Server 2000 Service Pack 2 update is not installed
3977| [32503] Microsoft Word document malformed string code execution
3978| [32457] Microsoft Internet Explorer getElementById denial of service
3979| [32454] Microsoft Visual Studio time functions denial of service
3980| [32427] Microsoft Internet Explorer COM ActiveX object code execution
3981| [32419] Microsoft Windows Knowledge Base Article 932554 update not installed
3982| [32404] Microsoft Knowledge Base Article 905495 is not installed
3983| [32403] Microsoft Knowledge Base Article 905414 is not installed
3984| [32394] Microsoft Windows Mobile Internet Explorer WML page denial of service
3985| [32355] RHSA-2006:0680 updates for gnutls not installed
3986| [32282] Microsoft Windows Knowledge Base Article 927802 update not installed
3987| [32280] Microsoft Windows Image Acquisition service buffer overflow
3988| [32210] RHSA-2006:0207 updates for gnutls not installed
3989| [32178] Microsoft Office Excel malformed record code execution
3990| [32153] Microsoft Windows permanent password detected
3991| [32116] Microsoft Windows administrator password no expiration set
3992| [32111] Microsoft Windows Knowledge Base Article 928255 update not installed
3993| [32110] Microsoft Windows Knowledge Base Article 928843 update not installed
3994| [32109] Microsoft Windows HTML Help ActiveX control code execution
3995| [32108] Microsoft Windows shell new hardware detection privilege escalation
3996| [32107] Microsoft Windows Knowledge Base Article 928090 update not installed
3997| [32106] Microsoft Internet Explorer COM object code execution
3998| [32104] Microsoft Windows Knowledge Base Article 929434 update not installed
3999| [32100] Microsoft Internet Explorer FTP response code execution
4000| [32097] Microsoft Word drawing object code execution
4001| [32096] Microsoft Word macro code execution
4002| [32095] Microsoft Internet Explorer COM object code execution
4003| [32090] Microsoft Windows Knowledge Base Article 927779 update not installed
4004| [32089] Microsoft Fronpage Extensions directory /_vti_log/ present
4005| [32078] Microsoft Fronpage Extensions directory /_vti_bin/ present
4006| [32076] Microsoft Frontpage Extensions directory /_vti_pvt/ present
4007| [32074] Microsoft IIS iissamples directory present
4008| [32071] Microsoft Windows Explorer AVI file denial of service
4009| [32002] Microsoft Windows Mobile Pictures and Videos JPEG denial of service
4010| [32001] Microsoft Windows Mobile Internet Explorer unspecified denial of service
4011| [31867] Microsoft Internet Explorer ActiveX multiple properties denial of service
4012| [31845] Microsoft Windows user account never used
4013| [31844] Microsoft Windows guest user account unchanged
4014| [31843] Microsoft Windows built-in guest account enumerated
4015| [31842] Microsoft Windows user account password unchanged
4016| [31840] Microsoft Exchange Server detected
4017| [31834] Microsoft Word document function code execution
4018| [31821] Microsoft Windows time zone update for year 2007
4019| [31814] Microsoft Internet Explorer IFRAME file URI denial of service
4020| [31675] Microsoft Internet Explorer BrowseDialog ActiveX control denial of service
4021| [31665] Microsoft Visual Studio .rc file buffer overflow
4022| [31644] Microsoft IIS Web server access.cnf file detected
4023| [31643] Microsoft HTML Help Workshop .HPJ files buffer overflow
4024| [31642] Microsoft IIS Web server service.cnf file detected
4025| [31638] Microsoft IIS Web server svcacl.cnf file detected
4026| [31630] Microsoft Internet Information Services IISAdmin directory detected
4027| [31567] Cisco CS-MARS and ASDM SSL/TLS/SSH device spoofing
4028| [31555] Microsoft HTML Help Workshop .CNT files buffer overflow
4029| [31549] Microsoft Internet Explorer CCRP Folder Treeview ActiveX control denial of service
4030| [31358] Microsoft XML Core Services IFRAME code execution
4031| [31288] Microsoft Windows Knowledge Base Article 929969 update not installed
4032| [31287] Microsoft Internet Explorer VML record buffer overflow
4033| [31264] Microsoft Windows Knowledge Base Article 930178 update not installed
4034| [31210] Microsoft Windows Knowledge Base Article 927198 update is not installed
4035| [31208] Microsoft Excel Palette record buffer overflow
4036| [31207] Microsoft Excel column record buffer overflow
4037| [31206] Microsoft Excel string buffer overflow
4038| [31205] Microsoft Excel malformed record buffer overflow
4039| [31204] Microsoft Excel IMDATA record buffer overflow
4040| [31199] Microsoft Windows Knowledge Base Article 921585 update is not installed
4041| [31196] Microsoft Office 2003 Brazilian Grammar Checker buffer overflow
4042| [31191] Microsoft Windows Knowledge Base Article 925938 update is not installed
4043| [31188] Microsoft Outlook Finder.exe .oss file buffer overflow
4044| [31187] Microsoft Outlook email long header denial of service
4045| [31186] Microsoft Outlook .iCal meeting request VEVENT buffer overflow
4046| [31176] Microsoft Windows CSRSS NtRaiseHardError() information disclosure
4047| [31127] Microsoft Antivirus engine pdf buffer overflow
4048| [31085] Microsoft Windows Workstation service NetrWkstaUserEnum denial of service
4049| [31018] Microsoft Windows CSRSS MessageBox function privilege escalation
4050| [31015] Microsoft Windows Explorer WMV file denial of service
4051| [31014] Microsoft Windows Media Player MIDI file denial of service
4052| [31011] Microsoft Internet Information Services IUSR_Machine command execution
4053| [31008] Microsoft Windows XP directory weak permission
4054| [30959] Microsoft Outlook ole32.dll ActiveX denial of service
4055| [30905] Microsoft Project Server 2003 pdsrequest.asp information disclosure
4056| [30885] Microsoft Word pointer code execution
4057| [30806] Microsoft Word data structure code execution
4058| [30757] Microsoft Windows Knowledge Base Article 926121 update not installed
4059| [30756] Microsoft Windows Remote Installation Service code execution
4060| [30738] Microsoft Word data string code execution
4061| [30717] Microsoft Windows Print Spooler denial of service
4062| [30610] Microsoft Windows Knowledge Base Article 926436 update not installed
4063| [30609] Microsoft OLE Dialog component code execution
4064| [30608] Microsoft Windows Knowledge Base Article 926255 update not installed
4065| [30607] Microsoft Windows file manifest privilege escalation
4066| [30606] Microsoft Windows Knowledge Base Article 926247 update not installed
4067| [30605] Microsoft Windows SNMP service buffer overflow
4068| [30604] Microsoft Windows Knowledge Base Article 925454 update not installed
4069| [30603] Microsoft Internet Explorer TIF folder OBJECT tag information disclosure
4070| [30602] Microsoft Internet Explorer TIF folder drag and drop information disclosure
4071| [30601] Microsoft Internet Explorer DHTML script code execution
4072| [30600] Microsoft Internet Explorer script error handling code execution
4073| [30599] Microsoft Windows Knowledge Base Article 924667 update not installed
4074| [30598] Microsoft Windows and Visual Studio MFC components RTF code execution
4075| [30597] Microsoft Windows Knowledge Base Article 923723 update not installed
4076| [30596] Microsoft Step-by-Step Interactive Training bookmark link buffer overflow
4077| [30595] Microsoft Windows Knowledge Base Article 923689 update not installed
4078| [30594] Microsoft Windows Media Player ASF processing buffer overflow
4079| [30593] Microsoft Windows Knowledge Base Article 918118 update not installed
4080| [30592] Microsoft Windows and Office Rich Edit components code execution
4081| [30591] Microsoft Windows Knowledge Base Article 925674 update not installed
4082| [30586] Microsoft Windows Media Player ASX playlist buffer overflow
4083| [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
4084| [30553] Microsoft Windows Live Messenger emoticon denial of service
4085| [30220] Microsoft Internet Explorer Phishing Filter active
4086| [30172] Microsoft Windows Knowledge Base Article 928088 update not installed
4087| [30168] Microsoft Internet Explorer ieframe.dll certificate spoofing
4088| [30042] Microsoft Windows GDI kernel privilege escalation
4089| [30004] Microsoft XMLHTTP ActiveX control code execution
4090| [29954] Microsoft Windows Knowledge Base Article 923980 update not installed
4091| [29953] Microsoft Windows Client Service for NetWare (CSNW) denial of service
4092| [29952] Microsoft Windows Client Service for NetWare (CSNW) buffer overflow
4093| [29950] Microsoft Windows Knowledge Base Article 920213 update is not installed
4094| [29949] Microsoft Windows Knowledge Base Article 924270 update not installed
4095| [29948] Microsoft Windows Workstation service NetpManageIPCConnect buffer overflow
4096| [29945] Microsoft Agent .ACF file buffer overflow
4097| [29943] Microsoft Windows Knowledge Base Article 923789 update not installed
4098| [29917] Microsoft Windows XP NAT Helper ipnathlp.dll denial of service
4099| [29915] Microsoft Visual Studio WmiScriptUtils.dll code execution
4100| [29860] Microsoft .NET Framework request filtering insecure
4101| [29837] Microsoft Internet Explorer ADODB.Connection code execution
4102| [29827] Microsoft Internet Explorer Popup Address bar spoofing
4103| [29750] Microsoft Active Directory unauthorized login attempt rejected
4104| [29749] Microsoft Active Directory security audit setup failed
4105| [29748] Microsoft Active Directory security attributes changed
4106| [29747] Microsoft Active Directory Security Descriptor Propagator terminated
4107| [29746] Microsoft Active Directory addition of replication link success
4108| [29745] Microsoft Active Directory addition of replication link failed
4109| [29744] Microsoft Active Directory replication connection created
4110| [29742] Microsoft Active Directory object operation performed
4111| [29741] Microsoft Active Directory outbound replication disabled
4112| [29740] Microsoft Active Directory host not global catalog server
4113| [29737] Microsoft Active Directory maximum LDAP connections reached
4114| [29736] Microsoft Active Directory inbound replication disabled
4115| [29735] Microsoft Active Directory calculate security descriptor failed
4116| [29733] Microsoft Active Directory write security descriptor failed
4117| [29731] Microsoft Active Directory object operation failed
4118| [29730] Microsoft Active Directory right grant attempt failed
4119| [29729] Microsoft Active Directory domain controller removal failed
4120| [29728] Microsoft Active Directory SID inherit attempt failed
4121| [29726] Microsoft Active Directory domain removed from enterprise
4122| [29725] Microsoft Active Directory database initialization failure
4123| [29724] Microsoft Active Directory certificate rejected, not trusted
4124| [29722] Microsoft Active Directory certificate replication access rejected
4125| [29713] Microsoft Internet Information Server MS01-026 patch is not installed
4126| [29680] Microsoft Internet Information Server MS01-044 patch is not installed
4127| [29670] Microsoft Internet Explorer 7 is installed
4128| [29546] Microsoft Windows 2000/2003 user logoff initiated
4129| [29545] Microsoft Windows 2000/2003 system time changed
4130| [29544] Microsoft Windows 2000/2003 system security access removed
4131| [29543] Microsoft Windows 2000/2003 security access granted
4132| [29542] Microsoft Windows 2000/2003 SAM notification package loaded
4133| [29541] Microsoft Windows 2000/2003 primary security token issued
4134| [29540] Microsoft Windows 2000/2003 user password reset successful
4135| [29539] Microsoft Windows 2000/2003 object indirectly accessed
4136| [29538] Microsoft Windows 2000/2003 object handle duplicated
4137| [29537] Microsoft Windows 2000/2003 logon with explicit credentials success
4138| [29536] Microsoft Windows 2000/2003 logon attempt using explicit credentials unsuccessful
4139| [29535] Microsoft Windows 2000/2003 IPSEC policy agent failed
4140| [29534] Microsoft Windows 2000/2003 IPSEC policy agent disabled
4141| [29533] Microsoft Windows 2000/2003 IPSEC policy agent changed
4142| [29532] Microsoft Windows 2000/2003 IKE security association established
4143| [29531] Microsoft Windows 2000/2003 IKE quick mode association ended
4144| [29530] Microsoft Windows 2000/2003 IKE main mode association ended
4145| [29529] Microsoft Windows 2000/2003 IKE association negotiation failed
4146| [29528] Microsoft Windows 2000/2003 IKE association peer authentication failed
4147| [29527] Microsoft Windows 2000/2003 IKE association failed invalid proposal
4148| [29526] Microsoft Windows 2000/2003 IKE association failed authentication parameters
4149| [29525] Microsoft Windows 2000/2003 DPAPI master key backup attempted
4150| [29524] Microsoft Windows 2000/2003 DPAPI key recovery attempted
4151| [29523] Microsoft Windows 2000/2003 DPAPI auditable data unprotected
4152| [29522] Microsoft Windows 2000/2003 administrative group security descriptor set
4153| [29521] Microsoft Windows 2000/2003 account name changed
4154| [29507] Microsoft Office 2003 unspecified PowerPoint NULL pointer dereference denial of service
4155| [29400] Microsoft Windows drmstor.dll denial of service
4156| [29373] Microsoft Windows SMB rename denial of service
4157| [29369] Microsoft Windows Knowledge Base Article 922819 update is not installed
4158| [29253] Microsoft Windows error report transmission detected
4159| [29243] Microsoft Windows Knowledge Base Article 924164 update is not installed
4160| [29242] Microsoft Excel COLINFO code execution
4161| [29239] Microsoft Excel Lotus 1-2-3 file buffer overflow
4162| [29238] Microsoft Excel DATETIME buffer overflow
4163| [29236] Microsoft Windows Knowledge Base Article 924163 update is not installed
4164| [29234] Microsoft PowerPoint bit record code execution
4165| [29233] Microsoft PowerPoint data record code execution
4166| [29232] Microsoft PowerPoint object pointer code execution
4167| [29229] Microsoft Windows Knowledge Base Article 923694 update not installed
4168| [29227] Microsoft Outlook Express Windows Address Book (WAB) buffer overflow
4169| [29226] Microsoft Windows Knowledge Base Article 924554 update is not installed
4170| [29225] Microsoft PowerPoint unspecified .ppt file code execution
4171| [29224] Microsoft Word mail merge file code execution
4172| [29216] Microsoft Office Smart Tag code execution
4173| [29215] Microsoft Word malformed string code execution
4174| [29214] Microsoft Windows Knowledge Base Article 922581 update is not installed
4175| [29213] Microsoft Office malformed record code execution
4176| [29212] Microsoft Office malformed chart record code execution
4177| [29211] Microsoft Windows Knowledge Base Article 924191 update is not installed
4178| [29210] Microsoft XML Core Services XLST buffer overflow
4179| [29209] Microsoft Office malformed string code execution
4180| [29208] Microsoft Windows Knowledge Base Article 924496 update is not installed
4181| [29206] Microsoft XML Core Services XMLHTTP information disclosure
4182| [29205] Microsoft Windows Object Packager file extension spoofing code execution
4183| [29204] Microsoft Windows Knowledge Base Article 923414 update is not installed
4184| [29202] Microsoft Windows Knowledge Base Article 922760 update is not installed
4185| [29201] Microsoft Windows Knowledge Base Article 923191 update is not installed
4186| [29199] Microsoft Internet Explorer layout combinations code execution
4187| [29171] Microsoft Windows Knowledge Base Article 925486 update is not installed
4188| [29135] Microsoft Internet Explorer CSS HTML INPUT DIV element denial of service
4189| [29092] Microsoft Visual Basic msgbox unspecified
4190| [29004] Microsoft Internet Explorer VML buffer overflow
4191| [28953] GnuTLS RSA key exponent 3 security bypass
4192| [28942] Microsoft Internet Explorer DirectAnimation keyframe buffer overflow
4193| [28893] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow variant
4194| [28775] Microsoft Word unspecified memory corruption code execution
4195| [28664] Microsoft Windows Knowledge Base Article 922770 update is not installed
4196| [28660] Microsoft Windows Knowledge Base Article 921503 update is not installed
4197| [28659] Microsoft Windows OLE Automation code execution
4198| [28658] Microsoft ASP.NET Framework HTTP cross-site scripting
4199| [28656] Microsoft Windows Knowledge Base Article 924090 update not installed
4200| [28652] Microsoft Windows Knowledge Base Article 920685 update is not installed
4201| [28651] Microsoft Indexing Service cross-site scripting
4202| [28650] Microsoft Office PICT image filter code execution
4203| [28649] Microsoft Windows Knowledge Base Article 910729 update is not installed
4204| [28648] Microsoft Publisher .pub file malformed string code execution
4205| [28647] Microsoft Office EPS filter code execution
4206| [28646] Microsoft Windows Knowledge Base Article 919007 update is not installed
4207| [28643] Microsoft Windows XP PGM buffer overflow
4208| [28608] Microsoft Internet Explorer daxctle.ocx denial of service
4209| [28600] Microsoft Windows winhlp32 HLP file unspecified code execution
4210| [28522] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow
4211| [28516] Microsoft Internet Explorer multiple COM object color property denial of service
4212| [28512] Microsoft Internet Explorer multiple Windows 2000 COM object denial of service
4213| [28511] Microsoft Internet Explorer multiple Visual Studio COM object denial of service
4214| [28474] Microsoft Windows PNG IHDR block denial of service
4215| [28444] Microsoft Internet Explorer tsuserex.dll COM object denial of service
4216| [28439] Microsoft Internet Explorer msoe.dll COM object denial of service
4217| [28438] Microsoft Internet Explorer chtskdic.dll COM object denial of service
4218| [28436] Microsoft Internet Explorer imskdic.dll COM object denial of service
4219| [28281] Microsoft Windows WMF gdi32.dll denial of service
4220| [28240] Microsoft Windows DNS client data string buffer overflow
4221| [28183] Microsoft Windows gdiplus.dll denial of service
4222| [28068] Microsoft Internet Explorer deleted frame access denial of service
4223| [28066] Microsoft Internet Explorer ADODB.Recordset ActiveX object denial of service
4224| [28046] Microsoft Internet Explorer NDFXArtEffects ActiveX object denial of service
4225| [28045] Microsoft Windows Knowledge Base Article 918899 update is not installed
4226| [28043] Microsoft Internet Explorer HTML rendering code execution
4227| [28042] Microsoft Internet Explorer Window location information disclosure
4228| [28040] Microsoft Internet Explorer cross-domain code execution
4229| [28039] Microsoft Internet Explorer ActiveX COM object code execution
4230| [28037] Microsoft Internet Explorer chained CSS code execution
4231| [28034] Microsoft Internet Explorer HTML layout code execution
4232| [28028] Microsoft Windows Knowledge Base Article 922616 update is not installed
4233| [28027] Microsoft Windows Knowledge Base Article 922968 update is not installed
4234| [28025] Microsoft PowerPoint BIFF file format malformed record code execution
4235| [28024] Microsoft Windows Knowledge Base Article 921645 update is not installed
4236| [28023] Microsoft Visual Basic for Applications (VBA) document property buffer overflow
4237| [28022] Microsoft Windows Knowledge Base Article 920670 update is not installed
4238| [28020] Microsoft Windows Hyperlink Object Library (hlink.dll) buffer overflow
4239| [28019] Microsoft Windows Knowledge Base Article 920214 update is not installed
4240| [28018] Microsoft Windows Knowledge Base Article 921398 update is not installed
4241| [28017] Microsoft Windows Knowledge Base Article 920958 update is not installed
4242| [28016] Microsoft Windows kernel system inputs buffer overflow
4243| [28015] Microsoft Windows Knowledge Base Article 920683 update is not installed
4244| [28014] Microsoft Windows Winsock API buffer overflow
4245| [28013] Microsoft Windows DNS client buffer overflow
4246| [28012] Microsoft Windows Knowledge Base Article 917422 update is not installed
4247| [28011] Microsoft Windows kernel exception handling code execution
4248| [28009] Microsoft Windows kernel Winlogon privilege escalation
4249| [28008] Microsoft Windows Knowledge Base Article 917008 update is not installed
4250| [28005] Microsoft Windows 2000 Management Console (MMC) resource file cross-site scripting
4251| [28004] Microsoft Windows Knowledge Base Article 921883 update is not installed
4252| [28002] Microsoft Windows Server service buffer overflow
4253| [27999] Microsoft Windows SMB malformed PIPE denial of service
4254| [27932] Microsoft Internet Explorer native function iteration denial of service
4255| [27931] Microsoft Internet Explorer Forms.ListBox.1 and Forms.ComboBox.1 ActiveX object denial of service
4256| [27930] Microsoft Internet Explorer ASFSourceMediaDescription ActiveX object denial of service
4257| [27929] Microsoft Internet Explorer Internet.HHCtrl ActiveX object denial of service
4258| [27900] Microsoft Internet Explorer wininet.dll denial of service
4259| [27890] Microsoft Internet Explorer href title denial of service
4260| [27884] Microsoft Internet Explorer CEnroll ActiveX object denial of service
4261| [27854] Microsoft IIS ASP cache virtual server information disclosure
4262| [27845] Microsoft Internet Explorer OVCtl ActiveX object denial of service
4263| [27833] Microsoft ISA file extension security bypass
4264| [27832] Microsoft Windows ASN.1 Library HTTP NTLM buffer overflow
4265| [27804] Microsoft Internet Explorer WebViewFolderIcon ActiveX object code execution
4266| [27803] Microsoft Internet Explorer DataSourceControl ActiveX object denial of service
4267| [27795] Microsoft Works wksss.exe denial of service
4268| [27794] Microsoft Works wksss.exe buffer overflow
4269| [27783] Microsoft PowerPoint powerpnt.exe unspecified vulnerability
4270| [27782] Microsoft PowerPoint unspecified memory corruption
4271| [27781] Microsoft PowerPoint unspecified mso.dll code execution
4272| [27762] Microsoft Internet Explorer DXImageTransform.Microsoft.Gradient ActiveX object denial of service
4273| [27761] Microsoft Internet Explorer MHTMLFile ActiveX object denial of service
4274| [27760] Microsoft Internet Explorer FolderItem control denial of service
4275| [27740] Microsoft PowerPoint mso.dll malformed shape code execution
4276| [27713] Microsoft Internet Explorer RevealTrans ActiveX object denial of service
4277| [27675] Microsoft Internet Explorer TriEditDocument ActiveX object denial of service
4278| [27653] Microsoft Excel Asian language editions Style and Repair buffer overflow
4279| [27649] Microsoft Internet Explorer HtmlDlgSafeHelper ActiveX object denial of service
4280| [27626] Microsoft Word hlink.dll buffer overflow
4281| [27623] Microsoft Internet Explorer Object.Microsoft.DXTFilter ActiveX object denial of service
4282| [27622] Microsoft Internet Explorer DirectAnimation.DAUserData ActiveX object denial of service
4283| [27621] Microsoft Internet Explorer RDS.DataControl ActiveX object denial of service
4284| [27617] Microsoft Office mso.dll LsCreateLine() denial of service
4285| [27609] Microsoft Office property field buffer overflow
4286| [27607] Microsoft Office string parsing buffer overflow
4287| [27604] Microsoft Excel cell rebuilding code execution
4288| [27599] Microsoft Internet Explorer OutlookExpress.AddressBook ActiveX object denial of service
4289| [27596] Microsoft Internet Explorer ADODB.Recordset ActiveX object denial of service
4290| [27592] Microsoft Internet Explorer table.frameset appendChild() denial of service
4291| [27573] Microsoft Internet Explorer HTML Help HHCtrl ActiveX control buffer overflow
4292| [27567] Microsoft Windows explorer.exe Internet Shortcut (.url) denial of service
4293| [27565] Microsoft Internet Explorer StructuredGraphicsControl SourceURL denial of service
4294| [27562] Microsoft Windows Knowledge Base Article 915384 update is not installed
4295| [27558] Microsoft Office PNG buffer overflow
4296| [27556] Microsoft Office GIF filter buffer overflow
4297| [27554] Microsoft Windows Knowledge Base Article 917284 update is not installed
4298| [27544] Microsoft Office Excel SELECTION buffer overflow
4299| [27542] Microsoft Office and Microsoft Works Suite Excel SELECTION buffer overflow
4300| [27467] Microsoft Windows Knowledge Base Article 917285 update is not installed
4301| [27466] Microsoft Office and Microsoft Works Suite Excel LABEL buffer overflow
4302| [27464] Microsoft Office Excel FNGROUPCOUNT buffer overflow
4303| [27463] Microsoft Office Excel OBJECT buffer overflow
4304| [27456] Microsoft Internet Explorer HTA SMB file share command execution
4305| [27452] Microsoft Internet Explorer object.documentElement.outer information disclosure
4306| [27450] Microsoft Office Suite Excel COLINFO buffer overflow
4307| [27417] Microsoft Windows Live Messenger contact list denial of service
4308| [27312] Microsoft Excel embedded Shockwave Flash Object code execution
4309| [27288] Microsoft Internet Explorer ASCII encoded Web filter bypass
4310| [27224] Microsoft Office hlink.dll COM object buffer overflow
4311| [27179] Microsoft Excel unspecified code execution
4312| [26977] Ingate Firewall and SIParator SSL/TLS handshake denial of service
4313| [26971] Microsoft NetMeeting unspecified memory corruption denial of service
4314| [26905] Microsoft Windows Knowledge Base Article 918547 update is not installed
4315| [26903] Microsoft Windows Knowledge Base Article 917336 update is not installed
4316| [26886] Microsoft Windows Knowledge Base Article 917953 update is not installed
4317| [26884] Microsoft Windows Knowledge Base Article 917736 update is not installed
4318| [26883] Microsoft Windows Knowledge Base Article 917537 update is not installed
4319| [26882] Microsoft Windows Knowledge Base Article 917344 update is not installed
4320| [26880] Microsoft Windows Knowledge Base Article 917159 update is not installed
4321| [26876] Microsoft Windows Knowledge Base Article 916281 update is not installed
4322| [26874] Microsoft Windows Knowledge Base Article 914389 update is not installed
4323| [26871] Microsoft Windows Knowledge Base Article 914388 update is not installed
4324| [26868] Microsoft Windows Knowledge Base Article 917734 update is not installed
4325| [26867] Microsoft Windows Knowledge Base Article 911280 update is not installed
4326| [26865] Microsoft Windows Knowledge Base Article 917283 update is not installed
4327| [26861] Microsoft Windows Knowledge Base Article 918439 update is not installed
4328| [26836] Microsoft Windows RPC mutual authentication spoofing
4329| [26834] Microsoft Windows TCP/IP protocol driver buffer overflow
4330| [26830] Microsoft Windows SMB invalid handle denial of service
4331| [26823] Microsoft Windows DHCP Client buffer overflow
4332| [26820] Microsoft Windows SMB Server service information disclosure
4333| [26818] Microsoft Windows Mailslot Server driver buffer overflow
4334| [26817] Microsoft Internet Explorer CSS position denial of service
4335| [26815] Microsoft Windows Graphics Rendering Engine (GRE) WMF code execution
4336| [26814] Microsoft Windows RRAS RASMAN buffer overflow
4337| [26813] Microsoft Windows Knowledge Base Article 916768 update is not installed
4338| [26812] Microsoft Windows RRAS buffer overflow
4339| [26810] Microsoft Internet Explorer mhtml://mid URL buffer overflow
4340| [26809] Microsoft Windows ART image rendering library buffer overflow
4341| [26808] Microsoft Internet Explorer HTML tag parsing denial of service
4342| [26805] Microsoft Windows JScript code execution
4343| [26802] Microsoft ASP.NET Framework App_Code folder information disclosure
4344| [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
4345| [26788] Microsoft Windows Media Player PNG buffer overflow
4346| [26784] Microsoft Powerpoint record buffer overflow
4347| [26782] Microsoft Internet Explorer .mht files code execution
4348| [26777] Microsoft Internet Explorer Address bar spoofing
4349| [26774] Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect1Input ActiveX object code execution
4350| [26768] Microsoft Internet Explorer DXImageTransform.Microsoft.Light ActiveX control code execution
4351| [26766] Microsoft Internet Explorer UTF8 encoded HTML code execution
4352| [26762] Microsoft Internet Explorer nested OBJECT tag memory corruption variant
4353| [26556] Microsoft Word document handling buffer overflow
4354| [26487] Microsoft Windows NTDLL.DLL improper DOS to NT path conversion
4355| [26340] Microsoft Infotech Storage System Library (itss.dll) CHM file heap corruption
4356| [26281] Microsoft Internet Explorer mhtml: URL redirection information disclosure
4357| [26233] Microsoft ISA Server log file manipulation
4358| [26166] Microsoft Windows Knowledge Base Article 912442 update is not installed
4359| [26161] Microsoft Windows Knowledge Base Article 916803 update is not installed
4360| [26156] Microsoft Windows Knowledge Base Article 913580 update is not installed
4361| [26118] Microsoft Office 2003 mailto: information disclosure
4362| [26111] Microsoft Internet Explorer modal security dialog box code execution
4363| [25978] Microsoft Internet Explorer nested OBJECT tag memory corruption
4364| [25852] Microsoft Internet Explorer CSS scrollbar denial of service
4365| [25844] Microsoft Dynamics GP magic number denial of service
4366| [25843] Microsoft Dynamics GP DPS multiple buffer overflows
4367| [25842] Microsoft Dynamics GP DPM multiple buffer overflows
4368| [25841] Microsoft Dynamics GP DPS and DPM IP address buffer overflow
4369| [25840] Microsoft Dynamics GP DPS and DPM string buffer overflow
4370| [25794] Microsoft Windows Knowledge Base Article 917627 update is not installed
4371| [25792] Microsoft Windows Knowledge Base Article 911567 update is not installed
4372| [25678] Microsoft Office document string buffer overflow
4373| [25634] Microsoft Internet Explorer .swf address bar spoofing
4374| [25629] Microsoft Windows Knowledge Base Article 912812 update is not installed
4375| [25626] Microsoft Windows Knowledge Base Article 911562 update is not installed
4376| [25625] Microsoft Windows Knowledge Base Article 908531 not installed
4377| [25598] Microsoft Windows XP Firewall .exe firewall bypass
4378| [25597] Microsoft Windows XP Firewall ADS filename:stream syntax application alert bypass
4379| [25573] Microsoft Windows winhlp32.exe .hlp embedded image buffer overflow
4380| [25557] Microsoft Internet Explorer address bar spoofing
4381| [25556] Microsoft Exchange calendar attachment buffer overflow
4382| [25555] Microsoft Internet Explorer navigation method popup security zone bypass
4383| [25554] Microsoft Windows Explorer COM object code execution
4384| [25552] Microsoft Internet Explorer IOIeClientSite code execution
4385| [25551] Microsoft Internet Explorer Double-Byte Character Set code execution
4386| [25550] Microsoft Exchange Outlook Web Access cross-site scripting
4387| [25547] Microsoft Internet Explorer HTML PRE tag code execution
4388| [25545] Microsoft Internet Explorer COM objects as ActiveX code execution
4389| [25542] Microsoft Internet Explorer HTML parsing code execution
4390| [25537] Microsoft FrontPage Server Extensions HTML cross-site scripting
4391| [25535] Microsoft Outlook Express Windows Address Book file buffer overflow
4392| [25439] Microsoft .NET ILDASM buffer overflow
4393| [25438] Microsoft .NET ILASM buffer overflow
4394| [25394] Microsoft Internet Explorer HTA file execution
4395| [25392] Microsoft ASP.NET COM and COM+ w3wp.exe denial of service
4396| [25379] Microsoft Internet Explorer createTextRange() code execution
4397| [25370] Microsoft Windows Knowledge Base Article 901190 not installed
4398| [25369] Microsoft Windows DNS recursive query denial of service
4399| [25366] Microsoft Windows Knowledge Base Article 905755 update is not installed
4400| [25365] Microsoft Windows Knowledge Base Article 914798 update is not installed
4401| [25364] Microsoft Windows Knowledge Base Article 914451 update is not installed
4402| [25363] Microsoft Windows Knowledge Base Article 905756 update is not installed
4403| [25361] Microsoft Windows Knowledge Base Article 905758 update is not installed
4404| [25360] Microsoft Windows Knowledge Base Article 905754 update is not installed
4405| [25359] Microsoft Windows Knowledge Base Article 905555 update is not installed
4406| [25358] Microsoft Windows Knowledge Base Article 905646 update is not installed
4407| [25357] Microsoft Windows Knowledge Base Article 905757 update is not installed
4408| [25342] Microsoft Windows Knowledge Base Article 905553 update is not installed
4409| [25330] Microsoft Commerce Server 2002 authfiles/login.asp authentication bypass
4410| [25292] Microsoft Internet Exporer mshtml.dll buffer overflow
4411| [25284] Microsoft Internet Explorer HTML CSS null dereference denial of service
4412| [25261] Microsoft Windows Knowledge Base Article 913433 is not installed
4413| [25256] Microsoft Internet Explorer Java VM denial of service
4414| [25229] Microsoft Excel graphic buffer overflow
4415| [25228] Microsoft Excel record buffer overflow
4416| [25227] Microsoft Excel formula size buffer overflow
4417| [25225] Microsoft Excel parsing format file buffer overflow
4418| [25148] Microsoft Visual Studio and Visual InterDev .dbp and .sln DataProject buffer overflow
4419| [25011] Microsoft Internet Explorer display adapter JPEG image denial of service
4420| [25009] Microsoft Office routing slip metadata buffer overflow
4421| [24933] NuFW TLS socket denial of service
4422| [24923] Microsoft Internet Explorer IsComponentInstalled() buffer overflow
4423| [24846] Microsoft Internet Explorer window.status memory leak denial of service
4424| [24844] Microsoft .asf file detected
4425| [24788] Microsoft Internet Explorer Script Engine stack denial of service
4426| [24648] Microsoft Internet Explorer drag and drop event file downloading variant
4427| [24629] BlackBerry Enterprise Server Attachment Service Microsoft Word file buffer overflow
4428| [24606] GnuTLS Llibtasn1 DER decoding denial of service
4429| [24586] Microsoft Windows DNS client ATMA data record buffer overflow
4430| [24512] Microsoft Windows Knowledge Base Article 911565 update is not installed
4431| [24511] Microsoft Windows Knowledge Base Article 911564 update is not installed
4432| [24509] Microsoft Windows Knowledge Base Article 889167 update is not installed
4433| [24496] Microsoft Windows Knowledge Base Article 911927 update is not installed
4434| [24495] Microsoft Windows Knowledge Base Article 913446 update is not installed
4435| [24494] Microsoft Windows Knowledge Base Article 910620 update is not installed
4436| [24493] Microsoft Windows Media Player Plugin EMBED element buffer overflow
4437| [24492] Microsoft Windows and Office Korean IME privilege elevation
4438| [24491] Microsoft Windows MSRPC WebClient service message buffer overflow
4439| [24490] Microsoft PowerPoint TIFF information disclosure
4440| [24489] Microsoft Windows IGMP v3 denial of service
4441| [24488] Microsoft Windows Media Player BMP image parsing service buffer overflow
4442| [24487] Microsoft Internet Explorer WMF image code execution
4443| [24481] Microsoft HTML Help Workshop .hhp file buffer overflow
4444| [24474] Microsoft Windows 2000 LDAP client accepts untrusted CA
4445| [24473] Microsoft Windows 2000 event ID 565 not logged
4446| [24472] Microsoft Windows 2000 Event ID 1704 records incorrect group policy settings
4447| [24471] Microsoft Windows VDM information disclosure
4448| [24463] Microsoft Windows XP "
4449| [24407] Microsoft Windows 2000 SECEDIT command fails to set ACLs correctly
4450| [24405] Microsoft Windows 2000 UPN credentials with trailing dot group policy bypass
4451| [24403] Microsoft Windows 2000 WideCharToMultiByte() incorrect Japanese character conversion
4452| [24402] Microsoft Windows 2000 Terminal Service client IP not logged
4453| [24400] Microsoft Windows 2000 domain authentication can be bypassed by a local administrator
4454| [24379] Microsoft Internet Explorer ActiveX kill bit settings can be bypassed
4455| [24346] Microsoft Office \BaseNamedObjects\Mso97SharedDg denial of service
4456| [24188] Microsoft Visual Studio project.dsp code execution
4457| [24162] Microsoft Internet Explorer invalid IMG and XML element denial of service
4458| [24157] Microsoft Windows wireless ad-hoc network unauthorized access
4459| [24116] Microsoft Visual Studio UserControl.Load code execution
4460| [24044] Microsoft Windows GRE ExtCreateRegion() and ExtEscape() WMF denial of service
4461| [23978] Microsoft Windows Knowledge Base Article 912919 update is not installed
4462| [23926] Microsoft Windows Knowledge Base Article 908523 update is not installed
4463| [23924] Microsoft Windows Knowledge Base Article 908519 update is not installed
4464| [23922] Microsoft Windows embedded Open Type Web font buffer overflow
4465| [23895] Microsoft Internet Explorer HTML denial of service
4466| [23846] Microsoft Windows GDI32.DLL WMF image rendering code execution
4467| [23706] Microsoft MSN Messenger and Internet Explorer image denial of service
4468| [23571] Microsoft Internet Explorer cssText information disclosure
4469| [23537] Microsoft Excel msvcrt.memmove() buffer overflow
4470| [23453] Microsoft Windows COM object as ActiveX control allows execution of code
4471| [23451] Microsoft Internet Explorer HTTPS proxy authentication information disclosure
4472| [23450] Microsoft Windows Knowledge Base Article 905915 update is not installed
4473| [23448] Microsoft Internet Explorer download dialog box code execution
4474| [23447] Microsoft Windows APC queue list could allow elevated privileges
4475| [23284] Microsoft Windows SynAttackProtect denial of service
4476| [23129] Microsoft Outlook Express news server information disclosure
4477| [23066] Microsoft Windows XP and 2000 Server MSRPC memory allocation denial of service
4478| [22899] Microsoft Windows Knowledge Base Article 902412 update is not installed
4479| [22882] Microsoft Windows Knowledge Base Article 896424 update is not installed
4480| [22878] Microsoft Exchange Server and Outlook TNEF overflow
4481| [22877] Microsoft Windows Metafile image format buffer overflow
4482| [22876] Microsoft Windows Metafile and Enhance Metafile buffer overflow
4483| [22852] Microsoft Internet Explorer mshtmled.dll denial of service
4484| [22622] RHSA-2005:430 updates for gnutls not installed
4485| [22559] OpenSSL SSL/TLS SSL_OP_MSIE_SSLV2_RSA_PADDING version rollback
4486| [22524] Microsoft Windows XP Wireless Zero Configuration service information disclosure
4487| [22514] Microsoft Windows Knowledge Base Article 902400 update is not installed
4488| [22512] Microsoft Windows Knowledge Base Article 907245 update is not installed
4489| [22502] Microsoft Windows Knowledge Base Article 905749 update is not installed
4490| [22501] Microsoft Windows Knowledge Base Article 900725 update is not installed
4491| [22498] Microsoft Windows XP tftp.exe heap overflow
4492| [22495] Microsoft Windows Collaboration Data Objects buffer overflow
4493| [22492] Microsoft Windows Knowledge Base Article 904706 update is not installed
4494| [22481] Microsoft Windows MSRPC Plug and Play buffer overflow
4495| [22480] Microsoft Windows DirectShow .AVI file code execution
4496| [22479] Microsoft Windows HTML in preview fields execute code
4497| [22478] Microsoft Windows .lnk properties execute code
4498| [22477] Microsoft Windows .lnk file execute code
4499| [22476] Microsoft Windows Distributed Transaction Coordinator message denial of service
4500| [22475] Microsoft Windows Distributed Transaction Coordinator TIP denial of service
4501| [22474] Microsoft Internet Explorer colon data manipulation
4502| [22473] Microsoft Windows COM code execution
4503| [22472] Microsoft Internet Explorer ActiveX HTTP request injection
4504| [22413] Microsoft Internet Explorer for Mac OS about: buffer overflow
4505| [22379] Microsoft Internet Explorer Web content controlled cross-site scripting
4506| [22338] Microsoft Internet Information Server WebDAV request source code disclosure
4507| [22318] Microsoft SQL Server 2000 Service Pack 4 update is not installed
4508| [22268] Microsoft Log Sink Class ActiveX pkmcore.dll file manipulation
4509| [22204] Microsoft Windows keybd_event or SendKeys allows elevated privileges
4510| [22183] Microsoft Exchange Server 2003 public folder denial of service
4511| [22156] Microsoft Windows Knowledge Base Article 899589 update is not installed
4512| [22155] Microsoft Knowledge Base Article 896688 is not installed
4513| [22089] Microsoft Windows Registry Editor Utility concealment
4514| [22073] Microsoft Knowledge Base Article 903235 is not installed
4515| [22072] Microsoft Knowledge Base Article 899587 is not installed
4516| [22071] Microsoft Knowledge Base Article 896428 is not installed
4517| [22069] Microsoft Knowledge Base Article 890859 is not installed
4518| [22068] Microsoft Knowledge Base Article 890046 is not installed
4519| [22042] Microsoft Internet Explorer command execution
4520| [21980] Microsoft Windows Registry Editor Utility concealment
4521| [21978] Microsoft Windows user32.dll component denial of service
4522| [21955] Microsoft Internet Information Server SERVER_NAME request spoofing
4523| [21931] Microsoft Windows XP memory leak
4524| [21930] Microsoft Internet Explorer URL restricted zone denial of service
4525| [21895] Microsoft Windows Msdds.dll object command execution
4526| [21704] Microsoft Windows Knowledge Base Article 896727 update is not installed
4527| [21702] Microsoft Internet Explorer Web Folder Behaviors zone bypass
4528| [21701] Microsoft Internet Explorer JPEG image buffer overflow
4529| [21700] Microsoft Windows Client Service for NetWare code execution
4530| [21660] Microsoft ActiveSync brute force allows attacker to guess equipment IDs
4531| [21658] Microsoft ActiveSync multiple request denial of service
4532| [21626] Microsoft Windows PKINIT protocol obtain information
4533| [21625] Microsoft Windows kerberos message denial of service
4534| [21605] Microsoft Windows Knowledge Base Article 896423 update is not installed
4535| [21604] Microsoft Windows print spooler buffer overflow
4536| [21603] Microsoft Windows Knowledge Base Article 899588 update is not installed
4537| [21602] Microsoft Windows Plug and Play buffer overflow
4538| [21601] Microsoft Windows Knowledge Base Article 899591 update is not installed
4539| [21600] Microsoft Windows Knowledge Base Article 893756 update is not installed
4540| [21599] Microsoft Windows telephony service buffer overflow
4541| [21553] Microsoft Internet Explorer AJAX denial of service
4542| [21539] Microsoft Windows USB device driver buffer overflow
4543| [21537] Microsoft FrontPage style tag denial of service
4544| [21455] MSN (Microsoft Network) Messenger .pif denial of service
4545| [21407] Microsoft Windows RDP request denial of service
4546| [21355] Microsoft Windows Network Connection Manager denial of service
4547| [21352] Microsoft ASP.NET RCP/encoded denial of service
4548| [21345] Microsoft Windows 2000 Update Rollup 1 for Service Pack 4 has not been installed
4549| [21315] Microsoft Outlook 2002 connector for Domino bypass restrictions
4550| [21307] Microsoft Internet Explorer multiple COM object code execution
4551| [21272] Microsoft Windows Knowledge Base Article 903672 update is not installed
4552| [21271] Microsoft Word font buffer overflow
4553| [21269] Microsoft Windows Knowledge Base Article 901214 update is not installed
4554| [21245] LDAP TLS information disclosure
4555| [21221] Microsoft Windows Color Management Module buffer overflow
4556| [21214] Microsoft Windows NTFS allows attacker to obtain information
4557| [21193] Microsoft Internet Explorer javaprxy.dll buffer overflow
4558| [21100] Microsoft Internet Explorer popup obtain information
4559| [21071] Microsoft Internet Explorer BMP memory denial of service
4560| [21025] Microsoft ISA Server SecureNAT client configuration denial of service
4561| [20975] Microsoft Internet Explorer allows script code modification
4562| [20967] Microsoft Exchange Outlook Web Access cross-site scripting
4563| [20843] Microsoft ISA Server Netbios bypass policy
4564| [20842] Microsoft ISA Server HTTP header cache poisoning
4565| [20831] Microsoft Agent character spoof
4566| [20830] Microsoft Outlook Express NNTP Response Parsing buffer overflow
4567| [20829] Microsoft Windows Step-by-Step Interactive Training bookmark link file buffer overflow
4568| [20826] Microsoft Windows Knowledge Base Article 896422 update is not installed
4569| [20825] Microsoft Windows Knowledge Base Article 896358 update is not installed
4570| [20823] Microsoft Windows Knowledge Base Article 890169 update is not installed
4571| [20822] Microsoft Windows Knowledge Base Article 883939 update is not installed
4572| [20821] Microsoft Windows compiled Help (.CHM) integer overflow
4573| [20820] Microsoft Windows Knowledge Base Article 896426 update is not installed
4574| [20818] Microsoft Windows WebClient Service buffer overflow
4575| [20815] Microsoft Windows SMB process gain access
4576| [20693] Microsoft ASP.NET Framework SQL injection
4577| [20692] Microsoft ASP.NET Framework full path disclosure
4578| [20683] Microsoft Word .mcw file buffer overflow
4579| [20629] Multiple Microsoft Windows IPv6 LAND denial of service
4580| [20617] Microsoft Internet Explorer information bar security bypass
4581| [20546] Microsoft Windows Media Player allows creation of malicious media files
4582| [20409] Microsoft ASP.NET Framework ViewState replay
4583| [20408] Microsoft ASP.NET Framework _VIEWSTATE denial of service
4584| [20382] Microsoft Windows Knowledge Base Article 894320 update is not installed
4585| [20380] Microsoft Windows Web View command execution
4586| [20328] GnuTLS record packet parsing denial of service
4587| [20318] Microsoft Windows Knowledge Base Article 893086 update is not installed
4588| [20317] Microsoft Windows Knowledge Base Article 890923 update is not installed
4589| [20026] Microsoft Outlook and Outlook Web Access email client address spoofing
4590| [20000] Microsoft Windows Knowledge Base Article 892944 update is not installed
4591| [19969] Multiple Microsoft Windows Server 2003 Edition printer driver denial of service
4592| [19965] Multiple Microsoft Windows Server 2003 Editions SMB redirector denial of service
4593| [19950] MSN (Microsoft Network) Messenger GIF image code execution
4594| [19914] Microsoft Jet Database msjet40.dll library buffer overflow
4595| [19875] Microsoft Knowledge Base Article 893066 is not installed
4596| [19843] Microsoft Windows Knowledge Base Article 894549 update is not installed
4597| [19842] Microsoft Internet Explorer Content Advisor buffer overflow
4598| [19841] Microsoft Internet Explorer URL buffer overflow
4599| [19836] Microsoft Windows CSRSS gain control
4600| [19835] Microsoft Windows HTML Application Host command execution
4601| [19834] Microsoft Windows object buffer overflow
4602| [19832] Microsoft Windows access requests gain privileges
4603| [19831] Microsoft Internet Explorer DHTML object buffer overflow
4604| [19830] Microsoft Windows font buffer overflow
4605| [19829] Microsoft Windows Message Queuing component buffer overflow
4606| [19828] Microsoft Word document buffer overflow
4607| [19819] Microsoft Windows Remote Desktop "
4608| [19727] Microsoft Windows 2000 GDI32.DLL denial of service
4609| [19716] Microsoft Office InfoPath form information disclosure
4610| [19629] Microsoft Exchange Server 2003 folder denial of service
4611| [19593] Microsoft Windows LAND denial of service
4612| [19461] Microsoft Office applications information disclosure
4613| [19452] Microsoft Internet Explorer title bar spoofing
4614| [19373] Microsoft Internet Explorer and Outlook Express status bar spoofing
4615| [19288] IBM DB2 running on Microsoft Windows obtain information
4616| [19270] Microsoft Windows PNG image buffer overflow
4617| [19252] Microsoft Knowledge Base Article 890261 is not installed
4618| [19225] Microsoft Outlook Web Access owalogon.asp script URL redirect
4619| [19220] Microsoft Windows registry key connection denial of service
4620| [19214] Microsoft Internet Explorer file URL encode
4621| [19141] Microsoft Knowledge Base Article 867282 is not installed
4622| [19137] Microsoft Internet Explorer Channel Definition Format code execution
4623| [19133] Microsoft DHTML method buffer overflow
4624| [19121] Microsoft Pocket Internet Explorer (PIE) URL Unicode spoofing
4625| [19118] Microsoft Knowledge Base Article 890047 is not installed
4626| [19117] Microsoft Internet Explorer drag and drop event file downloading
4627| [19116] Microsoft Knowledge Base Article 891781 is not installed
4628| [19112] Microsoft Knowledge Base Article 873352 is not installed
4629| [19111] Microsoft Knowledge Base Article 888113 is not installed
4630| [19110] Microsoft Windows Hyperlink Object Library code execution
4631| [19109] Microsoft Windows OLE code execution
4632| [19107] Microsoft Office XP URL buffer overflow
4633| [19106] Microsoft Knowledge Base Article 873333 is not installed
4634| [19105] Microsoft Windows COM files gain privileges
4635| [19103] Multiple Microsoft Windows TCP/IP denial of service
4636| [19102] Microsoft Knowledge Base Article 885834 is not installed
4637| [19101] Microsoft Windows Servers License Logging service code execution
4638| [19096] Microsoft Windows Media Player PNG buffer overflow
4639| [19095] Microsoft Knowledge Base Article 888302 is not installed
4640| [19093] Microsoft Windows named pipe information disclosure
4641| [19092] Microsoft Knowledge Base Article 887981 is not installed
4642| [19091] Microsoft Windows SharePoint Services and SharePoint Team Services cross-site scripting
4643| [19090] Microsoft Knowledge Base Article 885250 is not installed
4644| [19089] Microsoft Windows SMB code execution
4645| [18944] Microsoft Knowledge Base Article 886185 is not installed
4646| [18936] Microsoft Internet Explorer file exisitence
4647| [18897] Microsoft Internet Explorer bypass file download warning
4648| [18879] Microsoft Windows USER32.DLL ANI header overflow
4649| [18770] Microsoft Knowledge Base Article 890175 is not installed
4650| [18769] Microsoft Knowledge Base Article 887219 is not installed
4651| [18768] Microsoft Windows Knowledge Base Article 891711 update is not installed
4652| [18766] Microsoft Windows Knowledge Base Article 871250 update is not installed
4653| [18758] Microsoft Windows Indexing Service allows code execution
4654| [18723] Microsoft Internet Explorer FTP arbitrary file creation
4655| [18678] Microsoft Windows winhlp32.exe buffer overflow
4656| [18668] Microsoft Windows LoadImage API buffer overflow
4657| [18667] Microsoft Windows ANI file zero rate number overflow denial of service
4658| [18587] Microsoft Windows Media Player ActiveX object reveals existence of files
4659| [18576] Microsoft Windows Media Player mp3 code execution
4660| [18507] Microsoft Windows XP SP2 subnet option allows access to firewall exceptions
4661| [18504] Microsoft Internet Explorer DHTML bypass cross-domain security model
4662| [18489] Cisco Unity integrated with Microsoft Exchange has default user accounts
4663| [18444] Microsoft Internet Explorer could allow an attaker to bypass popup blocking
4664| [18442] Microsoft SharePoint Portal Server could allow an attacker to obtain password
4665| [18395] Microsoft Internet Explorer sysimage obtain information
4666| [18394] Microsoft Windows Knowledge Base Article 870763 update is not installed
4667| [18393] Microsoft Windows Knowledge Base Article 873339 update is not installed
4668| [18392] Microsoft Windows Knowledge Base Article 885249 update is not installed
4669| [18391] Microsoft Windows Knowledge Base Article 885835 update is not installed
4670| [18390] Microsoft Windows Knowledge Base Article 885836 update is not installed
4671| [18389] Microsoft Exchange Server SMTP buffer overflow
4672| [18388] Microsoft Exchange Server SMTP integer overflow
4673| [18378] Microsoft Windows Icon image anomaly detected
4674| [18342] Microsoft Windows NT DHCP HardwareAddress code execution
4675| [18341] Microsoft Windows NT DHCP MachineName denial of service
4676| [18340] Microsoft Windows LSASS gain privileges
4677| [18339] Microsoft Windows kernel LPC interface gain privileges
4678| [18338] Microsoft Windows Word for Windows 6.0 Converter font code execution
4679| [18337] Microsoft Windows Word for Windows 6.0 Converter table code execution
4680| [18336] Microsoft Windows HyperTerminal session file buffer overflow
4681| [18314] Microsoft Windows Knowledge Base Article 889293 update is not installed
4682| [18311] Microsoft Internet Explorer save file caused by the Related Topics command of the Help ActiveX Control
4683| [18269] Microsoft Internet Explorer Save Picture As spoofing
4684| [18208] Microsoft Windows logon screen saver allows elevated privileges
4685| [18181] Microsoft Internet Explorer execCommand bypass download warnings
4686| [18073] Microsoft Internet Explorer path cookie overwrite
4687| [18020] Microsoft Internet Explorer status bar spoofing
4688| [17989] Microsoft Internet Explorer open window allows attacker to obtain information
4689| [17938] Microsoft Internet Explorer A HREF status bar spoofing
4690| [17936] Cisco Secure ACS for Windows and Solution Engine EAP-TLS bypass authentication
4691| [17931] Microsoft Internet Explorer mshtml.dll denial of service
4692| [17911] Microsoft Internet Explorer FONT tags denial of service
4693| [17910] Microsoft Internet Explorer Hhctrl.ocx allows cross-domain script injection
4694| [17909] Microsoft Internet Explorer table status bar spoofing
4695| [17907] Microsoft ISA Server and Proxy Server Patch MS04-039 is not installed
4696| [17906] Microsoft ISA Server and Proxy Server allow Web site spoofing caused by cache reverse lookup results
4697| [17889] Microsoft Internet Explorer IFRAME SRC NAME buffer overflow
4698| [17868] Microsoft Remote Desktop Tsshutdn command restart
4699| [17864] Microsoft Windows XP Explorer WAV file denial of service
4700| [17828] Microsoft Outlook base64 image file bypass security
4701| [17826] Microsoft Outlook 2003 CID security bypass
4702| [17824] Microsoft Internet Explorer AnchorClick command execution
4703| [17820] Microsoft Internet Explorer bypass Drag and Drop or copy and paste files security setting
4704| [17746] Microsoft Internet Explorer URL address spoofing
4705| [17739] Microsoft FrontPage and Internet Explorer asycpict.dll JPEG denial of service
4706| [17711] Microsoft Windows XP SP2 sessmgr.exe firewall bypass
4707| [17683] Microsoft Excel MS04-033 patch is not installed
4708| [17663] Microsoft Windows MS04-029 patch is not installed
4709| [17662] Microsoft Windows MS04-037 patch is not installed
4710| [17661] Microsoft Windows MS04-036 patch is not installed
4711| [17660] Microsoft Windows MS04-035 patch is not installed
4712| [17659] Microsoft Windows MS04-034 patch is not installed
4713| [17658] Microsoft Windows MS04-032 patch is not installed
4714| [17657] Microsoft Windows NetDDE MS04-031 patch is not installed
4715| [17656] Microsoft Internet Information Server MS04-030 patch is not installed
4716| [17655] Microsoft Internet Explorer plug-in navigation allows address bar spoofing
4717| [17654] Microsoft Internet Explorer cache from SSL Web sites obtain information
4718| [17653] Microsoft Excel allows code execution
4719| [17652] Microsoft Internet Explorer Double Byte Character Set spoof Web site to obtain information
4720| [17651] Microsoft Internet Explorer MS04-038 patch is not installed
4721| [17650] Microsoft Internet Explorer allows unauthorized access to XML documents
4722| [17646] Microsoft Windows RPC Runtime Library obtain information
4723| [17645] Microsoft Internet Information Server WebDAV multiple attributes per XML elements cause denial of service
4724| [17644] Microsoft ASP.NET Framework bypass security
4725| [17641] Microsoft Windows NNTP buffer overflow
4726| [17635] Microsoft Word improper file parsing buffer overflow
4727| [17624] Microsoft Windows XP and Windows Server 2003 Compressed Folders buffer overflow
4728| [17621] Microsoft Windows 2003 SMTP service code execution
4729| [17620] Microsoft Internet Explorer InstallEngineCtl SetCifFile buffer overflow
4730| [17560] Microsoft Windows 2000 and XP GDI library denial of service
4731| [17542] Microsoft SQL Server data buffer denial of service
4732| [17521] Microsoft Windows 2000 Service Pack 4 is not installed
4733| [17458] Microsoft Windows CE KDataStruct information disclosure
4734| [17457] Microsoft Windows XP Explorer.exe TIFF denial of service
4735| [17455] Microsoft Windows XP information disclosure
4736| [17412] IBM with Microsoft Windows XP Professional has default administrator account
4737| [17408] MyWaySpeedBar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4738| [17407] DealHelper attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4739| [17402] zSearch attaches to processes of Microsoft Internet Explorer
4740| [17395] AdButler spyware attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4741| [17341] Microsoft Windows MS04-028 patch is not installed
4742| [17340] Microsoft Word Perfect MS04-027 patch is not installed
4743| [17306] Microsoft WordPerfect converter long message buffer overflow
4744| [17153] Microsoft System Information (Msinfo32.exe) msinfo_file buffer overflow
4745| [17102] Microsoft Internet Explorer IFRAME information disclosure
4746| [17098] Microsoft Outlook Express address information disclosure
4747| [17052] Microsoft Windows XP and Internet Explorer displays improper file icon
4748| [17051] Microsoft Windows XP Content-Location bypass Local Computer zone restrictions
4749| [17048] Microsoft ISA Server FTP bounce attack
4750| [17044] Microsoft Internet Explorer dragDrop allows code execution
4751| [17023] Microsoft Windows XP Windows Explorer bypass Zone Identifier (ZoneID) feature
4752| [17009] Microsoft Windows XP ICF bypass filter
4753| [17007] Microsoft Internet Explorer address bar spoofing
4754| [17004] Microsoft Windows XP Service Pack 2 is not installed on the system
4755| [16913] Microsoft Windows 2003 users with Synchronize directory service data privilege
4756| [16912] Microsoft Windows 2003 groups with Synchronize directory service data privilege
4757| [16909] Microsoft Windows 2003 groups with Remove computer from docking station privilege
4758| [16907] Microsoft Windows 2003 users with Create global objects privilege
4759| [16905] Microsoft Windows 2003 users or groups with Create global objects privilege
4760| [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
4761| [16858] GnuTLS RSA key size denial of service
4762| [16857] Microsoft Internet Explorer STYLE tag comment buffer overflow
4763| [16851] Microsoft Windows 2003 and XP WinKey and U key denial of service
4764| [16805] Microsoft Internet Explorer MS04-025 patch is not installed
4765| [16804] Microsoft Internet Explorer MSHTML.DLL GIF file buffer overflow
4766| [16709] Microsoft Internet Explorer JavaScript denial of service
4767| [16708] Microsoft Outlook Express code execution
4768| [16704] Microsoft Windows 2000 Media Player control code execution
4769| [16696] Microsoft Systems Management Server (SMS) Remote Control Client service denial of service
4770| [16692] PHP HTML tags may bypass strip_tag function in Microsoft Internet Explorer and Safari
4771| [16681] Microsoft Internet Explorer function redirect cross-site scripting
4772| [16678] Microsoft Internet Explorer text file denial of service
4773| [16675] Microsoft Internet Explorer popup.show allows attacker to perform actions
4774| [16666] Microsoft Java Virtual Machine sandbox restriction bypass
4775| [16664] Microsoft Windows Program Group Converter buffer overflow
4776| [16663] Microsoft Word and Outlook Object tag allows unauthorized access
4777| [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
4778| [16648] Microsoft Internet Explorer Shell.Application
4779| [16627] Microsoft Windows System32 write file to the directory has been detected
4780| [16624] Microsoft Internet Explorer ADODB.Stream object is not disabled
4781| [16597] Microsoft Windows Windows Shell allows code execution
4782| [16592] Microsoft Windows Utility Manager gain privileges
4783| [16591] Microsoft Windows Task Scheduler buffer overflow
4784| [16590] Microsoft Windows POSIX buffer overflow allows local attacker to gain privileges
4785| [16587] Microsoft Windows Network Dynamic Data Exchange Running
4786| [16586] Microsoft Windows HTML Help could allow execution of code
4787| [16585] Microsoft Outlook Express malformed email header denial of service
4788| [16583] Microsoft Exchange Server OWA could allow remote execution of code
4789| [16582] Microsoft Windows Server 2003 kernel CPU denial of service
4790| [16581] Microsoft Windows Enhanced Metafile (EMF) buffer overflow
4791| [16580] Microsoft Windows Virtual DOS Machine (VDM) allows elevated privileges
4792| [16579] Microsoft Windows Window Management API allows elevated privileges
4793| [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
4794| [16572] Microsoft Windows 2003 Users with Impersonate a client after authentication privilege
4795| [16570] Microsoft Windows 2003 Users with Create global objects privilege
4796| [16564] Microsoft Windows 2003 Groups with Create global objects privilege
4797| [16562] Microsoft Windows 2003 Groups with "
4798| [16556] Microsoft Windows NetDDE buffer overflow
4799| [16522] Microsoft Windows 2003 Impersonate a client after authentication privilege
4800| [16521] Microsoft Windows 2003 Deny Logon Through Terminal Services privilege
4801| [16520] Microsoft Windows 2003 Create global objects privilege
4802| [16448] Microsoft MN-500 Web administration denial of service
4803| [16443] Microsoft Internet Explorer Wildcard DNS entry cross-site scripting
4804| [16420] Microsoft Internet Explorer null pointer denial of service
4805| [16398] Microsoft Internet Explorer bypass security zone restrictions
4806| [16394] Microsoft Internet Explorer ADODB.Stream object code execution
4807| [16384] Microsoft ISA Server Web Proxy redirect denial of service
4808| [16383] Microsoft ISA Server Basic authentication credentials sent in plain text
4809| [16382] Microsoft ISA Server canonicalization error in Rules engine
4810| [16380] Microsoft ISA Server Web Proxy SSL denial of service
4811| [16362] Microsoft Windows XP Help Center and Support starts automatically
4812| [16361] Microsoft Internet Explorer bypass cross-zone restrictions
4813| [16348] Microsoft Internet Explorer Location: header bypass restrictions
4814| [16306] Microsoft DirectX DirectPlay denial of service
4815| [16304] Microsoft Windows JPEG buffer overflow
4816| [16276] Microsoft Windows 2000 Advanced Server fully qualified domain name security bypass
4817| [16270] Microsoft Windows IPSec filter bypass
4818| [16213] Microsoft Windows Local Security Authority buffer overflow exploit attempt detected
4819| [16211] Microsoft Windows Service Host buffer overflow exploit attempt detected
4820| [16210] Microsoft Windows Service Host buffer overflow exploit attempt detected
4821| [16208] Microsoft Windows RPC Locator Service buffer overflow exploit attempt detected
4822| [16207] Microsoft Windows kernel buffer overflow exploit attempt detected
4823| [16206] Microsoft Windows Command Shell buffer overflow exploit attempt detected
4824| [16205] Microsoft SQL Server buffer overflow exploit attempt detected
4825| [16202] Microsoft Internet Explorer buffer overflow exploit attempt detected
4826| [16201] Microsoft Internet Information Services buffer overflow exploit attempt detected
4827| [16200] Microsoft Exchange Server buffer overflow exploit attempt detected
4828| [16189] Microsoft Internet Explorer CSS denial of service
4829| [16181] Microsoft Visual Basic Command1_Click buffer overflow
4830| [16173] Microsoft Outlook 2003 OLE object bypass restricted security zone
4831| [16171] Microsoft Windows XP Explorer code execution
4832| [16168] Microsoft Outlook Express SMTP usernames and passwords disclosure
4833| [16161] Microsoft Internet Explorer browser URL spoofing
4834| [16160] Microsoft Internet Explorer MSHTM.DLL http-equiv META tag denial of service
4835| [16154] Microsoft Windows NT 4.0 TSE Security Patch denial of service
4836| [16147] Microsoft Internet Explorer showHelp CHM file execution
4837| [16119] Microsoft Outlook 2000 URL spoofing
4838| [16116] Microsoft Outlook VML information disclosure
4839| [16104] Microsoft Outlook 2003 predictable file location could allow code execution
4840| [16102] Microsoft Internet Explorer and Outlook Express A HREF URL spoofing
4841| [16095] Microsoft Windows XP and Windows Server 2003 HCP URL code execution
4842| [16091] Microsoft Internet Explorer file URL could allow an attacker to overwrite registry
4843| [16061] Microsoft Internet Explorer SSL certificate spoofing
4844| [16058] Microsoft Internet Information Server ASP information disclosure
4845| [15956] Microsoft Windows long file share name buffer overflow
4846| [15906] Microsoft Visual Studio .NET unknown Debugger configuration issue
4847| [15859] Microsoft Outlook email ASCII NUL denial of service
4848| [15853] Microsoft Internet Explorer OLE object unauthorized print job
4849| [15832] Microsoft Internet Explorer IFRAME denial of service
4850| [15818] Microsoft Windows MS04-011 patch is not installed
4851| [15813] Microsoft Windows MS04-014 patch is not installed
4852| [15811] Microsoft Windows MS04-012 patch is not installed
4853| [15809] Microsoft Outlook Express MS04-013 patch is not installed
4854| [15729] Microsoft SharePoint Portal Server cross-site scripting
4855| [15715] Microsoft Windows Negotiate Security Software Provider buffer overflow
4856| [15714] Microsoft Windows Virtual DOS Machine allows elevated privileges
4857| [15713] Microsoft Windows ASN.1 double-free
4858| [15711] Microsoft Windows object identifier could be used to open network ports
4859| [15710] Microsoft Windows H.323 buffer overflow
4860| [15709] Microsoft Windows COM Internet Service and RPC over HTTP denial of service
4861| [15708] Microsoft Windows RPCSS Service RPC message can cause denial of service
4862| [15707] Microsoft Windows Local Descriptor Table allows privilege escalation
4863| [15705] Microsoft Outlook Express MHTML URL allows execution of code
4864| [15704] Microsoft Windows XP and Windows Server 2003 HCP URL code execution
4865| [15703] Microsoft Jet Database Engine query could execute code
4866| [15702] Microsoft Windows winlogon buffer overflow
4867| [15700] Microsoft Windows 2000 Domain Controller LSASS LDAP message denial of service
4868| [15699] Microsoft Windows LSASS buffer overflow
4869| [15698] Microsoft Internet Explorer and Outlook Express URL FORM spoofing
4870| [15678] Microsoft Windows XP task creation allows privilege escalation
4871| [15632] Microsoft Windows 2000 Utility Manger allows privilege escalation
4872| [15591] Microsoft Visual Studio and Microsoft Visual C++ denial of service
4873| [15589] Microsoft Windows allows elevated privileges
4874| [15544] Microsoft Internet Explorer shell: command denial of service
4875| [15521] MSN (Microsoft Network) Messenger file transfer
4876| [15509] OpenSSL unknown TLS message types denial of service
4877| [15507] Microsoft Windows XP Explorer wmf denial of service
4878| [15461] Microsoft Windows MS04-008 patch is not installed
4879| [15429] Microsoft Outlook MS04-009 patch is not installed
4880| [15427] Microsoft Network Messenger MS04-010 patch is not installed
4881| [15414] Microsoft Outlook 2002 mailto URL allows execution of code
4882| [15394] Microsoft Windows service running under non-built-in accounts has been detected
4883| [15337] Microsoft Internet Explorer cross-frame domain restrictions bypass
4884| [15326] Microsoft Internet Explorer Perfect Nav plugin denial of service
4885| [15284] Microsoft Windows XP Windows shell shimgvw.dll buffer overflow
4886| [15263] Microsoft Windows XP and 2000 Server kernel allows elevated privileges
4887| [15256] Microsoft Windows ASN.1 buffer overflow packet using NTLM has been detected
4888| [15255] Microsoft Windows ASN.1 buffer overflow packet using SMTP has been detected
4889| [15223] Microsoft Windows access violation or exception code has been detected
4890| [15218] Microsoft Windows command shell backdoor
4891| [15210] Microsoft Internet Explorer BMP bitmap image file integer overflow
4892| [15127] Microsoft Internet Explorer and Outlook null character in host name denial of service
4893| [15113] Microsoft Virtual PC for Mac allows elevated privileges
4894| [15101] Microsoft Windows XP helpctr.exe cross-site scripting
4895| [15078] Microsoft Internet Explorer vb script reports different errors to obtain information
4896| [15057] Microsoft Windows XP and Windows Server 2003 smbmount Linux client denial of service
4897| [15039] Microsoft Windows ASN.1 Library buffer overflow
4898| [15038] Microsoft Windows 2000 Server Windows Media Services denial of service
4899| [15037] Microsoft Windows Server 2003 WINS /GS flag denial of service
4900| [15006] Microsoft Internet Explorer MS04-004 patch is not installed
4901| [14964] Microsoft Internet Explorer file extension spoofing
4902| [14924] Microsoft Windows XP folder containing HTML code and executable file code execution
4903| [14845] Microsoft Convert.exe converts FAT32 to NTFS files systems insecurely
4904| [14609] ZyncosMark attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4905| [14601] WurldMedia attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4906| [14594] WinLocator BHO attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4907| [14561] spyware VX2.BetterInternet attaches to processes of Microsoft Internet Explorer to obtain information
4908| [14560] VX2.BC777(SiteHlprBHO) attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4909| [14537] TopSearch attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4910| [14529] Thesten attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4911| [14522] Surfairy attaches to processes of Microsoft Internet Explorer and opens advertisements
4912| [14504] ShopNav Hijacker attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4913| [14494] SearchWWW attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
4914| [14426] NavExcel attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
4915| [14425] MyWebSearch Toolbar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
4916| [14424] MyFastAccess Toolbar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
4917| [14422] MSMediaservice attaches to processes of Microsoft Internet Explorer and could allow an attacker to execute code
4918| [14421] MSIEbho-Stub BHO attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
4919| [14418] MPGCom Toolbar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
4920| [14400] Kontiki attaches to processes of Microsoft Internet Explorerand acts as part of the Web browser to bypass software
4921| [14396] JAJsoft.CSRS attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
4922| [14395] iWon attaches to processes of Microsoft Internet Explorer and could allow a remote attacker to execute code
4923| [14390] IPInsight attaches to processes of Microsoft Internet Explorer and could allow an attacker to execute code
4924| [14389] Invictus MediaUpdate attaches to processes of Microsoft Internet Explorer and could allow an attacker to execute code
4925| [14383] IETop100 attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
4926| [14380] IDGsearch spyware attaches to processes of Microsoft Internet Explorer and could allow execution of code
4927| [14378] IBIS Toolbar attaches to processes of Microsoft Internet Explorer to obtain information
4928| [14374] Httper attaches to processes of Microsoft Internet Explorer and allows execution of code
4929| [14348] Friend Toolbar attaches to processes of Microsoft Internet Explorer
4930| [14342] FindSex attaches to processes of Microsoft Internet Explorer and allows disclosure of information
4931| [14340] FavoriteMan attaches to processes of Microsoft Internet Explorer and may allow execution of code
4932| [14325] emes-x bho attaches to processes of Microsoft Internet Explorer and may allow execution of code
4933| [14316] e2Give attaches to processes of Microsoft Internet Explorer and obtains information
4934| [14314] DyFuCA attaches to processes of Microsoft Internet Explorer and obtains information
4935| [14256] BDSearch Plugin attaches to processes of Microsoft Internet Explorer and may replace the home page
4936| [14252] AutoSearchBHO attaches to processes of Microsoft Internet Explorer
4937| [14243] Alexa spyware attaches to processes of Microsoft Internet Explorer
4938| [14237] Microsoft URLScan Web server information disclosure
4939| [14187] Microsoft Data Access Components (MDAC) broadcast request buffer overflow
4940| [14179] Microsoft Data Access Components (MDAC) MS04-003 patch is not installed
4941| [14178] Microsoft ISA Exchange Server 2003 MS04-002 patch is not installed
4942| [14177] Microsoft ISA MS04-001 patch is not installed
4943| [14167] Microsoft ISA Server 2000 H.323 filter buffer overflow
4944| [14130] Microsoft Excel could allow an attacker to bypass the "
4945| [14129] Microsoft Word, Excel, and PowerPoint could allow an attacker to bypass the "
4946| [14128] Microsoft Word could allow an attacker to bypass "
4947| [14127] Microsoft Internet Explorer .lnk shortcuts could allow code execution
4948| [14105] Microsoft Internet Explorer showHelp directory traversal
4949| [14092] Microsoft Internet Explorer "
4950| [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
4951| [13975] Microsoft Internet Explorer cache attack allows code execution
4952| [13935] Microsoft Internet Explorer domain URL spoofing
4953| [13869] Microsoft Exchange Server OWA could allow unauthorized email account access
4954| [13847] Microsoft Internet Explorer download function cache directory disclosure
4955| [13846] Microsoft Internet Explorer subframe cross-site scripting
4956| [13845] Microsoft Internet Explorer mhtml: URL handler bypass check
4957| [13844] Microsoft Internet Explorer method caching perform actions
4958| [13809] Microsoft Internet Explorer scrollbar-base-color attribute denial of service
4959| [13795] Microsoft SharePoint settings.htm authentication bypass
4960| [13786] Microsoft Windows MS03-051 patch is not installed
4961| [13785] Microsoft Windows MS03-048 patch is not installed
4962| [13784] Microsoft Windows MS03-050 patch is not installed
4963| [13779] Microsoft Internet Explorer HTML injection
4964| [13682] Microsoft Word macro buffer overflow allows execution of code
4965| [13681] Microsoft Excel macro allows attacker to execute code
4966| [13680] Microsoft FrontPage Server Extensions SmartHTML Interpreter denial of service
4967| [13679] Microsoft Internet Explorer drag and drop could allow an attacker to save file to local system
4968| [13678] Microsoft Internet Explorer XML object could allow an attacker to obtain information
4969| [13677] Microsoft Internet Explorer script URLs zone bypass
4970| [13676] Microsoft Internet Explorer function pointer override zone bypass
4971| [13675] Microsoft Internet Explorer ExecCommand zone bypass
4972| [13674] Microsoft FrontPage Server Extensions debug buffer overflow
4973| [13652] Microsoft Data Access Components GET request
4974| [13639] Microsoft Windows Workstation buffer overflow
4975| [13638] Microsoft Windows MS03-049 patch is not installed
4976| [13617] Microsoft Internet Explorer clientCaps behavior could disclose sensitive information
4977| [13588] Microsoft Internet Explorer IFRAME tag could allow an attacker to execute files
4978| [13558] Microsoft Windows XP CommCtl32.dll could allow an attacker to execute code
4979| [13509] Microsoft Windows HTML Help could allow an attacker to gain privileges
4980| [13501] Microsoft Internet Explorer position: absolute denial of service
4981| [13500] Microsoft Word malformed document
4982| [13482] Microsoft Windows MS03-047 patch is not installed
4983| [13480] Microsoft Windows MS03-046 patch is not installed
4984| [13478] Microsoft Windows MS03-044 patch is not installed
4985| [13473] Microsoft Windows MS03-045 patch is not installed
4986| [13472] Microsoft Windows MS03-042 patch is not installed
4987| [13471] Microsoft Windows MS03-041 patch is not installed
4988| [13453] Microsoft Internet Information Server 404 error message determines service pack level
4989| [13444] Microsoft Windows Non-English patched with MS03-045 denial of service in Sophos Anti-Virus
4990| [13433] Microsoft Exchange SMTP extended verb request denial of service
4991| [13432] Microsoft Exchange SMTP extended verb request buffer overflow
4992| [13426] Microsoft Windows 2000 and XP RPC race condition
4993| [13424] Microsoft Windows User32.dll ListBox and ComboBox controls buffer overflow
4994| [13423] Microsoft Windows 2000 Local Troubleshooter ActiveX control buffer overflow
4995| [13422] Microsoft Windows Authenticode could allow an attacker to execute code
4996| [13421] Microsoft Exchange Server OWA Compose New Message form cross-site scripting
4997| [13420] Microsoft Windows HSC HCP protocol file buffer overflow
4998| [13413] Microsoft Windows Messenger Service popup buffer overflow
4999| [13412] Microsoft Windows MS03-043 patch is not installed
5000| [13407] Microsoft Windows 2000 Server mqsvc.exe MQLocateBegin packet buffer overflow
5001| [13385] Microsoft Windows Server 2003 "
5002| [13376] Microsoft Internet Explorer Dynamic HTML behaviors allows an attacker to execute code
5003| [13375] Microsoft Windows Media Player Dynamic HTML behaviors allows an attacker to execute code
5004| [13364] Microsoft Windows MS03-040 patch is not installed
5005| [13344] Microsoft Windows 98 flood of fragmented UDP packets causes denial of service
5006| [13342] Microsoft Windows PostThreadMessage API allows processes to be terminated without permission
5007| [13314] Microsoft Internet Explorer popup window containing Object Data tags could allow an attacker to execute code
5008| [13300] Microsoft Internet Explorer XML Web page containing Object Data tags could allow an attacker to execute code
5009| [13285] Microsoft PowerPoint data manipulation
5010| [13242] Microsoft BizTalk Server insecure permissions in BizTalkServerDocs and BizTalkServerRespository directories allow file upload
5011| [13211] Microsoft Windows 2000 and XP URG memory leak
5012| [13183] Microsoft Windows service pack detected
5013| [13176] Microsoft Internet Explorer media sidebar could allow an attacker to execute code
5014| [13171] Microsoft Windows Server 2003 can allow attacker to bypass mechanism used to detect buffer overflows
5015| [13166] Microsoft Internet Explorer history.back function allows attacker to obtain information from a site loaded in a different frame and domain
5016| [13165] Microsoft Internet Explorer NavigateAndFind function allows an attacker to obtain information and execute code
5017| [13163] Microsoft Internet Explorer window.open function allows an attacker to obtain information and execute code
5018| [13162] Microsoft Internet Explorer history.back function allows an attacker to obtain information and execute code
5019| [13161] Microsoft Internet Explorer allows an attacker to obtain cookies by opening Web site in _search window
5020| [13134] Microsoft Windows MS03-039 patch is not installed
5021| [13131] Microsoft Windows 2000 Message Queue Manager buffer overflow
5022| [13129] Microsoft Windows RPCSS DCOM buffer overflows
5023| [13126] Microsoft ASP.NET could allow an attacker to bypass Request Validation feature
5024| [13116] Microsoft IIS MS03-018 patch is not installed on the system
5025| [13105] Microsoft Windows Update fails to notify users of updates when host-blocking is used
5026| [13095] Microsoft Windows auto update is disabled
5027| [13093] Microsoft Access Snapshot Viewer buffer overflow
5028| [13091] Microsoft Office WordPerfect converter buffer overflow
5029| [13090] Microsoft Word could allow an attacker to bypass Macro Security Model
5030| [13089] Microsoft Windows NetBIOS Name Service information disclosure
5031| [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
5032| [13029] Microsoft Internet Explorer input type tag denial of service
5033| [12970] Microsoft Internet Explorer DBCS Type property of Object tag buffer overflow
5034| [12962] Microsoft Internet Explorer BR549.DLL ActiveX control buffer overflow
5035| [12961] Microsoft Internet Explorer browser cache script injection
5036| [12960] Microsoft Internet Explorer Object Data tags could allow an attacker to execute code
5037| [12959] Microsoft Data Access Components broadcast request buffer overflow
5038| [12914] Microsoft Internet Explorer about:blank page cross-site scripting
5039| [12910] Microsoft Visual Studio MCWNDX ActiveX buffer overflow
5040| [12903] Microsoft Windows command shell banner
5041| [12872] Microsoft NetMeeting malformed packet denial of service
5042| [12835] Microsoft Windows Pocket PC could allow an attacker to gain access
5043| [12783] Microsoft Internet Information Server ASP engine could allow an attacker to upload malicious files
5044| [12762] Microsoft Windows NT 4.0 Q823803i patch RRAS denial of service
5045| [12747] Microsoft Windows RPC DCOM interface buffer overflow detected
5046| [12724] Microsoft Windows Media Player ASF file could allow code execution
5047| [12704] Microsoft SQL Server named pipe hijack
5048| [12703] Microsoft SQL Server LPC buffer overflow
5049| [12702] Microsoft DirectX MIDI buffer overflows
5050| [12701] Microsoft Windows NT 4.0 Server file management function denial of service
5051| [12700] Microsoft SQL Server named pipe denial of service
5052| [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
5053| [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
5054| [12684] Microsoft Exchange Server OWA Outlook 2003 denial of service
5055| [12679] Microsoft Windows RPC DCOM denial of service
5056| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
5057| [12627] Microsoft ISA homepage function error page cross-site scripting
5058| [12620] Microsoft Windows 2000 Server SMTP FILETIME denial of service
5059| [12590] Microsoft Internet Explorer window.external.AutoScan function cross-site scripting
5060| [12544] Microsoft Windows Servers SMB packet buffer overflow
5061| [12543] Microsoft Windows 2000 Accessibility Utility Manager could allow an attacker to gain privileges
5062| [12538] Microsoft Internet Explorer C:\aux URL denial of service
5063| [12533] Microsoft Windows MS03-010 patch is not installed
5064| [12532] Microsoft Exchange OWA REFERER header cross-site scripting
5065| [12531] Microsoft Exchange OWA could allow an attacker to execute code
5066| [12530] Microsoft SQL Server CreateFile API function allows attacker to gain privileges
5067| [12521] Microsoft Windows Rundll32.exe overly long routine name buffer overflow
5068| [12493] Microsoft Windows Shell32.dll 2000 ShellExecute function buffer overflow
5069| [12490] Microsoft NetMeeting "
5070| [12489] Microsoft Windows 2000 Server Active Directory buffer overflow
5071| [12444] Microsoft Internet Explorer HTML conversion library buffer overflow
5072| [12442] Microsoft Windows XP SP1 Windows shell desktop.ini buffer overflow
5073| [12440] Microsoft Windows Media Player ActiveX control could disclose sensitive information
5074| [12336] Microsoft Internet Explorer Homepage function could allow command execution
5075| [12334] Microsoft Internet Explorer MSXML cross-site scripting
5076| [12249] Microsoft Internet Explorer FTP implementation "
5077| [12193] Microsoft Internet Explorer "
5078| [12187] Microsoft Windows XP gethostbyaddr() denial of service
5079| [12184] Microsoft Internet Explorer Type property of Object tag buffer overflow
5080| [12137] Microsoft Internet Explorer URL spoofing
5081| [12128] Microsoft Windows 2000 and Windows NT MS03-019 patch is not installed
5082| [12100] Microsoft IIS long WebDAV requests containing XML denial of service
5083| [12099] Microsoft IIS Response.AddHeader denial of service
5084| [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
5085| [12097] Microsoft IIS redirect error cross-site scripting
5086| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
5087| [12089] Microsoft SQL Server Jet OLE DB Provider is enabled
5088| [12048] Microsoft Windows 2000 and Windows Server 2003 LAN Manager hash creation enabled
5089| [12043] Microsoft Internet Explorer Script Engine denial of service
5090| [12019] Microsoft Internet Explorer FRAME or IFRAME bypass restrictions
5091| [11953] Microsoft Windows Media Player skin downloading could allow an attacker to execute code
5092| [11946] Microsoft Internet Explorer anchorClick behavior denial of service
5093| [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
5094| [11901] Microsoft BizTalk Server 2002 SQL injection
5095| [11900] Microsoft BizTalk Server 2002 HTTP Receiver function buffer overflow
5096| [11873] Microsoft Internet Explorer, Outlook, and FrontPage shlwapi.dll library denial of service
5097| [11854] Microsoft Internet Explorer plug-in.ocx Load method buffer overflow
5098| [11849] Microsoft Internet Explorer Modal Dialog could allow an attacker to read files
5099| [11848] Microsoft Internet Explorer improper rendering of third party file types could allow code execution
5100| [11847] Microsoft Internet Explorer File Upload control allows attacker to obtain information
5101| [11846] Microsoft Internet Explorer URLMON.DLL library buffer overflow
5102| [11824] Microsoft Windows XP Service Control Manager (SCM) race condition
5103| [11822] Microsoft Windows regedit.exe command execution
5104| [11816] Microsoft Windows 2000 Terminal Services MSGINA.DLL insecure access permissions
5105| [11810] Microsoft Windows win2k.sys EngTextOut denial of service
5106| [11805] Microsoft Internet Explorer OBJECT tag denial of service
5107| [11803] Microsoft Windows kernel LpcRequestWaitReplyPort() buffer overflow
5108| [11776] Microsoft Active Directory insecure permissions on SYSTEM-account
5109| [11752] Microsoft ISA and Proxy Server Firewall and Winsock Proxy service denial of service
5110| [11751] Microsoft VM ByteCode Verifier improper validation of code
5111| [11696] Microsoft Windows 2000 Terminal Services man-in-the-middle attack
5112| [11617] Microsoft Windows 2000 MS03-007 patch is not installed on the system
5113| [11589] Microsoft ActiveSync "
5114| [11586] Multiple SSL/TLS implementation could leak premaster-secret value
5115| [11576] Microsoft ISA DNS intrusion detection application filter denial of service
5116| [11575] Microsoft Windows Script Engine buffer overflow
5117| [11547] Multiple SSL/TLS implementation RSA private key information leak
5118| [11546] Microsoft Windows 2000 Windows Help Facility .cnt file buffer overflow
5119| [11537] Microsoft IIS WebDAV service is running on the system
5120| [11536] Microsoft Windows PostMessage() API function could disclose password
5121| [11533] Microsoft IIS WebDAV long request buffer overflow
5122| [11507] Microsoft Internet Explorer .mht buffer overflow
5123| [11505] Microsoft Windows XP Safe Mode bypass
5124| [11466] Microsoft Internet Explorer embedded HTML EXE file execution
5125| [11430] Microsoft Locator service is running on the system
5126| [11425] Microsoft Windows Me HSC hcp:// buffer overflow
5127| [11411] Microsoft Outlook CODEBASE value allows remote program execution
5128| [11369] Multiple SSL/TLS implementation CBC ciphersuites information leak
5129| [11344] Microsoft Windows riched20.dll attribute label buffer overflow
5130| [11329] Microsoft Windows NT and 2000 cmd.exe CD path name buffer overflow
5131| [11274] Microsoft Windows 2000 NetBIOS continuation packets denial of service
5132| [11273] Microsoft Windows 2000 RPC service could allow an attacker to gain elevated privileges
5133| [11264] Microsoft Internet Explorer MS03-004 patch is not installed on the system
5134| [11260] Microsoft Windows XP Windows Redirector buffer overflow
5135| [11259] Microsoft Internet Explorer showHelp() zone bypass
5136| [11258] Microsoft Internet Explorer dialog box zone bypass
5137| [11250] Microsoft Internet Explorer dragDrop() method could be used to read local files
5138| [11216] Microsoft Windows NT and 2000 command prompt denial of service
5139| [11155] FTLS.org Guestbook multiple form field cross-site scripting
5140| [11141] Microsoft Windows 2000 Terminal Services MSGINA.DLL denial of service
5141| [11133] Microsoft Outlook 2002 using V1 Exchange Server Security certificates transmits plaintext emails
5142| [11132] Microsoft Windows Locator service buffer overflow
5143| [11030] Microsoft Windows OpenType font (.otf) fontview denial of service
5144| [10958] Microsoft Windows File Protection certificate chains with a trusted root CA are accepted
5145| [10957] Microsoft Windows File Protection fails to remove old security catalog .CAT files
5146| [10945] Microsoft Internet Explorer multimedia file URL cross-site scripting
5147| [10892] Microsoft Windows XP Shell media file buffer overflow
5148| [10883] Microsoft Internet Explorer Browser Helper Object (BHO) could disclose information
5149| [10843] Microsoft Windows 2000 and XP SMB signing group policy modification
5150| [10833] Microsoft VM JDBC APIs could allow unauthorized database access
5151| [10822] Microsoft Word and Excel stores ODBC passwords and usernames in plain text
5152| [10809] Microsoft Internet Explorer MS02-068 patch is not installed on the system
5153| [10798] Microsoft Internet Explorer dialog window style parameter can access a user`s local security zone
5154| [10764] Microsoft Windows XP wireless LAN feature could leak information
5155| [10763] Microsoft Outlook malformed email header denial of service
5156| [10760] Microsoft RDS has been enabled on the system
5157| [10736] Microsoft Windows XP Fast User Switching could disclose user processes
5158| [10674] Microsoft Internet Explorer IFRAME dialogArguments object can access a user`s local security zone
5159| [10670] Microsoft Data Access Components (MDAC) MS02-065 patch is not installed
5160| [10669] Microsoft Data Access Components RDS Data Stub client heap buffer overflow
5161| [10665] Microsoft Internet Explorer OBJECT tag could be used to read TIF folder name
5162| [10662] Microsoft Internet Explorer PNG inflate_fast() buffer overflow
5163| [10659] Microsoft Data Access Components RDS Data Stub server heap buffer overflow
5164| [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
5165| [10588] Microsoft VM HTML Applet tag denial of service
5166| [10587] Microsoft VM passed HTML object denial of service
5167| [10586] Microsoft VM CabCracker class could allow an attacker to load .cab archives
5168| [10585] Microsoft VM StandardSecurityManager class restriction bypass
5169| [10584] Microsoft VM Java Applet codebase tag could be used to read files
5170| [10583] Microsoft VM INativeServices could be used to access clipboard contents
5171| [10582] Microsoft VM INativeServices could allow unauthorized memory access
5172| [10581] Microsoft VM Java Applet could disclose path to current directory
5173| [10580] Microsoft VM Java Applet class loader buffer overflow
5174| [10579] Microsoft VM URL redirect cross-domain Java Applet execution
5175| [10542] Microsoft SQL Server login accounts use weak encryption algorithm
5176| [10504] Microsoft IIS script source access could be bypassed to upload .COM files
5177| [10503] Microsoft IIS WebDAV memory allocation denial of service
5178| [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
5179| [10501] Microsoft IIS administrative Web pages cross-site scripting
5180| [10500] Microsoft Outlook Express fails to delete messages from dbx files
5181| [10459] Microsoft Internet Explorer could allow an attacker to bypass cookie restrictions
5182| [10443] Microsoft Internet Explorer saved "
5183| [10440] Microsoft Internet Explorer clipboardData cached object DOM access
5184| [10439] Microsoft Internet Explorer execCommand cached object DOM access
5185| [10438] Microsoft Internet Explorer getElementsByTagName cached object DOM access
5186| [10437] Microsoft Internet Explorer getElementsByName cached object DOM access
5187| [10436] Microsoft Internet Explorer getElementById cached object DOM access
5188| [10435] Microsoft Internet Explorer elementFromPoint cached object DOM access
5189| [10434] Microsoft Internet Explorer createRange cached object DOM access
5190| [10433] Microsoft Internet Explorer external cached object DOM access
5191| [10432] Microsoft Internet Explorer showModalDialog cached object DOM access
5192| [10431] Microsoft Windows 2000 SNMP LANMAN Extension memory leak denial of service
5193| [10400] Microsoft Windows 2000 RPC TCP port 135 denial of service
5194| [10398] Microsoft Windows Media Player world-writable executables
5195| [10388] Microsoft SQL Server Web tasks could allow elevated privileges
5196| [10377] Microsoft Windows XP and 2000 administrative alerts fail when security event log is full
5197| [10371] Microsoft Internet Explorer oIFrameElement.Document cross-domain script execution
5198| [10370] Microsoft IIS HTTP HOST header denial of service
5199| [10343] Microsoft Windows NetDDE Agent can be used to gain elevated privileges
5200| [10342] Microsoft TSAC ActiveX connect.asp cross-site scripting
5201| [10338] Microsoft Outlook Express S/MIME certificate buffer overflow
5202| [10318] Microsoft Content Management Server (MCMS) ManualLogin.asp REASONTXT cross-site scripting
5203| [10294] Microsoft IIS .idc extension error message cross-site scripting
5204| [10290] Microsoft Internet Explorer saved "
5205| [10279] Microsoft Windows XP "
5206| [10259] Microsoft Services for Unix (SFU) invalid RPC packet denial of service
5207| [10258] Microsoft Services for Unix (SFU) RPC parameter size buffer overflow could crash the server
5208| [10257] Microsoft SQL Server Agent scheduled jobs could create malicious output files
5209| [10255] Microsoft SQL Server Database Consistency Checker (DBCC) buffer overflow
5210| [10254] Microsoft Windows compiled HTML Help (.chm) files could be used to execute code
5211| [10253] Microsoft Windows HTML Help ActiveX buffer overflow
5212| [10252] Microsoft Windows zipped file decompression incorrect target path
5213| [10251] Microsoft Windows zipped file decompression buffer overflow
5214| [10215] Microsoft Windows Scripting Host is running on the system
5215| [10199] Microsoft Windows 2000/XP PPTP packet buffer overflow
5216| [10195] Microsoft FrontPage Server Extensions (FPSE) 2002 SmartHTML Interpreter buffer overflow
5217| [10194] Microsoft FrontPage Server Extensions (FPSE) 2000 SmartHTML Interpreter denial of service
5218| [10186] Microsoft Active Data Objects (ADO) buffer overflow
5219| [10184] Microsoft IIS 5.0 resource utilization denial of service
5220| [10180] Microsoft Internet Explorer fails to report an expired SSL CA certificate
5221| [10179] Microsoft Virtual Machine (VM) JDBC class allows access to ODBC data sources
5222| [10158] Microsoft Internet Explorer HTTP redirect bypass restrictions
5223| [10155] Microsoft Word INCLUDEPICTURE field in shared documents can be used to read other files
5224| [10135] Microsoft Virtual Machine (VM) XML methods can be accessed
5225| [10134] Microsoft Virtual Machine (VM) JDBC handle validation could crash Internet Explorer
5226| [10133] Microsoft Virtual Machine (VM) JDBC classes can execute local DLLs
5227| [10132] Microsoft Windows fails to properly check execute permissions for 16-bit executable files
5228| [10122] Microsoft Windows Remote Desktop Protocol could allow an attacker to monitor keystrokes
5229| [10121] Microsoft Windows Remote Desktop Protocol checksum information leak
5230| [10120] Microsoft Windows XP Remote Desktop malformed PDU Confirm Active packet denial of service
5231| [10119] Microsoft NetMeeting RDS local session hijacking
5232| [10117] Microsoft Internet Explorer FTP URL denial of service
5233| [10067] Microsoft Outlook Express "
5234| [10066] Microsoft Internet Explorer frame/iframe javascript: URL cross-domain script execution
5235| [10039] Microsoft Internet Explorer URL encoded forward-slash "
5236| [10035] Microsoft Visual FoxPro could allow an attacker to execute an application
5237| [10033] Microsoft Outlook Express S/MIME spoofed CA certificate man-in-the-middle attack
5238| [10031] Microsoft SQL Server Resolution Service stack buffer overflow
5239| [10012] Microsoft SQL Server sp_MSSetServerProperties and sp_MSsetalertinfo stored procedures allow "
5240| [10008] Microsoft Word INCLUDETEXT field in shared documents can be used to read other files
5241| [9982] Microsoft Windows Certificate Enrollment Control ActiveX control could be used to delete digital certificates
5242| [9971] Microsoft Windows Media Player .wmf file extension or content type spoofing
5243| [9953] Microsoft Windows Media Player WMD code execution
5244| [9946] Microsoft Windows 2000 Terminal Services session screensaver fails to lock the console
5245| [9938] Microsoft Internet Explorer "
5246| [9937] Microsoft Internet Explorer file download origin spoofing
5247| [9936] Microsoft Internet Explorer XML redirect could be used to read files
5248| [9935] Microsoft Legacy Text Formatting ActiveX control buffer overflow
5249| [9934] Microsoft TSAC ActiveX control buffer overflow
5250| [9933] Microsoft Windows NT/2000/XP SMB packet request buffer overflow
5251| [9931] Microsoft Office Web Components MS02-044 patch is not installed on the system
5252| [9907] Microsoft FTM ActiveX control could be used by an attacker to upload and download files
5253| [9906] Microsoft FTM ActiveX control "
5254| [9893] Microsoft SQL Server Agent jobs could be used to create and overwrite files
5255| [9886] Microsoft Internet Explorer Java logging could be used to execute code
5256| [9885] Microsoft Internet Explorer XML Datasource applet could be used to read local files
5257| [9883] Microsoft Internet Explorer Google Toolbar search request denial of service
5258| [9881] Microsoft Internet Explorer "
5259| [9878] Microsoft Windows XP Help and Support Center HCP:// URL could be used to delete files
5260| [9877] Microsoft DirectX Files Viewer control buffer overflow
5261| [9869] Microsoft Windows NTFS hard links could bypass event auditing logs
5262| [9857] Microsoft SQL Server XPs with weak permissions could allow elevated privileges
5263| [9856] Microsoft Windows 2000 NCM handler routine could allow elevated privileges
5264| [9848] Microsoft Internet Explorer HTM script execution
5265| [9791] Microsoft Exchange IIS license exhaustion denial of service
5266| [9789] Microsoft Exchange MSRPC denial of service
5267| [9788] Microsoft SQL Server pre-authentication buffer overflow
5268| [9785] Microsoft Content Management Server (MCMS) resource request SQL injection
5269| [9784] Microsoft Content Management Server (MCMS) Web authoring file execution
5270| [9783] Microsoft Content Management Server (MCMS) authentication buffer overflow
5271| [9779] Microsoft Windows 2000 weak system partition permissions
5272| [9752] Microsoft Windows 2000 Service Pack 3 is not installed
5273| [9746] Microsoft Windows 2000 HTML Help item parameter buffer overflow
5274| [9734] Microsoft SQL Server MDAC OpenRowSet buffer overflow
5275| [9732] Microsoft Office Web Components (OWC) could allow a remote attacker to execute code
5276| [9727] Microsoft Windows Media Player mplay32 long file name buffer overflow
5277| [9724] Microsoft Outlook Express could allow the execution of XML files within the Temporary Internet File (TIF) directory
5278| [9667] Microsoft SQL Server MS02-038 patch
5279| [9666] Microsoft SQL Server MS02-039 patch
5280| [9662] Microsoft SQL Server Resolution Service keep-alive function denial of service
5281| [9661] Microsoft SQL Server Resolution Service heap buffer overflow
5282| [9660] Microsoft SQL Server replication stored procedures are vulnerable to SQL Injection
5283| [9659] Microsoft SQL Server Database Consistency Checker (DBCC) utilities have multiple buffer overflows
5284| [9658] Microsoft Exchange Server Internet Mail Connector (IMC) EHLO buffer overflow
5285| [9657] Microsoft Metadirectory Services (MMS) could allow unauthorized access to the data repository
5286| [9653] Microsoft Internet Explorer CTRL key could be used to upload files
5287| [9643] Microsoft Outlook Express malformed MIME headers could allow file type, size, and icon spoofing
5288| [9625] Microsoft Windows 2000 Narrator allows login information to be audible
5289| [9617] Microsoft Internet Explorer JavaScript page transitions denial of service
5290| [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
5291| [9537] Microsoft Internet Explorer WebBrowser control OBJECT property could allow cross domain scripting
5292| [9531] Microsoft Internet Explorer CLASSID denial of service
5293| [9529] Microsoft Foundation Class Library ISAPI Buffer Overflow
5294| [9525] Microsoft Outlook PGP plug-in heap buffer overflow could allow remote code execution
5295| [9524] Microsoft SQL Server could store some passwords insecurely
5296| [9523] Microsoft SQL Server service account insecure registry permissions
5297| [9522] Microsoft SQL Server bulk data insert buffer overflow
5298| [9426] Microsoft Commerce Server new variant of AuthFilter ISAPI filter buffer overflow
5299| [9425] Microsoft Commerce Server OWC package installer folder permissions could allow remote command execution
5300| [9424] Microsoft Commerce Server OWC package installer buffer overflow
5301| [9423] Microsoft Commerce Server Profile Service API buffer overflow
5302| [9422] Microsoft Windows Media Player Active Playlist could allow local HTML script execution
5303| [9421] Microsoft Windows Media Player WMDM service invalid resource connection could allow elevated privileges
5304| [9420] Microsoft Windows Media Player cache path disclosure could allow remote execution of code
5305| [9399] Microsoft Excel XSL Stylesheet allows attacker to execute script code
5306| [9398] Microsoft Excel allows macro execution if opened using hyperlink with drawing shape object
5307| [9397] Microsoft Excel execute inline macros
5308| [9367] Microsoft Internet Explorer Cascading Style-Sheet (CSS) bold font denial of service
5309| [9362] Microsoft Visual Studio .NET (Korean version) includes a Nimda-infected file
5310| [9346] Log Explorer for Microsoft SQL Server xp_logattach buffer overflow
5311| [9345] Microsoft SQL Server pwdencrypt() buffer overflow
5312| [9329] Microsoft SQL Server SQLXML XML tag script injection
5313| [9328] Microsoft SQL Server SQLXML ISAPI buffer overflow
5314| [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
5315| [9326] Microsoft RAS phonebook local buffer overflow
5316| [9290] Microsoft Internet Explorer FTP server name cross-site scripting
5317| [9276] Microsoft ASP.NET StateServer buffer overflow
5318| [9247] Microsoft Internet Explorer Gopher client malformed reply buffer overflow
5319| [9195] Microsoft Exchange message attribute denial of service
5320| [9187] Microsoft Passport SDK 2.1 Component Configuration Document (CCD) permission
5321| [9159] Microsoft Active Directory zero page length denial of service
5322| [9154] Microsoft Data Engine (MSDE) and Microsoft SQL Server 2000 Desktop Engine have a default blank "
5323| [9146] Microsoft Passport SDK 2.1 events reporting disabled
5324| [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
5325| [9122] Microsoft Internet Explorer JavaScript self.location refresh denial of service
5326| [9121] Microsoft Internet Explorer for Unix could cause the CDE or X Server to crash when scrolling Chinese characters
5327| [9101] Microsoft Internet Explorer cookies with embedded script could be used to access other cookies on the local system
5328| [9094] Microsoft Passport Manager PASSPORTLOG.LOG exposure
5329| [9091] Microsoft Passport Manager verbose mode exposure
5330| [9090] Microsoft Internet Explorer MS02-023 patch is not installed on the system
5331| [9089] Microsoft Internet Explorer and Outlook Express BGSOUND tag could allow an attacker to obtain sensitive information
5332| [9088] Microsoft Internet Explorer and Outlook Express IFRAME tag could allow attacker to send data to a DOS device
5333| [9087] Microsoft Internet Explorer and Outlook Express BGSOUND DOS device reference could cause a denial of service
5334| [9086] Microsoft Internet Explorer "
5335| [9085] Microsoft Internet Explorer "
5336| [9084] Microsoft Internet Explorer NetBIOS connection could allow rendering of Web sites with incorrect security zone
5337| [9077] Microsoft Word Mail Merge variant could allow an attacker to execute arbitrary commands
5338| [9068] Microsoft Passport SDK 2.1 registry default permission exposure
5339| [9067] Microsoft Passport SDK 2.1 default test site exposure
5340| [9066] Microsoft Passport SDK 2.1 Adventure Works Sample Site exposure
5341| [9065] Microsoft Passport SDK 2.1 Adventure Works Sample Site global.asa file default permission exposure
5342| [9064] Microsoft Passport SDK 2.1 default time window exposure
5343| [8969] Microsoft Internet Explorer and Outlook Express malformed XBM file denial of service
5344| [8947] Microsoft Baseline Security Analyzer creates a plaintext security report file
5345| [8941] Microsoft Internet Explorer JavaScript recursive onError event denial of service
5346| [8926] Microsoft Outlook Express POP3 message containing two "
5347| [8918] Microsoft Windows XP Remote Desktop Access is enabled
5348| [8915] Microsoft Windows XP Internet Configuration Firewall is disabled
5349| [8904] Microsoft Internet Explorer self-referenced OBJECT directive denial of service
5350| [8892] Microsoft Windows XP "
5351| [8891] Microsoft Windows XP option to digitally sign server communications disabled
5352| [8890] Microsoft Windows XP option to digitally sign client communications when server agrees disabled
5353| [8889] Microsoft Windows XP option to digitally sign server communications when client agrees disabled
5354| [8888] Microsoft Windows XP security option to digitally sign client communications disabled
5355| [8882] Microsoft Windows XP Session security for NTLM SSP based servers is below minimum
5356| [8880] Microsoft Windows XP Session security for NTLM SSP based clients is below minimum
5357| [8868] Microsoft Internet Explorer dialog window cross-site scripting
5358| [8867] Microsoft Windows 2000 LanMan denial of service
5359| [8862] Microsoft BackOffice Server allows attacker to bypass authentication for Web administration pages
5360| [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
5361| [8851] Microsoft Internet Explorer for Macintosh could allow remote AppleScript execution
5362| [8850] Microsoft Internet Explorer and Office for Macintosh HTML file:// directive buffer overflow
5363| [8844] Microsoft Internet Explorer history allows URLs using the JavaScript protocol
5364| [8816] Microsoft Internet Explorer does not clear local Web cache
5365| [8815] Microsoft VBScript ActiveX Word object denial of service
5366| [8813] Microsoft Windows 2000 Terminal Services allows attacker to bypass group policy settings
5367| [8811] Microsoft IIS MS02-018 patch is not installed on the system
5368| [8810] Microsoft Outlook allows users access to blocked attachments
5369| [8808] Microsoft Outlook Express allows attacker to create false attachment by changing icon
5370| [8804] Microsoft IIS redirected URL error cross-site scripting
5371| [8803] Microsoft IIS HTTP error page cross-site scripting
5372| [8802] Microsoft IIS Help File search cross-site scripting
5373| [8801] Microsoft IIS FTP session status request denial of service
5374| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
5375| [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
5376| [8798] Microsoft IIS SSI safety check buffer overflow
5377| [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
5378| [8796] Microsoft IIS ASP data transfer heap buffer overflow
5379| [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
5380| [8786] Microsoft OWC DataSourceControl component could allow an attacker to verify a file`s existence using the "
5381| [8785] Microsoft OWC Spreadsheet component could allow an attacker to verify a file`s existence using the "
5382| [8784] Microsoft OWC Chart component could allow an attacker to verify a file`s existence using the "
5383| [8779] Microsoft OWC Spreadsheet component "
5384| [8778] Microsoft OWC Spreadsheet component "
5385| [8777] Microsoft OWC Spreadsheet component "
5386| [8759] Microsoft Windows 2000 could allow an attacker to block the application of Group Policy settings
5387| [8752] Microsoft Windows NT, 2000, and XP MUP buffer overflow
5388| [8740] Microsoft Internet Explorer Cascading Style Sheets (CSS) can be used to read portions of local files
5389| [8739] Microsoft Windows 2000 DCOM memory leak
5390| [8728] Microsoft Windows Registry remote write audit
5391| [8727] Microsoft Windows Registry remote access audit
5392| [8711] Microsoft Office XP spreadsheet component host() function cross-application scripting
5393| [8708] Microsoft Outlook 2000 and 2002 executes embedded script in object tag when replying or forwarding HTML mail
5394| [8701] Microsoft Internet Explorer cookie allows remote attacker to execute script code in Local Computer zone
5395| [8681] Microsoft Exchange OWA using RSA Security SecurID authentication bypass
5396| [8667] Microsoft Internet Explorer and Outlook could allow the execution of files within Temporary Internet Files (TIFs)
5397| [8658] Microsoft Internet Explorer DYNSRC information disclosure
5398| [8621] Microsoft Internet Explorer on Windows Me fails to prompt user when a cookie is stored if set using JavaScript
5399| [8615] Microsoft Outlook image tags allows remote attacker to bypass cookie settings
5400| [8613] Microsoft Outlook allows remote attacker to embed JavaScript in URLs using HREF attribute
5401| [8611] Microsoft Outlook IFRAME tags allows malicious Web sites to embed URLs
5402| [8604] Microsoft Outlook allows an attacker to execute JavaScript code by using IFRAME tags to reference malicious Windows Media Player file
5403| [8559] Microsoft Windows registry security SAM read
5404| [8512] Microsoft Windows NT security ID lookup
5405| [8509] Microsoft Windows startup folder access
5406| [8488] Microsoft Internet Explorer JavaScript location.replace loop denial of service
5407| [8480] Sun Java Runtime Environment and Microsoft Virtual Machine (VM) Bytecode Verifier could allow a Java Applet to bypass security restrictions
5408| [8473] Microsoft Internet Explorer URL encoded characters could allow an attacker to access cookie information
5409| [8471] Microsoft Internet Explorer dotless IP variant could allow rendering of Web sites with incorrect Security Zone
5410| [8462] Microsoft Windows NT/2000 debugging subsystem allows attacker to create duplicate handles
5411| [8402] Microsoft Windows 2000 allows an attacker to bypass password policy
5412| [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
5413| [8386] PureTLS could allow injection attacks
5414| [8385] Microsoft IIS specially-crafted request reveals IP address
5415| [8384] Microsoft Windows Shell buffer overflow can occur when an application has been improperly removed
5416| [8382] Microsoft IIS authentication error messages reveal configuration information
5417| [8370] ARCserve backup client and Inoculan AV client for Microsoft Exchange stores plain text account information in exchverify.log
5418| [8362] Microsoft FrontPage form_results.txt is world readable
5419| [8359] Microsoft SQL Server multiple extended stored procedure buffer overflows
5420| [8356] Microsoft Outlook X-UIDL: header denial of service
5421| [8351] Sun Java Runtime Environment and Microsoft Virtual Machine (VM) Java Applet could be used to redirect browser traffic when using a proxy
5422| [8341] Microsoft Internet Explorer 4.0 long OBJECT CLASSID denial of service
5423| [8307] Microsoft Windows 2000, Windows XP, and Exchange 2000 SMTP data transfer command denial of service
5424| [8304] Microsoft Windows 2000 and Exchange 5.5 SMTP service unauthorized mail privileges
5425| [8254] Microsoft Commerce Server 2000 AuthFilter ISAPI filter buffer overflow
5426| [8252] Microsoft Internet Explorer VBScript can be used to view local files
5427| [8243] Microsoft SQL Server OLE DB provider name "
5428| [8242] Microsoft Visual C++.Net and Visual C++ insecure buffer overflow protection
5429| [8231] Microsoft Windows NT SNMP OID decoding memory leak
5430| [8218] Microsoft Internet Explorer Content-Type header cross-site scripting
5431| [8209] Microsoft Windows XP CIFS port denial of service
5432| [8207] Microsoft Windows XP UDP port denial of service
5433| [8199] Microsoft Windows 2000 Terminal Services unlocked client
5434| [8198] Microsoft Outlook Express <
5435| [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
5436| [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
5437| [8120] Microsoft Internet Explorer could allow an attacker to execute script despite disabled scripting
5438| [8118] Microsoft Internet Explorer could be used to open a program on a remote system
5439| [8117] Microsoft Internet Explorer could misrepresent file names in the file download dialog box
5440| [8116] Microsoft Internet Explorer HTML "
5441| [8094] Microsoft Windows 2000 and Interix 2.2 Telnet protocol option buffer overflow
5442| [8092] Microsoft Exchange 2000 System Attendant sets incorrect registry permissions
5443| [8087] Microsoft Office v. X for Mac OS X PID Checker denial of service
5444| [8080] Microsoft Site Server sample sites allow SQL injection
5445| [8077] Microsoft Windows Messenger and/or MSN Messenger is present on the system
5446| [8073] Microsoft Site Server LDAP_Anonymous user account generates weak passwords
5447| [8071] Microsoft Site Server ASP files reveals sensitive information
5448| [8069] Microsoft Site Server POST command directory traversal
5449| [8056] Microsoft IIS is running on the system
5450| [8053] Microsoft Site Server "
5451| [8051] Microsoft Site Server stores LDAP member passwords in plain text
5452| [8050] Microsoft Site Server default ASP pages allow cross-site scripting
5453| [8048] Microsoft Site Server LDAP_Anonymous default account and password
5454| [8043] Microsoft Windows NT, 2000, and XP using NTFS could allow files to be hidden
5455| [8037] Microsoft Windows 2000 empty TCP packet denial of service
5456| [8036] ILOVEYOU or Love Letter worm uses Microsoft Outlook and mIRC to propagate and attack systems
5457| [8023] Microsoft Windows NT and Windows 2000 SIDs could allow an attacker to gain elevated privileges in another domain
5458| [8000] Microsoft Windows XP "
5459| [7969] Microsoft Internet Explorer for Mac OS could allow execution of files
5460| [7954] BadBlue uploaded Microsoft Office document macro execution
5461| [7947] BadBlue Microsoft Office file viewing script non-existent file request denial of service
5462| [7946] BadBlue Microsoft Office file viewing script "
5463| [7941] Microsoft Internet Explorer CODEBASE value allows remote program execution
5464| [7938] Microsoft Internet Explorer HTML form denial of service
5465| [7922] Microsoft Windows XP Pro Upgrade installation causes security patches for Internet Explorer to be rolled back
5466| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
5467| [7906] Microsoft Internet Explorer clipboardData object allows a remote attacker to view clipboard information
5468| [7900] Microsoft Outlook PGP plug-in saves a decrypted copy of encrypted emails
5469| [7892] Microsoft Windows 95 Backup long file extension buffer overflow
5470| [7826] Microsoft Internet Explorer showModelessDialog() denial of service
5471| [7800] Microsoft Internet Explorer Windows Media Player ActiveX could allow an attacker to determine the existence of files or directories
5472| [7795] Microsoft FrontPage Server Extensions (FPSE) "
5473| [7788] Microsoft FrontPage Server Extensions (FPSE) "
5474| [7784] Microsoft Internet Explorer JavaScript OnError allows a remote attacker to determine a file`s existence
5475| [7758] Microsoft Internet Explorer GetObject directory traversal allows an attacker to read files
5476| [7737] Microsoft Internet Explorer "
5477| [7732] Microsoft Windows XP Remote Desktop sends username in plain text
5478| [7731] Microsoft Windows XP fast user switching could lockout users except administrator
5479| [7725] Microsoft SQL Server C runtime format string attack
5480| [7724] Microsoft SQL Server text message query buffer overflow
5481| [7722] Microsoft Windows XP, Me, 98, and 98SE UPnP spoofed UDP packet with SSDP announcement denial of service attack
5482| [7721] Microsoft Windows XP, Me, 98, and 98SE UPnP malformed NOTIFY directive buffer overflow
5483| [7713] Microsoft Windows XP allows attacker to execute programs using hotkeys without authentication
5484| [7712] Microsoft Internet Explorer XMLHTTP redirect reveals contents of file
5485| [7709] Microsoft Windows multiple vendor Web browser high image count denial of service
5486| [7703] Microsoft Internet Explorer could allow automatic file download and execution
5487| [7702] Microsoft Internet Explorer "
5488| [7691] Microsoft IIS HTTP GET request with false "
5489| [7670] Microsoft Outlook Express allows blocked attachments to be opened when the message is forwarded
5490| [7667] Microsoft Windows 2000 IKE UDP packet flood denial of service
5491| [7663] Microsoft Exchange 5.5 OWA HTML email body embedded script execution
5492| [7661] Microsoft Internet Explorer settimeout function in JavaScript can cause the program to crash
5493| [7648] Microsoft Outlook Express for Macintosh long message line buffer overflow
5494| [7640] Microsoft IIS is present on the system
5495| [7636] Microsoft Internet Explorer could allow an attacker to spoof the file extension of a downloadable file
5496| [7613] Microsoft IIS allows attackers to create fake log entries
5497| [7610] CBlade worm infects Microsoft SQL Servers
5498| [7605] Microsoft Windows XP helpctr.exe buffer overflow
5499| [7592] Microsoft Internet Explorer allows an attacker to determine password characters
5500| [7581] Microsoft Internet Explorer HTTP_USER_AGENT could allow attacker to determine the existence of patch Q312461
5501| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
5502| [7563] Microsoft Zero Administration Kit (ZAK) could allow an attacker to bypass file restrictions
5503| [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
5504| [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
5505| [7545] Microsoft Internet Explorer installation wizard (ie5setup.exe) disables screen saver password and task scheduler
5506| [7542] Microsoft Windows 95 and 98 with multiple TCP/IP stacks ICMP packet denial of service
5507| [7538] Microsoft Windows 2000 and XP Terminal services allow an attacker to spoof IP addresses
5508| [7533] Microsoft Windows 2000 RunAs service denial of service
5509| [7532] Microsoft Windows 2000 RunAs service allows local attacker to bypass pipe authentication
5510| [7531] Microsoft Windows 2000 RunAs service reveals sensitive information
5511| [7528] Microsoft Windows NT and Windows 2000 malformed RPC request denial of service
5512| [7527] Microsoft SQL Server malformed RPC request denial of service
5513| [7526] Microsoft Exchange Server malformed RPC request denial of service
5514| [7497] Microsoft Internet Explorer remote file enumeration
5515| [7486] Microsoft Internet Explorer "
5516| [7446] Microsoft ISA Server fragmented UDP packet flood denial of service
5517| [7428] Microsoft Windows Me and XP UPnP denial of service
5518| [7426] Microsoft Internet Explorer may expose authentication information to redirected Web sites
5519| [7422] Microsoft Windows NT RSHSVC does not properly validate users
5520| [7421] Microsoft Windows NT GetThreadContext/SetThreadContext denial of service
5521| [7409] Microsoft Windows 2000 and Windows XP GDI denial of service
5522| [7405] Microsoft Windows NT NonPagedPool denial of service
5523| [7403] Microsoft Windows NT Win32k.sys denial of service
5524| [7402] Microsoft Windows NT kernel mode handle-closing denial of service
5525| [7401] Microsoft Windows NT group policies not applied if long DC name
5526| [7400] Microsoft Windows NT user policies not updated
5527| [7398] Microsoft Windows NT symbolic link case elevation of privileges
5528| [7391] Microsoft Windows NT strong passwords may allow parts of the full name
5529| [7369] Microsoft Windows CSRSS.EXE denial of service
5530| [7354] Microsoft SQL Server 6.5 stores the SQLExecutiveCmdExec in registry using weak encryption algorithm
5531| [7336] Microsoft Internet Explorer for Mac OS X could allow the automatic execution of downloaded files
5532| [7329] Microsoft Windows NT WINS malformed packet flood denial of service
5533| [7318] Microsoft Windows ME SSDP service denial of service
5534| [7313] Microsoft Internet Explorer allows JavaScript to spoof dialog boxes
5535| [7302] Microsoft Windows NT and 2000 Terminal Server malformed RDP packet series denial of service
5536| [7260] Microsoft Internet Explorer command execution with Telnet client in SFU
5537| [7259] Microsoft Internet Explorer URL can contain encoded HTTP requests to third-party site
5538| [7258] Microsoft Internet Explorer dotless IP could allow rendering of Web sites with incorrect Security Zone
5539| [7231] Microsoft Windows 95 using NetWare remote administration contains hidden share
5540| [7224] Microsoft Windows NT smbmount request from Linux client denial of service
5541| [7223] Microsoft Excel and PowerPoint malformed document macro execution
5542| [7202] Microsoft IIS 4.0/5.0 escaped percent found
5543| [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
5544| [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
5545| [7168] Microsoft Exchange OWA deeply-nested folder request denial of service
5546| [7125] Microsoft Windows NT Index Server "
5547| [7118] Microsoft Outlook Express "
5548| [7107] Microsoft Windows NT Xenroll denial of service
5549| [7105] Microsoft Windows RPC endpoint mapper malformed request denial of service
5550| [7093] Norton AntiVirus for Microsoft Exchange could reveal sensitive information to attackers
5551| [7089] Microsoft Exchange OWA could allow search of global address list
5552| [7052] Microsoft Outlook Express 6 file attachment security feature bypass
5553| [7039] Microsoft Exchange OWA denial of service
5554| [7008] Microsoft Windows 2000 IrDA device denial of service
5555| [6995] Microsoft IIS %u Unicode wide character encoding detected
5556| [6994] Microsoft IIS %u Unicode encoding detected
5557| [6991] Microsoft ISA Server cross-site scripting
5558| [6990] Microsoft ISA Server Proxy Service memory leak denial of service
5559| [6989] Microsoft ISA Server H.323 Gatekeeper Service memory leak denial of service
5560| [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
5561| [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
5562| [6983] Microsoft IIS invalid MIME header denial of service
5563| [6982] Microsoft IIS WebDAV long invalid request denial of service
5564| [6981] Microsoft IIS URL redirection denial of service
5565| [6977] Microsoft Windows NT and 2000 NNTP memory leak denial of service
5566| [6963] Microsoft IIS HTTPS connection could reveal internal IP address
5567| [6962] Microsoft Windows Media Player .ASF marker buffer overflow
5568| [6943] Microsoft Windows NT NT4ALL denial of service
5569| [6931] Microsoft Windows 2000 without Service Pack 2
5570| [6924] Microsoft Windows 98 ARP packet flooding denial of service
5571| [6919] Microsoft Windows 2000 Task Manager does not terminate malicious files with the same name as a system process
5572| [6914] Multiple Microsoft products malformed RPC request denial of service
5573| [6912] Microsoft Windows NT and 2000 Terminal Server RDP memory leak denial of service
5574| [6907] Microsoft Windows Media Player .NSC buffer overflow
5575| [6883] Microsoft SFU Telnet denial of service
5576| [6882] Microsoft SFU NFS denial of service
5577| [6876] Microsoft Windows 2000 could allow an attacker to change network passwords
5578| [6874] Microsoft Windows 95/98 invalid path in registry could allow malicious file execution
5579| [6858] Microsoft IIS cross-site scripting patch denial of service
5580| [6831] Microsoft Outlook "
5581| [6803] Microsoft Windows 2000 SMTP service allows mail relaying
5582| [6800] Microsoft IIS device file request can crash the ASP processor
5583| [6748] Microsoft Internet Explorer "
5584| [6745] Microsoft Windows 2000 LDAP function could allow domain user password change
5585| [6742] Microsoft IIS reveals .asp source code with Unicode extensions
5586| [6732] Microsoft Word allows embedded macro to bypass security settings
5587| [6730] Microsoft FrontPage Server Extensions Visual Studio RAD Support sub-component buffer overflow
5588| [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
5589| [6688] Microsoft Internet Explorer could allow remote attackers to view file contents from a victim`s hard drive
5590| [6684] Microsoft SQL Server cached connections could allow an attacker to gain access to the database
5591| [6669] Microsoft Windows 2000 Telnet system call denial of service
5592| [6668] Microsoft Windows 2000 Telnet handle leak denial of service
5593| [6667] Microsoft Windows 2000 Telnet multiple idle sessions denial of service
5594| [6666] Microsoft Windows 2000 Telnet username denial of service
5595| [6665] Microsoft Windows 2000 Telnet service weak domain authentication
5596| [6664] Microsoft Windows 2000 Telnet service predictable pipe names could allow elevation of privileges
5597| [6655] Microsoft Outlook and Outlook Express Address Book allows attacker to spoof emails
5598| [6652] Microsoft Exchange 2000 OWA script execution
5599| [6651] Microsoft ISA Server Web Proxy denial of service caused by embedded code in HTML email
5600| [6614] Microsoft Word .asd file macros could automatically execute
5601| [6590] Microsoft Windows 2000 debug registers allow attacker to gain elevated privileges
5602| [6584] Microsoft Windows Media Player HTML code hidden in Internet shortcuts
5603| [6571] Microsoft Word RTF document automatic macro execution
5604| [6556] Microsoft Internet Explorer HTML code manipulation could alter the URL displayed in the address bar
5605| [6555] Microsoft Internet Explorer with certificate CRL checking enabled could allow Web site spoofing
5606| [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
5607| [6545] Microsoft IIS FTP weak domain authentication
5608| [6535] Microsoft IIS FTP wildcard processing function denial of service
5609| [6534] Microsoft IIS URL decoding error could allow remote code execution
5610| [6518] Microsoft Windows Index Server could allow attackers to view files on the Web server
5611| [6517] Microsoft Windows NT Index Server "
5612| [6506] Microsoft Windows 2000 Server Kerberos denial of service
5613| [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
5614| [6448] Microsoft Internet Explorer 5.x allows active scripts using XML stylesheets
5615| [6443] Microsoft Windows 2000 catalog file could remove installed hotfixes
5616| [6441] Microsoft Windows NT drivers DbgPrint function format string
5617| [6426] Microsoft Internet Explorer altering CLSID action allows malicious file execution
5618| [6405] Microsoft Data Access Component Internet Publishing Provider allows WebDAV access
5619| [6383] Microsoft ISA Server Web Proxy denial of service
5620| [6306] Microsoft Internet Explorer HTML emails with incorrect MIME headers could allow execution of code
5621| [6294] Microsoft Windows Me and Plus! 98 recovery of Compressed Folder passwords
5622| [6288] Microsoft Visual Studio VB-TSQL buffer overflow
5623| [6275] Microsoft Windows user.dmp file insecure permissions
5624| [6265] Microsoft invalid digital certificates could be used for spoofing
5625| [6230] Microsoft Internet Explorer command execution with Telnet client in SFU
5626| [6227] Microsoft Windows Media Player allows remote attackers to execute commands in Internet Explorer
5627| [6205] Microsoft IIS WebDAV denial of service
5628| [6172] Microsoft Exchange malformed URL request denial of service
5629| [6171] Microsoft IIS and Exchange malformed URL request denial of service
5630| [6160] Microsoft Windows 2000 event viewer buffer overflow
5631| [6136] Microsoft Windows 2000 domain controller denial of service
5632| [6103] Microsoft Windows NT PPTP denial of service
5633| [6086] Microsoft Internet Explorer "
5634| [6085] Microsoft Internet Explorer scriptlet rendering could allow Web site operators to read files
5635| [6070] Microsoft Windows UDP socket denial of service
5636| [6062] Microsoft Windows DDE allows privilege elevation
5637| [6035] Microsoft Windows 2000 Server RDP denial of service
5638| [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
5639| [6006] Microsoft Windows NT mutex denial of service
5640| [5973] Microsoft Windows 2000 EFS allows local user to recover sensitive data
5641| [5938] Microsoft Internet Explorer mshtml.dll denial of service
5642| [5937] Microsoft Windows Media Player skins can be used to execute arbitrary code
5643| [5936] Microsoft Windows 2000 Server Directory Service Restore Mode allows user to login with blank password
5644| [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
5645| [5823] Microsoft IIS Web form submission denial of service
5646| [5800] Microsoft Windows 2000 Index Service ActiveX controls allow unauthorized access to file information
5647| [5785] Microsoft Media Services dropped connection denial of service
5648| [5746] Microsoft Windows NT MSTask.exe denial of service
5649| [5729] Microsoft IIS Far East editions file disclosure
5650| [5673] Microsoft Windows NT MTS registry permissions
5651| [5672] Microsoft Windows NT SNMP registry permissions
5652| [5671] Microsoft Windows NT RAS registry permissions
5653| [5623] Microsoft Windows NT and 2000 Phone Book service buffer overflow
5654| [5622] Microsoft SQL XP srv_paraminfo() buffer overflow
5655| [5615] Microsoft Internet Explorer file upload form
5656| [5614] Microsoft Internet Explorer print template
5657| [5598] Microsoft Windows 2000 Telnet daemon could allow a denial of service
5658| [5585] Microsoft Windows 2000 brute force attack
5659| [5575] Microsoft Media Player .WMS script execution
5660| [5574] Microsoft Media Player .ASX buffer overflow
5661| [5573] Microsoft Windows NT SynAttackProtect denial of service
5662| [5566] Microsoft Internet Explorer 5.5 index.dat file can be used to remotely execute code
5663| [5537] Microsoft Exchange Server has a known username and password
5664| [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
5665| [5508] Microsoft Outlook client reveals physical path
5666| [5504] Microsoft Internet Explorer "
5667| [5502] Microsoft Windows 2000 Indexing Services ixsso.query
5668| [5494] Microsoft FrontPage 98 Server Extensions fpcount.exe CGI can be remotely crashed
5669| [5489] Microsoft Windows NT Terminal Server GINA RegAPI.DLL buffer overflow
5670| [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
5671| [5467] Microsoft Windows 2000 System Monitor ActiveX control buffer overflow
5672| [5441] Microsoft IIS .htw cross-site scripting
5673| [5417] Microsoft Windows NT MSIEXEC service uses the msi.dll registery key that has weak permissions
5674| [5411] Microsoft Windows File Share service denial of service
5675| [5399] Microsoft Windows NT and 2000 Network Monitor buffer overflow
5676| [5395] Microsoft Windows 9x share level password
5677| [5387] Microsoft Windows HyperTerminal Telnet buffer overflow
5678| [5377] Microsoft IIS Unicode translation error allows remote command execution
5679| [5370] Microsoft Windows 9x NetBIOS invalid driver type denial of service
5680| [5367] Microsoft Internet Explorer cached info
5681| [5357] Microsoft Windows 9x malformed NWLink NMPI packet denial of service
5682| [5335] Microsoft IIS Index Server directory traversal
5683| [5322] Microsoft Word Mail Merge
5684| [5315] Microsoft Windows NT invalid LPC request
5685| [5301] Microsoft Windows 2000 Simplified Chinese IME State Recognition
5686| [5293] Microsoft Internet Explorer exposes users files
5687| [5263] Microsoft Office 2000 executes .dll without users knowledge
5688| [5242] Microsoft Windows 2000 Telnet client NTLM authentication weakness
5689| [5222] Microsoft Windows 2000 malformed RPC packet denial of service
5690| [5203] Microsoft Windows 2000 still image service
5691| [5202] Microsoft IIS invalid URL allows attackers to crash service
5692| [5193] Microsoft Windows Media Services Unicast Service denial of service
5693| [5175] Microsoft Outlook and Outlook Express vCards buffer overflow
5694| [5171] Microsoft Windows 2000 Local Security Policy corruption
5695| [5168] Microsoft Windows NetBIOS cache corruption
5696| [5156] Microsoft IIS Cross-Site Scripting
5697| [5147] Microsoft Money plain-text password
5698| [5127] Microsoft Virtual Machine java applet allows malicious Web site to masquerade as visitor
5699| [5124] Microsoft FrontPage Server Extensions device name denial of service
5700| [5106] Microsoft IIS 4.0 discloses internal IP addresses
5701| [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
5702| [5097] Microsoft Windows folder.htt allows execution of active scripting without approval
5703| [5080] Microsoft Office 2000 HTML object tag buffer overflow
5704| [5079] Microsoft Windows 95/98 malformed IPX ping packet denial of service
5705| [5075] Microsoft Internet Explorer "
5706| [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
5707| [5040] Microsoft Windows NT/2000 explorer.exe uses relative path name in registry
5708| [5035] Microsoft Windows NT/2000 NetBIOS Name Server spoofed name conflict
5709| [5033] Microsoft Windows 2000 without Service Pack 1
5710| [5031] Microsoft Windows 2000 Service Control Manager named pipe could allow a unauthorized user to gain privileges
5711| [5016] Microsoft Excel register.id function
5712| [5015] Microsoft Windows NT and 2000 executable path
5713| [5013] Microsoft Outlook and Outlook Express cache bypass
5714| [4960] Microsoft IIS on Win2kPro security button restriction
5715| [4953] Microsoft Outlook date header buffer overflow
5716| [4951] Microsoft IIS absent directory browser argument
5717| [4933] Microsoft SQL Enterprise Manager password disclosure
5718| [4899] Microsoft FrontPage Extensions shtml.dll multiple access denial of service
5719| [4893] Microsoft mail clients denial of service
5720| [4887] Microsoft Windows 2000 Kerberos ticket renewed
5721| [4886] Microsoft Windows 2000 logon session reconnected
5722| [4885] Microsoft Windows 2000 logon session disconnected
5723| [4882] Microsoft Windows 2000 Kerberos pre-authentication failed
5724| [4873] Microsoft Windows 2000 user account mapped for logon
5725| [4872] Microsoft Windows 2000 account logon failed
5726| [4871] Microsoft Windows 2000 account used for logon
5727| [4855] Microsoft Windows 2000 group type change
5728| [4842] Microsoft Internet Explorer and Microsoft Powerpoint 2000 ActiveX object execution
5729| [4841] Microsoft Internet Explorer and Microsoft Access 2000 VBA code execution
5730| [4828] Microsoft Windows 95/98 ARP spoofing
5731| [4823] Microsoft Windows 2000 Telnet server binary stream denial of service
5732| [4819] Microsoft Windows 2000 default SYSKEY configuration
5733| [4790] Microsoft IIS \mailroot\pickup directory denial of service
5734| [4787] Microsoft Windows 2000 user account locked out
5735| [4786] Microsoft Windows 2000 computer account created
5736| [4785] Microsoft Windows 2000 computer account changed
5737| [4784] Microsoft Windows 2000 computer account deleted
5738| [4757] Microsoft IIS server-side includes (SSI) #exec directive
5739| [4714] Microsoft Windows 2000 "
5740| [4710] Norton AntiVirus for Microsoft Exchange unzip buffer overflow
5741| [4709] Norton AntiVirus for Microsoft Exchange may enter "
5742| [4702] Microsoft Windows event log full
5743| [4700] Microsoft Windows computer password not found in local security database
5744| [4698] Microsoft Windows EventLog service started
5745| [4688] Microsoft Windows Network Monitor driver started
5746| [4679] Microsoft DNS Server - Name offset exceeding DNS message packet length
5747| [4678] Microsoft DNS Server using a large amount of memory
5748| [4677] Microsoft DNS Server - Invalid DNS UPDATE message in DNS packet
5749| [4676] Microsoft DNS Server - excessive bad packets received
5750| [4675] Microsoft DNS Server - Invalid domain name offset in DNS message packet
5751| [4673] Microsoft Windows resources for queuing of audit messages have been exhausted
5752| [4671] Microsoft Windows event log file cannot be opened
5753| [4670] Microsoft Windows event log file corrupted
5754| [4663] Microsoft DNS Server - Invalid domain name
5755| [4654] Microsoft DNS Server - Invalid domain name in DNS message packet
5756| [4648] Microsoft Windows NT malformed remote registry request denial of service
5757| [4637] Microsoft DNS Server - Domain name exceeding maximum packet length
5758| [4635] Microsoft DNS Server - CNAME loop during caching
5759| [4627] Microsoft Internet Explorer fails to revalidate certificates within the same session
5760| [4624] Microsoft Internet Explorer fails to validate certificates in images or frames
5761| [4608] Microsoft Windows NT computer account creation can compromise User Session Key
5762| [4601] Microsoft Internet Explorer HTML Help file code execution
5763| [4600] Microsoft Windows NT denial of service caused by unacknowledged SMB requests
5764| [4589] Microsoft Windows 2000 protected store can be compromised by brute force attack
5765| [4585] Microsoft Windows Encoder denial of service
5766| [4582] Microsoft SQL Server DTS package reveals passwords
5767| [4558] Microsoft IIS is installed on a domain controller
5768| [4552] Microsoft Windows Browser service can be shutdown by an unauthorized remote user
5769| [4547] Microsoft Windows Master Browser browse table can be filled with bogus entries
5770| [4517] Microsoft Windows NT user account locked out
5771| [4516] Microsoft Windows NT user account enabled
5772| [4515] Microsoft Windows NT user account disabled
5773| [4500] Microsoft Internet Explorer frame domain verification
5774| [4484] Microsoft FrontPage Server Extensions image mapping components allow remote code execution
5775| [4456] Microsoft Internet Explorer external.NavigateAndFind function bypasses cross-frame security
5776| [4448] Microsoft IIS ISM.DLL could allow users to read file contents
5777| [4447] Microsoft Internet Explorer bug allows Web page operator to view cookie
5778| [4446] Microsoft Outlook Express filename overflow could allow attacker to execute files
5779| [4445] Microsoft Office UA Control malicious Web operator
5780| [4439] Microsoft FrontPage Server Extensions"
5781| [4430] Microsoft IIS malformed URL extension data denial of service
5782| [4399] Microsoft Commercial Internet System (MCIS) Mail server IMAP buffer overflow
5783| [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
5784| [4337] Microsoft Windows NT/2000 cmd.exe buffer overflow
5785| [4333] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file buffer overflow
5786| [4332] Microsoft Windows NT registry permissions could allow compromise of cryptographic keys
5787| [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
5788| [4280] Microsoft DNS resolver may accept responses from non-queried hosts
5789| [4279] Microsoft IIS escape characters denial of service
5790| [4278] Microsoft Windows 2000 unattended install does not secure All Users profile
5791| [4268] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file could allow remote ASP source retrieval
5792| [4247] Microsoft Windows 95/98 printer sharing allows read access
5793| [4232] Microsoft Index Server idq.dll allows remote directory traversal
5794| [4227] Microsoft Index Server webhits.dll reveals source of ASP files
5795| [4224] Microsoft Excel XLM macros do not generate warning messages
5796| [4221] Microsoft Windows NT drive mapping allows local users to execute arbitrary code
5797| [4204] Microsoft IIS virtual UNC share source read
5798| [4203] Microsoft Windows TCP/IP Printing Service denial of service
5799| [4183] Microsoft IIS could disclose path of network shares
5800| [4152] Microsoft Outlook allows users to manipulate hidden drives
5801| [4141] Microsoft Windows can be configured to transmit unencrypted passwords to SMB server
5802| [4140] Microsoft Windows Telnet service authentication may expose user passwords
5803| [4138] Microsoft Windows 2000 system file integrity feature is disabled
5804| [4117] Microsoft IIS chunked encoding post or put denial of service
5805| [4111] Microsoft Windows NT 4.0 registry permissions
5806| [4110] Microsoft SQL Server remote query abuse
5807| [4109] Microsoft Clip Art Gallery CIL file buffer overflow
5808| [4108] Microsoft Windows Media Technologies malformed license request denial of service
5809| [4107] Microsoft Windows path names containing DOS devices denial of service
5810| [4086] Microsoft Windows 2000 may not start Jaz drives correctly
5811| [4085] Microsoft Windows 2000 non-Gregorial calendar error
5812| [4084] Microsoft Windows 2000 may prevent Adobe FrameMaker files from being saved in some formats
5813| [4083] Microsoft Windows 2000 Terminal Services may damage Office files saved as HTML
5814| [4082] Microsoft Windows 2000 and Iomega parallel port drives display error
5815| [4081] Microsoft Windows invalid image error when using OLE libraries
5816| [4080] Microsoft Windows 2000 AOL image support
5817| [4079] Microsoft Windows 2000 High Encryption Pack
5818| [4034] Microsoft Windows Media Services handshake packets denial of service
5819| [4016] Microsoft Windows NT Recycle Bin could allow an unauthorized user to modify deleted files
5820| [3996] Microsoft Internet Explorer image source redirect
5821| [3993] Microsoft Windows Trin00 Distributed Denial of Service (DDoS) tool found
5822| [3986] Microsoft IIS ASP could be used to gain sensitive information
5823| [3959] Microsoft Direct Access Object (DAO) or JET method denial of service
5824| [3909] Microsoft Windows 9x share is writable
5825| [3906] Microsoft Windows NT share is readable
5826| [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
5827| [3890] Microsoft Index Server error could reveal sensitive path information
5828| [3854] Microsoft Office 2000 security setting
5829| [3837] Microsoft Internet Explorer Suite 4 HTML buffer overflow
5830| [3803] Microsoft Internet Explorer directshow filter (MSDXM.OCX) buffer overflow
5831| [3694] Microsoft Windows NT malformed resource enumeration denial of service
5832| [3675] Microsoft DNS server cache pollution can occur if DNS spoofing has been encountered
5833| [3668] Microsoft Internet Explorer Cross Frame could be used to view files on client computers
5834| [3666] Microsoft Internet Explorer Web Proxy Auto-Discovery could allow clients to accept untrusted proxy setting information
5835| [3574] Microsoft Windows 9x cache could reveal plaintext password
5836| [3534] Microsoft Windows NT 4.0 without Service Pack 6
5837| [3393] Microsoft FrontPage Extensions authors.pwd file could reveal encrypted passwords
5838| [3391] Microsoft FrontPage Extensions service.pwd file could reveal encrypted passwords
5839| [3378] Microsoft Virtual Machine could allow a malicious Java applet to bypass security restrictions
5840| [3373] Microsoft Windows NT user shell folders could allow users to gain administrator privileges
5841| [3371] Microsoft Excel imports and runs Lotus 1-2-3 or Quattro Pro macros without warning
5842| [3328] Microsoft Windows ARP packet denial of service
5843| [3311] Microsoft Internet Explorer registration wizard ActiveX buffer overflow
5844| [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
5845| [3268] Microsoft Internet Explorer uses weak encryption
5846| [3251] Microsoft Windows allows source routing when configured to reject source routed packets
5847| [3248] Microsoft Windows NT RASMAN pathname
5848| [3246] Microsoft HTML table form Denial of Service
5849| [3244] Microsoft Scriptlet.typelib and Eyedog ActiveX controls are unsafe
5850| [3226] Microsoft Windows NT 4.0 unattended installation could expose sensitive information to local users
5851| [3221] Microsoft SQL Server 6.5 non-trusted connection successful
5852| [3220] Microsoft SQL 6.5 Server shutdown
5853| [3219] Microsoft SQL Server 6.5 started
5854| [3218] Microsoft SQL Server failed connection
5855| [3217] Microsoft SQL Server non-trusted connection successful
5856| [3216] Microsoft SQL Server shutdown
5857| [3215] Microsoft SQL Server started
5858| [3214] Microsoft SQL Server trusted connection successful
5859| [3201] Microsoft SQL Server login failed - user not trusted
5860| [3200] Microsoft SQL Server login failed - user not Administrator
5861| [3199] Microsoft SQL Server login failed - invalid user
5862| [3198] Microsoft SQL Server login failed - too many users
5863| [3197] Microsoft SQL Server login failed
5864| [3196] Microsoft LDAP server blacklist failed
5865| [3195] Microsoft LDAP server permanent blacklist
5866| [3194] Microsoft LDAP server temporary blacklist
5867| [3168] Microsoft Windows NT SP4-SP6 TCP sequence numbers are predictable
5868| [3156] Microsoft Jet Text I-ISAM allows users to alter system files
5869| [3155] Microsoft Jet VBA shell execution
5870| [3129] Microsoft Windows Telnet.exe remote buffer overflow
5871| [3117] Microsoft FrontPage long URL buffer overflow
5872| [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
5873| [3109] Microsoft Windows NT Phone Dialer utility contains a locally exploitable buffer overflow
5874| [3106] Microsoft Windows NT DNS server can be remotely crashed by sending a response to a non-existant request
5875| [3104] Microsoft Windows NT TSE denial of service can consume all available memory
5876| [2761] Microsoft Office 97 files are out of date
5877| [2750] Microsoft Windows started/stopped
5878| [2686] Microsoft Outlook long file name patch not applied
5879| [2685] Microsoft Outlook Express long file name patch not applied
5880| [2677] Microsoft Windows NT old operating system
5881| [2675] Microsoft IIS 4.0 samples installation on Web server
5882| [2673] Microsoft IIS samples installation on Web server
5883| [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
5884| [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
5885| [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
5886| [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
5887| [2662] Microsoft IIS CGI overflow
5888| [2661] Microsoft Internet Explorer MK overrun
5889| [2549] Microsoft Windows NT install date changed
5890| [2444] Microsoft Internet Explorer unsigned ActiveX download
5891| [2412] Microsoft IIS account is member of Domain Users
5892| [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
5893| [2336] Microsoft Windows NT login default folder allows a user to bypass policies
5894| [2313] Microsoft Windows NT can be crashed by executables containing malformed image headers
5895| [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
5896| [2299] Microsoft Windows NT CSRSS denial of service
5897| [2291] Microsoft Windows NT Local Security Authority (LSA) can be remotely crashed, requiring a system reboot
5898| [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
5899| [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
5900| [2252] Microsoft Jet database engine allows embedded VBA strings, which could allow execution of commands
5901| [2244] Microsoft Internet Explorer favorites feature malicious icon file
5902| [2243] Microsoft Windows NT RAS/RRAS clients cache passwords regardless of setting
5903| [2229] Microsoft IIS ExAir sample site denial of service
5904| [2216] Microsoft Internet Explorer crossframe vulnerability allows scripts to run in elevated context
5905| [2214] Microsoft Internet Explorer Son of Cuartango issue allows remote file retrieval
5906| [2213] Microsoft Internet Explorer Untrusted Scripted Paste issue could allow remote file retrieval
5907| [2209] Microsoft Internet Explorer treats dotless IP addresses as members of the local Intranet zone
5908| [2201] Microsoft Windows NT 4.0 without Service Pack 5
5909| [2200] Microsoft Windows NT RAS client contains an exploitable buffer overflow
5910| [2190] Microsoft Windows NT 4.0 help file utility contains a locally exploitable buffer overflow
5911| [2186] Microsoft Excel virus warning features could possibly be bypassed by malicious files
5912| [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
5913| [2173] Microsoft Internet Explorer FSO could allow remote file manipulation from a Web server
5914| [2161] Microsoft Internet Explorer DHTML edit control can be used to read arbitrary files
5915| [2142] Microsoft SQL Server allows users of remote SQL Servers to connect allowing unauthorized users of those servers access
5916| [2141] Microsoft SQL Server can be configured to use the Windows NT account SQLExecCmdExe when running xp_cmdshell for non-sa logins
5917| [2140] Microsoft SQL Server trojan horse found in system stored procedures
5918| [2139] Unencrypted Microsoft SQL Server triggers found
5919| [2136] Microsoft SQL Server device files should be on NTFS partitions
5920| [2134] Microsoft SQL Server backups should be performed regularly
5921| [2133] Microsoft SQL Server replication is enabled
5922| [2132] Microsoft SQL Server Trace Flags should be off
5923| [2130] Microsoft SQL Server protocols found that allow packet sniffing
5924| [2129] Microsoft SQL Server should use limited Windows NT protocols to make attacks more difficult
5925| [2128] Microsoft SQL Server bug found that prohibits revoke permissions on certain tables
5926| [2119] Microsoft SQL Server registry extended stored procedures found that could be used to read or write to the registry
5927| [2102] Microsoft Windows NT allows files to exceed the supposed maximum length
5928| [2095] Microsoft SQL Server OLE Automation extended stored procedures were found that can be used to reconfigure the security of other services
5929| [2094] Microsoft SQL Server password encryption is not enabled for all login Ids
5930| [2093] The account under which the Microsoft SQL Server service is running is not in compliance with policy
5931| [2092] Microsoft SQL Server extended stored procedure xp_sprintf buffer overflow
5932| [2077] Microsoft SQL Server extended stored procedure xp_sqlinventory can be used to crash SQL Server
5933| [2070] Microsoft Internet Explorer allows remote files to be retrieved by a malicious user
5934| [2069] Microsoft Internet Explorer can allow malicious pages to spoof legitimate, trusted sites
5935| [2036] Microsoft PWS could be exploited to remotely read arbitrary files
5936| [1977] Microsoft Windows NT RPC services can be used to deplete system resources
5937| [1976] Microsoft Windows NT gina flaw allows locked-out users to log in
5938| [1975] Microsoft Windows NT gina allows some clipboard text to be revealed
5939| [1974] Microsoft Windows NT SNMP agent memory leak
5940| [1969] Microsoft Exchange LDAP denial of service
5941| [1947] Microsoft Windows NT/9x can be frozen with redirect packets
5942| [1946] Microsoft Windows NT screen saver can be used to compromise administrator privileges
5943| [1823] Microsoft IIS long GET request denial of service
5944| [1820] Microsoft Windows NT 4.0 domain caching feature can be exploited to gain administrator privileges
5945| [1803] Unencrypted Microsoft SQL Server stored procedures found
5946| [1780] Microsoft Office 98 documents may be saved with sensitive information
5947| [1774] Microsoft Access databases use weak passwords
5948| [1771] Microsoft Windows 95/98 configurations may lead to excessive bandwidth consumption
5949| [1770] Microsoft SQL Server SQLMail allows logins to send email
5950| [1769] Latest Microsoft SQL Server Service Packs are not installed
5951| [1762] Microsoft SQL Server permissions on extended stored procedures found that are not in compliance with policy
5952| [1761] Microsoft SQL Server is configured to execute stored procedures at startup that could be used as backdoors
5953| [1760] Microsoft SQL Server statement permissions found that are granted to users other than dbo
5954| [1759] Microsoft SQL Server objects not owned by database owner
5955| [1758] Microsoft SQL Server extended stored procedure, xp_cmdshell, can be used to gain Windows NT administrator rights
5956| [1757] Microsoft SQL Server allows direct system table updates to be denied
5957| [1750] Microsoft SQL Server logins during unauthorized hours found
5958| [1749] Microsoft SQL Server permissions on system tables found granted to public
5959| [1737] Microsoft Excel CALL function can execute programs without user warning
5960| [1735] Microsoft IIS with Visual InterDev no authentication
5961| [1719] Microsoft Windows NT 4.0 SP4 could allow null passwords to be used for access
5962| [1715] Microsoft SQL Server object permissions granted to groups are non-compliant with policy
5963| [1714] Microsoft SQL Server user permissions found that are not in compliance with policy
5964| [1713] Microsoft SQL Server Enterprise Manager leaves traces of unencrypted sa password in registry when changing authentication mode of a registered server
5965| [1712] Microsoft SQL Server Enterprise Manager leaves traces of previous unencrypted sa passwords in registry
5966| [1711] Microsoft SQL Server Enterprise Manager stores unencrypted sa password in registry
5967| [1710] Microsoft SQL Server integrated logins found and should be reviewed
5968| [1709] Microsoft SQL Server guest user IDs found
5969| [1708] Microsoft SQL Server stale logins found
5970| [1705] Microsoft SQL Server orphaned user IDs found that could result in unauthorized permissions being granted
5971| [1704] Microsoft SQL Server mismatched user IDs could result in granting of unauthorized permissions
5972| [1703] Microsoft SQL Server can be configured to audit failed or successful logins
5973| [1702] Microsoft SQL Server can be configured for different authentication methods
5974| [1701] Microsoft SQL Server set to view NT username, not hostname when viewing current users
5975| [1700] Microsoft SQL Server guest login found
5976| [1697] Microsoft SQL Server allows easily-guessed passwords
5977| [1675] Microsoft Internet Explorer 4.0 connection-reuse problem
5978| [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
5979| [1654] Microsoft IIS remote FTP buffer overflow
5980| [1638] Microsoft IIS crashes processing some GET commands
5981| [1566] Microsoft Windows NT user account deleted
5982| [1556] Microsoft Windows NT user account created
5983| [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
5984| [1459] Blank sa password on Microsoft SQL Server
5985| [1458] Blank probe password found on Microsoft SQL Server
5986| [1457] Microsoft SQL server detection (TCP)
5987| [1451] Microsoft SQL Server detection (named pipes)
5988| [1394] Microsoft Windows NT 4.0 without Service Pack 4
5989| [1383] Microsoft TCP/IP allows an attacker to reset connections
5990| [1376] Microsoft Proxy 2.0 denial of service
5991| [1372] Microsoft Windows NT snork attack can disable system
5992| [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
5993| [1321] Microsoft Windows Interactive_Guest_Logon
5994| [1320] Microsoft Windows legal notice display not enabled
5995| [1319] Microsoft Windows local user on workstation
5996| [1315] Microsoft Windows network Guest logon
5997| [1314] Microsoft Windows NT user has never logged on
5998| [1312] Microsoft Windows NT null session user modals
5999| [1296] Microsoft Windows service user
6000| [1295] Microsoft Windows NT service user password found
6001| [1291] Microsoft Windows shutdown without logon enabled
6002| [1288] Microsoft Windows NT system key encryption not enabled
6003| [1286] Microsoft Windows NT TCP/IP security not enabled
6004| [1285] Microsoft Windows trojan key permissions
6005| [1284] Microsoft Windows NT trusted domain
6006| [1273] Microsoft IIS special characters allowed in shell
6007| [1272] Microsoft IIS CGI scripts run as system
6008| [1271] Microsoft IIS version 2 installed
6009| [1270] Microsoft IIS incorrect permissions on restricted item
6010| [1269] Microsoft IIS incorrect Web permissions
6011| [1268] Microsoft IIS SSI #exec enabled
6012| [1226] Microsoft DNS Server - DNS Zone Transfers from high ports
6013| [1223] Microsoft Exchange Server SMTP and NNTP denial of service
6014| [1216] Microsoft IIS SSL patch not applied
6015| [1215] Microsoft IIS Passive FTP patch not applied
6016| [1212] Microsoft IIS unauthorized ODBC data access with RDS
6017| [1125] Microsoft IIS ASP DATA issue could reveal source code
6018| [1075] Microsoft Windows file-sharing access error
6019| [981] Microsoft Windows WINS exploit using SNMP
6020| [949] Microsoft IIS server script debugging enabled
6021| [948] Microsoft IIS samples installed on Web server
6022| [943] Microsoft Office installed on Web server
6023| [936] Microsoft IIS NTFS insecure permissions
6024| [935] Microsoft IIS executable paths
6025| [917] Microsoft Internet Explorer MK overrun
6026| [916] Microsoft Internet Explorer Embed issue
6027| [910] Microsoft Office 97 files are out of date
6028| [908] Microsoft FrontPage extensions under Unix create world readable password files
6029| [710] Microsoft Windows NT portbind issue
6030| [679] Microsoft Windows null session
6031| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
6032| [587] Microsoft Internet Explorer Freiburg text viewing issue
6033| [562] Microsoft Office file manager allows users to see files without access
6034| [561] Microsoft FrontPage 1.1 allows users to write to executable directories
6035| [539] Microsoft Windows 95 and Internet Explorer password disclosure
6036| [538] Microsoft Windows NT Winpopup DoS attack
6037| [536] Microsoft Windows NT discloses system information
6038| [535] Microsoft Windows NT sometimes does not kill all processes when logging out
6039| [534] Microsoft Windows 95 stores many passwords in plain text in the registry
6040| [530] Microsoft Windows NT RAS service packet filtering rules can be bypassed
6041| [529] Microsoft Windows NT case problems can lead to admin access
6042| [528] Microsoft Windows NT fragmentation attack
6043| [526] Microsoft Windows NT path is insecure and can be easily trojaned
6044| [470] Microsoft Excel passwords are easily cracked
6045| [463] Microsoft Internet Explorer 3.0 allows remote command execution
6046| [462] Microsoft Internet Explorer 3.0.1 .ISP script file execution
6047| [459] Microsoft Internet Explorer divulges sensitive information in response to NTLM requests
6048| [456] Microsoft Internet Explorer and Netscape Java applets can open network connections to a server
6049| [397] Microsoft cd .. Bug
6050| [385] Microsoft Internet Explorer has the check security certificate before sending option disabled
6051| [362] Microsoft Internet Explorer entering/leaving a secure site warning disabled
6052| [361] Microsoft Internet Explorer is outdated
6053| [360] Microsoft Internet Explorer non-secure form submission warning is disabled
6054| [359] Microsoft Internet Explorer has Java enabled
6055| [358] Microsoft Internet Explorer Form redirection enabled
6056| [357] Microsoft Internet Explorer has check security certificate before viewing option disabled
6057| [356] Microsoft Internet Explorer allows secure content to be cached
6058| [355] Microsoft Internet Explorer allows ActiveX controls to be automatically executed
6059| [354] Microsoft Internet Explorer active scripting is enabled
6060| [353] Microsoft Internet Explorer allows active content to be automatically downloaded
6061| [352] Microsoft Internet Explorer has low active content security
6062| [351] Microsoft Internet Explorer accept cookies warning disabled
6063| [342] Microsoft Windows NT SMB logon denial of service
6064| [336] Microsoft IIS ASP dot bug
6065| [283] Microsoft Windows account password guessed
6066| [256] Microsoft IIS can be remotely crashed by excessively long client requests
6067| [186] Microsoft Windows NT DNS denial of service
6068| [172] Microsoft Windows NT Post-SP2 security patches missing
6069| [168] Microsoft Windows key with incorrect permissions
6070| [140] Microsoft Windows telnet service installed
6071| [138] Microsoft Windows system log accessible
6072| [121] Microsoft Windows NT security log accessible
6073| [120] Microsoft Windows schedule service running
6074| [114] Microsoft Windows NT rsh service Running
6075| [102] Microsoft Windows NT rexec service running
6076| [99] Microsoft Windows registry can be opened remotely
6077| [98] Microsoft Windows NT rcmd service running
6078| [92] Microsoft Windows NT rlogin service installed
6079| [66] Microsoft Windows NT kernel outdated
6080| [17] Microsoft Windows NT RPC locator denial of service
6081| [16] Microsoft Windows Remote Access Service
6082| [14] Microsoft Windows NT 4.0 without Service Pack 3
6083| [13] Microsoft Windows Network Monitor insecure password
6084| [11] Microsoft Windows NT 4.0 beta
6085| [7] Microsoft IIS ASP source visible
6086|
6087| Exploit-DB - https://www.exploit-db.com:
6088| [31118] Microsoft Works 8.0 File Converter Field Length Remote Code Execution Vulnerability
6089| [30825] Microsoft Windows Media Digital Rights Management ActiveX Control Buffer Overflow Vulnerability
6090| [30773] Microsoft Jet Database Engine MDB File Parsing Remote Buffer Overflow Vulnerability
6091| [30759] VTLS Web Gateway 48.1 Searchtype Parameter Cross-Site Scripting Vulnerability
6092| [30756] Microsoft Forms 2.0 ActiveX Control 2.0 Memory Access Violation Denial of Service Vulnerabilities
6093| [30749] Microsoft Office 2003 Web Component Memory Access Violation Denial of Service Vulnerability
6094| [30645] Microsoft Windows URI Handler Command Execution Vulnerability
6095| [30636] Microsoft Windows 2000/2003 Recursive DNS Spoofing Vulnerability (2)
6096| [30635] Microsoft Windows 2000/2003 Recursive DNS Spoofing Vulnerability (1)
6097| [30622] Microsoft Internet Explorer 5.0.1 File Upload Vulnerability
6098| [30619] Microsoft Windows Explorer PNG Image - Local Denial Of Service Vulnerability
6099| [30593] Microsoft MFC Library CFileFind::FindFile Buffer Overflow Vulnerability
6100| [30567] Microsoft Agent agentdpv.dll ActiveX Control Malformed URL Stack Buffer Overflow Vulnerability
6101| [30537] Microsoft MSN Messenger <= 8.0 - Video Conversation Buffer Overflow Vulnerability
6102| [30494] Microsoft Internet Explorer 5.0.1 Vector Markup Language VGX.DLL Remote Buffer Overflow Vulnerability
6103| [30493] Microsoft XML Core Services <= 6.0 SubstringData Integer Overflow Vulnerability
6104| [30490] Microsoft Internet Explorer 5.0.1 TBLinf32.DLL ActiveX Control Remote Code Execution Vulnerability
6105| [30462] Microsoft Windows Media Player 11 - AU Divide-By-Zero Denial of Service Vulnerability
6106| [30455] Microsoft Internet Explorer 6.0 Position:Relative Denial of Service Vulnerability
6107| [30392] Microsoft Windows ndproxy.sys - Local Privilege Escalation
6108| [30285] Microsoft Internet Explorer and Mozilla Firefox URI Handler Command Injection Vulnerability
6109| [30281] Microsoft .Net Framework <= 2.0 - Multiple Null Byte Injection Vulnerabilities
6110| [30160] Microsoft Windows XP - GDI+ ICO File Remote Denial of Service Vulnerability
6111| [30080] Linux Kernel 2.6.x VFat Compat IOCTLS Local Denial of Service Vulnerability
6112| [30011] Microsoft Tagged Image File Format (TIFF) Integer Overflow
6113| [29951] Microsoft SharePoint Server 3.0 Cross-Site Scripting Vulnerability
6114| [29858] MS12-022 Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
6115| [29813] Microsoft Windows Vista ARP Table Entries Denial of Service Vulnerability
6116| [29800] Microsoft Internet Explorer 7.0 HTML Denial of Service Vulnerability
6117| [29771] Microsoft Windows Vista Windows Mail Local File Execution Vulnerability
6118| [29741] Microsoft Internet Explorer 7.0 NavCancel.HTM Cross-Site Scripting Vulnerability
6119| [29738] Microsoft Windows XP/2000 WinMM.DLL - WAV Files Remote Denial of Service (DoS) Vulnerability
6120| [29664] Microsoft Office Publisher 2007 - Remote Denial of Service (DoS) Vulnerability
6121| [29660] Microsoft Office 2003 - Denial of Service (DoS) Vulnerability
6122| [29659] Microsoft Windows XP/2003 Explorer WMF File Handling Denial of Service Vulnerability
6123| [29630] Microsoft Windows 2003/XP ReadDirectoryChangesW Information Disclosure Vulnerability
6124| [29619] Microsoft Internet Explorer 6.0 - Local File Access Weakness
6125| [29536] Microsoft Internet Explorer 5.0.1 - Multiple ActiveX Controls Denial of Service Vulnerabilities
6126| [29524] Microsoft Word 2000 - Malformed Function Code Execution Vulnerability
6127| [29295] Microsoft Outlook ActiveX Control Remote Internet Explorer Denial of Service Vulnerability
6128| [29286] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
6129| [29285] Microsoft Windows Media 6.4/10.0 - MID Malformed Header Chunk DoS
6130| [29236] Microsoft Internet Explorer 7.0 CSS Width Element Denial of Service Vulnerability
6131| [29229] Microsoft Internet Explorer 6.0 Frame Src Denial of Service Vulnerability
6132| [29172] Microsoft Office 97 HTMLMARQ.OCX Library Denial of Service Vulnerability
6133| [28974] MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
6134| [28897] Microsoft Internet Explorer 7.0 MHTML Denial of Service Vulnerability
6135| [28880] Microsoft Internet Explorer 6.0/7.0 RemoveChild Denial of Service Vulnerability
6136| [28877] Microsoft Internet Explorer 6.0 Unspecified Code Execution Vulnerability (2)
6137| [28876] Microsoft Internet Explorer 6.0 Unspecified Code Execution Vulnerability (1)
6138| [28834] Microsoft Windows XP CMD.EXE Buffer Overflow Vulnerability
6139| [28822] Microsoft Class Package Export Tool 5.0.2752 0 Clspack.exe Local Buffer Overflow Vulnerability
6140| [28500] Microsoft Indexing Service Query Validation Cross-Site Scripting Vulnerability
6141| [28482] MS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution
6142| [28481] MS13-069 Microsoft Internet Explorer CCaret Use-After-Free
6143| [28438] Microsoft Internet Explorer 5.0.1 Daxctle.OCX Spline Method Heap Buffer Overflow Vulnerability
6144| [28421] Microsoft Internet Explorer 6.0 - Multiple COM Object Color Property Denial of Service Vulnerabilities
6145| [28420] Microsoft Windows 2000 Multiple COM Object Instantiation Code Execution Vulnerabilities
6146| [28401] Microsoft Internet Explorer 6.0 Visual Studio COM Object Instantiation Denial of Service Vulnerability
6147| [28400] Microsoft Internet Explorer 6.0 TSUserEX.DLL ActiveX Control Memory Corruption Vulnerability
6148| [28389] Microsoft Internet Explorer 6.0 MSOE.DLL Denial of Service Vulnerability
6149| [28387] Microsoft Internet Explorer 6.0 IMSKDIC.DLL Denial of Service Vulnerability
6150| [28381] microsoft windows xp/2000/2003 help Multiple Vulnerabilities
6151| [28357] Microsoft Windows Explorer 2000/2003/XP Drag and Drop Remote Code Execution Vulnerability
6152| [28343] Microsoft Internet Explorer 6.0/7.0 IFrame Refresh Denial of Service Vulnerability
6153| [28301] Microsoft Internet Explorer 6.0 Deleted Frame Object Denial of Service Vulnerability
6154| [28299] Microsoft Windows XP/2000/2003 Graphical Device Interface Plus Library Denial of Service Vulnerability
6155| [28286] Microsoft Internet Explorer 6.0 NDFXArtEffects Stack Overflow Vulnerability
6156| [28265] Microsoft Internet Explorer 6.0 Native Function Iterator Denial of Service Vulnerability
6157| [28263] Microsoft Windows XP/2000/2003 Remote Denial of Service Vulnerability
6158| [28259] Microsoft Internet Explorer 6.0 NMSA.ASFSourceMediaDescription Stack Overflow Vulnerability
6159| [28258] Microsoft Internet Explorer 6.0 - Multiple Object ListWidth Property Denial of Service Vulnerability
6160| [28256] Microsoft Internet Explorer 6.0 Internet.HHCtrl Click Denial of Service Vulnerability
6161| [28252] Microsoft Internet Explorer 6.0 String To Binary Function Denial of Service Vulnerability
6162| [28246] Microsoft Internet Explorer 6.0 OVCtl Denial of Service Vulnerability
6163| [28244] Microsoft Internet Explorer 6.0 DataSourceControl Denial of Service Vulnerability
6164| [28238] Microsoft SharePoint 2013 (Cloud) - Persistent Exception Handling Vulnerability MS13-067
6165| [28227] Microsoft Windows 2000/XP Registry Access Local Denial of Service Vulnerability
6166| [28226] Microsoft PowerPoint 2003 PPT File Closure Memory Corruption
6167| [28225] Microsoft PowerPoint 2003 powerpnt.exe Unspecified Issue
6168| [28224] Microsoft PowerPoint 2003 mso.dll PPT Processing Unspecified Code Execution
6169| [28222] microsoft works 8.0 spreadsheet Multiple Vulnerabilities
6170| [28213] Microsoft Internet Explorer 6.0 RevealTrans Denial of Service Vulnerability
6171| [28207] Microsoft Internet Explorer 6.0 TriEditDocument Denial of Service Vulnerability
6172| [28202] Microsoft Internet Explorer 6.0 HtmlDlgSafeHelper Remote Denial of Service Vulnerability
6173| [28198] Microsoft Office 2000/2002 Property Code Execution Vulnerability
6174| [28197] Microsoft Internet Explorer 6.0 Object.Microsoft.DXTFilter Denial of Service Vulnerability
6175| [28196] Microsoft Internet Explorer 6.0 DirectAnimation.DAUserData Denial of Service Vulnerability
6176| [28194] Microsoft Internet Explorer 6 RDS.DataControl Denial of Service Vulnerability
6177| [28189] Microsoft Excel 2000-2004 Style Handling and Repair Remote Code Execution Vulnerability
6178| [28187] MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free
6179| [28169] Microsoft Internet Explorer 5.0.1/6.0 Structured Graphics Control Denial of Service Vulnerability
6180| [28164] Microsoft Internet Explorer 6.0 Href Title Denial of Service Vulnerability
6181| [28145] Microsoft Internet Explorer 6.0 ADODB.Recordset Filter Property Denial of Service Vulnerability
6182| [28144] Microsoft Internet Explorer 6.0 OutlookExpress.AddressBook Denial of Service Vulnerability
6183| [28118] Microsoft Internet Explorer 5.0.1 OuterHTML Redirection Handling Information Disclosure Vulnerability
6184| [28087] Microsoft Office 2003 Embedded Shockwave Flash Object Security Bypass Weakness
6185| [28082] MS13-059 Microsoft Internet Explorer CFlatMarkupPointer Use-After-Free
6186| [28005] Microsoft Exchange Server 2000/2003 Outlook Web Access Script Injection Vulnerability
6187| [28001] Microsoft SMB Driver Local Denial of Service Vulnerability
6188| [27984] Microsoft DXImageTransform.Microsoft.Light ActiveX Control Remote Code Execution Vulnerability
6189| [27971] Microsoft Internet Explorer 5.0.1 Frameset Memory Corruption Vulnerability
6190| [27930] Microsoft Windows XP/2000/2003 MHTML URI Buffer Overflow Vulnerability
6191| [27906] Microsoft Internet Explorer 6.0 Malformed HTML Parsing Denial of Service Vulnerability
6192| [27851] Microsoft Windows - Path Conversion Weakness
6193| [27850] Microsoft Infotech Storage Library Heap Corruption Vulnerability
6194| [27744] Microsoft Internet Explorer 5.0.1 Modal Dialog Manipulation Vulnerability
6195| [27727] Microsoft Internet Explorer 6.0 Nested OBJECT Tag Memory Corruption Vulnerability
6196| [27620] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
6197| [27577] Microsoft Internet Explorer 5.0 Address Bar Spoofing Vulnerability
6198| [27476] Microsoft .NET Framework SDK 1.0/1.1 MSIL Tools Buffer Overflow Vulnerabilities
6199| [27433] Microsoft Internet Explorer 5.0.1 Script Action Handler Buffer Overflow Vulnerability
6200| [27082] Microsoft Internet Explorer 5.0.1 Malformed IMG and XML Parsing Denial of Service Vulnerability
6201| [27073] Microsoft Visual Studio UserControl Remote Code Execution Vulnerability (2)
6202| [27072] Microsoft Visual Studio UserControl Remote Code Execution Vulnerability (1)
6203| [27055] Microsoft Excel 95-2004 Malformed Graphic File Code Execution Vulnerability
6204| [27051] Microsoft Windows Graphics Rendering Engine Multiple Memory Corruption Vulnerabilities
6205| [26985] Microsoft Internet Explorer 5.0.1 HTML Parsing Denial of Service Vulnerabilities
6206| [26869] Microsoft Excel 95/97/2000/2002/2003/2004 Unspecified Memory Corruption Vulnerabilities
6207| [26769] Microsoft Excel 95/97/2000/2002/2003/2004 Malformed Range Memory Corruption Vulnerability
6208| [26690] Microsoft Windows 2000/2003/XP CreateRemoteThread Local Denial of Service Vulnerability
6209| [26517] Microsoft Office PowerPoint 2007 - Crash PoC
6210| [26457] Microsoft Internet Explorer 6.0 Malformed HTML Parsing Denial of Service Vulnerability
6211| [26341] Microsoft Windows 2000/2003/XP MSDTC TIP Denial of Service Vulnerability
6212| [26336] Oracle Forms Servlet TLS Listener Remote Denial of Service Vulnerability
6213| [26331] Oracle 9.0 iSQL*Plus TLS Listener - Remote Denial of Service Vulnerability
6214| [26323] Microsoft Windows XP Wireless Zero Configuration Service Information Disclosure Vulnerability
6215| [26292] Microsoft Internet Explorer 5.2.3 for Mac OS Denial of Service Vulnerability
6216| [26230] Microsoft IIS 5.1 WebDAV HTTP Request Source Code Disclosure Vulnerability
6217| [26222] Microsoft Windows 2000/2003/XP Keyboard Event Privilege Escalation Weakness
6218| [26175] MS13-009 Microsoft Internet Explorer COALineDashStyleArray Integer Overflow
6219| [26167] Microsoft Visual Studio .NET msdds.dll Remote Code Execution Vulnerability
6220| [25999] Microsoft Internet Explorer textNode Use-After-Free
6221| [25992] Microsoft Internet Explorer 5.0.1 JPEG Image Rendering CMP Fencepost Denial of Service Vulnerability
6222| [25991] Microsoft Internet Explorer 5.0.1 JPEG Image Rendering Unspecified Buffer Overflow Vulnerability
6223| [25962] Microsoft ASP.NET 1.0/1.1 RPC/Encoded Remote Denial of Service Vulnerability
6224| [25784] Microsoft Outlook Express 4.x/5.x/6.0 Attachment Processing File Extension Obfuscation Vulnerability
6225| [25737] Microsoft Windows 98SE User32.DLL Icon Handling Denial of Service Vulnerability
6226| [25454] Microsoft Windows 98/2000 Explorer Preview Pane Script Injection Vulnerability
6227| [25386] Microsoft Internet Explorer 5.0.1 DHTML Object Race Condition Memory Corruption Vulnerability
6228| [25385] Microsoft Internet Explorer 5.0.1 Content Advisor File Handling Buffer Overflow Vulnerability
6229| [25384] Microsoft Windows 2000/XP Internet Protocol Validation Remote Code Execution Vulnerability (2)
6230| [25383] Microsoft Windows 2000/XP Internet Protocol Validation Remote Code Execution Vulnerability (1)
6231| [25294] Microsoft Internet Explorer CGenericElement Object Use-After-Free Vulnerability
6232| [25268] Microsoft Windows XP TSShutdn.exe Remote Denial of Service Vulnerability
6233| [25259] Microsoft Windows XP Local Denial of Service Vulnerability
6234| [25231] Microsoft Windows 2000/2003/XP Graphical Device Interface Library Denial of Service Vulnerability
6235| [25157] Microsoft Log Sink Class ActiveX Control Arbitrary File Creation Vulnerability
6236| [25129] Microsoft Internet Explorer 6.0 Pop-up Window Title Bar Spoofing Weakness
6237| [25110] Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities
6238| [25095] Microsoft Internet Explorer 5.0.1 Mouse Event URI Status Bar Obfuscation Weakness
6239| [25085] Microsoft Office XP 2000/2002 HTML Link Processing Remote Buffer Overflow Vulnerability
6240| [25084] Microsoft Outlook 2003 Web Access Login Form Remote URI Redirection Vulnerability
6241| [25050] Microsoft Windows 2000/2003/XP winhlp32 Phrase Heap Overflow Vulnerability
6242| [25049] Microsoft Windows 2000/2003/XP winhlp32 Phrase Integer Overflow Vulnerability
6243| [24865] GnuTLS libgnutls Double-free Certificate List Parsing Remote DoS
6244| [24808] Microsoft Internet Explorer 6.0 Search Pane URI Obfuscation Vulnerability
6245| [24802] Microsoft Internet Explorer 6.0 Sysimage Protocol Handler Local File Detection Vulnerability
6246| [24800] Microsoft Internet Explorer 5.0.1 FTP URI Arbitrary FTP Server Command Execution Vulnerability
6247| [24775] Microsoft Internet Explorer 6.0 Infinite Array Sort Denial of Service Vulnerability
6248| [24727] Microsoft Internet Explorer 6.0 - Local Resource Enumeration Vulnerability
6249| [24720] Microsoft Internet Explorer 6.0 IFRAME Status Bar URI Obfuscation Weakness
6250| [24714] Microsoft Internet Explorer 6.0 HTML Form Tags URI Obfuscation Weakness
6251| [24712] Microsoft Internet Explorer 6.0 TABLE Status Bar URI Obfuscation Weakness
6252| [24705] Microsoft Internet Explorer 6.0 Font Tag Denial of Service Vulnerability
6253| [24699] Microsoft Windows XP WAV File Handler Denial of Service Vulnerability
6254| [24693] Microsoft Internet Explorer 5.x Valid File Drag and Drop Embedded Code Vulnerability
6255| [24687] Microsoft Outlook Express 4.x/5.x/6.0 Plaintext Email Security Policy Bypass Vulnerability
6256| [24686] Microsoft Outlook 2003 Security Policy Bypass Vulnerability
6257| [24682] Microsoft Windows XP Weak Default Configuration Vulnerability
6258| [24666] Microsoft ASP.NET 1.x URI Canonicalization Unauthorized Web Access Vulnerability
6259| [24640] Microsoft SQL Server 7.0 - Remote Denial of Service Vulnerability (2)
6260| [24639] Microsoft SQL Server 7.0 - Remote Denial of Service Vulnerability (1)
6261| [24605] Microsoft Windows XP Explorer.EXE TIFF Image Denial of Service Vulnerability
6262| [24538] MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
6263| [24495] Microsoft Internet Explorer SLayoutRun Use-After-Free (MS13-009)
6264| [24407] Microsoft Internet Explorer 6.0 Resource Detection Weakness
6265| [24354] Microsoft Internet Explorer 6.0 mms Protocol Handler Executable Command Line Injection Vulnerability
6266| [24328] Microsoft Internet Explorer 5.0.1 Style Tag Comment Memory Corruption Vulnerability
6267| [24281] Microsoft Systems Management Server 1.2/2.0 - Remote Denial of Service Vulnerability
6268| [24277] Microsoft Windows 2000/NT 4 POSIX Subsystem Buffer Overflow Local Privilege Escalation Vulnerability
6269| [24267] Microsoft Internet Explorer 6.0 JavaScript Null Pointer Exception Denial of Service Vulnerability
6270| [24266] Microsoft Internet Explorer 5.0.1 Popup.show Mouse Event Hijacking Vulnerability
6271| [24265] Microsoft Internet Explorer 5.0.1 JavaScript Method Assignment Cross-Domain Scripting Vulnerability
6272| [24249] Microsoft Internet Explorer 6.0 Shell.Application Object Script Execution Weakness
6273| [24213] Microsoft Internet Explorer 5.0.1 Wildcard DNS Cross-Site Scripting Vulnerability
6274| [24211] Microsoft Internet Explorer 6.0 HREF Save As Denial of Service Vulnerability
6275| [24187] Microsoft Internet Explorer 6.0 ADODB.Stream Object File Installation Weakness
6276| [24174] Microsoft Internet Explorer 6.0 URL Local Resource Access Weakness
6277| [24173] PHP 4.3.x Microsoft Windows Shell Escape Functions Command Execution Vulnerability
6278| [24135] Microsoft Internet Explorer 5.0.1 CSS Style Sheet Memory Corruption Vulnerability
6279| [24125] Microsoft Windows XP Self-Executing Folder Vulnerability
6280| [24119] Microsoft Internet Explorer 5.0.1 http-equiv Meta Tag Denial of Service Vulnerability
6281| [24118] Microsoft Outlook Express 6.0 URI Obfuscation Vulnerability
6282| [24117] Microsoft Internet Explorer 6.0 Codebase Double Backslash Local Zone File Execution Weakness
6283| [24114] Microsoft Outlook 2003Mail Client E-mail Address Verification Weakness
6284| [24112] Microsoft Internet Explorer 6.0 XML Parsing Denial of Service Vulnerability
6285| [24102] Microsoft Internet Explorer 4/5/6 Embedded Image URI Obfuscation Weakness
6286| [24101] Microsoft Outlook 2003 Predictable File Location Weakness
6287| [24069] Microsoft Internet Explorer 6.0 Meta Data Foreign Domain Spoofing Vulnerability
6288| [24051] Microsoft Windows XP/2000/NT 4 Shell Long Share Name Buffer Overrun Vulnerability
6289| [24020] Microsoft Internet Explorer Option Element Use-After-Free
6290| [24002] Microsoft Outlook Express 6.0 - Remote Denial of Service Vulnerability
6291| [23989] Microsoft Windows 2000/NT 4 Local Descriptor Table Local Privilege Escalation Vulnerability
6292| [23912] Microsoft Internet Explorer 6.0 Macromedia Flash Player Plug-in Remote Denial of Service Vulnerability
6293| [23911] Microsoft Internet Explorer 6.0 MSWebDVD Object Denial of Service Vulnerability
6294| [23903] Microsoft Internet Explorer 6.0 HTML Form Status Bar Misrepresentation Vulnerability
6295| [23850] Microsoft Windows XP Explorer.EXE Remote Denial of Service Vulnerability
6296| [23796] Microsoft Outlook 2002 Mailto Parameter Quoting Zone Bypass Vulnerability
6297| [23790] Microsoft Internet Explorer 5 window.open Search Pane Cross-Zone Scripting Vulnerability
6298| [23785] Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability
6299| [23768] Microsoft Internet Explorer 6.0 window.open Media Bar Cross-Zone Scripting Vulnerability
6300| [23766] Microsoft Internet Explorer 5/6 Cross-Domain Event Leakage Vulnerability
6301| [23754] Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability
6302| [23717] Microsoft Windows XP Help And Support Center Interface Spoofing Weakness
6303| [23695] Microsoft Internet Explorer 5.0.1 ITS Protocol Zone Bypass Vulnerability
6304| [23679] Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (2)
6305| [23678] Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (1)
6306| [23675] Microsoft Windows XP HCP URI Handler Arbitrary Command Execution Vulnerability
6307| [23668] Microsoft Internet Explorer 5.0.1 LoadPicture File Enumeration Weakness
6308| [23649] Microsoft SQL Server Database Link Crawling Command Execution
6309| [23643] Microsoft Internet Explorer 5 NavigateAndFind() Cross-Zone Policy Vulnerability
6310| [23504] Microsoft Windows XP/2000 showHelp CHM File Execution Weakness
6311| [23490] Microsoft IIS 5.0 Failure To Log Undocumented TRACK Requests Vulnerability
6312| [23401] Microsoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (2)
6313| [23400] Microsoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (1)
6314| [23340] Microsoft Internet Explorer 6.0 Double Slash Cache Zone Bypass Vulnerability
6315| [23321] Microsoft Internet Explorer 6-10 Mouse Tracking
6316| [23283] Microsoft Internet Explorer 6.0 - Local Resource Reference Vulnerability
6317| [23273] Microsoft Internet Explorer 6.0 Scrollbar-Base-Color Partial Denial of Service Vulnerability
6318| [23255] Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability
6319| [23247] Microsoft Windows XP/2000 Messenger Service Buffer Overrun Vulnerability
6320| [23229] Microsoft Windows XP/2000/2003 Message Queuing Service Heap Overflow Vulnerability
6321| [23216] Microsoft Word 97/98/2002 Malformed Document Denial of Service Vulnerability
6322| [23215] Microsoft Internet Explorer 6 Absolute Position Block Denial of Service Vulnerability
6323| [23210] Microsoft Windows XP/2000 PostThreadMessage() Arbitrary Process Killing Vulnerability
6324| [23179] Oracle MySQL for Microsoft Windows MOF Execution
6325| [23131] Microsoft Internet Explorer 6.0 Script Execution Vulnerabilities
6326| [23122] Microsoft Internet Explorer 5 XML Page Object Type Validation Vulnerability
6327| [23114] Microsoft Internet Explorer 5/6 Browser Popup Window Object Type Validation Vulnerability
6328| [23113] Microsoft Exchange Server 4.0/5.0 SMTP HELO Argument Buffer Overflow Vulnerability
6329| [23101] Microsoft Windows 98 Fragmented UDP Flood Denial of Service Vulnerability
6330| [23096] Microsoft WordPerfect Converter Buffer Overrun Vulnerability
6331| [23095] Microsoft Access 97/2000/2002 Snapshot Viewer ActiveX Control Parameter Buffer Overflow Vulnerability
6332| [23094] Microsoft Visual Basic For Applications SDK 5.0/6.0/6.2/6.3 Document Handling Buffer Overrun Vulnerability
6333| [23093] Microsoft Windows XP TCP Packet Information Leakage Vulnerability
6334| [23044] Microsoft Internet Explorer 5/6 Object Type Validation Vulnerability
6335| [23034] Microsoft URLScan 2.5/ RSA Security SecurID 5.0 Configuration Enumeration Weakness
6336| [23019] Microsoft Windows 2000 Subnet Bandwidth Manager RSVP Server Authority Hijacking Vulnerability
6337| [22959] Microsoft Outlook Express 5/6 Script Execution Weakness
6338| [22957] Microsoft SQL Server 7.0/2000,MSDE Named Pipe Denial of Service Vulnerability
6339| [22919] Microsoft ISA Server 2000 Cross-Site Scripting Vulnerabilities
6340| [22917] Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability
6341| [22883] Microsoft Windows 2000 CreateFile API Named Pipe Privilege Escalation Vulnerability (2)
6342| [22882] Microsoft Windows 2000 CreateFile API Named Pipe Privilege Escalation Vulnerability (1)
6343| [22870] Microsoft Windows XP/2000 RunDLL32.EXE Buffer Overflow Vulnerability
6344| [22869] Microsoft Outlook 5.5/2000 Web Access HTML Attachment Script Execution Vulnerability
6345| [22850] Microsoft Office OneNote 2010 Crash PoC
6346| [22837] Microsoft Windows 2000/NT 4 Media Services NSIISlog.DLL Remote Buffer Overflow
6347| [22824] Microsoft Windows XP/2000/NT 4 HTML Converter HR Align Buffer Overflow Vulnerability
6348| [22784] Microsoft Internet Explorer 5 Custom HTTP Error HTML Injection Vulnerability
6349| [22783] Microsoft Internet Explorer 5/6 MSXML XML File Parsing Cross-Site Scripting Vulnerability
6350| [22782] Microsoft Windows 2000 Active Directory Remote Stack Overflow Vulnerability
6351| [22734] Microsoft Internet Explorer 6 %USERPROFILE% File Execution Weakness
6352| [22728] Microsoft Internet Explorer 5 Classic Mode FTP Client Cross Domain Scripting Vulnerability
6353| [22726] Microsoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability
6354| [22679] Microsoft Visio 2010 Crash PoC
6355| [22670] Microsoft IIS 5 WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
6356| [22655] Microsoft Publisher 2013 Crash PoC
6357| [22621] Microsoft Netmeeting 2.1/3.0.1 4.4.3385 CALLTO URL Buffer Overflow Vulnerability
6358| [22591] Microsoft Office Excel 2007 - WriteAV Crash PoC
6359| [22576] Microsoft SQL Server 7.0/2000 JET Database Engine 4.0 Buffer Overrun Vulnerability
6360| [22570] Microsoft Windows Media Player 7.1 Skin File Code Execution Vulnerability
6361| [22563] Microsoft IIS 5 User Existence Disclosure Vulnerability (2)
6362| [22562] Microsoft IIS 5 User Existence Disclosure Vulnerability (1)
6363| [22555] Microsoft BizTalk Server 2000/2002 DTA RawCustomSearchField.asp SQL Injection
6364| [22554] Microsoft BizTalk Server 2000/2002 DTA rawdocdata.asp SQL Injection Vulnerability
6365| [22553] Microsoft BizTalk Server 2002 HTTP Receiver Buffer Overflow Vulnerability
6366| [22530] Microsoft Internet Explorer 5 Remote URLMON.DLL Buffer Overflow Vulnerability
6367| [22528] Microsoft Windows 2000 RegEdit.EXE Registry Key Value Buffer Overflow Vulnerability
6368| [22518] Microsoft Shlwapi.dll 6.0.2800 .1106 Malformed HTML Form Tag DoS Vulnerability
6369| [22390] Microsoft ActiveSync 3.5 Null Pointer Dereference Denial of Service Vulnerability
6370| [22368] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (4)
6371| [22367] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (3)
6372| [22366] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (2)
6373| [22365] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (1)
6374| [22354] Microsoft Windows 2000 Help Facility .CNT File :Link Buffer Overflow Vulnerability
6375| [22330] Microsoft Office Excel 2010 Crash PoC
6376| [22310] Microsoft Office Publisher 2010 Crash PoC
6377| [22303] Microsoft Windows Help program (WinHlp32.exe) Crash PoC
6378| [22289] Microsoft Windows XP/ME Help and Support Center Buffer Overflow Vulnerability
6379| [22288] Microsoft Internet Explorer 5/6 Self Executing HTML File Vulnerability
6380| [22280] Microsoft Outlook2000/Express 6.0 Arbitrary Program Execution Vulnerability
6381| [22255] Microsoft Windows XP/95/98/2000/NT 4 Riched20.dll Attribute Buffer Overflow Vulnerability
6382| [22245] Microsoft Windows NT/2000 cmd.exe CD Buffer Overflow Vulnerability
6383| [22237] Microsoft Office Picture Manager 2010 Crash PoC
6384| [22232] Microsoft Windows XP HCP URI Buffer Overflow Vulnerability
6385| [22226] Microsoft Internet Explorer 5 ShowHelp Arbitrary Command Execution Vulnerability
6386| [22225] Microsoft Windows XP Redirector Privilege Escalation Vulnerability
6387| [22215] Microsoft Office Word 2010 Crash PoC
6388| [22202] FTLS GuestBook 1.1 Script Injection Vulnerability
6389| [22194] Microsoft Windows XP/2000/NT 4 Locator Service Buffer Overflow Vulnerability
6390| [22132] Microsoft Windows XP/2000 Fontview Denial of Service Vulnerability
6391| [22119] Microsoft Pocket Internet Explorer 3.0 - Denial of Service Vulnerability
6392| [22027] Microsoft Java Virtual Machine 3802 Series Bytecode Verifier Vulnerability
6393| [21959] Microsoft Internet Explorer 5/6 Cached Objects Zone Bypass Vulnerability
6394| [21954] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (4)
6395| [21953] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (3)
6396| [21952] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (2)
6397| [21951] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (1)
6398| [21932] Microsoft Outlook Express 5.5/6.0 S/MIME Buffer Overflow Vulnerability
6399| [21920] Microsoft Content Management Server 2001 Cross-Site Scripting Vulnerability
6400| [21910] Microsoft IIS 5.0 IDC Extension Cross Site Scripting Vulnerability
6401| [21883] Microsoft Internet Explorer 5 Document Reference Zone Bypass Vulnerability
6402| [21840] MS12-063 Microsoft Internet Explorer execCommand Use-After-Free Vulnerability
6403| [21803] Microsoft Internet Explorer 6 URI Handler Restriction Circumvention Vulnerability
6404| [21750] Microsoft Internet Explorer 5 Dialog Same Origin Policy Bypass Variant Vulnerability
6405| [21749] Microsoft Internet Explorer 5/6 XML Redirect File Disclosure Vulnerability
6406| [21721] Microsoft Internet Explorer 4/5/6 XML Datasource Applet File Disclosure Vulnerability
6407| [21718] Microsoft SQL 2000/7.0 Agent Jobs Privilege Elevation Vulnerability
6408| [21717] Microsoft Windows XP HCP URI Handler Abuse Vulnerability
6409| [21711] Microsoft Outlook Express 5/6 MHTML URL Handler File Rendering Vulnerability
6410| [21705] Microsoft Internet Explorer 6.0 File Attachment Script Execution Vulnerability
6411| [21693] Microsoft SQL Server 2000 User Authentication Remote Buffer Overflow Vulnerability
6412| [21670] Microsoft Windows Media Player 6/7 Filename Buffer Overflow Vulnerability
6413| [21662] Microsoft Outlook Express 6 XML File Attachment Script Execution Vulnerability
6414| [21652] Microsoft SQL Server 2000 Resolution Service Heap Overflow Vulnerability
6415| [21651] Microsoft SQL Server 2000 sp_MScopyscript SQL Injection Vulnerability
6416| [21650] Microsoft SQL Server 2000 Database Consistency Checkers Buffer Overflow Vulnerability
6417| [21631] Microsoft Outlook Express 5/6 Spoofable File Extensions Vulnerability
6418| [21613] Microsoft IIS 4/5 SMTP Service Encapsulated SMTP Address Vulnerability
6419| [21601] Microsoft Foundation Class Library 7.0 ISAPI Buffer Overflow Vulnerability
6420| [21556] Microsoft Internet Explorer 5/6 CSSText Bold Font Denial of Service
6421| [21549] Microsoft SQL Server 2000 Password Encrypt Procedure Buffer Overflow Vulnerability
6422| [21541] Microsoft SQL Server 2000 SQLXML Script Injection Vulnerability
6423| [21540] Microsoft SQL Server 2000 SQLXML Buffer Overflow Vulnerability
6424| [21485] Microsoft Windows 95/98/2000/NT4 WinHlp Item Buffer Overflow Vulnerability
6425| [21481] Microsoft MSN Messenger 1-4 Malformed Invite Request Denial of Service
6426| [21452] Microsoft Internet Explorer 5.0.1/6.0 Content-Disposition Handling File Execution Vulnerability
6427| [21419] Microsoft Outlook Express 5.5 DoS Device Denial of Service Vulnerability
6428| [21404] Microsoft Internet Explorer 5/6 Self-Referential Object Denial of Service Vulnerability
6429| [21389] Microsoft Windows 2000 Lanman Denial of Service Vulnerability (2)
6430| [21388] Microsoft Windows 2000 Lanman Denial of Service Vulnerability (1)
6431| [21385] Microsoft IIS 5.0 CodeBrws.ASP Source Code Disclosure Vulnerability
6432| [21376] Microsoft Internet Explorer 5.5/6.0 History List Script Injection Vulnerability
6433| [21372] Microsoft IIS 4/5 HTTP Error Page Cross Site Scripting Vulnerability
6434| [21371] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (4)
6435| [21370] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (3)
6436| [21369] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (2)
6437| [21368] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (1)
6438| [21361] Microsoft Internet Explorer 5 Cascading Style Sheet File Disclosure Vulnerability
6439| [21344] Microsoft Windows 2000 / NT 4.0 Process Handle Local Privilege Elevation Vulnerability
6440| [21313] Microsoft IIS 4.0/5.0/5.1 Authentication Method Disclosure Vulnerability
6441| [21260] Microsoft Site Server 3.0 Cross-Site Scripting Vulnerability
6442| [21258] Microsoft Windows 2000/NT 4 NTFS File Hiding Vulnerability
6443| [21246] Microsoft Windows 2000/NT 4 TCP Stack DoS Vulnerability (2)
6444| [21245] Microsoft Windows 2000/NT 4 TCP Stack DoS Vulnerability (1)
6445| [21240] Microsoft Windows XP .Manifest Denial of Service Vulnerability
6446| [21199] Microsoft Internet Explorer 5 JavaScript Local File Enumeration Vulnerability (2)
6447| [21198] Microsoft Internet Explorer 5 JavaScript Local File Enumeration Vulnerability (1)
6448| [21195] Microsoft Internet Explorer 5/6 GetObject File Disclosure Vulnerability
6449| [21177] Microsoft IIS 5.0 False Content-Length Field DoS Vulnerability
6450| [21172] Microsoft Windows 2000 Internet Key Exchange DoS Vulnerability (2)
6451| [21171] Microsoft Windows 2000 Internet Key Exchange DoS Vulnerability (1)
6452| [21164] Microsoft Internet Explorer 5.5/6.0 Spoofable File Extensions Vulnerability
6453| [21144] Microsoft Internet Explorer 5/6 Cookie Disclosure/Modification Vulnerability
6454| [21131] Microsoft Windows 2000/XP GDI Denial of Service Vulnerability
6455| [21130] Microsoft Windows NT 3/4 CSRSS Memory Access Violation Vulnerability
6456| [21127] Microsoft Internet Explorer 5/6 JavaScript Interface Spoofing Vulnerability
6457| [21123] Microsoft Windows 2000/NT Terminal Server Service RDP DoS Vulnerability
6458| [21118] Microsoft Internet Explorer 5 Zone Spoofing Vulnerability
6459| [21113] Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability
6460| [21099] Microsoft Windows 2000 RunAs Service Denial of Services Vulnerability
6461| [21072] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
6462| [21071] Microsoft IIS 4/5 SSI Buffer Overrun Privelege Elevation
6463| [21069] Microsoft Windows 2000 RunAs Service Named Pipe Hijacking Vulnerability
6464| [21047] Microsoft Windows NT 4.0 NT4ALL DoS Vulnerability
6465| [21004] Microsoft Outlook 98/2000/2002 Arbitrary Code Execution Vulnerability
6466| [21003] Microsoft Outlook 98/2000/2002 Unauthorized Email Access Vulnerability
6467| [20991] Microsoft IIS 4.0/5.0 Device File Remote DoS Vulnerability
6468| [20989] Microsoft IIS 4.0/5.0 Device File Local DoS Vulnerability
6469| [20907] Microsoft Windows 2000 Telnet Username DoS Vulnerability
6470| [20903] Microsoft Internet Explorer 5.5 File Disclosure Vulnerability
6471| [20899] Microsoft Outlook 97/98/2000/4/5 Address Book Spoofing Vulnerability
6472| [20861] Microsoft Windows Kernel Intel x64 SYSRET PoC
6473| [20846] Microsoft IIS 4.0/5.0 FTP Denial of Service Vulnerability
6474| [20818] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (4)
6475| [20817] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (3)
6476| [20816] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (2)
6477| [20815] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (1)
6478| [20802] Microsoft IIS 2.0/3.0 Long URL Denial of Service Vulnerability
6479| [20782] Microsoft IE 5.0/5.5 and OE 5.5 XML Stylesheets Active Scripting Vulnerability
6480| [20763] Microsoft ISA Server 2000 Web Proxy DoS Vulnerability
6481| [20688] Qualcomm Eudora 5.0.2 'Use Microsoft Viewer' Code Execution Vulnerability
6482| [20680] Microsoft IE 5.0.1/5.5/6.0 Telnet Client File Overwrite Vulnerability
6483| [20664] Microsoft IIS 5.0 WebDAV Denial of Service Vulnerability
6484| [20613] Microsoft Windows 98/2000 UDP Socket DoS Vulnerability
6485| [20596] Microsoft Windows NT 4.0 Networking Mutex DoS Vulnerability
6486| [20590] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
6487| [20571] Microsoft Outlook 2000 0/98 0/Express 5.5 Concealed Attachment Vulnerability
6488| [20564] Microsoft Windows NT 4.0 SNMP-WINS DoS Vulnerability
6489| [20553] Microsoft Windows Media Player 7.0 .WMZ Arbitrary Java Applet Vulnerability
6490| [20528] Microsoft Windows Media Player 7.0 Javascript URL Vulnerability
6491| [20515] Microsoft Internet Explorer 5.0.1/5.5 'mstask.exe' CPU Consumption Vulnerability
6492| [20508] Microsoft NT 4.0 RAS/PPTP Malformed Control Packet Denial of Service Attack
6493| [20481] Microsoft IIS 2.0/3.0 Appended Dot Script Source Disclosure Vulnerability
6494| [20460] Microsoft Windows NT 4.0 PhoneBook Server Buffer Overflow
6495| [20459] Microsoft Internet Explorer 5 \'INPUT TYPE=FILE\' Vulnerability
6496| [20457] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_peekqueue Buffer Overflow Vulnerability
6497| [20456] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_showcolv Buffer Overflow Vulnerability
6498| [20451] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_displayparamstmt Buffer Overflow Vulnerability
6499| [20427] Microsoft Windows Media Player 7.0 .ASX Buffer Overflow Vulnerability
6500| [20426] Microsoft Internet Explorer 5.5 Index.dat Vulnerability
6501| [20424] Microsoft Windows Media Player 7.0 .WMS Arbitrary Script Vulnerability
6502| [20399] Microsoft Indexing Services for Windows 2000 File Verification Vulnerability
6503| [20384] Microsoft IIS 4.0/5.0 Executable File Parsing Vulnerability
6504| [20383] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
6505| [20371] Microsoft Windows 95/WfW smbclient Directory Traversal Vulnerability
6506| [20335] Microsoft Indexing Services for Windows 2000/NT 4.0 .htw Cross-Site Scripting Vulnerability
6507| [20317] Microsoft Windows NT 4.0 MSIEXEC Registry Permissions Vulnerability
6508| [20310] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
6509| [20309] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
6510| [20306] Microsoft Virtual Machine Arbitrary Java Codebase Execution Vulnerability
6511| [20305] Microsoft Site Server 2.0 with IIS 4.0 - File Upload Vulnerability
6512| [20289] Microsoft NetMeeting 3.0.1 4.4.3385 Remote Desktop Sharing DoS Vulnerability
6513| [20288] Microsoft Windows 9x File Handle Buffer Overflow Vulnerability
6514| [20284] Microsoft Windows 9x / Me Share Level Password Bypass Vulnerability (2)
6515| [20283] Microsoft Windows 9x / Me Share Level Password Bypass Vulnerability (1)
6516| [20269] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
6517| [20265] Microsoft Windows NT 4.0 / 2000 Spoofed LPC Request Vulnerability
6518| [20257] Microsoft Windows NT 4.0 / 2000 Predictable LPC Message Identifier Multiple Vulnerabilities
6519| [20255] Microsoft Windows NT 4.0 / 2000 LPC Zone Memory Depletion DoS Vulnerability
6520| [20254] Microsoft Windows NT 4.0 Invalid LPC Request DoS Vulnerability
6521| [20243] Microsoft Windows Script Host 5.1/5.5 GetObject() File Disclosure Vulnerability
6522| [20240] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
6523| [20222] Microsoft Windows 2000 telnet.exe NTLM Authentication Vulnerability
6524| [20209] Microsoft Windows 2000 Still Image Service Privilege Escalation Vulnerability
6525| [20174] Microsoft Internet Explorer Fixed Table Col Span Heap Overflow
6526| [20152] "Microsoft IIS 5.0 ""Translate: f"" Source Disclosure Vulnerability (2)"
6527| [20151] "Microsoft IIS 5.0 ""Translate: f"" Source Disclosure Vulnerability (1)"
6528| [20133] Microsoft Windows 2000 Named Pipes Predictability Vulnerability
6529| [20122] Microsoft Office SharePoint Server 2007 Remote Code Execution
6530| [20106] Microsoft Windows NT 4/2000 NetBIOS Name Conflict Vulnerability
6531| [20096] Microsoft IIS 2.0/3.0/4.0/5.0/5.1 Internal IP Address Disclosure Vulnerability
6532| [20089] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
6533| [20079] Microsoft Outlook 97/98/2000, Outlook Express 4.0/5.0 GMT Field Buffer Overflow (2)
6534| [20078] Microsoft Outlook 97/98/2000, Outlook Express 4.0/5.0 GMT Field Buffer Overflow (1)
6535| [20048] Microsoft Windows 2000 Remote CPU-overload Vulnerability
6536| [20047] Microsoft Windows 2000 Telnet Server DoS Vulnerability
6537| [19974] Microsoft Windows Media Services 4.0/4.1 DoS Vulnerability
6538| [19928] Microsoft Active Movie Control 1.0 Filetype Vulnerability
6539| [19908] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
6540| [19907] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
6541| [19889] Microsoft Windows 95/98 NetBIOS NULL Name Vulnerability
6542| [19830] Microsoft Index Server 2.0 '%20' ASP Source Disclosure Vulnerability
6543| [19798] Microsoft Windows NT 4.0 User Shell Folders Vulnerability
6544| [19789] Microsoft Clip Art Gallery 5.0 - Buffer Overflow Vulnerability
6545| [19759] Microsoft Windows Media Services 4.0/4.1 Handshake Sequence DoS
6546| [19754] Microsoft Windows 95/98/NT 4.0 autorun.inf Vulnerability
6547| [19742] microsoft iis 3.0/4.0,microsoft index server 2.0 - Directory Traversal
6548| [19739] Microsoft Windows NT 4.0 Recycle Bin Pre-created Folder Vulnerability
6549| [19734] Microsoft Virtual Machine 2000 Series/3000 Series getSystemResource Vulnerability
6550| [19731] microsoft index server 2.0/indexing services for windows 2000 - Directory Traversal
6551| [19728] Microsoft Systems Management Server 2.0 Default Permissions Vulnerability
6552| [19673] Microsoft Windows 95/98/NT 4.0 Help File Trojan Vulnerability
6553| [19638] Microsoft SQL Server 7.0/7.0 SP1 NULL Data DoS Vulnerability
6554| [19578] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4/SP5/SP6 Services.exe Denial of Service (2)
6555| [19577] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4/SP5/SP6 Services.exe Denial of Service (1)
6556| [19516] Microsoft MSN Messenger Service 1.0 Setup BBS ActiveX Control Buffer Overflow
6557| [19502] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4/SP5 RASMAN Privilege Escalation Vulnerability
6558| [19489] Microsoft Windows NT 4.0 DCOM Server Vulnerability
6559| [19473] Microsoft Internet Explorer 5.0 FTP Password Storage Vulnerability
6560| [19471] Microsoft Internet Explorer 5.0 HTML Form Control DoS
6561| [19462] Microsoft Windows 95/98 IE5/Telnet Heap Overflow Vulnerability
6562| [19451] Microsoft Windows 98 a/98 b/98SE,Solaris 2.6 IRDP Vulnerability
6563| [19445] Microsoft FrontPage Personal WebServer 1.0 PWS DoS Vulnerability
6564| [19440] Microsoft Windows NT 4.0/SP 1/SP 2/Sp 3/SP 4/SP 5 Malformed Dialer Entry Vulnerability
6565| [19435] Microsoft JET 3.5/3.51/4.0 VBA Shell Vulnerability
6566| [19425] Microsoft Data Access Components (MDAC) <= 2.1,Microsoft IIS 3.0/4.0,Microsoft Index Server 2.0,Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (2)
6567| [19424] Microsoft Data Access Components (MDAC) <= 2.1,Microsoft IIS 3.0/4.0,Microsoft Index Server 2.0,Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (1)
6568| [19376] Microsoft IIS 2.0/3.0/4.0 ISAPI GetExtensionVersion() Vulnerability
6569| [19372] Microsoft Windows NT 4.0/SP 1/SP 2/SP 3/SP 4/SP 5 Null Session Admin Name Vulnerability
6570| [19361] Microsoft IIS 3.0/4.0 Double Byte Code Page Vulnerability
6571| [19359] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4,Windows NT 3.5.1/SP1/SP2/SP3/SP4/SP5 Screensaver Vulnerability
6572| [19248] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (4)
6573| [19247] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (3)
6574| [19246] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (2)
6575| [19245] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (1)
6576| [19239] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 IIS IDC Path Mapping Vulnerability
6577| [19238] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3 DoS Duplicate Hostname Vulnerability
6578| [19228] Microsoft IIS 4.0,Microsoft JET 3.5/3.5.1 Database Engine VBA Vulnerability
6579| [19211] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 RAS Phonebook Buffer Overflow Vulnerability
6580| [19209] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 Help File Buffer Overflow Vulnerability
6581| [19208] Microsoft Site Server Commerce Edition 3.0 alpha AdSamples Vulnerability
6582| [19207] Microsoft Outlook Express 4.27.3110/4.72.3120 POP Denial of Service Vulnerability
6583| [19198] Microsoft Windows NT <= 4.0 SP4 Known DLL Cache Vulnerability
6584| [19197] "Microsoft Windows NT <= 4.0 SP5,Terminal Server 4.0 ""Pass the Hash"" with Modified SMB Client Vulnerability"
6585| [19196] "Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 RAS Dial-up Networking ""Save Password"" Vulnerability"
6586| [19195] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3 LSA Secrets Vulnerability
6587| [19194] Microsoft IIS 3.0/4.0 Using ASP And FSO To Read Server Files Vulnerability
6588| [19186] Microsoft XML Core Services MSXML Uninitialized Memory Corruption
6589| [19164] Microsoft IE4 Clipboard Paste Vulnerability
6590| [19156] Microsoft Internet Explorer 5.0.1 Invalid Byte Cross-Frame Access Vulnerability
6591| [19152] Microsoft IIS 5.0 IISAPI Extension Enumerate Root Web Server Directory Vulnerability
6592| [19144] Microsoft Zero Administration Kit (ZAK) 1.0 and Office97 Backdoor Vulnerability
6593| [19143] "Microsoft Windows ""April Fools 2001"" Vulnerability"
6594| [19129] Microsoft IIS 4.0,Microsoft Site Server 3.0 Showcode ASP Vulnerability
6595| [19118] Microsoft IIS 3.0/4.0,Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability
6596| [19113] Microsoft Windows NT 3.5.1 SP2/3.5.1 SP3/3.5.1 SP4/3.5.1 SP5/4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 Telnetd Vulnerability
6597| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
6598| [19066] SGI IRIX 5.3/6.2,SGI license_oeo 1.0 LicenseManager NETLS_LICENSE_FILE Vulnerability
6599| [19037] MS12-005 Microsoft Office ClickOnce Unsafe Object Package Handling Vulnerability
6600| [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
6601| [19026] Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
6602| [19002] Microsoft Windows OLE Object File Handling Remote Code Execution
6603| [18952] Microsoft Wordpad 5.1 (.doc) Null Pointer Dereference Vulnerability
6604| [18819] Microsoft Windows xp Win32k.sys Local Kernel DoS Vulnerability
6605| [18606] Microsoft Terminal Services Use After Free (MS12-020)
6606| [18372] Microsoft Windows Assembly Execution Vulnerability MS12-005
6607| [18365] Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution Vulnerability
6608| [18334] Microsoft Office 2003 Home/Pro 0day
6609| [18143] MS11-038 Microsoft Office Excel Malformed OBJ Record Handling Overflow
6610| [18087] MS11-021 Microsoft Office 2007 Excel .xlb Buffer Overflow
6611| [18078] Microsoft Excel 2003 11.8335.8333 Use After Free
6612| [18067] Microsoft Excel 2007 SP2 Buffer Overwrite Exploit
6613| [17830] Microsoft WINS Service <= 5.2.3790.4520 Memory Corruption
6614| [17659] MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow
6615| [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
6616| [17451] Microsoft Office Visio VISIODWG.DLL DXF File Handling Vulnerability
6617| [17399] Microsoft Office XP Remote code Execution
6618| [17305] "Microsoft Windows Vista/Server 2008 ""nsiproxy.sys"" Local Kernel DoS Exploit"
6619| [17227] Microsoft Office Excel Axis Properties Record Parsing Buffer Overflow PoC
6620| [17164] Microsoft Reader <= 2.1.1.3143 NULL Byte Write
6621| [17163] Microsoft Reader <= 2.1.1.3143 Array Overflow
6622| [17162] Microsoft Reader <= 2.1.1.3143 Integer Overflow
6623| [17161] Microsoft Reader <= 2.1.1.3143 Heap Overflow
6624| [17160] Microsoft Reader <= 2.1.1.3143 Integer Overflow
6625| [17159] Microsoft Host Integration Server <= 8.5.4224.0 DoS Vulnerabilities
6626| [17158] Microsoft HTML Help <= 6.1 Stack Overflow
6627| [17133] Microsoft Windows xp AFD.sys Local Kernel DoS Exploit
6628| [17037] PostgreSQL for Microsoft Windows Payload Execution
6629| [16991] Microsoft Source Code Analyzer for SQL Injection 1.3 Improper Permissions
6630| [16957] Oracle MySQL for Microsoft Windows Payload Execution
6631| [16750] Microsoft Message Queueing Service DNS Name Path Overflow
6632| [16749] Microsoft RPC DCOM Interface Overflow
6633| [16748] Microsoft DNS RPC Service extractQuotedChar() Overflow (TCP)
6634| [16747] Microsoft Message Queueing Service Path Overflow
6635| [16740] Microsoft IIS FTP Server NLST Response Overflow
6636| [16686] Microsoft Word RTF pFragments Stack Buffer Overflow (File Format)
6637| [16680] Microsoft Visual Basic VBP Buffer Overflow
6638| [16665] Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow
6639| [16660] Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow
6640| [16649] Microsoft Works 7 WkImgSrv.dll WKsPictureInterface() ActiveX Exploit
6641| [16625] Microsoft Excel Malformed FEATHEADER Record Vulnerability
6642| [16615] Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption
6643| [16608] Microsoft Whale Intelligent Application Gateway ActiveX Control Buffer Overflow
6644| [16605] Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download
6645| [16574] Microsoft Windows Shell LNK Code Execution
6646| [16545] Microsoft Help Center XSS and Command Execution
6647| [16542] Microsoft OWC Spreadsheet HTMLURL Buffer Overflow
6648| [16537] Microsoft OWC Spreadsheet msDataSourceObject Memory Corruption
6649| [16516] Microsoft WMI Administration Tools ActiveX Buffer Overflow
6650| [16507] Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow
6651| [16472] Microsoft IIS 5.0 IDQ Path Overflow
6652| [16471] Microsoft IIS WebDAV Write Access Code Execution
6653| [16470] Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflow
6654| [16469] Microsoft IIS 5.0 Printer Host Header Overflow
6655| [16468] Microsoft IIS 4.0 .HTR Path Overflow
6656| [16467] Microsoft IIS/PWS CGI Filename Double Decode Command Execution
6657| [16442] Microsoft DirectX DirectShow SAMI Buffer Overflow
6658| [16403] CA BrightStor Agent for Microsoft SQL Overflow
6659| [16398] Microsoft SQL Server Hello Overflow
6660| [16396] Microsoft SQL Server sp_replwritetovarbin Memory Corruption via SQL Injection
6661| [16395] Microsoft SQL Server Payload Execution
6662| [16394] Microsoft SQL Server Payload Execution via SQL injection
6663| [16393] Microsoft SQL Server Resolution Overflow
6664| [16392] Microsoft SQL Server sp_replwritetovarbin Memory Corruption
6665| [16379] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow
6666| [16378] Microsoft Workstation Service NetAddAlternateComputerName Overflow
6667| [16377] Microsoft ASN.1 Library Bitstring Heap Overflow
6668| [16375] Microsoft RRAS Service RASMAN Registry Overflow
6669| [16374] Microsoft Windows Authenticated User Code Execution
6670| [16373] Microsoft Services MS06-066 nwapi32.dll
6671| [16372] Microsoft Workstation Service NetpManageIPCConnect Overflow
6672| [16371] Microsoft NetDDE Service Overflow
6673| [16369] Microsoft Services MS06-066 nwwks.dll
6674| [16368] Microsoft LSASS Service DsRolerUpgradeDownlevelServer Overflow
6675| [16367] Microsoft Server Service NetpwPathCanonicalize Overflow
6676| [16366] Microsoft DNS RPC Service extractQuotedChar() Overflow (SMB)
6677| [16365] Microsoft Plug and Play Service Overflow
6678| [16364] Microsoft RRAS Service Overflow
6679| [16363] Microsoft Windows SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
6680| [16362] Microsoft Server Service Relative Path Stack Corruption
6681| [16361] Microsoft Print Spooler Service Impersonation Vulnerability
6682| [16360] Microsoft Windows SMB Relay Code Execution
6683| [16359] Microsoft WINS Service Memory Overwrite
6684| [16358] Microsoft IIS ISAPI RSA WebAgent Redirect Overflow
6685| [16357] Microsoft IIS Phone Book Service Overflow
6686| [16356] Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
6687| [16355] Microsoft IIS ISAPI nsiislog.dll ISAPI POST Overflow
6688| [16354] Microsoft IIS ISAPI w3who.dll Query String Overflow
6689| [16334] Microsoft Private Communications Transport Overflow
6690| [16071] Microsoft Internet Explorer MHTML Protocol Handler XSS
6691| [16024] Microsoft Fax Cover Page Editor <= 5.2.3790.3959 Double Free Memory Corruption
6692| [15984] MS11-002: Microsoft Data Access Components Vulnerability
6693| [15839] Microsoft Windows Fax Services Cover Page Editor (.cov) Memory Corruption
6694| [15433] LEADTOOLS 11.5.0.9 - (ltlst11n.ocx) Insert() Access Violation DoS
6695| [15262] Microsoft Office HtmlDlgHelper Class Memory Corruption
6696| [15167] Microsoft IIS 6.0 ASP Stack Overflow (Stack Exhaustion) Denial of Service (MS10-065)
6697| [15158] MOAUB #30 - Microsoft Unicode Scripts Processor Remote Code Execution
6698| [15148] MOAUB #29 - Microsoft Excel SxView Record Parsing Heap Memory Corruption
6699| [15122] MOAUB #27 - Microsoft Internet Explorer MSHTML Findtext Processing Issue
6700| [15112] MOAUB #26 - Microsoft Cinepak Codec CVDecompress Heap Overflow
6701| [15096] MOAUB #24 - Microsoft MPEG Layer-3 Audio Decoder Division By Zero
6702| [15094] MOAUB #24 - Microsoft Excel OBJ Record Stack Overflow
6703| [15088] MOAUB #23 - Microsoft Excel HFPicture Record Parsing Memory Corruption (0day)
6704| [15065] MOAUB #21 - Microsoft Excel WOPT Record Parsing Heap Memory Corruption
6705| [15061] microsoft drm technology (msnetobj.dll) activex Multiple Vulnerabilities
6706| [15034] Microsoft Mspaint bmp crash Proof Of Concept
6707| [15019] MOAUB #16 - Microsoft Excel HFPicture Record Parsing Remote Code Execution Vulnerability
6708| [14971] MOAUB #11 - Microsoft Office Word 2007 sprmCMajority Buffer Overflow
6709| [14944] MOAUB #8 - Microsoft Office Visio DXF File Stack based Overflow
6710| [14895] MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit
6711| [14782] Microsoft Office PowerPoint 2007 DLL Hijacking Exploit (rpawinet.dll)
6712| [14780] Windows Internet Communication Settings DLL Hijacking Exploit (schannel.dll)
6713| [14778] Microsoft Windows Contacts DLL Hijacking Exploit (wab32res.dll)
6714| [14758] Microsoft Group Convertor DLL Hijacking Exploit (imm.dll)
6715| [14754] Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit (smmscrpt.dll)
6716| [14751] Microsoft Vista BitLocker Drive Encryption API Hijacking Exploit (fveapi.dll)
6717| [14746] Microsoft Office Groove 2007 DLL Hijacking Exploit (mso.dll)
6718| [14745] Microsoft Address Book 6.00.2900.5512 DLL Hijacking Exploit (wab32res.dll)
6719| [14744] Microsoft Visio 2003 DLL Hijacking Exploit (mfc71enu.dll)
6720| [14733] Microsoft Windows 7 wab.exe DLL Hijacking Exploit (wab32res.dll)
6721| [14731] Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking Exploit (hhctrl.ocx)
6722| [14723] Microsoft Power Point 2010 DLL Hijacking Exploit (pptimpconv.dll)
6723| [14705] Microsoft Windows (IcmpSendEcho2Ex interrupting) Denial of Service Vulnerability
6724| [14674] Microsoft Windows SRV2.SYS SMB Negotiate ProcessID Function Table Dereference (MS09-050)
6725| [14670] Microsoft Windows nt!SeObjectCreateSaclAccessBits() Missed ACE Bounds Checks (MS10-047)
6726| [14669] Microsoft Windows win32k!GreStretchBltInternal() Does Not Handle src == dest
6727| [14668] Microsoft Windows win32k!xxxRealDrawMenuItem() Missing HBITMAP Bounds Checks
6728| [14667] Microsoft Windows KTM Invalid Free with Reused Transaction GUID (MS10-047)
6729| [14666] Microsoft Windows nt!NtCreateThread Race Condition with Invalid Code Segment (MS10-047)
6730| [14611] Microsoft Windows 'SfnLOGONNOTIFY' Local Privilege Escalation Vulnerability (MS10-048)
6731| [14610] Microsoft Windows Tracing Registry Key ACL Privilege Escalation Vulnerability
6732| [14608] Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048)
6733| [14607] Microsoft SMB Server Trans2 Zero Size Pool Alloc (MS10-054)
6734| [14566] "Microsoft Windows win32k.sys Driver ""CreateDIBPalette()"" Buffer Overflow"
6735| [14413] IE 7.0 - DoS Microsoft Clip Organizer Multiple Insecure ActiveX Control
6736| [14403] Microsoft Windows Automatic LNK Shortcut File Code Execution
6737| [14361] Microsoft Excel 0x5D record Stack Overflow Vulnerability
6738| [14295] Microsoft MSHTML.DLL CTIMEOUTEVENTLIST::INSERTINTOTIMEOUTLIST Memory Leak (0day)
6739| [14179] Microsoft Internet Information Services (IIS) 5 Authentication Bypass Vulnerability (MS10-065)
6740| [13808] Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly
6741| [12728] Microsoft Outlook Web Access (OWA) 8.2.254.0 - Information Disclosure vulnerability
6742| [12564] Microsoft Windows Outlook Express and Windows Mail Integer Overflow
6743| [12518] Microsoft Paint Integer Overflow Vulnerability (DoS) MS10-005
6744| [12450] Microsoft SharePoint Server 2007 XSS Vulnerability
6745| [12079] Microsoft Office (2010 beta) Communicator SIP Denial of Service Exploit
6746| [12032] Microsoft Internet Explorer Tabular Data Control ActiveX Remote Code Execution
6747| [11683] Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta)
6748| [11276] Microsoft Internet Explorer 6.0/7.0 NULL pointer crashes
6749| [11195] Microsoft Windows Defender ActiveX Heap Overflow PoC
6750| [11034] Microsoft HTML Help Compiler (hhc.exe) BOF PoC
6751| [10791] Microsoft IIS ASP Multiple Extensions Security Bypass 5.x/6.x
6752| [10579] TLS Renegotiation Vulnerability PoC
6753| [10072] Multiple Vendor TLS Protocol Session Renegotiation Security Vulnerability
6754| [10068] Microsoft Windows 2000-2008 Embedded OpenType Font Engine Remote Code Execution
6755| [9893] Microsoft Internet Explorer 5,6,7 - Memory Corruption PoC
6756| [9587] Microsoft IIS 5.0/6.0 FTP Server (Stack Exhaustion) Denial of Service
6757| [9559] Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4)
6758| [9541] Microsoft IIS 5.0/6.0 FTP Server Remote Stack Overflow Exploit (win2k)
6759| [9301] Microsoft Windows XP (win32k.sys) Local Privilege Escalation Exploit
6760| [9163] Microsoft Office Web Components (Spreadsheet) ActiveX BOF PoC
6761| [9100] Microsoft Internet Explorer (AddFavorite) Remote Crash PoC
6762| [8873] OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit
6763| [8806] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (pl)
6764| [8765] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (php)
6765| [8754] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (patch)
6766| [8720] OpenSSL <= 0.9.8k, 1.0.0-beta2 DTLS Remote Memory Exhaustion DoS
6767| [8704] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Vulnerability
6768| [8467] Microsoft Media Player - (quartz.dll .wav) Multiple Remote DoS Vulns
6769| [8466] Microsoft GDI Plugin .png Infinite Loop Denial of Service PoC
6770| [8465] Microsoft Media Player - (quartz.dll .mid) Denial of Service Exploit
6771| [8281] Microsoft GdiPlus EMF GpFont.SetData Integer Overflow PoC
6772| [7727] Microsoft HTML Workshop <= 4.74 Universal Buffer Overflow Exploit
6773| [7501] Microsoft SQL Server sp_replwritetovarbin() Heap Overflow Exploit
6774| [7262] Microsoft Office Communicator (SIP) Remote Denial of Service Exploit
6775| [7196] Microsoft XML Core Services DTD Cross-Domain Scripting PoC MS08-069
6776| [6699] Microsoft PicturePusher ActiveX Cross Site File Upload Attack PoC
6777| [6317] Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
6778| [6244] Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC
6779| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
6780| [5530] Microsoft Works 7 WkImgSrv.dll ActiveX Remote BOF Exploit
6781| [5460] Microsoft Works 7 WkImgSrv.dll ActiveX Denial of Service PoC
6782| [5349] Microsoft Visual InterDev 6.0 (SP6) SLN File Local Buffer Overflow PoC
6783| [5320] Microsoft Office XP SP3 PPT File Buffer Overflow Exploit (ms08-016)
6784| [5287] Microsoft Office Excel Code Execution Exploit (MS08-014)
6785| [5107] Microsoft Office .WPS File Stack Overflow Exploit (MS08-011)
6786| [5087] Microsoft DirectSpeechSynthesis Module Remote Buffer Overflow Exploit
6787| [4892] Microsoft Visual InterDev 6.0 (SP6) .sln File Local Buffer Overflow Exploit
6788| [4874] Microsoft Rich Textbox Control 6.0 (SP6) SaveFile() Insecure Method
6789| [4873] Microsoft FoxServer (vfp6r.dll 6.0.8862.0) ActiveX Command Execution
6790| [4866] Microsoft DirectX SAMI File Parsing Remote Stack Overflow Exploit
6791| [4625] Microsoft Jet Engine MDB File Parsing Stack Overflow PoC
6792| [4616] Microsoft Internet Explorer TIF/TIFF Code Execution (MS07-055)
6793| [4506] Microsoft Visual FoxPro 6.0 FPOLE.OCX Arbitrary Command Execution
6794| [4431] Microsoft Visual Basic Enterprise Edition 6.0 SP6 Code Execution Exploit
6795| [4398] Microsoft SQL Server Distributed Management Objects BoF Exploit
6796| [4394] Microsoft Visual Studio 6.0 (VBTOVSI.DLL 1.0.0.0) File Overwrite Exploit
6797| [4393] Microsoft Visual Studio 6.0 (PDWizard.ocx) Remote Command Execution
6798| [4379] Microsoft SQL Server Distributed Management Objects (sqldmo.dll) BoF
6799| [4369] Microsoft Visual FoxPro 6.0 (FPOLE.OCX 6.0.8450.0) - Remote PoC
6800| [4361] Microsoft Visual Basic 6.0 VBP_Open OLE Local CodeExec Exploit
6801| [4312] ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit
6802| [4279] Microsoft DXMedia SDK 6 (SourceUrl) ActiveX Remote Code Execution
6803| [4259] Microsoft Visual 6 (VDT70.DLL NotSafe) Stack Overflow Exploit
6804| [4121] Microsoft Excel 2000/2003 Sheet Name Vulnerability PoC
6805| [4067] Microsoft Office MSODataSourceControl COM-object BoF PoC (0day)
6806| [4066] Microsoft Speech API ActiveX control Remote BoF Exploit (xp sp2)
6807| [4065] Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)
6808| [4045] Microsoft Windows Animated Cursor Stack Overflow Exploit
6809| [4016] Microsoft IIS <= 5.1 Hit Highlighting Authentication Bypass Exploit
6810| [3977] Microsoft Visual Basic 6.0 Project (Description) Stack overflow PoC
6811| [3976] Microsoft Visual Basic 6.0 Project (Company Name) Stack overflow PoC
6812| [3973] Microsoft Office 2000 (OUACTRL.OCX 1.0.1.9) - Remote DoS Exploit
6813| [3965] Microsoft IIS 6.0 (/AUX/.aspx) Remote Denial of Service Exploit
6814| [3746] Microsoft Windows DNS RPC - Remote Buffer Overflow Exploit (port 445) (2)
6815| [3690] microsoft office word 2007 - Multiple Vulnerabilities
6816| [3544] Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit
6817| [3260] Microsoft Word 2000 Unspecified Code Execution Exploit (0day)
6818| [3193] Microsoft Excel Malformed Palette Record DoS PoC (MS07-002)
6819| [3176] Microsoft Visual C++ (.RC Resource Files) Local Buffer Overflow Exploit
6820| [3159] Microsoft Help Workshop 4.03.0002 (.HPJ) Buffer Overflow Exploit
6821| [3149] Microsoft Help Workshop 4.03.0002 (.CNT) Buffer Overflow Exploit
6822| [3071] Microsoft Vista (NtRaiseHardError) Privilege Escalation Exploit
6823| [2922] Microsoft Word Document (malformed pointer) Proof of Concept
6824| [2523] Microsoft Office 2003 PPT Local Buffer Overflow PoC
6825| [2091] Microsoft PowerPoint 2003 SP2 Local Code Execution Exploit (french)
6826| [2056] Microsoft IIS ASP Stack Overflow Exploit (MS06-034)
6827| [2001] Microsoft Word 2000/2003 Unchecked Boundary Condition Vulnerability
6828| [1999] Microsoft Word 2000/2003 Hlink Local Buffer Overflow Exploit PoC
6829| [1988] Microsoft Excel 2003 Hlink Local Buffer Overflow Exploit (italian)
6830| [1986] Microsoft Excel 2000/2003 Hlink Local Buffer Overflow Exploit (french)
6831| [1978] Microsoft Excel Universal Hlink Local Buffer Overflow Exploit
6832| [1958] Microsoft Excel 2003 Hlink Stack/SEH Buffer Overflow Exploit
6833| [1944] Microsoft Excel Unspecified Remote Code Execution Exploit
6834| [1927] Microsoft Excel Unicode Local Overflow Exploit PoC
6835| [1495] Microsoft HTML Help Workshop (.hhp file) Buffer Overflow Exploit (3)
6836| [1490] Microsoft HTML Help Workshop (.hhp file) Buffer Overflow Exploit (new)
6837| [1488] Microsoft HTML Help Workshop (.hhp file) Denial of Service
6838| [1470] Microsoft HTML Help Workshop (.hhp file) Buffer Overflow Exploit
6839| [1352] Microsoft Windows DTC Remote Exploit (PoC) (MS05-051) (updated)
6840| [92] Microsoft WordPerfect Document Converter Exploit (MS03-036)
6841|
6842| OpenVAS (Nessus) - http://www.openvas.org:
6843| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
6844| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
6845| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
6846| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
6847| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
6848| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
6849| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
6850| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
6851| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
6852| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
6853| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
6854| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
6855| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
6856| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
6857| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
6858| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
6859| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
6860| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
6861| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
6862| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
6863| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
6864| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
6865| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
6866| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
6867| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
6868| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
6869| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
6870| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
6871| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
6872| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
6873| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
6874| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
6875| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
6876| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
6877| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
6878| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
6879| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
6880| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
6881| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
6882| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
6883| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
6884| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
6885| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
6886| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
6887| [902798] Microsoft SMB Signing Enabled and Not Required At Server
6888| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
6889| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
6890| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
6891| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
6892| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
6893| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
6894| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
6895| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
6896| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
6897| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
6898| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
6899| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
6900| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
6901| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
6902| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
6903| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
6904| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
6905| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
6906| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
6907| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
6908| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
6909| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
6910| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
6911| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
6912| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
6913| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
6914| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
6915| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
6916| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
6917| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
6918| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
6919| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
6920| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
6921| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
6922| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
6923| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
6924| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
6925| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
6926| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
6927| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
6928| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
6929| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
6930| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
6931| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
6932| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
6933| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
6934| [902518] Microsoft .NET Framework Security Bypass Vulnerability
6935| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
6936| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
6937| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
6938| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
6939| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
6940| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
6941| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
6942| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
6943| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
6944| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
6945| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
6946| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
6947| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
6948| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
6949| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
6950| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
6951| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
6952| [902425] Microsoft Windows SMB Accessible Shares
6953| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
6954| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
6955| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
6956| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
6957| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
6958| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
6959| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
6960| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
6961| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
6962| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
6963| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
6964| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
6965| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
6966| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
6967| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
6968| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
6969| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
6970| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
6971| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
6972| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
6973| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
6974| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
6975| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
6976| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
6977| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
6978| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
6979| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
6980| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
6981| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
6982| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
6983| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
6984| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
6985| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
6986| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
6987| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
6988| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
6989| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
6990| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
6991| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
6992| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
6993| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
6994| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
6995| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
6996| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
6997| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
6998| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
6999| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
7000| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
7001| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
7002| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
7003| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
7004| [902175] IBM DB2 REPEAT Buffer Overflow and TLS Renegotiation Vulnerabilities (Win)
7005| [902174] IBM DB2 REPEAT Buffer Overflow and TLS Renegotiation Vulnerabilities (Linux)
7006| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
7007| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
7008| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
7009| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
7010| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
7011| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
7012| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
7013| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
7014| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
7015| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
7016| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
7017| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
7018| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
7019| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
7020| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
7021| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
7022| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
7023| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
7024| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
7025| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
7026| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
7027| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
7028| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
7029| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
7030| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
7031| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
7032| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
7033| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
7034| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
7035| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
7036| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
7037| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
7038| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
7039| [901195] Ipswitch IMail Server STARTTLS Plaintext Command Injection Vulnerability
7040| [901194] Kerio Products 'STARTTLS' Plaintext Command Injection Vulnerability
7041| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
7042| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
7043| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
7044| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
7045| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
7046| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
7047| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
7048| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
7049| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
7050| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
7051| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
7052| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
7053| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
7054| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
7055| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
7056| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
7057| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
7058| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
7059| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
7060| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7061| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
7062| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
7063| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
7064| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
7065| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
7066| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
7067| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
7068| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
7069| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
7070| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
7071| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
7072| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
7073| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
7074| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
7075| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
7076| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
7077| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
7078| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
7079| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
7080| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
7081| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
7082| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
7083| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7084| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
7085| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
7086| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
7087| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
7088| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
7089| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
7090| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
7091| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
7092| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
7093| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
7094| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
7095| [900808] Microsoft Visual Products Version Detection
7096| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
7097| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
7098| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
7099| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
7100| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
7101| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
7102| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
7103| [900654] OpenSSL DTLS Packets Multiple DOS Vulnerabilities (win)
7104| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
7105| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
7106| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
7107| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
7108| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
7109| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
7110| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
7111| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
7112| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
7113| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
7114| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
7115| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
7116| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
7117| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
7118| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
7119| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
7120| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
7121| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
7122| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
7123| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
7124| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
7125| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
7126| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
7127| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
7128| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
7129| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
7130| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
7131| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
7132| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
7133| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
7134| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
7135| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
7136| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
7137| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
7138| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
7139| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
7140| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
7141| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
7142| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
7143| [900247] Remote Code Execution Vulnerabilities in SChannel (980436)
7144| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
7145| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
7146| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
7147| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
7148| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
7149| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
7150| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
7151| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
7152| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
7153| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
7154| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
7155| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
7156| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
7157| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
7158| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
7159| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
7160| [900173] Microsoft Windows Media Player Version Detection
7161| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
7162| [900170] Microsoft iExplorer '&NBSP
7163| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
7164| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
7165| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
7166| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
7167| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
7168| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
7169| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
7170| [900087] Vulnerability in SChannel Could Allow Spoofing (960225)
7171| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
7172| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
7173| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
7174| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
7175| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
7176| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
7177| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
7178| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
7179| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
7180| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
7181| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
7182| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
7183| [900025] Microsoft Office Version Detection
7184| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
7185| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
7186| [881204] CentOS Update for gnutls CESA-2012:0429 centos6
7187| [881198] CentOS Update for gnutls CESA-2012:0428 centos5
7188| [880908] CentOS Update for gnutls CESA-2009:1232 centos4 i386
7189| [880677] CentOS Update for gnutls CESA-2009:123 centos5 i386
7190| [880630] CentOS Update for gnutls CESA-2010:0166 centos5 i386
7191| [880386] CentOS Update for gnutls CESA-2010:0167 centos4 i386
7192| [870675] RedHat Update for gnutls RHSA-2012:0429-01
7193| [870579] RedHat Update for gnutls RHSA-2012:0428-01
7194| [870240] RedHat Update for gnutls RHSA-2010:0166-01
7195| [870237] RedHat Update for gnutls RHSA-2010:0167-01
7196| [870071] RedHat Update for gnutls RHSA-2008:0492-01
7197| [870055] RedHat Update for gnutls RHSA-2008:0982-01
7198| [870011] RedHat Update for gnutls RHSA-2008:0489-01
7199| [864437] Fedora Update for mingw-gnutls FEDORA-2012-4451
7200| [864156] Fedora Update for mingw32-gnutls FEDORA-2012-4417
7201| [864134] Fedora Update for gnutls FEDORA-2012-4569
7202| [864129] Fedora Update for mingw32-gnutls FEDORA-2012-4409
7203| [864107] Fedora Update for gnutls FEDORA-2012-4578
7204| [862207] Fedora Update for gnutls FEDORA-2010-9487
7205| [862184] Fedora Update for gnutls FEDORA-2010-9518
7206| [860874] Fedora Update for gnutls FEDORA-2008-10000
7207| [860861] Fedora Update for gnutls FEDORA-2008-4259
7208| [860542] Fedora Update for gnutls FEDORA-2008-4274
7209| [860508] Fedora Update for gnutls FEDORA-2008-9600
7210| [860487] Fedora Update for gnutls FEDORA-2008-4183
7211| [860058] Fedora Update for gnutls FEDORA-2008-9530
7212| [850049] SuSE Update for gnutls SUSE-SA:2008:046
7213| [840978] Ubuntu Update for gnutls26 USN-1418-1
7214| [840438] Ubuntu Update for gnutls12 vulnerability USN-948-1
7215| [840346] Ubuntu Update for gnutls12, gnutls13, gnutls26 regression USN-678-2
7216| [840331] Ubuntu Update for gnutls12, gnutls13 vulnerabilities USN-613-1
7217| [840206] Ubuntu Update for gnutls12, gnutls13, gnutls26 vulnerability USN-678-1
7218| [835227] HP-UX Update for sendmail with STARTTLS Enabled HPSBUX02508
7219| [831635] Mandriva Update for gnutls MDVSA-2012:040 (gnutls)
7220| [831564] Mandriva Update for gnutls MDVSA-2012:045 (gnutls)
7221| [830725] Mandriva Update for gnutls MDVSA-2008:227 (gnutls)
7222| [830670] Mandriva Update for gnutls MDVSA-2008:227-1 (gnutls)
7223| [830619] Mandriva Update for gnutls MDVSA-2008:106 (gnutls)
7224| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
7225| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
7226| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
7227| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
7228| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
7229| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
7230| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
7231| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
7232| [802726] Microsoft SMB Signing Disabled
7233| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
7234| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
7235| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
7236| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
7237| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
7238| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
7239| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
7240| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
7241| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
7242| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
7243| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
7244| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
7245| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
7246| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
7247| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
7248| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
7249| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
7250| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
7251| [801934] Microsoft Silverlight Version Detection
7252| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
7253| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
7254| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
7255| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
7256| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
7257| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
7258| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
7259| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
7260| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
7261| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
7262| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
7263| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
7264| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
7265| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
7266| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
7267| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
7268| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
7269| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
7270| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
7271| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
7272| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
7273| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
7274| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
7275| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
7276| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
7277| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
7278| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
7279| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
7280| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
7281| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
7282| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
7283| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
7284| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
7285| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
7286| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
7287| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
7288| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
7289| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
7290| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
7291| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
7292| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
7293| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
7294| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
7295| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
7296| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
7297| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
7298| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
7299| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
7300| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
7301| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
7302| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
7303| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
7304| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
7305| [800917] OpenSSL/GnuTLS SSL Server Spoofing Vulnerability (Win)
7306| [800916] GnuTLS Version Detection (Win)
7307| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
7308| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
7309| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
7310| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
7311| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
7312| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
7313| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
7314| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
7315| [800742] Microsoft Internet Explorer Unspecified vulnerability
7316| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
7317| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
7318| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
7319| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
7320| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
7321| [800504] Microsoft Windows XP SP3 denial of service vulnerability
7322| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
7323| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
7324| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
7325| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
7326| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
7327| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
7328| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
7329| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
7330| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
7331| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
7332| [800331] Microsoft Windows Live Messenger Client Version Detection
7333| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
7334| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
7335| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
7336| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
7337| [800217] Microsoft Money Version Detection
7338| [800209] Microsoft Internet Explorer Version Detection (Win)
7339| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
7340| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
7341| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
7342| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
7343| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
7344| [103118] SMTP STARTTLS Detection Detection
7345| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
7346| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
7347| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
7348| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
7349| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
7350| [101017] Microsoft MS03-018 security check
7351| [101016] Microsoft MS03-022 security check
7352| [101015] Microsoft MS03-034 security check
7353| [101014] Microsoft MS00-078 security check
7354| [101012] Microsoft MS03-051 security check
7355| [101010] Microsoft Security Bulletin MS05-004
7356| [101009] Microsoft Security Bulletin MS06-033
7357| [101007] Microsoft dotNET version grabber
7358| [101006] Microsoft Security Bulletin MS06-056
7359| [101005] Microsoft Security Bulletin MS07-040
7360| [101004] Microsoft MS04-017 security check
7361| [101003] Microsoft MS00-058 security check
7362| [101000] Microsoft MS00-060 security check
7363| [100952] Microsoft IIS FTPd NLST stack overflow
7364| [100950] Microsoft DNS server internal hostname disclosure detection
7365| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
7366| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
7367| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
7368| [100588] OpenSSL 'dtls1_retrieve_buffered_fragment()' Remote Denial of Service Vulnerability
7369| [100347] ngIRCd SSL/TLS Support MOTD Request Multiple Denial Of Service Vulnerabilities
7370| [100316] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
7371| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
7372| [100062] Microsoft Remote Desktop Protocol Detection
7373| [90027] GnuTLS < 2.2.4 vulnerability (Win)
7374| [90026] GnuTLS < 2.2.5 vulnerability (Lin)
7375| [90024] Windows Vulnerability in Microsoft Jet Database Engine
7376| [80007] Microsoft MS00-06 security check
7377| [71585] Gentoo Security Advisory GLSA 201206-18 (GnuTLS)
7378| [71294] FreeBSD Ports: gnutls
7379| [71244] Debian Security Advisory DSA 2441-1 (gnutls26)
7380| [70768] Gentoo Security Advisory GLSA 201110-05 (gnutls)
7381| [70608] FreeBSD Ports: gnutls
7382| [66371] Mandriva Security Advisory MDVSA-2009:308 (gnutls)
7383| [66295] Debian Security Advisory DSA 1935-1 (gnutls13 gnutls26)
7384| [66061] Slackware Advisory SSA:2009-290-01 gnutls
7385| [65886] SLES10: Security update for GnuTLS
7386| [65843] SLES10: Security update for GnuTLS
7387| [65842] SLES10: Security update for GnuTLS
7388| [65838] SLES10: Security update for GnuTLS
7389| [65716] SLES11: Security update for GnuTLS
7390| [65653] SLES11: Security update for GnuTLS
7391| [65506] SLES9: Security update for gnutls
7392| [65375] SLES9: Security update for gnutls
7393| [65162] SLES9: Security update for GnuTLS
7394| [65137] SLES9: Security update for GnuTLS
7395| [64971] Fedora Core 10 FEDORA-2009-8622 (gnutls)
7396| [64969] Fedora Core 11 FEDORA-2009-8565 (gnutls)
7397| [64793] CentOS Security Advisory CESA-2009:1232 (gnutls)
7398| [64790] CentOS Security Advisory CESA-2009:123 (gnutls)
7399| [64786] FreeBSD Ports: gnutls
7400| [64785] FreeBSD Ports: gnutls
7401| [64775] Ubuntu USN-809-1 (gnutls26)
7402| [64682] Mandrake Security Advisory MDVSA-2009:210 (gnutls)
7403| [64129] Mandrake Security Advisory MDVSA-2009:116 (gnutls)
7404| [64043] Gentoo Security Advisory GLSA 200905-04 (gnutls)
7405| [63965] Slackware Advisory SSA:2009-128-01 gnutls
7406| [63575] Debian Security Advisory DSA 1719-2 (gnutls13, gnutls26)
7407| [63392] Debian Security Advisory DSA 1719-1 (gnutls13)
7408| [63226] Gentoo Security Advisory GLSA 200901-10 (gnutls)
7409| [61872] FreeBSD Ports: gnutls
7410| [61866] Slackware Advisory SSA:2008-320-01 gnutls
7411| [61861] Slackware Advisory SSA:2008-315-01 gnutls
7412| [61461] Slackware Advisory SSA:2008-180-01 gnutls
7413| [61447] FreeBSD Ports: gnutls
7414| [61054] Gentoo Security Advisory GLSA 200805-20 (gnutls)
7415| [61034] Debian Security Advisory DSA 1581-1 (gnutls13)
7416| [58465] Debian Security Advisory DSA 1333-1 (libcurl3-gnutls)
7417| [57893] Gentoo Security Advisory GLSA 200609-15 (gnutls)
7418| [57467] FreeBSD Ports: gnutls, gnutls-devel
7419| [57406] Debian Security Advisory DSA 1182-1 (gnutls11)
7420| [57355] FreeBSD Ports: gnutls
7421| [56359] Debian Security Advisory DSA 986-1 (gnutls11)
7422| [54936] Gentoo Security Advisory GLSA 200505-04 (GnuTLS)
7423| [53662] Debian Security Advisory DSA 376-1 (exim exim-tls)
7424| [53474] Debian Security Advisory DSA 637-1 (exim-tls)
7425| [53192] Debian Security Advisory DSA 502-1 (exim-tls)
7426| [52357] FreeBSD Ports: gnutls
7427| [13752] Denial of Service (DoS) in Microsoft SMS Client
7428| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
7429| [11808] Microsoft RPC Interface Buffer Overrun (823980)
7430| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
7431| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
7432| [11217] Microsoft's SQL Version Query
7433| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
7434| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
7435| [11067] Microsoft's SQL Hello Overflow
7436| [10862] Microsoft's SQL Server Brute Force
7437| [10755] Microsoft Exchange Public Folders Information Leak
7438| [10680] Test Microsoft IIS Source Fragment Disclosure
7439| [10674] Microsoft's SQL UDP Info Query
7440| [10673] Microsoft's SQL Blank Password
7441| [10491] ASP/ASA source using Microsoft Translate f: bug
7442| [10144] Microsoft SQL TCP/IP listener is running
7443|
7444| SecurityTracker - https://www.securitytracker.com:
7445| [1027233] Windows Schannel Lets Remote Users Decrypt TLS Traffic
7446| [1026498] Windows Schannel Lets Remote Users Decrypt SSL/TLS Traffic
7447| [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
7448| [1024556] Windows Schannel TLSv1 Processing Bug Lets Remote Users Deny Service
7449| [1021828] Windows SChannel TLS Handshake Authentication Flaw Lets Certain Remote Users Spoof the System
7450| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
7451| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
7452| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
7453| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
7454| [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7455| [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
7456| [1028867] (HP Issues Fix for HP-UX) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7457| [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
7458| [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
7459| [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
7460| [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
7461| [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
7462| [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7463| [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7464| [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7465| [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7466| [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
7467| [1028690] BSAFE SSL-J Lets Remote Users Decrypt SSL/TLS Traffic
7468| [1028689] (RSA Issues Fix for BSAFE SSL-C) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7469| [1028688] (RSA Issues Fix for BSAFE SSL-J) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7470| [1028687] (RSA Issues Fix for BSAFE Micro Edition Suite) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7471| [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
7472| [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
7473| [1028603] GnuTLS TLS Record Decoding Flaw Lets Remote Users Deny Service
7474| [1028560] Microsoft Visio Discloses Information to Remote Users
7475| [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
7476| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
7477| [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
7478| [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
7479| [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
7480| [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
7481| [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7482| [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
7483| [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
7484| [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
7485| [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
7486| [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
7487| [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
7488| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
7489| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
7490| [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7491| [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
7492| [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
7493| [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
7494| [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
7495| [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7496| [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
7497| [1028267] IBM WebSphere DataPower SOA Appliance TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7498| [1028220] Cisco Prime Central for Hosted Collaboration Solution Assurance TLS Processing Flaw Lets Remote Users Deny Service
7499| [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
7500| [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
7501| [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
7502| [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7503| [1028087] Network Security Services (NSS) TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7504| [1028086] GnuTLS TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7505| [1028085] Opera TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7506| [1028082] OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
7507| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
7508| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
7509| [1027947] Windows TCP/IP Stack Lets Remote Users Downgrade SSL/TLS Sessions
7510| [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
7511| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
7512| [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
7513| [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
7514| [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
7515| [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
7516| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
7517| [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
7518| [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7519| [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
7520| [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
7521| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
7522| [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7523| [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
7524| [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7525| [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7526| [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7527| [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7528| [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7529| [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
7530| [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
7531| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
7532| [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
7533| [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7534| [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
7535| [1027514] RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code
7536| [1027513] RSA BSAFE Micro Edition Suite Lets Remote Users Decrypt SSL/TLS Traffic
7537| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
7538| [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
7539| [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
7540| [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7541| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
7542| [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7543| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7544| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7545| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7546| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7547| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7548| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7549| [1027303] Apple Xcode Lets Remote Users Decrypt SSL/TLS Traffic
7550| [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
7551| [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
7552| [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
7553| [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
7554| [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
7555| [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
7556| [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
7557| [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
7558| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
7559| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
7560| [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
7561| [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
7562| [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
7563| [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
7564| [1027127] OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases
7565| [1027114] Microsoft Windows Includes Some Invalid Certificates
7566| [1027057] OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service
7567| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
7568| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
7569| [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7570| [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
7571| [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
7572| [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
7573| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
7574| [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
7575| [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
7576| [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
7577| [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
7578| [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
7579| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7580| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7581| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7582| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7583| [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7584| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7585| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7586| [1026828] GnuTLS Error in ciphertext_to_compressed() Lets Remote Users Deny Service
7587| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
7588| [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
7589| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
7590| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
7591| [1026704] IBM WebSphere DataPower Lets Remote Users Decrypt SSL/TLS Traffic
7592| [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
7593| [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
7594| [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
7595| [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
7596| [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
7597| [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
7598| [1026646] HP System Management Homepage Lets Remote Users Decrypt SSL/TLS Traffic
7599| [1026587] cURL Lets Remote Users Decrypt SSL/TLS Traffic
7600| [1026548] OpenSSL DTLS Bug Lets Remote Users Deny Service
7601| [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
7602| [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
7603| [1026490] GnuTLS DTLS Implementation Lets Remote Users Recover Plaintext in Certain Cases
7604| [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
7605| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
7606| [1026434] Novell Access Manager Lets Remote Users Decrypt SSL/TLS Traffic
7607| [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
7608| [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
7609| [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
7610| [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
7611| [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
7612| [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
7613| [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
7614| [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
7615| [1026310] GnuTLS Buffer Overflow in gnutls_session_get_data() Lets Remote Users Deny Service
7616| [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
7617| [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7618| [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7619| [1026216] Oracle Java Runtime Environment (JRE) Lets Remote Users Decrypt SSL/TLS Traffic
7620| [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
7621| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
7622| [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
7623| [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
7624| [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
7625| [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
7626| [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
7627| [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
7628| [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
7629| [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
7630| [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
7631| [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
7632| [1025997] Opera Lets Remote Users Spoof Extended Validation Address Bar Security Information and Decrypt SSL/TLS Traffic
7633| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
7634| [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
7635| [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
7636| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
7637| [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7638| [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
7639| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
7640| [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
7641| [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
7642| [1025837] Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions
7643| [1025807] Mutt Does Non Properly Validate SMTP and IMAP Server TLS Certificates
7644| [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
7645| [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
7646| [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
7647| [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
7648| [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
7649| [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
7650| [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
7651| [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
7652| [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
7653| [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
7654| [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
7655| [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
7656| [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
7657| [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
7658| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
7659| [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
7660| [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
7661| [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
7662| [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
7663| [1025625] Cyrus IMAP Server STARTTLS Buffer Flushing Flaw Lets Remote Users Inject Commands via Man-in-the-Middle Attacks
7664| [1025605] Fetchmail STARTTLS Blocking IO Bug Lets Remote Users Deny Service
7665| [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7666| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
7667| [1025441] Linux Kernel AGPIOC_RESERVE and AGPIOC_ALLOCATE IOCTLs Let Local Users Consume Excessive Memory Resources
7668| [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7669| [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
7670| [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7671| [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
7672| [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
7673| [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
7674| [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
7675| [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
7676| [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
7677| [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
7678| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
7679| [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
7680| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
7681| [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
7682| [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
7683| [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
7684| [1025224] Asterisk TCP/TLS Server Bug Lets Remote Users Deny Service
7685| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
7686| [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
7687| [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
7688| [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
7689| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
7690| [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
7691| [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
7692| [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
7693| [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
7694| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
7695| [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7696| [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
7697| [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
7698| [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
7699| [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7700| [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7701| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
7702| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
7703| [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
7704| [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
7705| [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
7706| [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
7707| [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
7708| [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
7709| [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
7710| [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
7711| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
7712| [1024743] OpenSSL Buffer Overflow in TLS Server Extension Parsing May Let Remote Users Execute Arbitrary Code
7713| [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
7714| [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
7715| [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
7716| [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
7717| [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
7718| [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
7719| [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
7720| [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
7721| [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
7722| [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
7723| [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
7724| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
7725| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
7726| [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
7727| [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
7728| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
7729| [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
7730| [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
7731| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
7732| [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
7733| [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
7734| [1024359] Mac OS X Bugs Let Remote Users Intercept TLS/SSL Connections, Impersonate Domain Names, and Execute Arbitrary Code
7735| [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
7736| [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
7737| [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7738| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
7739| [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
7740| [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
7741| [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
7742| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
7743| [1024300] Windows Schannel Certificate Validation Error Lets Remote Users Execute Arbitrary Code
7744| [1024299] Windows Schannel Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
7745| [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
7746| [1024279] Cisco ASA SunRPC/TLS/SIP/IKE Processing Bugs Let Remote Users Execute Arbitrary Code
7747| [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
7748| [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
7749| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
7750| [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
7751| [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
7752| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
7753| [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
7754| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
7755| [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
7756| [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
7757| [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
7758| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7759| [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
7760| [1024020] GnuTLS Invalid Hash Algorithm Null Pointer Dereference Lets Remote Users Deny Service
7761| [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
7762| [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
7763| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
7764| [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
7765| [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
7766| [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
7767| [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
7768| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
7769| [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
7770| [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
7771| [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
7772| [1023756] GnuTLS Certificate Serial Number Processing Stack Overflow May Let Remote Users Execute Arbitrary Code
7773| [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
7774| [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
7775| [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
7776| [1023612] Cisco ASA TCP, SIP, SCCP, DTLS, and IKE Processing Flaws Let Remote Users Deny Service
7777| [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
7778| [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
7779| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
7780| [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
7781| [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
7782| [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
7783| [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
7784| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
7785| [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
7786| [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
7787| [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
7788| [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
7789| [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
7790| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
7791| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
7792| [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
7793| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
7794| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
7795| [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
7796| [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
7797| [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
7798| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
7799| [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
7800| [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
7801| [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7802| [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
7803| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
7804| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
7805| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
7806| [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
7807| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
7808| [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
7809| [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
7810| [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
7811| [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
7812| [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
7813| [1022909] Wireshark GSM A RR, OpcUa, and TLS Dissector Bugs Let Remote Users Deny Service
7814| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
7815| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
7816| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7817| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
7818| [1022777] GnuTLS NULL Character Flaw in Common Name Field Lets Remote Users Spoof Certficiates
7819| [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
7820| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
7821| [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
7822| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
7823| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
7824| [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
7825| [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
7826| [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
7827| [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
7828| [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
7829| [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
7830| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
7831| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
7832| [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
7833| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
7834| [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
7835| [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
7836| [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
7837| [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
7838| [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7839| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
7840| [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
7841| [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
7842| [1022241] OpenSSL DTLS Processing Bugs Let Users Deny Service
7843| [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
7844| [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
7845| [1022159] GnuTLS Command Line Interface Does Not Properly Validate X.509 Certificates
7846| [1022158] GnuTLS DSA Key Generation Creates RSA Keys Instead of DSA Keys
7847| [1022157] GnuTLS Bug in Validating DSA Signatures Lets Remote Users Deny Service
7848| [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
7849| [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
7850| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
7851| [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
7852| [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
7853| [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7854| [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
7855| [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
7856| [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
7857| [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
7858| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
7859| [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
7860| [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
7861| [1021812] FileZilla SSL/TLS Buffer Overflow Lets Remote Users Deny Service
7862| [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
7863| [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
7864| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
7865| [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
7866| [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
7867| [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
7868| [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
7869| [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
7870| [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7871| [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
7872| [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7873| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
7874| [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
7875| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
7876| [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
7877| [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
7878| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
7879| [1021167] GnuTLS X.509 Certificate Chain Validation Bug Permits Man-in-the-Middle Attacks
7880| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
7881| [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
7882| [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
7883| [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
7884| [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
7885| [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
7886| [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
7887| [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
7888| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
7889| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
7890| [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
7891| [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
7892| [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
7893| [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
7894| [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
7895| [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
7896| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
7897| [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
7898| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
7899| [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
7900| [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
7901| [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
7902| [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
7903| [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
7904| [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
7905| [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
7906| [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
7907| [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
7908| [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7909| [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
7910| [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
7911| [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
7912| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
7913| [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
7914| [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
7915| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
7916| [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
7917| [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
7918| [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
7919| [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
7920| [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
7921| [1020179] Cisco ASA TLS Processing Bug Lets Remote Users Deny Service
7922| [1020178] Cisco PIX Firewall TLS Processing Bug Lets Remote Users Deny Service
7923| [1020122] OpenSSL TLS Handshake Bug Lets Remote Servers Crash the Connected Client
7924| [1020059] GnuTLS Invalid Record Length Values Let Remote Users Deny Service
7925| [1020058] GnuTLS Null Pointer Dereference in Processing Client Hello Messages Lets Remote Users Deny Service
7926| [1020057] GnuTLS Server Name Validation Flaw Lets Remote Users Deny Service
7927| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
7928| [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
7929| [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
7930| [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
7931| [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
7932| [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
7933| [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
7934| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
7935| [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
7936| [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
7937| [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
7938| [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
7939| [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
7940| [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
7941| [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
7942| [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
7943| [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
7944| [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
7945| [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
7946| [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
7947| [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
7948| [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
7949| [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
7950| [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
7951| [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
7952| [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
7953| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
7954| [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
7955| [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
7956| [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
7957| [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
7958| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
7959| [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
7960| [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
7961| [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
7962| [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
7963| [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
7964| [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
7965| [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
7966| [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
7967| [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
7968| [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
7969| [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
7970| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
7971| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
7972| [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
7973| [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
7974| [1018827] Cisco ASA TLS and MGCP Processing Bugs Let Remote Users Deny Service
7975| [1018826] Cisco PIX Firewall TLS and MGCP Processing Bugs Let Remote Users Deny Service
7976| [1018810] OpenSSL DTLS Bug May Let Remote Users Execute Arbitrary Code
7977| [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
7978| [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
7979| [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
7980| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
7981| [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
7982| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7983| [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
7984| [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
7985| [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
7986| [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
7987| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
7988| [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
7989| [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
7990| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7991| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
7992| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
7993| [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
7994| [1018357] Java Secure Socket Extension (JSSE) SSL/TLS Handshake Bug Lets Remote Users Deny Service
7995| [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
7996| [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7997| [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
7998| [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
7999| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
8000| [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8001| [1018226] Windows Schannel Digital Signature Bug Lets Remote Users Execute Arbitrary Code
8002| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
8003| [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
8004| [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
8005| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
8006| [1018042] FreeRADIUS EAP-TTLS Memory Leak Lets Remote Users Deny Service
8007| [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
8008| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
8009| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
8010| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
8011| [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
8012| [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
8013| [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
8014| [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
8015| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
8016| [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
8017| [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
8018| [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
8019| [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
8020| [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
8021| [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
8022| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
8023| [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
8024| [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
8025| [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8026| [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8027| [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8028| [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
8029| [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8030| [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8031| [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
8032| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
8033| [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
8034| [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
8035| [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
8036| [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
8037| [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
8038| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
8039| [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
8040| [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
8041| [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
8042| [1017478] Fetchmail TLS Security Bugs May Let Eavesdroppers Obtain Passwords
8043| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
8044| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
8045| [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
8046| [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
8047| [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
8048| [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
8049| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
8050| [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
8051| [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
8052| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
8053| [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
8054| [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8055| [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
8056| [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
8057| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
8058| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
8059| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
8060| [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
8061| [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
8062| [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
8063| [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
8064| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
8065| [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
8066| [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
8067| [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
8068| [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
8069| [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8070| [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
8071| [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
8072| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
8073| [1016844] GnuTLS May Allow Digital Signatures to Be Forged
8074| [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
8075| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
8076| [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
8077| [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
8078| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
8079| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
8080| [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
8081| [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
8082| [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
8083| [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
8084| [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
8085| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
8086| [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
8087| [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
8088| [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
8089| [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
8090| [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
8091| [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
8092| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
8093| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
8094| [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
8095| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
8096| [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
8097| [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
8098| [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
8099| [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
8100| [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
8101| [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
8102| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
8103| [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
8104| [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
8105| [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
8106| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
8107| [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8108| [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
8109| [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
8110| [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
8111| [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
8112| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
8113| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
8114| [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
8115| [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
8116| [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
8117| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
8118| [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
8119| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
8120| [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
8121| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
8122| [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
8123| [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
8124| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
8125| [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
8126| [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
8127| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
8128| [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
8129| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
8130| [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
8131| [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
8132| [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
8133| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8134| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
8135| [1015612] GnuTLS libtasn1 DER Decoding Bugs Let Remote Users Deny Service
8136| [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
8137| [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
8138| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
8139| [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
8140| [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
8141| [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
8142| [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
8143| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
8144| [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
8145| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
8146| [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
8147| [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
8148| [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
8149| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
8150| [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
8151| [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
8152| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
8153| [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
8154| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
8155| [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
8156| [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
8157| [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
8158| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
8159| [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
8160| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
8161| [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
8162| [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
8163| [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
8164| [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
8165| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
8166| [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
8167| [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
8168| [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
8169| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
8170| [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
8171| [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
8172| [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
8173| [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
8174| [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
8175| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
8176| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
8177| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
8178| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
8179| [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
8180| [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
8181| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
8182| [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
8183| [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
8184| [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
8185| [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
8186| [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
8187| [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
8188| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
8189| [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
8190| [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
8191| [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
8192| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
8193| [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
8194| [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
8195| [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
8196| [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
8197| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
8198| [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
8199| [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
8200| [1013861] GnuTLS Padding Validation Error Lets Remote Users Deny Service
8201| [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
8202| [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
8203| [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
8204| [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
8205| [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
8206| [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
8207| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
8208| [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
8209| [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
8210| [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
8211| [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
8212| [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
8213| [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
8214| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
8215| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
8216| [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
8217| [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
8218| [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
8219| [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
8220| [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
8221| [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
8222| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
8223| [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
8224| [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
8225| [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
8226| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
8227| [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
8228| [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
8229| [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
8230| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
8231| [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
8232| [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
8233| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
8234| [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
8235| [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
8236| [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
8237| [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
8238| [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
8239| [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
8240| [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
8241| [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
8242| [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
8243| [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
8244| [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
8245| [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
8246| [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
8247| [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
8248| [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
8249| [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
8250| [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
8251| [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
8252| [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
8253| [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
8254| [1012046] Cisco Secure Access Control Server EAP-TLS Bug Lets Remote Users Be Authenticated Without Proper Credentials
8255| [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
8256| [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
8257| [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
8258| [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
8259| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
8260| [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
8261| [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
8262| [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
8263| [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
8264| [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
8265| [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
8266| [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
8267| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
8268| [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
8269| [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
8270| [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
8271| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
8272| [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
8273| [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
8274| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
8275| [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
8276| [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
8277| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
8278| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
8279| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
8280| [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
8281| [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
8282| [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
8283| [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
8284| [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
8285| [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
8286| [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
8287| [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8288| [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8289| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8290| [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8291| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
8292| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
8293| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
8294| [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
8295| [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
8296| [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
8297| [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
8298| [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
8299| [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
8300| [1010838] GnuTLS X.509 Certificate Chain Validation Process Lets Remote Users Deny Service
8301| [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
8302| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
8303| [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
8304| [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
8305| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
8306| [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
8307| [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
8308| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
8309| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
8310| [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
8311| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
8312| [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
8313| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
8314| [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
8315| [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
8316| [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
8317| [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
8318| [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
8319| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
8320| [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
8321| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
8322| [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
8323| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
8324| [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
8325| [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
8326| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
8327| [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
8328| [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
8329| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
8330| [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
8331| [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
8332| [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
8333| [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
8334| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
8335| [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
8336| [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
8337| [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
8338| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
8339| [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
8340| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
8341| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
8342| [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
8343| [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
8344| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
8345| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
8346| [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
8347| [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
8348| [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
8349| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
8350| [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
8351| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
8352| [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
8353| [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
8354| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
8355| [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
8356| [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
8357| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
8358| [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
8359| [1009458] OpenSSL SSL/TLS Handshade Flaws May Let Remote Users Crash OpenSSL-based Applications
8360| [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
8361| [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
8362| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
8363| [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
8364| [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
8365| [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
8366| [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
8367| [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
8368| [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
8369| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
8370| [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
8371| [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
8372| [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
8373| [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
8374| [1008586] Microsoft Office Security Features Can Be Bypassed
8375| [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
8376| [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
8377| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
8378| [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
8379| [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
8380| [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
8381| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
8382| [1008425] Microsoft IE Does Not Properly Display Some URLs
8383| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
8384| [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
8385| [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
8386| [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
8387| [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
8388| [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
8389| [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
8390| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
8391| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
8392| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
8393| [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
8394| [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
8395| [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
8396| [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
8397| [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
8398| [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
8399| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
8400| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
8401| [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
8402| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
8403| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
8404| [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
8405| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
8406| [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
8407| [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
8408| [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
8409| [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
8410| [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8411| [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
8412| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
8413| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
8414| [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
8415| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
8416| [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
8417| [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
8418| [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
8419| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
8420| [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
8421| [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
8422| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
8423| [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
8424| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
8425| [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
8426| [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
8427| [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
8428| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
8429| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
8430| [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
8431| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
8432| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
8433| [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
8434| [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
8435| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
8436| [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8437| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
8438| [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
8439| [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
8440| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
8441| [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
8442| [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
8443| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
8444| [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
8445| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
8446| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
8447| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
8448| [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
8449| [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
8450| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
8451| [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
8452| [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
8453| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
8454| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
8455| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
8456| [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
8457| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
8458| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
8459| [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
8460| [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
8461| [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
8462| [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
8463| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
8464| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
8465| [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
8466| [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
8467| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
8468| [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
8469| [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
8470| [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
8471| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
8472| [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
8473| [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
8474| [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
8475| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
8476| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
8477| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
8478| [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
8479| [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
8480| [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
8481| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
8482| [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
8483| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
8484| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
8485| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
8486| [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
8487| [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
8488| [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
8489| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
8490| [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
8491| [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
8492| [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
8493| [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
8494| [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
8495| [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
8496| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
8497| [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
8498| [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
8499| [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
8500| [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
8501| [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
8502| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
8503| [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
8504| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
8505| [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
8506| [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
8507| [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
8508| [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
8509| [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
8510| [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
8511| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
8512| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
8513| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
8514| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
8515| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
8516| [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
8517| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
8518| [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
8519| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
8520| [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
8521| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
8522| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
8523| [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
8524| [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
8525| [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
8526| [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
8527| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
8528| [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
8529| [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
8530| [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
8531| [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
8532| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
8533| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
8534| [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
8535| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
8536| [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
8537| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
8538| [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
8539| [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
8540| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
8541| [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
8542| [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
8543| [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
8544| [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
8545| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
8546| [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
8547| [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
8548| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
8549| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
8550| [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
8551| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
8552| [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
8553| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
8554| [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
8555| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
8556| [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
8557| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
8558| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
8559| [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
8560| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
8561| [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
8562| [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
8563| [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
8564| [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
8565| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
8566| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
8567| [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
8568| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
8569| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
8570| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
8571| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
8572| [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
8573| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
8574| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
8575| [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
8576| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
8577| [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
8578| [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
8579| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
8580| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
8581| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
8582| [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
8583| [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
8584| [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
8585| [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
8586| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
8587| [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
8588| [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
8589| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
8590| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
8591| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
8592| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
8593| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
8594| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
8595| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
8596| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
8597| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
8598| [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
8599| [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
8600| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
8601| [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
8602| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
8603| [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
8604| [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
8605| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
8606| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
8607| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
8608| [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
8609| [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
8610| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
8611| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8612| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8613| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8614| [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
8615| [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
8616| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
8617| [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
8618| [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
8619| [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
8620| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
8621| [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
8622| [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
8623| [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
8624| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
8625| [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
8626| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
8627| [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
8628| [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
8629| [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
8630| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
8631| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
8632| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
8633| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
8634| [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
8635| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
8636| [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
8637| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
8638| [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
8639| [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
8640| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
8641| [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
8642| [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
8643| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
8644| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
8645| [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
8646| [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
8647| [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
8648| [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
8649| [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
8650| [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
8651| [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
8652| [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
8653| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
8654| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
8655| [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
8656| [1003757] PureTLS Java-based SSL Implementation Has Diffie-Hellman Parameter Bug That May Compromise Security
8657| [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
8658| [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
8659| [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
8660| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
8661| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
8662| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
8663| [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
8664| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
8665| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
8666| [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
8667| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
8668| [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
8669| [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
8670| [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
8671| [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
8672| [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
8673| [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
8674| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
8675| [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
8676| [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
8677| [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
8678| [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
8679| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
8680| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
8681| [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
8682| [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
8683| [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
8684| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
8685| [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
8686| [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
8687| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
8688| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
8689| [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
8690| [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
8691| [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
8692| [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
8693| [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
8694| [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
8695| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
8696| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
8697| [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
8698| [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
8699| [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
8700| [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
8701| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
8702| [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
8703| [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
8704| [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
8705| [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
8706| [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
8707| [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
8708| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
8709| [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
8710| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
8711| [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
8712| [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
8713| [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
8714| [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
8715| [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
8716| [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
8717| [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
8718| [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
8719| [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
8720| [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
8721| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
8722| [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
8723| [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
8724| [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
8725| [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
8726| [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
8727| [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
8728| [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
8729| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
8730| [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
8731| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
8732| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
8733| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
8734| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
8735| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
8736| [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
8737| [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
8738| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
8739| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
8740| [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
8741| [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
8742| [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
8743| [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
8744| [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
8745| [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
8746| [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
8747| [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
8748| [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
8749| [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
8750| [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
8751| [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
8752| [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
8753| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
8754| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
8755| [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
8756| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
8757| [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
8758| [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
8759| [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
8760| [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
8761| [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
8762| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
8763| [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
8764| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
8765| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
8766| [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
8767| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
8768| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
8769| [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
8770| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
8771| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
8772| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
8773| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
8774| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
8775| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
8776| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
8777| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
8778| [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
8779| [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
8780| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
8781| [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
8782| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
8783| [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
8784| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
8785| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
8786| [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
8787| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
8788| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
8789| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
8790| [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
8791| [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
8792| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
8793| [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
8794| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
8795| [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
8796| [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
8797| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
8798| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
8799| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
8800| [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
8801| [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
8802| [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
8803| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
8804| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
8805| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
8806| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
8807| [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
8808| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
8809| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
8810| [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
8811| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
8812| [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
8813| [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
8814| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
8815| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
8816| [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
8817| [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
8818| [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
8819| [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
8820| [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
8821| [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
8822| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
8823| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
8824| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
8825| [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
8826| [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
8827| [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
8828| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
8829| [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
8830| [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
8831| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
8832| [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
8833| [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
8834| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
8835| [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
8836| [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
8837| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
8838| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
8839| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
8840| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
8841| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
8842|
8843| OSVDB - http://www.osvdb.org:
8844| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
8845| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
8846| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
8847| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
8848| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
8849| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
8850| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
8851| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
8852| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
8853|_
88541 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
8855SF-Port443-TCP:V=7.70%I=7%D=8/6%Time=5D4A07C7%P=x86_64-pc-linux-gnu%r(TLSS
8856SF:essionReq,BB9,"\x16\x03\x03\x0b\xb4\x02\0\0M\x03\x03\]J\x06\xcf\xd6\xd4
8857SF::\(r\x88=G\x1a:\xb5P\xb0_\"\xb6\x1e\xc1\xb3G\xbf`\xb2\x1fe\xbe\xde;\x20
8858SF:\xcd\x1a\0\0\x8a\xa8\x01\x83\xf5\xb3\x9b=\xd1\xa5F\x0e\xc2@\xa9u\xf3i\x
8859SF:0f\]\x90\x07-\x01\x1d\x13\x08\x04\0/\0\0\x05\xff\x01\0\x01\0\x0b\0\x0b\
8860SF:[\0\x0bX\0\x06\xba0\x82\x06\xb60\x82\x05\x9e\xa0\x03\x02\x01\x02\x02\x1
8861SF:0\x06\xf8\xac\x0cV\x99\x1be\xe4s\"\xb5~\.\xf5\xaa0\r\x06\t\*\x86H\x86\x
8862SF:f7\r\x01\x01\x0b\x05\x000M1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\x150\x13
8863SF:\x06\x03U\x04\n\x13\x0cDigiCert\x20Inc1'0%\x06\x03U\x04\x03\x13\x1eDigi
8864SF:Cert\x20SHA2\x20Secure\x20Server\x20CA0\x1e\x17\r180806000000Z\x17\r200
8865SF:810120000Z0z1\x0b0\t\x06\x03U\x04\x06\x13\x02SA1\x0f0\r\x06\x03U\x04\x0
8866SF:7\x13\x06Riyadh1604\x06\x03U\x04\n\x13-Bureau\x20of\x20Experts\x20At\x2
8867SF:0The\x20Council\x20of\x20Ministers1\x0b0\t\x06\x03U\x04\x0b\x13\x02IT1\
8868SF:x150\x13\x06\x03U\x04\x03\x0c\x0c\*\.boe\.gov\.sa0\x82\x01\"0\r\x06\t\*
8869SF:\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\x000\x82\x01\n\x02\x8
8870SF:2\x01\x01\0\xb6P~\xa1\"\x16\x8d\xa8\xc4\x1e\xed\xb2\x95:\xb9\xeb&`\xc7\
8871SF:x92\x8a\xf2\xc0/dr4\xe8\xe5\xaf~\x0e\xd0\xe4\x97\xb6\xfaT=y\xf1@\x88\ny
8872SF:\"\xd6\x9a\x11J\x13\xe0\x82G\xf3\xa1W\xfe\x85\xf7\xb3\xea/8\x08\x04\x88
8873SF:!\xaf\xe5jin}\.\x86qn\xcf\x20\x83\x80\xe1a\x99\xe5T\x1e\x8fd\nA\xc4\xd8
8874SF:\xf6\x98\x8c\x88,\x05\x02U\xa2\x1e\xf9rSC\x86\x87\xf4\x07i\x8bE\x83\xba
8875SF:\xb8IuL\xc8\x12U\x86\xa6\xe0\x9e\xed\xf6\x0b\x99\x8bN}a\x1ag\xc5\]\xa0\
8876SF:x1779\x88\x98\x91\|j\x82\xe0\xe3\^\xfe\xc6\x9c\x8a\[\x93m\x87\xccs!o\x9
8877SF:3j\x03\xcd\x1b\xf3\xdf\xec\x01wp\xa5\xa0'\xcf\+\xb8\x92i\xc2\x8d\xf3\xb
8878SF:c\xcf\x05\?\xb1\x10Zy\xa7\xb0\x825\xaf\xaff\x83\xfbR9/\xd6R\\\x20n\xe4\
8879SF:x94\x979\xb2\xad\xec\xaa{\x03\xa1\x17\xe6{T\x19\xd6\xc9\xa7\xdb\x01\xd6
8880SF:Ih\x83\xf2\x8a\xfbW\xaa\xae\xe27\xb6\xd5f\xfc9\x97-\x93\x02&\xaf\x02\x0
8881SF:3\x01\0\x01\xa3\x82\x03c0\x82\x03_0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\
8882SF:x14\x0f\x80a\x1c\x821a\xd5/\(\xe7\x8dF8\xb4,\xe1\xc6\xd9\xe20\x1d\x06\x
8883SF:03U\x1d\x0e\x04\x16\x04\x14\r,9\x85n\x83e\xeda\xe2`\x9e\xa2\xd9\xa2To\x
8884SF:ebMB0#\x06\x03U\x1d\x11\x04\x1c0\x1a\x82\x0c\*\.boe\.gov\.sa\x82\nboe\.
8885SF:gov\.sa0\x0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x05\xa00\x1d\
8886SF:x06\x03U\x1d%\x04\x160\x14\x06\x08\+\x06\x01\x05\x05\x07\x03\x01\x06\x0
8887SF:8\+\x06\x01\x05\x05\x07\x03\x020k\x06\x03U\x1d\x1f\x04d0b0/\xa0-\xa0\+\
8888SF:x86\)http://crl3\.digicert\.com/ssca-sha2-g6\.crl0/\xa0-\xa0\+\x86\)htt
8889SF:p:");
8890Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
8891Device type: general purpose
8892Running (JUST GUESSING): Linux 4.X|3.X (87%)
8893OS CPE: cpe:/o:linux:linux_kernel:4.9 cpe:/o:linux:linux_kernel:3.18
8894Aggressive OS guesses: Linux 4.9 (87%), Linux 3.18 (86%)
8895No exact OS matches for host (test conditions non-ideal).
8896Network Distance: 11 hops
8897Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
8898
8899TRACEROUTE (using port 443/tcp)
8900HOP RTT ADDRESS
89011 165.08 ms 10.247.200.1
89022 166.72 ms 213.184.122.97
89033 165.12 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
89044 165.15 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
89055 166.74 ms bzq-179-124-54.cust.bezeqint.net (212.179.124.54)
89066 203.76 ms ix-ae-4-0.tcore2.wyn-marseille.as6453.net (80.231.200.73)
89077 203.79 ms if-ae-2-2.tcore1.wyn-marseille.as6453.net (80.231.217.1)
89088 289.20 ms 80.231.217.99
89099 ...
891010 291.87 ms 212.26.63.252
891111 288.52 ms 212.138.117.248
8912######################################################################################################################################
8913 Microsoft ASP.NET
8914 Slick
8915 Font Awesome
8916 jQuery 1.11.0
8917 X-SharePointHealthScore: 0
8918 SPRequestGuid: a1b5f79e-f331-704f-057a-1974bf1e0a20
8919 request-id: a1b5f79e-f331-704f-057a-1974bf1e0a20
8920 SPRequestDuration: 1524
8921 SPIisLatency: 0
8922 X-MS-InvokeApp: 1; RequireReadOnly
8923#######################################################################################################################################
8924version: 1.11.13-static
8925OpenSSL 1.0.2-chacha (1.0.2g-dev)
8926
8927Connected to 212.138.117.248
8928
8929Testing SSL server 212.138.117.248 on port 443 using SNI name 212.138.117.248
8930
8931 TLS Fallback SCSV:
8932Connection failed - unable to determine TLS Fallback SCSV support
8933
8934 TLS renegotiation:
8935Session renegotiation not supported
8936
8937 TLS Compression:
8938Compression disabled
8939
8940 Heartbleed:
8941TLS 1.2 not vulnerable to heartbleed
8942TLS 1.1 not vulnerable to heartbleed
8943TLS 1.0 not vulnerable to heartbleed
8944
8945 Supported Server Cipher(s):
8946#######################################################################################################################################
8947Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 19:11 EDT
8948NSE: Loaded 45 scripts for scanning.
8949NSE: Script Pre-scanning.
8950NSE: Starting runlevel 1 (of 2) scan.
8951Initiating NSE at 19:11
8952Completed NSE at 19:11, 0.00s elapsed
8953NSE: Starting runlevel 2 (of 2) scan.
8954Initiating NSE at 19:11
8955Completed NSE at 19:11, 0.00s elapsed
8956Initiating Ping Scan at 19:11
8957Scanning 212.138.117.248 [4 ports]
8958Completed Ping Scan at 19:11, 0.34s elapsed (1 total hosts)
8959Initiating Parallel DNS resolution of 1 host. at 19:11
8960Completed Parallel DNS resolution of 1 host. at 19:11, 0.02s elapsed
8961Initiating Connect Scan at 19:11
8962Scanning 212.138.117.248 [65535 ports]
8963Discovered open port 443/tcp on 212.138.117.248
8964Discovered open port 80/tcp on 212.138.117.248
8965Connect Scan Timing: About 5.68% done; ETC: 19:20 (0:08:35 remaining)
8966Connect Scan Timing: About 23.49% done; ETC: 19:15 (0:03:19 remaining)
8967Connect Scan Timing: About 46.10% done; ETC: 19:14 (0:01:46 remaining)
8968Connect Scan Timing: About 65.70% done; ETC: 19:14 (0:01:03 remaining)
8969Completed Connect Scan at 19:14, 167.18s elapsed (65535 total ports)
8970Initiating Service scan at 19:14
8971Scanning 2 services on 212.138.117.248
8972Completed Service scan at 19:14, 15.96s elapsed (2 services on 1 host)
8973Initiating OS detection (try #1) against 212.138.117.248
8974Retrying OS detection (try #2) against 212.138.117.248
8975Initiating Traceroute at 19:14
8976Completed Traceroute at 19:14, 9.02s elapsed
8977Initiating Parallel DNS resolution of 9 hosts. at 19:14
8978Completed Parallel DNS resolution of 9 hosts. at 19:14, 2.67s elapsed
8979NSE: Script scanning 212.138.117.248.
8980NSE: Starting runlevel 1 (of 2) scan.
8981Initiating NSE at 19:14
8982Completed NSE at 19:15, 27.86s elapsed
8983NSE: Starting runlevel 2 (of 2) scan.
8984Initiating NSE at 19:15
8985Completed NSE at 19:15, 0.00s elapsed
8986Nmap scan report for 212.138.117.248
8987Host is up, received syn-ack ttl 53 (0.17s latency).
8988Scanned at 2019-08-06 19:11:21 EDT for 228s
8989Not shown: 65529 filtered ports
8990Reason: 65529 no-responses
8991PORT STATE SERVICE REASON VERSION
899225/tcp closed smtp conn-refused
899380/tcp open http-proxy syn-ack HAProxy http proxy 1.3.1 or later
8994|_http-trane-info: Problem with XML parsing of /evox/about
8995| vulscan: VulDB - https://vuldb.com:
8996| [112920] Saifor CVMS HUB 1.3.1 HTTP Parameter secciones.xhtml sql injection
8997| [65806] IBM Sterling Connect Enterprise Http Option up to 1.3.1 cross site scripting
8998| [124580] Telegram Desktop 1.3.16 Alpha Proxy Cleartext weak encryption
8999| [82327] Cisco Unified Computing System up to 1.3(1b) HTTP Request Command privilege escalation
9000| [6748] Oracle Central Designer 1.3/1.4/1.4.2 HTTP unknown vulnerability
9001| [51717] Apache HTTP Server up to 1.3.3 mod_proxy ap_proxy_send_fb memory corruption
9002|
9003| MITRE CVE - https://cve.mitre.org:
9004| [CVE-2011-4451] ** DISPUTED ** libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter.
9005| [CVE-2011-4449] actions/files/files.php in WikkaWiki 1.3.1 and 1.3.2, when INTRANET_MODE is enabled, supports file uploads for file extensions that are typically absent from an Apache HTTP Server TypesConfig file, which makes it easier for remote attackers to execute arbitrary PHP code by placing this code in a file whose name has multiple extensions, as demonstrated by a (1) .mm or (2) .vpp file.
9006| [CVE-2011-4140] The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
9007| [CVE-2011-4139] Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct a full URL in certain circumstances, which allows remote attackers to conduct cache poisoning attacks via a crafted request.
9008| [CVE-2009-4492] WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
9009| [CVE-2008-1385] Cross-site scripting (XSS) vulnerability in the Top Referrers (aka referrer) plugin in Serendipity (S9Y) before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via the Referer HTTP header.
9010| [CVE-2007-5273] Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
9011| [CVE-2007-0760] EQdkp 1.3.1 and earlier authenticates administrative requests by verifying that the HTTP Referer header specifies an admin/ URL, which allows remote attackers to read or modify account names and passwords via a spoofed Referer.
9012| [CVE-2004-2124] The register_globals simulation capability in Gallery 1.3.1 through 1.4.1 allows remote attackers to modify the HTTP_POST_VARS variable and conduct a PHP remote file inclusion attack via the GALLERY_BASEDIR parameter, a different vulnerability than CVE-2002-1412.
9013| [CVE-2001-0399] Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request.
9014| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
9015| [CVE-2011-4317] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
9016| [CVE-2011-3368] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
9017| [CVE-2010-3574] Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
9018| [CVE-2010-3553] Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
9019| [CVE-2010-3549] Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
9020| [CVE-2010-3541] Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
9021| [CVE-2010-1623] Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
9022| [CVE-2010-0010] Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow.
9023| [CVE-2009-3877] Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
9024| [CVE-2009-0164] The web interface for CUPS before 1.3.10 does not validate the HTTP Host header in a client request, which makes it easier for remote attackers to conduct DNS rebinding attacks.
9025| [CVE-2005-2088] The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
9026| [CVE-2005-1760] sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.
9027| [CVE-2004-2762] The server in IBM Tivoli Storage Manager (TSM) 4.2.x on MVS, 5.1.9.x before 5.1.9.1, 5.1.x before 5.1.10, 5.2.2.x before 5.2.2.3, 5.2.x before 5.2.3, 5.3.x before 5.3.0, and 6.x before 6.1, when the HTTP communication method is enabled, allows remote attackers to cause a denial of service (daemon crash or hang) via unspecified HTTP traffic, as demonstrated by the IBM port scanner 1.3.1.
9028| [CVE-2004-0700] Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
9029| [CVE-2004-0492] Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
9030| [CVE-2003-1580] The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via crafted DNS responses containing numerical top-level domains, as demonstrated by a forged 123.123.123.123 domain name, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
9031| [CVE-2002-2012] Unknown vulnerability in Apache 1.3.19 running on HP Secure OS for Linux 1.0 allows remote attackers to cause "unexpected results" via an HTTP request.
9032| [CVE-2002-0177] Buffer overflows in icecast 1.3.11 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request from an MP3 client.
9033| [CVE-2001-1083] Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
9034| [CVE-2001-0925] The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex.
9035| [CVE-2001-0129] Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request.
9036| [CVE-2000-1206] Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files.
9037| [CVE-2000-0869] The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary diretories via the PROPFIND HTTP request method.
9038|
9039| SecurityFocus - https://www.securityfocus.com/bid/:
9040| [37966] Apache 1.3 mod_proxy HTTP Chunked Encoding Integer Overflow Vulnerability
9041| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
9042|
9043| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9044| [28893] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow variant
9045| [28522] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow
9046| [10107] Trend Micro InterScan VirusWall HTTP 1.0 gzip content encoding protection bypass
9047| [10106] Trend Micro InterScan VirusWall HTTP 1.1 chunked transfer encoding protection bypass
9048| [85605] Stage File Proxy module for Drupal repeated HTTP request denial of service
9049| [85020] HAProxy denial of service
9050| [83211] HAProxy tcp-request content denial of service
9051| [77913] Apache HTTP Server mod_proxy_ajp information disclosure
9052| [76095] SEIL routers HTTP-Proxy/Gateway security bypass
9053| [75777] HAProxy trash buffer overflow
9054| [71617] Apache HTTP Server mod_proxy module information disclosure
9055| [71445] Apache HTTP Server mod_proxy security bypass
9056| [70336] Apache HTTP Server mod_proxy information disclosure
9057| [69804] Apache HTTP Server mod_proxy_ajp denial of service
9058| [66665] HAProxy manage_server_side_cookies() denial of service
9059| [66640] Apache HttpComponents HttpClient Proxy-Authorization information disclosure
9060| [63651] Google Chrome HTTP proxy authentication denial of service
9061| [60883] Apache mod_proxy_http information disclosure
9062| [59413] Apache mod_proxy_http timeout information disclosure
9063| [56623] Apache HTTP Server mod_proxy_ajp denial of service
9064| [53453] Cisco IOS Authentication Proxy for HTTP security bypass
9065| [53124] mod_proxy_ftp module for Apache HTTP header security bypass
9066| [52604] HTTP request forwarding (Web Proxy) detected
9067| [51532] mod_proxy module for the Apache HTTP Server stream_reqbody_cl denial of service
9068| [47305] Live Chat component for Joomla! xmlhttp.php open proxy
9069| [44467] HTTP Anti Virus Proxy (HAVP) sockethandler.cpp denial of service
9070| [44223] Apache HTTP Server mod_proxy_ftp cross-site scripting
9071| [42987] Apache HTTP Server mod_proxy module denial of service
9072| [40694] BEA WebLogic Server and WebLogic Express HttpClusterServlet and HttpProxyServlet privilege escalation
9073| [39615] Apache HTTP Server mod_proxy_ftp.c UTF-7 cross-site scripting
9074| [39612] Apache HTTP Server mod_proxy_balancer buffer overflow
9075| [39474] Apache HTTP Server mod_proxy_balancer cross-site scripting
9076| [37405] DeleGate HTTP cache proxy denial of service
9077| [36354] Apache HTTP Server mod_proxy module denial of service
9078| [36352] Apache HTTP Server ap_proxy_date_canon() denial of service
9079| [34884] Astaro Secure Gateway HTTP proxy denial of service
9080| [34282] BEA WebLogic Server and WebLogic Express HttpProxyServlet and HttpClusterServlet unauthorized access
9081| [26970] WinGate HTTP proxy buffer overflow
9082| [26370] Symantec Enterprise Firewall HTTP proxy internal IP disclosure
9083| [23997] Blue Coat WinProxy SecureSuite HTTP request denial of service
9084| [23451] Microsoft Internet Explorer HTTPS proxy authentication information disclosure
9085| [22016] Simpleproxy HTTP Proxy reply format string
9086| [20391] Apple Mac OS X HTTP proxy service security bypass
9087| [20339] Squid Web Proxy Cache HTTP header cache poisoning
9088| [20334] Squid Web Proxy Cache httpProcessReplyHeader security bypass
9089| [19868] HTTP Anti Virus Proxy cab and zip files bypass filtering
9090| [19060] Squid Web Proxy Cache HTTP header cache poisoning
9091| [18308] Jana Server http-server and pna-proxy denial of service
9092| [16751] AnomicHTTPProxy "
9093| [16750] AnomicHTTPProxy allows elevated privileges
9094| [16749] AnomicHTTPProxy administration interface denial of service
9095| [16387] Apache HTTP Server mod_proxy Content-Length buffer overflow
9096| [15952] proxy server using the HTTP CONNECT directive has been detected
9097| [15277] Proxy-Pro GateKeeper Pro long HTTP GET buffer overflow
9098| [15275] PSOProxy long HTTP GET request buffer overflow
9099| [14955] ProxyNow! HTTP GET stack based buffer overflow or heap-based buffer overflow
9100| [14947] Gaim HTTP proxy buffer overflow
9101| [12681] Apache HTTP Server mod_proxy could allow mail relaying
9102| [12552] Apache HTTP Server FTP proxy server denial of service
9103| [11143] Astaro Security Linux HTTP Proxy can be used to make unauthorized TCP connections
9104| [10139] Check Point FireWall-1 HTTP proxy could allow HTTPS and FTP traffic to bypass the firewall
9105| [9914] Jigsaw HTTP Proxy server cross-site scripting
9106| [9834] CERN HTTPD proxy server cross-site scripting
9107| [9683] Jana Server HTTP GET proxy buffer overflow
9108| [9579] Symantec Norton Personal Firewall and Norton Internet Security HTTP proxy buffer overflow
9109| [9455] AnalogX Proxy malformed HTTP request buffer overflow
9110| [8425] Trend Micro InterScan VirusWall could allow virus infected Web pages to bypass the HTTP proxy filtering
9111| [7964] BlackJumboDog HTTP proxy buffer overflow
9112| [7916] Avirt SOHO, Gateway, and Gateway Suite HTTP proxy buffer overflow
9113| [4460] CProxy proxy server HTTP port denial of service
9114| [153] HTTP proxy penetrated
9115| [60] HTTP proxy detected
9116|
9117| Exploit-DB - https://www.exploit-db.com:
9118| [21978] Linksys WAP11 1.3/1.4,D-Link DI-804 4.68/Dl-704 2.56 b5 Embedded HTTP Server DoS Vulnerability
9119| [20595] NCSA 1.3/1.4.x/1.5,Apache httpd 0.8.11/0.8.14 ScriptAlias Source Retrieval Vulnerability
9120| [5215] Ruby 1.8.6 (Webrick Httpd 1.3.1) Directory Traversal Vulnerability
9121| [30229] SHTTPD 1.38 Filename Parse Error Information Disclosure Vulnerability
9122| [26156] CPaint 1.3 xmlhttp Request Input Validation Vulnerability
9123| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
9124| [24402] Axis Network Camera 2.x And Video Server 1-3 HTTP Authentication Bypass
9125| [23676] MaxWebPortal 1.3x down.asp HTTP_REFERER XSS
9126| [21955] AN HTTPD 1.38/1.39/1.40/1.41 Malformed SOCKS4 Request Buffer Overflow Vulnerability
9127| [21145] IBM HTTP Server 1.3.x Source Code Disclosure Vulnerability
9128| [20559] tinyproxy tinyproxy 1.3.2/1.3.3 Heap Overflow Vulnerability
9129| [20531] IBM HTTP Server 1.3 AfpaCache/WebSphereNet.Data DoS Vulnerability
9130| [16759] SHTTPD <= 1.34 URI-Encoded POST Request Overflow (win32)
9131| [16199] Icy Phoenix 1.3.0.53a HTTP Referer stored XSS
9132| [4700] simple httpd <= 1.38 Multiple Vulnerabilities
9133| [2482] SHTTPD 1.34 (POST) Remote Buffer Overflow Exploit
9134| [1174] ZipTorrent <= 1.3.7.3 - Local Proxy Password Disclosure Exploit
9135|
9136| OpenVAS (Nessus) - http://www.openvas.org:
9137| [66806] Debian Security Advisory DSA 1987-1 (lighttpd)
9138| [66557] Fedora Core 12 FEDORA-2009-12606 (httpd)
9139| [66498] Fedora Core 10 FEDORA-2009-12604 (httpd)
9140| [64741] Fedora Core 11 FEDORA-2009-8812 (httpd)
9141| [61364] Debian Security Advisory DSA 1540-3 (lighttpd)
9142| [61357] Debian Security Advisory DSA 1609-1 (lighttpd)
9143| [60793] Debian Security Advisory DSA 1540-2 (lighttpd)
9144| [60786] Debian Security Advisory DSA 1540-1 (lighttpd)
9145| [60573] Debian Security Advisory DSA 1521-1 (lighttpd)
9146| [60499] Debian Security Advisory DSA 1513-1 (lighttpd)
9147| [58644] Debian Security Advisory DSA 1362-2 (lighttpd)
9148| [58581] Debian Security Advisory DSA 1362-1 (lighttpd)
9149| [57684] Debian Security Advisory DSA 1205-2 (thttpd)
9150| [53726] Debian Security Advisory DSA 145-1 (tinyproxy)
9151| [11129] HTTP 1.1 header overflow
9152| [11127] HTTP 1.0 header overflow
9153| [902825] at32 Reverse Proxy Multiple HTTP Header Fields Denial Of Service Vulnerability
9154| [900325] Qbik WinGate HTTP Proxy Server Access Controls Bypass Vulnerability
9155| [900222] IBM HTTP Server mod_proxy Interim Responses DoS Vulnerability
9156| [864812] Fedora Update for haproxy FEDORA-2012-16033
9157| [864801] Fedora Update for haproxy FEDORA-2012-16056
9158| [800827] Apache 'mod_proxy_http.c' Denial Of Service Vulnerability
9159| [103293] Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
9160| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
9161| [100083] HTTP Proxy Server Detection
9162| [71366] FreeBSD Ports: haproxy
9163| [11715] Header overflow against HTTP proxy
9164|
9165| SecurityTracker - https://www.securitytracker.com:
9166| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
9167| [1015870] Cisco 11500 Content Services Switch HTTP Compression Bug Lets Remote Users Deny Service
9168| [1028638] RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files
9169| [1027165] Squid XMLHttpRequest Allows Remote Users to Obtain the Target User's Proxy Username and Password
9170| [1026054] Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service
9171| [1024096] Apache mod_proxy_http May Return Results for a Different Request
9172| [1020900] HTTP Anti Virus Proxy Bug in 'sockethandler.cpp' Lets Remote Users Deny Service
9173| [1017586] Blue Coat WinProxy Heap Overflow in Processing HTTP CONNECT Requests May Let Remote Users Execute Arbitrary Code
9174| [1017324] Sun Java System Web Proxy Server Lets Remote Users Conduct HTTP Request Smuggling Attacks
9175| [1016239] WinGate Buffer Overflow in HTTP Proxy Lets Remote Users Execute Arbitrary Code
9176| [1016058] Symantec Gateway Security HTTP Proxy May Disclose Internal NAT Addresses
9177| [1016057] Symantec Enterprise Firewall HTTP Proxy May Disclose Internal NAT Addresses
9178| [1014359] DeleGate Proxy Lets Remote Users Conduct HTTP Request Smuggling Attacks
9179| [1014358] Sun Java System Web Proxy Server Lets Remote Users Conduct HTTP Request Smuggling Attacks
9180| [1013370] HTTP Anti Virus Proxy May Not Detect Viruses in Certain Archives
9181| [1012365] JanaServer 2 http-server and pna-proxy Flaws Let Remote Users Deny Service
9182| [1007712] Nokia Electronic Documentation Default Configuration Permits Remote HTTP Proxy Services
9183| [1007146] Apache HTTP Server FTP Proxy Bug May Cause Denial of Service Conditions
9184| [1006833] EServ Can Be Used as HTTP and FTP Proxy Even When Not Configured as a Proxy
9185| [1005253] Check Point FireWall-1 HTTP Proxy Default Configuration May Allow HTTPS and FTP Traffic to Pass Through the Proxy
9186| [1005026] CERN HTTP Proxy Server Input Validation Hole Lets Remote Users Conduct Cross-site Scripting Attacks
9187| [1004780] Norton Personal Firewall Buffer Overflow in HTTP Proxy May Allow Remote Users to Execute Arbitrary Code on the System
9188| [1004779] Norton Internet Security Buffer Overflow in HTTP Proxy May Allow Remote Users to Execute Arbitrary Code on the System
9189| [1003875] HP Webproxy for HP-UX VVOS Operating System May Forward Certain HTTP Requests to the Internal Network Without Fully Processing the Packet Against the Rule Set
9190| [1003600] Check Point FireWall-1 HTTP Proxy Bug Lets Remote Users Bypass Some Access Controls and Connect to Arbitrary Ports on Internal/Protected Hosts
9191|
9192| OSVDB - http://www.osvdb.org:
9193| [91975] HAProxy HTTP Content Inspection Mechanism HTTP Request Handling Remote Overflow DoS
9194| [84399] Huawei AR 18 / 29 Routers HTTP Server Pre-auth Multiple URL Handling Remote Overflow
9195| [82774] HAProxy http_auth_group() Function User Parsing Weakness
9196| [82768] HAProxy Secure / HttpOnly Flag Cookie Weakness
9197| [79018] Links HTTP 100 Response Handling DoS
9198| [74826] Pidgin libpurple MSN Protocol Plugin httpconn.c msn_httpconn_parse_data Function HTTP 100 Response Remote DoS
9199| [74346] HAProxy src/proto_http.c manage_server_side_cookies() Function HTTP Set-Cookie Header Remote DoS
9200| [64275] NIBE RCU 11 Heat Pump HTTP Request Arbitrary Administrative Account Creation
9201| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
9202| [24433] Cisco 11500 Content Services Switch HTTP Compression DoS
9203| [8854] Cisco CSS 11000 Web Interface HTTPS POST DoS
9204| [94328] HAProxy Header Field Handling Remote DoS
9205| [93048] IBM Sterling Secure Proxy HTTP Header Web Server Version Disclosure
9206| [91613] Zend Framework Multiple Class HTTP Header Proxy Information Handling Spoofing Weakness
9207| [90557] Apache HTTP Server mod_proxy_balancer balancer-manager Interface Multiple Parameter XSS
9208| [90422] Mozilla Multiple Product Proxy 407 Response HTTPS Address Spoofing
9209| [89275] Apache HTTP Server mod_proxy_ajp Module Expensive Request Parsing Remote DoS
9210| [88581] Squid Web Proxy HTTP Accelerator Mode Proxied Port Scan Weakness
9211| [88287] Squid Crafted XMLHttpRequest Remote Proxy-Authorization Cleartext Credential Disclosure
9212| [88016] BlackJumboDog HTTP Proxy Multiple String Parsing Remote Overflow
9213| [87958] IBM WebSphere Message Broker ProxyServlet / MQ HTTP Connection Cleartext Credential Disclosure
9214| [87457] Tor Directory Connection HttpProxyAuthenticator Remote Fingerprinting Weakness
9215| [85838] 602Pro LAN SUITE HTTP Proxy-Authorization Header Handling Remote Overflow DoS
9216| [85090] Apache HTTP Server mod_proxy_ajp.c mod_proxy_ajp Module Proxy Functionality Cross-client Information Disclosure
9217| [85089] Apache HTTP Server mod_proxy_http.c mod_proxy_http Module Cross-client Information Disclosure
9218| [82773] HAProxy buffer_ignore Function Unspecified Issue
9219| [82772] HAProxy Crafted Response Cookie Handling Remote DoS
9220| [82771] HAProxy Invalid Response Handling Remote DoS
9221| [82770] HAProxy appsession Cookie Matching Weakness
9222| [82769] HAProxy Session Freeing Unspecified DoS
9223| [82767] HAProxy poll/epoll Unspecified Memory Corruption DoS
9224| [82766] HAProxy send_syslog() Function Overflow Local DoS
9225| [82651] SEIL Routers HTTP-Proxy/Gateway HTTP Request Parsing URL Filter Bypass
9226| [82092] HAProxy Boundary Error Trash Buffer Data Copying Remote Overflow
9227| [81164] Squid Proxy HTTP Header Host Field Parsing URL Filter Bypass
9228| [78987] CVS src/client.c proxy_connect() Function HTTP Version Response Parsing Remote Overflow
9229| [78774] Mozilla Multiple Products IPv6 Proxy Generated XMLHttpRequest Object Handling Remote Information Disclosure
9230| [78667] Oracle Java SE / Java for Business java:classes_net HttpsUrlConnection Authenticated Proxy Tunnel Handling Overflow
9231| [77444] Apache HTTP Server mod_proxy Mdule Web Request HTTP/0.9 Protocol URL Parsing Proxy Remote Security Bypass
9232| [77310] Apache HTTP Server mod_proxy Reverse Proxy Mode Security Bypass Weakness (2011-4317)
9233| [76079] Apache HTTP Server mod_proxy Mdule Web Request URL Parsing Proxy Remote Security Bypass (2011-3368)
9234| [75647] Apache HTTP Server mod_proxy_ajp Module mod_proxy_balancer HTTP Request Remote DoS
9235| [73624] PHP Streams Component HTTP Proxy FTP Wrapper ftp:// URL DoS
9236| [73354] IBM WebSphere Application Server (WAS) HTTP Transport SIP Proxy UDP Message Saturation Remote DoS
9237| [71647] Apache HttpComponents HttpClient Proxy-Authorization Credentials Remote Disclosure
9238| [69667] Google Chrome HTTP Proxy Authentication Required Response Handling DoS
9239| [68162] OmniVista 4760 HTTP Proxy Crafted HTTP Request Remote Overflow
9240| [67270] Blue Coat ProxySG HTTPS Privilege Enforcement Bypass
9241| [65654] Apache HTTP Server mod_proxy_http mod_proxy_http.c Timeout Detection Weakness HTTP Request Response Disclosure
9242| [62676] Apache HTTP Server mod_proxy_ajp Module Crafted Request Remote DoS
9243| [62009] Apache HTTP Server src/modules/proxy/proxy_util.c mod_proxy ap_proxy_send_fb() Function Overflow
9244| [60010] HP Praesidium Webproxy Crafted HTTP Request Forwarding Weakness
9245| [59022] Apache Shindig ConcatProxyServlet HTTP Header Response Splitting
9246| [57882] Apache HTTP Server mod_proxy_ftp Authorization HTTP Header Arbitrary FTP Command Injection
9247| [57851] Apache HTTP Server mod_proxy_ftp EPSV Command NULL Dereference Remote DoS
9248| [56712] Live Chat Component for Joomla! xmlhttp.php Open HTTP Proxy
9249| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
9250| [56488] Google Chrome Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
9251| [56487] Opera Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
9252| [55553] Apache HTTP Server mod_proxy Module mod_proxy_http.c stream_reqbody_cl Function CPU Consumption DoS
9253| [55133] Mozilla Firefox HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
9254| [55132] Google Chrome src/net/http/http_transaction_winhttp.cc HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
9255| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
9256| [53921] Apache HTTP Server mod_proxy_ajp Cross Thread/Session Information Disclosure
9257| [52413] Blue Coat ProxySG Transparent Interception Mode HTTP Host Header Dependancy Media Access Control Bypass
9258| [52412] Ziproxy Transparent Interception Mode HTTP Host Header Dependancy Media Access Control Bypass
9259| [48528] CCProxy HTTP Proxy CONNECT Request Handling Remote Overflow
9260| [47512] HTTP Anti Virus Proxy (HAVP) Infinite Loop Connection Saturation DoS
9261| [47474] Apache HTTP Server mod_proxy_ftp Directory Component Wildcard Character XSS
9262| [46085] Apache HTTP Server mod_proxy ap_proxy_http_process_response() Function Interim Response Forwarding Remote DoS
9263| [44135] Nortel VPN Gateway Malformed HTTP Request SSL Proxy Remote DoS
9264| [44132] Nortel iSD-SSL Malformed HTTP Request SSL Proxy Remote DoS
9265| [43259] Apache HTTP Server on Windows mod_proxy_balancer URL Handling Remote Memory Corruption
9266| [42937] Apache HTTP Server mod_proxy_balancer balancer-manager Unspecified CSRF
9267| [42214] Apache HTTP Server mod_proxy_ftp UTF-7 Encoded XSS
9268| [42122] Kerio WinRoute Firewall Proxy Server Unspecified HTTP Fallback
9269| [41862] DeleGate HTTP Cache Proxy Unspecified DoS
9270| [40264] Apache HTTP Server mod_proxy_balancer balancer_handler Function bb Variable Remote DoS
9271| [40263] Apache HTTP Server mod_proxy_balancer balancer-manager Multiple Parameter XSS
9272| [39291] ELinks https Proxy CONNECT Request Cleartext Information Disclosure
9273| [37345] Astaro Security Gateway (ASG) HTTP Proxy Unspecified DoS
9274| [37051] Apache HTTP Server mod_proxy modules/proxy/proxy_util.c Crafted Header Remote DoS
9275| [36980] 3Proxy HTTP Redirection Unspecified DoS
9276| [36074] BEA WebLogic HttpClusterServlet / HttpProxyServlet SecureProxy Admin Functionality Access
9277| [35237] 3Proxy HTTP Proxy Crafted Transparent Request Remote Overflow
9278| [33097] Blue Coat WinProxy HTTP CONNECT Request Overflow
9279| [26300] Mozilla Multiple Products via Proxy Server HTTP Response Smuggling
9280| [26008] PHPGallue Proxy Cache HTTP Header Information Disclosure
9281| [25565] phpBB usercp_avatar.php Arbitrary HTTP Proxy
9282| [22876] HTTP Anti Virus Proxy Multiple AV Scanner Failure
9283| [22853] Blue Coat ProxySG SGOS HTTP Proxy Arbitrary Port Connection
9284| [22237] Blue Coat WinProxy HTTP Request Overflow DoS
9285| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
9286| [19008] Simpleproxy HTTP Proxy Reply Remote Format String
9287| [18284] Netquery HTTP GET Request Panel Unauthorized Proxy
9288| [16388] Mozilla with Proxy HTTP Header Arbitrary Cookie Disclosure
9289| [16082] Apple Mac OS X Server HTTP Proxy Unrestricted Access
9290| [16014] IBM Web Traffic Express Caching Proxy Server HTTP GET Request XSS
9291| [14573] HTTP Anti Virus Proxy Archive Scanning Failure
9292| [14270] Sun Java JRE HTTP Proxy Java Applet Session Hijack
9293| [14155] BitlBee HTTP Proxy Support Unspecified Security Issue
9294| [12558] Apache HTTP Server IPv6 FTP Proxy Socket Failure DoS
9295| [11593] CCProxy Logging Component HTTP GET Request Remote Overflow
9296| [9742] Apache HTTP Server mod_ssl char_buffer_read Function Reverse Proxy DoS
9297| [9688] Apache HTTP Server mod_proxy Malformed FTP Command DoS
9298| [7929] Apache HTTP Server mod_ssl ssl_engine_log.c mod_proxy Hook Function Remote Format String
9299| [7714] AnomicHTTPProxy Invalid HTTP Command Proxy Localhost Block
9300| [7713] AnomicHTTPProxy Administration Password Dementia
9301| [7709] AnomicHTTPProxy Double Dot Arbitrary File Access
9302| [6839] Apache HTTP Server mod_proxy Content-Length Overflow
9303| [6804] Avirt Gateway/Gateway Suite/SOHO HTTP Proxy Overflow
9304| [6187] Trend Micro InterScan VirusWall HTTP CONNECT Proxying
9305| [6162] Trend Micro InterScan VirusWall HTTP Proxy Content Scanning Circumvention
9306| [4433] Check Point FireWall-1 HTTP Proxy Traffic Bypass
9307| [4366] Symantec Personal Firewalls HTTP Proxy Remote Overflow
9308| [4028] PSOProxy Long HTTP Request Overflow
9309| [4015] Jigsaw HTTP Proxy Error Page XSS
9310| [3732] Gaim HTTP Proxy Connect Overflow
9311| [3723] ProxyNow! HTTP Request Overflow
9312| [3718] Finjan SurfinGate Proxy FHTTP Command Admin Functions Authentication Bypass
9313| [2764] Plug and Play Web Server Proxy Service HTTP Request Handling DoS
9314| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
9315| [1429] SapporoWorks WinProxy Malformed HTTP GET Request DoS
9316| [1336] CProxy SP2 Long HTTP Request DoS
9317| [787] Compaq Web-enabled Management Software HTTP Server Arbitrary Traffic Proxy
9318|_
9319113/tcp closed ident conn-refused
9320139/tcp closed netbios-ssn conn-refused
9321443/tcp open ssl syn-ack Microsoft SChannel TLS
9322| fingerprint-strings:
9323| TLSSessionReq:
9324| DigiCert Inc1'0%
9325| DigiCert SHA2 Secure Server CA0
9326| 180806000000Z
9327| 200810120000Z0z1
9328| Riyadh1604
9329| -Bureau of Experts At The Council of Ministers1
9330| *.boe.gov.sa0
9331| /dr4
9332| jin}.
9333| R\x20n
9334| MB0#
9335| *.boe.gov.sa
9336| boe.gov.sa0
9337| d0b0/
9338| )http://crl3.digicert.com/ssca-sha2-g6.crl0/
9339|_ )http:
9340| vulscan: VulDB - https://vuldb.com:
9341| [79184] Microsoft Windows up to Vista TLS Schannel spoofing
9342| [114386] libcURL up to 7.30.0 on WinCE lib/vtls/schannel.c verify_certificate Certificate memory corruption
9343| [114385] libcURL up to 7.30.0 on WinCE lib/vtls/schannel.c verify_certificate weak authentication
9344| [87168] Microsoft .NET Framework up to 4.6.1 TLS/SSL information disclosure
9345| [75327] Microsoft Windows up to Vista SP2 Schannel weak encryption
9346| [68183] Microsoft Windows up to Vista Schannel memory corruption
9347| [13490] Microsoft Internet Explorer up to 11 TLS Certificate information disclosure
9348| [7258] Microsoft Windows up to 8/Server 2012 SSL/TLS race condition
9349| [4431] Microsoft Windows SSL/TLS IV memory corruption
9350| [4194] Microsoft Windows Vista/7/Server 2008 SChannel Client Certificate Request denial of service
9351| [4161] Microsoft Windows TLS/SSL Session TLS/SSL Session Renegotiation cross site scripting
9352|
9353| MITRE CVE - https://cve.mitre.org:
9354| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
9355| [CVE-2010-2566] The Secure Channel (aka SChannel) security package in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, does not properly validate certificate request messages from TLS and SSL servers, which allows remote servers to execute arbitrary code via a crafted SSL response, aka "SChannel Malformed Certificate Request Remote Code Execution Vulnerability."
9356| [CVE-2009-0085] The Secure Channel (aka SChannel) authentication component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, when certificate authentication is used, does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages, which allows remote attackers to spoof authentication by crafting a TLS packet based on knowledge of the certificate but not the private key, aka "SChannel Spoofing Vulnerability."
9357| [CVE-2013-0013] The SSL provider component in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle encrypted packets, which allows man-in-the-middle attackers to conduct SSLv2 downgrade attacks against (1) SSLv3 sessions or (2) TLS sessions by intercepting handshakes and injecting content, aka "Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability."
9358| [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
9359| [CVE-2012-1870] The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."
9360| [CVE-2010-3140] Untrusted search path vulnerability in Microsoft Windows Internet Communication Settings on Windows XP SP3 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll that is located in the same folder as an ISP file.
9361| [CVE-2010-0025] The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2000 SP3, does not properly allocate memory for SMTP command replies, which allows remote attackers to read fragments of e-mail messages by sending a series of invalid commands and then sending a STARTTLS command, aka "SMTP Memory Allocation Vulnerability."
9362| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
9363| [CVE-2007-5633] Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \Device\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.
9364| [CVE-2007-2593] The Terminal Server in Microsoft Windows 2003 Server, when using TLS, allows remote attackers to bypass SSL and self-signed certificate requirements, downgrade the server security, and possibly conduct man-in-the-middle attacks via unspecified vectors, as demonstrated using the Remote Desktop Protocol (RDP) 6.0 client. NOTE: a third party claims that the vendor may have fixed this in approximately 2006.
9365| [CVE-2007-2218] Unspecified vulnerability in the Windows Schannel Security Package for Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, allows remote servers to execute arbitrary code or cause a denial of service via crafted digital signatures that are processed during an SSL handshake.
9366| [CVE-2005-1794] Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks.
9367| [CVE-2002-1824] Microsoft Internet Explorer 6.0, when handling an expired CA-CERT in a webserver's certificate chain during a SSL/TLS handshake, does not prompt the user before searching for and finding a newer certificate, which may allow attackers to perform a man-in-the-middle attack. NOTE: it is not clear whether this poses a vulnerability.
9368|
9369| SecurityFocus - https://www.securityfocus.com/bid/:
9370| [43780] Microsoft Windows SChannel TLSv1 Remote Denial of Service Vulnerability
9371| [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
9372| [77484] Microsoft Windows SChannel CVE-2015-6112 Man in the Middle Security Bypass Vulnerability
9373| [57144] Microsoft Windows SSLv3/TLS CVE-2013-0013 Security Bypass Vulnerability
9374| [54304] Microsoft Windows TLS Protocol CBC Mode Information Disclosure Vulnerability
9375| [42246] Microsoft Windows SChannel Certificate Request Remote Code Execution Vulnerability
9376| [34015] Microsoft Windows SChannel Authentication Spoofing Vulnerability
9377| [24416] Microsoft Windows SChannel Security Remote Code Execution Vulnerability
9378| [5274] Microsoft Outlook Express SMTP Over TLS Information Disclosure Vulnerability
9379|
9380| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9381| [80860] Microsoft Windows SSL/TLS security bypass
9382| [76701] Microsoft Windows TLS information disclosure
9383| [63787] Microsoft Windows Internet Communication Settings dynamic-linked library (schannel.dll) code execution
9384| [62148] Microsoft Windows SChannel denial of service
9385| [60718] Microsoft Windows SChannel code execution
9386| [48307] Microsoft Windows SChannel certificate spoofing
9387| [34636] Microsoft Windows Schannel code execution
9388| [21954] Microsoft Windows Remote Desktop Protocol mstlsapi.dll Man-in-the-Middle
9389| [86256] Microsoft Windows Knowledge Base Article 2876063 update is not installed
9390| [86097] Microsoft Windows Knowledge Base Article 2859537 update is not installed
9391| [86096] Microsoft Windows NTVDM privilege escalation 3
9392| [86095] Microsoft Windows NTVDM privilege escalation 2
9393| [86094] Microsoft Windows NTVDM privilege escalation 1
9394| [86091] Microsoft Windows Knowledge Base Article 2868623 update is not installed
9395| [86090] Microsoft Windows ICMPv6 denial of service
9396| [86089] Microsoft Windows Knowledge Base Article 2862772 update is not installed
9397| [86088] Microsoft Internet Explorer CVE-2013-3199 code execution
9398| [86087] Microsoft Internet Explorer CVE-2013-3194 code execution
9399| [86086] Microsoft Internet Explorer CVE-2013-3193 code execution
9400| [86085] Microsoft Internet Explorer CVE-2013-3191 code execution
9401| [86084] Microsoft Internet Explorer CVE-2013-3190 code execution
9402| [86083] Microsoft Internet Explorer CVE-2013-3189 code execution
9403| [86082] Microsoft Internet Explorer CVE-2013-3188 code execution
9404| [86081] Microsoft Internet Explorer CVE-2013-3187 code execution
9405| [86080] Microsoft Internet Explorer CVE-2013-3184 code execution
9406| [86079] Microsoft Internet Explorer EUC-JP information disclosure
9407| [86078] Microsoft Internet Explorer integrity level privilege escalation
9408| [86075] Microsoft Windows Knowledge Base Article 2850869 update is not installed
9409| [86074] Microsoft Windows Unicode code execution
9410| [86073] Microsoft Windows Knowledge Base Article 2873872 update is not installed
9411| [86072] Microsoft Windows Active Directory Federation Services information disclosure
9412| [86070] Microsoft Windows Knowledge Base Article 2849568 update is not installed
9413| [86069] Microsoft Windows Windows NAT Driver denial of service
9414| [85802] Microsoft PowerPoint denial of service
9415| [85801] Microsoft Windows Movie Maker .wav denial of service
9416| [85762] Microsoft Internet Explorer sandbox bypass
9417| [85245] Microsoft Windows Knowledge Base Article 2848295 update is not installed
9418| [85244] Microsoft Windows Knowledge Base Article 2847927 update is not installed
9419| [85243] Microsoft Windows Knowledge Base Article 2861561 update is not installed
9420| [85242] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
9421| [85241] Microsoft .NET Framework and Microsoft Silverlight code execution
9422| [85240] Microsoft .NET Framework and Microsoft Silverlight code execution
9423| [85239] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
9424| [85238] Microsoft .NET Framework and Microsoft Silverlight privilege escalation
9425| [85237] Microsoft .NET Framework and Microsoft Silverlight code execution
9426| [85236] Microsoft Windows Knowledge Base Article 2850851 update is not installed
9427| [85234] Microsoft Windows privilege escalation
9428| [85233] Microsoft Windows denial of service
9429| [85232] Microsoft Windows privilege escalation
9430| [85231] Microsoft Windows TrueType font file code execution
9431| [85230] Microsoft Windows privilege escalation
9432| [85229] Microsoft Windows privilege escalation
9433| [85228] Microsoft Windows privilege escalation
9434| [85227] Microsoft Windows Knowledge Base Article 2847883 update is not installed
9435| [85226] Microsoft Windows Media Format Runtime code execution
9436| [85224] Microsoft Windows DefenderCVE-2013-3154 privilege escalation
9437| [85223] Microsoft Windows Knowledge Base Article 2846071 update is not installed
9438| [85222] Microsoft Internet Explorer Shift JIS information disclosure
9439| [85221] Microsoft Internet Explorer CVE-2013-3164 code execution
9440| [85220] Microsoft Internet Explorer CVE-2013-3163 code execution
9441| [85219] Microsoft Internet Explorer CVE-2013-3162 code execution
9442| [85218] Microsoft Internet Explorer CVE-2013-3161 code execution
9443| [85217] Microsoft Internet Explorer CVE-2013-3153 code execution
9444| [85216] Microsoft Internet Explorer CVE-2013-3152 code execution
9445| [85215] Microsoft Internet Explorer CVE-2013-3151 code execution
9446| [85214] Microsoft Internet Explorer CVE-2013-3150 code execution
9447| [85213] Microsoft Internet Explorer CVE-2013-3149 code execution
9448| [85212] Microsoft Internet Explorer CVE-2013-3148 code execution
9449| [85211] Microsoft Internet Explorer CVE-2013-3147 code execution
9450| [85210] Microsoft Internet Explorer CVE-2013-3146 code execution
9451| [85209] Microsoft Internet Explorer CVE-2013-3145 code execution
9452| [85208] Microsoft Internet Explorer CVE-2013-3144 code execution
9453| [85207] Microsoft Internet Explorer CVE-2013-3143 code execution
9454| [85206] Microsoft Internet Explorer CVE-2013-3115 code execution
9455| [85205] Microsoft Windows Knowledge Base Article 2845187 update is not installed
9456| [85204] Microsoft DirectShow code execution
9457| [85133] Microsoft Outlook phishing
9458| [84965] Microsoft Sharepoint Online cross site scripting
9459| [84916] Microsoft Internet Explorer ASLR information disclosure
9460| [84714] GnuTLS denial of service
9461| [84691] Microsoft Internet Explorer code execution
9462| [84690] Microsoft Internet Explorer code execution
9463| [84647] telepathy-gabble TLS security bypass
9464| [84621] Microsoft Windows Knowledge Base Article 2845690 update is not installed
9465| [84620] Microsoft Windows kernel denial of service
9466| [84619] Microsoft Windows Knowledge Base Article 2839894 update is not installed
9467| [84618] Microsoft Windows Print Spooler privilege escalation
9468| [84617] Microsoft Windows Knowledge Base Article 2839571 update is not installed
9469| [84616] Microsoft Office code execution
9470| [84615] Microsoft Windows Knowledge Base Article 2839229 update is not installed
9471| [84614] Microsoft Windows kernel information disclosure
9472| [84613] Microsoft Windows Knowledge Base Article 2838727 update is not installed
9473| [84612] Microsoft Internet Explorer code execution
9474| [84611] Microsoft Internet Explorer code execution
9475| [84610] Microsoft Internet Explorer code execution
9476| [84609] Microsoft Internet Explorer code execution
9477| [84608] Microsoft Internet Explorer code execution
9478| [84607] Microsoft Internet Explorer code execution
9479| [84606] Microsoft Internet Explorer code execution
9480| [84605] Microsoft Internet Explorer code execution
9481| [84604] Microsoft Internet Explorer code execution
9482| [84603] Microsoft Internet Explorer code execution
9483| [84602] Microsoft Internet Explorer code execution
9484| [84601] Microsoft Internet Explorer code execution
9485| [84599] Microsoft Internet Explorer code execution
9486| [84598] Microsoft Internet Explorer code execution
9487| [84597] Microsoft Internet Explorer code execution
9488| [84596] Microsoft Internet Explorer code execution
9489| [84595] Microsoft Internet Explorer code execution
9490| [84571] Microsoft Windows denial of service
9491| [84546] Microsoft Windows Media Player .wav denial of service
9492| [84391] Microsoft Windows win32k.sys privilege escalation
9493| [84267] Microsoft Windows Update file detected
9494| [84266] Multiple Microsoft products code execution
9495| [84156] Microsoft Windows Knowledge Base Article 2847204 update is not installed
9496| [84019] Microsoft Internet Explorer MSXML information disclosure
9497| [84011] Microsoft Security Essentials privilege escalation
9498| [84007] Microsoft Internet Explorer CGenericElement object code execution
9499| [83995] Microsoft Internet Explorer code execution
9500| [83912] Microsoft Windows Knowledge Base Article 2829254 update is not installed
9501| [83911] Microsoft Windows denial of service
9502| [83910] Microsoft Windows Knowledge Base Article 2829530 update is not installed
9503| [83909] Microsoft Internet Explorer code execution
9504| [83908] Microsoft Internet Explorer code execution
9505| [83907] Microsoft Internet Explorer code execution
9506| [83906] Microsoft Internet Explorer code execution
9507| [83905] Microsoft Internet Explorer code execution
9508| [83904] Microsoft Internet Explorer code execution
9509| [83903] Microsoft Internet Explorer code execution
9510| [83902] Microsoft Internet Explorer code execution
9511| [83901] Microsoft Internet Explorer code execution
9512| [83900] Microsoft Internet Explorer code execution
9513| [83899] Microsoft Internet Explorer information disclosure
9514| [83898] Microsoft Windows Knowledge Base Article 2830397 update is not installed
9515| [83897] Microsoft Publisher buffer underflow
9516| [83896] Microsoft Publisher code execution
9517| [83895] Microsoft Publisher code execution
9518| [83894] Microsoft Publisher code execution
9519| [83893] Microsoft Publisher code execution
9520| [83892] Microsoft Publisher code execution
9521| [83891] Microsoft Publisher buffer overflow
9522| [83890] Microsoft Publisher code execution
9523| [83889] Microsoft Publisher code execution
9524| [83888] Microsoft Publisher integer overflow
9525| [83887] Microsoft Publisher code execution
9526| [83886] Microsoft Windows Knowledge Base Article 2830399 update is not installed
9527| [83885] Microsoft Word code execution
9528| [83884] Microsoft Windows Knowledge Base Article 2834692 update is not installed
9529| [83883] Microsoft Visio information disclosure
9530| [83882] Microsoft Windows Knowledge Base Article 2834695 update is not installed
9531| [83881] Microsoft Lync code execution
9532| [83880] Microsoft Windows Knowledge Base Article 2836440 update is not installed
9533| [83879] Microsoft .NET Framework security bypass
9534| [83878] Microsoft .NET Framework spoofing
9535| [83876] Microsoft Windows Knowledge Base Article 2840221 update is not installed
9536| [83875] Microsoft Windows privilege escalation
9537| [83874] Microsoft Windows privilege escalation
9538| [83873] Microsoft Windows privilege escalation
9539| [83192] Microsoft Windows Knowledge Base Article 2817183 update is not installed
9540| [83191] Microsoft Internet Explorer code execution
9541| [83190] Microsoft Internet Explorer code execution
9542| [83100] Microsoft Windows Knowledge Base Article 2830914 update is not installed
9543| [83099] Microsoft Windows denial of service
9544| [83098] Microsoft Windows Knowledge Base Article 2829996 update is not installed
9545| [83097] Microsoft Windows privilege escalation
9546| [83096] Microsoft Windows privilege escalation
9547| [83095] Microsoft Windows denial of service
9548| [83094] Microsoft Windows privilege escalation
9549| [83093] Microsoft Windows Knowledge Base Article 2828223 update is not installed
9550| [83092] Microsoft Remote Desktop ActiveX control code execution
9551| [83091] Microsoft Windows Knowledge Base Article 2813170 update is not installed
9552| [83090] Microsoft Windows privilege escalation
9553| [83089] Microsoft Windows privilege escalation
9554| [83088] Microsoft Windows Knowledge Base Article 2827663 update is not installed
9555| [83087] Microsoft SharePoint information disclosure
9556| [83086] Microsoft Windows Knowledge Base Article 2823482 update is not installed
9557| [83085] Microsoft Antimalware Client privilege escalation
9558| [83084] Microsoft Windows Knowledge Base Article 2821818 update is not installed
9559| [83083] Microsoft SharePoint and Microsoft Office Web Apps privilege escalation
9560| [83082] Microsoft Windows Knowledge Base Article 2820917 update is not installed
9561| [83081] Microsoft Windows Client/Server Run-time Subsystem privilege escalation
9562| [83063] Microsoft Windows Modern Mail spoofing
9563| [83009] IBM Tivoli Directory Server SSL/TLS denial of service
9564| [82884] TLS protocol RC4 information disclosure
9565| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
9566| [82775] Microsoft Windows kernel privilege escalation
9567| [82774] Microsoft Windows ASLR and DEP security bypass
9568| [82772] Microsoft Windows ASLR security bypass
9569| [82771] Microsoft Internet Explorer sandbox denial of service
9570| [82769] Microsoft Windows TTF denial of service
9571| [82731] Microsoft Internet Explorer CTreeNode code execution
9572| [82640] Wireshark DTLS dissector denial of service
9573| [82600] Microsoft Windows Knowledge Base Article 2813707 update is not installed
9574| [82599] Microsoft Windows Live Essentials information disclosure
9575| [82523] RSA Authentication Agent for Microsoft Windows Quick Pin security bypass
9576| [82443] Microsoft Office code execution
9577| [82424] Microsoft Windows Knowledge Base Article 2814124 update is not installed
9578| [82423] Microsoft Silverlight code execution
9579| [82422] Microsoft Windows Knowledge Base Article 2780176 update is not installed
9580| [82421] Microsoft SharePoint W3WP denial of service
9581| [82420] Microsoft SharePoint input privilege escalation
9582| [82419] Microsoft SharePoint JavaScript privilege escalation
9583| [82418] Microsoft SharePoint Callback privilege escalation
9584| [82417] Microsoft Windows Knowledge Base Article 2801261 update is not installed
9585| [82416] Microsoft Visio Viewer memory code execution
9586| [82415] Microsoft Windows Knowledge Base Article 2807986 update is not installed
9587| [82414] Microsoft Windows USB device privilege escalation
9588| [82413] Microsoft Windows USB device privilege escalation
9589| [82412] Microsoft Windows USB device privilege escalation
9590| [82410] Microsoft Windows Knowledge Base Article 2809289 update is not installed
9591| [82409] Microsoft Internet Explorer removeChild code execution
9592| [82408] Microsoft Internet Explorer onBeforeCopy code execution
9593| [82407] Microsoft Internet Explorer GetMarkupPtr code execution
9594| [82406] Microsoft Internet Explorer CElement code execution
9595| [82405] Microsoft Internet Explorer CCaret code execution
9596| [82404] Microsoft Internet Explorer CMarkupBehaviorContext code execution
9597| [82403] Microsoft Internet Explorer saveHistory code execution
9598| [82402] Microsoft Internet Explorer OnResize code execution
9599| [82401] Microsoft Windows Knowledge Base Article 2813682 update is not installed
9600| [82400] Microsoft Office for Mac information disclosure
9601| [82399] Microsoft Windows Knowledge Base Article 2816264 update is not installed
9602| [82398] Microsoft Office OneNote information disclosure
9603| [82367] MDaemon STARTTLS command execution
9604| [82089] Microsoft Windows ZwSetInformationProcess() denial of service
9605| [81912] Network Security Services TLS information disclosure
9606| [81911] GnuTLS CBC information disclosure
9607| [81906] PolarSSL TLS denial of service
9608| [81905] PeerSec MatrixSSL TLS information disclosure
9609| [81900] Microsoft Skype GiftCards cross-site scripting
9610| [81859] Microsoft Windows Knowledge Base Article 2802968 update is not installed
9611| [81858] Microsoft Windows OLE code execution
9612| [81857] Microsoft Windows Knowledge Base Article 2809279 update is not installed
9613| [81728] Microsoft Internet Explorer SRC information disclosure
9614| [81706] Microsoft Internet Explorer SSL lock spoofng
9615| [81705] Microsoft Internet Explorer TCP sessions information disclosure
9616| [81683] Microsoft Windows Knowledge Base Article 2780091 update is not installed
9617| [81682] Microsoft Windows .MPG code execution
9618| [81681] Microsoft Windows Knowledge Base Article 2784242 update is not installed
9619| [81680] Microsoft Windows Knowledge Base Article 2790113 update is not installed
9620| [81679] Microsoft Windows Client/Server Run-time Subsystem memory privilege escalation
9621| [81678] Microsoft Windows Knowledge Base Article 2790655 update is not installed
9622| [81677] Microsoft Windows TCP/IP sequence denial of service
9623| [81676] Microsoft Windows Knowledge Base Article 2790978 update is not installed
9624| [81675] Microsoft Windows NFS server denial of service
9625| [81674] Microsoft Windows Knowledge Base Article 2797052 update is not installed
9626| [81673] Microsoft Windows Vector Markup Language code execution
9627| [81672] Microsoft Windows Knowledge Base Article 2799494 update is not installed
9628| [81671] Microsoft Windows kernel privilege escalation
9629| [81670] Microsoft Windows kernel privilege escalation
9630| [81669] Microsoft Windows kernel privilege escalation
9631| [81668] Microsoft Windows Knowledge Base Article 2800277 update is not installed
9632| [81667] Microsoft .NET Framework WinForms privilege escalation
9633| [81666] Microsoft Windows Knowledge Base Article 2778344 update is not installed
9634| [81665] Microsoft Windows CVE-2013-1277 privilege escalation
9635| [81664] Microsoft Windows CVE-2013-1276 privilege escalation
9636| [81663] Microsoft Windows CVE-2013-1275 privilege escalation
9637| [81662] Microsoft Windows CVE-2013-1274 privilege escalation
9638| [81661] Microsoft Windows CVE-2013-1273 privilege escalation
9639| [81660] Microsoft Windows CVE-2013-1272 privilege escalation
9640| [81659] Microsoft Windows CVE-2013-1271 privilege escalation
9641| [81658] Microsoft Windows CVE-2013-1270 privilege escalation
9642| [81657] Microsoft Windows CVE-2013-1269 privilege escalation
9643| [81656] Microsoft Windows CVE-2013-1268 privilege escalation
9644| [81655] Microsoft Windows CVE-2013-1267 privilege escalation
9645| [81654] Microsoft Windows CVE-2013-1266 privilege escalation
9646| [81653] Microsoft Windows CVE-2013-1265 privilege escalation
9647| [81652] Microsoft Windows CVE-2013-1264 privilege escalation
9648| [81651] Microsoft Windows CVE-2013-1263 privilege escalation
9649| [81650] Microsoft Windows CVE-2013-1262 privilege escalation
9650| [81649] Microsoft Windows CVE-2013-1261 privilege escalation
9651| [81648] Microsoft Windows CVE-2013-1260 privilege escalation
9652| [81647] Microsoft Windows CVE-2013-1259 privilege escalation
9653| [81646] Microsoft Windows CVE-2013-1258 privilege escalation
9654| [81645] Microsoft Windows CVE-2013-1257 privilege escalation
9655| [81644] Microsoft Windows CVE-2013-1256 privilege escalation
9656| [81643] Microsoft Windows CVE-2013-1255 privilege escalation
9657| [81642] Microsoft Windows CVE-2013-1254 privilege escalation
9658| [81641] Microsoft Windows CVE-2013-1253 privilege escalation
9659| [81640] Microsoft Windows CVE-2013-1252 privilege escalation
9660| [81639] Microsoft Windows CVE-2013-1251 privilege escalation
9661| [81638] Microsoft Windows CVE-2013-1250 privilege escalation
9662| [81637] Microsoft Windows CVE-2013-1249 privilege escalation
9663| [81636] Microsoft Windows CVE-2013-1248 privilege escalation
9664| [81634] Microsoft Windows Knowledge Base Article 2792100 update is not installed
9665| [81633] Microsoft Internet Explorer CObjectElement code execution
9666| [81631] Microsoft Internet Explorer InsertElement code execution
9667| [81630] Microsoft Internet Explorer SLayoutRun code execution
9668| [81629] Microsoft Internet Explorer pasteHTML code execution
9669| [81628] Microsoft Internet Explorer CDispNode code execution
9670| [81627] Microsoft Internet Explorer LsGetTrailInfo code execution
9671| [81626] Microsoft Internet Explorer vtable code execution
9672| [81625] Microsoft Internet Explorer CMarkup code execution
9673| [81624] Microsoft Internet Explorer COmWindowProxy code execution
9674| [81623] Microsoft Internet Explorer SetCapture code execution
9675| [81622] Microsoft Internet Explorer Shift JIS information disclosure
9676| [81617] Wireshark DTLS dissector denial of service
9677| [81411] tls-extra library for Haskell SSL spoofing
9678| [81339] Microsoft Windows Knowledge Base Article 2799329 update is not installed
9679| [81212] Microsoft Lync User-Agent cross-site scripting
9680| [80918] Microsoft Windows digital certificate spoofing
9681| [80885] Microsoft Internet Explorer CDwnBindInfo code execution
9682| [80875] Microsoft Windows Knowledge Base Article 2756145 update is not installed
9683| [80874] Microsoft Windows XML code execution
9684| [80873] Microsoft Windows XML content code execution
9685| [80872] Microsoft Windows Knowledge Base Article 2769324 update is not installed
9686| [80871] Microsoft .NET Framework permission privilege escalation
9687| [80870] Microsoft .NET Framework S.D.S.P. privilege escalation
9688| [80869] Microsoft .NET Framework Windows Forms privilege escalation
9689| [80868] Microsoft .NET Framework information disclosure
9690| [80867] Microsoft Windows Knowledge Base Article 2769327 update is not installed
9691| [80866] Microsoft .NET Framework OData denial of service
9692| [80865] Microsoft Windows Knowledge Base Article 2769369 update is not installed
9693| [80864] Microsoft Windows print spooler code execution
9694| [80863] Microsoft Windows Knowledge Base Article 2778930 update is not installed
9695| [80862] Microsoft Windows broadcast privilege escalation
9696| [80861] Microsoft Windows Knowledge Base Article 2785220 update is not installed
9697| [80750] Microsoft Internet Explorer denial of service
9698| [80647] Microsoft Internet Explorer cursor information disclosure
9699| [80523] Microsoft Exchange Server RSS feeds denial of service
9700| [80488] radsecproxy DTLS security bypass
9701| [80365] Microsoft Windows Knowledge Base Article 2761465 update is not installed
9702| [80364] Microsoft Internet Explorer improper ref counting code execution
9703| [80363] "Microsoft Internet Explorer CMarkup code execution"
9704| [80362] Microsoft Internet Explorer InjectHTMLStream code execution
9705| [80360] Microsoft Windows Knowledge Base Article 2765809 update is not installed
9706| [80359] Microsoft Windows IPHTTPS security bypass
9707| [80358] Microsoft Windows Knowledge Base Article 2770660 update is not installed
9708| [80357] Microsoft Windows DirectPlay buffer overflow
9709| [80356] Microsoft Windows Knowledge Base Article 2780642 update is not installed
9710| [80355] Microsoft Word RTF code execution
9711| [80352] Microsoft Windows Knowledge Base Article 2783534 update is not installed
9712| [80351] Microsoft Windows TrueType Fonts files code execution
9713| [80350] Microsoft Windows OpenType Font code execution
9714| [80349] Microsoft Windows Knowledge Base Article 2784126 update is not installed
9715| [80310] Microsoft Internet Explorer CHTML code execution
9716| [80149] Microsoft Office OneNote code execution
9717| [79998] Microsoft Excel file code execution
9718| [79997] Microsoft Visio code execution
9719| [79996] Microsoft Publisher code execution
9720| [79990] Microsoft Excel xls code execution
9721| [79749] Microsoft Internet Explorer multiple unspecified code execution
9722| [79748] Microsoft Internet Explorer memory code execution
9723| [79693] Microsoft Windows Knowledge Base Article 2745030 update is not installed
9724| [79692] Microsoft .NET Framework reflection privilege escalation
9725| [79691] Microsoft .NET Framework Web proxy code execution
9726| [79690] Microsoft .NET Framework DLL code execution
9727| [79689] Microsoft .NET Framework output information disclosure
9728| [79688] Microsoft .NET Framework reflection privilege escalation
9729| [79687] Microsoft Windows Knowledge Base Article 2761451 update is not installed
9730| [79686] Microsoft Internet Explorer CTreeNode code execution
9731| [79685] Microsoft Internet Explorer CTreePos code execution
9732| [79684] Microsoft Internet Explorer CFormElement code execution
9733| [79683] Microsoft Windows Knowledge Base Article 2761226 update is not installed
9734| [79682] Microsoft Windows font code execution
9735| [79681] Microsoft Windows kernel privilege escalation
9736| [79680] Microsoft Windows kernel privilege escalation
9737| [79679] Microsoft Windows Knowledge Base Article 2758857 update is not installed
9738| [79678] Microsoft Windows filenames code execution
9739| [79677] Microsoft Windows Knowledge Base Article 2727528 update is not installed
9740| [79676] Microsoft Windows Briefcase integer overflow
9741| [79675] Microsoft Windows Briefcase integer underflow
9742| [79674] Microsoft Excel data structure buffer overflow
9743| [79651] Microsoft Paint .bmp denial of service
9744| [79650] Microsoft Excel code execution
9745| [79649] Microsoft Office Publisher denial of service
9746| [79648] Microsoft Windows Help Viewer denial of service
9747| [79614] Microsoft Internet Explorer scrollIntoView code execution
9748| [79599] Microsoft Office Picture Manager code execution
9749| [79590] Microsoft Word .doc buffer overflow
9750| [79552] ssmtp TLS certificate spoofing
9751| [79492] Microsoft Internet Explorer filter cross-site scripting
9752| [79479] Microsoft Windows Media Player .avi denial of service
9753| [79251] Microsoft Internet Explorer CPasteCommand code execution
9754| [79231] EMC NetWorker Module for Microsoft Applications (NMM) administrator credential disclosure
9755| [79230] EMC NetWorker Module for Microsoft Applications (NMM) communication channel code execution
9756| [79198] Microsoft Excel code execution
9757| [79124] Microsoft Windows IKE privilege escalation
9758| [79104] hostapd EAP-TLS message denial of service
9759| [78864] Microsoft Windows Knowledge Base Article 2754670 update is not installed
9760| [78863] Microsoft Works RTF code execution
9761| [78862] Microsoft Windows Knowledge Base Article 2743555 update is not installed
9762| [78861] Microsoft Windows Kerberos denial of service
9763| [78858] Microsoft Windows Knowledge Base Article 2754849 update is not installed
9764| [78857] Microsoft SQL Server cross-site scripting
9765| [78856] Microsoft Windows Knowledge Base Article 2724197 update is not installed
9766| [78855] Microsoft Windows kernel privilege escalation
9767| [78853] Microsoft Windows Knowledge Base Article 2741517 update is not installed
9768| [78852] Microsoft Lync and Microsoft SharePoint privilege escalation
9769| [78851] Microsoft Windows Knowledge Base Article 2742319 update is not installed
9770| [78850] Microsoft Office RTF fiiles code execution
9771| [78849] Microsoft Word PAPX code execution
9772| [78848] Microsoft Windows Knowledge Base Article 2742321 update is not installed
9773| [78807] TLS protocol information disclosure
9774| [78804] SPDY TLS encrypted data information disclosure
9775| [78760] Microsoft Windows Knowledge Base Article 2744842 update is not installed
9776| [78759] Microsoft Internet Explorer cloneNode() code execution
9777| [78758] Microsoft Internet Explorer Layout object code execution
9778| [78757] Microsoft Internet Explorer Event Listener code execution
9779| [78756] Microsoft Internet Explorer onMove() code execution
9780| [78672] Cisco IOS SSL VPN DTLS enabled denial of service
9781| [78670] Cisco IOS SSL VPN DTLS denial of service
9782| [78620] Microsoft Windows Phone 7 domain name spoofing
9783| [78598] Microsoft Internet Explorer use-after-free code execution
9784| [78408] FreeRADIUS cbtls_verify() buffer overflow
9785| [78077] Microsoft Windows Knowledge Base Article 2741528 update is not installed
9786| [78076] Microsoft System Center Configuration Manager cross-site scripting
9787| [78075] Microsoft Windows Knowledge Base Article 2720184 update is not installed
9788| [78074] Microsoft Excel SST Invalid Length code execution
9789| [78073] Microsoft Excel code execution
9790| [78071] Microsoft Windows Knowledge Base Article 2748552 update is not installed
9791| [78070] Microsoft System Center Operations Manager cross-site scripting
9792| [78069] Microsoft System Center Operations Manager cross-site scripting
9793| [77993] Microsoft Indexing Service ActiveX control denial of service
9794| [77919] ISC InterNetNews STARTTLS command execution
9795| [77878] Microsoft MS-CHAP v2 information disclosure
9796| [77512] Microsoft Windows Knowledge Base Article 2740358 update is not installed
9797| [77362] Microsoft Windows Knowledge Base Article 2733918 update is not installed
9798| [77361] Microsoft Visio DXF buffer overflow
9799| [77360] Microsoft Windows Knowledge Base Article 2733829 update is not installed
9800| [77359] Microsoft Internet Information Services FTP information disclosure
9801| [77358] Microsoft Internet Information Services log files information disclosure
9802| [77357] Microsoft Windows Knowledge Base Article 2733594 update is not installed
9803| [77356] Microsoft Windows RAP response packet buffer overflow
9804| [77355] Microsoft Windows RAP response packet buffer overflow
9805| [77354] Microsoft Windows Print Spooler service format string
9806| [77353] Microsoft Windows Remote Administration Protocol denial of service
9807| [77352] Microsoft Windows Knowledge Base Article 2731879 update is not installed
9808| [77351] Microsoft Office CGM code execution
9809| [77350] Microsoft Windows Knowledge Base Article 2731847 update is not installed
9810| [77349] Microsoft Windows memory privilege escalation
9811| [77348] Microsoft Windows Knowledge Base Article 2723135 update is not installed
9812| [77347] Microsoft Windows Remote Desktop Protocol code execution
9813| [77346] Microsoft Windows Knowledge Base Article 2722913 update is not installed
9814| [77345] Microsoft Internet Explorer virtual function table code execution
9815| [77344] Microsoft Internet Explorer null object code execution
9816| [77343] Microsoft Internet Explorer layout memory code execution
9817| [77342] Microsoft Windows Knowledge Base Article 2720573 update is not installed
9818| [77341] Microsoft Windows ActiveX control code execution
9819| [77325] Microsoft Windows Knowledge Base Article 2719584 update is not installed
9820| [77324] Microsoft Visual Studio Team Foundation Server cross-site scripting
9821| [77323] Microsoft Windows Knowledge Base Article 2706045 update is not installed
9822| [77322] Microsoft Windows VBScript and JScript and Microsoft Internet Explorer object integer overflow
9823| [77244] nginx and Microsoft Windows request security bypass
9824| [76808] Microsoft Windows Knowledge Base Article 2721015 update is not installed
9825| [76807] Microsoft Office for Mac privilege escalation
9826| [76743] Microsoft .NET Framework tilde denial of service
9827| [76725] Microsoft Windows Knowledge Base Article 2722479 update is not installed
9828| [76724] Microsoft Windows Knowledge Base Article 2719177 update is not installed
9829| [76723] Microsoft Internet Explorer attribute code execution
9830| [76722] Microsoft Internet Explorer cached code execution
9831| [76721] Microsoft Windows Knowledge Base Article 2718523 update is not installed
9832| [76720] Microsoft Windows hook procedure privilege escalation
9833| [76719] Microsoft Windows keyboard privilege escalation
9834| [76718] Microsoft Windows Knowledge Base Article 2698365 update is not installed
9835| [76717] Microsoft Data Access Components XML code execution
9836| [76716] Microsoft IIS FTP denial of service
9837| [76711] Microsoft Windows Knowledge Base Article 2695502 update is not installed
9838| [76710] Microsoft SharePoint JavaScript cross-site scripting
9839| [76709] Microsoft SharePoint URL spoofing
9840| [76708] Microsoft SharePoint JavaScript cross-site scripting
9841| [76707] Microsoft Windows search scopes information disclosure
9842| [76706] Microsoft SharePoint scriptresx.ashx cross-site scripting
9843| [76704] Microsoft Windows Knowledge Base Article 2691442 update is not installed
9844| [76703] Microsoft Windows file code execution
9845| [76702] Microsoft Windows Knowledge Base Article 2655992 update is not installed
9846| [76664] Microsoft IIS tilde information disclosure
9847| [76223] Microsoft Windows .otf denial of service
9848| [76221] Microsoft Windows XML Core Services code execution
9849| [76185] Microsoft Internet Information Server ASPX information disclosure
9850| [76184] Microsoft Internet Information Server INDEX_ALLOCATION security bypass
9851| [76183] Microsoft Internet Information Server INDEX_ALLOCATION security bypass
9852| [76182] Microsoft Internet Information Server request security bypass
9853| [76026] Microsoft Windows Microsoft Certificate Authority spoofing
9854| [75996] Multiple IBM products GSKit SSL/TLS record layer processing denial of service
9855| [75977] Microsoft WordPad .doc denial of service
9856| [75963] Microsoft Windows Knowledge Base Article 2699988 update is not installed
9857| [75962] Microsoft Internet Explorer Scrolling Events information disclosure
9858| [75961] Microsoft Internet Explorer OnRowsInserted Event code execution
9859| [75960] Microsoft Internet Explorer insertRow code execution
9860| [75959] Microsoft Internet Explorer insertAdjacentText code execution
9861| [75958] Microsoft Internet Explorer OnBeforeDeactivate Event code execution
9862| [75957] Microsoft Internet Explorer Title Element Change code execution
9863| [75956] Microsoft Internet Explorer Col Element code execution
9864| [75955] Microsoft Internet Explorer same id property code execution
9865| [75954] Microsoft Internet Explorer Developer Toolbar code execution
9866| [75953] Microsoft Internet Explorer process memory information disclosure
9867| [75952] Microsoft Internet Explorer EUC-JP character information disclosure
9868| [75950] Microsoft Internet Explorer Center Element code execution
9869| [75949] Microsoft Windows Knowledge Base Article 2707960 update is not installed
9870| [75948] Microsoft Visual Basic for Applications DLL code execution
9871| [75942] Microsoft Windows Knowledge Base Article 2706726 update is not installed
9872| [75941] Microsoft .NET Framework function code execution
9873| [75939] Microsoft Windows Knowledge Base Article 2685939 update is not installed
9874| [75938] Microsoft Windows RDP code execution
9875| [75934] Microsoft Windows Knowledge Base Article 2709162 update is not installed
9876| [75933] Microsoft Windows thread privilege escalation
9877| [75932] Microsoft Windows font privilege escalation
9878| [75931] "Microsoft Windows Clipboard Format Atom Name privilege escalation"
9879| [75930] Microsoft Windows String Atom Class Name privilege escalation
9880| [75929] Microsoft Windows String Atom Class Name privilege escalation
9881| [75928] Microsoft Windows Knowledge Base Article 2711167 update is not installed
9882| [75927] Microsoft Windows User Mode Scheduler privilege escalation
9883| [75926] Microsoft Windows Knowledge Base Article 2709100 update is not installed
9884| [75925] Microsoft Dynamics AX Enterprise Portal cross-site scripting
9885| [75905] Microsoft Windows Knowledge Base Article 2707956 update is not installed
9886| [75904] Microsoft Lync HTML information disclosure
9887| [75903] Microsoft Lync DLL code execution
9888| [75772] Microsoft Windows keyboard layout privilege escalation
9889| [75525] OpenSSL TLS record denial of service
9890| [75329] Microsoft Windows xxxCreateWindowEx() denial of service
9891| [75163] Microsoft Visual Studio linker buffer overflow
9892| [75140] Microsoft Windows scrollbar calculation privilege escalation
9893| [75139] Microsoft Windows Keyboard Layout files privilege escalation
9894| [75138] Microsoft Windows messages privilege escalation
9895| [75136] Microsoft Windows Knowledge Base Article 2693777 update is not installed
9896| [75135] Microsoft Silverlight XAML code execution
9897| [75134] Microsoft .NET Framework index denial of service
9898| [75133] Microsoft .NET Framework buffer code execution
9899| [75132] Microsoft Windows Knowledge Base Article 2690533 update is not installed
9900| [75131] Microsoft Windows Plug and Play (PnP) privilege escalation
9901| [75130] Microsoft Windows Knowledge Base Article 2688338 update is not installed
9902| [75129] Microsoft Windows IPv6 address privilege escalation
9903| [75128] Microsoft Windows broadcast packets security bypass
9904| [75127] Microsoft Windows Knowledge Base Article 2681578 update is not installed
9905| [75126] Microsoft Windows GDI+ EMF buffer overflow
9906| [75125] Microsoft Windows GDI+ EMF code execution
9907| [75124] Microsoft Windows TrueType code execution
9908| [75123] Microsoft Windows Knowledge Base Article 2680352 update is not installed
9909| [75122] Microsoft Office RTF code execution
9910| [75119] Microsoft Excel series record code execution
9911| [75118] Microsoft Excel MergeCells buffer overflow
9912| [75117] Microsoft Excel SXLI code execution
9913| [75116] Microsoft Windows Knowledge Base Article 2597981 update is not installed
9914| [75115] Microsoft Visio Viewer memory code execution
9915| [75098] Microsoft .NET Framework EncoderParameter buffer overflow
9916| [74556] Microsoft Windows Knowledge Base Article 2639185 update is not installed
9917| [74555] Microsoft Office WPS Converter buffer overflow
9918| [74384] Microsoft Windows Knowledge Base Article 2675157 update is not installed
9919| [74383] Microsoft Internet Explorer VML code execution
9920| [74382] Microsoft Internet Explorer SelectAll code execution
9921| [74381] "Microsoft Internet Explorer OnReadyStateChange code execution"
9922| [74380] Microsoft Internet Explorer JScript9 code execution
9923| [74379] Microsoft Internet Explorer HTML page code execution
9924| [74378] Microsoft Windows Knowledge Base Article 2671605 update is not installed
9925| [74377] Microsoft .NET Framework parameter code execution
9926| [74376] Microsoft .NET Framework input code execution
9927| [74375] Microsoft .NET Framework serialization code execution
9928| [74373] Microsoft Windows Knowledge Base Article 2664258 update is not installed
9929| [74372] Microsoft Windows MSCOMCTL.OCX ActiveX control code execution
9930| [74369] Microsoft Windows Knowledge Base Article 2663860 update is not installed
9931| [74368] Microsoft Forefront Unified Access Gateway information disclosure
9932| [74367] Microsoft Forefront Unified Access Gateway spoofing
9933| [74167] GnuTLS record denial of service
9934| [74166] GnuTLS libtasn1 code execution
9935| [74165] Aruba Mobility Controller EAP-TLS 802.1X security bypass
9936| [74099] GnuTLS libgnutls certificate list denial of service
9937| [73870] Microsoft Internet Explorer Protected Mode denial of service
9938| [73869] Microsoft Internet Explorer unspecified buffer overflow
9939| [73543] Microsoft Windows Knowledge Base Article 2671387 update is not installed
9940| [73542] Microsoft Windows Remote Desktop Protocol denial of service
9941| [73541] Microsoft Windows Remote Desktop Protocol code execution
9942| [73540] Microsoft Windows Knowledge Base Article 2665364 update is not installed
9943| [73539] Microsoft DirectWrite denial of service
9944| [73538] Microsoft Windows Knowledge Base Article 2651019 update is not installed
9945| [73537] Microsoft Visual Studio privilege escalation
9946| [73536] Microsoft Windows Knowledge Base Article 2651018 update is not installed
9947| [73535] Microsoft Expression Design code execution
9948| [73533] Microsoft Windows Knowledge Base Article 2647170 update is not installed
9949| [73532] Microsoft Windows DNS Server denial of service
9950| [73530] Microsoft Windows Knowledge Base Article 2641653 update is not installed
9951| [73529] Microsoft Windows PostMessage function privilege escalation
9952| [73356] Microsoft Windows DNS security bypass
9953| [73029] Microsoft Internet Explorer BODY denial of service
9954| [72950] Microsoft Windows IPv6 information disclosure
9955| [72887] Microsoft Windows Knowledge Base Article 2663841 update is not installed
9956| [72886] Microsoft SharePoint wizardlist.aspx cross-site scripting
9957| [72885] Microsoft SharePoint themeweb.aspx cross-site scripting
9958| [72884] Microsoft SharePoint inplview.aspx cross-site scripting
9959| [72873] Microsoft Windows Knowledge Base Article 2663830 update is not installed
9960| [72872] Microsoft Excel bytes code execution
9961| [72871] Microsoft Excel OBJECTLINK record code execution
9962| [72870] Microsoft Excel file code execution
9963| [72867] Microsoft Windows Knowledge Base Article 2663510 update is not installed
9964| [72864] Microsoft Visio attributes code execution
9965| [72863] Microsoft Visio code execution
9966| [72862] Microsoft Visio Viewer code execution
9967| [72861] Microsoft Visio attributes code execution
9968| [72860] Microsoft Visio Viewer code execution
9969| [72857] Microsoft Windows Knowledge Base Article 2661637 update is not installed
9970| [72855] Microsoft Windows Knowledge Base Article 2660465 update is not installed
9971| [72854] Microsoft Windows keyboard privilege escalation
9972| [72853] Microsoft Windows Knowledge Base Article 2653956 update is not installed
9973| [72852] Microsoft Windows Authenticode code execution
9974| [72851] Microsoft Windows Knowledge Base Article 2654428 update is not installed
9975| [72850] Microsoft Windows msvcrt dynamic link library buffer overflow
9976| [72849] Microsoft Windows Knowledge Base Article 2651026 update is not installed
9977| [72848] Microsoft .NET Framework buffer overflow
9978| [72847] Microsoft .NET Framework and Microsoft Silverlight unmanaged objects code execution
9979| [72846] Microsoft Windows Knowledge Base Article 2647516 update is not installed
9980| [72845] Microsoft Internet Explorer VML code execution
9981| [72844] Microsoft Internet Explorer memory information disclosure
9982| [72843] Microsoft Internet Explorer HtmlLayout code execution
9983| [72842] Microsoft Internet Explorer copy and paste information disclosure
9984| [72841] Microsoft Windows Knowledge Base Article 2645640 update is not installed
9985| [72840] Microsoft Windows Ancillary Function Driver privilege escalation
9986| [72839] Microsoft Windows Ancillary Function Driver privilege escalation
9987| [72838] Microsoft Windows Knowledge Base Article 2643719 update is not installed
9988| [72657] TLS Zero Length Record
9989| [72560] Microsoft Windows Media Format ASF invalid stream
9990| [72458] OpenSSL DTLS denial of service
9991| [72346] Microsoft Windows Explorer denial of service
9992| [72201] GnuTLS CBC mode information disclosure
9993| [72120] spamdyke STARTTLS command execution
9994| [72029] Microsoft Windows Knowledge Base Article 2638420 update is not installed
9995| [72028] Microsoft ASP.NET forms authentication open redirect
9996| [72027] Microsoft ASP.NET forms authentication security bypass
9997| [72026] Microsoft ASP.NET forms authentication ticket caching privilege escalation
9998| [72003] Microsoft Windows Knowledge Base Article 2646524 update is not installed
9999| [72002] Microsoft Windows Client/Server Run-time Subsystem Unicode privilege escalation
10000| [71998] Microsoft Windows Knowledge Base Article 2644615 update is not installed
10001| [71997] Microsoft Windows SafeSEH security bypass
10002| [71995] Microsoft Windows Knowledge Base Article 2643584 update is not installed
10003| [71994] Microsoft Windows Knowledge Base Article 2636391 update is not installed
10004| [71993] Microsoft Windows DirectShow code execution
10005| [71992] Microsoft Windows Media Player MIDI code execution
10006| [71991] Microsoft Windows Knowledge Base Article 2607664 update is not installed
10007| [71990] Microsoft Anti-Cross Site Scripting Library security bypass
10008| [71989] Microsoft ASP.NET CaseInsensitiveHashProvider.getHashCode() function denial of service
10009| [71966] Microsoft Windows Media Player access denial of service
10010| [71944] Microsoft Windows Phone messages denial of service
10011| [71873] Microsoft Windows win32k.sys code execution
10012| [71817] Microsoft Internet Explorer CSS information disclosure
10013| [71813] Microsoft Internet Explorer getComputedStyle information disclosure
10014| [71808] Microsoft .NET Framework SaveAs() security bypass
10015| [71733] Microsoft Windows sandbox privilege escalation
10016| [71635] Microsoft Internet Explorer cache objects information disclosure
10017| [71565] Microsoft Windows Knowledge Base Article 2648048 update is not installed
10018| [71564] Microsoft Windows Media Player DVR-MS code execution
10019| [71562] Microsoft Windows Knowledge Base Article 2640241 update is not installed
10020| [71561] Microsoft Excel record memory code execution
10021| [71560] Microsoft Windows Knowledge Base Article 2640045 update is not installed
10022| [71559] Microsoft Windows Active Directory buffer overflow
10023| [71558] Microsoft Windows Knowledge Base Article 2639417 update is not installed
10024| [71557] Microsoft Windows Knowledge Base Article 2639142 update is not installed
10025| [71556] Microsoft PowerPoint record code execution
10026| [71555] Microsoft PowerPoint DLL code execution
10027| [71554] Microsoft Windows Knowledge Base Article 2633171 update is not installed
10028| [71553] Microsoft Windows kernel privilege escalation
10029| [71552] Microsoft Windows Knowledge Base Article 2624667 update is not installed
10030| [71551] Microsoft Windows OLE object code execution
10031| [71550] Microsoft Windows Knowledge Base Article 2620712 update is not installed
10032| [71549] Microsoft Windows Client/Server Run-time Subsystem Csrsrv.dll privilege escalation
10033| [71548] Microsoft Windows Knowledge Base Article 2618451 update is not installed
10034| [71547] Microsoft Time binary code execution
10035| [71546] Microsoft Windows Knowledge Base Article 2618444 update is not installed
10036| [71545] Microsoft Internet Explorer Content-Disposition information disclosure
10037| [71544] Microsoft Internet Explorer HTML DLL code execution
10038| [71543] Microsoft Internet Explorer cross-site scripting filter information disclosure
10039| [71542] Microsoft Windows Knowledge Base Article 2607702 update is not installed
10040| [71541] Microsoft Publisher memory code execution
10041| [71540] Microsoft Publisher pointer code execution
10042| [71539] Microsoft Publisher out-of-bounds code execution
10043| [71538] Microsoft Windows Knowledge Base Article 2590602 update is not installed
10044| [71537] Microsoft Word memory code execution
10045| [71418] Microsoft Windows keyboard layout denial of service
10046| [71291] Microsoft Windows Server AppLocker security bypass
10047| [71227] GnuTLS gnutls_session_get_data() buffer overflow
10048| [71117] Microsoft Excel vbscript macro code execution
10049| [71073] Microsoft Windows kernel Duqu code execution
10050| [71068] Transport Layer Security (TLS) protocol SSL negotiation handshake denial of service
10051| [71022] Tor TLS certificate information disclosure
10052| [70951] Microsoft Windows Knowledge Base Article 2630837 update is not installed
10053| [70950] Microsoft Windows Active Directory privilege escalation
10054| [70949] Microsoft Windows Knowledge Base Article 2620704 update is not installed
10055| [70948] Microsoft Windows Mail and Windows Meeting Space code execution
10056| [70947] Microsoft Windows Knowledge Base Article 2617657 update is not installed
10057| [70946] Microsoft Windows TrueType denial of service
10058| [70945] Microsoft Windows Knowledge Base Article 2603381 update is not installed
10059| [70944] Microsoft Windows Object Packager code execution
10060| [70943] Microsoft Windows Knowledge Base Article 2588516 update is not installed
10061| [70942] Microsoft Windows TCP/IP code execution
10062| [70940] Microsoft Windows ClickOnce code execution
10063| [70565] Microsoft Publisher pubconv.dll buffer overflow
10064| [70337] OpenOffice.org Microsoft Word .doc sprm file parser denial of service
10065| [70152] Microsoft Windows Knowledge Base Article 2623699 update is not installed
10066| [70150] Microsoft Windows Knowledge Base Article 2607670 update is not installed
10067| [70148] Microsoft Host Integration Server UDP denial of service
10068| [70143] Microsoft Windows Media Center DLL code execution
10069| [70140] Microsoft Windows Knowledge Base Article 2652016 update is not installed
10070| [70139] Microsoft Office IME privilege escalation
10071| [70137] Microsoft Windows Ancillary Function Driver privilege escalation
10072| [70130] Microsoft Windows Knowledge Base Article 2586448 update is not installed
10073| [70128] Microsoft Internet Explorer Body Element code execution
10074| [70126] "Microsoft Internet Explorer Jscript9.dll code execution"
10075| [70125] Microsoft Internet Explorer Onload Event code execution
10076| [70124] Microsoft Internet Explorer Option Element code execution
10077| [70123] "Microsoft Internet Explorer OLEAuto32.dll code execution"
10078| [70122] Microsoft Internet Explorer Scroll Event code execution
10079| [70115] Microsoft Windows Knowledge Base Article 2567053 update is not installed
10080| [70114] Microsoft Windows use-after-free privilege escalation
10081| [70113] Microsoft Windows .fon buffer overflow
10082| [70112] Microsoft Windows TrueType denial of service
10083| [70107] Microsoft Forefront Unified Access Gateway NULL denial of service
10084| [70106] Microsoft Forefront Unified Access Gateway applet code execution
10085| [70105] Microsoft Forefront Unified Access Gateway cross-site scripting
10086| [70104] Microsoft Forefront Unified Access Gateway ExcelTable cross-site scripting
10087| [70103] Microsoft Forefront Unified Access Gateway ExcelTable response splitting
10088| [69826] Microsoft SharePoint Server Source open redirect
10089| [69638] Microsoft Windows csrss.exe denial of service
10090| [69558] Microsoft Windows Script Host DLL code execution
10091| [69501] Microsoft Windows Knowledge Base Article 2587634 update is not installed
10092| [69500] Microsoft Office object pointer code execution
10093| [69499] Microsoft Office DLL code execution
10094| [69498] Microsoft Windows Knowledge Base Article 2587505 update is not installed
10095| [69497] Microsoft Excel integer code execution
10096| [69496] Microsoft Excel expression code execution
10097| [69495] Microsoft Excel records code execution
10098| [69494] Microsoft Excel array code execution
10099| [69493] Microsoft Excel WriteAV code execution
10100| [69492] Microsoft Windows Knowledge Base Article 2571621 update is not installed
10101| [69491] Microsoft Windows WINS privilege escalation
10102| [69490] Microsoft Windows Knowledge Base Article 2570947 update is not installed
10103| [69489] Microsoft Windows components DLL code execution
10104| [69344] Microsoft compound document detected
10105| [69293] Microsoft Internet Explorer HTTPS security bypass
10106| [69215] Microsoft Windows DHCPv6 denial of service
10107| [69214] Microsoft Internet Explorer Iedvtool.dll denial of service
10108| [69009] Microsoft Windows Client/Server Run-time Subsystem information disclosure
10109| [68840] Microsoft Windows Knowledge Base Article 2451858 update is not installed
10110| [68838] Microsoft SharePoint and Windows SharePoint Services cross-site scripting
10111| [68837] Microsoft SharePoint and Windows SharePoint Services XML file disclosure
10112| [68836] Microsoft SharePoint and Windows SharePoint Services contact details cross-site scripting
10113| [68835] Microsoft SharePoint EditForm.aspx cross-site scripting
10114| [68834] Microsoft SharePoint cross-site scripting
10115| [68833] Microsoft Windows Knowledge Base Article 2567943 update is not installed
10116| [68832] Microsoft Chart control information disclosure
10117| [68831] Microsoft Windows Knowledge Base Article 2570222 update is not installed
10118| [68830] Microsoft Windows Remote Desktop Protocol denial of service
10119| [68829] Microsoft Windows Knowledge Base Article 2567951 update is not installed
10120| [68828] Microsoft .NET Framework socket information disclosure
10121| [68827] Microsoft Windows Knowledge Base Article 2578230 update is not installed
10122| [68826] Microsoft Report Viewer information disclosure
10123| [68825] Microsoft Windows Knowledge Base Article 2546250 update is not installed
10124| [68824] Microsoft Windows Remote Desktop Web Access privilege escalation
10125| [68823] Microsoft Windows Knowledge Base Article 2559049 update is not installed
10126| [68822] Microsoft Internet Explorer style code execution
10127| [68821] Microsoft Internet Explorer xslt code execution
10128| [68820] Microsoft Internet Explorer character sequences information
10129| [68819] Microsoft Internet Explorer telnet URI code execution
10130| [68818] Microsoft Internet Explorer event handlers information disclosure
10131| [68817] Microsoft Internet Explorer race condition code execution
10132| [68816] Microsoft Windows Knowledge Base Article 2556532 update is not installed
10133| [68815] Microsoft Windows kernel meta-data denial of service
10134| [68814] Microsoft Windows Knowledge Base Article 2560656 update is not installed
10135| [68813] Microsoft Windows Data Access code execution
10136| [68812] Microsoft Windows Knowledge Base Article 2560978 update is not installed
10137| [68811] Microsoft Visio pStream code execution
10138| [68810] Microsoft Visio Move Around the Block code execution
10139| [68809] Microsoft Windows Knowledge Base Article 2562485 update is not installed
10140| [68808] Microsoft Windows DNS Server denial of service
10141| [68807] Microsoft Windows DNS Server code execution
10142| [68806] Microsoft Windows Knowledge Base Article 2566454 update is not installed
10143| [68805] Microsoft Windows NDISTAPI privilege escalation
10144| [68804] Microsoft Windows Knowledge Base Article 2563894 update is not installed
10145| [68803] Microsoft Windows TCP/IP QoS denial of service
10146| [68802] Microsoft Windows TCP/IP ICMP denial of service
10147| [68801] Microsoft Windows Knowledge Base Article 2567680 update is not installed
10148| [68800] Microsoft Windows Client/Server Run-time Subsystem Winsrv.dl privilege escalation
10149| [68786] Microsoft Internet Explorer EUC-JP cross-site scripting
10150| [68498] Microsoft Internet Explorer memory layout information disclosure
10151| [68469] Microsoft Windows GPU denial of service
10152| [68467] Microsoft Windows NVIDIA Geforce 310 denial of service
10153| [68465] Microsoft Windows Intel G41 denial of service
10154| [68368] Ingate Firewall and SIParator TLS denal of service
10155| [68315] Microsoft Windows Knowledge Base Article 2555917 update is not installed
10156| [68314] Microsoft Windows win32k.sys privilege escalation
10157| [68313] Microsoft Windows win32k.sys privilege escalation
10158| [68312] Microsoft Windows win32k.sys information disclosure
10159| [68311] Microsoft Windows NULL privilege escalation
10160| [68310] Microsoft Windows win32k.sys privilege escalation
10161| [68309] Microsoft Windows win32k.sys privilege escalation
10162| [68308] Microsoft Windows win32k.sys privilege escalation
10163| [68307] Microsoft Windows NULL pointer privilege escalation
10164| [68306] Microsoft Windows NULL pointer privilege escalation
10165| [68305] Microsoft Windows kernel-mode driver privilege escalation
10166| [68304] Microsoft Windows kernel-mode driver privilege escalation
10167| [68303] Microsoft Windows kernel-mode driver privilege escalation
10168| [68302] Microsoft Windows win32k.sys privilege escalation
10169| [68301] Microsoft Windows win32k.sys privilege escalation
10170| [68300] Microsoft Windows win32k.sys privilege escalation
10171| [68299] Microsoft Windows Knowledge Base Article 2566220 update is not installed
10172| [68298] Microsoft Windows Bluetooth stack code execution
10173| [68283] Microsoft Windows Knowledge Base Article 2560847 update is not installed
10174| [68226] Apple Mac OS X QuickLook Microsoft Office files code execution
10175| [68024] Microsoft Office XP remote code execution
10176| [68007] Microsoft Word wdGetApplicationObject() code execution
10177| [68002] Microsoft Windows Media Player klite denial of service
10178| [67991] Microsoft Lync Server ReachJoin.aspx command execution
10179| [67989] Microsoft Windows tskill privilege escalation
10180| [67955] Microsoft Windows Knowledge Base Article 2530548 update is not installed
10181| [67954] Microsoft Internet Explorer HTTP redirect code execution
10182| [67953] Microsoft Internet Explorer selection object code execution
10183| [67952] Microsoft Internet Explorer layout code execution
10184| [67951] Microsoft Internet Explorer drag and drop information disclosure
10185| [67950] Microsoft Internet Explorer DOM code execution
10186| [67949] Microsoft Internet Explorer time element code execution
10187| [67948] Microsoft Internet Explorer drag and drop code execution
10188| [67947] Microsoft Internet Explorer toStaticHTML API information disclosure
10189| [67946] Microsoft Internet Explorer DOM code execution
10190| [67945] Microsoft Internet Explorer link properties code execution
10191| [67944] Microsoft Internet Explorer Web pages information disclosure
10192| [67943] Microsoft Windows Knowledge Base Article 2544521 update is not installed
10193| [67942] Microsoft Windows Vector Markup Language (VML) code execution
10194| [67890] Microsoft Internet Explorer cross-zone drag-and-drop information disclosure
10195| [67867] Cyrus IMAP Server STARTTLS command execution
10196| [67795] Microsoft Windows Live Messenger dwmapi.dll code execution
10197| [67762] Microsoft Windows Knowledge Base Article 2543893 update is not installed
10198| [67761] Microsoft XML Editor Web Service Discovery information disclosure
10199| [67759] Microsoft Windows Knowledge Base Article 2544893 update is not installed
10200| [67758] Microsoft Windows MHTML information disclosure
10201| [67757] Microsoft Windows Knowledge Base Article 2476490 update is not installed
10202| [67756] Microsoft Windows Object Linking and Embedding WMF code execution
10203| [67755] Microsoft Windows Knowledge Base Article 2503665 update is not installed
10204| [67754] Microsoft Windows Ancillary Function Driver privilege escalation
10205| [67753] Microsoft Windows Knowledge Base Article 2514842 update is not installed
10206| [67752] Microsoft .NET Framework and Microsoft Silverlight XAML code execution
10207| [67751] Microsoft Windows Knowledge Base Article 2518295 update is not installed
10208| [67750] Microsoft Windows Active Directory Certificate Services Web Enrollment cross-site scripting
10209| [67749] Microsoft Windows Knowledge Base Article 2507938 update is not installed
10210| [67748] Microsoft Windows SrvWriteConsoleOutputString privilege escalation
10211| [67747] Microsoft Windows SrvWriteConsoleOutput privilege escalation
10212| [67746] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand privilege escalation
10213| [67745] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC privilege escalation
10214| [67744] Microsoft Windows CSRSS AllocConsole privilege escalation
10215| [67737] Microsoft Windows Knowledge Base Article 2520426 update is not installed
10216| [67736] Microsoft Forefront Threat Management Gateway TMG Firewall Client buffer overflow
10217| [67733] Microsoft Windows Knowledge Base Article 2525694 update is not installed
10218| [67732] Microsoft Windows Win32k OTF code execution
10219| [67731] Microsoft Windows Knowledge Base Article 2525835 update is not installed
10220| [67730] Microsoft Windows Server Hyper-V VMBus denial of service
10221| [67729] WatchGuard XCS STARTTLS command execution
10222| [67728] Microsoft Windows Knowledge Base Article 2535512 update is not installed
10223| [67727] Microsoft Windows DFS denial of service
10224| [67726] Microsoft Windows DFS code execution
10225| [67725] Microsoft Windows Knowledge Base Article 2536275 update is not installed
10226| [67724] Microsoft Windows SMB request denial of service
10227| [67722] Microsoft Windows Knowledge Base Article 2536276 update is not installed
10228| [67721] Microsoft Windows SMB responses code execution
10229| [67718] Microsoft Windows Knowledge Base Article 2537146 update is not installed
10230| [67717] Microsoft Excel WriteAV code execution
10231| [67716] Microsoft Excel WriteAV code execution
10232| [67715] Microsoft Excel information code execution
10233| [67714] Microsoft Excel record information buffer overflow
10234| [67713] Microsoft Excel record buffer overflow
10235| [67712] Microsoft Excel array code execution
10236| [67711] Microsoft Excel information code execution
10237| [67710] Microsoft Excel Excel record code execution
10238| [67709] Microsoft Windows Knowledge Base Article 2538814 update is not installed
10239| [67700] Fetchmail STARTTLS denial of service
10240| [67520] Microsoft Windows Vista nsiproxy.sys denial of service
10241| [67411] Microsoft .NET Framework JIT compiler code execution
10242| [67302] Microsoft Windows Knowledge Base Article 2545814 update is not installed
10243| [67301] Microsoft PowerPoint presentation code execution
10244| [67300] Microsoft PowerPoint presentation code execution
10245| [67101] Microsoft Windows Knowledge Base Article 2524426 update is not installed
10246| [67100] Microsoft Windows Windows Internet Name Service code execution
10247| [66991] Microsoft Internet Explorer CSS address bar spoofing
10248| [66856] Microsoft Windows Media Player .avi buffer overflow
10249| [66855] Microsoft Windows Media Player .ogg denial of service
10250| [66845] Microsoft Windows Knowledge Base Article 2506014 update is not installed
10251| [66844] Microsoft Windows Knowledge Base Article 2501584 update is not installed
10252| [66835] Microsoft Windows and Internet Explorer msxml.dll information disclosure
10253| [66729] Microsoft HTML Help CHM buffer overflow
10254| [66710] Microsoft Reader aud_file.dll code execution
10255| [66709] Microsoft Reader eBook buffer overflow
10256| [66708] Microsoft Reader msreader.exe buffer overflow
10257| [66639] Microsoft Windows XP afd.sys denial of service
10258| [66544] A Microsoft FAX cover sheet has been detected
10259| [66469] Microsoft Windows Explorer Shmedia.dll denial of service
10260| [66448] Microsoft Windows Knowledge Base Article 2508272 update is not installed
10261| [66447] Microsoft Windows Messenger ActiveX control code execution
10262| [66446] Microsoft Windows Knowledge Base Article 2514666 update is not installed
10263| [66445] Microsoft Windows VBScript and Jscript code execution
10264| [66444] Microsoft Windows Knowledge Base Article 2511455 update is not installed
10265| [66443] Microsoft Windows SMB response code execution
10266| [66442] Microsoft Windows Knowledge Base Article 2509553 update is not installed
10267| [66441] Microsoft Windows DNS resolution code execution
10268| [66440] Microsoft Windows Knowledge Base Article 2508429 update is not installed
10269| [66439] Microsoft Windows SMB protocol code execution
10270| [66438] Microsoft Windows Knowledge Base Article 2507618 update is not installed
10271| [66437] Microsoft Windows OpenType buffer overflow
10272| [66436] Microsoft Windows Knowledge Base Article 2497640 update is not installed
10273| [66435] Microsoft Internet Explorer Javascript information disclosure
10274| [66434] Microsoft Internet Explorer frame tag information disclosure
10275| [66433] Microsoft Internet Explorer layout code execution
10276| [66432] Microsoft Windows Knowledge Base Article 2527308 update is not installed
10277| [66431] Microsoft Windows Fax Cover Page Editor code execution
10278| [66430] Microsoft Windows Knowledge Base Article 2503658 update is not installed
10279| [66428] Microsoft Windows Knowledge Base Article 2489979 update is not installed
10280| [66427] Microsoft Windows GDI+ EMF code execution
10281| [66426] Microsoft Office DLL code execution
10282| [66425] Microsoft Windows Knowledge Base Article 2506223 update is not installed
10283| [66424] Microsoft Windows kernel-mode driver (win32k.sys) variant 30 privilege escalation
10284| [66423] Microsoft Windows kernel-mode driver (win32k.sys) variant 29 privilege escalation
10285| [66422] Microsoft Windows kernel-mode driver (win32k.sys) variant 28 privilege escalation
10286| [66421] Microsoft Windows kernel-mode driver (win32k.sys) variant 27 privilege escalation
10287| [66420] Microsoft Windows kernel-mode driver (win32k.sys) variant 26 privilege escalation
10288| [66419] Microsoft Windows kernel-mode driver (win32k.sys) variant 25 privilege escalation
10289| [66418] Microsoft Windows kernel-mode driver (win32k.sys) variant 24 privilege escalation
10290| [66417] Microsoft Windows kernel-mode driver (win32k.sys) variant 23 privilege escalation
10291| [66416] Microsoft Windows kernel-mode driver (win32k.sys) variant 22 privilege escalation
10292| [66415] Microsoft Windows kernel-mode driver (win32k.sys) variant 21 privilege escalation
10293| [66414] Microsoft Windows kernel-mode driver (win32k.sys) variant 20 privilege escalation
10294| [66413] Microsoft Windows kernel-mode driver (win32k.sys) variant 19 privilege escalation
10295| [66412] Microsoft Windows kernel-mode driver (win32k.sys) variant 18 privilege escalation
10296| [66411] Microsoft Windows kernel-mode driver (win32k.sys) variant 17 privilege escalation
10297| [66410] Microsoft Windows kernel-mode driver (win32k.sys) variant 16 privilege escalation
10298| [66409] Microsoft Windows kernel-mode driver (win32k.sys) variant 15 privilege escalation
10299| [66408] Microsoft Windows kernel-mode driver (win32k.sys) variant 14 privilege escalation
10300| [66407] Microsoft Windows kernel-mode driver (win32k.sys) variant 13 privilege escalation
10301| [66406] Microsoft Windows kernel-mode driver (win32k.sys) variant 12 privilege escalation
10302| [66405] Microsoft Windows kernel-mode driver (win32k.sys) variant 11 privilege escalation
10303| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
10304| [66403] Microsoft Windows kernel-mode driver (win32k.sys) variant 9 privilege escalation
10305| [66402] Microsoft Windows kernel-mode driver (win32k.sys) variant 8 privilege escalation
10306| [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
10307| [66400] Microsoft Windows kernel-mode driver (win32k.sys) variant 6 privilege escalation
10308| [66399] Microsoft Windows kernel-mode driver (win32k.sys) variant 5 privilege escalation
10309| [66398] Microsoft Windows kernel-mode driver (win32k.sys) variant 4 privilege escalation
10310| [66397] Microsoft Windows kernel-mode driver (win32k.sys) variant 3 privilege escalation
10311| [66396] Microsoft Windows kernel-mode driver (win32k.sys) variant 2 privilege escalation
10312| [66395] Microsoft Windows kernel-mode driver (win32k.sys) variant 1 privilege escalation
10313| [66394] Microsoft Windows Knowledge Base Article 2485663 update is not installed
10314| [66393] Microsoft WordPad code execution
10315| [66312] Microsoft Windows Media Player .ape buffer overflow
10316| [66254] Microsoft Windows certificates spoofing
10317| [66140] Asterisk handle_tcptls_connection() denial of service
10318| [66137] Microsoft Source Code Analyzer for SQL injection privilge escalation
10319| [66064] Microsoft Internet Explorer unspecified code execution
10320| [66063] Microsoft Internet Explorer unspecified code execution
10321| [66062] Microsoft Internet Explorer unspecified code execution
10322| [66025] Microsoft Internet Explorer XSLT information disclosure
10323| [66015] Mutt SMTP TLS certificate weak security
10324| [65972] Microsoft Windows mscorsvw.exe privilege escalation
10325| [65932] Multiple vendors STARTTLS command execution
10326| [65918] Microsoft Internet Explorer address bar spoofing
10327| [65867] Microsoft Visual Studio project file buffer overflow
10328| [65626] Microsoft Malware Protection Engine privilege escalation
10329| [65588] Microsoft Windows Knowledge Base Article 2489279 update is not installed
10330| [65587] Microsoft Excel data code execution
10331| [65586] Microsoft Excel memory record buffer overflow
10332| [65585] Microsoft Excel memory corruption code execution
10333| [65584] Microsoft Excel WriteAV code execution
10334| [65583] Microsoft Excel memory buffer overflow
10335| [65582] Microsoft Excel buffer code execution
10336| [65581] Microsoft Windows Knowledge Base Article 2510030 update is not installed
10337| [65580] Microsoft Windows Knowledge Base Article 2489283 update is not installed
10338| [65579] Microsoft PowerPoint persist directory code execution
10339| [65578] Microsoft PowerPoint Techno-color code execution
10340| [65575] Microsoft Windows Knowledge Base Article 2489293 update is not installed
10341| [65573] Microsoft Windows Knowledge Base Article 2494047 update is not installed
10342| [65572] Microsoft Office Groove DLL code execution
10343| [65570] Microsoft Windows Knowledge Base Article 2500212 update is not installed
10344| [65568] Microsoft Windows Knowledge Base Article 2508062 update is not installed
10345| [65567] Microsoft Windows RDC code execution
10346| [65495] Microsoft Windows HID weak security
10347| [65383] Microsoft Windows Graphics Rendering Engine height integer overflow
10348| [65382] Microsoft Windows Graphics Rendering Engine BMP integer overflow
10349| [65381] Microsoft Windows Graphics Rendering Engine biCompression buffer overflow
10350| [65376] Microsoft Windows Server CIFS code execution
10351| [65192] Microsoft PowerPoint OfficeArt code execution
10352| [65191] Microsoft Office graphic code execution
10353| [65190] Microsoft Excel Axis properties code execution
10354| [65188] Microsoft Excel art object code execution
10355| [65187] Microsoft Excel object code execution
10356| [65169] Microsoft Windows Azure information disclosure
10357| [65096] Aruba Mobility Controller EAP-TLS security bypass
10358| [65000] Microsoft Windows MHTML information disclosure
10359| [64973] Microsoft Windows Knowledge Base Article 2478960 update is not installed
10360| [64972] Microsoft Windows LSASS privilege escalation
10361| [64971] Microsoft Windows Knowledge Base Article 2479628 update is not installed
10362| [64970] Microsoft Windows Win32k.sys privilege escalation
10363| [64969] Microsoft Windows classpointer privilege escalation
10364| [64968] Microsoft Windows pointer privilege escalation
10365| [64967] Microsoft Windows Win32k.sys privilege escalation
10366| [64966] Microsoft Windows Win32k.sys privilege escalation
10367| [64927] Microsoft Windows Knowledge Base Article 2393802 update is not installed
10368| [64926] Microsoft Windows kernel privilege escalation
10369| [64925] Microsoft Windows Knowledge Base Article 2451879 update is not installed
10370| [64924] Microsoft Visio data type code execution
10371| [64923] Microsoft Visio object code execution
10372| [64921] Microsoft Windows Media Player and Windows Media Center DVR-MS code execution
10373| [64920] Microsoft Windows Knowledge Base Article 2475792 update is not installed
10374| [64919] Microsoft Windows VBScript and JScript information disclosure
10375| [64918] Microsoft Windows Knowledge Base Article 2476687 update is not installed
10376| [64917] Microsoft Windows CSRSS privilege escalation
10377| [64916] Microsoft Windows Knowledge Base Article 2478953 update is not installed
10378| [64915] Microsoft Windows Active Directory denial of service
10379| [64914] Microsoft Windows Knowledge Base Article 2482017 update is not installed
10380| [64913] Microsoft Internet Explorer DLL code execution
10381| [64912] Microsoft Internet Explorer code execution
10382| [64911] Microsoft Internet Explorer code execution
10383| [64910] Microsoft Windows Knowledge Base Article 2483185 update is not installed
10384| [64909] Microsoft Windows Knowledge Base Article 2484015 update is not installed
10385| [64908] Microsoft .NET Framework JIT code execution
10386| [64907] Microsoft Windows Knowledge Base Article 2485376 update is not installed
10387| [64906] Microsoft Windows OpenType Compact Font Format code execution
10388| [64905] Microsoft Windows Knowledge Base Article 2489256 update is not installed
10389| [64903] Microsoft DirectShow DLL code execution
10390| [64902] Microsoft Windows Knowledge Base Article 2496930 update is not installed
10391| [64901] Microsoft Windows Kerberos spoofing
10392| [64900] Microsoft Windows Kerberos checksum privilege escalation
10393| [64837] Microsoft Windows Fax Cover Page Editor code execution
10394| [64583] Microsoft Windows Neighbor Discovery (ND) protocol denial of service
10395| [64571] Microsoft Internet Explorer GUI weak security
10396| [64482] Microsoft Internet Explorer ReleaseInterface() code execution
10397| [64474] Microsoft Windows Remote Access Phonebook code execution
10398| [64446] Microsoft Windows Contacts DLL code execution
10399| [64382] Microsoft Windows Graphics Rendering Engine buffer overflow
10400| [64342] Microsoft Windows Knowledge Base Article 2451910 update is not installed
10401| [64341] Microsoft Data Access Components (MDAC) ADO record code execution
10402| [64340] Microsoft Data Access Components (MDAC) ODBC buffer overflow
10403| [64339] Microsoft Windows Knowledge Base Article 2478935 update is not installed
10404| [64307] Microsoft Windows Windows Fax Cover Page Editor component buffer overflow
10405| [64250] Microsoft WMI Administrative Tools ActiveX control (WBEMSingleView.ocx) code execution
10406| [64248] Microsoft Internet Information Services TELNET_STREAM_CONTEXT::OnSendData buffer overflow
10407| [64140] echoping TLS_readline() buffer overflow
10408| [64083] Microsoft Foundation Class DLL code execution
10409| [64037] Desktop dynamic-linked library (schannel.dll) code execution
10410| [63915] Microsoft Data Access Objects (DAO) dynamic-linked library (DLL) code execution
10411| [63913] Orbit Downloader dynamic-linked library (schannel.dll) code execution
10412| [63909] Microsoft Windows dynamic-linked library (oci.dll) code execution
10413| [63866] Microsoft Visio dynamic-linked library (DLL) code execution
10414| [63840] Microsoft Visual C++ 2008 Redistributable Package dynamic-linked library (DLL) code execution
10415| [63816] Microsoft Windows Media Encoder 9 dynamic-linked library (DLL) code execution
10416| [63815] Microsoft Remote Desktop Protocol dynamic-linked library (ieframe.dll) code execution
10417| [63807] Microsoft Windows Mail dynamic-linked library (wab32res.dll) code execution
10418| [63805] Gretech GOM Player dynamic-linked library (schannel.dll) code execution
10419| [63803] Microsoft Windows Live Messenger dynamic-linked library (msgsres.dll) code execution
10420| [63802] Microsoft Visio dynamic-linked library (dwmapi.dll) code execution
10421| [63800] Adobe Flash Player dynamic-linked library (schannel.dll) code execution
10422| [63788] Microsoft Windows Backup dynamic-linked library (fveapi.dll) code execution
10423| [63780] Microsoft PowerPoint 2007 dynamic-linked library (rpawinet.dll) code execution
10424| [63779] Microsoft Windows Indeo Filter dynamic-linked library (iacenc.dll) code execution
10425| [63776] Microsoft Windows Program Group Converter dynamic-linked library (DLL) code execution
10426| [63775] Microsoft Visio 2003 dynamic-linked library (mfc71enu.dll) code execution
10427| [63773] Microsoft Windows Address Book dynamic-linked library (wab32res.dll) code execution
10428| [63749] Microsoft Internet Explorer CSS code execution
10429| [63586] Microsoft Windows Knowledge Base Article 2207559 update is not installed
10430| [63585] Microsoft Windows Netlogon denial of service
10431| [63584] Microsoft Windows Knowledge Base Article 2424434 update is not installed
10432| [63583] Microsoft Windows Movie Maker insecure library loading code execution
10433| [63582] Microsoft Windows Knowledge Base Article 2423089 update is not installed
10434| [63581] Microsoft Address Book insecure library loading code execution
10435| [63580] Microsoft Windows Knowledge Base Article 2436673 update is not installed
10436| [63579] Microsoft Windows user mode privilege escalation
10437| [63578] Microsoft Windows cursor privilege escalation
10438| [63577] Microsoft Windows WriteAV privilege escalation
10439| [63576] Microsoft Windows pointer privilege escalation
10440| [63575] Microsoft Windows double free privilege escalation
10441| [63574] Microsoft Windows kernel-mode drivers buffer overflow
10442| [63573] Microsoft Windows Knowledge Base Article 2407132 update is not installed
10443| [63572] Microsoft Exchange Server RPC denial of service
10444| [63571] Microsoft Windows Knowledge Base Article 2440591 update is not installed
10445| [63570] Microsoft Windows NDProxy buffer overflow
10446| [63569] Microsoft Windows Knowledge Base Article 2385678 update is not installed
10447| [63568] Microsoft Windows BranchCache code execution
10448| [63566] Microsoft Windows Knowledge Base Article 2442962 update is not installed
10449| [63565] Microsoft Windows Consent User Interface privilege escalation
10450| [63564] Microsoft Windows Knowledge Base Article 2345316 update is not installed
10451| [63563] Microsoft Windows Server Hyper-V VMBus denial of service
10452| [63562] Microsoft Windows Knowledge Base Article 2296199 update is not installed
10453| [63561] Microsoft Windows OpenType Font (OTF) CMAP code execution
10454| [63560] Microsoft Windows OpenType Font (OTF) format driver code execution
10455| [63559] Microsoft Windows OpenType Font (OTF) format driver code execution
10456| [63558] Microsoft Windows Knowledge Base Article 2416400 update is not installed
10457| [63557] Microsoft Internet Explorer information disclosure
10458| [63556] Microsoft Internet Explorer element code execution
10459| [63555] Microsoft Internet Explorer HTML element code execution
10460| [63553] Microsoft Internet Explorer object code execution
10461| [63552] Microsoft Internet Explorer script information disclosure
10462| [63551] Microsoft Internet Explorer HTML object code execution
10463| [63550] Microsoft Windows Knowledge Base Article 2447961 update is not installed
10464| [63549] Microsoft Windows Media Encoder code execution
10465| [63548] Microsoft Windows Knowledge Base Article 2443105 update is not installed
10466| [63547] Microsoft Windows Internet Signup code execution
10467| [63546] Microsoft Windows Knowledge Base Article 2455005 update is not installed
10468| [63545] Microsoft Sharepoint SOAP code execution
10469| [63544] Microsoft Windows Knowledge Base Article 2292970 update is not installed
10470| [63543] Microsoft Publisher array indexing memory corruption code execution
10471| [63542] Microsoft Publisher memory corruption code execution
10472| [63541] Microsoft Publisher pubconv.dll code execution
10473| [63540] Microsoft Publisher pubconv.dll buffer overflow
10474| [63539] Microsoft Publisher pubconv.dll code execution
10475| [63538] Microsoft Windows Knowledge Base Article 968095 update is not installed
10476| [63536] Microsoft Office FlashPix code execution
10477| [63535] Microsoft Office FlashPix buffer overflow
10478| [63534] Microsoft Office TIFF image code execution
10479| [63533] Microsoft Office TIFF image files
10480| [63532] Microsoft Office TIFF image buffer overflow
10481| [63531] Microsoft Office PICT code execution
10482| [63530] Microsoft Office CGM Image buffer overflow
10483| [63514] Microsoft Outlook file attachment denial of service
10484| [63450] Microsoft Windows REG_BINARY privilege escalation
10485| [63293] OpenSSL TLS server extension buffer overflow
10486| [62962] Microsoft Internet Explorer invalid flag code execution
10487| [62805] Microsoft Windows Knowledge Base Article 2316074 update is not installed
10488| [62804] Microsoft Forefront Unified Access Gateway Sginurl.asp cross-site scripting
10489| [62803] Microsoft Forefront Unified Access Gateway Mobile Portal cross-site scripting
10490| [62802] Microsoft Forefront Unified Access Gateway Web monitor cross-site scripting
10491| [62801] Microsoft Forefront Unified Access Gateway spoofing
10492| [62797] Microsoft Windows Knowledge Base Article 2305420 update is not installed
10493| [62796] Microsoft Windows Task Scheduler privilege escalation
10494| [62793] Microsoft Windows Knowledge Base Article 2293386 update is not installed
10495| [62792] Microsoft PowerPoint underflow code execution
10496| [62791] Microsoft PowerPoint PowerPoint buffer overflow
10497| [62789] Microsoft Windows Knowledge Base Article 2423930 update is not installed
10498| [62788] Microsoft Office DLL code execution
10499| [62787] Microsoft Office SPID code execution
10500| [62786] Microsoft Office drawing code execution
10501| [62785] Microsoft Office art drawing code execution
10502| [62784] Microsoft Office RTF buffer overflow
10503| [62737] Microsoft WindowsTask Scheduler service privilege escalation
10504| [62728] Microsoft Internet Explorer window.onerror information disclosure
10505| [62716] Microsoft Windows Mobile .vcf denial of service
10506| [62643] Microsoft Windows unspecified privilege escalation
10507| [62642] Microsoft Windows unspecified privilege escalation
10508| [62579] OpenConnect DTLS Cipher denial of service
10509| [62312] TLS weak certificate
10510| [62186] Microsoft Internet Information Services directory names code execution
10511| [62170] Microsoft Windows Knowledge Base Article 2296011 update is not installed
10512| [62169] Microsoft Windows Explorer buffer overflow
10513| [62166] Microsoft Windows Knowledge Base Article 2294255 update is not installed
10514| [62165] Microsoft Windows Failover Cluster Manager insecure permissions
10515| [62163] Microsoft Windows Knowledge Base Article 2281679 update is not installed
10516| [62162] Microsoft Windows Media Player RTSP code execution
10517| [62154] Microsoft Windows Knowledge Base Article 2279986 update is not installed
10518| [62153] Microsoft Windows OpenType Font fonts privilege escalation
10519| [62152] Microsoft Windows OpenType Font privilege escalation
10520| [62149] Microsoft Windows Knowledge Base Article 2207566 update is not installed
10521| [62147] Microsoft Windows Knowledge Base Article 2160841 update is not installed
10522| [62146] Microsoft .NET Framework JIT compiler code execution
10523| [62143] Microsoft Windows Knowledge Base Article 982132 update is not installed
10524| [62142] Microsoft Windows OpenType table code execution
10525| [62138] Microsoft Windows Knowledge Base Article 981957 update is not installed
10526| [62137] Microsoft Windows class privilege escalation
10527| [62135] Microsoft Windows keyboard privilege escalation
10528| [62134] Microsoft Windows Knowledge Base Article 2412048 update is not installed
10529| [62133] Microsoft Windows Knowledge Base Article 2405882 update is not installed
10530| [62129] Microsoft Windows Knowledge Base Article 2387149 update is not installed
10531| [62128] Microsoft Foundation Class (MFC) library title buffer overflow
10532| [62126] Microsoft Windows Knowledge Base Article 2378111 update is not installed
10533| [62125] Microsoft Windows Media Player code execution
10534| [62123] Microsoft Windows Knowledge Base Article 2360937 update is not installed
10535| [62118] Microsoft Windows Knowledge Base Article 2293211 update is not installed
10536| [62117] Microsoft Excel ghost record type parsing code execution
10537| [62116] Microsoft Excel out-of-bounds memory write in parsing code execution
10538| [62115] Microsoft Excel real time data array record code execution
10539| [62114] Microsoft Excel extra out of boundary record parsing code execution
10540| [62113] Microsoft Excel negative future function code execution
10541| [62112] Microsoft Excel merge cell record pointer code execution
10542| [62111] Microsoft Excel out of bounds array code execution
10543| [62110] Microsoft Excel formula biff record code execution
10544| [62109] Microsoft Excel formula substream memory corruption code execution
10545| [62108] Microsoft Excel Lotus 1-2-3 file parsing code execution
10546| [62107] Microsoft Excel file format parsing code execution
10547| [62106] Microsoft Excel record parsing memory corruption code execution
10548| [62105] Microsoft Excel record parsing integer overflow code execution
10549| [62104] Microsoft Windows Knowledge Base Article 2360131 update is not installed
10550| [62103] Microsoft Windows LPC message privilege escalation
10551| [62098] Microsoft Windows Knowledge Base Article 2293194 update is not installed
10552| [62097] Microsoft Word Word file code execution
10553| [62096] Microsoft Word file code execution
10554| [62095] Microsoft Word indexes code execution
10555| [62094] Microsoft Word records buffer overflow
10556| [62093] Microsoft Word pointers code execution
10557| [62090] Microsoft Internet Explorer deleted object code execution
10558| [62089] Microsoft Internet Explorer script information disclosure
10559| [62088] Microsoft Internet Explorer deleted object code execution
10560| [62087] Microsoft Internet Explorer object code execution
10561| [62086] Microsoft Internet Explorer Anchor element information disclosure
10562| [62085] Microsoft Internet Explorer deleted object code execution
10563| [62084] Microsoft Internet Explorer CSS information disclosure
10564| [62083] Microsoft Internet Explorer toStaticHTML API information disclosure
10565| [62082] Microsoft Internet Explorer AutoComplete information disclosure
10566| [62079] Microsoft Word bookmarks code execution
10567| [62078] Microsoft Word return values code execution
10568| [62077] Microsoft Word stack code execution
10569| [62076] Microsoft Word index code execution
10570| [62075] Microsoft Word boundary check code execution
10571| [62074] Microsoft Word pointer code execution
10572| [62069] Microsoft Windows Knowledge Base Article 2418042 update is not installed
10573| [62006] Microsoft Windows unspecified privilege escalation
10574| [61994] Microsoft Windows MPEG Layer-3 Audio Decoder denial of service
10575| [61937] Microsoft Word MSO.dll denial of service
10576| [61916] Microsoft DRM technology ActiveX control code execution
10577| [61913] Microsoft Internet Explorer toStaticHTML cross-site scripting
10578| [61898] Microsoft ASP.NET padding information disclosure
10579| [61894] Microsoft Paint BMP denial of service
10580| [61636] Microsoft Exchange Server Outlook Web Access cross-site request forgery
10581| [61519] Microsoft Windows Knowledge Base Article 2121546 update is not installed
10582| [61518] Microsoft Windows CSRSS privilege escalation
10583| [61517] Microsoft Windows Knowledge Base Article 2259922 update is not installed
10584| [61516] Microsoft WordPad Word 97 code execution
10585| [61514] Microsoft Windows Knowledge Base Article 2267960 update is not installed
10586| [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
10587| [61512] Microsoft Internet Information Services request header buffer overflow
10588| [61511] Microsoft Internet Information Services repeated POST denial of service
10589| [61510] Microsoft Windows Knowledge Base Article 2315011 update is not installed
10590| [61509] Microsoft Outlook Online Mode buffer overflow
10591| [61507] Microsoft Windows Knowledge Base Article 2320113 update is not installed
10592| [61506] Microsoft Windows Unicode Scripts Processor code execution
10593| [61504] Microsoft Windows Knowledge Base Article 2347290 update is not installed
10594| [61503] Microsoft Windows Print Spooler service code execution
10595| [61501] Microsoft Windows Knowledge Base Article 975558 update is not installed
10596| [61500] Microsoft Windows MPEG-4 code execution
10597| [61499] Microsoft Windows Knowledge Base Article 982802 update is not installed
10598| [61498] Microsoft Windows RPC code execution
10599| [61258] Microsoft Windows IcmpSendEcho2Ex denial of service
10600| [61187] Microsoft Windows xxxRealDrawMenuItem() privilege escalation
10601| [61184] Microsoft Windows win32k!GreStretchBltInternal() denial of service
10602| [61129] Microsoft Windows Kerberos security bypass
10603| [61046] Cisco Unified Wireless Network (UWN) Solution TLS and SSL unspecified
10604| [60975] Microsoft Windows CreateDIBPalette() buffer overflow
10605| [60916] Cisco ASA TLS denial of service
10606| [60915] Cisco ASA TLS denial of service
10607| [60914] Cisco ASA TLS denial of service
10608| [60739] Microsoft Internet Explorer frame.frameBorder denial of service
10609| [60736] Microsoft Windows Knowledge Base Article 2265906 update is not installed
10610| [60735] Microsoft .NET Framework CLR code execution
10611| [60734] Microsoft Windows Knowledge Base Article 2269638 update is not installed
10612| [60733] Microsoft Word HTML linked objects code execution
10613| [60732] Microsoft Word RTF buffer overflow
10614| [60731] Microsoft Word RTF code execution
10615| [60730] Microsoft Word record code execution
10616| [60728] Microsoft Windows Knowledge Base Article 2269707 update is not installed
10617| [60727] Microsoft Excel Excel file code execution
10618| [60724] Microsoft Windows Knowledge Base Article 2286198 update is not installed
10619| [60723] Microsoft Windows Knowledge Base Article 978886 update is not installed
10620| [60722] Microsoft Windows TCP/IP input buffer privilege escalation
10621| [60721] Microsoft WindowsTCP/IP IPv6 denial of service
10622| [60719] Microsoft Windows Knowledge Base Article 980436 update is not installed
10623| [60713] Microsoft Windows Knowledge Base Article 2183461 update is not installed
10624| [60712] Microsoft Internet Explorer uninitialized memory corruption code execution
10625| [60711] Microsoft Internet Explorer uninitialized memory corruption code execution
10626| [60710] Microsoft Internet Explorer race condition memory corruption code execution
10627| [60709] Microsoft Internet Explorer uninitialized memory corruption code execution
10628| [60708] Microsoft Internet Explorer uninitialized memory corruption code execution
10629| [60707] Microsoft Internet Explorer mouse information disclosure
10630| [60705] Microsoft Windows Knowledge Base Article 981852 update is not installed
10631| [60704] Microsoft Windows kernel ACL denial of service
10632| [60703] Microsoft Windows kernel errors privilege escalation
10633| [60702] Microsoft Windows kernel threads privilege escalation
10634| [60701] Microsoft Windows Knowledge Base Article 981997 update is not installed
10635| [60700] Microsoft Windows Movie Maker code execution
10636| [60698] Microsoft Windows Knowledge Base Article 2160329 update is not installed
10637| [60697] Microsoft Windows kernel-mode drivers window privilege escalation
10638| [60696] Microsoft Windows kernel-mode drivers input privilege escalation
10639| [60695] Microsoft Windows kernel-mode drivers memory privilege escalation
10640| [60694] Microsoft Windows kernel-mode drivers exception privilege escalation
10641| [60693] Microsoft Windows kernel-mode drivers denial of service
10642| [60692] Microsoft Windows Knowledge Base Article 982214 update is not installed
10643| [60691] Microsoft Windows SMB stack denial of service
10644| [60690] Microsoft Windows SMB variable denial of service
10645| [60689] Microsoft Windows SMB pool code execution
10646| [60688] Microsoft Windows Knowledge Base Article 982665 update is not installed
10647| [60687] Microsoft Windows Cinepak Codec code execution
10648| [60686] Microsoft Windows Knowledge Base Article 2115168 update is not installed
10649| [60685] Microsoft Windows MPEG Layer-3 Codecs code execution
10650| [60684] Microsoft Windows Knowledge Base Article 2079403 update is not installed
10651| [60683] Microsoft Windows XML Core Services (MSXML) code execution
10652| [60682] Microsoft Windows Knowledge Base Article 982799 update is not installed
10653| [60681] Microsoft Windows Tracing Feature privilege escalation
10654| [60680] Microsoft Windows Knowledge Base Article 2264072 update is not installed
10655| [60679] Microsoft Windows registry key ACL privilege escalation
10656| [60678] Microsoft Windows Service Isolation privilege escalation
10657| [60677] Microsoft Windows Knowledge Base Article 983539 update is not installed
10658| [60676] Microsoft Windows LSASS privilege escalation
10659| [60561] Microsoft Exchange Server Outlook Web Access cross-site request forgery
10660| [60522] Microsoft Clip Organizer ActiveX control denial of service
10661| [60478] A file containing Microsoft LNK data was detected
10662| [60422] Microsoft Windows .lnk file code execution
10663| [60164] Microsoft Exchange Server OWA cross-site request forgery
10664| [60156] Microsoft Word Word file code execution
10665| [60120] Microsoft Windows NtUserCheckAccessForIntegrityLevel() privilege escalation
10666| [60095] Microsoft Windows UpdateFrameTitleForDocument() buffer overflow
10667| [59974] Cisco ASA DTLS denial of service
10668| [59948] Microsoft Internet Explorer mshtml.dll information disclosure
10669| [59901] Microsoft Windows Knowledge Base Article 2229593 update is not installed
10670| [59898] Microsoft Windows Knowledge Base Article 2229593 update is not installed
10671| [59895] Microsoft Windows Knowledge Base Article 978212 update is not installed
10672| [59894] Microsoft Outlook SMB code execution
10673| [59891] Microsoft Windows Knowledge Base Article 982335 update is not installed
10674| [59889] Microsoft Office ActiveX control code execution
10675| [59768] Microsoft Internet Explorer IFRAME information disclosure
10676| [59447] Microsoft Windows Help and Support Center GetServerName cross-site scripting
10677| [59267] Microsoft Windows helpctr.exe command execution
10678| [59088] Microsoft Internet Explorer nntp:// URIs denial of service
10679| [59087] Microsoft Internet Explorer news:// URIs denial of service
10680| [59069] Microsoft Internet Explorer CSS expression denial of service
10681| [59060] Microsoft ASP.NET view state cross-site scripting
10682| [59057] Microsoft ASP.NET EnableViewStateMac cross-site scripting
10683| [59055] Microsoft ASP.NET InnerHtml property cross-site scripting
10684| [58954] Microsoft Dynamics GP password security bypass
10685| [58944] Microsoft Windows Knowledge Base Article 979902 update not installed
10686| [58943] Microsoft Windows MJPEG code execution
10687| [58942] Microsoft Windows media files code execution
10688| [58913] Microsoft Windows Knowledge Base Article 2027452 update is not installed
10689| [58912] Microsoft Excel Office XML privilege escalation
10690| [58911] Microsoft Excel ADO code execution
10691| [58910] Microsoft Excel string code execution
10692| [58909] Microsoft Excel stack code execution
10693| [58908] Microsoft Excel EDG code execution
10694| [58907] Microsoft Excel Excel code execution
10695| [58906] Microsoft Excel HFPicture code execution
10696| [58905] Microsoft Excel Excel file code execution
10697| [58904] Microsoft Excel RTD code execution
10698| [58903] Microsoft Excel Excel code execution
10699| [58902] Microsoft Excel format code execution
10700| [58901] Microsoft Excel chart sheet substreams code execution
10701| [58900] Microsoft Excel object buffer overflow
10702| [58899] Microsoft Excel record code execution
10703| [58891] Microsoft Windows Knowledge Base Article 2028554 update is not installed
10704| [58890] Microsoft SharePoint help page denial of service
10705| [58887] Microsoft Windows kernel-mode drivers TrueType privilege escalation
10706| [58885] Microsoft Windows Knowledge Base Article 980218 update is not installed
10707| [58884] Microsoft Windows OpenType Compact Font Format privilege escalation
10708| [58883] Microsoft Windows Knowledge Base Article 981343 update is not installed
10709| [58871] Microsoft Windows Knowledge Base Article 982381 update is not installed
10710| [58870] Microsoft Internet Explorer deleted object code execution
10711| [58869] Microsoft Internet Explorer IE8 Developer Toolbar code execution
10712| [58868] Microsoft Internet Explorer HTML element code execution
10713| [58867] Microsoft Internet Explorer object code execution
10714| [58866] Microsoft Internet Explorer toStaticHTML information disclosure
10715| [58865] Microsoft Windows Knowledge Base Article 982666 update is not installed
10716| [58864] Microsoft Internet Information Services (IIS) authentication code execution
10717| [58863] Microsoft Windows Knowledge Base Article 983235 update is not installed
10718| [58862] Microsoft Office COM code execution
10719| [58849] GnuTLS X.509 denial of service
10720| [58835] Microsoft Outlook Web Access (OWA) id cross-site scripting
10721| [58833] Microsoft Dynamics GP cipher information disclosure
10722| [58757] Microsoft Internet Explorer IFRAME element denial of service
10723| [58622] Microsoft Windows Canonical Display Driver (cdd.dll) code execution
10724| [58496] Microsoft Internet Explorer Invisible Hand extension information disclosure
10725| [58346] Microsoft Visio DXF buffer overflow
10726| [58345] Microsoft Windows SMTP Service query id spoofing
10727| [58344] Microsoft Windows SMTP Service DNS spoofing
10728| [58243] Microsoft Office SharePoint Server and Microsoft Windows SharePoint Services help.aspx cross-site scripting
10729| [58173] Microsoft Windows Knowledge Base Article 978542 update is not installed
10730| [58172] Microsoft Outlook Express and Windows Mail client integer overflow
10731| [58171] Microsoft Windows Knowledge Base Article 978213 update is not installed
10732| [58170] Microsoft Visual Basic for Applications (VBA) ActiveX control buffer overflow
10733| [58060] Microsoft Windows SfnINSTRING() privilege escalation
10734| [58059] Microsoft Windows SfnLOGONNOTIFY() denial of service
10735| [58044] Microsoft Internet Explorer filter cross-site scripting
10736| [57990] Microsoft Internet Explorer XML unspecified
10737| [57978] Microsoft wireless keyboard XOR weak security
10738| [57602] Miranda IM Use TLS weak security
10739| [57601] Microsoft Windows kernel exceptions denial of service
10740| [57600] Microsoft Windows kernel image file denial of service
10741| [57599] Microsoft Windows kernel path denial of service
10742| [57597] Microsoft Windows kernel registry keys denial of service
10743| [57596] Microsoft Windows kernel symbolic links denial of service
10744| [57595] Microsoft Windows kernel registry keys denial of service
10745| [57581] Microsoft Office Communicator SIP INVITE denial of service
10746| [57580] Microsoft Windows Knowledge Base Article 981210 update is not installed
10747| [57579] Microsoft Windows Cabinet File Viewer (cabview.dll) code execution
10748| [57578] Microsoft Windows WinVerifyTrust signature validation code execution
10749| [57401] Microsoft Internet Explorer data structures denial of service
10750| [57380] Microsoft Windows Knowledge Base Article 979683 update is not installed
10751| [57379] Microsoft Windows kernel symbolic link privilege escalation
10752| [57378] Microsoft Windows kernel memory privilege escalation
10753| [57377] Microsoft Windows Knowledge Base Article 979559 update is not installed
10754| [57376] Microsoft Windows kernel-mode drivers windows privilege escalation
10755| [57375] Microsoft Windows kernel-mode drivers objects privilege escalation
10756| [57374] Microsoft Windows Knowledge Base Article 977816 update is not installed
10757| [57373] Microsoft MPEG Layer-3 buffer overflow
10758| [57372] Microsoft Windows Knowledge Base Article 978338 update is not installed
10759| [57370] Microsoft Windows ISATAP IPv6 spoofing
10760| [57343] Microsoft Windows Knowledge Base Article 979402 update is not installed
10761| [57342] Microsoft Windows Media Player ActiveX control code execution
10762| [57341] Microsoft Windows Knowledge Base Article 980094 update is not installed
10763| [57340] Microsoft Visio index code execution
10764| [57339] Microsoft Visio attributes code execution
10765| [57338] Microsoft Internet Explorer 8 Developer Tools code execution
10766| [57337] Microsoft Windows Knowledge Base Article 980195 update is not installed
10767| [57336] Microsoft Windows Knowledge Base Article 980232 update is not installed
10768| [57335] Microsoft Windows SMB message code execution
10769| [57334] Microsoft Windows SMB transaction responses code execution
10770| [57333] Microsoft Windows SMB code execution
10771| [57332] Microsoft Windows SMB memory privilege escalation
10772| [57330] Microsoft Windows Knowledge Base Article 980858 update is not installed
10773| [57329] Microsoft Windows Media Services info packets buffer overflow
10774| [57328] Microsoft Windows Knowledge Base Article 981160 update is not installed
10775| [57327] Microsoft Office PublisherTextBox buffer overflow
10776| [57326] Microsoft Windows Knowledge Base Article 981169 update is not installed
10777| [57325] Microsoft Windows Knowledge Base Article 981832 update is not installed
10778| [57324] Microsoft Windows SMTP Service Simple Mail Transfer Protocol memory information disclosure
10779| [57323] Microsoft Windows SMTP Service and Microsoft Exchange SMTP DNS Mail Exchanger (MX) denial of service
10780| [57322] Microsoft Windows Knowledge Base Article 980182 update is not installed
10781| [57307] Microsoft Internet Explorer deleted object code execution
10782| [57306] Microsoft Internet Explorer URL code execution
10783| [57305] Microsoft Internet Explorer domain information disclosure
10784| [57304] Microsoft Internet Explorer HTML object code execution
10785| [57303] Microsoft Internet Explorer HTML object code execution
10786| [57302] Microsoft Internet Explorer deleted object code execution
10787| [57301] Microsoft Internet Explorer object code execution
10788| [57300] Microsoft Internet Explorer strings information disclosure
10789| [57299] Microsoft Internet Explorer object code execution
10790| [57269] Apple Mac OS X FreeRADIUS EAP-TLS security bypass
10791| [57205] Microsoft Windows Media Player .AVI code execution
10792| [57198] GnuTLS certificate revocation list (CRL) check buffer overflow
10793| [57197] Microsoft Internet Explorer unspecified code execution
10794| [57196] Microsoft Internet Explorer base address buffer overflow
10795| [57080] Miranda IM Use TLS weak security
10796| [56994] Microsoft Virtual PC and Microsoft Virtual Server Virtual Machine Monitor security bypass
10797| [56853] Microsoft Windows MS HTML Help ActiveX control (hhctrl.ocx) HtmlHelpA() code execution
10798| [56808] Microsoft Office AccWizObjects code execution
10799| [56772] Microsoft Internet Explorer use-after-free code execution
10800| [56756] Microsoft Windows .ani file denial of service
10801| [56651] Microsoft Internet Information Services DNS cross-site scripting
10802| [56597] Microsoft Sharepoint Upload.aspx cross-site scripting
10803| [56591] Microsoft Windows API denial of service
10804| [56560] Microsoft Windows winhlp32.exe buffer overflow
10805| [56558] Microsoft Windows MsgBox() code execution
10806| [56470] Microsoft Windows Knowledge Base Article 980150 update is not installed
10807| [56469] Microsoft Excel DbOrParamQry code execution
10808| [56468] Microsoft Excel XLSX code execution
10809| [56467] Microsoft Excel FNGROUPNAME code execution
10810| [56466] Microsoft Excel MDXSET buffer overflow
10811| [56465] Microsoft Excel MDXTUPLE buffer overflow
10812| [56464] Microsoft Excel object type code execution
10813| [56463] Microsoft Excel record memory code execution
10814| [56461] Microsoft Windows Knowledge Base Article 975561 update is not installed
10815| [56460] Microsoft Movie Maker and and Microsoft Producer buffer overflow
10816| [56435] Microsoft Windows Media Player .mpg denial of service
10817| [56431] Microsoft Internet Explorer CSS stylesheets information disclosure
10818| [56339] Cisco ASA 5500 WebVPN DTLS denial of service
10819| [56241] OpenOffice.org Microsoft Word file sprmTSetBrc buffer overflow
10820| [56240] OpenOffice.org Microsoft Word file sprmTDefTable buffer overflow
10821| [56218] Microsoft Windows DNS weak security
10822| [56093] Microsoft Internet Explorer URLMON security bypass
10823| [55935] Microsoft Windows Knowledge Base Article 975713 update is not installed
10824| [55934] Microsoft Windows Knowledge Base Article 978037 update is not installed
10825| [55933] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) privilege escalation
10826| [55932] Microsoft Windows Knowledge Base Article 978214 update is not installed
10827| [55931] Microsoft Office Office files buffer overflow
10828| [55930] Microsoft Windows Knowledge Base Article 977935 update is not installed
10829| [55929] Microsoft DirectShow AVI file buffer overflow
10830| [55928] Microsoft Windows Knowledge Base Article 978706 update is not installed
10831| [55927] Microsoft Paint JPEG integer overflow
10832| [55926] Microsoft Windows Knowledge Base Article 977894 update is not installed
10833| [55925] Microsoft Windows Hyper-V instruction set denial of service
10834| [55924] Microsoft Windows Knowledge Base Article 977377 update is not installed
10835| [55923] Microsoft Windows Knowledge Base Article 977290 update is not installed
10836| [55922] Microsoft Windows Kerberos Ticket-Granting-Ticket (TGT) denial of service
10837| [55921] Microsoft Windows Knowledge Base Article 977165 update is not installed
10838| [55920] Microsoft Windows kernel privilege escalation
10839| [55917] Microsoft Windows Knowledge Base Article 978262 update is not installed
10840| [55915] Microsoft Data Analyzer ActiveX Control code execution
10841| [55910] Microsoft Windows Knowledge Base Article 971468 update is not installed
10842| [55909] Microsoft Windows SMB NTLM privilege escalation
10843| [55908] Microsoft Windows SMB NULL denial of service
10844| [55907] Microsoft Windows SMB denial of service
10845| [55906] Microsoft Windows SMB pathname code execution
10846| [55900] Microsoft Internet Explorer createElement denial of service
10847| [55898] Microsoft Windows Knowledge Base Article 974145 update is not installed
10848| [55897] Microsoft Windows TCP/IP SACK denial of service
10849| [55896] Microsoft Windows TCP/IP Route Information code execution
10850| [55895] Microsoft Windows TCP/IP stack datagram code execution
10851| [55894] Microsoft Windows TCP/IP ICMPv6 code execution
10852| [55890] Microsoft Windows Knowledge Base Article 975416 update is not installed
10853| [55889] Microsoft PowerPoint ViewerTextCharsAtom buffer overflow
10854| [55888] Microsoft PowerPoint Viewer TextBytesAtom buffer overflow
10855| [55887] Microsoft PowerPoint OEPlaceholderAtom code execution
10856| [55886] Microsoft PowerPoint placementId code execution
10857| [55885] Microsoft PowerPoint LinkedSlideAtom buffer overflow
10858| [55884] Microsoft PowerPoint file path buffer overflow
10859| [55863] Microsoft Internet Explorer multiple unspecified denial of service
10860| [55779] Microsoft Windows Knowledge Base Article 978207 update is not installed
10861| [55778] Microsoft Internet Explorer object memory code execution
10862| [55777] Microsoft Internet Explorer uninitialized code execution
10863| [55776] Microsoft Internet Explorer deleted object code execution
10864| [55775] Microsoft Internet Explorer initialized memory code execution
10865| [55774] Microsoft Internet Explorer deleted object code execution
10866| [55773] Microsoft Internet Explorer URL code execution
10867| [55742] Microsoft Windows #GP trap handler privilege escalation
10868| [55680] Microsoft Windows Media Player ActiveX control code execution
10869| [55676] Microsoft Internet Explorer ActiveX Control code execution
10870| [55642] Microsoft Internet Explorer freed object code execution
10871| [55560] Microsoft Windows XP Flash Player code execution
10872| [55308] Microsoft Internet Information Services colon security bypass
10873| [55154] Microsoft Silverlight code execution
10874| [55153] Microsoft Windows Knowledge Base Article 978251 update is not installed
10875| [55152] Microsoft Windows Server Message Block client code execution
10876| [55151] Microsoft Windows Server Message Block pool code execution
10877| [55150] Microsoft Windows Knowledge Base Article 972270 update is not installed
10878| [55149] Microsoft Windows EOT font buffer overflow
10879| [55031] Microsoft Internet Information Services (IIS) filenames security bypass
10880| [54645] Microsoft Internet Explorer and Windows Media player Intel Indeo codec code execution
10881| [54644] Microsoft Internet Explorer and Windows Media player Intel Indeo codec code execution
10882| [54643] Microsoft Internet Explorer and Windows Media player Intel Indeo41 codec buffer overflow
10883| [54642] Microsoft Internet Explorer and Windows Media player Intel Indeo41 codec buffer overflow
10884| [54463] Microsoft Internet Explorer cross-site scripting filter information disclosure
10885| [54445] Microsoft Windows Knowledge Base Article 975539 update is not installed
10886| [54444] Microsoft WordPad and Office Text Converter Word 97 file code execution
10887| [54443] Microsoft Windows Knowledge Base Article 974392 update is not installed
10888| [54442] Microsoft Windows Local Security Authority Subsystem Service (LSASS) denial of service
10889| [54440] Microsoft Windows Knowledge Base Article 974318 update is not installed
10890| [54439] Microsoft Windows Internet Authentication Service (IAS) privilege escalation
10891| [54438] Microsoft Windows Internet Authentication Service (IAS) code execution
10892| [54427] Microsoft Windows Knowledge Base Article 971726 update is not installed
10893| [54426] Microsoft Windows Active Directory Federation Services (ADFS) code execution
10894| [54425] Microsoft Windows Active Directory Federation Services (ADFS) spoofing
10895| [54424] Microsoft Windows Knowledge Base Article 967183 update is not installed
10896| [54423] Microsoft Office Project project code execution
10897| [54422] Microsoft Windows Knowledge Base Article 976325 update is not installed
10898| [54421] Microsoft Internet Explorer deleted object code execution
10899| [54420] Microsoft Internet Explorer uninitialized object code execution
10900| [54418] Microsoft Internet Explorer uninitialized object code execution
10901| [54399] Microsoft Internet Explorer PDF information disclosure
10902| [54367] Microsoft Internet Explorer CSS/Style code execution
10903| [54317] Microsoft Internet Explorer setHomePage denial of service
10904| [54272] ngIRCd SSL/TLS denial of service
10905| [54217] Microsoft Windows KeAccumulateTicks() denial of service
10906| [54158] Transport Layer Security (TLS) handshake renegotiation weak security
10907| [54012] Microsoft Windows Knowledge Base Article 972652 update is not installed
10908| [54011] Microsoft Excel field code execution
10909| [54010] Microsoft Excel Excel records code execution
10910| [54009] Microsoft Excel Excel formulas code execution
10911| [54008] Microsoft Excel cell code execution
10912| [54007] Microsoft Excel BIFF records buffer overflow
10913| [54006] Microsoft Excel Featheader code execution
10914| [54005] Microsoft Excel SxView code execution
10915| [54004] Microsoft Excel cache code execution
10916| [53991] Microsoft Windows Knowledge Base Article 973309 update is not installed
10917| [53990] Microsoft Windows ADAM LDAP denial of service
10918| [53986] Microsoft Windows Knowledge Base Article 973565 update is not installed
10919| [53985] Microsoft Windows WSDAPI code execution
10920| [53981] Microsoft Windows Knowledge Base Article 974783 update is not installed
10921| [53980] Microsoft Windows 2000 License Logging Server buffer overflow
10922| [53977] Microsoft Windows Knowledge Base Article 976307 update is not installed
10923| [53976] Microsoft Word Word file code execution
10924| [53975] Microsoft Windows Knowledge Base Article 969947 update is not installed
10925| [53974] Microsoft Windows kernel font code execution
10926| [53973] Microsoft Windows kernel GDI privilege escalation
10927| [53972] Microsoft Windows kernel NULL pointer privilege escalation
10928| [53955] Microsoft SharePoint download feature information disclosure
10929| [53954] OpenLDAP tls_o.c security bypass
10930| [53936] ProFTPD mod_tls SSL certificate security bypass
10931| [53601] Microsoft Office 2008 for Mac user ID 502 security bypass
10932| [53551] Microsoft Windows Knowledge Base Article KB973525 update is not installed
10933| [53550] Microsoft Windows Knowledge Base Article 974112 update is not installed
10934| [53549] Microsoft Windows Media Player ASF file buffer overflow
10935| [53548] Microsoft Windows Knowledge Base Article 971486 update is not installed
10936| [53547] Microsoft Windows kernel exception handler denial of service
10937| [53546] Microsoft Windows kernel user mode privilege escalation
10938| [53545] Microsoft Windows kernel 64-bit truncation privilege escalation
10939| [53544] Microsoft Windows Knowledge Base Article 974455 update is not installed
10940| [53543] Microsoft Internet Explorer uninitialized object code execution
10941| [53542] Microsoft Internet Explorer uninitialized code execution
10942| [53541] Microsoft Windows Knowledge Base Article 969059 update is not installed
10943| [53540] Microsoft Windows Indexing Service ActiveX control code execution
10944| [53539] Microsoft Internet Explorer arguments code execution
10945| [53538] Microsoft Internet Explorer data stream headers code execution
10946| [53537] Microsoft Windows Knowledge Base Article 974571 update is not installed
10947| [53536] Microsoft Windows CryptoAPI ASN.1 spoofing
10948| [53535] Microsoft Windows CryptoAPI NULL spoofing
10949| [53534] Microsoft Windows Knowledge Base Article 975254 update is not installed
10950| [53533] Microsoft Windows Knowledge Base Article 957488 update is not installed
10951| [53532] Microsoft Office BMP image code execution
10952| [53531] Microsoft Windows GDI+ Microsoft Office file code execution
10953| [53530] Microsoft Windows GDI+ PNG image code execution
10954| [53529] Microsoft Windows GDI+ .NET Framework API code execution
10955| [53528] Microsoft Windows GDI+ TIFF image code execution
10956| [53527] Microsoft Windows GDI+ TIFF image buffer overflow
10957| [53526] Microsoft Windows GDI+ PNG image buffer overflow
10958| [53525] Microsoft Windows GDI+ WMF image code execution
10959| [53522] Microsoft Windows Knowledge Base Article 975517 update is not installed
10960| [53520] Microsoft Server Message Block (SMB) Protocol software command value code execution
10961| [53519] Microsoft Server Message Block (SMB) Protocol software denial of service
10962| [53517] Microsoft Windows Knowledge Base Article 975682 update is not installed
10963| [53516] Microsoft Windows Media Player audio files code execution
10964| [53514] Microsoft Windows Media Player ASF code execution
10965| [53512] Microsoft Windows Knowledge Base Article 975467 update is not installed
10966| [53511] Microsoft Windows Local Security Authority Subsystem Service (LSASS) denial of service
10967| [53417] Microsoft Internet KEYGEN denial of service
10968| [53414] Microsoft Internet window.print denial of service
10969| [53277] Wireshark TLS denial of service
10970| [53090] Microsoft Windows srv2.sys code execution
10971| [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
10972| [53005] Microsoft Internet Explorer window.open() spoofing
10973| [52948] Microsoft Windows Knowledge Base Article 973965 update is not installed
10974| [52926] Sophos PureMessage for Microsoft Exchange anti-virus and anti-spam unspecified vulnerability
10975| [52925] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe denial of service
10976| [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
10977| [52897] Microsoft Internet Explorer JavaScript code denial of service
10978| [52870] Microsoft Internet Explorer integer value denial of service
10979| [52780] Microsoft .NET Framework CLR code execution
10980| [52775] Microsoft Windows Knowledge Base Article 973812 update is not installed
10981| [52774] Microsoft Windows Media Format MP3 files code execution
10982| [52773] Microsoft Windows Media Format ASF files code execution
10983| [52771] Microsoft Windows Knowledge Base Article 971961 update is not installed
10984| [52770] Microsoft Windows Jscript code execution
10985| [52765] Microsoft Internet Explorer XML denial of service
10986| [52762] Microsoft Internet Explorer Unicode string denial of service
10987| [52722] Microsoft Internet Explorer DIV element denial of service
10988| [52590] Microsoft Internet Explorer JavaScript SetAttribute denial of service
10989| [52404] GnuTLS CN and SAN fields security bypass
10990| [52403] Microsoft Windows OpenType font engine denial of service
10991| [52249] Microsoft Internet Explorer mshtml.dll denial of service
10992| [52243] Microsoft IIS With .NET Path Disclosure
10993| [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
10994| [52240] Microsoft IIS Sample Application Physical Path Disclosure
10995| [52238] Microsoft FrontPage Server Extensions Vital Information Leakage
10996| [52237] Microsoft FrontPage Server Extensions To Do List Found
10997| [52236] Microsoft FrontPage Server Extensions Machine Name Disclosure
10998| [52235] Microsoft FrontPage Configuration Information Leakage
10999| [52234] Microsoft FrontPage '_vti_cnf' Information Leakage
11000| [52233] Microsoft IIS With .NET Path Disclosure
11001| [52137] Microsoft Windows Knowledge Base Article 969706 update is not installed
11002| [52131] Microsoft Windows Knowledge Base Article 972260 update is not installed
11003| [52128] Microsoft Windows Knowledge Base Article 967723 update is not installed
11004| [52127] Microsoft Windows TCP/IP orphaned connections denial of service
11005| [52126] Microsoft Windows TCP/IP timestamps code execution
11006| [52117] Microsoft Windows Knowledge Base Article 970927 update is not installed
11007| [52116] Microsoft Windows RDP Services Client ActiveX control buffer overflow
11008| [52115] Microsoft Windows Remote Desktop Connection RDP buffer overflow
11009| [52114] Microsoft Windows Knowledge Base Article 970957 update is not installed
11010| [52113] ASP.NET Framework component of Microsoft Windows HTTP denial of service
11011| [52111] Microsoft Windows Knowledge Base Article 969883 update is not installed
11012| [52110] Microsoft Windows Windows Internet Name Service (WINS) replication partner buffer overflow
11013| [52109] Microsoft Windows Windows Internet Name Service (WINS) replication buffer overflow
11014| [52108] Microsoft Windows Knowledge Base Article 960859 update is not installed
11015| [52107] Microsoft Windows Knowledge Base Article 971032 update is not installed
11016| [52106] Microsoft Message Queuing Service (MSMQ) IOCTL privilege escalation
11017| [52105] Microsoft Office Web Components ActiveX control buffer overflow
11018| [52104] Microsoft Windows telnet privilege escalation
11019| [52103] Microsoft Windows Knowledge Base Article 956844 update is not installed
11020| [52102] Microsoft Windows DHTML Editing Component ActiveX control code execution
11021| [52097] Microsoft Windows Knowledge Base Article 971557 update is not installed
11022| [52096] Microsoft Windows AVI validation integer overflow
11023| [52095] Microsoft Windows AVI code execution
11024| [52093] Microsoft Windows Knowledge Base Article 971657 update is not installed
11025| [52092] Microsoft Windows Workstation Service RPC message code execution
11026| [52089] Microsoft Windows Knowledge Base Article 973908 update is not installed
11027| [52087] Microsoft Active Template Library (ATL) variant code execution
11028| [52052] Microsoft Internet Explorer Active Template Library (ATL) ActiveX control killbit security bypass
11029| [52051] Microsoft Internet Explorer deleted objects code execution
11030| [52050] Microsoft Internet Explorer table operations code execution
11031| [52049] Microsoft Internet Explorer memory object code execution
11032| [52048] Microsoft Active Template Library (ATL) NULL string information disclosure
11033| [52047] Microsoft Active Template Library (ATL) object code execution
11034| [52044] Microsoft Active Template Library (ATL) header code execution
11035| [51637] Microsoft Internet Explorer AddFavorite buffer overflow
11036| [51636] Microsoft Windows Knowledge Base Article KB973346 update is not installed
11037| [51616] Microsoft Internet Explorer cached certificate weak security
11038| [51552] Microsoft Internet Explorer Refresh header cross-site scripting
11039| [51471] Microsoft Windows Knowledge Base Article 970811 update is not installed
11040| [51469] Microsoft Windows Knowledge Base Article 970710 update is not installed
11041| [51468] Microsoft Windows Wireless LAN AutoConfig service buffer overflow
11042| [51467] Microsoft ISA Server Radius One Time Password (OTP) privilege escalation
11043| [51465] Microsoft Windows Knowledge Base Article 969856 update is not installed
11044| [51464] Microsoft Virtual PC and Microsoft Virtual Server privilege escalation
11045| [51463] Microsoft Windows Knowledge Base Article 971633 update is not installed
11046| [51462] Microsoft Windows Knowledge Base Article 969516 update is not installed
11047| [51461] Microsoft DirectX DirectShow code execution
11048| [51460] Microsoft Publisher pointer dereference code execution
11049| [51458] Microsoft DirectX QuickTime code execution
11050| [51457] Microsoft Windows Knowledge Base Article 957638 update is not installed
11051| [51454] Microsoft Office Web Components ActiveX control buffer overflow
11052| [51452] Microsoft Office Web Components ActiveX control HTML code execution
11053| [51451] Microsoft Office Web Components ActiveX control code execution
11054| [51378] Microsoft Internet Explorer connect response weak security
11055| [51198] OpenSSL dtls1_retrieve_buffered_fragment function denial of service
11056| [51186] Microsoft Internet Explorer https security bypass
11057| [51097] Microsoft Windows atapi.sys privilege escalation
11058| [51034] Microsoft PowerPoint Freelance Windows buffer overflow
11059| [50973] Microsoft Windows Server 2003 and Vista win32k.sys denial of service
11060| [50903] Microsoft Windows SPI_SETDESKWALLPAPER SystemParametersInfo denial of service
11061| [50831] Microsoft DirectX quartz.dll code execution
11062| [50826] Microsoft Windows Knowledge Base Article 969898 update is not installed
11063| [50798] Microsoft Windows Knowledge Base Article 970238 update is not installed
11064| [50797] Microsoft Windows RPC Marshalling Engine code execution
11065| [50795] Microsoft Windows Knowledge Base Article 969514 update is not installed
11066| [50794] Microsoft Word Word file buffer overflow
11067| [50793] Microsoft Word Word file buffer overflow
11068| [50791] Microsoft Windows Knowledge Base Article 969462 update is not installed
11069| [50790] Microsoft Excel record pointer code execution
11070| [50789] Microsoft Excel record integer overflow
11071| [50788] Microsoft Excel field code execution
11072| [50787] Microsoft Excel string buffer overflow
11073| [50786] Microsoft Excel array indexing code execution
11074| [50785] Microsoft Excel object record code execution
11075| [50784] Microsoft Excel pointer code execution
11076| [50783] Microsoft Windows Knowledge Base Article 968537 update is not installed
11077| [50782] Microsoft Windows desktop parameter privilege escalation
11078| [50781] Microsoft Windows system call privilege escalation
11079| [50780] Microsoft Windows kernel pointer privilege escalation
11080| [50779] Microsoft Windows kernel kernel objects privilege escalation
11081| [50778] Microsoft Windows Knowledge Base Article 963093 update is not installed
11082| [50777] Microsoft Windows Search weak security
11083| [50776] Microsoft Windows Knowledge Base Article 969897 update is not installed
11084| [50775] Microsoft Internet Explorer HTML objects code execution
11085| [50774] Microsoft Internet Explorer HTML objects code execution
11086| [50773] Microsoft Internet Explorer HTML objects code execution
11087| [50772] Microsoft Internet Explorer object access code execution
11088| [50771] Microsoft Internet Explorer HTML code execution
11089| [50770] Microsoft Internet Explorer DHTML code execution
11090| [50769] Microsoft Internet Explorer cached data cross-domain security bypass
11091| [50768] Microsoft Windows Knowledge Base Article 970483 update is not installed
11092| [50767] Microsoft Windows Knowledge Base Article 971055 update is not installed
11093| [50766] Microsoft Windows Knowledge Base Article 961501 update is not installed
11094| [50765] Microsoft Windows Print Spooler service privilege escalation
11095| [50764] Microsoft Print Spooler service information disclosure
11096| [50763] Microsoft Windows Print Spooler service buffer overflow
11097| [50762] Microsoft Windows Knowledge Base Article 961371 update is not installed
11098| [50761] Microsoft Windows Active Directory LDAP denial of service
11099| [50760] Microsoft Windows Embedded OpenType (EOT) integer overflow
11100| [50759] Microsoft Windows 2000 Active Directory LDAP code execution
11101| [50758] Microsoft Windows EOT buffer overflow
11102| [50757] Microsoft Windows Knowledge Base Article 957632 update is not installed
11103| [50756] Microsoft Office Converter buffer overflow
11104| [50661] OpenSSL dtls1_retrieve_buffered_fragment denial of service
11105| [50578] OpenSSL DTLS messages denial of service
11106| [50577] OpenSSL DTLS epoch denial of service
11107| [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
11108| [50529] Apple Mac OS X Microsoft Office Spotlight Importer code execution variant 1
11109| [50494] Microsoft Internet Explorer utf-7 encoded characters cross-site scripting
11110| [50445] GnuTLS libgnutls denial of service
11111| [50425] Microsoft PowerPoint sound data code execution
11112| [50391] Microsoft Windows Media Player MID file denial of service
11113| [50354] McAfee GroupShield for Microsoft Exchange X- headers security bypass
11114| [50350] Microsoft Internet Explorer unprintable characters denial of service
11115| [50281] Microsoft Windows Knowledge Base Article 967340 update is not installed
11116| [50280] Microsoft PowerPoint atoms or data buffer overflow
11117| [50279] Microsoft PowerPoint notes buffer overflow
11118| [50278] Microsoft PowerPoint sound data buffer overflow
11119| [50277] Microsoft PowerPoint name strings buffer overflow
11120| [50276] Microsoft PowerPoint structures buffer overflow
11121| [50275] Microsoft PowerPoint string buffer overflow
11122| [50274] Microsoft PowerPoint sound PowerPoint 95 code execution
11123| [50273] Microsoft PowerPoint BuildList record code execution
11124| [50272] Microsoft PowerPoint sound data code execution
11125| [50271] Microsoft PowerPoint sound code execution
11126| [50270] Microsoft PowerPoint record types integer overflow
11127| [50269] Microsoft PowerPoint record header buffer overflow
11128| [50261] GnuTLS gnutls-cli spoofing
11129| [50260] GnuTLS DSA spoofing
11130| [50257] GnuTLS DSA code execution
11131| [50129] Microsoft Windows gdiplus.dll PNG denial of service
11132| [49888] Microsoft Intelligent Application Gateway Whale Client Components ActiveX control buffer overflow
11133| [49632] Microsoft PowerPoint index value code execution
11134| [49598] Microsoft Windows Knowledge Base Article 959426 update is not installed
11135| [49588] Microsoft Windows Knowledge Base Article 960477 update is not installed
11136| [49586] Microsoft Windows Knowledge Base Article 959454 update is not installed
11137| [49584] Microsoft Windows Threadpool ACL privilege escalation
11138| [49581] Microsoft Windows RPCSS privilege escalation
11139| [49578] Microsoft Windows WMI privilege escalation
11140| [49575] Microsoft Wordpad Word 97 buffer overflow
11141| [49573] Microsoft Office WordPerfect 6.x Converter code execution
11142| [49572] Microsoft WordPad and Office Text Converter file code execution
11143| [49570] Microsoft Windows Knowledge Base Article 961759 update is not installed
11144| [49569] Microsoft Windows Knowledge Base Article 960803 update is not installed
11145| [49567] Microsoft ISA Server and Microsoft Forefront TMG cookieauth.dll cross-site scripting
11146| [49566] Microsoft Windows HTTP services certificate spoofing
11147| [49564] Microsoft ISAServer and Microsoft Forefront TMG Web proxy TCP state denial of service
11148| [49562] Microsoft Windows HTTP services integer underflow
11149| [49560] Microsoft Windows Knowledge Base Article 961373 update is not installed
11150| [49559] Microsoft DirectShow MJPEG code execution
11151| [49558] Microsoft Windows Knowledge Base Article 963027 update is not installed
11152| [49557] Microsoft Internet Explorer uninitialized memory code execution
11153| [49555] Microsoft Internet Explorer deleted memory code execution
11154| [49554] Microsoft Internet Explorer uninitialized memory code execution
11155| [49552] Microsoft Internet Explorer page transition code execution
11156| [49549] Microsoft Internet Explorer WinINet code execution
11157| [49547] Microsoft Windows Knowledge Base Article 968557 update is not installed
11158| [49544] Microsoft Excel object code execution
11159| [49438] Microsoft Windows GDI+ EMF EmfPlusFont Object denial of service
11160| [49435] Microsoft Windows unlzh.c and unpack.c gzip code execution
11161| [49389] Microsoft Internet Explorer unspecified code execution
11162| [49109] OpenBSD and Microsoft Interix fts_build function denial of service
11163| [49107] FileZilla Server SSL/TLS denial of service
11164| [49079] Microsoft Windows DNS server memory leak denial of service
11165| [48960] TLS/SSL traffic over HTTP port 80 detected
11166| [48909] Microsoft Windows Knowledge Base Article 962238 update is not installed
11167| [48908] Microsoft Windows WINS server WPAD and ISATAP registration Web proxy spoofing
11168| [48907] Microsoft Windows DNS server WPAD registration Web proxy spoofing
11169| [48906] Microsoft Windows DNS server cache response spoofing
11170| [48905] Microsoft Windows DNS server query response spoofing
11171| [48875] Microsoft Excel unspecified code execution
11172| [48815] Microsoft XML Core Services HTTPOnly Set-Cookie2 HTTP response headers information disclosure
11173| [48595] Microsoft Word 2007 Email as PDF information disclosure
11174| [48542] Microsoft Internet Explorer onclick action click hijacking
11175| [48392] Microsoft Windows I/O information disclosure
11176| [48335] Microsoft Internet Explorer HTML form value denial of service
11177| [48326] Microsoft Windows Knowledge Base Article 960715 update is not installed
11178| [48312] Microsoft Windows Knowledge Base Article 959420 update is not installed
11179| [48311] Microsoft Windows Knowledge Base Article 961260 update not installed
11180| [48310] Microsoft Internet Explorer Cascading Style Sheets code execution
11181| [48309] Microsoft Internet Explorer CFunctionPointer code execution
11182| [48308] Microsoft Windows Knowledge Base Article 960225 update is not installed
11183| [48305] Microsoft Visio memory code execution
11184| [48303] Microsoft Visio object data copy code execution
11185| [48302] Microsoft Windows Knowledge Base Article 957634 update not installed
11186| [48301] Microsoft Windows Knowledge Base Article 958690 update is not installed
11187| [48300] Microsoft Windows kernel pointer validation privilege escalation
11188| [48299] Microsoft Windows kernel handle validation privilege escalation
11189| [48298] Microsoft Windows kernel GDI validation code execution
11190| [48296] Microsoft Visio object data validation code execution
11191| [48295] Microsoft Windows Knowledge Base Article 974378 update not installed
11192| [48294] Microsoft .NET Framework Type check code execution
11193| [48293] Microsoft .NET Framework CAS verification code execution
11194| [48189] Microsoft Windows AutoRun feature enabled
11195| [47868] Microsoft HTML Help Workshop .hhp buffer overflow
11196| [47867] Microsoft Windows .CHM file denial of service
11197| [47788] Microsoft Internet Explorer JavaScript onload=screen attribute denial of service
11198| [47774] Microsoft Internet Explorer Scripting.FileSystem security bypass
11199| [47760] Microsoft Windows Media Player WAV file code execution
11200| [47756] Microsoft Money prtstb06.dll ActiveX control denial of service
11201| [47738] Microsoft MSN Messenger IP address information disclosure
11202| [47676] Microsoft Windows Knowledge Base Article 958687 update not installed
11203| [47674] Microsoft Windows SMB NT Trans2 request code execution
11204| [47673] Microsoft Windows SMB NT Trans request buffer overflow
11205| [47672] Microsoft Windows Knowledge Base Article 959239 update not installed
11206| [47671] Microsoft Exchange Server EMSMDB2 invalid MAPI commands denial of service
11207| [47670] Microsoft Exchange Server TNEF decoding code execution
11208| [47664] Microsoft Windows Media Player WAV or SND file denial of service
11209| [47444] Microsoft Internet Explorer XDomainRequestAllowed header XSS filter bypass
11210| [47443] Microsoft Internet Explorer Location and Set-Cookie HTTP header XSS filter bypass
11211| [47442] Microsoft Internet Explorer X-XSS-Protection HTTP header XSS filter bypass
11212| [47441] Microsoft Internet Explorer Content-Type header XSS filter bypass
11213| [47428] Microsoft Windows Knowledge Base Article 960714 update is not installed
11214| [47277] Microsoft Internet Explorer CSS expression property XSS filter bypass
11215| [47246] Microsoft Wordpad Text Converter for Word 97 buffer overflow
11216| [47208] Microsoft Internet Explorer data binding code execution
11217| [47182] Microsoft SQL Server sp_replwritetovarbin() buffer overflow
11218| [46878] Microsoft Excel file record code execution
11219| [46870] Microsoft Windows Knowledge Base Article 959807 update is not installed
11220| [46869] Microsoft Windows Media Components ISATAP information disclosure
11221| [46868] Microsoft Windows Media Components SPN NTLM credentials code execution
11222| [46867] Microsoft Windows Knowledge Base Article 959349 update is not installed
11223| [46866] Microsoft Windows search-ms protocol code execution
11224| [46865] Microsoft Windows saved search file code execution
11225| [46864] Microsoft Windows Knowledge Base Article 959070 update is not installed
11226| [46863] Microsoft Excel NAME record code execution
11227| [46862] Microsoft Excel spreadsheet formula code execution
11228| [46861] Microsoft Windows Knowledge Base Article 958215 update not installed
11229| [46860] Microsoft Internet Explorer embedded object code execution
11230| [46859] Microsoft Internet Explorer deleted object code execution
11231| [46858] Microsoft Internet Explorer HTML objects uninitialized memory code execution
11232| [46857] Microsoft Internet Explorer parameter validation code execution
11233| [46856] Microsoft Windows Knowledge Base Article 957175 update is not installed
11234| [46854] Microsoft Office SharePoint access control privilege escalation
11235| [46853] Microsoft Windows Knowledge Base Article 957173 update not installed
11236| [46852] Microsoft Word document table property buffer overflow
11237| [46851] Microsoft Word RTF stylesheet control word buffer overflow
11238| [46850] Microsoft Word RTF group control word buffer overflow
11239| [46849] Microsoft Word RTF drawing object buffer overflow
11240| [46848] Microsoft Word RTF drawing object code execution
11241| [46847] Microsoft Word malformed value code execution
11242| [46846] Microsoft Word RTF polyline and polygon buffer overflow
11243| [46844] Microsoft Windows Knowledge Base Article 956802 update is not installed
11244| [46843] Microsoft Windows GDI WMF image file buffer overflow
11245| [46842] Microsoft Windows GDI WMF image file integer overflow
11246| [46742] Microsoft Windows Vista iphlpapi.dll buffer overflow
11247| [46695] Microsoft .NET Framework SN weak security
11248| [46673] Microsoft Communicator SIP INVITE message unspecified denial of service
11249| [46671] Microsoft Communicator emoticon unspecified denial of service
11250| [46670] Microsoft Communicator, Office Communications Server (OCS) and Windows Live Messenger RTCP unspecified denial of service
11251| [46628] Microsoft Active Directory username information disclosure
11252| [46590] Microsoft Sharepoint HTML document cross-site scripting
11253| [46506] Microsoft Windows UnhookWindowsHookEx() denial of service
11254| [46482] GnuTLS X509 name spoofing
11255| [46385] Microsoft Windows Media Player MIDI or DAT file denial of service
11256| [46309] Microsoft Debug Diagnostic Tool DebugDiag ActiveX control denial of service
11257| [46235] Microsoft Internet Explorer high-bit address bar spoofing
11258| [46234] Microsoft Internet Explorer non-breaking space address bar spoofing
11259| [46194] Microsoft Windows Knowledge Base Article 957097 update is not installed
11260| [46191] Microsoft Windows SMB NTLM credentials code execution
11261| [46190] Microsoft Windows Knowledge Base Article 932349 update is not installed
11262| [46189] Microsoft Visual Basic Charts ActiveX control code execution
11263| [46188] Microsoft Visual Basic Windows Common ActiveX control AVI buffer overflow
11264| [46187] Microsoft Visual Basic Hierarchical Flexgrid ActiveX control code execution
11265| [46183] Microsoft Visual Basic Flexgrid ActiveX control code execution
11266| [46178] Microsoft Visual Basic Datagrid ActiveX control code execution
11267| [46102] Microsoft Windows 2003 SP2 is not installed on the system
11268| [46101] Microsoft Windows 2003 SP1 is not installed on the system
11269| [46100] Microsoft Windows XP Service Pack 3 is not installed on the system
11270| [46099] Microsoft Windows XP Service Pack 1 is not installed on the system
11271| [46061] Microsoft Outlook Web Access (OWA) redir.asp phishing
11272| [46042] Microsoft Windows Knowledge Base Article 958644 update not installed
11273| [46040] Microsoft Windows Server Service RPC code execution
11274| [45857] Microsoft Windows Mobile HTC Hermes device security bypass
11275| [45854] Microsoft Internet Explorer script origin information disclosure
11276| [45746] Cisco Unity Microsoft API unspecified denial of service
11277| [45735] Microsoft PicturePusher ActiveX control file upload
11278| [45719] Microsoft Windows Vista page faults denial of service
11279| [45718] Microsoft Internet Explorer Extended HTML Form cross-site scripting
11280| [45639] Microsoft Internet Explorer alert function denial of service
11281| [45586] Microsoft Windows Knowledge Base Article 957280 update is not installed
11282| [45585] Microsoft Windows Active Directory LDAP search buffer overflow
11283| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
11284| [45582] Microsoft Windows Knowledge Base Article 956803 update is not installed
11285| [45581] Microsoft Windows Knowledge Base Article 956416 update is not installed
11286| [45580] Microsoft Excel REPT code execution
11287| [45579] Microsoft Excel spreadsheet BIFF file format buffer overflow
11288| [45578] Microsoft Windows Ancillary Function Driver privilege escalation
11289| [45572] Microsoft Windows Knowledge Base Article 9556841 update is not installed
11290| [45571] Microsoft Windows Memory Manager Virtual Address Descriptors privilege escalation
11291| [45566] Microsoft Excel calendar object code execution
11292| [45565] Microsoft Windows Knowledge Base Article 956390 update is not installed
11293| [45564] Microsoft Internet Explorer uninitialized memory code execution
11294| [45563] Microsoft Internet Explorer componentFromPoint() code execution
11295| [45562] Microsoft Internet Explorer event handling cross-domain security bypass
11296| [45561] Microsoft Windows Knowledge Base Article 957095 update is not installed
11297| [45560] Microsoft Windows SMB file name buffer underflow
11298| [45558] Microsoft Internet Explorer HTML cross-domain security bypass
11299| [45557] Microsoft Windows Knowledge Base Article 955218 update is not installed
11300| [45556] Microsoft IAS Helper COM ActiveX control denial of service
11301| [45555] Microsoft XML Core Services chunked transfer-encoding headers information disclosure
11302| [45554] Microsoft XML Core Services DTD information disclosure
11303| [45550] Microsoft Windows Knowledge Base Article 957699 update is not installed
11304| [45548] Microsoft Windows Knowledge Base Article 953155 update is not installed
11305| [45546] Microsoft Office Content-Disposition cdo:// protocol cross-site scripting
11306| [45545] Microsoft Windows Internet Printing Protocol code execution
11307| [45544] Microsoft Windows Knowledge Base Article 954211 update is not installed
11308| [45543] Microsoft Windows kernel input privilege escalation
11309| [45542] Microsoft Windows kernel system calls privilege escalation
11310| [45541] Microsoft Windows kernel new window privilege escalation
11311| [45538] Microsoft Windows Knowledge Base Article 951071 update is not installed
11312| [45537] Microsoft Message Queuing RPC code execution
11313| [45464] Microsoft Windows XP GDI+ .ICO denial of service
11314| [45463] Microsoft Windows Mobile bluetooth device name denial of service
11315| [45420] Microsoft WordPad .doc denial of service
11316| [45225] Microsoft Internet Explorer PNG file denial of service
11317| [45214] Microsoft Visio installed
11318| [45211] Microsoft Project installed
11319| [45209] Microsoft Windows Media Player installed
11320| [45208] Microsoft Office installed
11321| [45207] Microsoft Internet Explorer installed
11322| [45186] Microsoft SQL Server 2000 SQLVDIRLib.SQLVDirControl ActiveX control buffer overflow
11323| [45146] Microsoft Windows WRITE_ANDX SMB packet denial of service
11324| [45015] Microsoft Windows Image Aquisition Logger ActiveX control file overwrite
11325| [44993] Microsoft Organization Chart code execution
11326| [44775] PureMessage for Microsoft Exchange PMScanner.exe denial of service
11327| [44743] Microsoft ASP.NET ValidateRequest "
11328| [44741] Microsoft ASP.NET ValidateRequest "
11329| [44727] Microsoft Windows Knowledge Base Article 956391 update not installed
11330| [44716] Microsoft Windows Knowledge Base Article 954593 update not installed
11331| [44715] Microsoft Windows GDI+ BMP header buffer overflow
11332| [44714] Microsoft Windows GDI+ WMF buffer overflow
11333| [44713] Microsoft Windows GDI+ GIF index parsing buffer overflow
11334| [44711] Microsoft Windows GDI+ EMF code execution
11335| [44710] Microsoft Windows GDI+ VML gradient buffer overflow
11336| [44708] Microsoft Windows Knowledge Base Article 955047 update not installed
11337| [44707] Microsoft Office OneNote file Uniform Resource Locator code execution
11338| [44705] Microsoft Windows Knowledge Base Article 956695 update not installed
11339| [44704] Microsoft Host Integration Server SNA RPC code execution
11340| [44703] Microsoft Windows Knowledge Base Article 954156 update not installed
11341| [44700] Microsoft Windows Media Encoder wmex.dll ActiveX control buffer overflow
11342| [44625] Microsoft Windows ATL Load() code execution
11343| [44486] GnuTLS gnutls_handshake.c code execution
11344| [44444] Microsoft Visual Studio Masked Edit ActiveX control buffer overflow
11345| [44423] Microsoft Windows nslookup.exe code execution
11346| [44106] Microsoft Windows Knowledge Base Article 953839 update not installed
11347| [44099] Microsoft Windows Knowledge Base Article 953838 update not installed
11348| [44098] Microsoft Internet Explorer print preview argument code execution
11349| [44097] Microsoft Internet Explorer table layout code execution
11350| [44096] Microsoft Internet Explorer XHTML object code execution
11351| [44095] Microsoft Internet Explorer object access code execution
11352| [44094] Microsoft Internet Explorer uninitialized memory code execution
11353| [44093] Microsoft Internet Explorer uninitialized memory code execution
11354| [44092] Microsoft Windows Knowledge Base Article 954066 update not installed
11355| [44091] Microsoft Excel COUNTRY record value code execution
11356| [44090] Microsoft Excel FORMAT array index code execution
11357| [44089] Microsoft Excel chart AxesSet array index code execution
11358| [44088] Microsoft Excel credential caching unauthorized data access
11359| [44087] Microsoft Windows Knowledge Base Article 953733 update not installed
11360| [44086] Microsoft Windows IPSec policy information disclosure
11361| [44085] Microsoft Windows Knowledge Base Article 952954 update not installed
11362| [44084] Microsoft Image Color Management InternalOpenColorProfile() buffer overflow
11363| [44083] Microsoft Windows Knowledge Base Article 954154 update not installed
11364| [44082] Microsoft Windows Media Player sampling rate SSPL buffer overflow
11365| [44081] Microsoft Windows Knowledge Base Article 955048 update not installed
11366| [44080] Microsoft Windows Knowledge Base Article 955617 update not installed
11367| [44079] Microsoft Windows Knowledge Base Article 950974 update not installed
11368| [44078] Microsoft Event System index range code execution
11369| [44077] Microsoft Event System user subscriptions code execution
11370| [44069] Microsoft PowerPoint Viewer picture array index memory calculation code execution
11371| [44066] Microsoft PowerPoint Viewer CString object integer overflow
11372| [43950] Microsoft Internet Explorer cookie dot session hijacking
11373| [43869] F-PROT Antivirus Microsoft Office file denial of service
11374| [43676] Microsoft Internet Explorer frame String security bypass
11375| [43663] Microsoft Word record parsing code execution
11376| [43627] Microsoft Crypto API Certificate Revocation List (CRL) information disclosure
11377| [43613] Microsoft Snapshot Viewer ActiveX control code execution
11378| [43467] Microsoft Internet Explorer frame Object security bypass
11379| [43366] Microsoft Internet Explorer location and location.href security bypass
11380| [43354] Microsoft Office WPG image filter buffer overflow
11381| [43353] Microsoft Office BMP image filter buffer overflow
11382| [43352] Microsoft Office PICT bits_per_pixel buffer overflow
11383| [43340] Microsoft Windows Knowledge Base Article 950582 update not installed
11384| [43339] Microsoft Windows Explorer saved search file code execution
11385| [43336] Microsoft Windows Knowledge Base Article 953230 update not installed
11386| [43335] Microsoft Windows DNS Server cache poisoning
11387| [43330] Microsoft Windows Knowledge Base Article 953747 update not installed
11388| [43329] Microsoft Exchange Outlook Web Access HTML cross-site scripting
11389| [43328] Microsoft Exchange Outlook Web Access email fields cross-site scripting
11390| [43180] Microsoft Visual Basic Enterprise Edition vb6stkit.dll buffer overflow
11391| [43155] Microsoft Word unordered list code execution
11392| [42899] Microsoft IIS HTTP request smuggling
11393| [42887] Microsoft Windows Installer msiexec.exe GUID buffer overflow
11394| [42836] Cisco ASA and Cisco PIX Transport Layer Security (TLS) denial of service
11395| [42804] Microsoft Internet Explorer setRequestHeader chunk security bypass
11396| [42765] Apple Safari Microsoft Windows code execution
11397| [42701] Microsoft Windows Knowledge Base Article 950760 update not installed
11398| [42699] Microsoft Windows Vista speech recognition (sapi.dll) command execution
11399| [42697] Microsoft Windows Knowledge Base Article 950762 update not installed
11400| [42696] Microsoft Windows PGM fragment option denial of service
11401| [42695] Microsoft Windows PGM option length denial of service
11402| [42693] Microsoft Windows Knowledge Base Article 950759 update not installed
11403| [42692] Microsoft Internet Explorer substringData() buffer overflow
11404| [42691] Microsoft Windows Knowledge Base Article 949785 update not installed
11405| [42690] Microsoft PowerPoint list parsing code execution
11406| [42689] Microsoft Windows Knowledge Base Article 951066 update not installed bluetooth
11407| [42685] Microsoft Windows Knowledge Base Article 951376 update not installed
11408| [42684] Microsoft Windows Knowledge Base Article 948745 update not installed
11409| [42683] Microsoft WINS network packet source privilege escalation
11410| [42682] Microsoft Windows Bluetooth SDP code execution
11411| [42679] Microsoft Outlook Express MHTML information disclosure
11412| [42677] Microsoft Windows Knowledge Base Article 955702 update not installed
11413| [42676] Microsoft Windows Messenger ActiveX control information disclosure
11414| [42675] Microsoft Windows Knowledge Base Article 951698 update not installed
11415| [42674] Microsoft Windows DirectX SAMI buffer overflow
11416| [42672] Microsoft Windows Knowledge Base Article 953235 update not installed
11417| [42668] Microsoft Windows Active Directory LDAP request denial of service
11418| [42533] GnuTLS _gnutls_ciphertext2compressed() buffer overflow
11419| [42532] GnuTLS _gnutls_server_name_recv_params() buffer overflow
11420| [42530] GnuTLS _gnutls_recv_client_kx_message() denial of service
11421| [42416] Microsoft Internet Explorer "
11422| [42358] Microsoft Windows I2O Utility Filter driver (i2omgmt.sys) code execution
11423| [42338] Microsoft Internet Explorer res:// URI info disclosure
11424| [42334] Microsoft Windows CE JPEG and GIF code execution
11425| [42307] Microsoft Internet Explorer DisableCachingOfSSLPages weak security
11426| [42301] Microsoft OWA (Outlook Web Access) no-store information disclosure
11427| [42232] Microsoft Internet Explorer ActiveX string concatenation denial of service
11428| [42109] Microsoft Windows Knowledge Base Article 952044 update not installed
11429| [42108] Microsoft Malware Protection Engine data structure denial of service
11430| [42107] Microsoft Malware Protection Engine file denial of service
11431| [42103] Microsoft Windows Knowledge Base Article 951208 update not installed
11432| [42102] Microsoft Publisher object handler code execution
11433| [42101] Microsoft Windows Knowledge Base Article 951207 update not installed
11434| [42100] Microsoft Word malformed CSS code execution
11435| [42099] Microsoft Word .rtf string code execution
11436| [42095] Microsoft Windows Knowledge Base Article 950749 update not installed
11437| [41940] Microsoft HeartbeatCtl ActiveX control buffer overflow
11438| [41934] Microsoft SharePoint Services Picture Source cross-site scripting
11439| [41880] Microsoft Windows MSDTC privilege escalation
11440| [41876] Microsoft Works ActiveX control (WkImgSrv.dll) code execution
11441| [41826] Microsoft Visual InterDev .SLN file Project line buffer overflow
11442| [41481] Microsoft Windows Knowledge Base Article 945553 update not installed
11443| [41480] Microsoft Windows DNS client spoofing
11444| [41477] Microsoft Windows Knowledge Base Article 947864 update not installed
11445| [41476] Microsoft Internet Explorer data stream code execution
11446| [41473] Microsoft Windows Knowledge Base Article 948590 update not installed
11447| [41472] Microsoft Windows GDI EMF filename parameter buffer overflow
11448| [41471] Microsoft Windows GDI EMF and WMF header buffer overflow
11449| [41470] Microsoft Windows Knowledge Base Article 941693 update not installed
11450| [41469] Microsoft Windows kernel usermode privilege escalation
11451| [41465] Microsoft Windows Knowledge Base Article 948881 update not installed
11452| [41464] Microsoft Internet Explorer hxvz.dll object code execution
11453| [41463] Microsoft Windows Knowledge Base Article 941203 update not installed
11454| [41462] Microsoft SQL Server memory INSERT statement buffer overflow
11455| [41461] Microsoft SQL Server stored backup file data structure buffer overflow
11456| [41460] Microsoft SQL Server convert() buffer overflow
11457| [41459] Microsoft SQL Server memory page reuse information disclosure
11458| [41453] Microsoft Windows Knowledge Base Article 949032 update not installed
11459| [41452] Microsoft Visio file memory allocation code execution
11460| [41451] Microsoft Visio object header code execution
11461| [41448] Microsoft Windows Knowledge Base Article 950183 update not installed
11462| [41447] Microsoft Project file memory allocation code execution
11463| [41411] Microsoft Internet Explorer setRequestHeader security bypass
11464| [41380] Microsoft Jet Database Engine Word file buffer overflow
11465| [41349] Microsoft Windows AutoPlay NoDriveTypeAutoRun weak security
11466| [41338] Microsoft Internet Explorer CreateTextRange method denial of service
11467| [41147] Microsoft Internet Explorer FTP command execution
11468| [41057] Microsoft Internet Explorer Java and XML information disclosure
11469| [40937] Microsoft Windows Knowledge Base Article 815495 update not installed
11470| [40889] Microsoft Windows Knowledge Base Article 949030 update not installed
11471| [40888] Microsoft Office file allocation error code execution
11472| [40887] Microsoft Office Excel file cell parsing code execution
11473| [40886] Microsoft Windows Knowledge Base Article 949031 update not installed
11474| [40884] Microsoft Outlook mailto URI code execution
11475| [40879] Microsoft Windows Knowledge Base Article 949029 update not installed
11476| [40878] Microsoft Excel conditioning formatting code execution
11477| [40877] Microsoft Excel rich text code execution
11478| [40876] Microsoft Excel formula calcuation code execution
11479| [40875] Microsoft Excel Style record data code execution
11480| [40874] Microsoft Excel .slk file import code execution
11481| [40873] Microsoft Excel data validation code execution
11482| [40735] Microsoft Internet Explorer danim.dll and lmrt.dll unspecified
11483| [40693] Microsoft Windows Video Controller ActiveX Library for streaming video (msvidctl.dll) buffer overflow
11484| [40579] Microsoft Active Directory unspecified denial of service
11485| [40577] Microsoft Internet Explorer files denial of service
11486| [40400] Microsoft DirectSpeechSynthesis Module ActiveX control buffer overflow
11487| [40319] Microsoft Internet Explorer certificate spoofing
11488| [40316] Microsoft Works Converter section header index table information code execution
11489| [40314] Microsoft Publisher .pub invalid memory index code execution
11490| [40302] Microsoft MN-500 wireless base station configuration file information disclosure
11491| [40286] Microsoft Internet Explorer src attribute denial of service
11492| [40283] Microsoft Internet Explorer style attribute denial of service
11493| [40103] Microsoft Windows Knowledge Base Article 946538 update not installed
11494| [40102] Microsoft Windows Active Directory LDAP request denial of service
11495| [40101] Microsoft Windows Knowledge Base Article 947077 update not installed
11496| [40100] Microsoft Word malformed string code execution
11497| [40099] Microsoft Windows Knowledge Base Article 946456 update not installed
11498| [40098] Microsoft Windows Vista DHCP denial of service
11499| [40097] Microsoft Windows Knowledge Base Article 947081 update not installed
11500| [40096] Microsoft Works Converter field length information code execution
11501| [40095] Microsoft Works Converter section length header code execution
11502| [40094] Microsoft Windows Knowledge Base Article 947085 update not installed
11503| [40092] Microsoft Publisher .pub invalid memory reference code execution
11504| [40091] Microsoft Windows Knowledge Base Article 944533 update not installed
11505| [40090] Microsoft Internet Explorer argument data handling code execution
11506| [40089] Microsoft Internet Explorer property method code execution
11507| [40088] Microsoft Internet Explorer HTML layout positioning combination code execution
11508| [40087] Microsoft Internet Explorer multiple ActiveX control denial of service
11509| [40078] Microsoft Windows Knowledge Base Article 947108 update not installed
11510| [40066] Microsoft Word object code execution
11511| [40063] Microsoft Windows Knowledge Base Article 946026 update not installed
11512| [40062] Microsoft Windows WebDAV Mini-Redirector buffer overflow
11513| [40059] Microsoft Windows Knowledge Base Article 944338 update not installed
11514| [40056] Microsoft Windows VBScript and JScript engines code execution
11515| [40048] Microsoft Windows Knowledge Base Article 947890 update not installed
11516| [40043] Microsoft Windows OLE script request buffer overflow
11517| [39975] Microsoft Class Package Export Tool clspack.exe buffer overflow
11518| [39773] Microsoft Visual Basic Enterprise Edition .dsr file buffer overflow
11519| [39755] Microsoft Visual InterDev .SLN buffer overflow
11520| [39699] Microsoft Excel macro handling code execution
11521| [39637] OpenBSD SIOCGIFRTLABEL ioctls denial of service
11522| [39558] Microsoft FoxServer ActiveX control command execution
11523| [39557] Microsoft Rich Textbox ActiveX control file overwrite
11524| [39453] Microsoft Windows TCP/IP Source Specific Multicasting (SSM) MLDv2 buffer overflow
11525| [39452] Microsoft Windows TCP/IP Source Specific Multicasting (SSM) IGMPv3 buffer overflow
11526| [39254] Microsoft Windows TCP/IP ICMP denial of service
11527| [39238] Microsoft Windows Knowledge Base Article 941644 update not installed
11528| [39237] Microsoft Windows Knowledge Base Article 942831 update not installed
11529| [39236] Microsoft Windows Knowledge Base Article 943485 update not installed
11530| [39235] Microsoft IIS root folders file change notification privilege escalation
11531| [39233] Microsoft Windows LSASS LPC privilege escalation
11532| [39232] Microsoft Windows Knowledge Base Article 942830 update not installed
11533| [39230] Microsoft IIS HTML encoded ASP code execution
11534| [39209] Microsoft Word wordart denial of service
11535| [39208] Microsoft Office Publisher multiple denial of service
11536| [39161] Opera Web browser TLS certificate code execution
11537| [39113] Apple Mac OS X Microsoft Office Spotlight Importer code execution
11538| [39052] Microsoft Windows DirectX MJPEG decoder code execution
11539| [39021] Microsoft Office XML document weak security
11540| [38883] Microsoft Optical Desktop information disclosure
11541| [38865] Cisco Security Agent for Microsoft Windows SMB buffer overflow
11542| [38850] Microsoft Windows CryptGenRandom information disclosure
11543| [38830] Microsoft Windows Media File Format Stream Property error correction buffer overflow
11544| [38829] Microsoft Windows Media File Format Stream Property error correction and type-specific buffer overflow
11545| [38828] Microsoft Windows Media File Format audio_conceal_none buffer overflow
11546| [38827] Microsoft Windows Media File Format Degradable JPEG Media Stream buffer overflow
11547| [38826] Microsoft Internet Explorer WPAD information disclosure
11548| [38797] Microsoft Windows Media Player AIFF denial of service
11549| [38730] Microsoft Windows Knowledge Base Article 943078 update not installed
11550| [38729] Microsoft Windows Vista kernel ALPC privilege escalation
11551| [38728] Microsoft Windows Knowledge Base Article 944653 update not installed
11552| [38726] Microsoft Windows Knowledge Base Article 942624 update not installed
11553| [38725] Microsoft Windows Vista SMBv2 signing code execution
11554| [38723] Microsoft Windows Knowledge Base Article 941568 update not installed
11555| [38722] Microsoft DirectX DirectShow WAV and AVI code execution
11556| [38721] Microsoft DirectX DirectShow SAMI code execution
11557| [38717] Microsoft Windows Knowledge Base Article 942615 update not installed
11558| [38716] Microsoft Internet Explorer DHTML object code execution
11559| [38715] Microsoft Internet Explorer element tag code execution
11560| [38714] Microsoft Internet Explorer cloneNode and nodeValue code execution
11561| [38713] Microsoft Internet Explorer ActiveX setExpression code execution
11562| [38711] Microsoft Windows Knowledge Base Article 941569 update not installed
11563| [38499] Microsoft Jet Database Engine MDB file buffer overflow
11564| [38444] VTLS Web Gateway vtls.web.gateway.cgi cross-site scripting
11565| [38440] Microsoft Forms ActiveX control denial of service
11566| [38432] Microsoft SAFRCFileDlg.RASetting ActiveX control buffer overflow
11567| [38430] Microsoft Office Web Component OWC11.DataSourceControl ActiveX denial of service
11568| [38336] Microsoft Internet Explorer DNS same-origin policy security bypass
11569| [38324] Microsoft Outlook and Outlook Express URI handling command execution
11570| [38315] Microsoft Windows Knowledge Base Article 943460 update not installed
11571| [38292] Microsoft Sysinternals DebugView privilege escalation
11572| [37284] Microsoft Windows Macrovision secdrv.sys driver buffer overflow
11573| [37261] Microsoft Internet Explorer .exe file download warning bypass
11574| [37260] Cisco Adaptive Security Appliance (ASA) and PIX security appliances TLS denial of service
11575| [37249] Microsoft Windows Mobile SMS sender field obfuscation
11576| [37236] Microsoft SQL Slammer patch not installed
11577| [37230] Microsoft SQL Server MS00-092 patch not installed
11578| [37229] Microsoft SQL Server MS02-043 patch not installed
11579| [37228] Microsoft SQL Server MS02-034 patch not installed
11580| [37226] Microsoft Windows Knowledge Base Article 815495 update not installed
11581| [37223] Microsoft ActiveSync weak XOR encryption
11582| [37200] Microsoft SQL Server 2000 Service Pack 1 update is not installed
11583| [37198] Microsoft SQL Server 2000 Service Pack 3 update is not installed
11584| [37185] OpenSSL DTLS implementation code execution
11585| [37162] RHSA update for FreeRADIUS EAP-TTLS tunnel denial of service not installed
11586| [37044] Microsoft Expression Media password information disclosure
11587| [37035] Microsoft Visual FoxPro FPOLE.OCX ActiveX FoxDoCmd command execution
11588| [36980] Microsoft Windows Explorer PNG file denial of service
11589| [36965] Hitachi Cosminexus SSL/TLS handshake JSSE denial of service
11590| [36961] Microsoft Windows Explorer extended attributes multiple buffer overflows
11591| [36953] Microsoft DirectX Media SDK traffic detected
11592| [36848] Microsoft Internet Explorer OnKeyDown information disclosure
11593| [36819] Microsoft Windows Knowledge Base Article 939653 update not installed
11594| [36818] Microsoft Internet Explorer address bar spoofing
11595| [36817] Microsoft Internet Explorer script error code execution
11596| [36812] Microsoft Windows Knowledge Base Article 941202 update not installed
11597| [36811] Microsoft Outlook Express and Windows Mail NNTP response code execution
11598| [36807] Microsoft Windows Knowledge Base Article 933729 update not installed
11599| [36806] Microsoft Windows Knowledge Base Article 941672 update not installed
11600| [36805] Microsoft Windows DNS spoofing information disclosure
11601| [36804] Microsoft Windows Knowledge Base Article 942695 update not installed
11602| [36803] Microsoft Windows RPC NTLMSSP authentication denial of service
11603| [36801] Microsoft Word document workspace code execution
11604| [36800] Microsoft Windows Knowledge Base Article 923810 update not installed
11605| [36799] Microsoft Windows Kodak image Viewer code execution
11606| [36715] Microsoft Internet Security and Acceleration (ISA) Server SOCKS4 information disclosure
11607| [36676] Mozilla Firefox TLS certificate information disclosure
11608| [36662] Microsoft Windows Media Player meta file security bypass
11609| [36608] Microsoft Windows MFC ActiveX FindFile() buffer overflow
11610| [36572] Microsoft Visual Studio PDWizard ActiveX control code execution
11611| [36571] Microsoft Visual Studio VB To VSI Support Library ActiveX control file overwrite
11612| [36562] Microsoft Visual Basic .VBP file buffer overflow
11613| [36537] Microsoft MSN Messenger video request detected
11614| [36509] Microsoft SQL Server sqldmo.dll ActiveX buffer overflow
11615| [36496] Microsoft Visual FoxPro FPOLE.OCX ActiveX control buffer overflow
11616| [36494] Microsoft Internet Explorer saved pages cross-site scripting
11617| [36490] Microsoft Windows Knowledge Base Article 942099 update not installed
11618| [36455] HTML Microsoft Agent ActiveX detected
11619| [36381] Microsoft Windows Knowledge Base Article 939778 update not installed
11620| [36378] Microsoft Windows UNIX services setuid binary privilege escalation
11621| [36376] Microsoft Windows Knowledge Base Article 941522 update not installed
11622| [36351] Microsoft Internet Explorer with SeaMonkey command execution
11623| [36314] Microsoft MSN Messenger video conversations buffer overflow
11624| [36128] Microsoft Internet Explorer position:relative HTML style code denial of service
11625| [36027] Microsoft Internet Explorer ActiveX popup blocker denial of service
11626| [36003] Microsoft Internet Explorer Netscape command execution
11627| [35974] Microsoft Internet Explorer FTP username and password information disclosure
11628| [35970] Microsoft DirectX Media SDK DXSurface.LivePicture.FLashPix.1 (DXTLIPI.DLL) ActiveX control buffer overflow
11629| [35919] Microsoft Windows VML detected
11630| [35902] Microsoft Windows process scheduler denial of service
11631| [35897] Microsoft Windows Vista Weather Gadget code execution
11632| [35895] Microsoft Windows Media Player skin decompression code execution
11633| [35886] Microsoft Windows ARP request denial of service
11634| [35878] Microsoft Windows Media Player .AU file denial of service
11635| [35855] Microsoft Register Server DLL file denial of service
11636| [35853] Microsoft Windows Vista kernel unspecified vulnerability
11637| [35816] Microsoft Windows Knowledge Base Article 940965 update not installed
11638| [35815] Microsoft Excel index value attributes code execution
11639| [35802] Microsoft Windows Vista Calendar ICS denial of service
11640| [35771] Microsoft Windows Vista Contacts Gadget code execution
11641| [35770] Microsoft Windows Vista Feed Headlines Gadget code execution
11642| [35766] Microsoft Windows Knowledge Base Article 937894 update not installed
11643| [35764] Microsoft Message Queuing Service buffer overflow
11644| [35762] Microsoft Windows Knowledge Base Article 938127 update not installed
11645| [35761] Microsoft Windows VML vgx.dll buffer overflow
11646| [35760] Microsoft Windows Knowledge Base Article 937143 update not installed
11647| [35759] Microsoft Internet Explorer pdwizard.ocx code execution
11648| [35755] Microsoft Internet Explorer tblinf32.dll code execution
11649| [35753] Microsoft Windows Knowledge Base Article 938827 update not installed
11650| [35752] Microsoft Agent ActiveX control buffer overflow
11651| [35749] Microsoft Internet Explorer CSS string code execution
11652| [35746] Microsoft Windows Knowledge Base Article 938829 update not installed
11653| [35745] Microsoft Windows GDI WMF image code execution
11654| [35742] Microsoft Windows Knowledge Base Article 936782 update not installed
11655| [35741] Microsoft Windows Media Player skin parsing buffer overflow
11656| [35739] Microsoft Windows Knowledge Base Article 942017 update not installed
11657| [35582] Microsoft Windows URI protocol handling command execution
11658| [35538] Microsoft Windows Explorer GIF denial of service
11659| [35492] Microsoft DirectX Targa buffer overflow
11660| [35479] libcurl GnuTLS weak security
11661| [35455] Microsoft Internet Explorer Zone domain name denial of service
11662| [35421] Microsoft Internet Explorer document.open address bar spoofing
11663| [35397] Microsoft Windows Vista USER32.DLL denial of service
11664| [35346] Microsoft Internet Explorer FirefoxURL command execution
11665| [35333] Sun Java Secure Socket Extension (JSSE) SSL/TLS handshake denial of service
11666| [35322] Microsoft Windows Vista firewall information disclosure
11667| [35315] Microsoft Internet Explorer history.length information disclosure
11668| [35219] Microsoft Windows Knowledge Base Article 936542 update is not installed
11669| [35217] Microsoft Excel Workspace designation code execution
11670| [35216] Microsoft Windows Knowledge Base Article 933103 update not installed
11671| [35215] Microsoft Excel active worksheet code execution
11672| [35213] Microsoft Office Web Components DataSourceControl object code execution
11673| [35212] Microsoft Office Web Components Spreadsheet object code execution
11674| [35210] Microsoft Excel version code execution
11675| [35206] Microsoft Windows Knowledge Base Article 939373 update is not installed
11676| [35202] Microsoft Windows Knowledge Base Article 935807 update not installed
11677| [35199] Microsoft Windows Knowledge Base Article 936227 update not installed
11678| [35197] Microsoft Internet Information Services URL parser buffer overflow
11679| [35195] Microsoft XML Core Services (MSXML) memory request code execution
11680| [35190] Microsoft Windows Knowledge Base Article 936548 update not installed
11681| [35183] Microsoft Windows Knowledge Base Article 937986 update not installed
11682| [35182] Microsoft Virtual PC and Virtual Server guest operating system buffer overflow
11683| [35181] Microsoft Windows Knowledge Base Article 926122 update is not installed
11684| [35180] Microsoft Windows Active Directory LDAP denial of service
11685| [35179] Microsoft Windows Active Directory LDAP attribute buffer overflow
11686| [35163] Microsoft Internet Explorer file: URI information disclosure
11687| [35153] Microsoft Internet Explorer FTP implementation information disclosure
11688| [35132] Microsoft Excel sheet name buffer overflow
11689| [35064] Microsoft MSN Messenger SIP weak security
11690| [35059] Microsoft Windows TCP/IP Source Specific Multicasting (SSM) multiple buffer overflows
11691| [34989] Microsoft Internet Explorer resource:// information disclosure
11692| [34867] Microsoft Internet Explorer IDN authentication dialog spoofing
11693| [34849] Microsoft Office MSODataSourceControl ActiveX control buffer overflow
11694| [34755] Microsoft Internet Explorer Outlook Express Address Book object denial of service
11695| [34754] Microsoft Internet Explorer MSHtmlPopupWindow object denial of service
11696| [34743] Microsoft Windows GDI+ denial of service
11697| [34720] Microsoft FrontPage Personal Web Server CERN Image Map Dispatcher buffer overflow
11698| [34719] Microsoft FrontPage CERN Image Map Dispatcher information disclosure
11699| [34705] Microsoft Internet Explorer location URL spoofing
11700| [34696] Microsoft Internet Explorer page update cross-domain security bypass
11701| [34669] Linux kernel VFAT IOCTLs denial of service
11702| [34650] Microsoft Internet Explorer Javascript src attribute denial of service
11703| [34648] Microsoft Windows Knowledge Base Article 935839 update not installed
11704| [34645] Microsoft Windows Win32 API code execution
11705| [34642] Microsoft Windows Knowledge Base Article 935840 update not installed
11706| [34640] Microsoft Windows Knowledge Base Article 931212 update not installed .NET
11707| [34639] Microsoft .NET Framework JIT Compiler service buffer overflow
11708| [34638] Microsoft .NET Framework NULL byte termination information disclosure
11709| [34637] Microsoft .NET Framework PE Loader service buffer overflow
11710| [34634] Microsoft Windows Server 2003 Active Directory information disclosure
11711| [34633] Microsoft Windows Knowledge Base Article 933566 update not installed
11712| [34632] Microsoft Internet Explorer navigation cancel page spoofing
11713| [34630] Microsoft Internet Explorer Speech API ActiveX control code execution
11714| [34626] Microsoft Internet Explorer uninitialized object code execution
11715| [34624] Microsoft Windows Knowledge Base Article 929123 update not installed
11716| [34623] Microsoft Windows MHTML Content-Disposition information disclosure
11717| [34622] Microsoft Windows MHTML URL redirect information disclosure
11718| [34621] Microsoft Internet Explorer multiple language packs code execution
11719| [34619] Microsoft Internet Explorer CSS tag code execution
11720| [34618] Microsoft Windows Vista ACL user credentials information disclosure
11721| [34611] Microsoft Windows Knowledge Base Article 927051 update not installed
11722| [34610] Microsoft Visio compressed document packaging code execution
11723| [34607] Microsoft Visio version number code execution
11724| [34600] Microsoft VDT Database Designer VDT70.DLL ActiveX control buffer overflow
11725| [34599] Microsoft Windows Server 2003 terminal server security bypass
11726| [34564] PureTLS Extensions and Algorithm.Parameters value information disclosure
11727| [34476] Microsoft Visual Basic Company Name buffer overflow
11728| [34475] Microsoft Visual Basic project detail buffer overflow
11729| [34473] Microsoft Office 2000 ActiveX control buffer overflow
11730| [34444] Microsoft Windows unspecified code execution
11731| [34434] Microsoft IIS Hit-highlighting security bypass
11732| [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
11733| [34343] Microsoft SharePoint Server default.aspx PATH_INFO cross-site scripting
11734| [34032] Microsoft Windows Knowledge Base Article 935966 update not installed
11735| [33978] Microsoft Internet Explorer LF response splitting
11736| [33959] Microsoft Windows Virtual DOS Machine (VDM) VdmpInitialize privilege escalation
11737| [33916] Microsoft Windows Knowledge Base Article 934233 update not installed
11738| [33915] Microsoft Excel autofilter code execution
11739| [33914] Microsoft Excel placeholder data code execution
11740| [33913] Microsoft Excel BIFF file format buffer overflow
11741| [33909] Microsoft Windows Knowledge Base Article 934873 update not installed
11742| [33908] Microsoft Office drawing object code execution
11743| [33902] Microsoft Windows Knowledge Base Article 934232 update not installed
11744| [33901] Microsoft Word RTF parsing code execution
11745| [33899] Microsoft Word function call code execution
11746| [33891] Microsoft Windows Knowledge Base Article 931832 update not installed
11747| [33890] Microsoft Exchange IMAP command denial of service
11748| [33889] Microsoft Exchange MIME base64 code execution
11749| [33888] Microsoft Exchange iCal MODPROPS denial of service
11750| [33887] Microsoft Exchange UTF character set cross-site scripting
11751| [33715] Microsoft Internet Explorer unspecified JavaScript denial of service
11752| [33713] Microsoft Word 2007 multiple unspecified denial of service
11753| [33712] Microsoft Word 2007 wwlib.dll buffer overflow
11754| [33667] Microsoft Windows unspecified buffer overflow
11755| [33643] FreeRADIUS EAP-TTLS tunnel denial of service
11756| [33629] Microsoft Windows DNS Server RPC interface buffer overflow
11757| [33473] Microsoft Windows dynamic DNS update unauthorized access
11758| [33447] Microsoft security updates not available for version of Microsoft Data Access Components
11759| [33446] Microsoft security updates not available for Microsoft Internet Explorer version
11760| [33415] Microsoft Internet Explorer JavaScript DNS pinning code execution
11761| [33410] Microsoft Windows Vista LLTD Mapper host spoofing
11762| [33409] Microsoft Windows Vista LLTD Mapper bridge spoofing
11763| [33401] Microsoft Windows Vista LLTD Responder host spoofing
11764| [33399] Microsoft Windows Vista LLTD Mapper denial of service
11765| [33398] Microsoft Windows Vista Teredo address weak security
11766| [33396] Microsoft Windows Vista Meeting Space weak security
11767| [33395] Microsoft Windows Vista nonce spoofing
11768| [33394] Microsoft Windows Vista Neighbor Advertisements spoofing
11769| [33393] Microsoft Windows Vista ARP denial of service
11770| [33355] Microsoft Internet Explorer msauth.dll code execution
11771| [33317] Microsoft Internet Explorer UTF-7 encoded URL cross-site scripting
11772| [33301] Microsoft Windows animated cursor (ANI) buffer overflow
11773| [33300] Microsoft Windows Vista atikmdag.sys slideshow denial of service
11774| [33272] Microsoft Windows Vista CSRSS CsrFinalizeContext privilege escalation
11775| [33271] Microsoft Windows Knowledge Base Article 931784 update not installed
11776| [33270] Microsoft Windows kernel VDM mapped memory privilege escalation
11777| [33269] Microsoft Windows Knowledge Base Article 931261 update not installed
11778| [33268] Microsoft Windows Universal Plug and Play HTTP buffer overflow
11779| [33267] Microsoft Windows Knowledge Base Article 932168 update not installed
11780| [33266] Microsoft Windows Knowledge Base Article 925902 update not installed
11781| [33265] Microsoft Agent ActiveX control Character.Load() code execution
11782| [33264] Microsoft Windows TrueType Fonts rasterizer privilege escalation
11783| [33263] Microsoft Windows GDI color parameter buffer overflow
11784| [33261] Microsoft Windows GDI window size privilege escalation
11785| [33259] Microsoft Windows GDI EMF image buffer overflow
11786| [33258] Microsoft Windows GDI WMF image denial of service
11787| [33257] Microsoft Windows Knowledge Base Article 931768 update not installed
11788| [33256] Microsoft Internet Explorer HTML object freed memory code execution variant
11789| [33255] Microsoft Internet Explorer HTML object freed memory code execution
11790| [33254] Microsoft Internet Explorer CSS text style code execution
11791| [33253] Microsoft Internet Explorer HTML object uninitialized array member code execution
11792| [33252] Microsoft Internet Explorer chtskdic.dll COM object code execution
11793| [33244] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) information disclosure
11794| [33225] Microsoft Windows Media File Format ASF multiple buffer overflows
11795| [33167] Microsoft Windows Vista Mail Client code execution
11796| [33118] Microsoft Windows XP winmm.dll denial of service
11797| [33117] Microsoft Windows MFC AfxOleSetEditMenu() buffer overflow
11798| [33086] Microsoft Windows Ndistapi.sys driver denial of service
11799| [33071] Tor TLS weak security
11800| [33041] Microsoft Excel XML and XLS file denial of service
11801| [33039] Microsoft Office WMF file denial of service
11802| [33037] Microsoft Windows Explorer WMF file denial of service
11803| [32939] Microsoft Internet Explorer resizeTo denial of service
11804| [32921] Microsoft Windows ole32.dll library denial of service
11805| [32907] Microsoft Xbox 360 hypervisor code execution
11806| [32906] Microsoft Xbox 360 hypervisor security bypass
11807| [32831] Microsoft Internet Explorer BrowseDialog ActiveX control denial of service
11808| [32808] Microsoft Windows Shell User Logon ActiveX control shgina.dll unauthorized access
11809| [32769] Microsoft Publisher .pub file memory validation code execution
11810| [32740] Microsoft Windows Knowledge Base Article 931906 update not installed
11811| [32739] Microsoft Capicom Certificates ActiveX control code execution
11812| [32738] Microsoft Windows Knowledge Base Article 925939 update not installed
11813| [32737] Microsoft Content Management Server (MCMS) HTTP request cross-site scripting
11814| [32736] Microsoft Content Management Server (MCMS) HTTP GET code execution
11815| [32689] Putmail TLS password plaintext
11816| [32649] Microsoft Internet Explorer onUnload handler URL spoofing
11817| [32647] Microsoft Internet Explorer onUnload handler denial of service
11818| [32644] Microsoft Windows ReadDirectoryChangesW information disclosure
11819| [32631] Microsoft SQL Server 2000 Service Pack 2 update is not installed
11820| [32503] Microsoft Word document malformed string code execution
11821| [32457] Microsoft Internet Explorer getElementById denial of service
11822| [32454] Microsoft Visual Studio time functions denial of service
11823| [32427] Microsoft Internet Explorer COM ActiveX object code execution
11824| [32419] Microsoft Windows Knowledge Base Article 932554 update not installed
11825| [32404] Microsoft Knowledge Base Article 905495 is not installed
11826| [32403] Microsoft Knowledge Base Article 905414 is not installed
11827| [32394] Microsoft Windows Mobile Internet Explorer WML page denial of service
11828| [32355] RHSA-2006:0680 updates for gnutls not installed
11829| [32282] Microsoft Windows Knowledge Base Article 927802 update not installed
11830| [32280] Microsoft Windows Image Acquisition service buffer overflow
11831| [32210] RHSA-2006:0207 updates for gnutls not installed
11832| [32178] Microsoft Office Excel malformed record code execution
11833| [32153] Microsoft Windows permanent password detected
11834| [32116] Microsoft Windows administrator password no expiration set
11835| [32111] Microsoft Windows Knowledge Base Article 928255 update not installed
11836| [32110] Microsoft Windows Knowledge Base Article 928843 update not installed
11837| [32109] Microsoft Windows HTML Help ActiveX control code execution
11838| [32108] Microsoft Windows shell new hardware detection privilege escalation
11839| [32107] Microsoft Windows Knowledge Base Article 928090 update not installed
11840| [32106] Microsoft Internet Explorer COM object code execution
11841| [32104] Microsoft Windows Knowledge Base Article 929434 update not installed
11842| [32100] Microsoft Internet Explorer FTP response code execution
11843| [32097] Microsoft Word drawing object code execution
11844| [32096] Microsoft Word macro code execution
11845| [32095] Microsoft Internet Explorer COM object code execution
11846| [32090] Microsoft Windows Knowledge Base Article 927779 update not installed
11847| [32089] Microsoft Fronpage Extensions directory /_vti_log/ present
11848| [32078] Microsoft Fronpage Extensions directory /_vti_bin/ present
11849| [32076] Microsoft Frontpage Extensions directory /_vti_pvt/ present
11850| [32074] Microsoft IIS iissamples directory present
11851| [32071] Microsoft Windows Explorer AVI file denial of service
11852| [32002] Microsoft Windows Mobile Pictures and Videos JPEG denial of service
11853| [32001] Microsoft Windows Mobile Internet Explorer unspecified denial of service
11854| [31867] Microsoft Internet Explorer ActiveX multiple properties denial of service
11855| [31845] Microsoft Windows user account never used
11856| [31844] Microsoft Windows guest user account unchanged
11857| [31843] Microsoft Windows built-in guest account enumerated
11858| [31842] Microsoft Windows user account password unchanged
11859| [31840] Microsoft Exchange Server detected
11860| [31834] Microsoft Word document function code execution
11861| [31821] Microsoft Windows time zone update for year 2007
11862| [31814] Microsoft Internet Explorer IFRAME file URI denial of service
11863| [31675] Microsoft Internet Explorer BrowseDialog ActiveX control denial of service
11864| [31665] Microsoft Visual Studio .rc file buffer overflow
11865| [31644] Microsoft IIS Web server access.cnf file detected
11866| [31643] Microsoft HTML Help Workshop .HPJ files buffer overflow
11867| [31642] Microsoft IIS Web server service.cnf file detected
11868| [31638] Microsoft IIS Web server svcacl.cnf file detected
11869| [31630] Microsoft Internet Information Services IISAdmin directory detected
11870| [31567] Cisco CS-MARS and ASDM SSL/TLS/SSH device spoofing
11871| [31555] Microsoft HTML Help Workshop .CNT files buffer overflow
11872| [31549] Microsoft Internet Explorer CCRP Folder Treeview ActiveX control denial of service
11873| [31358] Microsoft XML Core Services IFRAME code execution
11874| [31288] Microsoft Windows Knowledge Base Article 929969 update not installed
11875| [31287] Microsoft Internet Explorer VML record buffer overflow
11876| [31264] Microsoft Windows Knowledge Base Article 930178 update not installed
11877| [31210] Microsoft Windows Knowledge Base Article 927198 update is not installed
11878| [31208] Microsoft Excel Palette record buffer overflow
11879| [31207] Microsoft Excel column record buffer overflow
11880| [31206] Microsoft Excel string buffer overflow
11881| [31205] Microsoft Excel malformed record buffer overflow
11882| [31204] Microsoft Excel IMDATA record buffer overflow
11883| [31199] Microsoft Windows Knowledge Base Article 921585 update is not installed
11884| [31196] Microsoft Office 2003 Brazilian Grammar Checker buffer overflow
11885| [31191] Microsoft Windows Knowledge Base Article 925938 update is not installed
11886| [31188] Microsoft Outlook Finder.exe .oss file buffer overflow
11887| [31187] Microsoft Outlook email long header denial of service
11888| [31186] Microsoft Outlook .iCal meeting request VEVENT buffer overflow
11889| [31176] Microsoft Windows CSRSS NtRaiseHardError() information disclosure
11890| [31127] Microsoft Antivirus engine pdf buffer overflow
11891| [31085] Microsoft Windows Workstation service NetrWkstaUserEnum denial of service
11892| [31018] Microsoft Windows CSRSS MessageBox function privilege escalation
11893| [31015] Microsoft Windows Explorer WMV file denial of service
11894| [31014] Microsoft Windows Media Player MIDI file denial of service
11895| [31011] Microsoft Internet Information Services IUSR_Machine command execution
11896| [31008] Microsoft Windows XP directory weak permission
11897| [30959] Microsoft Outlook ole32.dll ActiveX denial of service
11898| [30905] Microsoft Project Server 2003 pdsrequest.asp information disclosure
11899| [30885] Microsoft Word pointer code execution
11900| [30806] Microsoft Word data structure code execution
11901| [30757] Microsoft Windows Knowledge Base Article 926121 update not installed
11902| [30756] Microsoft Windows Remote Installation Service code execution
11903| [30738] Microsoft Word data string code execution
11904| [30717] Microsoft Windows Print Spooler denial of service
11905| [30610] Microsoft Windows Knowledge Base Article 926436 update not installed
11906| [30609] Microsoft OLE Dialog component code execution
11907| [30608] Microsoft Windows Knowledge Base Article 926255 update not installed
11908| [30607] Microsoft Windows file manifest privilege escalation
11909| [30606] Microsoft Windows Knowledge Base Article 926247 update not installed
11910| [30605] Microsoft Windows SNMP service buffer overflow
11911| [30604] Microsoft Windows Knowledge Base Article 925454 update not installed
11912| [30603] Microsoft Internet Explorer TIF folder OBJECT tag information disclosure
11913| [30602] Microsoft Internet Explorer TIF folder drag and drop information disclosure
11914| [30601] Microsoft Internet Explorer DHTML script code execution
11915| [30600] Microsoft Internet Explorer script error handling code execution
11916| [30599] Microsoft Windows Knowledge Base Article 924667 update not installed
11917| [30598] Microsoft Windows and Visual Studio MFC components RTF code execution
11918| [30597] Microsoft Windows Knowledge Base Article 923723 update not installed
11919| [30596] Microsoft Step-by-Step Interactive Training bookmark link buffer overflow
11920| [30595] Microsoft Windows Knowledge Base Article 923689 update not installed
11921| [30594] Microsoft Windows Media Player ASF processing buffer overflow
11922| [30593] Microsoft Windows Knowledge Base Article 918118 update not installed
11923| [30592] Microsoft Windows and Office Rich Edit components code execution
11924| [30591] Microsoft Windows Knowledge Base Article 925674 update not installed
11925| [30586] Microsoft Windows Media Player ASX playlist buffer overflow
11926| [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
11927| [30553] Microsoft Windows Live Messenger emoticon denial of service
11928| [30220] Microsoft Internet Explorer Phishing Filter active
11929| [30172] Microsoft Windows Knowledge Base Article 928088 update not installed
11930| [30168] Microsoft Internet Explorer ieframe.dll certificate spoofing
11931| [30042] Microsoft Windows GDI kernel privilege escalation
11932| [30004] Microsoft XMLHTTP ActiveX control code execution
11933| [29954] Microsoft Windows Knowledge Base Article 923980 update not installed
11934| [29953] Microsoft Windows Client Service for NetWare (CSNW) denial of service
11935| [29952] Microsoft Windows Client Service for NetWare (CSNW) buffer overflow
11936| [29950] Microsoft Windows Knowledge Base Article 920213 update is not installed
11937| [29949] Microsoft Windows Knowledge Base Article 924270 update not installed
11938| [29948] Microsoft Windows Workstation service NetpManageIPCConnect buffer overflow
11939| [29945] Microsoft Agent .ACF file buffer overflow
11940| [29943] Microsoft Windows Knowledge Base Article 923789 update not installed
11941| [29917] Microsoft Windows XP NAT Helper ipnathlp.dll denial of service
11942| [29915] Microsoft Visual Studio WmiScriptUtils.dll code execution
11943| [29860] Microsoft .NET Framework request filtering insecure
11944| [29837] Microsoft Internet Explorer ADODB.Connection code execution
11945| [29827] Microsoft Internet Explorer Popup Address bar spoofing
11946| [29750] Microsoft Active Directory unauthorized login attempt rejected
11947| [29749] Microsoft Active Directory security audit setup failed
11948| [29748] Microsoft Active Directory security attributes changed
11949| [29747] Microsoft Active Directory Security Descriptor Propagator terminated
11950| [29746] Microsoft Active Directory addition of replication link success
11951| [29745] Microsoft Active Directory addition of replication link failed
11952| [29744] Microsoft Active Directory replication connection created
11953| [29742] Microsoft Active Directory object operation performed
11954| [29741] Microsoft Active Directory outbound replication disabled
11955| [29740] Microsoft Active Directory host not global catalog server
11956| [29737] Microsoft Active Directory maximum LDAP connections reached
11957| [29736] Microsoft Active Directory inbound replication disabled
11958| [29735] Microsoft Active Directory calculate security descriptor failed
11959| [29733] Microsoft Active Directory write security descriptor failed
11960| [29731] Microsoft Active Directory object operation failed
11961| [29730] Microsoft Active Directory right grant attempt failed
11962| [29729] Microsoft Active Directory domain controller removal failed
11963| [29728] Microsoft Active Directory SID inherit attempt failed
11964| [29726] Microsoft Active Directory domain removed from enterprise
11965| [29725] Microsoft Active Directory database initialization failure
11966| [29724] Microsoft Active Directory certificate rejected, not trusted
11967| [29722] Microsoft Active Directory certificate replication access rejected
11968| [29713] Microsoft Internet Information Server MS01-026 patch is not installed
11969| [29680] Microsoft Internet Information Server MS01-044 patch is not installed
11970| [29670] Microsoft Internet Explorer 7 is installed
11971| [29546] Microsoft Windows 2000/2003 user logoff initiated
11972| [29545] Microsoft Windows 2000/2003 system time changed
11973| [29544] Microsoft Windows 2000/2003 system security access removed
11974| [29543] Microsoft Windows 2000/2003 security access granted
11975| [29542] Microsoft Windows 2000/2003 SAM notification package loaded
11976| [29541] Microsoft Windows 2000/2003 primary security token issued
11977| [29540] Microsoft Windows 2000/2003 user password reset successful
11978| [29539] Microsoft Windows 2000/2003 object indirectly accessed
11979| [29538] Microsoft Windows 2000/2003 object handle duplicated
11980| [29537] Microsoft Windows 2000/2003 logon with explicit credentials success
11981| [29536] Microsoft Windows 2000/2003 logon attempt using explicit credentials unsuccessful
11982| [29535] Microsoft Windows 2000/2003 IPSEC policy agent failed
11983| [29534] Microsoft Windows 2000/2003 IPSEC policy agent disabled
11984| [29533] Microsoft Windows 2000/2003 IPSEC policy agent changed
11985| [29532] Microsoft Windows 2000/2003 IKE security association established
11986| [29531] Microsoft Windows 2000/2003 IKE quick mode association ended
11987| [29530] Microsoft Windows 2000/2003 IKE main mode association ended
11988| [29529] Microsoft Windows 2000/2003 IKE association negotiation failed
11989| [29528] Microsoft Windows 2000/2003 IKE association peer authentication failed
11990| [29527] Microsoft Windows 2000/2003 IKE association failed invalid proposal
11991| [29526] Microsoft Windows 2000/2003 IKE association failed authentication parameters
11992| [29525] Microsoft Windows 2000/2003 DPAPI master key backup attempted
11993| [29524] Microsoft Windows 2000/2003 DPAPI key recovery attempted
11994| [29523] Microsoft Windows 2000/2003 DPAPI auditable data unprotected
11995| [29522] Microsoft Windows 2000/2003 administrative group security descriptor set
11996| [29521] Microsoft Windows 2000/2003 account name changed
11997| [29507] Microsoft Office 2003 unspecified PowerPoint NULL pointer dereference denial of service
11998| [29400] Microsoft Windows drmstor.dll denial of service
11999| [29373] Microsoft Windows SMB rename denial of service
12000| [29369] Microsoft Windows Knowledge Base Article 922819 update is not installed
12001| [29253] Microsoft Windows error report transmission detected
12002| [29243] Microsoft Windows Knowledge Base Article 924164 update is not installed
12003| [29242] Microsoft Excel COLINFO code execution
12004| [29239] Microsoft Excel Lotus 1-2-3 file buffer overflow
12005| [29238] Microsoft Excel DATETIME buffer overflow
12006| [29236] Microsoft Windows Knowledge Base Article 924163 update is not installed
12007| [29234] Microsoft PowerPoint bit record code execution
12008| [29233] Microsoft PowerPoint data record code execution
12009| [29232] Microsoft PowerPoint object pointer code execution
12010| [29229] Microsoft Windows Knowledge Base Article 923694 update not installed
12011| [29227] Microsoft Outlook Express Windows Address Book (WAB) buffer overflow
12012| [29226] Microsoft Windows Knowledge Base Article 924554 update is not installed
12013| [29225] Microsoft PowerPoint unspecified .ppt file code execution
12014| [29224] Microsoft Word mail merge file code execution
12015| [29216] Microsoft Office Smart Tag code execution
12016| [29215] Microsoft Word malformed string code execution
12017| [29214] Microsoft Windows Knowledge Base Article 922581 update is not installed
12018| [29213] Microsoft Office malformed record code execution
12019| [29212] Microsoft Office malformed chart record code execution
12020| [29211] Microsoft Windows Knowledge Base Article 924191 update is not installed
12021| [29210] Microsoft XML Core Services XLST buffer overflow
12022| [29209] Microsoft Office malformed string code execution
12023| [29208] Microsoft Windows Knowledge Base Article 924496 update is not installed
12024| [29206] Microsoft XML Core Services XMLHTTP information disclosure
12025| [29205] Microsoft Windows Object Packager file extension spoofing code execution
12026| [29204] Microsoft Windows Knowledge Base Article 923414 update is not installed
12027| [29202] Microsoft Windows Knowledge Base Article 922760 update is not installed
12028| [29201] Microsoft Windows Knowledge Base Article 923191 update is not installed
12029| [29199] Microsoft Internet Explorer layout combinations code execution
12030| [29171] Microsoft Windows Knowledge Base Article 925486 update is not installed
12031| [29135] Microsoft Internet Explorer CSS HTML INPUT DIV element denial of service
12032| [29092] Microsoft Visual Basic msgbox unspecified
12033| [29004] Microsoft Internet Explorer VML buffer overflow
12034| [28953] GnuTLS RSA key exponent 3 security bypass
12035| [28942] Microsoft Internet Explorer DirectAnimation keyframe buffer overflow
12036| [28893] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow variant
12037| [28775] Microsoft Word unspecified memory corruption code execution
12038| [28664] Microsoft Windows Knowledge Base Article 922770 update is not installed
12039| [28660] Microsoft Windows Knowledge Base Article 921503 update is not installed
12040| [28659] Microsoft Windows OLE Automation code execution
12041| [28658] Microsoft ASP.NET Framework HTTP cross-site scripting
12042| [28656] Microsoft Windows Knowledge Base Article 924090 update not installed
12043| [28652] Microsoft Windows Knowledge Base Article 920685 update is not installed
12044| [28651] Microsoft Indexing Service cross-site scripting
12045| [28650] Microsoft Office PICT image filter code execution
12046| [28649] Microsoft Windows Knowledge Base Article 910729 update is not installed
12047| [28648] Microsoft Publisher .pub file malformed string code execution
12048| [28647] Microsoft Office EPS filter code execution
12049| [28646] Microsoft Windows Knowledge Base Article 919007 update is not installed
12050| [28643] Microsoft Windows XP PGM buffer overflow
12051| [28608] Microsoft Internet Explorer daxctle.ocx denial of service
12052| [28600] Microsoft Windows winhlp32 HLP file unspecified code execution
12053| [28522] Microsoft Internet Explorer HTTP 1.1 compression long URL buffer overflow
12054| [28516] Microsoft Internet Explorer multiple COM object color property denial of service
12055| [28512] Microsoft Internet Explorer multiple Windows 2000 COM object denial of service
12056| [28511] Microsoft Internet Explorer multiple Visual Studio COM object denial of service
12057| [28474] Microsoft Windows PNG IHDR block denial of service
12058| [28444] Microsoft Internet Explorer tsuserex.dll COM object denial of service
12059| [28439] Microsoft Internet Explorer msoe.dll COM object denial of service
12060| [28438] Microsoft Internet Explorer chtskdic.dll COM object denial of service
12061| [28436] Microsoft Internet Explorer imskdic.dll COM object denial of service
12062| [28281] Microsoft Windows WMF gdi32.dll denial of service
12063| [28240] Microsoft Windows DNS client data string buffer overflow
12064| [28183] Microsoft Windows gdiplus.dll denial of service
12065| [28068] Microsoft Internet Explorer deleted frame access denial of service
12066| [28066] Microsoft Internet Explorer ADODB.Recordset ActiveX object denial of service
12067| [28046] Microsoft Internet Explorer NDFXArtEffects ActiveX object denial of service
12068| [28045] Microsoft Windows Knowledge Base Article 918899 update is not installed
12069| [28043] Microsoft Internet Explorer HTML rendering code execution
12070| [28042] Microsoft Internet Explorer Window location information disclosure
12071| [28040] Microsoft Internet Explorer cross-domain code execution
12072| [28039] Microsoft Internet Explorer ActiveX COM object code execution
12073| [28037] Microsoft Internet Explorer chained CSS code execution
12074| [28034] Microsoft Internet Explorer HTML layout code execution
12075| [28028] Microsoft Windows Knowledge Base Article 922616 update is not installed
12076| [28027] Microsoft Windows Knowledge Base Article 922968 update is not installed
12077| [28025] Microsoft PowerPoint BIFF file format malformed record code execution
12078| [28024] Microsoft Windows Knowledge Base Article 921645 update is not installed
12079| [28023] Microsoft Visual Basic for Applications (VBA) document property buffer overflow
12080| [28022] Microsoft Windows Knowledge Base Article 920670 update is not installed
12081| [28020] Microsoft Windows Hyperlink Object Library (hlink.dll) buffer overflow
12082| [28019] Microsoft Windows Knowledge Base Article 920214 update is not installed
12083| [28018] Microsoft Windows Knowledge Base Article 921398 update is not installed
12084| [28017] Microsoft Windows Knowledge Base Article 920958 update is not installed
12085| [28016] Microsoft Windows kernel system inputs buffer overflow
12086| [28015] Microsoft Windows Knowledge Base Article 920683 update is not installed
12087| [28014] Microsoft Windows Winsock API buffer overflow
12088| [28013] Microsoft Windows DNS client buffer overflow
12089| [28012] Microsoft Windows Knowledge Base Article 917422 update is not installed
12090| [28011] Microsoft Windows kernel exception handling code execution
12091| [28009] Microsoft Windows kernel Winlogon privilege escalation
12092| [28008] Microsoft Windows Knowledge Base Article 917008 update is not installed
12093| [28005] Microsoft Windows 2000 Management Console (MMC) resource file cross-site scripting
12094| [28004] Microsoft Windows Knowledge Base Article 921883 update is not installed
12095| [28002] Microsoft Windows Server service buffer overflow
12096| [27999] Microsoft Windows SMB malformed PIPE denial of service
12097| [27932] Microsoft Internet Explorer native function iteration denial of service
12098| [27931] Microsoft Internet Explorer Forms.ListBox.1 and Forms.ComboBox.1 ActiveX object denial of service
12099| [27930] Microsoft Internet Explorer ASFSourceMediaDescription ActiveX object denial of service
12100| [27929] Microsoft Internet Explorer Internet.HHCtrl ActiveX object denial of service
12101| [27900] Microsoft Internet Explorer wininet.dll denial of service
12102| [27890] Microsoft Internet Explorer href title denial of service
12103| [27884] Microsoft Internet Explorer CEnroll ActiveX object denial of service
12104| [27854] Microsoft IIS ASP cache virtual server information disclosure
12105| [27845] Microsoft Internet Explorer OVCtl ActiveX object denial of service
12106| [27833] Microsoft ISA file extension security bypass
12107| [27832] Microsoft Windows ASN.1 Library HTTP NTLM buffer overflow
12108| [27804] Microsoft Internet Explorer WebViewFolderIcon ActiveX object code execution
12109| [27803] Microsoft Internet Explorer DataSourceControl ActiveX object denial of service
12110| [27795] Microsoft Works wksss.exe denial of service
12111| [27794] Microsoft Works wksss.exe buffer overflow
12112| [27783] Microsoft PowerPoint powerpnt.exe unspecified vulnerability
12113| [27782] Microsoft PowerPoint unspecified memory corruption
12114| [27781] Microsoft PowerPoint unspecified mso.dll code execution
12115| [27762] Microsoft Internet Explorer DXImageTransform.Microsoft.Gradient ActiveX object denial of service
12116| [27761] Microsoft Internet Explorer MHTMLFile ActiveX object denial of service
12117| [27760] Microsoft Internet Explorer FolderItem control denial of service
12118| [27740] Microsoft PowerPoint mso.dll malformed shape code execution
12119| [27713] Microsoft Internet Explorer RevealTrans ActiveX object denial of service
12120| [27675] Microsoft Internet Explorer TriEditDocument ActiveX object denial of service
12121| [27653] Microsoft Excel Asian language editions Style and Repair buffer overflow
12122| [27649] Microsoft Internet Explorer HtmlDlgSafeHelper ActiveX object denial of service
12123| [27626] Microsoft Word hlink.dll buffer overflow
12124| [27623] Microsoft Internet Explorer Object.Microsoft.DXTFilter ActiveX object denial of service
12125| [27622] Microsoft Internet Explorer DirectAnimation.DAUserData ActiveX object denial of service
12126| [27621] Microsoft Internet Explorer RDS.DataControl ActiveX object denial of service
12127| [27617] Microsoft Office mso.dll LsCreateLine() denial of service
12128| [27609] Microsoft Office property field buffer overflow
12129| [27607] Microsoft Office string parsing buffer overflow
12130| [27604] Microsoft Excel cell rebuilding code execution
12131| [27599] Microsoft Internet Explorer OutlookExpress.AddressBook ActiveX object denial of service
12132| [27596] Microsoft Internet Explorer ADODB.Recordset ActiveX object denial of service
12133| [27592] Microsoft Internet Explorer table.frameset appendChild() denial of service
12134| [27573] Microsoft Internet Explorer HTML Help HHCtrl ActiveX control buffer overflow
12135| [27567] Microsoft Windows explorer.exe Internet Shortcut (.url) denial of service
12136| [27565] Microsoft Internet Explorer StructuredGraphicsControl SourceURL denial of service
12137| [27562] Microsoft Windows Knowledge Base Article 915384 update is not installed
12138| [27558] Microsoft Office PNG buffer overflow
12139| [27556] Microsoft Office GIF filter buffer overflow
12140| [27554] Microsoft Windows Knowledge Base Article 917284 update is not installed
12141| [27544] Microsoft Office Excel SELECTION buffer overflow
12142| [27542] Microsoft Office and Microsoft Works Suite Excel SELECTION buffer overflow
12143| [27467] Microsoft Windows Knowledge Base Article 917285 update is not installed
12144| [27466] Microsoft Office and Microsoft Works Suite Excel LABEL buffer overflow
12145| [27464] Microsoft Office Excel FNGROUPCOUNT buffer overflow
12146| [27463] Microsoft Office Excel OBJECT buffer overflow
12147| [27456] Microsoft Internet Explorer HTA SMB file share command execution
12148| [27452] Microsoft Internet Explorer object.documentElement.outer information disclosure
12149| [27450] Microsoft Office Suite Excel COLINFO buffer overflow
12150| [27417] Microsoft Windows Live Messenger contact list denial of service
12151| [27312] Microsoft Excel embedded Shockwave Flash Object code execution
12152| [27288] Microsoft Internet Explorer ASCII encoded Web filter bypass
12153| [27224] Microsoft Office hlink.dll COM object buffer overflow
12154| [27179] Microsoft Excel unspecified code execution
12155| [26977] Ingate Firewall and SIParator SSL/TLS handshake denial of service
12156| [26971] Microsoft NetMeeting unspecified memory corruption denial of service
12157| [26905] Microsoft Windows Knowledge Base Article 918547 update is not installed
12158| [26903] Microsoft Windows Knowledge Base Article 917336 update is not installed
12159| [26886] Microsoft Windows Knowledge Base Article 917953 update is not installed
12160| [26884] Microsoft Windows Knowledge Base Article 917736 update is not installed
12161| [26883] Microsoft Windows Knowledge Base Article 917537 update is not installed
12162| [26882] Microsoft Windows Knowledge Base Article 917344 update is not installed
12163| [26880] Microsoft Windows Knowledge Base Article 917159 update is not installed
12164| [26876] Microsoft Windows Knowledge Base Article 916281 update is not installed
12165| [26874] Microsoft Windows Knowledge Base Article 914389 update is not installed
12166| [26871] Microsoft Windows Knowledge Base Article 914388 update is not installed
12167| [26868] Microsoft Windows Knowledge Base Article 917734 update is not installed
12168| [26867] Microsoft Windows Knowledge Base Article 911280 update is not installed
12169| [26865] Microsoft Windows Knowledge Base Article 917283 update is not installed
12170| [26861] Microsoft Windows Knowledge Base Article 918439 update is not installed
12171| [26836] Microsoft Windows RPC mutual authentication spoofing
12172| [26834] Microsoft Windows TCP/IP protocol driver buffer overflow
12173| [26830] Microsoft Windows SMB invalid handle denial of service
12174| [26823] Microsoft Windows DHCP Client buffer overflow
12175| [26820] Microsoft Windows SMB Server service information disclosure
12176| [26818] Microsoft Windows Mailslot Server driver buffer overflow
12177| [26817] Microsoft Internet Explorer CSS position denial of service
12178| [26815] Microsoft Windows Graphics Rendering Engine (GRE) WMF code execution
12179| [26814] Microsoft Windows RRAS RASMAN buffer overflow
12180| [26813] Microsoft Windows Knowledge Base Article 916768 update is not installed
12181| [26812] Microsoft Windows RRAS buffer overflow
12182| [26810] Microsoft Internet Explorer mhtml://mid URL buffer overflow
12183| [26809] Microsoft Windows ART image rendering library buffer overflow
12184| [26808] Microsoft Internet Explorer HTML tag parsing denial of service
12185| [26805] Microsoft Windows JScript code execution
12186| [26802] Microsoft ASP.NET Framework App_Code folder information disclosure
12187| [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
12188| [26788] Microsoft Windows Media Player PNG buffer overflow
12189| [26784] Microsoft Powerpoint record buffer overflow
12190| [26782] Microsoft Internet Explorer .mht files code execution
12191| [26777] Microsoft Internet Explorer Address bar spoofing
12192| [26774] Microsoft Internet Explorer DXImageTransform.Microsoft.MMSpecialEffect1Input ActiveX object code execution
12193| [26768] Microsoft Internet Explorer DXImageTransform.Microsoft.Light ActiveX control code execution
12194| [26766] Microsoft Internet Explorer UTF8 encoded HTML code execution
12195| [26762] Microsoft Internet Explorer nested OBJECT tag memory corruption variant
12196| [26556] Microsoft Word document handling buffer overflow
12197| [26487] Microsoft Windows NTDLL.DLL improper DOS to NT path conversion
12198| [26340] Microsoft Infotech Storage System Library (itss.dll) CHM file heap corruption
12199| [26281] Microsoft Internet Explorer mhtml: URL redirection information disclosure
12200| [26233] Microsoft ISA Server log file manipulation
12201| [26166] Microsoft Windows Knowledge Base Article 912442 update is not installed
12202| [26161] Microsoft Windows Knowledge Base Article 916803 update is not installed
12203| [26156] Microsoft Windows Knowledge Base Article 913580 update is not installed
12204| [26118] Microsoft Office 2003 mailto: information disclosure
12205| [26111] Microsoft Internet Explorer modal security dialog box code execution
12206| [25978] Microsoft Internet Explorer nested OBJECT tag memory corruption
12207| [25852] Microsoft Internet Explorer CSS scrollbar denial of service
12208| [25844] Microsoft Dynamics GP magic number denial of service
12209| [25843] Microsoft Dynamics GP DPS multiple buffer overflows
12210| [25842] Microsoft Dynamics GP DPM multiple buffer overflows
12211| [25841] Microsoft Dynamics GP DPS and DPM IP address buffer overflow
12212| [25840] Microsoft Dynamics GP DPS and DPM string buffer overflow
12213| [25794] Microsoft Windows Knowledge Base Article 917627 update is not installed
12214| [25792] Microsoft Windows Knowledge Base Article 911567 update is not installed
12215| [25678] Microsoft Office document string buffer overflow
12216| [25634] Microsoft Internet Explorer .swf address bar spoofing
12217| [25629] Microsoft Windows Knowledge Base Article 912812 update is not installed
12218| [25626] Microsoft Windows Knowledge Base Article 911562 update is not installed
12219| [25625] Microsoft Windows Knowledge Base Article 908531 not installed
12220| [25598] Microsoft Windows XP Firewall .exe firewall bypass
12221| [25597] Microsoft Windows XP Firewall ADS filename:stream syntax application alert bypass
12222| [25573] Microsoft Windows winhlp32.exe .hlp embedded image buffer overflow
12223| [25557] Microsoft Internet Explorer address bar spoofing
12224| [25556] Microsoft Exchange calendar attachment buffer overflow
12225| [25555] Microsoft Internet Explorer navigation method popup security zone bypass
12226| [25554] Microsoft Windows Explorer COM object code execution
12227| [25552] Microsoft Internet Explorer IOIeClientSite code execution
12228| [25551] Microsoft Internet Explorer Double-Byte Character Set code execution
12229| [25550] Microsoft Exchange Outlook Web Access cross-site scripting
12230| [25547] Microsoft Internet Explorer HTML PRE tag code execution
12231| [25545] Microsoft Internet Explorer COM objects as ActiveX code execution
12232| [25542] Microsoft Internet Explorer HTML parsing code execution
12233| [25537] Microsoft FrontPage Server Extensions HTML cross-site scripting
12234| [25535] Microsoft Outlook Express Windows Address Book file buffer overflow
12235| [25439] Microsoft .NET ILDASM buffer overflow
12236| [25438] Microsoft .NET ILASM buffer overflow
12237| [25394] Microsoft Internet Explorer HTA file execution
12238| [25392] Microsoft ASP.NET COM and COM+ w3wp.exe denial of service
12239| [25379] Microsoft Internet Explorer createTextRange() code execution
12240| [25370] Microsoft Windows Knowledge Base Article 901190 not installed
12241| [25369] Microsoft Windows DNS recursive query denial of service
12242| [25366] Microsoft Windows Knowledge Base Article 905755 update is not installed
12243| [25365] Microsoft Windows Knowledge Base Article 914798 update is not installed
12244| [25364] Microsoft Windows Knowledge Base Article 914451 update is not installed
12245| [25363] Microsoft Windows Knowledge Base Article 905756 update is not installed
12246| [25361] Microsoft Windows Knowledge Base Article 905758 update is not installed
12247| [25360] Microsoft Windows Knowledge Base Article 905754 update is not installed
12248| [25359] Microsoft Windows Knowledge Base Article 905555 update is not installed
12249| [25358] Microsoft Windows Knowledge Base Article 905646 update is not installed
12250| [25357] Microsoft Windows Knowledge Base Article 905757 update is not installed
12251| [25342] Microsoft Windows Knowledge Base Article 905553 update is not installed
12252| [25330] Microsoft Commerce Server 2002 authfiles/login.asp authentication bypass
12253| [25292] Microsoft Internet Exporer mshtml.dll buffer overflow
12254| [25284] Microsoft Internet Explorer HTML CSS null dereference denial of service
12255| [25261] Microsoft Windows Knowledge Base Article 913433 is not installed
12256| [25256] Microsoft Internet Explorer Java VM denial of service
12257| [25229] Microsoft Excel graphic buffer overflow
12258| [25228] Microsoft Excel record buffer overflow
12259| [25227] Microsoft Excel formula size buffer overflow
12260| [25225] Microsoft Excel parsing format file buffer overflow
12261| [25148] Microsoft Visual Studio and Visual InterDev .dbp and .sln DataProject buffer overflow
12262| [25011] Microsoft Internet Explorer display adapter JPEG image denial of service
12263| [25009] Microsoft Office routing slip metadata buffer overflow
12264| [24933] NuFW TLS socket denial of service
12265| [24923] Microsoft Internet Explorer IsComponentInstalled() buffer overflow
12266| [24846] Microsoft Internet Explorer window.status memory leak denial of service
12267| [24844] Microsoft .asf file detected
12268| [24788] Microsoft Internet Explorer Script Engine stack denial of service
12269| [24648] Microsoft Internet Explorer drag and drop event file downloading variant
12270| [24629] BlackBerry Enterprise Server Attachment Service Microsoft Word file buffer overflow
12271| [24606] GnuTLS Llibtasn1 DER decoding denial of service
12272| [24586] Microsoft Windows DNS client ATMA data record buffer overflow
12273| [24512] Microsoft Windows Knowledge Base Article 911565 update is not installed
12274| [24511] Microsoft Windows Knowledge Base Article 911564 update is not installed
12275| [24509] Microsoft Windows Knowledge Base Article 889167 update is not installed
12276| [24496] Microsoft Windows Knowledge Base Article 911927 update is not installed
12277| [24495] Microsoft Windows Knowledge Base Article 913446 update is not installed
12278| [24494] Microsoft Windows Knowledge Base Article 910620 update is not installed
12279| [24493] Microsoft Windows Media Player Plugin EMBED element buffer overflow
12280| [24492] Microsoft Windows and Office Korean IME privilege elevation
12281| [24491] Microsoft Windows MSRPC WebClient service message buffer overflow
12282| [24490] Microsoft PowerPoint TIFF information disclosure
12283| [24489] Microsoft Windows IGMP v3 denial of service
12284| [24488] Microsoft Windows Media Player BMP image parsing service buffer overflow
12285| [24487] Microsoft Internet Explorer WMF image code execution
12286| [24481] Microsoft HTML Help Workshop .hhp file buffer overflow
12287| [24474] Microsoft Windows 2000 LDAP client accepts untrusted CA
12288| [24473] Microsoft Windows 2000 event ID 565 not logged
12289| [24472] Microsoft Windows 2000 Event ID 1704 records incorrect group policy settings
12290| [24471] Microsoft Windows VDM information disclosure
12291| [24463] Microsoft Windows XP "
12292| [24407] Microsoft Windows 2000 SECEDIT command fails to set ACLs correctly
12293| [24405] Microsoft Windows 2000 UPN credentials with trailing dot group policy bypass
12294| [24403] Microsoft Windows 2000 WideCharToMultiByte() incorrect Japanese character conversion
12295| [24402] Microsoft Windows 2000 Terminal Service client IP not logged
12296| [24400] Microsoft Windows 2000 domain authentication can be bypassed by a local administrator
12297| [24379] Microsoft Internet Explorer ActiveX kill bit settings can be bypassed
12298| [24346] Microsoft Office \BaseNamedObjects\Mso97SharedDg denial of service
12299| [24188] Microsoft Visual Studio project.dsp code execution
12300| [24162] Microsoft Internet Explorer invalid IMG and XML element denial of service
12301| [24157] Microsoft Windows wireless ad-hoc network unauthorized access
12302| [24116] Microsoft Visual Studio UserControl.Load code execution
12303| [24044] Microsoft Windows GRE ExtCreateRegion() and ExtEscape() WMF denial of service
12304| [23978] Microsoft Windows Knowledge Base Article 912919 update is not installed
12305| [23926] Microsoft Windows Knowledge Base Article 908523 update is not installed
12306| [23924] Microsoft Windows Knowledge Base Article 908519 update is not installed
12307| [23922] Microsoft Windows embedded Open Type Web font buffer overflow
12308| [23895] Microsoft Internet Explorer HTML denial of service
12309| [23846] Microsoft Windows GDI32.DLL WMF image rendering code execution
12310| [23706] Microsoft MSN Messenger and Internet Explorer image denial of service
12311| [23571] Microsoft Internet Explorer cssText information disclosure
12312| [23537] Microsoft Excel msvcrt.memmove() buffer overflow
12313| [23453] Microsoft Windows COM object as ActiveX control allows execution of code
12314| [23451] Microsoft Internet Explorer HTTPS proxy authentication information disclosure
12315| [23450] Microsoft Windows Knowledge Base Article 905915 update is not installed
12316| [23448] Microsoft Internet Explorer download dialog box code execution
12317| [23447] Microsoft Windows APC queue list could allow elevated privileges
12318| [23284] Microsoft Windows SynAttackProtect denial of service
12319| [23129] Microsoft Outlook Express news server information disclosure
12320| [23066] Microsoft Windows XP and 2000 Server MSRPC memory allocation denial of service
12321| [22899] Microsoft Windows Knowledge Base Article 902412 update is not installed
12322| [22882] Microsoft Windows Knowledge Base Article 896424 update is not installed
12323| [22878] Microsoft Exchange Server and Outlook TNEF overflow
12324| [22877] Microsoft Windows Metafile image format buffer overflow
12325| [22876] Microsoft Windows Metafile and Enhance Metafile buffer overflow
12326| [22852] Microsoft Internet Explorer mshtmled.dll denial of service
12327| [22622] RHSA-2005:430 updates for gnutls not installed
12328| [22559] OpenSSL SSL/TLS SSL_OP_MSIE_SSLV2_RSA_PADDING version rollback
12329| [22524] Microsoft Windows XP Wireless Zero Configuration service information disclosure
12330| [22514] Microsoft Windows Knowledge Base Article 902400 update is not installed
12331| [22512] Microsoft Windows Knowledge Base Article 907245 update is not installed
12332| [22502] Microsoft Windows Knowledge Base Article 905749 update is not installed
12333| [22501] Microsoft Windows Knowledge Base Article 900725 update is not installed
12334| [22498] Microsoft Windows XP tftp.exe heap overflow
12335| [22495] Microsoft Windows Collaboration Data Objects buffer overflow
12336| [22492] Microsoft Windows Knowledge Base Article 904706 update is not installed
12337| [22481] Microsoft Windows MSRPC Plug and Play buffer overflow
12338| [22480] Microsoft Windows DirectShow .AVI file code execution
12339| [22479] Microsoft Windows HTML in preview fields execute code
12340| [22478] Microsoft Windows .lnk properties execute code
12341| [22477] Microsoft Windows .lnk file execute code
12342| [22476] Microsoft Windows Distributed Transaction Coordinator message denial of service
12343| [22475] Microsoft Windows Distributed Transaction Coordinator TIP denial of service
12344| [22474] Microsoft Internet Explorer colon data manipulation
12345| [22473] Microsoft Windows COM code execution
12346| [22472] Microsoft Internet Explorer ActiveX HTTP request injection
12347| [22413] Microsoft Internet Explorer for Mac OS about: buffer overflow
12348| [22379] Microsoft Internet Explorer Web content controlled cross-site scripting
12349| [22338] Microsoft Internet Information Server WebDAV request source code disclosure
12350| [22318] Microsoft SQL Server 2000 Service Pack 4 update is not installed
12351| [22268] Microsoft Log Sink Class ActiveX pkmcore.dll file manipulation
12352| [22204] Microsoft Windows keybd_event or SendKeys allows elevated privileges
12353| [22183] Microsoft Exchange Server 2003 public folder denial of service
12354| [22156] Microsoft Windows Knowledge Base Article 899589 update is not installed
12355| [22155] Microsoft Knowledge Base Article 896688 is not installed
12356| [22089] Microsoft Windows Registry Editor Utility concealment
12357| [22073] Microsoft Knowledge Base Article 903235 is not installed
12358| [22072] Microsoft Knowledge Base Article 899587 is not installed
12359| [22071] Microsoft Knowledge Base Article 896428 is not installed
12360| [22069] Microsoft Knowledge Base Article 890859 is not installed
12361| [22068] Microsoft Knowledge Base Article 890046 is not installed
12362| [22042] Microsoft Internet Explorer command execution
12363| [21980] Microsoft Windows Registry Editor Utility concealment
12364| [21978] Microsoft Windows user32.dll component denial of service
12365| [21955] Microsoft Internet Information Server SERVER_NAME request spoofing
12366| [21931] Microsoft Windows XP memory leak
12367| [21930] Microsoft Internet Explorer URL restricted zone denial of service
12368| [21895] Microsoft Windows Msdds.dll object command execution
12369| [21704] Microsoft Windows Knowledge Base Article 896727 update is not installed
12370| [21702] Microsoft Internet Explorer Web Folder Behaviors zone bypass
12371| [21701] Microsoft Internet Explorer JPEG image buffer overflow
12372| [21700] Microsoft Windows Client Service for NetWare code execution
12373| [21660] Microsoft ActiveSync brute force allows attacker to guess equipment IDs
12374| [21658] Microsoft ActiveSync multiple request denial of service
12375| [21626] Microsoft Windows PKINIT protocol obtain information
12376| [21625] Microsoft Windows kerberos message denial of service
12377| [21605] Microsoft Windows Knowledge Base Article 896423 update is not installed
12378| [21604] Microsoft Windows print spooler buffer overflow
12379| [21603] Microsoft Windows Knowledge Base Article 899588 update is not installed
12380| [21602] Microsoft Windows Plug and Play buffer overflow
12381| [21601] Microsoft Windows Knowledge Base Article 899591 update is not installed
12382| [21600] Microsoft Windows Knowledge Base Article 893756 update is not installed
12383| [21599] Microsoft Windows telephony service buffer overflow
12384| [21553] Microsoft Internet Explorer AJAX denial of service
12385| [21539] Microsoft Windows USB device driver buffer overflow
12386| [21537] Microsoft FrontPage style tag denial of service
12387| [21455] MSN (Microsoft Network) Messenger .pif denial of service
12388| [21407] Microsoft Windows RDP request denial of service
12389| [21355] Microsoft Windows Network Connection Manager denial of service
12390| [21352] Microsoft ASP.NET RCP/encoded denial of service
12391| [21345] Microsoft Windows 2000 Update Rollup 1 for Service Pack 4 has not been installed
12392| [21315] Microsoft Outlook 2002 connector for Domino bypass restrictions
12393| [21307] Microsoft Internet Explorer multiple COM object code execution
12394| [21272] Microsoft Windows Knowledge Base Article 903672 update is not installed
12395| [21271] Microsoft Word font buffer overflow
12396| [21269] Microsoft Windows Knowledge Base Article 901214 update is not installed
12397| [21245] LDAP TLS information disclosure
12398| [21221] Microsoft Windows Color Management Module buffer overflow
12399| [21214] Microsoft Windows NTFS allows attacker to obtain information
12400| [21193] Microsoft Internet Explorer javaprxy.dll buffer overflow
12401| [21100] Microsoft Internet Explorer popup obtain information
12402| [21071] Microsoft Internet Explorer BMP memory denial of service
12403| [21025] Microsoft ISA Server SecureNAT client configuration denial of service
12404| [20975] Microsoft Internet Explorer allows script code modification
12405| [20967] Microsoft Exchange Outlook Web Access cross-site scripting
12406| [20843] Microsoft ISA Server Netbios bypass policy
12407| [20842] Microsoft ISA Server HTTP header cache poisoning
12408| [20831] Microsoft Agent character spoof
12409| [20830] Microsoft Outlook Express NNTP Response Parsing buffer overflow
12410| [20829] Microsoft Windows Step-by-Step Interactive Training bookmark link file buffer overflow
12411| [20826] Microsoft Windows Knowledge Base Article 896422 update is not installed
12412| [20825] Microsoft Windows Knowledge Base Article 896358 update is not installed
12413| [20823] Microsoft Windows Knowledge Base Article 890169 update is not installed
12414| [20822] Microsoft Windows Knowledge Base Article 883939 update is not installed
12415| [20821] Microsoft Windows compiled Help (.CHM) integer overflow
12416| [20820] Microsoft Windows Knowledge Base Article 896426 update is not installed
12417| [20818] Microsoft Windows WebClient Service buffer overflow
12418| [20815] Microsoft Windows SMB process gain access
12419| [20693] Microsoft ASP.NET Framework SQL injection
12420| [20692] Microsoft ASP.NET Framework full path disclosure
12421| [20683] Microsoft Word .mcw file buffer overflow
12422| [20629] Multiple Microsoft Windows IPv6 LAND denial of service
12423| [20617] Microsoft Internet Explorer information bar security bypass
12424| [20546] Microsoft Windows Media Player allows creation of malicious media files
12425| [20409] Microsoft ASP.NET Framework ViewState replay
12426| [20408] Microsoft ASP.NET Framework _VIEWSTATE denial of service
12427| [20382] Microsoft Windows Knowledge Base Article 894320 update is not installed
12428| [20380] Microsoft Windows Web View command execution
12429| [20328] GnuTLS record packet parsing denial of service
12430| [20318] Microsoft Windows Knowledge Base Article 893086 update is not installed
12431| [20317] Microsoft Windows Knowledge Base Article 890923 update is not installed
12432| [20026] Microsoft Outlook and Outlook Web Access email client address spoofing
12433| [20000] Microsoft Windows Knowledge Base Article 892944 update is not installed
12434| [19969] Multiple Microsoft Windows Server 2003 Edition printer driver denial of service
12435| [19965] Multiple Microsoft Windows Server 2003 Editions SMB redirector denial of service
12436| [19950] MSN (Microsoft Network) Messenger GIF image code execution
12437| [19914] Microsoft Jet Database msjet40.dll library buffer overflow
12438| [19875] Microsoft Knowledge Base Article 893066 is not installed
12439| [19843] Microsoft Windows Knowledge Base Article 894549 update is not installed
12440| [19842] Microsoft Internet Explorer Content Advisor buffer overflow
12441| [19841] Microsoft Internet Explorer URL buffer overflow
12442| [19836] Microsoft Windows CSRSS gain control
12443| [19835] Microsoft Windows HTML Application Host command execution
12444| [19834] Microsoft Windows object buffer overflow
12445| [19832] Microsoft Windows access requests gain privileges
12446| [19831] Microsoft Internet Explorer DHTML object buffer overflow
12447| [19830] Microsoft Windows font buffer overflow
12448| [19829] Microsoft Windows Message Queuing component buffer overflow
12449| [19828] Microsoft Word document buffer overflow
12450| [19819] Microsoft Windows Remote Desktop "
12451| [19727] Microsoft Windows 2000 GDI32.DLL denial of service
12452| [19716] Microsoft Office InfoPath form information disclosure
12453| [19629] Microsoft Exchange Server 2003 folder denial of service
12454| [19593] Microsoft Windows LAND denial of service
12455| [19461] Microsoft Office applications information disclosure
12456| [19452] Microsoft Internet Explorer title bar spoofing
12457| [19373] Microsoft Internet Explorer and Outlook Express status bar spoofing
12458| [19288] IBM DB2 running on Microsoft Windows obtain information
12459| [19270] Microsoft Windows PNG image buffer overflow
12460| [19252] Microsoft Knowledge Base Article 890261 is not installed
12461| [19225] Microsoft Outlook Web Access owalogon.asp script URL redirect
12462| [19220] Microsoft Windows registry key connection denial of service
12463| [19214] Microsoft Internet Explorer file URL encode
12464| [19141] Microsoft Knowledge Base Article 867282 is not installed
12465| [19137] Microsoft Internet Explorer Channel Definition Format code execution
12466| [19133] Microsoft DHTML method buffer overflow
12467| [19121] Microsoft Pocket Internet Explorer (PIE) URL Unicode spoofing
12468| [19118] Microsoft Knowledge Base Article 890047 is not installed
12469| [19117] Microsoft Internet Explorer drag and drop event file downloading
12470| [19116] Microsoft Knowledge Base Article 891781 is not installed
12471| [19112] Microsoft Knowledge Base Article 873352 is not installed
12472| [19111] Microsoft Knowledge Base Article 888113 is not installed
12473| [19110] Microsoft Windows Hyperlink Object Library code execution
12474| [19109] Microsoft Windows OLE code execution
12475| [19107] Microsoft Office XP URL buffer overflow
12476| [19106] Microsoft Knowledge Base Article 873333 is not installed
12477| [19105] Microsoft Windows COM files gain privileges
12478| [19103] Multiple Microsoft Windows TCP/IP denial of service
12479| [19102] Microsoft Knowledge Base Article 885834 is not installed
12480| [19101] Microsoft Windows Servers License Logging service code execution
12481| [19096] Microsoft Windows Media Player PNG buffer overflow
12482| [19095] Microsoft Knowledge Base Article 888302 is not installed
12483| [19093] Microsoft Windows named pipe information disclosure
12484| [19092] Microsoft Knowledge Base Article 887981 is not installed
12485| [19091] Microsoft Windows SharePoint Services and SharePoint Team Services cross-site scripting
12486| [19090] Microsoft Knowledge Base Article 885250 is not installed
12487| [19089] Microsoft Windows SMB code execution
12488| [18944] Microsoft Knowledge Base Article 886185 is not installed
12489| [18936] Microsoft Internet Explorer file exisitence
12490| [18897] Microsoft Internet Explorer bypass file download warning
12491| [18879] Microsoft Windows USER32.DLL ANI header overflow
12492| [18770] Microsoft Knowledge Base Article 890175 is not installed
12493| [18769] Microsoft Knowledge Base Article 887219 is not installed
12494| [18768] Microsoft Windows Knowledge Base Article 891711 update is not installed
12495| [18766] Microsoft Windows Knowledge Base Article 871250 update is not installed
12496| [18758] Microsoft Windows Indexing Service allows code execution
12497| [18723] Microsoft Internet Explorer FTP arbitrary file creation
12498| [18678] Microsoft Windows winhlp32.exe buffer overflow
12499| [18668] Microsoft Windows LoadImage API buffer overflow
12500| [18667] Microsoft Windows ANI file zero rate number overflow denial of service
12501| [18587] Microsoft Windows Media Player ActiveX object reveals existence of files
12502| [18576] Microsoft Windows Media Player mp3 code execution
12503| [18507] Microsoft Windows XP SP2 subnet option allows access to firewall exceptions
12504| [18504] Microsoft Internet Explorer DHTML bypass cross-domain security model
12505| [18489] Cisco Unity integrated with Microsoft Exchange has default user accounts
12506| [18444] Microsoft Internet Explorer could allow an attaker to bypass popup blocking
12507| [18442] Microsoft SharePoint Portal Server could allow an attacker to obtain password
12508| [18395] Microsoft Internet Explorer sysimage obtain information
12509| [18394] Microsoft Windows Knowledge Base Article 870763 update is not installed
12510| [18393] Microsoft Windows Knowledge Base Article 873339 update is not installed
12511| [18392] Microsoft Windows Knowledge Base Article 885249 update is not installed
12512| [18391] Microsoft Windows Knowledge Base Article 885835 update is not installed
12513| [18390] Microsoft Windows Knowledge Base Article 885836 update is not installed
12514| [18389] Microsoft Exchange Server SMTP buffer overflow
12515| [18388] Microsoft Exchange Server SMTP integer overflow
12516| [18378] Microsoft Windows Icon image anomaly detected
12517| [18342] Microsoft Windows NT DHCP HardwareAddress code execution
12518| [18341] Microsoft Windows NT DHCP MachineName denial of service
12519| [18340] Microsoft Windows LSASS gain privileges
12520| [18339] Microsoft Windows kernel LPC interface gain privileges
12521| [18338] Microsoft Windows Word for Windows 6.0 Converter font code execution
12522| [18337] Microsoft Windows Word for Windows 6.0 Converter table code execution
12523| [18336] Microsoft Windows HyperTerminal session file buffer overflow
12524| [18314] Microsoft Windows Knowledge Base Article 889293 update is not installed
12525| [18311] Microsoft Internet Explorer save file caused by the Related Topics command of the Help ActiveX Control
12526| [18269] Microsoft Internet Explorer Save Picture As spoofing
12527| [18208] Microsoft Windows logon screen saver allows elevated privileges
12528| [18181] Microsoft Internet Explorer execCommand bypass download warnings
12529| [18073] Microsoft Internet Explorer path cookie overwrite
12530| [18020] Microsoft Internet Explorer status bar spoofing
12531| [17989] Microsoft Internet Explorer open window allows attacker to obtain information
12532| [17938] Microsoft Internet Explorer A HREF status bar spoofing
12533| [17936] Cisco Secure ACS for Windows and Solution Engine EAP-TLS bypass authentication
12534| [17931] Microsoft Internet Explorer mshtml.dll denial of service
12535| [17911] Microsoft Internet Explorer FONT tags denial of service
12536| [17910] Microsoft Internet Explorer Hhctrl.ocx allows cross-domain script injection
12537| [17909] Microsoft Internet Explorer table status bar spoofing
12538| [17907] Microsoft ISA Server and Proxy Server Patch MS04-039 is not installed
12539| [17906] Microsoft ISA Server and Proxy Server allow Web site spoofing caused by cache reverse lookup results
12540| [17889] Microsoft Internet Explorer IFRAME SRC NAME buffer overflow
12541| [17868] Microsoft Remote Desktop Tsshutdn command restart
12542| [17864] Microsoft Windows XP Explorer WAV file denial of service
12543| [17828] Microsoft Outlook base64 image file bypass security
12544| [17826] Microsoft Outlook 2003 CID security bypass
12545| [17824] Microsoft Internet Explorer AnchorClick command execution
12546| [17820] Microsoft Internet Explorer bypass Drag and Drop or copy and paste files security setting
12547| [17746] Microsoft Internet Explorer URL address spoofing
12548| [17739] Microsoft FrontPage and Internet Explorer asycpict.dll JPEG denial of service
12549| [17711] Microsoft Windows XP SP2 sessmgr.exe firewall bypass
12550| [17683] Microsoft Excel MS04-033 patch is not installed
12551| [17663] Microsoft Windows MS04-029 patch is not installed
12552| [17662] Microsoft Windows MS04-037 patch is not installed
12553| [17661] Microsoft Windows MS04-036 patch is not installed
12554| [17660] Microsoft Windows MS04-035 patch is not installed
12555| [17659] Microsoft Windows MS04-034 patch is not installed
12556| [17658] Microsoft Windows MS04-032 patch is not installed
12557| [17657] Microsoft Windows NetDDE MS04-031 patch is not installed
12558| [17656] Microsoft Internet Information Server MS04-030 patch is not installed
12559| [17655] Microsoft Internet Explorer plug-in navigation allows address bar spoofing
12560| [17654] Microsoft Internet Explorer cache from SSL Web sites obtain information
12561| [17653] Microsoft Excel allows code execution
12562| [17652] Microsoft Internet Explorer Double Byte Character Set spoof Web site to obtain information
12563| [17651] Microsoft Internet Explorer MS04-038 patch is not installed
12564| [17650] Microsoft Internet Explorer allows unauthorized access to XML documents
12565| [17646] Microsoft Windows RPC Runtime Library obtain information
12566| [17645] Microsoft Internet Information Server WebDAV multiple attributes per XML elements cause denial of service
12567| [17644] Microsoft ASP.NET Framework bypass security
12568| [17641] Microsoft Windows NNTP buffer overflow
12569| [17635] Microsoft Word improper file parsing buffer overflow
12570| [17624] Microsoft Windows XP and Windows Server 2003 Compressed Folders buffer overflow
12571| [17621] Microsoft Windows 2003 SMTP service code execution
12572| [17620] Microsoft Internet Explorer InstallEngineCtl SetCifFile buffer overflow
12573| [17560] Microsoft Windows 2000 and XP GDI library denial of service
12574| [17542] Microsoft SQL Server data buffer denial of service
12575| [17521] Microsoft Windows 2000 Service Pack 4 is not installed
12576| [17458] Microsoft Windows CE KDataStruct information disclosure
12577| [17457] Microsoft Windows XP Explorer.exe TIFF denial of service
12578| [17455] Microsoft Windows XP information disclosure
12579| [17412] IBM with Microsoft Windows XP Professional has default administrator account
12580| [17408] MyWaySpeedBar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12581| [17407] DealHelper attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12582| [17402] zSearch attaches to processes of Microsoft Internet Explorer
12583| [17395] AdButler spyware attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12584| [17341] Microsoft Windows MS04-028 patch is not installed
12585| [17340] Microsoft Word Perfect MS04-027 patch is not installed
12586| [17306] Microsoft WordPerfect converter long message buffer overflow
12587| [17153] Microsoft System Information (Msinfo32.exe) msinfo_file buffer overflow
12588| [17102] Microsoft Internet Explorer IFRAME information disclosure
12589| [17098] Microsoft Outlook Express address information disclosure
12590| [17052] Microsoft Windows XP and Internet Explorer displays improper file icon
12591| [17051] Microsoft Windows XP Content-Location bypass Local Computer zone restrictions
12592| [17048] Microsoft ISA Server FTP bounce attack
12593| [17044] Microsoft Internet Explorer dragDrop allows code execution
12594| [17023] Microsoft Windows XP Windows Explorer bypass Zone Identifier (ZoneID) feature
12595| [17009] Microsoft Windows XP ICF bypass filter
12596| [17007] Microsoft Internet Explorer address bar spoofing
12597| [17004] Microsoft Windows XP Service Pack 2 is not installed on the system
12598| [16913] Microsoft Windows 2003 users with Synchronize directory service data privilege
12599| [16912] Microsoft Windows 2003 groups with Synchronize directory service data privilege
12600| [16909] Microsoft Windows 2003 groups with Remove computer from docking station privilege
12601| [16907] Microsoft Windows 2003 users with Create global objects privilege
12602| [16905] Microsoft Windows 2003 users or groups with Create global objects privilege
12603| [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
12604| [16858] GnuTLS RSA key size denial of service
12605| [16857] Microsoft Internet Explorer STYLE tag comment buffer overflow
12606| [16851] Microsoft Windows 2003 and XP WinKey and U key denial of service
12607| [16805] Microsoft Internet Explorer MS04-025 patch is not installed
12608| [16804] Microsoft Internet Explorer MSHTML.DLL GIF file buffer overflow
12609| [16709] Microsoft Internet Explorer JavaScript denial of service
12610| [16708] Microsoft Outlook Express code execution
12611| [16704] Microsoft Windows 2000 Media Player control code execution
12612| [16696] Microsoft Systems Management Server (SMS) Remote Control Client service denial of service
12613| [16692] PHP HTML tags may bypass strip_tag function in Microsoft Internet Explorer and Safari
12614| [16681] Microsoft Internet Explorer function redirect cross-site scripting
12615| [16678] Microsoft Internet Explorer text file denial of service
12616| [16675] Microsoft Internet Explorer popup.show allows attacker to perform actions
12617| [16666] Microsoft Java Virtual Machine sandbox restriction bypass
12618| [16664] Microsoft Windows Program Group Converter buffer overflow
12619| [16663] Microsoft Word and Outlook Object tag allows unauthorized access
12620| [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
12621| [16648] Microsoft Internet Explorer Shell.Application
12622| [16627] Microsoft Windows System32 write file to the directory has been detected
12623| [16624] Microsoft Internet Explorer ADODB.Stream object is not disabled
12624| [16597] Microsoft Windows Windows Shell allows code execution
12625| [16592] Microsoft Windows Utility Manager gain privileges
12626| [16591] Microsoft Windows Task Scheduler buffer overflow
12627| [16590] Microsoft Windows POSIX buffer overflow allows local attacker to gain privileges
12628| [16587] Microsoft Windows Network Dynamic Data Exchange Running
12629| [16586] Microsoft Windows HTML Help could allow execution of code
12630| [16585] Microsoft Outlook Express malformed email header denial of service
12631| [16583] Microsoft Exchange Server OWA could allow remote execution of code
12632| [16582] Microsoft Windows Server 2003 kernel CPU denial of service
12633| [16581] Microsoft Windows Enhanced Metafile (EMF) buffer overflow
12634| [16580] Microsoft Windows Virtual DOS Machine (VDM) allows elevated privileges
12635| [16579] Microsoft Windows Window Management API allows elevated privileges
12636| [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
12637| [16572] Microsoft Windows 2003 Users with Impersonate a client after authentication privilege
12638| [16570] Microsoft Windows 2003 Users with Create global objects privilege
12639| [16564] Microsoft Windows 2003 Groups with Create global objects privilege
12640| [16562] Microsoft Windows 2003 Groups with "
12641| [16556] Microsoft Windows NetDDE buffer overflow
12642| [16522] Microsoft Windows 2003 Impersonate a client after authentication privilege
12643| [16521] Microsoft Windows 2003 Deny Logon Through Terminal Services privilege
12644| [16520] Microsoft Windows 2003 Create global objects privilege
12645| [16448] Microsoft MN-500 Web administration denial of service
12646| [16443] Microsoft Internet Explorer Wildcard DNS entry cross-site scripting
12647| [16420] Microsoft Internet Explorer null pointer denial of service
12648| [16398] Microsoft Internet Explorer bypass security zone restrictions
12649| [16394] Microsoft Internet Explorer ADODB.Stream object code execution
12650| [16384] Microsoft ISA Server Web Proxy redirect denial of service
12651| [16383] Microsoft ISA Server Basic authentication credentials sent in plain text
12652| [16382] Microsoft ISA Server canonicalization error in Rules engine
12653| [16380] Microsoft ISA Server Web Proxy SSL denial of service
12654| [16362] Microsoft Windows XP Help Center and Support starts automatically
12655| [16361] Microsoft Internet Explorer bypass cross-zone restrictions
12656| [16348] Microsoft Internet Explorer Location: header bypass restrictions
12657| [16306] Microsoft DirectX DirectPlay denial of service
12658| [16304] Microsoft Windows JPEG buffer overflow
12659| [16276] Microsoft Windows 2000 Advanced Server fully qualified domain name security bypass
12660| [16270] Microsoft Windows IPSec filter bypass
12661| [16213] Microsoft Windows Local Security Authority buffer overflow exploit attempt detected
12662| [16211] Microsoft Windows Service Host buffer overflow exploit attempt detected
12663| [16210] Microsoft Windows Service Host buffer overflow exploit attempt detected
12664| [16208] Microsoft Windows RPC Locator Service buffer overflow exploit attempt detected
12665| [16207] Microsoft Windows kernel buffer overflow exploit attempt detected
12666| [16206] Microsoft Windows Command Shell buffer overflow exploit attempt detected
12667| [16205] Microsoft SQL Server buffer overflow exploit attempt detected
12668| [16202] Microsoft Internet Explorer buffer overflow exploit attempt detected
12669| [16201] Microsoft Internet Information Services buffer overflow exploit attempt detected
12670| [16200] Microsoft Exchange Server buffer overflow exploit attempt detected
12671| [16189] Microsoft Internet Explorer CSS denial of service
12672| [16181] Microsoft Visual Basic Command1_Click buffer overflow
12673| [16173] Microsoft Outlook 2003 OLE object bypass restricted security zone
12674| [16171] Microsoft Windows XP Explorer code execution
12675| [16168] Microsoft Outlook Express SMTP usernames and passwords disclosure
12676| [16161] Microsoft Internet Explorer browser URL spoofing
12677| [16160] Microsoft Internet Explorer MSHTM.DLL http-equiv META tag denial of service
12678| [16154] Microsoft Windows NT 4.0 TSE Security Patch denial of service
12679| [16147] Microsoft Internet Explorer showHelp CHM file execution
12680| [16119] Microsoft Outlook 2000 URL spoofing
12681| [16116] Microsoft Outlook VML information disclosure
12682| [16104] Microsoft Outlook 2003 predictable file location could allow code execution
12683| [16102] Microsoft Internet Explorer and Outlook Express A HREF URL spoofing
12684| [16095] Microsoft Windows XP and Windows Server 2003 HCP URL code execution
12685| [16091] Microsoft Internet Explorer file URL could allow an attacker to overwrite registry
12686| [16061] Microsoft Internet Explorer SSL certificate spoofing
12687| [16058] Microsoft Internet Information Server ASP information disclosure
12688| [15956] Microsoft Windows long file share name buffer overflow
12689| [15906] Microsoft Visual Studio .NET unknown Debugger configuration issue
12690| [15859] Microsoft Outlook email ASCII NUL denial of service
12691| [15853] Microsoft Internet Explorer OLE object unauthorized print job
12692| [15832] Microsoft Internet Explorer IFRAME denial of service
12693| [15818] Microsoft Windows MS04-011 patch is not installed
12694| [15813] Microsoft Windows MS04-014 patch is not installed
12695| [15811] Microsoft Windows MS04-012 patch is not installed
12696| [15809] Microsoft Outlook Express MS04-013 patch is not installed
12697| [15729] Microsoft SharePoint Portal Server cross-site scripting
12698| [15715] Microsoft Windows Negotiate Security Software Provider buffer overflow
12699| [15714] Microsoft Windows Virtual DOS Machine allows elevated privileges
12700| [15713] Microsoft Windows ASN.1 double-free
12701| [15711] Microsoft Windows object identifier could be used to open network ports
12702| [15710] Microsoft Windows H.323 buffer overflow
12703| [15709] Microsoft Windows COM Internet Service and RPC over HTTP denial of service
12704| [15708] Microsoft Windows RPCSS Service RPC message can cause denial of service
12705| [15707] Microsoft Windows Local Descriptor Table allows privilege escalation
12706| [15705] Microsoft Outlook Express MHTML URL allows execution of code
12707| [15704] Microsoft Windows XP and Windows Server 2003 HCP URL code execution
12708| [15703] Microsoft Jet Database Engine query could execute code
12709| [15702] Microsoft Windows winlogon buffer overflow
12710| [15700] Microsoft Windows 2000 Domain Controller LSASS LDAP message denial of service
12711| [15699] Microsoft Windows LSASS buffer overflow
12712| [15698] Microsoft Internet Explorer and Outlook Express URL FORM spoofing
12713| [15678] Microsoft Windows XP task creation allows privilege escalation
12714| [15632] Microsoft Windows 2000 Utility Manger allows privilege escalation
12715| [15591] Microsoft Visual Studio and Microsoft Visual C++ denial of service
12716| [15589] Microsoft Windows allows elevated privileges
12717| [15544] Microsoft Internet Explorer shell: command denial of service
12718| [15521] MSN (Microsoft Network) Messenger file transfer
12719| [15509] OpenSSL unknown TLS message types denial of service
12720| [15507] Microsoft Windows XP Explorer wmf denial of service
12721| [15461] Microsoft Windows MS04-008 patch is not installed
12722| [15429] Microsoft Outlook MS04-009 patch is not installed
12723| [15427] Microsoft Network Messenger MS04-010 patch is not installed
12724| [15414] Microsoft Outlook 2002 mailto URL allows execution of code
12725| [15394] Microsoft Windows service running under non-built-in accounts has been detected
12726| [15337] Microsoft Internet Explorer cross-frame domain restrictions bypass
12727| [15326] Microsoft Internet Explorer Perfect Nav plugin denial of service
12728| [15284] Microsoft Windows XP Windows shell shimgvw.dll buffer overflow
12729| [15263] Microsoft Windows XP and 2000 Server kernel allows elevated privileges
12730| [15256] Microsoft Windows ASN.1 buffer overflow packet using NTLM has been detected
12731| [15255] Microsoft Windows ASN.1 buffer overflow packet using SMTP has been detected
12732| [15223] Microsoft Windows access violation or exception code has been detected
12733| [15218] Microsoft Windows command shell backdoor
12734| [15210] Microsoft Internet Explorer BMP bitmap image file integer overflow
12735| [15127] Microsoft Internet Explorer and Outlook null character in host name denial of service
12736| [15113] Microsoft Virtual PC for Mac allows elevated privileges
12737| [15101] Microsoft Windows XP helpctr.exe cross-site scripting
12738| [15078] Microsoft Internet Explorer vb script reports different errors to obtain information
12739| [15057] Microsoft Windows XP and Windows Server 2003 smbmount Linux client denial of service
12740| [15039] Microsoft Windows ASN.1 Library buffer overflow
12741| [15038] Microsoft Windows 2000 Server Windows Media Services denial of service
12742| [15037] Microsoft Windows Server 2003 WINS /GS flag denial of service
12743| [15006] Microsoft Internet Explorer MS04-004 patch is not installed
12744| [14964] Microsoft Internet Explorer file extension spoofing
12745| [14924] Microsoft Windows XP folder containing HTML code and executable file code execution
12746| [14845] Microsoft Convert.exe converts FAT32 to NTFS files systems insecurely
12747| [14609] ZyncosMark attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12748| [14601] WurldMedia attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12749| [14594] WinLocator BHO attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12750| [14561] spyware VX2.BetterInternet attaches to processes of Microsoft Internet Explorer to obtain information
12751| [14560] VX2.BC777(SiteHlprBHO) attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12752| [14537] TopSearch attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12753| [14529] Thesten attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12754| [14522] Surfairy attaches to processes of Microsoft Internet Explorer and opens advertisements
12755| [14504] ShopNav Hijacker attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12756| [14494] SearchWWW attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass security software
12757| [14426] NavExcel attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
12758| [14425] MyWebSearch Toolbar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
12759| [14424] MyFastAccess Toolbar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
12760| [14422] MSMediaservice attaches to processes of Microsoft Internet Explorer and could allow an attacker to execute code
12761| [14421] MSIEbho-Stub BHO attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
12762| [14418] MPGCom Toolbar attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
12763| [14400] Kontiki attaches to processes of Microsoft Internet Explorerand acts as part of the Web browser to bypass software
12764| [14396] JAJsoft.CSRS attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
12765| [14395] iWon attaches to processes of Microsoft Internet Explorer and could allow a remote attacker to execute code
12766| [14390] IPInsight attaches to processes of Microsoft Internet Explorer and could allow an attacker to execute code
12767| [14389] Invictus MediaUpdate attaches to processes of Microsoft Internet Explorer and could allow an attacker to execute code
12768| [14383] IETop100 attaches to processes of Microsoft Internet Explorer and acts as part of the Web browser to bypass software
12769| [14380] IDGsearch spyware attaches to processes of Microsoft Internet Explorer and could allow execution of code
12770| [14378] IBIS Toolbar attaches to processes of Microsoft Internet Explorer to obtain information
12771| [14374] Httper attaches to processes of Microsoft Internet Explorer and allows execution of code
12772| [14348] Friend Toolbar attaches to processes of Microsoft Internet Explorer
12773| [14342] FindSex attaches to processes of Microsoft Internet Explorer and allows disclosure of information
12774| [14340] FavoriteMan attaches to processes of Microsoft Internet Explorer and may allow execution of code
12775| [14325] emes-x bho attaches to processes of Microsoft Internet Explorer and may allow execution of code
12776| [14316] e2Give attaches to processes of Microsoft Internet Explorer and obtains information
12777| [14314] DyFuCA attaches to processes of Microsoft Internet Explorer and obtains information
12778| [14256] BDSearch Plugin attaches to processes of Microsoft Internet Explorer and may replace the home page
12779| [14252] AutoSearchBHO attaches to processes of Microsoft Internet Explorer
12780| [14243] Alexa spyware attaches to processes of Microsoft Internet Explorer
12781| [14237] Microsoft URLScan Web server information disclosure
12782| [14187] Microsoft Data Access Components (MDAC) broadcast request buffer overflow
12783| [14179] Microsoft Data Access Components (MDAC) MS04-003 patch is not installed
12784| [14178] Microsoft ISA Exchange Server 2003 MS04-002 patch is not installed
12785| [14177] Microsoft ISA MS04-001 patch is not installed
12786| [14167] Microsoft ISA Server 2000 H.323 filter buffer overflow
12787| [14130] Microsoft Excel could allow an attacker to bypass the "
12788| [14129] Microsoft Word, Excel, and PowerPoint could allow an attacker to bypass the "
12789| [14128] Microsoft Word could allow an attacker to bypass "
12790| [14127] Microsoft Internet Explorer .lnk shortcuts could allow code execution
12791| [14105] Microsoft Internet Explorer showHelp directory traversal
12792| [14092] Microsoft Internet Explorer "
12793| [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
12794| [13975] Microsoft Internet Explorer cache attack allows code execution
12795| [13935] Microsoft Internet Explorer domain URL spoofing
12796| [13869] Microsoft Exchange Server OWA could allow unauthorized email account access
12797| [13847] Microsoft Internet Explorer download function cache directory disclosure
12798| [13846] Microsoft Internet Explorer subframe cross-site scripting
12799| [13845] Microsoft Internet Explorer mhtml: URL handler bypass check
12800| [13844] Microsoft Internet Explorer method caching perform actions
12801| [13809] Microsoft Internet Explorer scrollbar-base-color attribute denial of service
12802| [13795] Microsoft SharePoint settings.htm authentication bypass
12803| [13786] Microsoft Windows MS03-051 patch is not installed
12804| [13785] Microsoft Windows MS03-048 patch is not installed
12805| [13784] Microsoft Windows MS03-050 patch is not installed
12806| [13779] Microsoft Internet Explorer HTML injection
12807| [13682] Microsoft Word macro buffer overflow allows execution of code
12808| [13681] Microsoft Excel macro allows attacker to execute code
12809| [13680] Microsoft FrontPage Server Extensions SmartHTML Interpreter denial of service
12810| [13679] Microsoft Internet Explorer drag and drop could allow an attacker to save file to local system
12811| [13678] Microsoft Internet Explorer XML object could allow an attacker to obtain information
12812| [13677] Microsoft Internet Explorer script URLs zone bypass
12813| [13676] Microsoft Internet Explorer function pointer override zone bypass
12814| [13675] Microsoft Internet Explorer ExecCommand zone bypass
12815| [13674] Microsoft FrontPage Server Extensions debug buffer overflow
12816| [13652] Microsoft Data Access Components GET request
12817| [13639] Microsoft Windows Workstation buffer overflow
12818| [13638] Microsoft Windows MS03-049 patch is not installed
12819| [13617] Microsoft Internet Explorer clientCaps behavior could disclose sensitive information
12820| [13588] Microsoft Internet Explorer IFRAME tag could allow an attacker to execute files
12821| [13558] Microsoft Windows XP CommCtl32.dll could allow an attacker to execute code
12822| [13509] Microsoft Windows HTML Help could allow an attacker to gain privileges
12823| [13501] Microsoft Internet Explorer position: absolute denial of service
12824| [13500] Microsoft Word malformed document
12825| [13482] Microsoft Windows MS03-047 patch is not installed
12826| [13480] Microsoft Windows MS03-046 patch is not installed
12827| [13478] Microsoft Windows MS03-044 patch is not installed
12828| [13473] Microsoft Windows MS03-045 patch is not installed
12829| [13472] Microsoft Windows MS03-042 patch is not installed
12830| [13471] Microsoft Windows MS03-041 patch is not installed
12831| [13453] Microsoft Internet Information Server 404 error message determines service pack level
12832| [13444] Microsoft Windows Non-English patched with MS03-045 denial of service in Sophos Anti-Virus
12833| [13433] Microsoft Exchange SMTP extended verb request denial of service
12834| [13432] Microsoft Exchange SMTP extended verb request buffer overflow
12835| [13426] Microsoft Windows 2000 and XP RPC race condition
12836| [13424] Microsoft Windows User32.dll ListBox and ComboBox controls buffer overflow
12837| [13423] Microsoft Windows 2000 Local Troubleshooter ActiveX control buffer overflow
12838| [13422] Microsoft Windows Authenticode could allow an attacker to execute code
12839| [13421] Microsoft Exchange Server OWA Compose New Message form cross-site scripting
12840| [13420] Microsoft Windows HSC HCP protocol file buffer overflow
12841| [13413] Microsoft Windows Messenger Service popup buffer overflow
12842| [13412] Microsoft Windows MS03-043 patch is not installed
12843| [13407] Microsoft Windows 2000 Server mqsvc.exe MQLocateBegin packet buffer overflow
12844| [13385] Microsoft Windows Server 2003 "
12845| [13376] Microsoft Internet Explorer Dynamic HTML behaviors allows an attacker to execute code
12846| [13375] Microsoft Windows Media Player Dynamic HTML behaviors allows an attacker to execute code
12847| [13364] Microsoft Windows MS03-040 patch is not installed
12848| [13344] Microsoft Windows 98 flood of fragmented UDP packets causes denial of service
12849| [13342] Microsoft Windows PostThreadMessage API allows processes to be terminated without permission
12850| [13314] Microsoft Internet Explorer popup window containing Object Data tags could allow an attacker to execute code
12851| [13300] Microsoft Internet Explorer XML Web page containing Object Data tags could allow an attacker to execute code
12852| [13285] Microsoft PowerPoint data manipulation
12853| [13242] Microsoft BizTalk Server insecure permissions in BizTalkServerDocs and BizTalkServerRespository directories allow file upload
12854| [13211] Microsoft Windows 2000 and XP URG memory leak
12855| [13183] Microsoft Windows service pack detected
12856| [13176] Microsoft Internet Explorer media sidebar could allow an attacker to execute code
12857| [13171] Microsoft Windows Server 2003 can allow attacker to bypass mechanism used to detect buffer overflows
12858| [13166] Microsoft Internet Explorer history.back function allows attacker to obtain information from a site loaded in a different frame and domain
12859| [13165] Microsoft Internet Explorer NavigateAndFind function allows an attacker to obtain information and execute code
12860| [13163] Microsoft Internet Explorer window.open function allows an attacker to obtain information and execute code
12861| [13162] Microsoft Internet Explorer history.back function allows an attacker to obtain information and execute code
12862| [13161] Microsoft Internet Explorer allows an attacker to obtain cookies by opening Web site in _search window
12863| [13134] Microsoft Windows MS03-039 patch is not installed
12864| [13131] Microsoft Windows 2000 Message Queue Manager buffer overflow
12865| [13129] Microsoft Windows RPCSS DCOM buffer overflows
12866| [13126] Microsoft ASP.NET could allow an attacker to bypass Request Validation feature
12867| [13116] Microsoft IIS MS03-018 patch is not installed on the system
12868| [13105] Microsoft Windows Update fails to notify users of updates when host-blocking is used
12869| [13095] Microsoft Windows auto update is disabled
12870| [13093] Microsoft Access Snapshot Viewer buffer overflow
12871| [13091] Microsoft Office WordPerfect converter buffer overflow
12872| [13090] Microsoft Word could allow an attacker to bypass Macro Security Model
12873| [13089] Microsoft Windows NetBIOS Name Service information disclosure
12874| [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
12875| [13029] Microsoft Internet Explorer input type tag denial of service
12876| [12970] Microsoft Internet Explorer DBCS Type property of Object tag buffer overflow
12877| [12962] Microsoft Internet Explorer BR549.DLL ActiveX control buffer overflow
12878| [12961] Microsoft Internet Explorer browser cache script injection
12879| [12960] Microsoft Internet Explorer Object Data tags could allow an attacker to execute code
12880| [12959] Microsoft Data Access Components broadcast request buffer overflow
12881| [12914] Microsoft Internet Explorer about:blank page cross-site scripting
12882| [12910] Microsoft Visual Studio MCWNDX ActiveX buffer overflow
12883| [12903] Microsoft Windows command shell banner
12884| [12872] Microsoft NetMeeting malformed packet denial of service
12885| [12835] Microsoft Windows Pocket PC could allow an attacker to gain access
12886| [12783] Microsoft Internet Information Server ASP engine could allow an attacker to upload malicious files
12887| [12762] Microsoft Windows NT 4.0 Q823803i patch RRAS denial of service
12888| [12747] Microsoft Windows RPC DCOM interface buffer overflow detected
12889| [12724] Microsoft Windows Media Player ASF file could allow code execution
12890| [12704] Microsoft SQL Server named pipe hijack
12891| [12703] Microsoft SQL Server LPC buffer overflow
12892| [12702] Microsoft DirectX MIDI buffer overflows
12893| [12701] Microsoft Windows NT 4.0 Server file management function denial of service
12894| [12700] Microsoft SQL Server named pipe denial of service
12895| [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
12896| [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
12897| [12684] Microsoft Exchange Server OWA Outlook 2003 denial of service
12898| [12679] Microsoft Windows RPC DCOM denial of service
12899| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
12900| [12627] Microsoft ISA homepage function error page cross-site scripting
12901| [12620] Microsoft Windows 2000 Server SMTP FILETIME denial of service
12902| [12590] Microsoft Internet Explorer window.external.AutoScan function cross-site scripting
12903| [12544] Microsoft Windows Servers SMB packet buffer overflow
12904| [12543] Microsoft Windows 2000 Accessibility Utility Manager could allow an attacker to gain privileges
12905| [12538] Microsoft Internet Explorer C:\aux URL denial of service
12906| [12533] Microsoft Windows MS03-010 patch is not installed
12907| [12532] Microsoft Exchange OWA REFERER header cross-site scripting
12908| [12531] Microsoft Exchange OWA could allow an attacker to execute code
12909| [12530] Microsoft SQL Server CreateFile API function allows attacker to gain privileges
12910| [12521] Microsoft Windows Rundll32.exe overly long routine name buffer overflow
12911| [12493] Microsoft Windows Shell32.dll 2000 ShellExecute function buffer overflow
12912| [12490] Microsoft NetMeeting "
12913| [12489] Microsoft Windows 2000 Server Active Directory buffer overflow
12914| [12444] Microsoft Internet Explorer HTML conversion library buffer overflow
12915| [12442] Microsoft Windows XP SP1 Windows shell desktop.ini buffer overflow
12916| [12440] Microsoft Windows Media Player ActiveX control could disclose sensitive information
12917| [12336] Microsoft Internet Explorer Homepage function could allow command execution
12918| [12334] Microsoft Internet Explorer MSXML cross-site scripting
12919| [12249] Microsoft Internet Explorer FTP implementation "
12920| [12193] Microsoft Internet Explorer "
12921| [12187] Microsoft Windows XP gethostbyaddr() denial of service
12922| [12184] Microsoft Internet Explorer Type property of Object tag buffer overflow
12923| [12137] Microsoft Internet Explorer URL spoofing
12924| [12128] Microsoft Windows 2000 and Windows NT MS03-019 patch is not installed
12925| [12100] Microsoft IIS long WebDAV requests containing XML denial of service
12926| [12099] Microsoft IIS Response.AddHeader denial of service
12927| [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
12928| [12097] Microsoft IIS redirect error cross-site scripting
12929| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
12930| [12089] Microsoft SQL Server Jet OLE DB Provider is enabled
12931| [12048] Microsoft Windows 2000 and Windows Server 2003 LAN Manager hash creation enabled
12932| [12043] Microsoft Internet Explorer Script Engine denial of service
12933| [12019] Microsoft Internet Explorer FRAME or IFRAME bypass restrictions
12934| [11953] Microsoft Windows Media Player skin downloading could allow an attacker to execute code
12935| [11946] Microsoft Internet Explorer anchorClick behavior denial of service
12936| [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
12937| [11901] Microsoft BizTalk Server 2002 SQL injection
12938| [11900] Microsoft BizTalk Server 2002 HTTP Receiver function buffer overflow
12939| [11873] Microsoft Internet Explorer, Outlook, and FrontPage shlwapi.dll library denial of service
12940| [11854] Microsoft Internet Explorer plug-in.ocx Load method buffer overflow
12941| [11849] Microsoft Internet Explorer Modal Dialog could allow an attacker to read files
12942| [11848] Microsoft Internet Explorer improper rendering of third party file types could allow code execution
12943| [11847] Microsoft Internet Explorer File Upload control allows attacker to obtain information
12944| [11846] Microsoft Internet Explorer URLMON.DLL library buffer overflow
12945| [11824] Microsoft Windows XP Service Control Manager (SCM) race condition
12946| [11822] Microsoft Windows regedit.exe command execution
12947| [11816] Microsoft Windows 2000 Terminal Services MSGINA.DLL insecure access permissions
12948| [11810] Microsoft Windows win2k.sys EngTextOut denial of service
12949| [11805] Microsoft Internet Explorer OBJECT tag denial of service
12950| [11803] Microsoft Windows kernel LpcRequestWaitReplyPort() buffer overflow
12951| [11776] Microsoft Active Directory insecure permissions on SYSTEM-account
12952| [11752] Microsoft ISA and Proxy Server Firewall and Winsock Proxy service denial of service
12953| [11751] Microsoft VM ByteCode Verifier improper validation of code
12954| [11696] Microsoft Windows 2000 Terminal Services man-in-the-middle attack
12955| [11617] Microsoft Windows 2000 MS03-007 patch is not installed on the system
12956| [11589] Microsoft ActiveSync "
12957| [11586] Multiple SSL/TLS implementation could leak premaster-secret value
12958| [11576] Microsoft ISA DNS intrusion detection application filter denial of service
12959| [11575] Microsoft Windows Script Engine buffer overflow
12960| [11547] Multiple SSL/TLS implementation RSA private key information leak
12961| [11546] Microsoft Windows 2000 Windows Help Facility .cnt file buffer overflow
12962| [11537] Microsoft IIS WebDAV service is running on the system
12963| [11536] Microsoft Windows PostMessage() API function could disclose password
12964| [11533] Microsoft IIS WebDAV long request buffer overflow
12965| [11507] Microsoft Internet Explorer .mht buffer overflow
12966| [11505] Microsoft Windows XP Safe Mode bypass
12967| [11466] Microsoft Internet Explorer embedded HTML EXE file execution
12968| [11430] Microsoft Locator service is running on the system
12969| [11425] Microsoft Windows Me HSC hcp:// buffer overflow
12970| [11411] Microsoft Outlook CODEBASE value allows remote program execution
12971| [11369] Multiple SSL/TLS implementation CBC ciphersuites information leak
12972| [11344] Microsoft Windows riched20.dll attribute label buffer overflow
12973| [11329] Microsoft Windows NT and 2000 cmd.exe CD path name buffer overflow
12974| [11274] Microsoft Windows 2000 NetBIOS continuation packets denial of service
12975| [11273] Microsoft Windows 2000 RPC service could allow an attacker to gain elevated privileges
12976| [11264] Microsoft Internet Explorer MS03-004 patch is not installed on the system
12977| [11260] Microsoft Windows XP Windows Redirector buffer overflow
12978| [11259] Microsoft Internet Explorer showHelp() zone bypass
12979| [11258] Microsoft Internet Explorer dialog box zone bypass
12980| [11250] Microsoft Internet Explorer dragDrop() method could be used to read local files
12981| [11216] Microsoft Windows NT and 2000 command prompt denial of service
12982| [11155] FTLS.org Guestbook multiple form field cross-site scripting
12983| [11141] Microsoft Windows 2000 Terminal Services MSGINA.DLL denial of service
12984| [11133] Microsoft Outlook 2002 using V1 Exchange Server Security certificates transmits plaintext emails
12985| [11132] Microsoft Windows Locator service buffer overflow
12986| [11030] Microsoft Windows OpenType font (.otf) fontview denial of service
12987| [10958] Microsoft Windows File Protection certificate chains with a trusted root CA are accepted
12988| [10957] Microsoft Windows File Protection fails to remove old security catalog .CAT files
12989| [10945] Microsoft Internet Explorer multimedia file URL cross-site scripting
12990| [10892] Microsoft Windows XP Shell media file buffer overflow
12991| [10883] Microsoft Internet Explorer Browser Helper Object (BHO) could disclose information
12992| [10843] Microsoft Windows 2000 and XP SMB signing group policy modification
12993| [10833] Microsoft VM JDBC APIs could allow unauthorized database access
12994| [10822] Microsoft Word and Excel stores ODBC passwords and usernames in plain text
12995| [10809] Microsoft Internet Explorer MS02-068 patch is not installed on the system
12996| [10798] Microsoft Internet Explorer dialog window style parameter can access a user`s local security zone
12997| [10764] Microsoft Windows XP wireless LAN feature could leak information
12998| [10763] Microsoft Outlook malformed email header denial of service
12999| [10760] Microsoft RDS has been enabled on the system
13000| [10736] Microsoft Windows XP Fast User Switching could disclose user processes
13001| [10674] Microsoft Internet Explorer IFRAME dialogArguments object can access a user`s local security zone
13002| [10670] Microsoft Data Access Components (MDAC) MS02-065 patch is not installed
13003| [10669] Microsoft Data Access Components RDS Data Stub client heap buffer overflow
13004| [10665] Microsoft Internet Explorer OBJECT tag could be used to read TIF folder name
13005| [10662] Microsoft Internet Explorer PNG inflate_fast() buffer overflow
13006| [10659] Microsoft Data Access Components RDS Data Stub server heap buffer overflow
13007| [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
13008| [10588] Microsoft VM HTML Applet tag denial of service
13009| [10587] Microsoft VM passed HTML object denial of service
13010| [10586] Microsoft VM CabCracker class could allow an attacker to load .cab archives
13011| [10585] Microsoft VM StandardSecurityManager class restriction bypass
13012| [10584] Microsoft VM Java Applet codebase tag could be used to read files
13013| [10583] Microsoft VM INativeServices could be used to access clipboard contents
13014| [10582] Microsoft VM INativeServices could allow unauthorized memory access
13015| [10581] Microsoft VM Java Applet could disclose path to current directory
13016| [10580] Microsoft VM Java Applet class loader buffer overflow
13017| [10579] Microsoft VM URL redirect cross-domain Java Applet execution
13018| [10542] Microsoft SQL Server login accounts use weak encryption algorithm
13019| [10504] Microsoft IIS script source access could be bypassed to upload .COM files
13020| [10503] Microsoft IIS WebDAV memory allocation denial of service
13021| [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
13022| [10501] Microsoft IIS administrative Web pages cross-site scripting
13023| [10500] Microsoft Outlook Express fails to delete messages from dbx files
13024| [10459] Microsoft Internet Explorer could allow an attacker to bypass cookie restrictions
13025| [10443] Microsoft Internet Explorer saved "
13026| [10440] Microsoft Internet Explorer clipboardData cached object DOM access
13027| [10439] Microsoft Internet Explorer execCommand cached object DOM access
13028| [10438] Microsoft Internet Explorer getElementsByTagName cached object DOM access
13029| [10437] Microsoft Internet Explorer getElementsByName cached object DOM access
13030| [10436] Microsoft Internet Explorer getElementById cached object DOM access
13031| [10435] Microsoft Internet Explorer elementFromPoint cached object DOM access
13032| [10434] Microsoft Internet Explorer createRange cached object DOM access
13033| [10433] Microsoft Internet Explorer external cached object DOM access
13034| [10432] Microsoft Internet Explorer showModalDialog cached object DOM access
13035| [10431] Microsoft Windows 2000 SNMP LANMAN Extension memory leak denial of service
13036| [10400] Microsoft Windows 2000 RPC TCP port 135 denial of service
13037| [10398] Microsoft Windows Media Player world-writable executables
13038| [10388] Microsoft SQL Server Web tasks could allow elevated privileges
13039| [10377] Microsoft Windows XP and 2000 administrative alerts fail when security event log is full
13040| [10371] Microsoft Internet Explorer oIFrameElement.Document cross-domain script execution
13041| [10370] Microsoft IIS HTTP HOST header denial of service
13042| [10343] Microsoft Windows NetDDE Agent can be used to gain elevated privileges
13043| [10342] Microsoft TSAC ActiveX connect.asp cross-site scripting
13044| [10338] Microsoft Outlook Express S/MIME certificate buffer overflow
13045| [10318] Microsoft Content Management Server (MCMS) ManualLogin.asp REASONTXT cross-site scripting
13046| [10294] Microsoft IIS .idc extension error message cross-site scripting
13047| [10290] Microsoft Internet Explorer saved "
13048| [10279] Microsoft Windows XP "
13049| [10259] Microsoft Services for Unix (SFU) invalid RPC packet denial of service
13050| [10258] Microsoft Services for Unix (SFU) RPC parameter size buffer overflow could crash the server
13051| [10257] Microsoft SQL Server Agent scheduled jobs could create malicious output files
13052| [10255] Microsoft SQL Server Database Consistency Checker (DBCC) buffer overflow
13053| [10254] Microsoft Windows compiled HTML Help (.chm) files could be used to execute code
13054| [10253] Microsoft Windows HTML Help ActiveX buffer overflow
13055| [10252] Microsoft Windows zipped file decompression incorrect target path
13056| [10251] Microsoft Windows zipped file decompression buffer overflow
13057| [10215] Microsoft Windows Scripting Host is running on the system
13058| [10199] Microsoft Windows 2000/XP PPTP packet buffer overflow
13059| [10195] Microsoft FrontPage Server Extensions (FPSE) 2002 SmartHTML Interpreter buffer overflow
13060| [10194] Microsoft FrontPage Server Extensions (FPSE) 2000 SmartHTML Interpreter denial of service
13061| [10186] Microsoft Active Data Objects (ADO) buffer overflow
13062| [10184] Microsoft IIS 5.0 resource utilization denial of service
13063| [10180] Microsoft Internet Explorer fails to report an expired SSL CA certificate
13064| [10179] Microsoft Virtual Machine (VM) JDBC class allows access to ODBC data sources
13065| [10158] Microsoft Internet Explorer HTTP redirect bypass restrictions
13066| [10155] Microsoft Word INCLUDEPICTURE field in shared documents can be used to read other files
13067| [10135] Microsoft Virtual Machine (VM) XML methods can be accessed
13068| [10134] Microsoft Virtual Machine (VM) JDBC handle validation could crash Internet Explorer
13069| [10133] Microsoft Virtual Machine (VM) JDBC classes can execute local DLLs
13070| [10132] Microsoft Windows fails to properly check execute permissions for 16-bit executable files
13071| [10122] Microsoft Windows Remote Desktop Protocol could allow an attacker to monitor keystrokes
13072| [10121] Microsoft Windows Remote Desktop Protocol checksum information leak
13073| [10120] Microsoft Windows XP Remote Desktop malformed PDU Confirm Active packet denial of service
13074| [10119] Microsoft NetMeeting RDS local session hijacking
13075| [10117] Microsoft Internet Explorer FTP URL denial of service
13076| [10067] Microsoft Outlook Express "
13077| [10066] Microsoft Internet Explorer frame/iframe javascript: URL cross-domain script execution
13078| [10039] Microsoft Internet Explorer URL encoded forward-slash "
13079| [10035] Microsoft Visual FoxPro could allow an attacker to execute an application
13080| [10033] Microsoft Outlook Express S/MIME spoofed CA certificate man-in-the-middle attack
13081| [10031] Microsoft SQL Server Resolution Service stack buffer overflow
13082| [10012] Microsoft SQL Server sp_MSSetServerProperties and sp_MSsetalertinfo stored procedures allow "
13083| [10008] Microsoft Word INCLUDETEXT field in shared documents can be used to read other files
13084| [9982] Microsoft Windows Certificate Enrollment Control ActiveX control could be used to delete digital certificates
13085| [9971] Microsoft Windows Media Player .wmf file extension or content type spoofing
13086| [9953] Microsoft Windows Media Player WMD code execution
13087| [9946] Microsoft Windows 2000 Terminal Services session screensaver fails to lock the console
13088| [9938] Microsoft Internet Explorer "
13089| [9937] Microsoft Internet Explorer file download origin spoofing
13090| [9936] Microsoft Internet Explorer XML redirect could be used to read files
13091| [9935] Microsoft Legacy Text Formatting ActiveX control buffer overflow
13092| [9934] Microsoft TSAC ActiveX control buffer overflow
13093| [9933] Microsoft Windows NT/2000/XP SMB packet request buffer overflow
13094| [9931] Microsoft Office Web Components MS02-044 patch is not installed on the system
13095| [9907] Microsoft FTM ActiveX control could be used by an attacker to upload and download files
13096| [9906] Microsoft FTM ActiveX control "
13097| [9893] Microsoft SQL Server Agent jobs could be used to create and overwrite files
13098| [9886] Microsoft Internet Explorer Java logging could be used to execute code
13099| [9885] Microsoft Internet Explorer XML Datasource applet could be used to read local files
13100| [9883] Microsoft Internet Explorer Google Toolbar search request denial of service
13101| [9881] Microsoft Internet Explorer "
13102| [9878] Microsoft Windows XP Help and Support Center HCP:// URL could be used to delete files
13103| [9877] Microsoft DirectX Files Viewer control buffer overflow
13104| [9869] Microsoft Windows NTFS hard links could bypass event auditing logs
13105| [9857] Microsoft SQL Server XPs with weak permissions could allow elevated privileges
13106| [9856] Microsoft Windows 2000 NCM handler routine could allow elevated privileges
13107| [9848] Microsoft Internet Explorer HTM script execution
13108| [9791] Microsoft Exchange IIS license exhaustion denial of service
13109| [9789] Microsoft Exchange MSRPC denial of service
13110| [9788] Microsoft SQL Server pre-authentication buffer overflow
13111| [9785] Microsoft Content Management Server (MCMS) resource request SQL injection
13112| [9784] Microsoft Content Management Server (MCMS) Web authoring file execution
13113| [9783] Microsoft Content Management Server (MCMS) authentication buffer overflow
13114| [9779] Microsoft Windows 2000 weak system partition permissions
13115| [9752] Microsoft Windows 2000 Service Pack 3 is not installed
13116| [9746] Microsoft Windows 2000 HTML Help item parameter buffer overflow
13117| [9734] Microsoft SQL Server MDAC OpenRowSet buffer overflow
13118| [9732] Microsoft Office Web Components (OWC) could allow a remote attacker to execute code
13119| [9727] Microsoft Windows Media Player mplay32 long file name buffer overflow
13120| [9724] Microsoft Outlook Express could allow the execution of XML files within the Temporary Internet File (TIF) directory
13121| [9667] Microsoft SQL Server MS02-038 patch
13122| [9666] Microsoft SQL Server MS02-039 patch
13123| [9662] Microsoft SQL Server Resolution Service keep-alive function denial of service
13124| [9661] Microsoft SQL Server Resolution Service heap buffer overflow
13125| [9660] Microsoft SQL Server replication stored procedures are vulnerable to SQL Injection
13126| [9659] Microsoft SQL Server Database Consistency Checker (DBCC) utilities have multiple buffer overflows
13127| [9658] Microsoft Exchange Server Internet Mail Connector (IMC) EHLO buffer overflow
13128| [9657] Microsoft Metadirectory Services (MMS) could allow unauthorized access to the data repository
13129| [9653] Microsoft Internet Explorer CTRL key could be used to upload files
13130| [9643] Microsoft Outlook Express malformed MIME headers could allow file type, size, and icon spoofing
13131| [9625] Microsoft Windows 2000 Narrator allows login information to be audible
13132| [9617] Microsoft Internet Explorer JavaScript page transitions denial of service
13133| [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
13134| [9537] Microsoft Internet Explorer WebBrowser control OBJECT property could allow cross domain scripting
13135| [9531] Microsoft Internet Explorer CLASSID denial of service
13136| [9529] Microsoft Foundation Class Library ISAPI Buffer Overflow
13137| [9525] Microsoft Outlook PGP plug-in heap buffer overflow could allow remote code execution
13138| [9524] Microsoft SQL Server could store some passwords insecurely
13139| [9523] Microsoft SQL Server service account insecure registry permissions
13140| [9522] Microsoft SQL Server bulk data insert buffer overflow
13141| [9426] Microsoft Commerce Server new variant of AuthFilter ISAPI filter buffer overflow
13142| [9425] Microsoft Commerce Server OWC package installer folder permissions could allow remote command execution
13143| [9424] Microsoft Commerce Server OWC package installer buffer overflow
13144| [9423] Microsoft Commerce Server Profile Service API buffer overflow
13145| [9422] Microsoft Windows Media Player Active Playlist could allow local HTML script execution
13146| [9421] Microsoft Windows Media Player WMDM service invalid resource connection could allow elevated privileges
13147| [9420] Microsoft Windows Media Player cache path disclosure could allow remote execution of code
13148| [9399] Microsoft Excel XSL Stylesheet allows attacker to execute script code
13149| [9398] Microsoft Excel allows macro execution if opened using hyperlink with drawing shape object
13150| [9397] Microsoft Excel execute inline macros
13151| [9367] Microsoft Internet Explorer Cascading Style-Sheet (CSS) bold font denial of service
13152| [9362] Microsoft Visual Studio .NET (Korean version) includes a Nimda-infected file
13153| [9346] Log Explorer for Microsoft SQL Server xp_logattach buffer overflow
13154| [9345] Microsoft SQL Server pwdencrypt() buffer overflow
13155| [9329] Microsoft SQL Server SQLXML XML tag script injection
13156| [9328] Microsoft SQL Server SQLXML ISAPI buffer overflow
13157| [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
13158| [9326] Microsoft RAS phonebook local buffer overflow
13159| [9290] Microsoft Internet Explorer FTP server name cross-site scripting
13160| [9276] Microsoft ASP.NET StateServer buffer overflow
13161| [9247] Microsoft Internet Explorer Gopher client malformed reply buffer overflow
13162| [9195] Microsoft Exchange message attribute denial of service
13163| [9187] Microsoft Passport SDK 2.1 Component Configuration Document (CCD) permission
13164| [9159] Microsoft Active Directory zero page length denial of service
13165| [9154] Microsoft Data Engine (MSDE) and Microsoft SQL Server 2000 Desktop Engine have a default blank "
13166| [9146] Microsoft Passport SDK 2.1 events reporting disabled
13167| [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
13168| [9122] Microsoft Internet Explorer JavaScript self.location refresh denial of service
13169| [9121] Microsoft Internet Explorer for Unix could cause the CDE or X Server to crash when scrolling Chinese characters
13170| [9101] Microsoft Internet Explorer cookies with embedded script could be used to access other cookies on the local system
13171| [9094] Microsoft Passport Manager PASSPORTLOG.LOG exposure
13172| [9091] Microsoft Passport Manager verbose mode exposure
13173| [9090] Microsoft Internet Explorer MS02-023 patch is not installed on the system
13174| [9089] Microsoft Internet Explorer and Outlook Express BGSOUND tag could allow an attacker to obtain sensitive information
13175| [9088] Microsoft Internet Explorer and Outlook Express IFRAME tag could allow attacker to send data to a DOS device
13176| [9087] Microsoft Internet Explorer and Outlook Express BGSOUND DOS device reference could cause a denial of service
13177| [9086] Microsoft Internet Explorer "
13178| [9085] Microsoft Internet Explorer "
13179| [9084] Microsoft Internet Explorer NetBIOS connection could allow rendering of Web sites with incorrect security zone
13180| [9077] Microsoft Word Mail Merge variant could allow an attacker to execute arbitrary commands
13181| [9068] Microsoft Passport SDK 2.1 registry default permission exposure
13182| [9067] Microsoft Passport SDK 2.1 default test site exposure
13183| [9066] Microsoft Passport SDK 2.1 Adventure Works Sample Site exposure
13184| [9065] Microsoft Passport SDK 2.1 Adventure Works Sample Site global.asa file default permission exposure
13185| [9064] Microsoft Passport SDK 2.1 default time window exposure
13186| [8969] Microsoft Internet Explorer and Outlook Express malformed XBM file denial of service
13187| [8947] Microsoft Baseline Security Analyzer creates a plaintext security report file
13188| [8941] Microsoft Internet Explorer JavaScript recursive onError event denial of service
13189| [8926] Microsoft Outlook Express POP3 message containing two "
13190| [8918] Microsoft Windows XP Remote Desktop Access is enabled
13191| [8915] Microsoft Windows XP Internet Configuration Firewall is disabled
13192| [8904] Microsoft Internet Explorer self-referenced OBJECT directive denial of service
13193| [8892] Microsoft Windows XP "
13194| [8891] Microsoft Windows XP option to digitally sign server communications disabled
13195| [8890] Microsoft Windows XP option to digitally sign client communications when server agrees disabled
13196| [8889] Microsoft Windows XP option to digitally sign server communications when client agrees disabled
13197| [8888] Microsoft Windows XP security option to digitally sign client communications disabled
13198| [8882] Microsoft Windows XP Session security for NTLM SSP based servers is below minimum
13199| [8880] Microsoft Windows XP Session security for NTLM SSP based clients is below minimum
13200| [8868] Microsoft Internet Explorer dialog window cross-site scripting
13201| [8867] Microsoft Windows 2000 LanMan denial of service
13202| [8862] Microsoft BackOffice Server allows attacker to bypass authentication for Web administration pages
13203| [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
13204| [8851] Microsoft Internet Explorer for Macintosh could allow remote AppleScript execution
13205| [8850] Microsoft Internet Explorer and Office for Macintosh HTML file:// directive buffer overflow
13206| [8844] Microsoft Internet Explorer history allows URLs using the JavaScript protocol
13207| [8816] Microsoft Internet Explorer does not clear local Web cache
13208| [8815] Microsoft VBScript ActiveX Word object denial of service
13209| [8813] Microsoft Windows 2000 Terminal Services allows attacker to bypass group policy settings
13210| [8811] Microsoft IIS MS02-018 patch is not installed on the system
13211| [8810] Microsoft Outlook allows users access to blocked attachments
13212| [8808] Microsoft Outlook Express allows attacker to create false attachment by changing icon
13213| [8804] Microsoft IIS redirected URL error cross-site scripting
13214| [8803] Microsoft IIS HTTP error page cross-site scripting
13215| [8802] Microsoft IIS Help File search cross-site scripting
13216| [8801] Microsoft IIS FTP session status request denial of service
13217| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
13218| [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
13219| [8798] Microsoft IIS SSI safety check buffer overflow
13220| [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
13221| [8796] Microsoft IIS ASP data transfer heap buffer overflow
13222| [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
13223| [8786] Microsoft OWC DataSourceControl component could allow an attacker to verify a file`s existence using the "
13224| [8785] Microsoft OWC Spreadsheet component could allow an attacker to verify a file`s existence using the "
13225| [8784] Microsoft OWC Chart component could allow an attacker to verify a file`s existence using the "
13226| [8779] Microsoft OWC Spreadsheet component "
13227| [8778] Microsoft OWC Spreadsheet component "
13228| [8777] Microsoft OWC Spreadsheet component "
13229| [8759] Microsoft Windows 2000 could allow an attacker to block the application of Group Policy settings
13230| [8752] Microsoft Windows NT, 2000, and XP MUP buffer overflow
13231| [8740] Microsoft Internet Explorer Cascading Style Sheets (CSS) can be used to read portions of local files
13232| [8739] Microsoft Windows 2000 DCOM memory leak
13233| [8728] Microsoft Windows Registry remote write audit
13234| [8727] Microsoft Windows Registry remote access audit
13235| [8711] Microsoft Office XP spreadsheet component host() function cross-application scripting
13236| [8708] Microsoft Outlook 2000 and 2002 executes embedded script in object tag when replying or forwarding HTML mail
13237| [8701] Microsoft Internet Explorer cookie allows remote attacker to execute script code in Local Computer zone
13238| [8681] Microsoft Exchange OWA using RSA Security SecurID authentication bypass
13239| [8667] Microsoft Internet Explorer and Outlook could allow the execution of files within Temporary Internet Files (TIFs)
13240| [8658] Microsoft Internet Explorer DYNSRC information disclosure
13241| [8621] Microsoft Internet Explorer on Windows Me fails to prompt user when a cookie is stored if set using JavaScript
13242| [8615] Microsoft Outlook image tags allows remote attacker to bypass cookie settings
13243| [8613] Microsoft Outlook allows remote attacker to embed JavaScript in URLs using HREF attribute
13244| [8611] Microsoft Outlook IFRAME tags allows malicious Web sites to embed URLs
13245| [8604] Microsoft Outlook allows an attacker to execute JavaScript code by using IFRAME tags to reference malicious Windows Media Player file
13246| [8559] Microsoft Windows registry security SAM read
13247| [8512] Microsoft Windows NT security ID lookup
13248| [8509] Microsoft Windows startup folder access
13249| [8488] Microsoft Internet Explorer JavaScript location.replace loop denial of service
13250| [8480] Sun Java Runtime Environment and Microsoft Virtual Machine (VM) Bytecode Verifier could allow a Java Applet to bypass security restrictions
13251| [8473] Microsoft Internet Explorer URL encoded characters could allow an attacker to access cookie information
13252| [8471] Microsoft Internet Explorer dotless IP variant could allow rendering of Web sites with incorrect Security Zone
13253| [8462] Microsoft Windows NT/2000 debugging subsystem allows attacker to create duplicate handles
13254| [8402] Microsoft Windows 2000 allows an attacker to bypass password policy
13255| [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
13256| [8386] PureTLS could allow injection attacks
13257| [8385] Microsoft IIS specially-crafted request reveals IP address
13258| [8384] Microsoft Windows Shell buffer overflow can occur when an application has been improperly removed
13259| [8382] Microsoft IIS authentication error messages reveal configuration information
13260| [8370] ARCserve backup client and Inoculan AV client for Microsoft Exchange stores plain text account information in exchverify.log
13261| [8362] Microsoft FrontPage form_results.txt is world readable
13262| [8359] Microsoft SQL Server multiple extended stored procedure buffer overflows
13263| [8356] Microsoft Outlook X-UIDL: header denial of service
13264| [8351] Sun Java Runtime Environment and Microsoft Virtual Machine (VM) Java Applet could be used to redirect browser traffic when using a proxy
13265| [8341] Microsoft Internet Explorer 4.0 long OBJECT CLASSID denial of service
13266| [8307] Microsoft Windows 2000, Windows XP, and Exchange 2000 SMTP data transfer command denial of service
13267| [8304] Microsoft Windows 2000 and Exchange 5.5 SMTP service unauthorized mail privileges
13268| [8254] Microsoft Commerce Server 2000 AuthFilter ISAPI filter buffer overflow
13269| [8252] Microsoft Internet Explorer VBScript can be used to view local files
13270| [8243] Microsoft SQL Server OLE DB provider name "
13271| [8242] Microsoft Visual C++.Net and Visual C++ insecure buffer overflow protection
13272| [8231] Microsoft Windows NT SNMP OID decoding memory leak
13273| [8218] Microsoft Internet Explorer Content-Type header cross-site scripting
13274| [8209] Microsoft Windows XP CIFS port denial of service
13275| [8207] Microsoft Windows XP UDP port denial of service
13276| [8199] Microsoft Windows 2000 Terminal Services unlocked client
13277| [8198] Microsoft Outlook Express <
13278| [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
13279| [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
13280| [8120] Microsoft Internet Explorer could allow an attacker to execute script despite disabled scripting
13281| [8118] Microsoft Internet Explorer could be used to open a program on a remote system
13282| [8117] Microsoft Internet Explorer could misrepresent file names in the file download dialog box
13283| [8116] Microsoft Internet Explorer HTML "
13284| [8094] Microsoft Windows 2000 and Interix 2.2 Telnet protocol option buffer overflow
13285| [8092] Microsoft Exchange 2000 System Attendant sets incorrect registry permissions
13286| [8087] Microsoft Office v. X for Mac OS X PID Checker denial of service
13287| [8080] Microsoft Site Server sample sites allow SQL injection
13288| [8077] Microsoft Windows Messenger and/or MSN Messenger is present on the system
13289| [8073] Microsoft Site Server LDAP_Anonymous user account generates weak passwords
13290| [8071] Microsoft Site Server ASP files reveals sensitive information
13291| [8069] Microsoft Site Server POST command directory traversal
13292| [8056] Microsoft IIS is running on the system
13293| [8053] Microsoft Site Server "
13294| [8051] Microsoft Site Server stores LDAP member passwords in plain text
13295| [8050] Microsoft Site Server default ASP pages allow cross-site scripting
13296| [8048] Microsoft Site Server LDAP_Anonymous default account and password
13297| [8043] Microsoft Windows NT, 2000, and XP using NTFS could allow files to be hidden
13298| [8037] Microsoft Windows 2000 empty TCP packet denial of service
13299| [8036] ILOVEYOU or Love Letter worm uses Microsoft Outlook and mIRC to propagate and attack systems
13300| [8023] Microsoft Windows NT and Windows 2000 SIDs could allow an attacker to gain elevated privileges in another domain
13301| [8000] Microsoft Windows XP "
13302| [7969] Microsoft Internet Explorer for Mac OS could allow execution of files
13303| [7954] BadBlue uploaded Microsoft Office document macro execution
13304| [7947] BadBlue Microsoft Office file viewing script non-existent file request denial of service
13305| [7946] BadBlue Microsoft Office file viewing script "
13306| [7941] Microsoft Internet Explorer CODEBASE value allows remote program execution
13307| [7938] Microsoft Internet Explorer HTML form denial of service
13308| [7922] Microsoft Windows XP Pro Upgrade installation causes security patches for Internet Explorer to be rolled back
13309| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
13310| [7906] Microsoft Internet Explorer clipboardData object allows a remote attacker to view clipboard information
13311| [7900] Microsoft Outlook PGP plug-in saves a decrypted copy of encrypted emails
13312| [7892] Microsoft Windows 95 Backup long file extension buffer overflow
13313| [7826] Microsoft Internet Explorer showModelessDialog() denial of service
13314| [7800] Microsoft Internet Explorer Windows Media Player ActiveX could allow an attacker to determine the existence of files or directories
13315| [7795] Microsoft FrontPage Server Extensions (FPSE) "
13316| [7788] Microsoft FrontPage Server Extensions (FPSE) "
13317| [7784] Microsoft Internet Explorer JavaScript OnError allows a remote attacker to determine a file`s existence
13318| [7758] Microsoft Internet Explorer GetObject directory traversal allows an attacker to read files
13319| [7737] Microsoft Internet Explorer "
13320| [7732] Microsoft Windows XP Remote Desktop sends username in plain text
13321| [7731] Microsoft Windows XP fast user switching could lockout users except administrator
13322| [7725] Microsoft SQL Server C runtime format string attack
13323| [7724] Microsoft SQL Server text message query buffer overflow
13324| [7722] Microsoft Windows XP, Me, 98, and 98SE UPnP spoofed UDP packet with SSDP announcement denial of service attack
13325| [7721] Microsoft Windows XP, Me, 98, and 98SE UPnP malformed NOTIFY directive buffer overflow
13326| [7713] Microsoft Windows XP allows attacker to execute programs using hotkeys without authentication
13327| [7712] Microsoft Internet Explorer XMLHTTP redirect reveals contents of file
13328| [7709] Microsoft Windows multiple vendor Web browser high image count denial of service
13329| [7703] Microsoft Internet Explorer could allow automatic file download and execution
13330| [7702] Microsoft Internet Explorer "
13331| [7691] Microsoft IIS HTTP GET request with false "
13332| [7670] Microsoft Outlook Express allows blocked attachments to be opened when the message is forwarded
13333| [7667] Microsoft Windows 2000 IKE UDP packet flood denial of service
13334| [7663] Microsoft Exchange 5.5 OWA HTML email body embedded script execution
13335| [7661] Microsoft Internet Explorer settimeout function in JavaScript can cause the program to crash
13336| [7648] Microsoft Outlook Express for Macintosh long message line buffer overflow
13337| [7640] Microsoft IIS is present on the system
13338| [7636] Microsoft Internet Explorer could allow an attacker to spoof the file extension of a downloadable file
13339| [7613] Microsoft IIS allows attackers to create fake log entries
13340| [7610] CBlade worm infects Microsoft SQL Servers
13341| [7605] Microsoft Windows XP helpctr.exe buffer overflow
13342| [7592] Microsoft Internet Explorer allows an attacker to determine password characters
13343| [7581] Microsoft Internet Explorer HTTP_USER_AGENT could allow attacker to determine the existence of patch Q312461
13344| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
13345| [7563] Microsoft Zero Administration Kit (ZAK) could allow an attacker to bypass file restrictions
13346| [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
13347| [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
13348| [7545] Microsoft Internet Explorer installation wizard (ie5setup.exe) disables screen saver password and task scheduler
13349| [7542] Microsoft Windows 95 and 98 with multiple TCP/IP stacks ICMP packet denial of service
13350| [7538] Microsoft Windows 2000 and XP Terminal services allow an attacker to spoof IP addresses
13351| [7533] Microsoft Windows 2000 RunAs service denial of service
13352| [7532] Microsoft Windows 2000 RunAs service allows local attacker to bypass pipe authentication
13353| [7531] Microsoft Windows 2000 RunAs service reveals sensitive information
13354| [7528] Microsoft Windows NT and Windows 2000 malformed RPC request denial of service
13355| [7527] Microsoft SQL Server malformed RPC request denial of service
13356| [7526] Microsoft Exchange Server malformed RPC request denial of service
13357| [7497] Microsoft Internet Explorer remote file enumeration
13358| [7486] Microsoft Internet Explorer "
13359| [7446] Microsoft ISA Server fragmented UDP packet flood denial of service
13360| [7428] Microsoft Windows Me and XP UPnP denial of service
13361| [7426] Microsoft Internet Explorer may expose authentication information to redirected Web sites
13362| [7422] Microsoft Windows NT RSHSVC does not properly validate users
13363| [7421] Microsoft Windows NT GetThreadContext/SetThreadContext denial of service
13364| [7409] Microsoft Windows 2000 and Windows XP GDI denial of service
13365| [7405] Microsoft Windows NT NonPagedPool denial of service
13366| [7403] Microsoft Windows NT Win32k.sys denial of service
13367| [7402] Microsoft Windows NT kernel mode handle-closing denial of service
13368| [7401] Microsoft Windows NT group policies not applied if long DC name
13369| [7400] Microsoft Windows NT user policies not updated
13370| [7398] Microsoft Windows NT symbolic link case elevation of privileges
13371| [7391] Microsoft Windows NT strong passwords may allow parts of the full name
13372| [7369] Microsoft Windows CSRSS.EXE denial of service
13373| [7354] Microsoft SQL Server 6.5 stores the SQLExecutiveCmdExec in registry using weak encryption algorithm
13374| [7336] Microsoft Internet Explorer for Mac OS X could allow the automatic execution of downloaded files
13375| [7329] Microsoft Windows NT WINS malformed packet flood denial of service
13376| [7318] Microsoft Windows ME SSDP service denial of service
13377| [7313] Microsoft Internet Explorer allows JavaScript to spoof dialog boxes
13378| [7302] Microsoft Windows NT and 2000 Terminal Server malformed RDP packet series denial of service
13379| [7260] Microsoft Internet Explorer command execution with Telnet client in SFU
13380| [7259] Microsoft Internet Explorer URL can contain encoded HTTP requests to third-party site
13381| [7258] Microsoft Internet Explorer dotless IP could allow rendering of Web sites with incorrect Security Zone
13382| [7231] Microsoft Windows 95 using NetWare remote administration contains hidden share
13383| [7224] Microsoft Windows NT smbmount request from Linux client denial of service
13384| [7223] Microsoft Excel and PowerPoint malformed document macro execution
13385| [7202] Microsoft IIS 4.0/5.0 escaped percent found
13386| [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
13387| [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
13388| [7168] Microsoft Exchange OWA deeply-nested folder request denial of service
13389| [7125] Microsoft Windows NT Index Server "
13390| [7118] Microsoft Outlook Express "
13391| [7107] Microsoft Windows NT Xenroll denial of service
13392| [7105] Microsoft Windows RPC endpoint mapper malformed request denial of service
13393| [7093] Norton AntiVirus for Microsoft Exchange could reveal sensitive information to attackers
13394| [7089] Microsoft Exchange OWA could allow search of global address list
13395| [7052] Microsoft Outlook Express 6 file attachment security feature bypass
13396| [7039] Microsoft Exchange OWA denial of service
13397| [7008] Microsoft Windows 2000 IrDA device denial of service
13398| [6995] Microsoft IIS %u Unicode wide character encoding detected
13399| [6994] Microsoft IIS %u Unicode encoding detected
13400| [6991] Microsoft ISA Server cross-site scripting
13401| [6990] Microsoft ISA Server Proxy Service memory leak denial of service
13402| [6989] Microsoft ISA Server H.323 Gatekeeper Service memory leak denial of service
13403| [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
13404| [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
13405| [6983] Microsoft IIS invalid MIME header denial of service
13406| [6982] Microsoft IIS WebDAV long invalid request denial of service
13407| [6981] Microsoft IIS URL redirection denial of service
13408| [6977] Microsoft Windows NT and 2000 NNTP memory leak denial of service
13409| [6963] Microsoft IIS HTTPS connection could reveal internal IP address
13410| [6962] Microsoft Windows Media Player .ASF marker buffer overflow
13411| [6943] Microsoft Windows NT NT4ALL denial of service
13412| [6931] Microsoft Windows 2000 without Service Pack 2
13413| [6924] Microsoft Windows 98 ARP packet flooding denial of service
13414| [6919] Microsoft Windows 2000 Task Manager does not terminate malicious files with the same name as a system process
13415| [6914] Multiple Microsoft products malformed RPC request denial of service
13416| [6912] Microsoft Windows NT and 2000 Terminal Server RDP memory leak denial of service
13417| [6907] Microsoft Windows Media Player .NSC buffer overflow
13418| [6883] Microsoft SFU Telnet denial of service
13419| [6882] Microsoft SFU NFS denial of service
13420| [6876] Microsoft Windows 2000 could allow an attacker to change network passwords
13421| [6874] Microsoft Windows 95/98 invalid path in registry could allow malicious file execution
13422| [6858] Microsoft IIS cross-site scripting patch denial of service
13423| [6831] Microsoft Outlook "
13424| [6803] Microsoft Windows 2000 SMTP service allows mail relaying
13425| [6800] Microsoft IIS device file request can crash the ASP processor
13426| [6748] Microsoft Internet Explorer "
13427| [6745] Microsoft Windows 2000 LDAP function could allow domain user password change
13428| [6742] Microsoft IIS reveals .asp source code with Unicode extensions
13429| [6732] Microsoft Word allows embedded macro to bypass security settings
13430| [6730] Microsoft FrontPage Server Extensions Visual Studio RAD Support sub-component buffer overflow
13431| [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
13432| [6688] Microsoft Internet Explorer could allow remote attackers to view file contents from a victim`s hard drive
13433| [6684] Microsoft SQL Server cached connections could allow an attacker to gain access to the database
13434| [6669] Microsoft Windows 2000 Telnet system call denial of service
13435| [6668] Microsoft Windows 2000 Telnet handle leak denial of service
13436| [6667] Microsoft Windows 2000 Telnet multiple idle sessions denial of service
13437| [6666] Microsoft Windows 2000 Telnet username denial of service
13438| [6665] Microsoft Windows 2000 Telnet service weak domain authentication
13439| [6664] Microsoft Windows 2000 Telnet service predictable pipe names could allow elevation of privileges
13440| [6655] Microsoft Outlook and Outlook Express Address Book allows attacker to spoof emails
13441| [6652] Microsoft Exchange 2000 OWA script execution
13442| [6651] Microsoft ISA Server Web Proxy denial of service caused by embedded code in HTML email
13443| [6614] Microsoft Word .asd file macros could automatically execute
13444| [6590] Microsoft Windows 2000 debug registers allow attacker to gain elevated privileges
13445| [6584] Microsoft Windows Media Player HTML code hidden in Internet shortcuts
13446| [6571] Microsoft Word RTF document automatic macro execution
13447| [6556] Microsoft Internet Explorer HTML code manipulation could alter the URL displayed in the address bar
13448| [6555] Microsoft Internet Explorer with certificate CRL checking enabled could allow Web site spoofing
13449| [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
13450| [6545] Microsoft IIS FTP weak domain authentication
13451| [6535] Microsoft IIS FTP wildcard processing function denial of service
13452| [6534] Microsoft IIS URL decoding error could allow remote code execution
13453| [6518] Microsoft Windows Index Server could allow attackers to view files on the Web server
13454| [6517] Microsoft Windows NT Index Server "
13455| [6506] Microsoft Windows 2000 Server Kerberos denial of service
13456| [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
13457| [6448] Microsoft Internet Explorer 5.x allows active scripts using XML stylesheets
13458| [6443] Microsoft Windows 2000 catalog file could remove installed hotfixes
13459| [6441] Microsoft Windows NT drivers DbgPrint function format string
13460| [6426] Microsoft Internet Explorer altering CLSID action allows malicious file execution
13461| [6405] Microsoft Data Access Component Internet Publishing Provider allows WebDAV access
13462| [6383] Microsoft ISA Server Web Proxy denial of service
13463| [6306] Microsoft Internet Explorer HTML emails with incorrect MIME headers could allow execution of code
13464| [6294] Microsoft Windows Me and Plus! 98 recovery of Compressed Folder passwords
13465| [6288] Microsoft Visual Studio VB-TSQL buffer overflow
13466| [6275] Microsoft Windows user.dmp file insecure permissions
13467| [6265] Microsoft invalid digital certificates could be used for spoofing
13468| [6230] Microsoft Internet Explorer command execution with Telnet client in SFU
13469| [6227] Microsoft Windows Media Player allows remote attackers to execute commands in Internet Explorer
13470| [6205] Microsoft IIS WebDAV denial of service
13471| [6172] Microsoft Exchange malformed URL request denial of service
13472| [6171] Microsoft IIS and Exchange malformed URL request denial of service
13473| [6160] Microsoft Windows 2000 event viewer buffer overflow
13474| [6136] Microsoft Windows 2000 domain controller denial of service
13475| [6103] Microsoft Windows NT PPTP denial of service
13476| [6086] Microsoft Internet Explorer "
13477| [6085] Microsoft Internet Explorer scriptlet rendering could allow Web site operators to read files
13478| [6070] Microsoft Windows UDP socket denial of service
13479| [6062] Microsoft Windows DDE allows privilege elevation
13480| [6035] Microsoft Windows 2000 Server RDP denial of service
13481| [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
13482| [6006] Microsoft Windows NT mutex denial of service
13483| [5973] Microsoft Windows 2000 EFS allows local user to recover sensitive data
13484| [5938] Microsoft Internet Explorer mshtml.dll denial of service
13485| [5937] Microsoft Windows Media Player skins can be used to execute arbitrary code
13486| [5936] Microsoft Windows 2000 Server Directory Service Restore Mode allows user to login with blank password
13487| [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
13488| [5823] Microsoft IIS Web form submission denial of service
13489| [5800] Microsoft Windows 2000 Index Service ActiveX controls allow unauthorized access to file information
13490| [5785] Microsoft Media Services dropped connection denial of service
13491| [5746] Microsoft Windows NT MSTask.exe denial of service
13492| [5729] Microsoft IIS Far East editions file disclosure
13493| [5673] Microsoft Windows NT MTS registry permissions
13494| [5672] Microsoft Windows NT SNMP registry permissions
13495| [5671] Microsoft Windows NT RAS registry permissions
13496| [5623] Microsoft Windows NT and 2000 Phone Book service buffer overflow
13497| [5622] Microsoft SQL XP srv_paraminfo() buffer overflow
13498| [5615] Microsoft Internet Explorer file upload form
13499| [5614] Microsoft Internet Explorer print template
13500| [5598] Microsoft Windows 2000 Telnet daemon could allow a denial of service
13501| [5585] Microsoft Windows 2000 brute force attack
13502| [5575] Microsoft Media Player .WMS script execution
13503| [5574] Microsoft Media Player .ASX buffer overflow
13504| [5573] Microsoft Windows NT SynAttackProtect denial of service
13505| [5566] Microsoft Internet Explorer 5.5 index.dat file can be used to remotely execute code
13506| [5537] Microsoft Exchange Server has a known username and password
13507| [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
13508| [5508] Microsoft Outlook client reveals physical path
13509| [5504] Microsoft Internet Explorer "
13510| [5502] Microsoft Windows 2000 Indexing Services ixsso.query
13511| [5494] Microsoft FrontPage 98 Server Extensions fpcount.exe CGI can be remotely crashed
13512| [5489] Microsoft Windows NT Terminal Server GINA RegAPI.DLL buffer overflow
13513| [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
13514| [5467] Microsoft Windows 2000 System Monitor ActiveX control buffer overflow
13515| [5441] Microsoft IIS .htw cross-site scripting
13516| [5417] Microsoft Windows NT MSIEXEC service uses the msi.dll registery key that has weak permissions
13517| [5411] Microsoft Windows File Share service denial of service
13518| [5399] Microsoft Windows NT and 2000 Network Monitor buffer overflow
13519| [5395] Microsoft Windows 9x share level password
13520| [5387] Microsoft Windows HyperTerminal Telnet buffer overflow
13521| [5377] Microsoft IIS Unicode translation error allows remote command execution
13522| [5370] Microsoft Windows 9x NetBIOS invalid driver type denial of service
13523| [5367] Microsoft Internet Explorer cached info
13524| [5357] Microsoft Windows 9x malformed NWLink NMPI packet denial of service
13525| [5335] Microsoft IIS Index Server directory traversal
13526| [5322] Microsoft Word Mail Merge
13527| [5315] Microsoft Windows NT invalid LPC request
13528| [5301] Microsoft Windows 2000 Simplified Chinese IME State Recognition
13529| [5293] Microsoft Internet Explorer exposes users files
13530| [5263] Microsoft Office 2000 executes .dll without users knowledge
13531| [5242] Microsoft Windows 2000 Telnet client NTLM authentication weakness
13532| [5222] Microsoft Windows 2000 malformed RPC packet denial of service
13533| [5203] Microsoft Windows 2000 still image service
13534| [5202] Microsoft IIS invalid URL allows attackers to crash service
13535| [5193] Microsoft Windows Media Services Unicast Service denial of service
13536| [5175] Microsoft Outlook and Outlook Express vCards buffer overflow
13537| [5171] Microsoft Windows 2000 Local Security Policy corruption
13538| [5168] Microsoft Windows NetBIOS cache corruption
13539| [5156] Microsoft IIS Cross-Site Scripting
13540| [5147] Microsoft Money plain-text password
13541| [5127] Microsoft Virtual Machine java applet allows malicious Web site to masquerade as visitor
13542| [5124] Microsoft FrontPage Server Extensions device name denial of service
13543| [5106] Microsoft IIS 4.0 discloses internal IP addresses
13544| [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
13545| [5097] Microsoft Windows folder.htt allows execution of active scripting without approval
13546| [5080] Microsoft Office 2000 HTML object tag buffer overflow
13547| [5079] Microsoft Windows 95/98 malformed IPX ping packet denial of service
13548| [5075] Microsoft Internet Explorer "
13549| [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
13550| [5040] Microsoft Windows NT/2000 explorer.exe uses relative path name in registry
13551| [5035] Microsoft Windows NT/2000 NetBIOS Name Server spoofed name conflict
13552| [5033] Microsoft Windows 2000 without Service Pack 1
13553| [5031] Microsoft Windows 2000 Service Control Manager named pipe could allow a unauthorized user to gain privileges
13554| [5016] Microsoft Excel register.id function
13555| [5015] Microsoft Windows NT and 2000 executable path
13556| [5013] Microsoft Outlook and Outlook Express cache bypass
13557| [4960] Microsoft IIS on Win2kPro security button restriction
13558| [4953] Microsoft Outlook date header buffer overflow
13559| [4951] Microsoft IIS absent directory browser argument
13560| [4933] Microsoft SQL Enterprise Manager password disclosure
13561| [4899] Microsoft FrontPage Extensions shtml.dll multiple access denial of service
13562| [4893] Microsoft mail clients denial of service
13563| [4887] Microsoft Windows 2000 Kerberos ticket renewed
13564| [4886] Microsoft Windows 2000 logon session reconnected
13565| [4885] Microsoft Windows 2000 logon session disconnected
13566| [4882] Microsoft Windows 2000 Kerberos pre-authentication failed
13567| [4873] Microsoft Windows 2000 user account mapped for logon
13568| [4872] Microsoft Windows 2000 account logon failed
13569| [4871] Microsoft Windows 2000 account used for logon
13570| [4855] Microsoft Windows 2000 group type change
13571| [4842] Microsoft Internet Explorer and Microsoft Powerpoint 2000 ActiveX object execution
13572| [4841] Microsoft Internet Explorer and Microsoft Access 2000 VBA code execution
13573| [4828] Microsoft Windows 95/98 ARP spoofing
13574| [4823] Microsoft Windows 2000 Telnet server binary stream denial of service
13575| [4819] Microsoft Windows 2000 default SYSKEY configuration
13576| [4790] Microsoft IIS \mailroot\pickup directory denial of service
13577| [4787] Microsoft Windows 2000 user account locked out
13578| [4786] Microsoft Windows 2000 computer account created
13579| [4785] Microsoft Windows 2000 computer account changed
13580| [4784] Microsoft Windows 2000 computer account deleted
13581| [4757] Microsoft IIS server-side includes (SSI) #exec directive
13582| [4714] Microsoft Windows 2000 "
13583| [4710] Norton AntiVirus for Microsoft Exchange unzip buffer overflow
13584| [4709] Norton AntiVirus for Microsoft Exchange may enter "
13585| [4702] Microsoft Windows event log full
13586| [4700] Microsoft Windows computer password not found in local security database
13587| [4698] Microsoft Windows EventLog service started
13588| [4688] Microsoft Windows Network Monitor driver started
13589| [4679] Microsoft DNS Server - Name offset exceeding DNS message packet length
13590| [4678] Microsoft DNS Server using a large amount of memory
13591| [4677] Microsoft DNS Server - Invalid DNS UPDATE message in DNS packet
13592| [4676] Microsoft DNS Server - excessive bad packets received
13593| [4675] Microsoft DNS Server - Invalid domain name offset in DNS message packet
13594| [4673] Microsoft Windows resources for queuing of audit messages have been exhausted
13595| [4671] Microsoft Windows event log file cannot be opened
13596| [4670] Microsoft Windows event log file corrupted
13597| [4663] Microsoft DNS Server - Invalid domain name
13598| [4654] Microsoft DNS Server - Invalid domain name in DNS message packet
13599| [4648] Microsoft Windows NT malformed remote registry request denial of service
13600| [4637] Microsoft DNS Server - Domain name exceeding maximum packet length
13601| [4635] Microsoft DNS Server - CNAME loop during caching
13602| [4627] Microsoft Internet Explorer fails to revalidate certificates within the same session
13603| [4624] Microsoft Internet Explorer fails to validate certificates in images or frames
13604| [4608] Microsoft Windows NT computer account creation can compromise User Session Key
13605| [4601] Microsoft Internet Explorer HTML Help file code execution
13606| [4600] Microsoft Windows NT denial of service caused by unacknowledged SMB requests
13607| [4589] Microsoft Windows 2000 protected store can be compromised by brute force attack
13608| [4585] Microsoft Windows Encoder denial of service
13609| [4582] Microsoft SQL Server DTS package reveals passwords
13610| [4558] Microsoft IIS is installed on a domain controller
13611| [4552] Microsoft Windows Browser service can be shutdown by an unauthorized remote user
13612| [4547] Microsoft Windows Master Browser browse table can be filled with bogus entries
13613| [4517] Microsoft Windows NT user account locked out
13614| [4516] Microsoft Windows NT user account enabled
13615| [4515] Microsoft Windows NT user account disabled
13616| [4500] Microsoft Internet Explorer frame domain verification
13617| [4484] Microsoft FrontPage Server Extensions image mapping components allow remote code execution
13618| [4456] Microsoft Internet Explorer external.NavigateAndFind function bypasses cross-frame security
13619| [4448] Microsoft IIS ISM.DLL could allow users to read file contents
13620| [4447] Microsoft Internet Explorer bug allows Web page operator to view cookie
13621| [4446] Microsoft Outlook Express filename overflow could allow attacker to execute files
13622| [4445] Microsoft Office UA Control malicious Web operator
13623| [4439] Microsoft FrontPage Server Extensions"
13624| [4430] Microsoft IIS malformed URL extension data denial of service
13625| [4399] Microsoft Commercial Internet System (MCIS) Mail server IMAP buffer overflow
13626| [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
13627| [4337] Microsoft Windows NT/2000 cmd.exe buffer overflow
13628| [4333] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file buffer overflow
13629| [4332] Microsoft Windows NT registry permissions could allow compromise of cryptographic keys
13630| [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
13631| [4280] Microsoft DNS resolver may accept responses from non-queried hosts
13632| [4279] Microsoft IIS escape characters denial of service
13633| [4278] Microsoft Windows 2000 unattended install does not secure All Users profile
13634| [4268] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file could allow remote ASP source retrieval
13635| [4247] Microsoft Windows 95/98 printer sharing allows read access
13636| [4232] Microsoft Index Server idq.dll allows remote directory traversal
13637| [4227] Microsoft Index Server webhits.dll reveals source of ASP files
13638| [4224] Microsoft Excel XLM macros do not generate warning messages
13639| [4221] Microsoft Windows NT drive mapping allows local users to execute arbitrary code
13640| [4204] Microsoft IIS virtual UNC share source read
13641| [4203] Microsoft Windows TCP/IP Printing Service denial of service
13642| [4183] Microsoft IIS could disclose path of network shares
13643| [4152] Microsoft Outlook allows users to manipulate hidden drives
13644| [4141] Microsoft Windows can be configured to transmit unencrypted passwords to SMB server
13645| [4140] Microsoft Windows Telnet service authentication may expose user passwords
13646| [4138] Microsoft Windows 2000 system file integrity feature is disabled
13647| [4117] Microsoft IIS chunked encoding post or put denial of service
13648| [4111] Microsoft Windows NT 4.0 registry permissions
13649| [4110] Microsoft SQL Server remote query abuse
13650| [4109] Microsoft Clip Art Gallery CIL file buffer overflow
13651| [4108] Microsoft Windows Media Technologies malformed license request denial of service
13652| [4107] Microsoft Windows path names containing DOS devices denial of service
13653| [4086] Microsoft Windows 2000 may not start Jaz drives correctly
13654| [4085] Microsoft Windows 2000 non-Gregorial calendar error
13655| [4084] Microsoft Windows 2000 may prevent Adobe FrameMaker files from being saved in some formats
13656| [4083] Microsoft Windows 2000 Terminal Services may damage Office files saved as HTML
13657| [4082] Microsoft Windows 2000 and Iomega parallel port drives display error
13658| [4081] Microsoft Windows invalid image error when using OLE libraries
13659| [4080] Microsoft Windows 2000 AOL image support
13660| [4079] Microsoft Windows 2000 High Encryption Pack
13661| [4034] Microsoft Windows Media Services handshake packets denial of service
13662| [4016] Microsoft Windows NT Recycle Bin could allow an unauthorized user to modify deleted files
13663| [3996] Microsoft Internet Explorer image source redirect
13664| [3993] Microsoft Windows Trin00 Distributed Denial of Service (DDoS) tool found
13665| [3986] Microsoft IIS ASP could be used to gain sensitive information
13666| [3959] Microsoft Direct Access Object (DAO) or JET method denial of service
13667| [3909] Microsoft Windows 9x share is writable
13668| [3906] Microsoft Windows NT share is readable
13669| [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
13670| [3890] Microsoft Index Server error could reveal sensitive path information
13671| [3854] Microsoft Office 2000 security setting
13672| [3837] Microsoft Internet Explorer Suite 4 HTML buffer overflow
13673| [3803] Microsoft Internet Explorer directshow filter (MSDXM.OCX) buffer overflow
13674| [3694] Microsoft Windows NT malformed resource enumeration denial of service
13675| [3675] Microsoft DNS server cache pollution can occur if DNS spoofing has been encountered
13676| [3668] Microsoft Internet Explorer Cross Frame could be used to view files on client computers
13677| [3666] Microsoft Internet Explorer Web Proxy Auto-Discovery could allow clients to accept untrusted proxy setting information
13678| [3574] Microsoft Windows 9x cache could reveal plaintext password
13679| [3534] Microsoft Windows NT 4.0 without Service Pack 6
13680| [3393] Microsoft FrontPage Extensions authors.pwd file could reveal encrypted passwords
13681| [3391] Microsoft FrontPage Extensions service.pwd file could reveal encrypted passwords
13682| [3378] Microsoft Virtual Machine could allow a malicious Java applet to bypass security restrictions
13683| [3373] Microsoft Windows NT user shell folders could allow users to gain administrator privileges
13684| [3371] Microsoft Excel imports and runs Lotus 1-2-3 or Quattro Pro macros without warning
13685| [3328] Microsoft Windows ARP packet denial of service
13686| [3311] Microsoft Internet Explorer registration wizard ActiveX buffer overflow
13687| [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
13688| [3268] Microsoft Internet Explorer uses weak encryption
13689| [3251] Microsoft Windows allows source routing when configured to reject source routed packets
13690| [3248] Microsoft Windows NT RASMAN pathname
13691| [3246] Microsoft HTML table form Denial of Service
13692| [3244] Microsoft Scriptlet.typelib and Eyedog ActiveX controls are unsafe
13693| [3226] Microsoft Windows NT 4.0 unattended installation could expose sensitive information to local users
13694| [3221] Microsoft SQL Server 6.5 non-trusted connection successful
13695| [3220] Microsoft SQL 6.5 Server shutdown
13696| [3219] Microsoft SQL Server 6.5 started
13697| [3218] Microsoft SQL Server failed connection
13698| [3217] Microsoft SQL Server non-trusted connection successful
13699| [3216] Microsoft SQL Server shutdown
13700| [3215] Microsoft SQL Server started
13701| [3214] Microsoft SQL Server trusted connection successful
13702| [3201] Microsoft SQL Server login failed - user not trusted
13703| [3200] Microsoft SQL Server login failed - user not Administrator
13704| [3199] Microsoft SQL Server login failed - invalid user
13705| [3198] Microsoft SQL Server login failed - too many users
13706| [3197] Microsoft SQL Server login failed
13707| [3196] Microsoft LDAP server blacklist failed
13708| [3195] Microsoft LDAP server permanent blacklist
13709| [3194] Microsoft LDAP server temporary blacklist
13710| [3168] Microsoft Windows NT SP4-SP6 TCP sequence numbers are predictable
13711| [3156] Microsoft Jet Text I-ISAM allows users to alter system files
13712| [3155] Microsoft Jet VBA shell execution
13713| [3129] Microsoft Windows Telnet.exe remote buffer overflow
13714| [3117] Microsoft FrontPage long URL buffer overflow
13715| [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
13716| [3109] Microsoft Windows NT Phone Dialer utility contains a locally exploitable buffer overflow
13717| [3106] Microsoft Windows NT DNS server can be remotely crashed by sending a response to a non-existant request
13718| [3104] Microsoft Windows NT TSE denial of service can consume all available memory
13719| [2761] Microsoft Office 97 files are out of date
13720| [2750] Microsoft Windows started/stopped
13721| [2686] Microsoft Outlook long file name patch not applied
13722| [2685] Microsoft Outlook Express long file name patch not applied
13723| [2677] Microsoft Windows NT old operating system
13724| [2675] Microsoft IIS 4.0 samples installation on Web server
13725| [2673] Microsoft IIS samples installation on Web server
13726| [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
13727| [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
13728| [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
13729| [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
13730| [2662] Microsoft IIS CGI overflow
13731| [2661] Microsoft Internet Explorer MK overrun
13732| [2549] Microsoft Windows NT install date changed
13733| [2444] Microsoft Internet Explorer unsigned ActiveX download
13734| [2412] Microsoft IIS account is member of Domain Users
13735| [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
13736| [2336] Microsoft Windows NT login default folder allows a user to bypass policies
13737| [2313] Microsoft Windows NT can be crashed by executables containing malformed image headers
13738| [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
13739| [2299] Microsoft Windows NT CSRSS denial of service
13740| [2291] Microsoft Windows NT Local Security Authority (LSA) can be remotely crashed, requiring a system reboot
13741| [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
13742| [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
13743| [2252] Microsoft Jet database engine allows embedded VBA strings, which could allow execution of commands
13744| [2244] Microsoft Internet Explorer favorites feature malicious icon file
13745| [2243] Microsoft Windows NT RAS/RRAS clients cache passwords regardless of setting
13746| [2229] Microsoft IIS ExAir sample site denial of service
13747| [2216] Microsoft Internet Explorer crossframe vulnerability allows scripts to run in elevated context
13748| [2214] Microsoft Internet Explorer Son of Cuartango issue allows remote file retrieval
13749| [2213] Microsoft Internet Explorer Untrusted Scripted Paste issue could allow remote file retrieval
13750| [2209] Microsoft Internet Explorer treats dotless IP addresses as members of the local Intranet zone
13751| [2201] Microsoft Windows NT 4.0 without Service Pack 5
13752| [2200] Microsoft Windows NT RAS client contains an exploitable buffer overflow
13753| [2190] Microsoft Windows NT 4.0 help file utility contains a locally exploitable buffer overflow
13754| [2186] Microsoft Excel virus warning features could possibly be bypassed by malicious files
13755| [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
13756| [2173] Microsoft Internet Explorer FSO could allow remote file manipulation from a Web server
13757| [2161] Microsoft Internet Explorer DHTML edit control can be used to read arbitrary files
13758| [2142] Microsoft SQL Server allows users of remote SQL Servers to connect allowing unauthorized users of those servers access
13759| [2141] Microsoft SQL Server can be configured to use the Windows NT account SQLExecCmdExe when running xp_cmdshell for non-sa logins
13760| [2140] Microsoft SQL Server trojan horse found in system stored procedures
13761| [2139] Unencrypted Microsoft SQL Server triggers found
13762| [2136] Microsoft SQL Server device files should be on NTFS partitions
13763| [2134] Microsoft SQL Server backups should be performed regularly
13764| [2133] Microsoft SQL Server replication is enabled
13765| [2132] Microsoft SQL Server Trace Flags should be off
13766| [2130] Microsoft SQL Server protocols found that allow packet sniffing
13767| [2129] Microsoft SQL Server should use limited Windows NT protocols to make attacks more difficult
13768| [2128] Microsoft SQL Server bug found that prohibits revoke permissions on certain tables
13769| [2119] Microsoft SQL Server registry extended stored procedures found that could be used to read or write to the registry
13770| [2102] Microsoft Windows NT allows files to exceed the supposed maximum length
13771| [2095] Microsoft SQL Server OLE Automation extended stored procedures were found that can be used to reconfigure the security of other services
13772| [2094] Microsoft SQL Server password encryption is not enabled for all login Ids
13773| [2093] The account under which the Microsoft SQL Server service is running is not in compliance with policy
13774| [2092] Microsoft SQL Server extended stored procedure xp_sprintf buffer overflow
13775| [2077] Microsoft SQL Server extended stored procedure xp_sqlinventory can be used to crash SQL Server
13776| [2070] Microsoft Internet Explorer allows remote files to be retrieved by a malicious user
13777| [2069] Microsoft Internet Explorer can allow malicious pages to spoof legitimate, trusted sites
13778| [2036] Microsoft PWS could be exploited to remotely read arbitrary files
13779| [1977] Microsoft Windows NT RPC services can be used to deplete system resources
13780| [1976] Microsoft Windows NT gina flaw allows locked-out users to log in
13781| [1975] Microsoft Windows NT gina allows some clipboard text to be revealed
13782| [1974] Microsoft Windows NT SNMP agent memory leak
13783| [1969] Microsoft Exchange LDAP denial of service
13784| [1947] Microsoft Windows NT/9x can be frozen with redirect packets
13785| [1946] Microsoft Windows NT screen saver can be used to compromise administrator privileges
13786| [1823] Microsoft IIS long GET request denial of service
13787| [1820] Microsoft Windows NT 4.0 domain caching feature can be exploited to gain administrator privileges
13788| [1803] Unencrypted Microsoft SQL Server stored procedures found
13789| [1780] Microsoft Office 98 documents may be saved with sensitive information
13790| [1774] Microsoft Access databases use weak passwords
13791| [1771] Microsoft Windows 95/98 configurations may lead to excessive bandwidth consumption
13792| [1770] Microsoft SQL Server SQLMail allows logins to send email
13793| [1769] Latest Microsoft SQL Server Service Packs are not installed
13794| [1762] Microsoft SQL Server permissions on extended stored procedures found that are not in compliance with policy
13795| [1761] Microsoft SQL Server is configured to execute stored procedures at startup that could be used as backdoors
13796| [1760] Microsoft SQL Server statement permissions found that are granted to users other than dbo
13797| [1759] Microsoft SQL Server objects not owned by database owner
13798| [1758] Microsoft SQL Server extended stored procedure, xp_cmdshell, can be used to gain Windows NT administrator rights
13799| [1757] Microsoft SQL Server allows direct system table updates to be denied
13800| [1750] Microsoft SQL Server logins during unauthorized hours found
13801| [1749] Microsoft SQL Server permissions on system tables found granted to public
13802| [1737] Microsoft Excel CALL function can execute programs without user warning
13803| [1735] Microsoft IIS with Visual InterDev no authentication
13804| [1719] Microsoft Windows NT 4.0 SP4 could allow null passwords to be used for access
13805| [1715] Microsoft SQL Server object permissions granted to groups are non-compliant with policy
13806| [1714] Microsoft SQL Server user permissions found that are not in compliance with policy
13807| [1713] Microsoft SQL Server Enterprise Manager leaves traces of unencrypted sa password in registry when changing authentication mode of a registered server
13808| [1712] Microsoft SQL Server Enterprise Manager leaves traces of previous unencrypted sa passwords in registry
13809| [1711] Microsoft SQL Server Enterprise Manager stores unencrypted sa password in registry
13810| [1710] Microsoft SQL Server integrated logins found and should be reviewed
13811| [1709] Microsoft SQL Server guest user IDs found
13812| [1708] Microsoft SQL Server stale logins found
13813| [1705] Microsoft SQL Server orphaned user IDs found that could result in unauthorized permissions being granted
13814| [1704] Microsoft SQL Server mismatched user IDs could result in granting of unauthorized permissions
13815| [1703] Microsoft SQL Server can be configured to audit failed or successful logins
13816| [1702] Microsoft SQL Server can be configured for different authentication methods
13817| [1701] Microsoft SQL Server set to view NT username, not hostname when viewing current users
13818| [1700] Microsoft SQL Server guest login found
13819| [1697] Microsoft SQL Server allows easily-guessed passwords
13820| [1675] Microsoft Internet Explorer 4.0 connection-reuse problem
13821| [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
13822| [1654] Microsoft IIS remote FTP buffer overflow
13823| [1638] Microsoft IIS crashes processing some GET commands
13824| [1566] Microsoft Windows NT user account deleted
13825| [1556] Microsoft Windows NT user account created
13826| [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
13827| [1459] Blank sa password on Microsoft SQL Server
13828| [1458] Blank probe password found on Microsoft SQL Server
13829| [1457] Microsoft SQL server detection (TCP)
13830| [1451] Microsoft SQL Server detection (named pipes)
13831| [1394] Microsoft Windows NT 4.0 without Service Pack 4
13832| [1383] Microsoft TCP/IP allows an attacker to reset connections
13833| [1376] Microsoft Proxy 2.0 denial of service
13834| [1372] Microsoft Windows NT snork attack can disable system
13835| [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
13836| [1321] Microsoft Windows Interactive_Guest_Logon
13837| [1320] Microsoft Windows legal notice display not enabled
13838| [1319] Microsoft Windows local user on workstation
13839| [1315] Microsoft Windows network Guest logon
13840| [1314] Microsoft Windows NT user has never logged on
13841| [1312] Microsoft Windows NT null session user modals
13842| [1296] Microsoft Windows service user
13843| [1295] Microsoft Windows NT service user password found
13844| [1291] Microsoft Windows shutdown without logon enabled
13845| [1288] Microsoft Windows NT system key encryption not enabled
13846| [1286] Microsoft Windows NT TCP/IP security not enabled
13847| [1285] Microsoft Windows trojan key permissions
13848| [1284] Microsoft Windows NT trusted domain
13849| [1273] Microsoft IIS special characters allowed in shell
13850| [1272] Microsoft IIS CGI scripts run as system
13851| [1271] Microsoft IIS version 2 installed
13852| [1270] Microsoft IIS incorrect permissions on restricted item
13853| [1269] Microsoft IIS incorrect Web permissions
13854| [1268] Microsoft IIS SSI #exec enabled
13855| [1226] Microsoft DNS Server - DNS Zone Transfers from high ports
13856| [1223] Microsoft Exchange Server SMTP and NNTP denial of service
13857| [1216] Microsoft IIS SSL patch not applied
13858| [1215] Microsoft IIS Passive FTP patch not applied
13859| [1212] Microsoft IIS unauthorized ODBC data access with RDS
13860| [1125] Microsoft IIS ASP DATA issue could reveal source code
13861| [1075] Microsoft Windows file-sharing access error
13862| [981] Microsoft Windows WINS exploit using SNMP
13863| [949] Microsoft IIS server script debugging enabled
13864| [948] Microsoft IIS samples installed on Web server
13865| [943] Microsoft Office installed on Web server
13866| [936] Microsoft IIS NTFS insecure permissions
13867| [935] Microsoft IIS executable paths
13868| [917] Microsoft Internet Explorer MK overrun
13869| [916] Microsoft Internet Explorer Embed issue
13870| [910] Microsoft Office 97 files are out of date
13871| [908] Microsoft FrontPage extensions under Unix create world readable password files
13872| [710] Microsoft Windows NT portbind issue
13873| [679] Microsoft Windows null session
13874| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
13875| [587] Microsoft Internet Explorer Freiburg text viewing issue
13876| [562] Microsoft Office file manager allows users to see files without access
13877| [561] Microsoft FrontPage 1.1 allows users to write to executable directories
13878| [539] Microsoft Windows 95 and Internet Explorer password disclosure
13879| [538] Microsoft Windows NT Winpopup DoS attack
13880| [536] Microsoft Windows NT discloses system information
13881| [535] Microsoft Windows NT sometimes does not kill all processes when logging out
13882| [534] Microsoft Windows 95 stores many passwords in plain text in the registry
13883| [530] Microsoft Windows NT RAS service packet filtering rules can be bypassed
13884| [529] Microsoft Windows NT case problems can lead to admin access
13885| [528] Microsoft Windows NT fragmentation attack
13886| [526] Microsoft Windows NT path is insecure and can be easily trojaned
13887| [470] Microsoft Excel passwords are easily cracked
13888| [463] Microsoft Internet Explorer 3.0 allows remote command execution
13889| [462] Microsoft Internet Explorer 3.0.1 .ISP script file execution
13890| [459] Microsoft Internet Explorer divulges sensitive information in response to NTLM requests
13891| [456] Microsoft Internet Explorer and Netscape Java applets can open network connections to a server
13892| [397] Microsoft cd .. Bug
13893| [385] Microsoft Internet Explorer has the check security certificate before sending option disabled
13894| [362] Microsoft Internet Explorer entering/leaving a secure site warning disabled
13895| [361] Microsoft Internet Explorer is outdated
13896| [360] Microsoft Internet Explorer non-secure form submission warning is disabled
13897| [359] Microsoft Internet Explorer has Java enabled
13898| [358] Microsoft Internet Explorer Form redirection enabled
13899| [357] Microsoft Internet Explorer has check security certificate before viewing option disabled
13900| [356] Microsoft Internet Explorer allows secure content to be cached
13901| [355] Microsoft Internet Explorer allows ActiveX controls to be automatically executed
13902| [354] Microsoft Internet Explorer active scripting is enabled
13903| [353] Microsoft Internet Explorer allows active content to be automatically downloaded
13904| [352] Microsoft Internet Explorer has low active content security
13905| [351] Microsoft Internet Explorer accept cookies warning disabled
13906| [342] Microsoft Windows NT SMB logon denial of service
13907| [336] Microsoft IIS ASP dot bug
13908| [283] Microsoft Windows account password guessed
13909| [256] Microsoft IIS can be remotely crashed by excessively long client requests
13910| [186] Microsoft Windows NT DNS denial of service
13911| [172] Microsoft Windows NT Post-SP2 security patches missing
13912| [168] Microsoft Windows key with incorrect permissions
13913| [140] Microsoft Windows telnet service installed
13914| [138] Microsoft Windows system log accessible
13915| [121] Microsoft Windows NT security log accessible
13916| [120] Microsoft Windows schedule service running
13917| [114] Microsoft Windows NT rsh service Running
13918| [102] Microsoft Windows NT rexec service running
13919| [99] Microsoft Windows registry can be opened remotely
13920| [98] Microsoft Windows NT rcmd service running
13921| [92] Microsoft Windows NT rlogin service installed
13922| [66] Microsoft Windows NT kernel outdated
13923| [17] Microsoft Windows NT RPC locator denial of service
13924| [16] Microsoft Windows Remote Access Service
13925| [14] Microsoft Windows NT 4.0 without Service Pack 3
13926| [13] Microsoft Windows Network Monitor insecure password
13927| [11] Microsoft Windows NT 4.0 beta
13928| [7] Microsoft IIS ASP source visible
13929|
13930| Exploit-DB - https://www.exploit-db.com:
13931| [31118] Microsoft Works 8.0 File Converter Field Length Remote Code Execution Vulnerability
13932| [30825] Microsoft Windows Media Digital Rights Management ActiveX Control Buffer Overflow Vulnerability
13933| [30773] Microsoft Jet Database Engine MDB File Parsing Remote Buffer Overflow Vulnerability
13934| [30759] VTLS Web Gateway 48.1 Searchtype Parameter Cross-Site Scripting Vulnerability
13935| [30756] Microsoft Forms 2.0 ActiveX Control 2.0 Memory Access Violation Denial of Service Vulnerabilities
13936| [30749] Microsoft Office 2003 Web Component Memory Access Violation Denial of Service Vulnerability
13937| [30645] Microsoft Windows URI Handler Command Execution Vulnerability
13938| [30636] Microsoft Windows 2000/2003 Recursive DNS Spoofing Vulnerability (2)
13939| [30635] Microsoft Windows 2000/2003 Recursive DNS Spoofing Vulnerability (1)
13940| [30622] Microsoft Internet Explorer 5.0.1 File Upload Vulnerability
13941| [30619] Microsoft Windows Explorer PNG Image - Local Denial Of Service Vulnerability
13942| [30593] Microsoft MFC Library CFileFind::FindFile Buffer Overflow Vulnerability
13943| [30567] Microsoft Agent agentdpv.dll ActiveX Control Malformed URL Stack Buffer Overflow Vulnerability
13944| [30537] Microsoft MSN Messenger <= 8.0 - Video Conversation Buffer Overflow Vulnerability
13945| [30494] Microsoft Internet Explorer 5.0.1 Vector Markup Language VGX.DLL Remote Buffer Overflow Vulnerability
13946| [30493] Microsoft XML Core Services <= 6.0 SubstringData Integer Overflow Vulnerability
13947| [30490] Microsoft Internet Explorer 5.0.1 TBLinf32.DLL ActiveX Control Remote Code Execution Vulnerability
13948| [30462] Microsoft Windows Media Player 11 - AU Divide-By-Zero Denial of Service Vulnerability
13949| [30455] Microsoft Internet Explorer 6.0 Position:Relative Denial of Service Vulnerability
13950| [30392] Microsoft Windows ndproxy.sys - Local Privilege Escalation
13951| [30285] Microsoft Internet Explorer and Mozilla Firefox URI Handler Command Injection Vulnerability
13952| [30281] Microsoft .Net Framework <= 2.0 - Multiple Null Byte Injection Vulnerabilities
13953| [30160] Microsoft Windows XP - GDI+ ICO File Remote Denial of Service Vulnerability
13954| [30080] Linux Kernel 2.6.x VFat Compat IOCTLS Local Denial of Service Vulnerability
13955| [30011] Microsoft Tagged Image File Format (TIFF) Integer Overflow
13956| [29951] Microsoft SharePoint Server 3.0 Cross-Site Scripting Vulnerability
13957| [29858] MS12-022 Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
13958| [29813] Microsoft Windows Vista ARP Table Entries Denial of Service Vulnerability
13959| [29800] Microsoft Internet Explorer 7.0 HTML Denial of Service Vulnerability
13960| [29771] Microsoft Windows Vista Windows Mail Local File Execution Vulnerability
13961| [29741] Microsoft Internet Explorer 7.0 NavCancel.HTM Cross-Site Scripting Vulnerability
13962| [29738] Microsoft Windows XP/2000 WinMM.DLL - WAV Files Remote Denial of Service (DoS) Vulnerability
13963| [29664] Microsoft Office Publisher 2007 - Remote Denial of Service (DoS) Vulnerability
13964| [29660] Microsoft Office 2003 - Denial of Service (DoS) Vulnerability
13965| [29659] Microsoft Windows XP/2003 Explorer WMF File Handling Denial of Service Vulnerability
13966| [29630] Microsoft Windows 2003/XP ReadDirectoryChangesW Information Disclosure Vulnerability
13967| [29619] Microsoft Internet Explorer 6.0 - Local File Access Weakness
13968| [29536] Microsoft Internet Explorer 5.0.1 - Multiple ActiveX Controls Denial of Service Vulnerabilities
13969| [29524] Microsoft Word 2000 - Malformed Function Code Execution Vulnerability
13970| [29295] Microsoft Outlook ActiveX Control Remote Internet Explorer Denial of Service Vulnerability
13971| [29286] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
13972| [29285] Microsoft Windows Media 6.4/10.0 - MID Malformed Header Chunk DoS
13973| [29236] Microsoft Internet Explorer 7.0 CSS Width Element Denial of Service Vulnerability
13974| [29229] Microsoft Internet Explorer 6.0 Frame Src Denial of Service Vulnerability
13975| [29172] Microsoft Office 97 HTMLMARQ.OCX Library Denial of Service Vulnerability
13976| [28974] MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
13977| [28897] Microsoft Internet Explorer 7.0 MHTML Denial of Service Vulnerability
13978| [28880] Microsoft Internet Explorer 6.0/7.0 RemoveChild Denial of Service Vulnerability
13979| [28877] Microsoft Internet Explorer 6.0 Unspecified Code Execution Vulnerability (2)
13980| [28876] Microsoft Internet Explorer 6.0 Unspecified Code Execution Vulnerability (1)
13981| [28834] Microsoft Windows XP CMD.EXE Buffer Overflow Vulnerability
13982| [28822] Microsoft Class Package Export Tool 5.0.2752 0 Clspack.exe Local Buffer Overflow Vulnerability
13983| [28500] Microsoft Indexing Service Query Validation Cross-Site Scripting Vulnerability
13984| [28482] MS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution
13985| [28481] MS13-069 Microsoft Internet Explorer CCaret Use-After-Free
13986| [28438] Microsoft Internet Explorer 5.0.1 Daxctle.OCX Spline Method Heap Buffer Overflow Vulnerability
13987| [28421] Microsoft Internet Explorer 6.0 - Multiple COM Object Color Property Denial of Service Vulnerabilities
13988| [28420] Microsoft Windows 2000 Multiple COM Object Instantiation Code Execution Vulnerabilities
13989| [28401] Microsoft Internet Explorer 6.0 Visual Studio COM Object Instantiation Denial of Service Vulnerability
13990| [28400] Microsoft Internet Explorer 6.0 TSUserEX.DLL ActiveX Control Memory Corruption Vulnerability
13991| [28389] Microsoft Internet Explorer 6.0 MSOE.DLL Denial of Service Vulnerability
13992| [28387] Microsoft Internet Explorer 6.0 IMSKDIC.DLL Denial of Service Vulnerability
13993| [28381] microsoft windows xp/2000/2003 help Multiple Vulnerabilities
13994| [28357] Microsoft Windows Explorer 2000/2003/XP Drag and Drop Remote Code Execution Vulnerability
13995| [28343] Microsoft Internet Explorer 6.0/7.0 IFrame Refresh Denial of Service Vulnerability
13996| [28301] Microsoft Internet Explorer 6.0 Deleted Frame Object Denial of Service Vulnerability
13997| [28299] Microsoft Windows XP/2000/2003 Graphical Device Interface Plus Library Denial of Service Vulnerability
13998| [28286] Microsoft Internet Explorer 6.0 NDFXArtEffects Stack Overflow Vulnerability
13999| [28265] Microsoft Internet Explorer 6.0 Native Function Iterator Denial of Service Vulnerability
14000| [28263] Microsoft Windows XP/2000/2003 Remote Denial of Service Vulnerability
14001| [28259] Microsoft Internet Explorer 6.0 NMSA.ASFSourceMediaDescription Stack Overflow Vulnerability
14002| [28258] Microsoft Internet Explorer 6.0 - Multiple Object ListWidth Property Denial of Service Vulnerability
14003| [28256] Microsoft Internet Explorer 6.0 Internet.HHCtrl Click Denial of Service Vulnerability
14004| [28252] Microsoft Internet Explorer 6.0 String To Binary Function Denial of Service Vulnerability
14005| [28246] Microsoft Internet Explorer 6.0 OVCtl Denial of Service Vulnerability
14006| [28244] Microsoft Internet Explorer 6.0 DataSourceControl Denial of Service Vulnerability
14007| [28238] Microsoft SharePoint 2013 (Cloud) - Persistent Exception Handling Vulnerability MS13-067
14008| [28227] Microsoft Windows 2000/XP Registry Access Local Denial of Service Vulnerability
14009| [28226] Microsoft PowerPoint 2003 PPT File Closure Memory Corruption
14010| [28225] Microsoft PowerPoint 2003 powerpnt.exe Unspecified Issue
14011| [28224] Microsoft PowerPoint 2003 mso.dll PPT Processing Unspecified Code Execution
14012| [28222] microsoft works 8.0 spreadsheet Multiple Vulnerabilities
14013| [28213] Microsoft Internet Explorer 6.0 RevealTrans Denial of Service Vulnerability
14014| [28207] Microsoft Internet Explorer 6.0 TriEditDocument Denial of Service Vulnerability
14015| [28202] Microsoft Internet Explorer 6.0 HtmlDlgSafeHelper Remote Denial of Service Vulnerability
14016| [28198] Microsoft Office 2000/2002 Property Code Execution Vulnerability
14017| [28197] Microsoft Internet Explorer 6.0 Object.Microsoft.DXTFilter Denial of Service Vulnerability
14018| [28196] Microsoft Internet Explorer 6.0 DirectAnimation.DAUserData Denial of Service Vulnerability
14019| [28194] Microsoft Internet Explorer 6 RDS.DataControl Denial of Service Vulnerability
14020| [28189] Microsoft Excel 2000-2004 Style Handling and Repair Remote Code Execution Vulnerability
14021| [28187] MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free
14022| [28169] Microsoft Internet Explorer 5.0.1/6.0 Structured Graphics Control Denial of Service Vulnerability
14023| [28164] Microsoft Internet Explorer 6.0 Href Title Denial of Service Vulnerability
14024| [28145] Microsoft Internet Explorer 6.0 ADODB.Recordset Filter Property Denial of Service Vulnerability
14025| [28144] Microsoft Internet Explorer 6.0 OutlookExpress.AddressBook Denial of Service Vulnerability
14026| [28118] Microsoft Internet Explorer 5.0.1 OuterHTML Redirection Handling Information Disclosure Vulnerability
14027| [28087] Microsoft Office 2003 Embedded Shockwave Flash Object Security Bypass Weakness
14028| [28082] MS13-059 Microsoft Internet Explorer CFlatMarkupPointer Use-After-Free
14029| [28005] Microsoft Exchange Server 2000/2003 Outlook Web Access Script Injection Vulnerability
14030| [28001] Microsoft SMB Driver Local Denial of Service Vulnerability
14031| [27984] Microsoft DXImageTransform.Microsoft.Light ActiveX Control Remote Code Execution Vulnerability
14032| [27971] Microsoft Internet Explorer 5.0.1 Frameset Memory Corruption Vulnerability
14033| [27930] Microsoft Windows XP/2000/2003 MHTML URI Buffer Overflow Vulnerability
14034| [27906] Microsoft Internet Explorer 6.0 Malformed HTML Parsing Denial of Service Vulnerability
14035| [27851] Microsoft Windows - Path Conversion Weakness
14036| [27850] Microsoft Infotech Storage Library Heap Corruption Vulnerability
14037| [27744] Microsoft Internet Explorer 5.0.1 Modal Dialog Manipulation Vulnerability
14038| [27727] Microsoft Internet Explorer 6.0 Nested OBJECT Tag Memory Corruption Vulnerability
14039| [27620] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
14040| [27577] Microsoft Internet Explorer 5.0 Address Bar Spoofing Vulnerability
14041| [27476] Microsoft .NET Framework SDK 1.0/1.1 MSIL Tools Buffer Overflow Vulnerabilities
14042| [27433] Microsoft Internet Explorer 5.0.1 Script Action Handler Buffer Overflow Vulnerability
14043| [27082] Microsoft Internet Explorer 5.0.1 Malformed IMG and XML Parsing Denial of Service Vulnerability
14044| [27073] Microsoft Visual Studio UserControl Remote Code Execution Vulnerability (2)
14045| [27072] Microsoft Visual Studio UserControl Remote Code Execution Vulnerability (1)
14046| [27055] Microsoft Excel 95-2004 Malformed Graphic File Code Execution Vulnerability
14047| [27051] Microsoft Windows Graphics Rendering Engine Multiple Memory Corruption Vulnerabilities
14048| [26985] Microsoft Internet Explorer 5.0.1 HTML Parsing Denial of Service Vulnerabilities
14049| [26869] Microsoft Excel 95/97/2000/2002/2003/2004 Unspecified Memory Corruption Vulnerabilities
14050| [26769] Microsoft Excel 95/97/2000/2002/2003/2004 Malformed Range Memory Corruption Vulnerability
14051| [26690] Microsoft Windows 2000/2003/XP CreateRemoteThread Local Denial of Service Vulnerability
14052| [26517] Microsoft Office PowerPoint 2007 - Crash PoC
14053| [26457] Microsoft Internet Explorer 6.0 Malformed HTML Parsing Denial of Service Vulnerability
14054| [26341] Microsoft Windows 2000/2003/XP MSDTC TIP Denial of Service Vulnerability
14055| [26336] Oracle Forms Servlet TLS Listener Remote Denial of Service Vulnerability
14056| [26331] Oracle 9.0 iSQL*Plus TLS Listener - Remote Denial of Service Vulnerability
14057| [26323] Microsoft Windows XP Wireless Zero Configuration Service Information Disclosure Vulnerability
14058| [26292] Microsoft Internet Explorer 5.2.3 for Mac OS Denial of Service Vulnerability
14059| [26230] Microsoft IIS 5.1 WebDAV HTTP Request Source Code Disclosure Vulnerability
14060| [26222] Microsoft Windows 2000/2003/XP Keyboard Event Privilege Escalation Weakness
14061| [26175] MS13-009 Microsoft Internet Explorer COALineDashStyleArray Integer Overflow
14062| [26167] Microsoft Visual Studio .NET msdds.dll Remote Code Execution Vulnerability
14063| [25999] Microsoft Internet Explorer textNode Use-After-Free
14064| [25992] Microsoft Internet Explorer 5.0.1 JPEG Image Rendering CMP Fencepost Denial of Service Vulnerability
14065| [25991] Microsoft Internet Explorer 5.0.1 JPEG Image Rendering Unspecified Buffer Overflow Vulnerability
14066| [25962] Microsoft ASP.NET 1.0/1.1 RPC/Encoded Remote Denial of Service Vulnerability
14067| [25784] Microsoft Outlook Express 4.x/5.x/6.0 Attachment Processing File Extension Obfuscation Vulnerability
14068| [25737] Microsoft Windows 98SE User32.DLL Icon Handling Denial of Service Vulnerability
14069| [25454] Microsoft Windows 98/2000 Explorer Preview Pane Script Injection Vulnerability
14070| [25386] Microsoft Internet Explorer 5.0.1 DHTML Object Race Condition Memory Corruption Vulnerability
14071| [25385] Microsoft Internet Explorer 5.0.1 Content Advisor File Handling Buffer Overflow Vulnerability
14072| [25384] Microsoft Windows 2000/XP Internet Protocol Validation Remote Code Execution Vulnerability (2)
14073| [25383] Microsoft Windows 2000/XP Internet Protocol Validation Remote Code Execution Vulnerability (1)
14074| [25294] Microsoft Internet Explorer CGenericElement Object Use-After-Free Vulnerability
14075| [25268] Microsoft Windows XP TSShutdn.exe Remote Denial of Service Vulnerability
14076| [25259] Microsoft Windows XP Local Denial of Service Vulnerability
14077| [25231] Microsoft Windows 2000/2003/XP Graphical Device Interface Library Denial of Service Vulnerability
14078| [25157] Microsoft Log Sink Class ActiveX Control Arbitrary File Creation Vulnerability
14079| [25129] Microsoft Internet Explorer 6.0 Pop-up Window Title Bar Spoofing Weakness
14080| [25110] Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities
14081| [25095] Microsoft Internet Explorer 5.0.1 Mouse Event URI Status Bar Obfuscation Weakness
14082| [25085] Microsoft Office XP 2000/2002 HTML Link Processing Remote Buffer Overflow Vulnerability
14083| [25084] Microsoft Outlook 2003 Web Access Login Form Remote URI Redirection Vulnerability
14084| [25050] Microsoft Windows 2000/2003/XP winhlp32 Phrase Heap Overflow Vulnerability
14085| [25049] Microsoft Windows 2000/2003/XP winhlp32 Phrase Integer Overflow Vulnerability
14086| [24865] GnuTLS libgnutls Double-free Certificate List Parsing Remote DoS
14087| [24808] Microsoft Internet Explorer 6.0 Search Pane URI Obfuscation Vulnerability
14088| [24802] Microsoft Internet Explorer 6.0 Sysimage Protocol Handler Local File Detection Vulnerability
14089| [24800] Microsoft Internet Explorer 5.0.1 FTP URI Arbitrary FTP Server Command Execution Vulnerability
14090| [24775] Microsoft Internet Explorer 6.0 Infinite Array Sort Denial of Service Vulnerability
14091| [24727] Microsoft Internet Explorer 6.0 - Local Resource Enumeration Vulnerability
14092| [24720] Microsoft Internet Explorer 6.0 IFRAME Status Bar URI Obfuscation Weakness
14093| [24714] Microsoft Internet Explorer 6.0 HTML Form Tags URI Obfuscation Weakness
14094| [24712] Microsoft Internet Explorer 6.0 TABLE Status Bar URI Obfuscation Weakness
14095| [24705] Microsoft Internet Explorer 6.0 Font Tag Denial of Service Vulnerability
14096| [24699] Microsoft Windows XP WAV File Handler Denial of Service Vulnerability
14097| [24693] Microsoft Internet Explorer 5.x Valid File Drag and Drop Embedded Code Vulnerability
14098| [24687] Microsoft Outlook Express 4.x/5.x/6.0 Plaintext Email Security Policy Bypass Vulnerability
14099| [24686] Microsoft Outlook 2003 Security Policy Bypass Vulnerability
14100| [24682] Microsoft Windows XP Weak Default Configuration Vulnerability
14101| [24666] Microsoft ASP.NET 1.x URI Canonicalization Unauthorized Web Access Vulnerability
14102| [24640] Microsoft SQL Server 7.0 - Remote Denial of Service Vulnerability (2)
14103| [24639] Microsoft SQL Server 7.0 - Remote Denial of Service Vulnerability (1)
14104| [24605] Microsoft Windows XP Explorer.EXE TIFF Image Denial of Service Vulnerability
14105| [24538] MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
14106| [24495] Microsoft Internet Explorer SLayoutRun Use-After-Free (MS13-009)
14107| [24407] Microsoft Internet Explorer 6.0 Resource Detection Weakness
14108| [24354] Microsoft Internet Explorer 6.0 mms Protocol Handler Executable Command Line Injection Vulnerability
14109| [24328] Microsoft Internet Explorer 5.0.1 Style Tag Comment Memory Corruption Vulnerability
14110| [24281] Microsoft Systems Management Server 1.2/2.0 - Remote Denial of Service Vulnerability
14111| [24277] Microsoft Windows 2000/NT 4 POSIX Subsystem Buffer Overflow Local Privilege Escalation Vulnerability
14112| [24267] Microsoft Internet Explorer 6.0 JavaScript Null Pointer Exception Denial of Service Vulnerability
14113| [24266] Microsoft Internet Explorer 5.0.1 Popup.show Mouse Event Hijacking Vulnerability
14114| [24265] Microsoft Internet Explorer 5.0.1 JavaScript Method Assignment Cross-Domain Scripting Vulnerability
14115| [24249] Microsoft Internet Explorer 6.0 Shell.Application Object Script Execution Weakness
14116| [24213] Microsoft Internet Explorer 5.0.1 Wildcard DNS Cross-Site Scripting Vulnerability
14117| [24211] Microsoft Internet Explorer 6.0 HREF Save As Denial of Service Vulnerability
14118| [24187] Microsoft Internet Explorer 6.0 ADODB.Stream Object File Installation Weakness
14119| [24174] Microsoft Internet Explorer 6.0 URL Local Resource Access Weakness
14120| [24173] PHP 4.3.x Microsoft Windows Shell Escape Functions Command Execution Vulnerability
14121| [24135] Microsoft Internet Explorer 5.0.1 CSS Style Sheet Memory Corruption Vulnerability
14122| [24125] Microsoft Windows XP Self-Executing Folder Vulnerability
14123| [24119] Microsoft Internet Explorer 5.0.1 http-equiv Meta Tag Denial of Service Vulnerability
14124| [24118] Microsoft Outlook Express 6.0 URI Obfuscation Vulnerability
14125| [24117] Microsoft Internet Explorer 6.0 Codebase Double Backslash Local Zone File Execution Weakness
14126| [24114] Microsoft Outlook 2003Mail Client E-mail Address Verification Weakness
14127| [24112] Microsoft Internet Explorer 6.0 XML Parsing Denial of Service Vulnerability
14128| [24102] Microsoft Internet Explorer 4/5/6 Embedded Image URI Obfuscation Weakness
14129| [24101] Microsoft Outlook 2003 Predictable File Location Weakness
14130| [24069] Microsoft Internet Explorer 6.0 Meta Data Foreign Domain Spoofing Vulnerability
14131| [24051] Microsoft Windows XP/2000/NT 4 Shell Long Share Name Buffer Overrun Vulnerability
14132| [24020] Microsoft Internet Explorer Option Element Use-After-Free
14133| [24002] Microsoft Outlook Express 6.0 - Remote Denial of Service Vulnerability
14134| [23989] Microsoft Windows 2000/NT 4 Local Descriptor Table Local Privilege Escalation Vulnerability
14135| [23912] Microsoft Internet Explorer 6.0 Macromedia Flash Player Plug-in Remote Denial of Service Vulnerability
14136| [23911] Microsoft Internet Explorer 6.0 MSWebDVD Object Denial of Service Vulnerability
14137| [23903] Microsoft Internet Explorer 6.0 HTML Form Status Bar Misrepresentation Vulnerability
14138| [23850] Microsoft Windows XP Explorer.EXE Remote Denial of Service Vulnerability
14139| [23796] Microsoft Outlook 2002 Mailto Parameter Quoting Zone Bypass Vulnerability
14140| [23790] Microsoft Internet Explorer 5 window.open Search Pane Cross-Zone Scripting Vulnerability
14141| [23785] Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability
14142| [23768] Microsoft Internet Explorer 6.0 window.open Media Bar Cross-Zone Scripting Vulnerability
14143| [23766] Microsoft Internet Explorer 5/6 Cross-Domain Event Leakage Vulnerability
14144| [23754] Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability
14145| [23717] Microsoft Windows XP Help And Support Center Interface Spoofing Weakness
14146| [23695] Microsoft Internet Explorer 5.0.1 ITS Protocol Zone Bypass Vulnerability
14147| [23679] Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (2)
14148| [23678] Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (1)
14149| [23675] Microsoft Windows XP HCP URI Handler Arbitrary Command Execution Vulnerability
14150| [23668] Microsoft Internet Explorer 5.0.1 LoadPicture File Enumeration Weakness
14151| [23649] Microsoft SQL Server Database Link Crawling Command Execution
14152| [23643] Microsoft Internet Explorer 5 NavigateAndFind() Cross-Zone Policy Vulnerability
14153| [23504] Microsoft Windows XP/2000 showHelp CHM File Execution Weakness
14154| [23490] Microsoft IIS 5.0 Failure To Log Undocumented TRACK Requests Vulnerability
14155| [23401] Microsoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (2)
14156| [23400] Microsoft Outlook Express 6.0 MHTML Forced File Execution Vulnerability (1)
14157| [23340] Microsoft Internet Explorer 6.0 Double Slash Cache Zone Bypass Vulnerability
14158| [23321] Microsoft Internet Explorer 6-10 Mouse Tracking
14159| [23283] Microsoft Internet Explorer 6.0 - Local Resource Reference Vulnerability
14160| [23273] Microsoft Internet Explorer 6.0 Scrollbar-Base-Color Partial Denial of Service Vulnerability
14161| [23255] Microsoft ListBox/ComboBox Control User32.dll Function Buffer Overrun Vulnerability
14162| [23247] Microsoft Windows XP/2000 Messenger Service Buffer Overrun Vulnerability
14163| [23229] Microsoft Windows XP/2000/2003 Message Queuing Service Heap Overflow Vulnerability
14164| [23216] Microsoft Word 97/98/2002 Malformed Document Denial of Service Vulnerability
14165| [23215] Microsoft Internet Explorer 6 Absolute Position Block Denial of Service Vulnerability
14166| [23210] Microsoft Windows XP/2000 PostThreadMessage() Arbitrary Process Killing Vulnerability
14167| [23179] Oracle MySQL for Microsoft Windows MOF Execution
14168| [23131] Microsoft Internet Explorer 6.0 Script Execution Vulnerabilities
14169| [23122] Microsoft Internet Explorer 5 XML Page Object Type Validation Vulnerability
14170| [23114] Microsoft Internet Explorer 5/6 Browser Popup Window Object Type Validation Vulnerability
14171| [23113] Microsoft Exchange Server 4.0/5.0 SMTP HELO Argument Buffer Overflow Vulnerability
14172| [23101] Microsoft Windows 98 Fragmented UDP Flood Denial of Service Vulnerability
14173| [23096] Microsoft WordPerfect Converter Buffer Overrun Vulnerability
14174| [23095] Microsoft Access 97/2000/2002 Snapshot Viewer ActiveX Control Parameter Buffer Overflow Vulnerability
14175| [23094] Microsoft Visual Basic For Applications SDK 5.0/6.0/6.2/6.3 Document Handling Buffer Overrun Vulnerability
14176| [23093] Microsoft Windows XP TCP Packet Information Leakage Vulnerability
14177| [23044] Microsoft Internet Explorer 5/6 Object Type Validation Vulnerability
14178| [23034] Microsoft URLScan 2.5/ RSA Security SecurID 5.0 Configuration Enumeration Weakness
14179| [23019] Microsoft Windows 2000 Subnet Bandwidth Manager RSVP Server Authority Hijacking Vulnerability
14180| [22959] Microsoft Outlook Express 5/6 Script Execution Weakness
14181| [22957] Microsoft SQL Server 7.0/2000,MSDE Named Pipe Denial of Service Vulnerability
14182| [22919] Microsoft ISA Server 2000 Cross-Site Scripting Vulnerabilities
14183| [22917] Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability
14184| [22883] Microsoft Windows 2000 CreateFile API Named Pipe Privilege Escalation Vulnerability (2)
14185| [22882] Microsoft Windows 2000 CreateFile API Named Pipe Privilege Escalation Vulnerability (1)
14186| [22870] Microsoft Windows XP/2000 RunDLL32.EXE Buffer Overflow Vulnerability
14187| [22869] Microsoft Outlook 5.5/2000 Web Access HTML Attachment Script Execution Vulnerability
14188| [22850] Microsoft Office OneNote 2010 Crash PoC
14189| [22837] Microsoft Windows 2000/NT 4 Media Services NSIISlog.DLL Remote Buffer Overflow
14190| [22824] Microsoft Windows XP/2000/NT 4 HTML Converter HR Align Buffer Overflow Vulnerability
14191| [22784] Microsoft Internet Explorer 5 Custom HTTP Error HTML Injection Vulnerability
14192| [22783] Microsoft Internet Explorer 5/6 MSXML XML File Parsing Cross-Site Scripting Vulnerability
14193| [22782] Microsoft Windows 2000 Active Directory Remote Stack Overflow Vulnerability
14194| [22734] Microsoft Internet Explorer 6 %USERPROFILE% File Execution Weakness
14195| [22728] Microsoft Internet Explorer 5 Classic Mode FTP Client Cross Domain Scripting Vulnerability
14196| [22726] Microsoft Internet Explorer 5 OBJECT Tag Buffer Overflow Vulnerability
14197| [22679] Microsoft Visio 2010 Crash PoC
14198| [22670] Microsoft IIS 5 WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
14199| [22655] Microsoft Publisher 2013 Crash PoC
14200| [22621] Microsoft Netmeeting 2.1/3.0.1 4.4.3385 CALLTO URL Buffer Overflow Vulnerability
14201| [22591] Microsoft Office Excel 2007 - WriteAV Crash PoC
14202| [22576] Microsoft SQL Server 7.0/2000 JET Database Engine 4.0 Buffer Overrun Vulnerability
14203| [22570] Microsoft Windows Media Player 7.1 Skin File Code Execution Vulnerability
14204| [22563] Microsoft IIS 5 User Existence Disclosure Vulnerability (2)
14205| [22562] Microsoft IIS 5 User Existence Disclosure Vulnerability (1)
14206| [22555] Microsoft BizTalk Server 2000/2002 DTA RawCustomSearchField.asp SQL Injection
14207| [22554] Microsoft BizTalk Server 2000/2002 DTA rawdocdata.asp SQL Injection Vulnerability
14208| [22553] Microsoft BizTalk Server 2002 HTTP Receiver Buffer Overflow Vulnerability
14209| [22530] Microsoft Internet Explorer 5 Remote URLMON.DLL Buffer Overflow Vulnerability
14210| [22528] Microsoft Windows 2000 RegEdit.EXE Registry Key Value Buffer Overflow Vulnerability
14211| [22518] Microsoft Shlwapi.dll 6.0.2800 .1106 Malformed HTML Form Tag DoS Vulnerability
14212| [22390] Microsoft ActiveSync 3.5 Null Pointer Dereference Denial of Service Vulnerability
14213| [22368] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (4)
14214| [22367] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (3)
14215| [22366] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (2)
14216| [22365] Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (1)
14217| [22354] Microsoft Windows 2000 Help Facility .CNT File :Link Buffer Overflow Vulnerability
14218| [22330] Microsoft Office Excel 2010 Crash PoC
14219| [22310] Microsoft Office Publisher 2010 Crash PoC
14220| [22303] Microsoft Windows Help program (WinHlp32.exe) Crash PoC
14221| [22289] Microsoft Windows XP/ME Help and Support Center Buffer Overflow Vulnerability
14222| [22288] Microsoft Internet Explorer 5/6 Self Executing HTML File Vulnerability
14223| [22280] Microsoft Outlook2000/Express 6.0 Arbitrary Program Execution Vulnerability
14224| [22255] Microsoft Windows XP/95/98/2000/NT 4 Riched20.dll Attribute Buffer Overflow Vulnerability
14225| [22245] Microsoft Windows NT/2000 cmd.exe CD Buffer Overflow Vulnerability
14226| [22237] Microsoft Office Picture Manager 2010 Crash PoC
14227| [22232] Microsoft Windows XP HCP URI Buffer Overflow Vulnerability
14228| [22226] Microsoft Internet Explorer 5 ShowHelp Arbitrary Command Execution Vulnerability
14229| [22225] Microsoft Windows XP Redirector Privilege Escalation Vulnerability
14230| [22215] Microsoft Office Word 2010 Crash PoC
14231| [22202] FTLS GuestBook 1.1 Script Injection Vulnerability
14232| [22194] Microsoft Windows XP/2000/NT 4 Locator Service Buffer Overflow Vulnerability
14233| [22132] Microsoft Windows XP/2000 Fontview Denial of Service Vulnerability
14234| [22119] Microsoft Pocket Internet Explorer 3.0 - Denial of Service Vulnerability
14235| [22027] Microsoft Java Virtual Machine 3802 Series Bytecode Verifier Vulnerability
14236| [21959] Microsoft Internet Explorer 5/6 Cached Objects Zone Bypass Vulnerability
14237| [21954] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (4)
14238| [21953] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (3)
14239| [21952] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (2)
14240| [21951] Microsoft Windows XP/2000/NT 4 RPC Service Denial of Service Vulnerability (1)
14241| [21932] Microsoft Outlook Express 5.5/6.0 S/MIME Buffer Overflow Vulnerability
14242| [21920] Microsoft Content Management Server 2001 Cross-Site Scripting Vulnerability
14243| [21910] Microsoft IIS 5.0 IDC Extension Cross Site Scripting Vulnerability
14244| [21883] Microsoft Internet Explorer 5 Document Reference Zone Bypass Vulnerability
14245| [21840] MS12-063 Microsoft Internet Explorer execCommand Use-After-Free Vulnerability
14246| [21803] Microsoft Internet Explorer 6 URI Handler Restriction Circumvention Vulnerability
14247| [21750] Microsoft Internet Explorer 5 Dialog Same Origin Policy Bypass Variant Vulnerability
14248| [21749] Microsoft Internet Explorer 5/6 XML Redirect File Disclosure Vulnerability
14249| [21721] Microsoft Internet Explorer 4/5/6 XML Datasource Applet File Disclosure Vulnerability
14250| [21718] Microsoft SQL 2000/7.0 Agent Jobs Privilege Elevation Vulnerability
14251| [21717] Microsoft Windows XP HCP URI Handler Abuse Vulnerability
14252| [21711] Microsoft Outlook Express 5/6 MHTML URL Handler File Rendering Vulnerability
14253| [21705] Microsoft Internet Explorer 6.0 File Attachment Script Execution Vulnerability
14254| [21693] Microsoft SQL Server 2000 User Authentication Remote Buffer Overflow Vulnerability
14255| [21670] Microsoft Windows Media Player 6/7 Filename Buffer Overflow Vulnerability
14256| [21662] Microsoft Outlook Express 6 XML File Attachment Script Execution Vulnerability
14257| [21652] Microsoft SQL Server 2000 Resolution Service Heap Overflow Vulnerability
14258| [21651] Microsoft SQL Server 2000 sp_MScopyscript SQL Injection Vulnerability
14259| [21650] Microsoft SQL Server 2000 Database Consistency Checkers Buffer Overflow Vulnerability
14260| [21631] Microsoft Outlook Express 5/6 Spoofable File Extensions Vulnerability
14261| [21613] Microsoft IIS 4/5 SMTP Service Encapsulated SMTP Address Vulnerability
14262| [21601] Microsoft Foundation Class Library 7.0 ISAPI Buffer Overflow Vulnerability
14263| [21556] Microsoft Internet Explorer 5/6 CSSText Bold Font Denial of Service
14264| [21549] Microsoft SQL Server 2000 Password Encrypt Procedure Buffer Overflow Vulnerability
14265| [21541] Microsoft SQL Server 2000 SQLXML Script Injection Vulnerability
14266| [21540] Microsoft SQL Server 2000 SQLXML Buffer Overflow Vulnerability
14267| [21485] Microsoft Windows 95/98/2000/NT4 WinHlp Item Buffer Overflow Vulnerability
14268| [21481] Microsoft MSN Messenger 1-4 Malformed Invite Request Denial of Service
14269| [21452] Microsoft Internet Explorer 5.0.1/6.0 Content-Disposition Handling File Execution Vulnerability
14270| [21419] Microsoft Outlook Express 5.5 DoS Device Denial of Service Vulnerability
14271| [21404] Microsoft Internet Explorer 5/6 Self-Referential Object Denial of Service Vulnerability
14272| [21389] Microsoft Windows 2000 Lanman Denial of Service Vulnerability (2)
14273| [21388] Microsoft Windows 2000 Lanman Denial of Service Vulnerability (1)
14274| [21385] Microsoft IIS 5.0 CodeBrws.ASP Source Code Disclosure Vulnerability
14275| [21376] Microsoft Internet Explorer 5.5/6.0 History List Script Injection Vulnerability
14276| [21372] Microsoft IIS 4/5 HTTP Error Page Cross Site Scripting Vulnerability
14277| [21371] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (4)
14278| [21370] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (3)
14279| [21369] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (2)
14280| [21368] Microsoft IIS 4.0/5.0 Chunked Encoding Transfer Heap Overflow Vulnerability (1)
14281| [21361] Microsoft Internet Explorer 5 Cascading Style Sheet File Disclosure Vulnerability
14282| [21344] Microsoft Windows 2000 / NT 4.0 Process Handle Local Privilege Elevation Vulnerability
14283| [21313] Microsoft IIS 4.0/5.0/5.1 Authentication Method Disclosure Vulnerability
14284| [21260] Microsoft Site Server 3.0 Cross-Site Scripting Vulnerability
14285| [21258] Microsoft Windows 2000/NT 4 NTFS File Hiding Vulnerability
14286| [21246] Microsoft Windows 2000/NT 4 TCP Stack DoS Vulnerability (2)
14287| [21245] Microsoft Windows 2000/NT 4 TCP Stack DoS Vulnerability (1)
14288| [21240] Microsoft Windows XP .Manifest Denial of Service Vulnerability
14289| [21199] Microsoft Internet Explorer 5 JavaScript Local File Enumeration Vulnerability (2)
14290| [21198] Microsoft Internet Explorer 5 JavaScript Local File Enumeration Vulnerability (1)
14291| [21195] Microsoft Internet Explorer 5/6 GetObject File Disclosure Vulnerability
14292| [21177] Microsoft IIS 5.0 False Content-Length Field DoS Vulnerability
14293| [21172] Microsoft Windows 2000 Internet Key Exchange DoS Vulnerability (2)
14294| [21171] Microsoft Windows 2000 Internet Key Exchange DoS Vulnerability (1)
14295| [21164] Microsoft Internet Explorer 5.5/6.0 Spoofable File Extensions Vulnerability
14296| [21144] Microsoft Internet Explorer 5/6 Cookie Disclosure/Modification Vulnerability
14297| [21131] Microsoft Windows 2000/XP GDI Denial of Service Vulnerability
14298| [21130] Microsoft Windows NT 3/4 CSRSS Memory Access Violation Vulnerability
14299| [21127] Microsoft Internet Explorer 5/6 JavaScript Interface Spoofing Vulnerability
14300| [21123] Microsoft Windows 2000/NT Terminal Server Service RDP DoS Vulnerability
14301| [21118] Microsoft Internet Explorer 5 Zone Spoofing Vulnerability
14302| [21113] Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability
14303| [21099] Microsoft Windows 2000 RunAs Service Denial of Services Vulnerability
14304| [21072] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
14305| [21071] Microsoft IIS 4/5 SSI Buffer Overrun Privelege Elevation
14306| [21069] Microsoft Windows 2000 RunAs Service Named Pipe Hijacking Vulnerability
14307| [21047] Microsoft Windows NT 4.0 NT4ALL DoS Vulnerability
14308| [21004] Microsoft Outlook 98/2000/2002 Arbitrary Code Execution Vulnerability
14309| [21003] Microsoft Outlook 98/2000/2002 Unauthorized Email Access Vulnerability
14310| [20991] Microsoft IIS 4.0/5.0 Device File Remote DoS Vulnerability
14311| [20989] Microsoft IIS 4.0/5.0 Device File Local DoS Vulnerability
14312| [20907] Microsoft Windows 2000 Telnet Username DoS Vulnerability
14313| [20903] Microsoft Internet Explorer 5.5 File Disclosure Vulnerability
14314| [20899] Microsoft Outlook 97/98/2000/4/5 Address Book Spoofing Vulnerability
14315| [20861] Microsoft Windows Kernel Intel x64 SYSRET PoC
14316| [20846] Microsoft IIS 4.0/5.0 FTP Denial of Service Vulnerability
14317| [20818] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (4)
14318| [20817] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (3)
14319| [20816] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (2)
14320| [20815] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability (1)
14321| [20802] Microsoft IIS 2.0/3.0 Long URL Denial of Service Vulnerability
14322| [20782] Microsoft IE 5.0/5.5 and OE 5.5 XML Stylesheets Active Scripting Vulnerability
14323| [20763] Microsoft ISA Server 2000 Web Proxy DoS Vulnerability
14324| [20688] Qualcomm Eudora 5.0.2 'Use Microsoft Viewer' Code Execution Vulnerability
14325| [20680] Microsoft IE 5.0.1/5.5/6.0 Telnet Client File Overwrite Vulnerability
14326| [20664] Microsoft IIS 5.0 WebDAV Denial of Service Vulnerability
14327| [20613] Microsoft Windows 98/2000 UDP Socket DoS Vulnerability
14328| [20596] Microsoft Windows NT 4.0 Networking Mutex DoS Vulnerability
14329| [20590] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
14330| [20571] Microsoft Outlook 2000 0/98 0/Express 5.5 Concealed Attachment Vulnerability
14331| [20564] Microsoft Windows NT 4.0 SNMP-WINS DoS Vulnerability
14332| [20553] Microsoft Windows Media Player 7.0 .WMZ Arbitrary Java Applet Vulnerability
14333| [20528] Microsoft Windows Media Player 7.0 Javascript URL Vulnerability
14334| [20515] Microsoft Internet Explorer 5.0.1/5.5 'mstask.exe' CPU Consumption Vulnerability
14335| [20508] Microsoft NT 4.0 RAS/PPTP Malformed Control Packet Denial of Service Attack
14336| [20481] Microsoft IIS 2.0/3.0 Appended Dot Script Source Disclosure Vulnerability
14337| [20460] Microsoft Windows NT 4.0 PhoneBook Server Buffer Overflow
14338| [20459] Microsoft Internet Explorer 5 \'INPUT TYPE=FILE\' Vulnerability
14339| [20457] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_peekqueue Buffer Overflow Vulnerability
14340| [20456] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_showcolv Buffer Overflow Vulnerability
14341| [20451] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_displayparamstmt Buffer Overflow Vulnerability
14342| [20427] Microsoft Windows Media Player 7.0 .ASX Buffer Overflow Vulnerability
14343| [20426] Microsoft Internet Explorer 5.5 Index.dat Vulnerability
14344| [20424] Microsoft Windows Media Player 7.0 .WMS Arbitrary Script Vulnerability
14345| [20399] Microsoft Indexing Services for Windows 2000 File Verification Vulnerability
14346| [20384] Microsoft IIS 4.0/5.0 Executable File Parsing Vulnerability
14347| [20383] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
14348| [20371] Microsoft Windows 95/WfW smbclient Directory Traversal Vulnerability
14349| [20335] Microsoft Indexing Services for Windows 2000/NT 4.0 .htw Cross-Site Scripting Vulnerability
14350| [20317] Microsoft Windows NT 4.0 MSIEXEC Registry Permissions Vulnerability
14351| [20310] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
14352| [20309] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
14353| [20306] Microsoft Virtual Machine Arbitrary Java Codebase Execution Vulnerability
14354| [20305] Microsoft Site Server 2.0 with IIS 4.0 - File Upload Vulnerability
14355| [20289] Microsoft NetMeeting 3.0.1 4.4.3385 Remote Desktop Sharing DoS Vulnerability
14356| [20288] Microsoft Windows 9x File Handle Buffer Overflow Vulnerability
14357| [20284] Microsoft Windows 9x / Me Share Level Password Bypass Vulnerability (2)
14358| [20283] Microsoft Windows 9x / Me Share Level Password Bypass Vulnerability (1)
14359| [20269] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
14360| [20265] Microsoft Windows NT 4.0 / 2000 Spoofed LPC Request Vulnerability
14361| [20257] Microsoft Windows NT 4.0 / 2000 Predictable LPC Message Identifier Multiple Vulnerabilities
14362| [20255] Microsoft Windows NT 4.0 / 2000 LPC Zone Memory Depletion DoS Vulnerability
14363| [20254] Microsoft Windows NT 4.0 Invalid LPC Request DoS Vulnerability
14364| [20243] Microsoft Windows Script Host 5.1/5.5 GetObject() File Disclosure Vulnerability
14365| [20240] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
14366| [20222] Microsoft Windows 2000 telnet.exe NTLM Authentication Vulnerability
14367| [20209] Microsoft Windows 2000 Still Image Service Privilege Escalation Vulnerability
14368| [20174] Microsoft Internet Explorer Fixed Table Col Span Heap Overflow
14369| [20152] "Microsoft IIS 5.0 ""Translate: f"" Source Disclosure Vulnerability (2)"
14370| [20151] "Microsoft IIS 5.0 ""Translate: f"" Source Disclosure Vulnerability (1)"
14371| [20133] Microsoft Windows 2000 Named Pipes Predictability Vulnerability
14372| [20122] Microsoft Office SharePoint Server 2007 Remote Code Execution
14373| [20106] Microsoft Windows NT 4/2000 NetBIOS Name Conflict Vulnerability
14374| [20096] Microsoft IIS 2.0/3.0/4.0/5.0/5.1 Internal IP Address Disclosure Vulnerability
14375| [20089] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
14376| [20079] Microsoft Outlook 97/98/2000, Outlook Express 4.0/5.0 GMT Field Buffer Overflow (2)
14377| [20078] Microsoft Outlook 97/98/2000, Outlook Express 4.0/5.0 GMT Field Buffer Overflow (1)
14378| [20048] Microsoft Windows 2000 Remote CPU-overload Vulnerability
14379| [20047] Microsoft Windows 2000 Telnet Server DoS Vulnerability
14380| [19974] Microsoft Windows Media Services 4.0/4.1 DoS Vulnerability
14381| [19928] Microsoft Active Movie Control 1.0 Filetype Vulnerability
14382| [19908] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
14383| [19907] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
14384| [19889] Microsoft Windows 95/98 NetBIOS NULL Name Vulnerability
14385| [19830] Microsoft Index Server 2.0 '%20' ASP Source Disclosure Vulnerability
14386| [19798] Microsoft Windows NT 4.0 User Shell Folders Vulnerability
14387| [19789] Microsoft Clip Art Gallery 5.0 - Buffer Overflow Vulnerability
14388| [19759] Microsoft Windows Media Services 4.0/4.1 Handshake Sequence DoS
14389| [19754] Microsoft Windows 95/98/NT 4.0 autorun.inf Vulnerability
14390| [19742] microsoft iis 3.0/4.0,microsoft index server 2.0 - Directory Traversal
14391| [19739] Microsoft Windows NT 4.0 Recycle Bin Pre-created Folder Vulnerability
14392| [19734] Microsoft Virtual Machine 2000 Series/3000 Series getSystemResource Vulnerability
14393| [19731] microsoft index server 2.0/indexing services for windows 2000 - Directory Traversal
14394| [19728] Microsoft Systems Management Server 2.0 Default Permissions Vulnerability
14395| [19673] Microsoft Windows 95/98/NT 4.0 Help File Trojan Vulnerability
14396| [19638] Microsoft SQL Server 7.0/7.0 SP1 NULL Data DoS Vulnerability
14397| [19578] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4/SP5/SP6 Services.exe Denial of Service (2)
14398| [19577] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4/SP5/SP6 Services.exe Denial of Service (1)
14399| [19516] Microsoft MSN Messenger Service 1.0 Setup BBS ActiveX Control Buffer Overflow
14400| [19502] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4/SP5 RASMAN Privilege Escalation Vulnerability
14401| [19489] Microsoft Windows NT 4.0 DCOM Server Vulnerability
14402| [19473] Microsoft Internet Explorer 5.0 FTP Password Storage Vulnerability
14403| [19471] Microsoft Internet Explorer 5.0 HTML Form Control DoS
14404| [19462] Microsoft Windows 95/98 IE5/Telnet Heap Overflow Vulnerability
14405| [19451] Microsoft Windows 98 a/98 b/98SE,Solaris 2.6 IRDP Vulnerability
14406| [19445] Microsoft FrontPage Personal WebServer 1.0 PWS DoS Vulnerability
14407| [19440] Microsoft Windows NT 4.0/SP 1/SP 2/Sp 3/SP 4/SP 5 Malformed Dialer Entry Vulnerability
14408| [19435] Microsoft JET 3.5/3.51/4.0 VBA Shell Vulnerability
14409| [19425] Microsoft Data Access Components (MDAC) <= 2.1,Microsoft IIS 3.0/4.0,Microsoft Index Server 2.0,Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (2)
14410| [19424] Microsoft Data Access Components (MDAC) <= 2.1,Microsoft IIS 3.0/4.0,Microsoft Index Server 2.0,Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (1)
14411| [19376] Microsoft IIS 2.0/3.0/4.0 ISAPI GetExtensionVersion() Vulnerability
14412| [19372] Microsoft Windows NT 4.0/SP 1/SP 2/SP 3/SP 4/SP 5 Null Session Admin Name Vulnerability
14413| [19361] Microsoft IIS 3.0/4.0 Double Byte Code Page Vulnerability
14414| [19359] Microsoft Windows NT 4.0/SP1/SP2/SP3/SP4,Windows NT 3.5.1/SP1/SP2/SP3/SP4/SP5 Screensaver Vulnerability
14415| [19248] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (4)
14416| [19247] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (3)
14417| [19246] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (2)
14418| [19245] Microsoft IIS 4.0 - Buffer Overflow Vulnerability (1)
14419| [19239] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 IIS IDC Path Mapping Vulnerability
14420| [19238] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3 DoS Duplicate Hostname Vulnerability
14421| [19228] Microsoft IIS 4.0,Microsoft JET 3.5/3.5.1 Database Engine VBA Vulnerability
14422| [19211] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 RAS Phonebook Buffer Overflow Vulnerability
14423| [19209] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 Help File Buffer Overflow Vulnerability
14424| [19208] Microsoft Site Server Commerce Edition 3.0 alpha AdSamples Vulnerability
14425| [19207] Microsoft Outlook Express 4.27.3110/4.72.3120 POP Denial of Service Vulnerability
14426| [19198] Microsoft Windows NT <= 4.0 SP4 Known DLL Cache Vulnerability
14427| [19197] "Microsoft Windows NT <= 4.0 SP5,Terminal Server 4.0 ""Pass the Hash"" with Modified SMB Client Vulnerability"
14428| [19196] "Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 RAS Dial-up Networking ""Save Password"" Vulnerability"
14429| [19195] Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3 LSA Secrets Vulnerability
14430| [19194] Microsoft IIS 3.0/4.0 Using ASP And FSO To Read Server Files Vulnerability
14431| [19186] Microsoft XML Core Services MSXML Uninitialized Memory Corruption
14432| [19164] Microsoft IE4 Clipboard Paste Vulnerability
14433| [19156] Microsoft Internet Explorer 5.0.1 Invalid Byte Cross-Frame Access Vulnerability
14434| [19152] Microsoft IIS 5.0 IISAPI Extension Enumerate Root Web Server Directory Vulnerability
14435| [19144] Microsoft Zero Administration Kit (ZAK) 1.0 and Office97 Backdoor Vulnerability
14436| [19143] "Microsoft Windows ""April Fools 2001"" Vulnerability"
14437| [19129] Microsoft IIS 4.0,Microsoft Site Server 3.0 Showcode ASP Vulnerability
14438| [19118] Microsoft IIS 3.0/4.0,Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability
14439| [19113] Microsoft Windows NT 3.5.1 SP2/3.5.1 SP3/3.5.1 SP4/3.5.1 SP5/4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 Telnetd Vulnerability
14440| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
14441| [19066] SGI IRIX 5.3/6.2,SGI license_oeo 1.0 LicenseManager NETLS_LICENSE_FILE Vulnerability
14442| [19037] MS12-005 Microsoft Office ClickOnce Unsafe Object Package Handling Vulnerability
14443| [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
14444| [19026] Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
14445| [19002] Microsoft Windows OLE Object File Handling Remote Code Execution
14446| [18952] Microsoft Wordpad 5.1 (.doc) Null Pointer Dereference Vulnerability
14447| [18819] Microsoft Windows xp Win32k.sys Local Kernel DoS Vulnerability
14448| [18606] Microsoft Terminal Services Use After Free (MS12-020)
14449| [18372] Microsoft Windows Assembly Execution Vulnerability MS12-005
14450| [18365] Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution Vulnerability
14451| [18334] Microsoft Office 2003 Home/Pro 0day
14452| [18143] MS11-038 Microsoft Office Excel Malformed OBJ Record Handling Overflow
14453| [18087] MS11-021 Microsoft Office 2007 Excel .xlb Buffer Overflow
14454| [18078] Microsoft Excel 2003 11.8335.8333 Use After Free
14455| [18067] Microsoft Excel 2007 SP2 Buffer Overwrite Exploit
14456| [17830] Microsoft WINS Service <= 5.2.3790.4520 Memory Corruption
14457| [17659] MS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow
14458| [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
14459| [17451] Microsoft Office Visio VISIODWG.DLL DXF File Handling Vulnerability
14460| [17399] Microsoft Office XP Remote code Execution
14461| [17305] "Microsoft Windows Vista/Server 2008 ""nsiproxy.sys"" Local Kernel DoS Exploit"
14462| [17227] Microsoft Office Excel Axis Properties Record Parsing Buffer Overflow PoC
14463| [17164] Microsoft Reader <= 2.1.1.3143 NULL Byte Write
14464| [17163] Microsoft Reader <= 2.1.1.3143 Array Overflow
14465| [17162] Microsoft Reader <= 2.1.1.3143 Integer Overflow
14466| [17161] Microsoft Reader <= 2.1.1.3143 Heap Overflow
14467| [17160] Microsoft Reader <= 2.1.1.3143 Integer Overflow
14468| [17159] Microsoft Host Integration Server <= 8.5.4224.0 DoS Vulnerabilities
14469| [17158] Microsoft HTML Help <= 6.1 Stack Overflow
14470| [17133] Microsoft Windows xp AFD.sys Local Kernel DoS Exploit
14471| [17037] PostgreSQL for Microsoft Windows Payload Execution
14472| [16991] Microsoft Source Code Analyzer for SQL Injection 1.3 Improper Permissions
14473| [16957] Oracle MySQL for Microsoft Windows Payload Execution
14474| [16750] Microsoft Message Queueing Service DNS Name Path Overflow
14475| [16749] Microsoft RPC DCOM Interface Overflow
14476| [16748] Microsoft DNS RPC Service extractQuotedChar() Overflow (TCP)
14477| [16747] Microsoft Message Queueing Service Path Overflow
14478| [16740] Microsoft IIS FTP Server NLST Response Overflow
14479| [16686] Microsoft Word RTF pFragments Stack Buffer Overflow (File Format)
14480| [16680] Microsoft Visual Basic VBP Buffer Overflow
14481| [16665] Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow
14482| [16660] Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow
14483| [16649] Microsoft Works 7 WkImgSrv.dll WKsPictureInterface() ActiveX Exploit
14484| [16625] Microsoft Excel Malformed FEATHEADER Record Vulnerability
14485| [16615] Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption
14486| [16608] Microsoft Whale Intelligent Application Gateway ActiveX Control Buffer Overflow
14487| [16605] Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download
14488| [16574] Microsoft Windows Shell LNK Code Execution
14489| [16545] Microsoft Help Center XSS and Command Execution
14490| [16542] Microsoft OWC Spreadsheet HTMLURL Buffer Overflow
14491| [16537] Microsoft OWC Spreadsheet msDataSourceObject Memory Corruption
14492| [16516] Microsoft WMI Administration Tools ActiveX Buffer Overflow
14493| [16507] Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow
14494| [16472] Microsoft IIS 5.0 IDQ Path Overflow
14495| [16471] Microsoft IIS WebDAV Write Access Code Execution
14496| [16470] Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflow
14497| [16469] Microsoft IIS 5.0 Printer Host Header Overflow
14498| [16468] Microsoft IIS 4.0 .HTR Path Overflow
14499| [16467] Microsoft IIS/PWS CGI Filename Double Decode Command Execution
14500| [16442] Microsoft DirectX DirectShow SAMI Buffer Overflow
14501| [16403] CA BrightStor Agent for Microsoft SQL Overflow
14502| [16398] Microsoft SQL Server Hello Overflow
14503| [16396] Microsoft SQL Server sp_replwritetovarbin Memory Corruption via SQL Injection
14504| [16395] Microsoft SQL Server Payload Execution
14505| [16394] Microsoft SQL Server Payload Execution via SQL injection
14506| [16393] Microsoft SQL Server Resolution Overflow
14507| [16392] Microsoft SQL Server sp_replwritetovarbin Memory Corruption
14508| [16379] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow
14509| [16378] Microsoft Workstation Service NetAddAlternateComputerName Overflow
14510| [16377] Microsoft ASN.1 Library Bitstring Heap Overflow
14511| [16375] Microsoft RRAS Service RASMAN Registry Overflow
14512| [16374] Microsoft Windows Authenticated User Code Execution
14513| [16373] Microsoft Services MS06-066 nwapi32.dll
14514| [16372] Microsoft Workstation Service NetpManageIPCConnect Overflow
14515| [16371] Microsoft NetDDE Service Overflow
14516| [16369] Microsoft Services MS06-066 nwwks.dll
14517| [16368] Microsoft LSASS Service DsRolerUpgradeDownlevelServer Overflow
14518| [16367] Microsoft Server Service NetpwPathCanonicalize Overflow
14519| [16366] Microsoft DNS RPC Service extractQuotedChar() Overflow (SMB)
14520| [16365] Microsoft Plug and Play Service Overflow
14521| [16364] Microsoft RRAS Service Overflow
14522| [16363] Microsoft Windows SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
14523| [16362] Microsoft Server Service Relative Path Stack Corruption
14524| [16361] Microsoft Print Spooler Service Impersonation Vulnerability
14525| [16360] Microsoft Windows SMB Relay Code Execution
14526| [16359] Microsoft WINS Service Memory Overwrite
14527| [16358] Microsoft IIS ISAPI RSA WebAgent Redirect Overflow
14528| [16357] Microsoft IIS Phone Book Service Overflow
14529| [16356] Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
14530| [16355] Microsoft IIS ISAPI nsiislog.dll ISAPI POST Overflow
14531| [16354] Microsoft IIS ISAPI w3who.dll Query String Overflow
14532| [16334] Microsoft Private Communications Transport Overflow
14533| [16071] Microsoft Internet Explorer MHTML Protocol Handler XSS
14534| [16024] Microsoft Fax Cover Page Editor <= 5.2.3790.3959 Double Free Memory Corruption
14535| [15984] MS11-002: Microsoft Data Access Components Vulnerability
14536| [15839] Microsoft Windows Fax Services Cover Page Editor (.cov) Memory Corruption
14537| [15433] LEADTOOLS 11.5.0.9 - (ltlst11n.ocx) Insert() Access Violation DoS
14538| [15262] Microsoft Office HtmlDlgHelper Class Memory Corruption
14539| [15167] Microsoft IIS 6.0 ASP Stack Overflow (Stack Exhaustion) Denial of Service (MS10-065)
14540| [15158] MOAUB #30 - Microsoft Unicode Scripts Processor Remote Code Execution
14541| [15148] MOAUB #29 - Microsoft Excel SxView Record Parsing Heap Memory Corruption
14542| [15122] MOAUB #27 - Microsoft Internet Explorer MSHTML Findtext Processing Issue
14543| [15112] MOAUB #26 - Microsoft Cinepak Codec CVDecompress Heap Overflow
14544| [15096] MOAUB #24 - Microsoft MPEG Layer-3 Audio Decoder Division By Zero
14545| [15094] MOAUB #24 - Microsoft Excel OBJ Record Stack Overflow
14546| [15088] MOAUB #23 - Microsoft Excel HFPicture Record Parsing Memory Corruption (0day)
14547| [15065] MOAUB #21 - Microsoft Excel WOPT Record Parsing Heap Memory Corruption
14548| [15061] microsoft drm technology (msnetobj.dll) activex Multiple Vulnerabilities
14549| [15034] Microsoft Mspaint bmp crash Proof Of Concept
14550| [15019] MOAUB #16 - Microsoft Excel HFPicture Record Parsing Remote Code Execution Vulnerability
14551| [14971] MOAUB #11 - Microsoft Office Word 2007 sprmCMajority Buffer Overflow
14552| [14944] MOAUB #8 - Microsoft Office Visio DXF File Stack based Overflow
14553| [14895] MOAUB #5 - Microsoft MPEG Layer-3 Remote Command Execution Exploit
14554| [14782] Microsoft Office PowerPoint 2007 DLL Hijacking Exploit (rpawinet.dll)
14555| [14780] Windows Internet Communication Settings DLL Hijacking Exploit (schannel.dll)
14556| [14778] Microsoft Windows Contacts DLL Hijacking Exploit (wab32res.dll)
14557| [14758] Microsoft Group Convertor DLL Hijacking Exploit (imm.dll)
14558| [14754] Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit (smmscrpt.dll)
14559| [14751] Microsoft Vista BitLocker Drive Encryption API Hijacking Exploit (fveapi.dll)
14560| [14746] Microsoft Office Groove 2007 DLL Hijacking Exploit (mso.dll)
14561| [14745] Microsoft Address Book 6.00.2900.5512 DLL Hijacking Exploit (wab32res.dll)
14562| [14744] Microsoft Visio 2003 DLL Hijacking Exploit (mfc71enu.dll)
14563| [14733] Microsoft Windows 7 wab.exe DLL Hijacking Exploit (wab32res.dll)
14564| [14731] Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking Exploit (hhctrl.ocx)
14565| [14723] Microsoft Power Point 2010 DLL Hijacking Exploit (pptimpconv.dll)
14566| [14705] Microsoft Windows (IcmpSendEcho2Ex interrupting) Denial of Service Vulnerability
14567| [14674] Microsoft Windows SRV2.SYS SMB Negotiate ProcessID Function Table Dereference (MS09-050)
14568| [14670] Microsoft Windows nt!SeObjectCreateSaclAccessBits() Missed ACE Bounds Checks (MS10-047)
14569| [14669] Microsoft Windows win32k!GreStretchBltInternal() Does Not Handle src == dest
14570| [14668] Microsoft Windows win32k!xxxRealDrawMenuItem() Missing HBITMAP Bounds Checks
14571| [14667] Microsoft Windows KTM Invalid Free with Reused Transaction GUID (MS10-047)
14572| [14666] Microsoft Windows nt!NtCreateThread Race Condition with Invalid Code Segment (MS10-047)
14573| [14611] Microsoft Windows 'SfnLOGONNOTIFY' Local Privilege Escalation Vulnerability (MS10-048)
14574| [14610] Microsoft Windows Tracing Registry Key ACL Privilege Escalation Vulnerability
14575| [14608] Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048)
14576| [14607] Microsoft SMB Server Trans2 Zero Size Pool Alloc (MS10-054)
14577| [14566] "Microsoft Windows win32k.sys Driver ""CreateDIBPalette()"" Buffer Overflow"
14578| [14413] IE 7.0 - DoS Microsoft Clip Organizer Multiple Insecure ActiveX Control
14579| [14403] Microsoft Windows Automatic LNK Shortcut File Code Execution
14580| [14361] Microsoft Excel 0x5D record Stack Overflow Vulnerability
14581| [14295] Microsoft MSHTML.DLL CTIMEOUTEVENTLIST::INSERTINTOTIMEOUTLIST Memory Leak (0day)
14582| [14179] Microsoft Internet Information Services (IIS) 5 Authentication Bypass Vulnerability (MS10-065)
14583| [13808] Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly
14584| [12728] Microsoft Outlook Web Access (OWA) 8.2.254.0 - Information Disclosure vulnerability
14585| [12564] Microsoft Windows Outlook Express and Windows Mail Integer Overflow
14586| [12518] Microsoft Paint Integer Overflow Vulnerability (DoS) MS10-005
14587| [12450] Microsoft SharePoint Server 2007 XSS Vulnerability
14588| [12079] Microsoft Office (2010 beta) Communicator SIP Denial of Service Exploit
14589| [12032] Microsoft Internet Explorer Tabular Data Control ActiveX Remote Code Execution
14590| [11683] Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta)
14591| [11276] Microsoft Internet Explorer 6.0/7.0 NULL pointer crashes
14592| [11195] Microsoft Windows Defender ActiveX Heap Overflow PoC
14593| [11034] Microsoft HTML Help Compiler (hhc.exe) BOF PoC
14594| [10791] Microsoft IIS ASP Multiple Extensions Security Bypass 5.x/6.x
14595| [10579] TLS Renegotiation Vulnerability PoC
14596| [10072] Multiple Vendor TLS Protocol Session Renegotiation Security Vulnerability
14597| [10068] Microsoft Windows 2000-2008 Embedded OpenType Font Engine Remote Code Execution
14598| [9893] Microsoft Internet Explorer 5,6,7 - Memory Corruption PoC
14599| [9587] Microsoft IIS 5.0/6.0 FTP Server (Stack Exhaustion) Denial of Service
14600| [9559] Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4)
14601| [9541] Microsoft IIS 5.0/6.0 FTP Server Remote Stack Overflow Exploit (win2k)
14602| [9301] Microsoft Windows XP (win32k.sys) Local Privilege Escalation Exploit
14603| [9163] Microsoft Office Web Components (Spreadsheet) ActiveX BOF PoC
14604| [9100] Microsoft Internet Explorer (AddFavorite) Remote Crash PoC
14605| [8873] OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit
14606| [8806] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (pl)
14607| [8765] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (php)
14608| [8754] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (patch)
14609| [8720] OpenSSL <= 0.9.8k, 1.0.0-beta2 DTLS Remote Memory Exhaustion DoS
14610| [8704] Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Vulnerability
14611| [8467] Microsoft Media Player - (quartz.dll .wav) Multiple Remote DoS Vulns
14612| [8466] Microsoft GDI Plugin .png Infinite Loop Denial of Service PoC
14613| [8465] Microsoft Media Player - (quartz.dll .mid) Denial of Service Exploit
14614| [8281] Microsoft GdiPlus EMF GpFont.SetData Integer Overflow PoC
14615| [7727] Microsoft HTML Workshop <= 4.74 Universal Buffer Overflow Exploit
14616| [7501] Microsoft SQL Server sp_replwritetovarbin() Heap Overflow Exploit
14617| [7262] Microsoft Office Communicator (SIP) Remote Denial of Service Exploit
14618| [7196] Microsoft XML Core Services DTD Cross-Domain Scripting PoC MS08-069
14619| [6699] Microsoft PicturePusher ActiveX Cross Site File Upload Attack PoC
14620| [6317] Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
14621| [6244] Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC
14622| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
14623| [5530] Microsoft Works 7 WkImgSrv.dll ActiveX Remote BOF Exploit
14624| [5460] Microsoft Works 7 WkImgSrv.dll ActiveX Denial of Service PoC
14625| [5349] Microsoft Visual InterDev 6.0 (SP6) SLN File Local Buffer Overflow PoC
14626| [5320] Microsoft Office XP SP3 PPT File Buffer Overflow Exploit (ms08-016)
14627| [5287] Microsoft Office Excel Code Execution Exploit (MS08-014)
14628| [5107] Microsoft Office .WPS File Stack Overflow Exploit (MS08-011)
14629| [5087] Microsoft DirectSpeechSynthesis Module Remote Buffer Overflow Exploit
14630| [4892] Microsoft Visual InterDev 6.0 (SP6) .sln File Local Buffer Overflow Exploit
14631| [4874] Microsoft Rich Textbox Control 6.0 (SP6) SaveFile() Insecure Method
14632| [4873] Microsoft FoxServer (vfp6r.dll 6.0.8862.0) ActiveX Command Execution
14633| [4866] Microsoft DirectX SAMI File Parsing Remote Stack Overflow Exploit
14634| [4625] Microsoft Jet Engine MDB File Parsing Stack Overflow PoC
14635| [4616] Microsoft Internet Explorer TIF/TIFF Code Execution (MS07-055)
14636| [4506] Microsoft Visual FoxPro 6.0 FPOLE.OCX Arbitrary Command Execution
14637| [4431] Microsoft Visual Basic Enterprise Edition 6.0 SP6 Code Execution Exploit
14638| [4398] Microsoft SQL Server Distributed Management Objects BoF Exploit
14639| [4394] Microsoft Visual Studio 6.0 (VBTOVSI.DLL 1.0.0.0) File Overwrite Exploit
14640| [4393] Microsoft Visual Studio 6.0 (PDWizard.ocx) Remote Command Execution
14641| [4379] Microsoft SQL Server Distributed Management Objects (sqldmo.dll) BoF
14642| [4369] Microsoft Visual FoxPro 6.0 (FPOLE.OCX 6.0.8450.0) - Remote PoC
14643| [4361] Microsoft Visual Basic 6.0 VBP_Open OLE Local CodeExec Exploit
14644| [4312] ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit
14645| [4279] Microsoft DXMedia SDK 6 (SourceUrl) ActiveX Remote Code Execution
14646| [4259] Microsoft Visual 6 (VDT70.DLL NotSafe) Stack Overflow Exploit
14647| [4121] Microsoft Excel 2000/2003 Sheet Name Vulnerability PoC
14648| [4067] Microsoft Office MSODataSourceControl COM-object BoF PoC (0day)
14649| [4066] Microsoft Speech API ActiveX control Remote BoF Exploit (xp sp2)
14650| [4065] Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)
14651| [4045] Microsoft Windows Animated Cursor Stack Overflow Exploit
14652| [4016] Microsoft IIS <= 5.1 Hit Highlighting Authentication Bypass Exploit
14653| [3977] Microsoft Visual Basic 6.0 Project (Description) Stack overflow PoC
14654| [3976] Microsoft Visual Basic 6.0 Project (Company Name) Stack overflow PoC
14655| [3973] Microsoft Office 2000 (OUACTRL.OCX 1.0.1.9) - Remote DoS Exploit
14656| [3965] Microsoft IIS 6.0 (/AUX/.aspx) Remote Denial of Service Exploit
14657| [3746] Microsoft Windows DNS RPC - Remote Buffer Overflow Exploit (port 445) (2)
14658| [3690] microsoft office word 2007 - Multiple Vulnerabilities
14659| [3544] Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit
14660| [3260] Microsoft Word 2000 Unspecified Code Execution Exploit (0day)
14661| [3193] Microsoft Excel Malformed Palette Record DoS PoC (MS07-002)
14662| [3176] Microsoft Visual C++ (.RC Resource Files) Local Buffer Overflow Exploit
14663| [3159] Microsoft Help Workshop 4.03.0002 (.HPJ) Buffer Overflow Exploit
14664| [3149] Microsoft Help Workshop 4.03.0002 (.CNT) Buffer Overflow Exploit
14665| [3071] Microsoft Vista (NtRaiseHardError) Privilege Escalation Exploit
14666| [2922] Microsoft Word Document (malformed pointer) Proof of Concept
14667| [2523] Microsoft Office 2003 PPT Local Buffer Overflow PoC
14668| [2091] Microsoft PowerPoint 2003 SP2 Local Code Execution Exploit (french)
14669| [2056] Microsoft IIS ASP Stack Overflow Exploit (MS06-034)
14670| [2001] Microsoft Word 2000/2003 Unchecked Boundary Condition Vulnerability
14671| [1999] Microsoft Word 2000/2003 Hlink Local Buffer Overflow Exploit PoC
14672| [1988] Microsoft Excel 2003 Hlink Local Buffer Overflow Exploit (italian)
14673| [1986] Microsoft Excel 2000/2003 Hlink Local Buffer Overflow Exploit (french)
14674| [1978] Microsoft Excel Universal Hlink Local Buffer Overflow Exploit
14675| [1958] Microsoft Excel 2003 Hlink Stack/SEH Buffer Overflow Exploit
14676| [1944] Microsoft Excel Unspecified Remote Code Execution Exploit
14677| [1927] Microsoft Excel Unicode Local Overflow Exploit PoC
14678| [1495] Microsoft HTML Help Workshop (.hhp file) Buffer Overflow Exploit (3)
14679| [1490] Microsoft HTML Help Workshop (.hhp file) Buffer Overflow Exploit (new)
14680| [1488] Microsoft HTML Help Workshop (.hhp file) Denial of Service
14681| [1470] Microsoft HTML Help Workshop (.hhp file) Buffer Overflow Exploit
14682| [1352] Microsoft Windows DTC Remote Exploit (PoC) (MS05-051) (updated)
14683| [92] Microsoft WordPerfect Document Converter Exploit (MS03-036)
14684|
14685| OpenVAS (Nessus) - http://www.openvas.org:
14686| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
14687| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
14688| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
14689| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
14690| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
14691| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
14692| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
14693| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
14694| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
14695| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
14696| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
14697| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
14698| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
14699| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
14700| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
14701| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
14702| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
14703| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
14704| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
14705| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
14706| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
14707| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
14708| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
14709| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
14710| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
14711| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
14712| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
14713| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
14714| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
14715| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
14716| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
14717| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
14718| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
14719| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
14720| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
14721| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
14722| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
14723| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
14724| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
14725| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
14726| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
14727| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
14728| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
14729| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
14730| [902798] Microsoft SMB Signing Enabled and Not Required At Server
14731| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
14732| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
14733| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
14734| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
14735| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
14736| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
14737| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
14738| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
14739| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
14740| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
14741| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
14742| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
14743| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
14744| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
14745| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
14746| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
14747| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
14748| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
14749| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
14750| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
14751| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
14752| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
14753| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
14754| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
14755| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
14756| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
14757| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
14758| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
14759| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
14760| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
14761| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
14762| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
14763| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
14764| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
14765| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
14766| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
14767| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
14768| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
14769| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
14770| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
14771| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
14772| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
14773| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
14774| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
14775| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
14776| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
14777| [902518] Microsoft .NET Framework Security Bypass Vulnerability
14778| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
14779| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
14780| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
14781| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
14782| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
14783| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
14784| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
14785| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
14786| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
14787| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
14788| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
14789| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
14790| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
14791| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
14792| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
14793| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
14794| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
14795| [902425] Microsoft Windows SMB Accessible Shares
14796| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
14797| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
14798| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
14799| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
14800| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
14801| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
14802| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
14803| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
14804| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
14805| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
14806| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
14807| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
14808| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
14809| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
14810| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
14811| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
14812| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
14813| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
14814| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
14815| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
14816| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
14817| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
14818| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
14819| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
14820| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
14821| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
14822| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
14823| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
14824| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
14825| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
14826| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
14827| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
14828| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
14829| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
14830| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
14831| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
14832| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
14833| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
14834| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
14835| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
14836| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
14837| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
14838| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
14839| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
14840| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
14841| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
14842| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
14843| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
14844| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
14845| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
14846| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
14847| [902175] IBM DB2 REPEAT Buffer Overflow and TLS Renegotiation Vulnerabilities (Win)
14848| [902174] IBM DB2 REPEAT Buffer Overflow and TLS Renegotiation Vulnerabilities (Linux)
14849| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
14850| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
14851| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
14852| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
14853| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
14854| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
14855| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
14856| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
14857| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
14858| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
14859| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
14860| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
14861| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
14862| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
14863| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
14864| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
14865| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
14866| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
14867| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
14868| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
14869| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
14870| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
14871| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
14872| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
14873| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
14874| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
14875| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
14876| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
14877| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
14878| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
14879| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
14880| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
14881| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
14882| [901195] Ipswitch IMail Server STARTTLS Plaintext Command Injection Vulnerability
14883| [901194] Kerio Products 'STARTTLS' Plaintext Command Injection Vulnerability
14884| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
14885| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
14886| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
14887| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
14888| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
14889| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
14890| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
14891| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
14892| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
14893| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
14894| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
14895| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
14896| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
14897| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
14898| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
14899| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
14900| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
14901| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
14902| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
14903| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
14904| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
14905| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
14906| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
14907| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
14908| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
14909| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
14910| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
14911| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
14912| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
14913| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
14914| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
14915| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
14916| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
14917| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
14918| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
14919| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
14920| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
14921| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
14922| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
14923| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
14924| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
14925| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
14926| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
14927| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
14928| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
14929| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
14930| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
14931| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
14932| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
14933| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
14934| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
14935| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
14936| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
14937| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
14938| [900808] Microsoft Visual Products Version Detection
14939| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
14940| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
14941| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
14942| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
14943| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
14944| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
14945| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
14946| [900654] OpenSSL DTLS Packets Multiple DOS Vulnerabilities (win)
14947| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
14948| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
14949| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
14950| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
14951| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
14952| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
14953| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
14954| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
14955| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
14956| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
14957| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
14958| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
14959| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
14960| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
14961| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
14962| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
14963| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
14964| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
14965| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
14966| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
14967| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
14968| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
14969| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
14970| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
14971| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
14972| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
14973| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
14974| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
14975| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
14976| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
14977| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
14978| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
14979| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
14980| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
14981| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
14982| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
14983| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
14984| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
14985| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
14986| [900247] Remote Code Execution Vulnerabilities in SChannel (980436)
14987| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
14988| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
14989| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
14990| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
14991| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
14992| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
14993| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
14994| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
14995| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
14996| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
14997| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
14998| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
14999| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
15000| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
15001| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
15002| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
15003| [900173] Microsoft Windows Media Player Version Detection
15004| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
15005| [900170] Microsoft iExplorer '&NBSP
15006| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
15007| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
15008| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
15009| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
15010| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
15011| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
15012| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
15013| [900087] Vulnerability in SChannel Could Allow Spoofing (960225)
15014| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
15015| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
15016| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
15017| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
15018| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
15019| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
15020| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
15021| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
15022| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
15023| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
15024| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
15025| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
15026| [900025] Microsoft Office Version Detection
15027| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
15028| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
15029| [881204] CentOS Update for gnutls CESA-2012:0429 centos6
15030| [881198] CentOS Update for gnutls CESA-2012:0428 centos5
15031| [880908] CentOS Update for gnutls CESA-2009:1232 centos4 i386
15032| [880677] CentOS Update for gnutls CESA-2009:123 centos5 i386
15033| [880630] CentOS Update for gnutls CESA-2010:0166 centos5 i386
15034| [880386] CentOS Update for gnutls CESA-2010:0167 centos4 i386
15035| [870675] RedHat Update for gnutls RHSA-2012:0429-01
15036| [870579] RedHat Update for gnutls RHSA-2012:0428-01
15037| [870240] RedHat Update for gnutls RHSA-2010:0166-01
15038| [870237] RedHat Update for gnutls RHSA-2010:0167-01
15039| [870071] RedHat Update for gnutls RHSA-2008:0492-01
15040| [870055] RedHat Update for gnutls RHSA-2008:0982-01
15041| [870011] RedHat Update for gnutls RHSA-2008:0489-01
15042| [864437] Fedora Update for mingw-gnutls FEDORA-2012-4451
15043| [864156] Fedora Update for mingw32-gnutls FEDORA-2012-4417
15044| [864134] Fedora Update for gnutls FEDORA-2012-4569
15045| [864129] Fedora Update for mingw32-gnutls FEDORA-2012-4409
15046| [864107] Fedora Update for gnutls FEDORA-2012-4578
15047| [862207] Fedora Update for gnutls FEDORA-2010-9487
15048| [862184] Fedora Update for gnutls FEDORA-2010-9518
15049| [860874] Fedora Update for gnutls FEDORA-2008-10000
15050| [860861] Fedora Update for gnutls FEDORA-2008-4259
15051| [860542] Fedora Update for gnutls FEDORA-2008-4274
15052| [860508] Fedora Update for gnutls FEDORA-2008-9600
15053| [860487] Fedora Update for gnutls FEDORA-2008-4183
15054| [860058] Fedora Update for gnutls FEDORA-2008-9530
15055| [850049] SuSE Update for gnutls SUSE-SA:2008:046
15056| [840978] Ubuntu Update for gnutls26 USN-1418-1
15057| [840438] Ubuntu Update for gnutls12 vulnerability USN-948-1
15058| [840346] Ubuntu Update for gnutls12, gnutls13, gnutls26 regression USN-678-2
15059| [840331] Ubuntu Update for gnutls12, gnutls13 vulnerabilities USN-613-1
15060| [840206] Ubuntu Update for gnutls12, gnutls13, gnutls26 vulnerability USN-678-1
15061| [835227] HP-UX Update for sendmail with STARTTLS Enabled HPSBUX02508
15062| [831635] Mandriva Update for gnutls MDVSA-2012:040 (gnutls)
15063| [831564] Mandriva Update for gnutls MDVSA-2012:045 (gnutls)
15064| [830725] Mandriva Update for gnutls MDVSA-2008:227 (gnutls)
15065| [830670] Mandriva Update for gnutls MDVSA-2008:227-1 (gnutls)
15066| [830619] Mandriva Update for gnutls MDVSA-2008:106 (gnutls)
15067| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
15068| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
15069| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
15070| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
15071| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
15072| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
15073| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
15074| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
15075| [802726] Microsoft SMB Signing Disabled
15076| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
15077| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
15078| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
15079| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
15080| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
15081| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
15082| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
15083| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
15084| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
15085| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
15086| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
15087| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
15088| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
15089| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
15090| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
15091| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
15092| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
15093| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
15094| [801934] Microsoft Silverlight Version Detection
15095| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
15096| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
15097| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
15098| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
15099| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
15100| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
15101| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
15102| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
15103| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
15104| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
15105| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
15106| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
15107| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
15108| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
15109| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
15110| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
15111| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
15112| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
15113| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
15114| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
15115| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
15116| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
15117| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
15118| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
15119| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
15120| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
15121| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
15122| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
15123| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
15124| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
15125| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
15126| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
15127| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
15128| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
15129| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
15130| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
15131| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
15132| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
15133| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
15134| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
15135| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
15136| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
15137| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
15138| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
15139| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
15140| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
15141| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
15142| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
15143| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
15144| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
15145| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
15146| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
15147| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
15148| [800917] OpenSSL/GnuTLS SSL Server Spoofing Vulnerability (Win)
15149| [800916] GnuTLS Version Detection (Win)
15150| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
15151| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
15152| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
15153| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
15154| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
15155| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
15156| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
15157| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
15158| [800742] Microsoft Internet Explorer Unspecified vulnerability
15159| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
15160| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
15161| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
15162| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
15163| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
15164| [800504] Microsoft Windows XP SP3 denial of service vulnerability
15165| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
15166| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
15167| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
15168| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
15169| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
15170| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
15171| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
15172| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
15173| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
15174| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
15175| [800331] Microsoft Windows Live Messenger Client Version Detection
15176| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
15177| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
15178| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
15179| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
15180| [800217] Microsoft Money Version Detection
15181| [800209] Microsoft Internet Explorer Version Detection (Win)
15182| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
15183| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
15184| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
15185| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
15186| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
15187| [103118] SMTP STARTTLS Detection Detection
15188| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
15189| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
15190| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
15191| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
15192| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
15193| [101017] Microsoft MS03-018 security check
15194| [101016] Microsoft MS03-022 security check
15195| [101015] Microsoft MS03-034 security check
15196| [101014] Microsoft MS00-078 security check
15197| [101012] Microsoft MS03-051 security check
15198| [101010] Microsoft Security Bulletin MS05-004
15199| [101009] Microsoft Security Bulletin MS06-033
15200| [101007] Microsoft dotNET version grabber
15201| [101006] Microsoft Security Bulletin MS06-056
15202| [101005] Microsoft Security Bulletin MS07-040
15203| [101004] Microsoft MS04-017 security check
15204| [101003] Microsoft MS00-058 security check
15205| [101000] Microsoft MS00-060 security check
15206| [100952] Microsoft IIS FTPd NLST stack overflow
15207| [100950] Microsoft DNS server internal hostname disclosure detection
15208| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
15209| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
15210| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
15211| [100588] OpenSSL 'dtls1_retrieve_buffered_fragment()' Remote Denial of Service Vulnerability
15212| [100347] ngIRCd SSL/TLS Support MOTD Request Multiple Denial Of Service Vulnerabilities
15213| [100316] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
15214| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
15215| [100062] Microsoft Remote Desktop Protocol Detection
15216| [90027] GnuTLS < 2.2.4 vulnerability (Win)
15217| [90026] GnuTLS < 2.2.5 vulnerability (Lin)
15218| [90024] Windows Vulnerability in Microsoft Jet Database Engine
15219| [80007] Microsoft MS00-06 security check
15220| [71585] Gentoo Security Advisory GLSA 201206-18 (GnuTLS)
15221| [71294] FreeBSD Ports: gnutls
15222| [71244] Debian Security Advisory DSA 2441-1 (gnutls26)
15223| [70768] Gentoo Security Advisory GLSA 201110-05 (gnutls)
15224| [70608] FreeBSD Ports: gnutls
15225| [66371] Mandriva Security Advisory MDVSA-2009:308 (gnutls)
15226| [66295] Debian Security Advisory DSA 1935-1 (gnutls13 gnutls26)
15227| [66061] Slackware Advisory SSA:2009-290-01 gnutls
15228| [65886] SLES10: Security update for GnuTLS
15229| [65843] SLES10: Security update for GnuTLS
15230| [65842] SLES10: Security update for GnuTLS
15231| [65838] SLES10: Security update for GnuTLS
15232| [65716] SLES11: Security update for GnuTLS
15233| [65653] SLES11: Security update for GnuTLS
15234| [65506] SLES9: Security update for gnutls
15235| [65375] SLES9: Security update for gnutls
15236| [65162] SLES9: Security update for GnuTLS
15237| [65137] SLES9: Security update for GnuTLS
15238| [64971] Fedora Core 10 FEDORA-2009-8622 (gnutls)
15239| [64969] Fedora Core 11 FEDORA-2009-8565 (gnutls)
15240| [64793] CentOS Security Advisory CESA-2009:1232 (gnutls)
15241| [64790] CentOS Security Advisory CESA-2009:123 (gnutls)
15242| [64786] FreeBSD Ports: gnutls
15243| [64785] FreeBSD Ports: gnutls
15244| [64775] Ubuntu USN-809-1 (gnutls26)
15245| [64682] Mandrake Security Advisory MDVSA-2009:210 (gnutls)
15246| [64129] Mandrake Security Advisory MDVSA-2009:116 (gnutls)
15247| [64043] Gentoo Security Advisory GLSA 200905-04 (gnutls)
15248| [63965] Slackware Advisory SSA:2009-128-01 gnutls
15249| [63575] Debian Security Advisory DSA 1719-2 (gnutls13, gnutls26)
15250| [63392] Debian Security Advisory DSA 1719-1 (gnutls13)
15251| [63226] Gentoo Security Advisory GLSA 200901-10 (gnutls)
15252| [61872] FreeBSD Ports: gnutls
15253| [61866] Slackware Advisory SSA:2008-320-01 gnutls
15254| [61861] Slackware Advisory SSA:2008-315-01 gnutls
15255| [61461] Slackware Advisory SSA:2008-180-01 gnutls
15256| [61447] FreeBSD Ports: gnutls
15257| [61054] Gentoo Security Advisory GLSA 200805-20 (gnutls)
15258| [61034] Debian Security Advisory DSA 1581-1 (gnutls13)
15259| [58465] Debian Security Advisory DSA 1333-1 (libcurl3-gnutls)
15260| [57893] Gentoo Security Advisory GLSA 200609-15 (gnutls)
15261| [57467] FreeBSD Ports: gnutls, gnutls-devel
15262| [57406] Debian Security Advisory DSA 1182-1 (gnutls11)
15263| [57355] FreeBSD Ports: gnutls
15264| [56359] Debian Security Advisory DSA 986-1 (gnutls11)
15265| [54936] Gentoo Security Advisory GLSA 200505-04 (GnuTLS)
15266| [53662] Debian Security Advisory DSA 376-1 (exim exim-tls)
15267| [53474] Debian Security Advisory DSA 637-1 (exim-tls)
15268| [53192] Debian Security Advisory DSA 502-1 (exim-tls)
15269| [52357] FreeBSD Ports: gnutls
15270| [13752] Denial of Service (DoS) in Microsoft SMS Client
15271| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
15272| [11808] Microsoft RPC Interface Buffer Overrun (823980)
15273| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
15274| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
15275| [11217] Microsoft's SQL Version Query
15276| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
15277| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
15278| [11067] Microsoft's SQL Hello Overflow
15279| [10862] Microsoft's SQL Server Brute Force
15280| [10755] Microsoft Exchange Public Folders Information Leak
15281| [10680] Test Microsoft IIS Source Fragment Disclosure
15282| [10674] Microsoft's SQL UDP Info Query
15283| [10673] Microsoft's SQL Blank Password
15284| [10491] ASP/ASA source using Microsoft Translate f: bug
15285| [10144] Microsoft SQL TCP/IP listener is running
15286|
15287| SecurityTracker - https://www.securitytracker.com:
15288| [1027233] Windows Schannel Lets Remote Users Decrypt TLS Traffic
15289| [1026498] Windows Schannel Lets Remote Users Decrypt SSL/TLS Traffic
15290| [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
15291| [1024556] Windows Schannel TLSv1 Processing Bug Lets Remote Users Deny Service
15292| [1021828] Windows SChannel TLS Handshake Authentication Flaw Lets Certain Remote Users Spoof the System
15293| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
15294| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
15295| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
15296| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
15297| [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15298| [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
15299| [1028867] (HP Issues Fix for HP-UX) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15300| [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
15301| [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
15302| [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
15303| [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
15304| [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
15305| [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
15306| [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
15307| [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
15308| [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
15309| [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
15310| [1028690] BSAFE SSL-J Lets Remote Users Decrypt SSL/TLS Traffic
15311| [1028689] (RSA Issues Fix for BSAFE SSL-C) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15312| [1028688] (RSA Issues Fix for BSAFE SSL-J) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15313| [1028687] (RSA Issues Fix for BSAFE Micro Edition Suite) OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15314| [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
15315| [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
15316| [1028603] GnuTLS TLS Record Decoding Flaw Lets Remote Users Deny Service
15317| [1028560] Microsoft Visio Discloses Information to Remote Users
15318| [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
15319| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
15320| [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
15321| [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
15322| [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
15323| [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
15324| [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
15325| [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
15326| [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
15327| [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
15328| [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
15329| [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
15330| [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
15331| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
15332| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
15333| [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
15334| [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
15335| [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
15336| [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
15337| [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
15338| [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
15339| [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
15340| [1028267] IBM WebSphere DataPower SOA Appliance TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15341| [1028220] Cisco Prime Central for Hosted Collaboration Solution Assurance TLS Processing Flaw Lets Remote Users Deny Service
15342| [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
15343| [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
15344| [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
15345| [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15346| [1028087] Network Security Services (NSS) TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15347| [1028086] GnuTLS TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15348| [1028085] Opera TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15349| [1028082] OpenSSL TLS/DTLS CBC Mode Oracle Padding Lets Remote Users Recover Plaintext
15350| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
15351| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
15352| [1027947] Windows TCP/IP Stack Lets Remote Users Downgrade SSL/TLS Sessions
15353| [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
15354| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
15355| [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
15356| [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
15357| [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
15358| [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
15359| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
15360| [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
15361| [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
15362| [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
15363| [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
15364| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
15365| [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
15366| [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
15367| [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
15368| [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
15369| [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
15370| [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
15371| [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
15372| [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
15373| [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
15374| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
15375| [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
15376| [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
15377| [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
15378| [1027514] RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code
15379| [1027513] RSA BSAFE Micro Edition Suite Lets Remote Users Decrypt SSL/TLS Traffic
15380| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
15381| [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
15382| [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
15383| [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15384| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
15385| [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
15386| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15387| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15388| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15389| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15390| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15391| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15392| [1027303] Apple Xcode Lets Remote Users Decrypt SSL/TLS Traffic
15393| [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
15394| [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
15395| [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
15396| [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
15397| [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
15398| [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
15399| [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
15400| [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
15401| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
15402| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
15403| [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
15404| [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
15405| [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
15406| [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
15407| [1027127] OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases
15408| [1027114] Microsoft Windows Includes Some Invalid Certificates
15409| [1027057] OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service
15410| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
15411| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
15412| [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15413| [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
15414| [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
15415| [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
15416| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
15417| [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
15418| [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
15419| [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
15420| [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
15421| [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
15422| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15423| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15424| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15425| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15426| [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
15427| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15428| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
15429| [1026828] GnuTLS Error in ciphertext_to_compressed() Lets Remote Users Deny Service
15430| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
15431| [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
15432| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
15433| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
15434| [1026704] IBM WebSphere DataPower Lets Remote Users Decrypt SSL/TLS Traffic
15435| [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
15436| [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
15437| [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
15438| [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
15439| [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
15440| [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
15441| [1026646] HP System Management Homepage Lets Remote Users Decrypt SSL/TLS Traffic
15442| [1026587] cURL Lets Remote Users Decrypt SSL/TLS Traffic
15443| [1026548] OpenSSL DTLS Bug Lets Remote Users Deny Service
15444| [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
15445| [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
15446| [1026490] GnuTLS DTLS Implementation Lets Remote Users Recover Plaintext in Certain Cases
15447| [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
15448| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
15449| [1026434] Novell Access Manager Lets Remote Users Decrypt SSL/TLS Traffic
15450| [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
15451| [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
15452| [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
15453| [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
15454| [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
15455| [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
15456| [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
15457| [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
15458| [1026310] GnuTLS Buffer Overflow in gnutls_session_get_data() Lets Remote Users Deny Service
15459| [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
15460| [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
15461| [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15462| [1026216] Oracle Java Runtime Environment (JRE) Lets Remote Users Decrypt SSL/TLS Traffic
15463| [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
15464| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
15465| [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
15466| [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
15467| [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
15468| [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
15469| [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
15470| [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
15471| [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
15472| [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
15473| [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
15474| [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
15475| [1025997] Opera Lets Remote Users Spoof Extended Validation Address Bar Security Information and Decrypt SSL/TLS Traffic
15476| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
15477| [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
15478| [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
15479| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
15480| [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
15481| [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
15482| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
15483| [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
15484| [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
15485| [1025837] Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions
15486| [1025807] Mutt Does Non Properly Validate SMTP and IMAP Server TLS Certificates
15487| [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
15488| [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
15489| [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
15490| [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
15491| [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
15492| [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
15493| [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
15494| [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
15495| [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
15496| [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
15497| [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
15498| [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
15499| [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
15500| [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
15501| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
15502| [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
15503| [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
15504| [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
15505| [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
15506| [1025625] Cyrus IMAP Server STARTTLS Buffer Flushing Flaw Lets Remote Users Inject Commands via Man-in-the-Middle Attacks
15507| [1025605] Fetchmail STARTTLS Blocking IO Bug Lets Remote Users Deny Service
15508| [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
15509| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
15510| [1025441] Linux Kernel AGPIOC_RESERVE and AGPIOC_ALLOCATE IOCTLs Let Local Users Consume Excessive Memory Resources
15511| [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
15512| [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
15513| [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15514| [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
15515| [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
15516| [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
15517| [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
15518| [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
15519| [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
15520| [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
15521| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
15522| [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
15523| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
15524| [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
15525| [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
15526| [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
15527| [1025224] Asterisk TCP/TLS Server Bug Lets Remote Users Deny Service
15528| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
15529| [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
15530| [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
15531| [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
15532| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
15533| [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
15534| [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
15535| [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
15536| [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
15537| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
15538| [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
15539| [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
15540| [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
15541| [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
15542| [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15543| [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15544| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
15545| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
15546| [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
15547| [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
15548| [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
15549| [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
15550| [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
15551| [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
15552| [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
15553| [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
15554| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
15555| [1024743] OpenSSL Buffer Overflow in TLS Server Extension Parsing May Let Remote Users Execute Arbitrary Code
15556| [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
15557| [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
15558| [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
15559| [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
15560| [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
15561| [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
15562| [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
15563| [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
15564| [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
15565| [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
15566| [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
15567| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
15568| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
15569| [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
15570| [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
15571| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
15572| [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
15573| [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
15574| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
15575| [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
15576| [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
15577| [1024359] Mac OS X Bugs Let Remote Users Intercept TLS/SSL Connections, Impersonate Domain Names, and Execute Arbitrary Code
15578| [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
15579| [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
15580| [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
15581| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
15582| [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
15583| [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
15584| [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
15585| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
15586| [1024300] Windows Schannel Certificate Validation Error Lets Remote Users Execute Arbitrary Code
15587| [1024299] Windows Schannel Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
15588| [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
15589| [1024279] Cisco ASA SunRPC/TLS/SIP/IKE Processing Bugs Let Remote Users Execute Arbitrary Code
15590| [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
15591| [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
15592| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
15593| [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
15594| [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
15595| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
15596| [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
15597| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
15598| [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
15599| [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
15600| [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
15601| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15602| [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
15603| [1024020] GnuTLS Invalid Hash Algorithm Null Pointer Dereference Lets Remote Users Deny Service
15604| [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
15605| [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
15606| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
15607| [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
15608| [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
15609| [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
15610| [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
15611| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
15612| [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
15613| [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
15614| [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
15615| [1023756] GnuTLS Certificate Serial Number Processing Stack Overflow May Let Remote Users Execute Arbitrary Code
15616| [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
15617| [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
15618| [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
15619| [1023612] Cisco ASA TCP, SIP, SCCP, DTLS, and IKE Processing Flaws Let Remote Users Deny Service
15620| [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
15621| [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
15622| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
15623| [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
15624| [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
15625| [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
15626| [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
15627| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
15628| [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
15629| [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
15630| [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
15631| [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
15632| [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
15633| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
15634| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
15635| [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
15636| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
15637| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
15638| [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
15639| [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
15640| [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
15641| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
15642| [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
15643| [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
15644| [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15645| [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
15646| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
15647| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
15648| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
15649| [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
15650| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
15651| [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
15652| [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
15653| [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
15654| [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
15655| [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
15656| [1022909] Wireshark GSM A RR, OpcUa, and TLS Dissector Bugs Let Remote Users Deny Service
15657| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
15658| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
15659| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15660| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
15661| [1022777] GnuTLS NULL Character Flaw in Common Name Field Lets Remote Users Spoof Certficiates
15662| [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
15663| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
15664| [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
15665| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
15666| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
15667| [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
15668| [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
15669| [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
15670| [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
15671| [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
15672| [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
15673| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
15674| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
15675| [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
15676| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
15677| [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
15678| [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
15679| [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
15680| [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
15681| [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
15682| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
15683| [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
15684| [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
15685| [1022241] OpenSSL DTLS Processing Bugs Let Users Deny Service
15686| [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
15687| [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
15688| [1022159] GnuTLS Command Line Interface Does Not Properly Validate X.509 Certificates
15689| [1022158] GnuTLS DSA Key Generation Creates RSA Keys Instead of DSA Keys
15690| [1022157] GnuTLS Bug in Validating DSA Signatures Lets Remote Users Deny Service
15691| [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
15692| [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
15693| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
15694| [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
15695| [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
15696| [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
15697| [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
15698| [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
15699| [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
15700| [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
15701| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
15702| [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
15703| [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
15704| [1021812] FileZilla SSL/TLS Buffer Overflow Lets Remote Users Deny Service
15705| [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
15706| [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
15707| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
15708| [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
15709| [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
15710| [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
15711| [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
15712| [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
15713| [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15714| [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
15715| [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
15716| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
15717| [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
15718| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
15719| [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
15720| [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
15721| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
15722| [1021167] GnuTLS X.509 Certificate Chain Validation Bug Permits Man-in-the-Middle Attacks
15723| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
15724| [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
15725| [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
15726| [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
15727| [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
15728| [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
15729| [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
15730| [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
15731| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
15732| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
15733| [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
15734| [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
15735| [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
15736| [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
15737| [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
15738| [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
15739| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
15740| [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
15741| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
15742| [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
15743| [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
15744| [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
15745| [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
15746| [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
15747| [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
15748| [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
15749| [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
15750| [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
15751| [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15752| [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
15753| [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
15754| [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
15755| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
15756| [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
15757| [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
15758| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
15759| [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
15760| [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
15761| [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
15762| [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
15763| [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
15764| [1020179] Cisco ASA TLS Processing Bug Lets Remote Users Deny Service
15765| [1020178] Cisco PIX Firewall TLS Processing Bug Lets Remote Users Deny Service
15766| [1020122] OpenSSL TLS Handshake Bug Lets Remote Servers Crash the Connected Client
15767| [1020059] GnuTLS Invalid Record Length Values Let Remote Users Deny Service
15768| [1020058] GnuTLS Null Pointer Dereference in Processing Client Hello Messages Lets Remote Users Deny Service
15769| [1020057] GnuTLS Server Name Validation Flaw Lets Remote Users Deny Service
15770| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
15771| [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
15772| [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
15773| [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
15774| [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
15775| [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
15776| [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
15777| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
15778| [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
15779| [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
15780| [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
15781| [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
15782| [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
15783| [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
15784| [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
15785| [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
15786| [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
15787| [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
15788| [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
15789| [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
15790| [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
15791| [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
15792| [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
15793| [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
15794| [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
15795| [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
15796| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
15797| [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
15798| [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
15799| [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
15800| [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
15801| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
15802| [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
15803| [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
15804| [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
15805| [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
15806| [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
15807| [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
15808| [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
15809| [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
15810| [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
15811| [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
15812| [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
15813| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
15814| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
15815| [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
15816| [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
15817| [1018827] Cisco ASA TLS and MGCP Processing Bugs Let Remote Users Deny Service
15818| [1018826] Cisco PIX Firewall TLS and MGCP Processing Bugs Let Remote Users Deny Service
15819| [1018810] OpenSSL DTLS Bug May Let Remote Users Execute Arbitrary Code
15820| [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
15821| [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
15822| [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
15823| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
15824| [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
15825| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15826| [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
15827| [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
15828| [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
15829| [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
15830| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
15831| [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
15832| [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
15833| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15834| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
15835| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
15836| [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
15837| [1018357] Java Secure Socket Extension (JSSE) SSL/TLS Handshake Bug Lets Remote Users Deny Service
15838| [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
15839| [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15840| [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
15841| [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
15842| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
15843| [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
15844| [1018226] Windows Schannel Digital Signature Bug Lets Remote Users Execute Arbitrary Code
15845| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
15846| [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
15847| [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
15848| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
15849| [1018042] FreeRADIUS EAP-TTLS Memory Leak Lets Remote Users Deny Service
15850| [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
15851| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
15852| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
15853| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
15854| [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
15855| [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
15856| [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
15857| [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
15858| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
15859| [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
15860| [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
15861| [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
15862| [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
15863| [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
15864| [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
15865| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
15866| [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
15867| [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
15868| [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15869| [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15870| [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15871| [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
15872| [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15873| [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15874| [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
15875| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
15876| [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
15877| [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
15878| [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
15879| [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
15880| [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
15881| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
15882| [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
15883| [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
15884| [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
15885| [1017478] Fetchmail TLS Security Bugs May Let Eavesdroppers Obtain Passwords
15886| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
15887| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
15888| [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
15889| [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
15890| [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
15891| [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
15892| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
15893| [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
15894| [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
15895| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
15896| [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
15897| [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
15898| [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
15899| [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
15900| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
15901| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
15902| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
15903| [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
15904| [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
15905| [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
15906| [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
15907| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
15908| [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
15909| [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
15910| [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
15911| [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
15912| [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
15913| [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
15914| [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
15915| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
15916| [1016844] GnuTLS May Allow Digital Signatures to Be Forged
15917| [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
15918| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
15919| [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
15920| [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
15921| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
15922| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
15923| [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
15924| [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
15925| [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
15926| [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
15927| [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
15928| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
15929| [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
15930| [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
15931| [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
15932| [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
15933| [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
15934| [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
15935| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
15936| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
15937| [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
15938| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
15939| [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
15940| [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
15941| [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
15942| [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
15943| [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
15944| [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
15945| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
15946| [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
15947| [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
15948| [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
15949| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
15950| [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
15951| [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
15952| [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
15953| [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
15954| [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
15955| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
15956| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
15957| [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
15958| [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
15959| [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
15960| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
15961| [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
15962| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
15963| [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
15964| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
15965| [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
15966| [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
15967| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
15968| [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
15969| [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
15970| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
15971| [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
15972| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
15973| [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
15974| [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
15975| [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
15976| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
15977| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
15978| [1015612] GnuTLS libtasn1 DER Decoding Bugs Let Remote Users Deny Service
15979| [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
15980| [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
15981| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
15982| [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
15983| [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
15984| [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
15985| [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
15986| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
15987| [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
15988| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
15989| [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
15990| [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
15991| [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
15992| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
15993| [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
15994| [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
15995| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
15996| [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
15997| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
15998| [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
15999| [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
16000| [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
16001| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
16002| [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
16003| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
16004| [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
16005| [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
16006| [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
16007| [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
16008| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
16009| [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
16010| [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
16011| [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
16012| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
16013| [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
16014| [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
16015| [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
16016| [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
16017| [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
16018| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
16019| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
16020| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
16021| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
16022| [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
16023| [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
16024| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
16025| [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
16026| [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
16027| [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
16028| [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
16029| [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
16030| [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
16031| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
16032| [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
16033| [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
16034| [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
16035| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
16036| [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
16037| [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
16038| [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
16039| [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
16040| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
16041| [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
16042| [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
16043| [1013861] GnuTLS Padding Validation Error Lets Remote Users Deny Service
16044| [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
16045| [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
16046| [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
16047| [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
16048| [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
16049| [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
16050| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
16051| [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
16052| [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
16053| [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
16054| [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
16055| [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
16056| [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
16057| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
16058| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
16059| [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
16060| [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
16061| [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
16062| [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
16063| [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
16064| [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
16065| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
16066| [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
16067| [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
16068| [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
16069| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
16070| [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
16071| [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
16072| [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
16073| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
16074| [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
16075| [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
16076| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
16077| [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
16078| [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
16079| [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
16080| [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
16081| [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
16082| [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
16083| [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
16084| [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
16085| [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
16086| [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
16087| [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
16088| [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
16089| [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
16090| [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
16091| [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
16092| [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
16093| [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
16094| [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
16095| [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
16096| [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
16097| [1012046] Cisco Secure Access Control Server EAP-TLS Bug Lets Remote Users Be Authenticated Without Proper Credentials
16098| [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
16099| [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
16100| [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
16101| [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
16102| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
16103| [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
16104| [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
16105| [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
16106| [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
16107| [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
16108| [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
16109| [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
16110| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
16111| [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
16112| [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
16113| [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
16114| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
16115| [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
16116| [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
16117| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
16118| [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
16119| [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
16120| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
16121| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
16122| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
16123| [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
16124| [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
16125| [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
16126| [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
16127| [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
16128| [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
16129| [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
16130| [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
16131| [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
16132| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
16133| [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
16134| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
16135| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
16136| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
16137| [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
16138| [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
16139| [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
16140| [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
16141| [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
16142| [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
16143| [1010838] GnuTLS X.509 Certificate Chain Validation Process Lets Remote Users Deny Service
16144| [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
16145| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
16146| [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
16147| [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
16148| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
16149| [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
16150| [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
16151| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
16152| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
16153| [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
16154| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
16155| [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
16156| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
16157| [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
16158| [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
16159| [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
16160| [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
16161| [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
16162| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
16163| [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
16164| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
16165| [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
16166| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
16167| [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
16168| [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
16169| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
16170| [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
16171| [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
16172| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
16173| [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
16174| [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
16175| [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
16176| [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
16177| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
16178| [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
16179| [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
16180| [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
16181| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
16182| [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
16183| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
16184| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
16185| [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
16186| [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
16187| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
16188| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
16189| [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
16190| [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
16191| [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
16192| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
16193| [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
16194| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
16195| [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
16196| [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
16197| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
16198| [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
16199| [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
16200| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
16201| [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
16202| [1009458] OpenSSL SSL/TLS Handshade Flaws May Let Remote Users Crash OpenSSL-based Applications
16203| [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
16204| [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
16205| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
16206| [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
16207| [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
16208| [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
16209| [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
16210| [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
16211| [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
16212| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
16213| [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
16214| [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
16215| [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
16216| [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
16217| [1008586] Microsoft Office Security Features Can Be Bypassed
16218| [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
16219| [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
16220| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
16221| [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
16222| [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
16223| [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
16224| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
16225| [1008425] Microsoft IE Does Not Properly Display Some URLs
16226| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
16227| [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
16228| [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
16229| [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
16230| [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
16231| [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
16232| [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
16233| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
16234| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
16235| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
16236| [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
16237| [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
16238| [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
16239| [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
16240| [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
16241| [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
16242| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
16243| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
16244| [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
16245| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
16246| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
16247| [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
16248| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
16249| [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
16250| [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
16251| [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
16252| [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
16253| [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
16254| [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
16255| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
16256| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
16257| [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
16258| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
16259| [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
16260| [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
16261| [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
16262| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
16263| [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
16264| [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
16265| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
16266| [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
16267| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
16268| [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
16269| [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
16270| [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
16271| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
16272| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
16273| [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
16274| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
16275| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
16276| [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
16277| [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
16278| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
16279| [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
16280| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
16281| [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
16282| [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
16283| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
16284| [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
16285| [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
16286| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
16287| [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
16288| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
16289| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
16290| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
16291| [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
16292| [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
16293| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
16294| [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
16295| [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
16296| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
16297| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
16298| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
16299| [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
16300| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
16301| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
16302| [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
16303| [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
16304| [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
16305| [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
16306| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
16307| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
16308| [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
16309| [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
16310| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
16311| [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
16312| [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
16313| [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
16314| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
16315| [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
16316| [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
16317| [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
16318| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
16319| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
16320| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
16321| [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
16322| [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
16323| [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
16324| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
16325| [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
16326| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
16327| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
16328| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
16329| [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
16330| [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
16331| [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
16332| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
16333| [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
16334| [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
16335| [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
16336| [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
16337| [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
16338| [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
16339| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
16340| [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
16341| [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
16342| [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
16343| [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
16344| [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
16345| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
16346| [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
16347| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
16348| [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
16349| [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
16350| [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
16351| [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
16352| [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
16353| [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
16354| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
16355| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
16356| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
16357| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
16358| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
16359| [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
16360| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
16361| [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
16362| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
16363| [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
16364| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
16365| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
16366| [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
16367| [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
16368| [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
16369| [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
16370| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
16371| [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
16372| [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
16373| [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
16374| [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
16375| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
16376| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
16377| [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
16378| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
16379| [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
16380| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
16381| [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
16382| [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
16383| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
16384| [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
16385| [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
16386| [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
16387| [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
16388| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
16389| [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
16390| [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
16391| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
16392| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
16393| [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
16394| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
16395| [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
16396| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
16397| [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
16398| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
16399| [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
16400| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
16401| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
16402| [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
16403| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
16404| [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
16405| [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
16406| [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
16407| [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
16408| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
16409| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
16410| [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
16411| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
16412| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
16413| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
16414| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
16415| [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
16416| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
16417| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
16418| [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
16419| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
16420| [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
16421| [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
16422| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
16423| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
16424| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
16425| [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
16426| [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
16427| [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
16428| [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
16429| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
16430| [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
16431| [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
16432| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
16433| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
16434| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
16435| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
16436| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
16437| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
16438| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
16439| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
16440| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
16441| [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
16442| [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
16443| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
16444| [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
16445| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
16446| [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
16447| [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
16448| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
16449| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
16450| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
16451| [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
16452| [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
16453| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
16454| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
16455| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
16456| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
16457| [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
16458| [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
16459| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
16460| [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
16461| [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
16462| [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
16463| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
16464| [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
16465| [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
16466| [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
16467| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
16468| [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
16469| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
16470| [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
16471| [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
16472| [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
16473| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
16474| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
16475| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
16476| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
16477| [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
16478| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
16479| [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
16480| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
16481| [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
16482| [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
16483| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
16484| [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
16485| [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
16486| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
16487| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
16488| [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
16489| [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
16490| [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
16491| [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
16492| [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
16493| [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
16494| [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
16495| [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
16496| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
16497| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
16498| [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
16499| [1003757] PureTLS Java-based SSL Implementation Has Diffie-Hellman Parameter Bug That May Compromise Security
16500| [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
16501| [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
16502| [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
16503| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
16504| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
16505| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
16506| [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
16507| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
16508| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
16509| [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
16510| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
16511| [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
16512| [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
16513| [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
16514| [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
16515| [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
16516| [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
16517| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
16518| [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
16519| [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
16520| [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
16521| [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
16522| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
16523| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
16524| [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
16525| [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
16526| [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
16527| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
16528| [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
16529| [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
16530| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
16531| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
16532| [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
16533| [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
16534| [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
16535| [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
16536| [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
16537| [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
16538| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
16539| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
16540| [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
16541| [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
16542| [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
16543| [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
16544| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
16545| [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
16546| [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
16547| [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
16548| [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
16549| [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
16550| [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
16551| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
16552| [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
16553| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
16554| [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
16555| [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
16556| [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
16557| [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
16558| [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
16559| [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
16560| [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
16561| [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
16562| [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
16563| [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
16564| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
16565| [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
16566| [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
16567| [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
16568| [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
16569| [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
16570| [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
16571| [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
16572| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
16573| [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
16574| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
16575| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
16576| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
16577| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
16578| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
16579| [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
16580| [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
16581| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
16582| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
16583| [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
16584| [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
16585| [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
16586| [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
16587| [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
16588| [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
16589| [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
16590| [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
16591| [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
16592| [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
16593| [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
16594| [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
16595| [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
16596| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
16597| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
16598| [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
16599| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
16600| [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
16601| [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
16602| [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
16603| [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
16604| [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
16605| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
16606| [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
16607| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
16608| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
16609| [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
16610| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
16611| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
16612| [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
16613| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
16614| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
16615| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
16616| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
16617| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
16618| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
16619| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
16620| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
16621| [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
16622| [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
16623| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
16624| [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
16625| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
16626| [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
16627| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
16628| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
16629| [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
16630| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
16631| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
16632| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
16633| [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
16634| [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
16635| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
16636| [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
16637| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
16638| [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
16639| [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
16640| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
16641| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
16642| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
16643| [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
16644| [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
16645| [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
16646| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
16647| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
16648| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
16649| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
16650| [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
16651| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
16652| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
16653| [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
16654| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
16655| [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
16656| [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
16657| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
16658| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
16659| [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
16660| [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
16661| [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
16662| [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
16663| [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
16664| [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
16665| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
16666| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
16667| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
16668| [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
16669| [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
16670| [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
16671| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
16672| [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
16673| [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
16674| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
16675| [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
16676| [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
16677| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
16678| [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
16679| [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
16680| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
16681| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
16682| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
16683| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
16684| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
16685|
16686| OSVDB - http://www.osvdb.org:
16687| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
16688| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
16689| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
16690| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
16691| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
16692| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
16693| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
16694| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
16695| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
16696|_
16697445/tcp closed microsoft-ds conn-refused
166981 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
16699SF-Port443-TCP:V=7.70%I=7%D=8/6%Time=5D4A09CD%P=x86_64-pc-linux-gnu%r(TLSS
16700SF:essionReq,BB9,"\x16\x03\x03\x0b\xb4\x02\0\0M\x03\x03\]J\x08\xd5{\xde'\*
16701SF:\xc0\xfd\xf3\x16\xb0\xedL\xcc\xa1\xa8\xc8\x12}\x1b\xa8\xd2v\xacS\xcc9\x
16702SF:0b\xefR\x20\.\x19\0\0\x14\xeayg\x95}=S\xce\xcfi\xcfH\x15\x9bGz\xab\xe7\
16703SF:xcc~\xee\xb4\xda\x06neQ\0/\0\0\x05\xff\x01\0\x01\0\x0b\0\x0b\[\0\x0bX\0
16704SF:\x06\xba0\x82\x06\xb60\x82\x05\x9e\xa0\x03\x02\x01\x02\x02\x10\x06\xf8\
16705SF:xac\x0cV\x99\x1be\xe4s\"\xb5~\.\xf5\xaa0\r\x06\t\*\x86H\x86\xf7\r\x01\x
16706SF:01\x0b\x05\x000M1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\x150\x13\x06\x03U\
16707SF:x04\n\x13\x0cDigiCert\x20Inc1'0%\x06\x03U\x04\x03\x13\x1eDigiCert\x20SH
16708SF:A2\x20Secure\x20Server\x20CA0\x1e\x17\r180806000000Z\x17\r200810120000Z
16709SF:0z1\x0b0\t\x06\x03U\x04\x06\x13\x02SA1\x0f0\r\x06\x03U\x04\x07\x13\x06R
16710SF:iyadh1604\x06\x03U\x04\n\x13-Bureau\x20of\x20Experts\x20At\x20The\x20Co
16711SF:uncil\x20of\x20Ministers1\x0b0\t\x06\x03U\x04\x0b\x13\x02IT1\x150\x13\x
16712SF:06\x03U\x04\x03\x0c\x0c\*\.boe\.gov\.sa0\x82\x01\"0\r\x06\t\*\x86H\x86\
16713SF:xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\x000\x82\x01\n\x02\x82\x01\x01\
16714SF:0\xb6P~\xa1\"\x16\x8d\xa8\xc4\x1e\xed\xb2\x95:\xb9\xeb&`\xc7\x92\x8a\xf
16715SF:2\xc0/dr4\xe8\xe5\xaf~\x0e\xd0\xe4\x97\xb6\xfaT=y\xf1@\x88\ny\"\xd6\x9a
16716SF:\x11J\x13\xe0\x82G\xf3\xa1W\xfe\x85\xf7\xb3\xea/8\x08\x04\x88!\xaf\xe5j
16717SF:in}\.\x86qn\xcf\x20\x83\x80\xe1a\x99\xe5T\x1e\x8fd\nA\xc4\xd8\xf6\x98\x
16718SF:8c\x88,\x05\x02U\xa2\x1e\xf9rSC\x86\x87\xf4\x07i\x8bE\x83\xba\xb8IuL\xc
16719SF:8\x12U\x86\xa6\xe0\x9e\xed\xf6\x0b\x99\x8bN}a\x1ag\xc5\]\xa0\x1779\x88\
16720SF:x98\x91\|j\x82\xe0\xe3\^\xfe\xc6\x9c\x8a\[\x93m\x87\xccs!o\x93j\x03\xcd
16721SF:\x1b\xf3\xdf\xec\x01wp\xa5\xa0'\xcf\+\xb8\x92i\xc2\x8d\xf3\xbc\xcf\x05\
16722SF:?\xb1\x10Zy\xa7\xb0\x825\xaf\xaff\x83\xfbR9/\xd6R\\\x20n\xe4\x94\x979\x
16723SF:b2\xad\xec\xaa{\x03\xa1\x17\xe6{T\x19\xd6\xc9\xa7\xdb\x01\xd6Ih\x83\xf2
16724SF:\x8a\xfbW\xaa\xae\xe27\xb6\xd5f\xfc9\x97-\x93\x02&\xaf\x02\x03\x01\0\x0
16725SF:1\xa3\x82\x03c0\x82\x03_0\x1f\x06\x03U\x1d#\x04\x180\x16\x80\x14\x0f\x8
16726SF:0a\x1c\x821a\xd5/\(\xe7\x8dF8\xb4,\xe1\xc6\xd9\xe20\x1d\x06\x03U\x1d\x0
16727SF:e\x04\x16\x04\x14\r,9\x85n\x83e\xeda\xe2`\x9e\xa2\xd9\xa2To\xebMB0#\x06
16728SF:\x03U\x1d\x11\x04\x1c0\x1a\x82\x0c\*\.boe\.gov\.sa\x82\nboe\.gov\.sa0\x
16729SF:0e\x06\x03U\x1d\x0f\x01\x01\xff\x04\x04\x03\x02\x05\xa00\x1d\x06\x03U\x
16730SF:1d%\x04\x160\x14\x06\x08\+\x06\x01\x05\x05\x07\x03\x01\x06\x08\+\x06\x0
16731SF:1\x05\x05\x07\x03\x020k\x06\x03U\x1d\x1f\x04d0b0/\xa0-\xa0\+\x86\)http:
16732SF://crl3\.digicert\.com/ssca-sha2-g6\.crl0/\xa0-\xa0\+\x86\)http:");
16733Device type: general purpose|WAP
16734Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (91%)
16735OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3.18 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:linux:linux_kernel:4.9
16736OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
16737Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (91%), Linux 3.18 (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (85%), Linux 4.9 (85%)
16738No exact OS matches for host (test conditions non-ideal).
16739TCP/IP fingerprint:
16740SCAN(V=7.70%E=4%D=8/6%OT=80%CT=25%CU=%PV=N%G=N%TM=5D4A09FD%P=x86_64-pc-linux-gnu)
16741SEQ(SP=104%GCD=1%ISR=106%TI=Z%CI=Z%TS=U)
16742OPS(O1=M44FNNSNW8%O2=M44FNNSNW8%O3=M44FNW8%O4=M44FNNSNW8%O5=M44FNNSNW8%O6=M44FNNS)
16743WIN(W1=7210%W2=7210%W3=7210%W4=7210%W5=7210%W6=7210)
16744ECN(R=Y%DF=Y%TG=40%W=7210%O=M44FNNSNW8%CC=Y%Q=)
16745T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
16746T2(R=N)
16747T3(R=N)
16748T4(R=N)
16749T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
16750T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
16751T7(R=N)
16752U1(R=N)
16753IE(R=N)
16754
16755TCP Sequence Prediction: Difficulty=260 (Good luck!)
16756IP ID Sequence Generation: All zeros
16757Service Info: OS: Windows; Device: load balancer; CPE: cpe:/o:microsoft:windows
16758
16759TRACEROUTE (using proto 1/icmp)
16760HOP RTT ADDRESS
167611 167.73 ms 10.247.200.1
167622 178.75 ms 213.184.122.97
167633 168.20 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
167644 167.79 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
167655 168.16 ms bzq-179-124-54.cust.bezeqint.net (212.179.124.54)
167666 206.42 ms ix-ae-4-0.tcore2.wyn-marseille.as6453.net (80.231.200.73)
167677 206.38 ms if-ae-2-2.tcore1.wyn-marseille.as6453.net (80.231.217.1)
167688 291.57 ms 80.231.217.99
167699 ...
1677010 295.39 ms 212.26.63.252
1677111 ... 30
16772
16773NSE: Script Post-scanning.
16774NSE: Starting runlevel 1 (of 2) scan.
16775Initiating NSE at 19:15
16776Completed NSE at 19:15, 0.00s elapsed
16777NSE: Starting runlevel 2 (of 2) scan.
16778Initiating NSE at 19:15
16779Completed NSE at 19:15, 0.00s elapsed
16780Read data files from: /usr/bin/../share/nmap
16781#######################################################################################################################################
16782Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-06 19:15 EDT
16783NSE: Loaded 45 scripts for scanning.
16784NSE: Script Pre-scanning.
16785Initiating NSE at 19:15
16786Completed NSE at 19:15, 0.00s elapsed
16787Initiating NSE at 19:15
16788Completed NSE at 19:15, 0.00s elapsed
16789Initiating Parallel DNS resolution of 1 host. at 19:15
16790Completed Parallel DNS resolution of 1 host. at 19:15, 0.02s elapsed
16791Initiating UDP Scan at 19:15
16792Scanning 212.138.117.248 [14 ports]
16793Completed UDP Scan at 19:15, 2.59s elapsed (14 total ports)
16794Initiating Service scan at 19:15
16795Scanning 12 services on 212.138.117.248
16796Service scan Timing: About 8.33% done; ETC: 19:30 (0:14:18 remaining)
16797Completed Service scan at 19:16, 102.59s elapsed (12 services on 1 host)
16798Initiating OS detection (try #1) against 212.138.117.248
16799Retrying OS detection (try #2) against 212.138.117.248
16800Initiating Traceroute at 19:17
16801Completed Traceroute at 19:17, 7.20s elapsed
16802Initiating Parallel DNS resolution of 1 host. at 19:17
16803Completed Parallel DNS resolution of 1 host. at 19:17, 0.00s elapsed
16804NSE: Script scanning 212.138.117.248.
16805Initiating NSE at 19:17
16806Completed NSE at 19:17, 7.24s elapsed
16807Initiating NSE at 19:17
16808Completed NSE at 19:17, 1.31s elapsed
16809Nmap scan report for 212.138.117.248
16810Host is up (0.17s latency).
16811
16812PORT STATE SERVICE VERSION
1681353/udp open|filtered domain
1681467/udp open|filtered dhcps
1681568/udp open|filtered dhcpc
1681669/udp open|filtered tftp
1681788/udp open|filtered kerberos-sec
16818123/udp open|filtered ntp
16819137/udp filtered netbios-ns
16820138/udp filtered netbios-dgm
16821139/udp open|filtered netbios-ssn
16822161/udp open|filtered snmp
16823162/udp open|filtered snmptrap
16824389/udp open|filtered ldap
16825520/udp open|filtered route
168262049/udp open|filtered nfs
16827Too many fingerprints match this host to give specific OS details
16828
16829TRACEROUTE (using port 137/udp)
16830HOP RTT ADDRESS
168311 167.75 ms 10.247.200.1
168322 ... 3
168334 165.69 ms 10.247.200.1
168345 171.10 ms 10.247.200.1
168356 165.28 ms 10.247.200.1
168367 165.28 ms 10.247.200.1
168378 165.28 ms 10.247.200.1
168389 165.29 ms 10.247.200.1
1683910 165.32 ms 10.247.200.1
1684011 ... 18
1684119 166.00 ms 10.247.200.1
1684220 164.11 ms 10.247.200.1
1684321 ... 27
1684428 169.84 ms 10.247.200.1
1684529 ...
1684630 163.65 ms 10.247.200.1
16847
16848NSE: Script Post-scanning.
16849Initiating NSE at 19:17
16850Completed NSE at 19:17, 0.00s elapsed
16851Initiating NSE at 19:17
16852Completed NSE at 19:17, 0.00s elapsed
16853Read data files from: /usr/bin/../share/nmap
16854OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
16855Nmap done: 1 IP address (1 host up) scanned in 127.48 seconds
16856 Raw packets sent: 147 (13.614KB) | Rcvd: 22 (2.408KB)
16857#######################################################################################################################################
16858---------------------------------------------------------------------------------------------------------------------------------------
16859+ Target IP: 212.138.117.248
16860+ Target Hostname: 212.138.117.248
16861+ Target Port: 80
16862+ Start Time: 2019-08-06 19:34:20 (GMT-4)
16863---------------------------------------------------------------------------------------------------------------------------------------
16864+ Server: No banner retrieved
16865+ Retrieved microsoftsharepointteamservices header: 16.0.0.4681
16866+ Uncommon header 'sprequestguid' found, with contents: 1bb7f79e-a393-704f-ba15-aebc3b925f92
16867+ Uncommon header 'spiislatency' found, with contents: 1
16868+ Uncommon header 'microsoftsharepointteamservices' found, with contents: 16.0.0.4681
16869+ Uncommon header 'x-ms-invokeapp' found, with contents: 1; RequireReadOnly
16870+ Uncommon header 'sprequestduration' found, with contents: 75
16871+ Uncommon header 'request-id' found, with contents: 1bb7f79e-a393-704f-ba15-aebc3b925f92
16872+ Uncommon header 'x-sharepointhealthscore' found, with contents: 0
16873+ Root page / redirects to: http://212.138.117.248/ar/Pages/default.aspx
16874+ Uncommon header 'public-extension' found, with contents: http://schemas.microsoft.com/repl-2
16875+ Uncommon header 'sharepointerror' found, with contents: 0
16876+ OSVDB-68127: Server may be vulnerable to https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/MS10-070 (based on numeric calculation), thus allowing a cryptographic padding oracle. This vulnerabilty must be manually validated. See http://blog.gdssecurity.com/labs/2010/9/14/automated-padding-oracle-attacks-with-padbuster.html
16877+ Server banner has changed from '' to 'Microsoft-IIS/10.0' which may suggest a WAF, load balancer or proxy is in place
16878+ OSVDB-630: The web server may reveal its internal or real IP in the Location header via a request to / over HTTP/1.0. The value is "172.16.80.81".
16879+ ERROR: Error limit (20) reached for host, giving up. Last error: error reading HTTP response
16880+ Scan terminated: 20 error(s) and 12 item(s) reported on remote host
16881+ End Time: 2019-08-06 19:47:26 (GMT-4) (786 seconds)
16882--------------------------------------------------------------------------------------------------------------------------------------
16883#######################################################################################################################################
16884 Anonymous JTSEC #OpSaudiArabia Full Recon #4