· 6 years ago · Nov 24, 2019, 03:11 AM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.egm.gov.tr ISP Turkiye Cumhuriyeti Icisleri Bakanligi
4Continent Asia Flag
5TR
6Country Turkey Country Code TR
7Region Ankara Local time 24 Nov 2019 05:10 +03
8City Ankara Postal Code 06450
9IP Address 2.58.141.248 Latitude 39.921
10 Longitude 32.835
11=======================================================================================================================================
12#######################################################################################################################################
13> www.egm.gov.tr
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.egm.gov.tr
19Address: 2.58.141.248
20>
21
22#######################################################################################################################################
23** Domain Name: egm.gov.tr
24
25** Registrant:
26 Emniyet Genel Müdürlüğü Bilgi İşlem Dairesi
27 Emniyet Genel Müdürlüğü Bilgi İşlem Dairesi
28 Başkanlığı Necatibey Caddesi No:112 Anıttepe
29 Ankara,
30 Türkiye
31 bozkalp@egm.gov.tr
32 + 90-312-4124110-
33 + 90-312-2315508
34
35
36** Administrative Contact:
37NIC Handle : ebi90-metu
38Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
39Address : Hidden upon user request
40Phone : + 90-312-4624260-4260
41Fax : Hidden upon user request
42
43
44** Technical Contact:
45NIC Handle : ebi90-metu
46Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
47Address : Hidden upon user request
48Phone : + 90-312-4624260-4260
49Fax : Hidden upon user request
50
51
52** Billing Contact:
53NIC Handle : ebi90-metu
54Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
55Address : Hidden upon user request
56Phone : + 90-312-4624260-4260
57Fax : Hidden upon user request
58
59
60** Domain Servers:
61dns.egm.gov.tr 82.222.167.139
62dns1.egm.gov.tr 82.222.167.138
63dnsa.egm.gov.tr 82.222.167.163
64dnsb.egm.gov.tr 82.222.167.164
65
66** Additional Info:
67Created on..............: 1996-Apr-21.
68Expires on..............: 2021-Apr-20.
69#######################################################################################################################################
70[+] Target : www.egm.gov.tr
71
72[+] IP Address : 2.58.141.248
73
74[+] Headers :
75
76[+] Cache-Control : private, no-store, max-age=180, no-cache
77[+] Content-Type : text/html; charset=utf-8
78[+] Expires : Sun, 24 Nov 2019 02:18:41 GMT
79[+] Last-Modified : Sun, 24 Nov 2019 02:15:41 GMT
80[+] Vary : *
81[+] Server : Microsoft-IIS/10.0
82[+] Set-Cookie : ASP.NET_SessionId=ve3itc11kk033jx1ndebucp4; path=/; HttpOnly, NSC_ESNS=a2b37df2-e7b8-1dd9-9678-ba8b1843e7c4_0070291057_1888542467_00000000011319476782; Path=/; Expires=Sun, 24-Nov-2019 02:15:56 GMT
83[+] X-AspNetMvc-Version : 5.2
84[+] X-AspNet-Version : 4.0.30319
85[+] X-Powered-By : ASP.NET
86[+] Date : Sun, 24 Nov 2019 02:15:41 GMT
87[+] X-Via-NSCOPI : 1.0
88[+] Transfer-Encoding : chunked
89
90[+] SSL Certificate Information :
91
92[+] countryName : TR
93[+] postalCode : 06830
94[+] stateOrProvinceName : CANKAYA
95[+] localityName : ANKARA
96[+] streetAddress : Devlet Mah.İnönü Bulvarı No:2 Emniyet Genel Mudürlugu Bakanliklar
97[+] organizationName : Emniyet Genel Mudurlugu
98[+] organizationalUnitName : BTD
99[+] commonName : egm.gov.tr
100[+] countryName : GB
101[+] stateOrProvinceName : Greater Manchester
102[+] localityName : Salford
103[+] organizationName : COMODO CA Limited
104[+] commonName : COMODO RSA Organization Validation Secure Server CA
105[+] Version : 3
106[+] Serial Number : 7B0AE571DC5361F6A4D67A14258CAE14
107[+] Not Before : Apr 26 00:00:00 2019 GMT
108[+] Not After : Apr 25 23:59:59 2021 GMT
109[+] OCSP : ('http://ocsp.comodoca.com',)
110[+] subject Alt Name : (('DNS', 'egm.gov.tr'), ('DNS', 'www.egm.gov.tr'))
111[+] CA Issuers : ('http://crt.comodoca.com/COMODORSAOrganizationValidationSecureServerCA.crt',)
112[+] CRL Distribution Points : ('http://crl.comodoca.com/COMODORSAOrganizationValidationSecureServerCA.crl',)
113
114[+] Whois Lookup :
115
116[+] NIR : None
117[+] ASN Registry : ripencc
118[+] ASN : 209171
119[+] ASN CIDR : 2.58.141.0/24
120[+] ASN Country Code : TR
121[+] ASN Date : 2019-03-21
122[+] ASN Description : ICISLERI, TR
123[+] cidr : 2.58.140.0/22
124[+] name : TR-ICISLERI-20190321
125[+] handle : MOK24-RIPE
126[+] range : 2.58.140.0 - 2.58.143.255
127[+] description : None
128[+] country : TR
129[+] state : None
130[+] city : None
131[+] address : Devlet Mahallesi, ankaya/Ankara
13206580
133Ankara
134TURKEY
135[+] postal_code : None
136[+] emails : None
137[+] created : 2019-03-21T16:39:03Z
138[+] updated : 2019-03-21T16:39:03Z
139
140[+] Crawling Target...
141
142[+] Looking for robots.txt........[ Found ]
143[+] Extracting robots Links.......[ 5 ]
144[+] Looking for sitemap.xml.......[ Not Found ]
145[+] Extracting CSS Links..........[ 2 ]
146[+] Extracting Javascript Links...[ 6 ]
147[+] Extracting Internal Links.....[ 96 ]
148[+] Extracting External Links.....[ 35 ]
149[+] Extracting Images.............[ 15 ]
150
151[+] Total Links Extracted : 159
152
153[+] Dumping Links in /opt/FinalRecon/dumps/www.egm.gov.tr.dump
154[+] Completed!
155#######################################################################################################################################
156[i] Scanning Site: https://www.egm.gov.tr
157
158
159
160B A S I C I N F O
161====================
162
163
164[+] Site Title: T.C. İçişleri Bakanlığı Emniyet Genel Müdürlüğü
165[+] IP address: 2.58.141.248
166[+] Web Server: Microsoft-IIS/10.0
167[+] CMS: Could Not Detect
168[+] Cloudflare: Not Detected
169[+] Robots File: Found
170
171-------------[ contents ]----------------
172
173User-agent: *
174Disallow: /kullanicilar
175Disallow: /ortak_icerik
176Disallow: /kurumlar
177Disallow: /Kurumlar
178Disallow: /Kullanicilar
179-----------[end of contents]-------------
180
181
182
183W H O I S L O O K U P
184========================
185
186 ** Domain Name: egm.gov.tr
187
188** Registrant:
189 Emniyet Genel Müdürlüğü Bilgi İşlem Dairesi
190 Emniyet Genel Müdürlüğü Bilgi İşlem Dairesi
191 Başkanlığı Necatibey Caddesi No:112 Anıttepe
192 Ankara,
193 Türkiye
194 bozkalp@egm.gov.tr
195 + 90-312-4124110-
196 + 90-312-2315508
197
198
199** Administrative Contact:
200NIC Handle : ebi90-metu
201Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
202Address : Hidden upon user request
203Phone : + 90-312-4624260-4260
204Fax : Hidden upon user request
205
206
207** Technical Contact:
208NIC Handle : ebi90-metu
209Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
210Address : Hidden upon user request
211Phone : + 90-312-4624260-4260
212Fax : Hidden upon user request
213
214
215** Billing Contact:
216NIC Handle : ebi90-metu
217Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
218Address : Hidden upon user request
219Phone : + 90-312-4624260-4260
220Fax : Hidden upon user request
221
222
223** Domain Servers:
224dns.egm.gov.tr 82.222.167.139
225dns1.egm.gov.tr 82.222.167.138
226dnsa.egm.gov.tr 82.222.167.163
227dnsb.egm.gov.tr 82.222.167.164
228
229** Additional Info:
230Created on..............: 1996-Apr-21.
231Expires on..............: 2021-Apr-20.
232
233
234
235
236G E O I P L O O K U P
237=========================
238
239[i] IP Address: 2.58.141.248
240[i] Country: Turkey
241[i] State:
242[i] City:
243[i] Latitude: 41.0214
244[i] Longitude: 28.9948
245
246
247
248
249H T T P H E A D E R S
250=======================
251
252
253[i] HTTP/1.1 200 OK
254[i] Cache-Control: private, no-store, max-age=180
255[i] Content-Type: text/html; charset=utf-8
256[i] Expires: Sun, 24 Nov 2019 02:19:39 GMT
257[i] Last-Modified: Sun, 24 Nov 2019 02:16:39 GMT
258[i] Vary: *
259[i] Server: Microsoft-IIS/10.0
260[i] Set-Cookie: ASP.NET_SessionId=nrffa4qlrh5io3wjby0n3krh; path=/; HttpOnly
261[i] X-AspNetMvc-Version: 5.2
262[i] X-AspNet-Version: 4.0.30319
263[i] X-Powered-By: ASP.NET
264[i] Date: Sun, 24 Nov 2019 02:16:39 GMT
265[i] Connection: keep-alive
266[i] X-Via-NSCOPI: 1.0
267[i] Transfer-Encoding: chunked
268[i] Set-Cookie: NSC_ESNS=a28380bd-e7f2-1dd9-9678-ba8b1843e7c4_1109464254_0914427054_00000000007021286475; Path=/; Expires=Sun, 24-Nov-2019 02:16:54 GMT
269[i] Cache-Control: no-cache
270
271
272
273
274D N S L O O K U P
275===================
276
277egm.gov.tr. 3599 IN A 2.58.141.248
278egm.gov.tr. 3599 IN NS dnsa.egm.gov.tr.
279egm.gov.tr. 3599 IN NS dns.egm.gov.tr.
280egm.gov.tr. 3599 IN NS dnsb.egm.gov.tr.
281egm.gov.tr. 3599 IN NS dns1.egm.gov.tr.
282egm.gov.tr. 899 IN SOA dns.egm.gov.tr. admin.egm.gov.tr. 2006061397 1200 600 1209600 3600
283egm.gov.tr. 3599 IN MX 5 mx1.egm.gov.tr.
284egm.gov.tr. 3599 IN TXT "MS=ms96742347"
285egm.gov.tr. 3599 IN TXT "MS=ms77319551"
286egm.gov.tr. 3599 IN TXT "v=spf1 mx:egm.gov.tr ip4:82.222.167.177 ip4:82.222.167.151 -all"
287
288
289
290
291S U B N E T C A L C U L A T I O N
292====================================
293
294Address = 2.58.141.248
295Network = 2.58.141.248 / 32
296Netmask = 255.255.255.255
297Broadcast = not needed on Point-to-Point links
298Wildcard Mask = 0.0.0.0
299Hosts Bits = 0
300Max. Hosts = 1 (2^0 - 0)
301Host Range = { 2.58.141.248 - 2.58.141.248 }
302
303
304
305N M A P P O R T S C A N
306============================
307
308Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-24 02:16 UTC
309Nmap scan report for egm.gov.tr (2.58.141.248)
310Host is up (0.13s latency).
311
312PORT STATE SERVICE
31321/tcp filtered ftp
31422/tcp filtered ssh
31523/tcp filtered telnet
31680/tcp open http
317110/tcp filtered pop3
318143/tcp filtered imap
319443/tcp open https
3203389/tcp filtered ms-wbt-server
321
322Nmap done: 1 IP address (1 host up) scanned in 3.94 seconds
323
324
325
326S U B - D O M A I N F I N D E R
327==================================
328
329
330[i] Total Subdomains Found : 25
331
332[+] Subdomain: dns1.egm.gov.tr
333[-] IP: 82.222.167.138
334
335[+] Subdomain: mx1.egm.gov.tr
336[-] IP: 82.222.167.151
337
338[+] Subdomain: dns2.egm.gov.tr
339[-] IP: 212.175.37.101
340
341[+] Subdomain: arackiralama.egm.gov.tr
342[-] IP: 213.74.42.180
343
344[+] Subdomain: pa.egm.gov.tr
345[-] IP: 213.74.42.185
346
347[+] Subdomain: dnsa.egm.gov.tr
348[-] IP: 82.222.167.163
349
350[+] Subdomain: posta.egm.gov.tr
351[-] IP: 212.175.37.102
352
353[+] Subdomain: eposta.egm.gov.tr
354[-] IP: 82.222.167.177
355
356[+] Subdomain: dnsb.egm.gov.tr
357[-] IP: 82.222.167.164
358
359[+] Subdomain: lync.egm.gov.tr
360[-] IP: 82.222.167.169
361
362[+] Subdomain: bilgiedinme.egm.gov.tr
363[-] IP: 213.74.42.158
364
365[+] Subdomain: webconf.egm.gov.tr
366[-] IP: 213.74.42.167
367
368[+] Subdomain: ogg.egm.gov.tr
369[-] IP: 213.74.42.153
370
371[+] Subdomain: cocuk.egm.gov.tr
372[-] IP: 213.74.42.180
373
374[+] Subdomain: giykimbil.egm.gov.tr
375[-] IP: 213.74.42.157
376
377[+] Subdomain: m.egm.gov.tr
378[-] IP: 213.74.42.183
379
380[+] Subdomain: dialin.egm.gov.tr
381[-] IP: 82.222.167.169
382
383[+] Subdomain: webhostadmin.egm.gov.tr
384[-] IP: 213.74.42.181
385
386[+] Subdomain: pmyo.egm.gov.tr
387[-] IP: 193.255.217.30
388
389[+] Subdomain: onlineislemler.egm.gov.tr
390[-] IP: 213.74.42.141
391
392[+] Subdomain: kbs.egm.gov.tr
393[-] IP: 213.74.42.178
394
395[+] Subdomain: dns.egm.gov.tr
396[-] IP: 82.222.167.139
397
398[+] Subdomain: meet.egm.gov.tr
399[-] IP: 82.222.167.169
400
401[+] Subdomain: av.egm.gov.tr
402[-] IP: 82.222.167.168
403
404[+] Subdomain: www.egm.gov.tr
405[-] IP: 2.58.141.248
406######################################################################################################################################
407[+] Starting At 2019-11-23 21:17:00.821594
408[+] Collecting Information On: https://www.egm.gov.tr/
409[#] Status: 200
410--------------------------------------------------
411[#] Web Server Detected: Microsoft-IIS/10.0
412[#] X-Powered-By: ASP.NET
413[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
414- Cache-Control: private, no-store, max-age=180, no-cache
415- Content-Type: text/html; charset=utf-8
416- Expires: Sun, 24 Nov 2019 02:20:02 GMT
417- Last-Modified: Sun, 24 Nov 2019 02:17:02 GMT
418- Vary: *
419- Server: Microsoft-IIS/10.0
420- Set-Cookie: ASP.NET_SessionId=h3qcehhl34vtpgo1bd40555o; path=/; HttpOnly, NSC_ESNS=a291f360-e809-1dd9-9678-ba8b1843e7c4_1185092798_0839060654_00000000015611718918; Path=/; Expires=Sun, 24-Nov-2019 02:17:17 GMT
421- X-AspNetMvc-Version: 5.2
422- X-AspNet-Version: 4.0.30319
423- X-Powered-By: ASP.NET
424- Date: Sun, 24 Nov 2019 02:17:02 GMT
425- X-Via-NSCOPI: 1.0
426- Transfer-Encoding: chunked
427--------------------------------------------------
428[#] Finding Location..!
429[#] status: success
430[#] country: Turkey
431[#] countryCode: TR
432[#] region: 06
433[#] regionName: Ankara
434[#] city: Ankara
435[#] zip:
436[#] lat: 39.9146
437[#] lon: 32.852
438[#] timezone: Europe/Istanbul
439[#] isp: Icisleri Bakanligi
440[#] org: Turkiye Cumhuriyeti Icisleri Bakanligi
441[#] as: AS209171 Turkiye Cumhuriyeti Icisleri Bakanligi
442[#] query: 2.58.141.248
443--------------------------------------------------
444[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
445--------------------------------------------------
446[#] Starting Reverse DNS
447[-] Failed ! Fail
448--------------------------------------------------
449[!] Scanning Open Port
450[#] 80/tcp open http
451[#] 443/tcp open https
452--------------------------------------------------
453[+] Collecting Information Disclosure!
454[#] Detecting sitemap.xml file
455[-] sitemap.xml file not Found!?
456[#] Detecting robots.txt file
457[!] robots.txt File Found: https://www.egm.gov.tr//robots.txt
458[#] Detecting GNU Mailman
459[-] GNU Mailman App Not Detected!?
460--------------------------------------------------
461[+] Crawling Url Parameter On: https://www.egm.gov.tr/
462--------------------------------------------------
463[#] Searching Html Form !
464[-] No Html Form Found!?
465--------------------------------------------------
466[!] Found 47 dom parameter
467[#] https://www.egm.gov.tr//#MobileSearch
468[#] https://www.egm.gov.tr//#MobileSlideMenu
469[#] https://www.egm.gov.tr//#
470[#] https://www.egm.gov.tr//#
471[#] https://www.egm.gov.tr//#
472[#] https://www.egm.gov.tr//#
473[#] https://www.egm.gov.tr//#
474[#] https://www.egm.gov.tr//#
475[#] https://www.egm.gov.tr//#
476[#] https://www.egm.gov.tr//#
477[#] https://www.egm.gov.tr//#
478[#] https://www.egm.gov.tr//#
479[#] https://www.egm.gov.tr//#
480[#] https://www.egm.gov.tr//#
481[#] https://www.egm.gov.tr//#
482[#] https://www.egm.gov.tr//#
483[#] https://www.egm.gov.tr//#menu_132549
484[#] https://www.egm.gov.tr//#menu_132558
485[#] https://www.egm.gov.tr//#menu_132559
486[#] https://www.egm.gov.tr//#menu_132562
487[#] https://www.egm.gov.tr//#menu_132581
488[#] https://www.egm.gov.tr//#menu_133356
489[#] https://www.egm.gov.tr//#menu_133357
490[#] https://www.egm.gov.tr//#
491[#] https://www.egm.gov.tr//#menu_133372
492[#] https://www.egm.gov.tr//#menu_133359
493[#] https://www.egm.gov.tr//#menu_132573
494[#] https://www.egm.gov.tr//#menu_133196
495[#] https://www.egm.gov.tr//#
496[#] https://www.egm.gov.tr//#menu_132543
497[#] https://www.egm.gov.tr//#menu_132549
498[#] https://www.egm.gov.tr//#menu_132558
499[#] https://www.egm.gov.tr//#menu_132559
500[#] https://www.egm.gov.tr//#menu_132562
501[#] https://www.egm.gov.tr//#menu_132544
502[#] https://www.egm.gov.tr//#menu_132581
503[#] https://www.egm.gov.tr//#menu_133356
504[#] https://www.egm.gov.tr//#menu_133357
505[#] https://www.egm.gov.tr//#
506[#] https://www.egm.gov.tr//#menu_133372
507[#] https://www.egm.gov.tr//#menu_133359
508[#] https://www.egm.gov.tr//#menu_132573
509[#] https://www.egm.gov.tr//#menu_133196
510[#] https://www.egm.gov.tr//#
511[#] https://www.egm.gov.tr//#menu_132545
512[#] https://www.egm.gov.tr//#menu_132547
513[#] https://www.egm.gov.tr//#menu_132546
514--------------------------------------------------
515[!] 21 Internal Dynamic Parameter Discovered
516[+] https://www.egm.gov.tr///Icerik/css?v=OPZ4yxrNaPzWEKRih6_2ceq24FELJMoiJoh8-0CrrSQ1
517[+] https://www.egm.gov.tr///WebPart/FSlider-css?v=SJRMvymqPnaRCEOqH_dNJ2JF376Yd4quW7VnyaKtOLU1
518[+] https://www.egm.gov.tr///WebPart/EStickyNav-css?v=hM1SWF5aZEX5Ji--z03kdpVEv__H5ZKZy0UtofIWz181
519[+] https://www.egm.gov.tr///WebPart/EBirimLinkList-css?v=Nn1QuAhwTGWvkUXwtb9Rtzv8JUL2iqvCY5EIRwHnlUE1
520[+] https://www.egm.gov.tr///WebPart/HelpForm-css?v=lpRoLfy1AbjI7yJoXWDF8HXQ5Fqq6ncqi7ept6mEimk1
521[+] https://www.egm.gov.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
522[+] https://www.egm.gov.tr///WebPart/SliderNews-css?v=Mm1HEGI3OIMFeTkKqrHV0Jb8ddKVAuOKEw3m38xP2sg1
523[+] https://www.egm.gov.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
524[+] https://www.egm.gov.tr///WebPart/Announcement-css?v=zMCXj-GpusFlDIz6w2JkYLj1Lox2sj8bECSTUPNKVfM1
525[+] https://www.egm.gov.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
526[+] https://www.egm.gov.tr///WebPart/EDataCard-css?v=pkqyiqUYhhM-aJU5AVd4OkDltnWSnoJW-cFoHvcc9CY1
527[+] https://www.egm.gov.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
528[+] https://www.egm.gov.tr///WebPart/EDataLinkCard-css?v=xCOIMrwQw3G7jnXJ8mNVWWVOEoWq8QqwHKGbQdpe5oM1
529[+] https://www.egm.gov.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
530[+] https://www.egm.gov.tr///WebPart/ESliderCard-css?v=T9bPvhEjpYpgFM0MLFNR9ygV6lTayGd_ML0ihkvkvq41
531[+] https://www.egm.gov.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
532[+] https://www.egm.gov.tr///WebPart/EImageCard-css?v=kmrOmZ5ZIgr1njzS67uhLjNJTfU4EHDhc3r-URN89qA1
533[+] https://www.egm.gov.tr///WebPart/ESocialMediaTwitter-css?v=y2X2pquLvZLXXbPZxk0X6gTXWP81tHTt1I4DBsy94bs1
534[+] https://www.egm.gov.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
535[+] https://www.egm.gov.tr///WebPart/ELinkList-css?v=QWPpyzTBzwioa8nGhdfC0Sn_B_3HPEdEti8ORZr_6Uk1
536[+] https://www.egm.gov.tr///WebPart/ERadioCard-css?v=M8dHn_way17PkR6VsX37y59anP-OlX8VbMoABr1gPYQ1
537--------------------------------------------------
538[!] 8 External Dynamic Parameter Discovered
539[#] https://fonts.googleapis.com/css?family=Roboto&subset=latin-ext
540[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
541[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
542[#] https://www.cimer.gov.tr/?bim=CfDJ8CLd_u-3vtlEmchj_bWBwBeSpPMH0yB3kD8IbqZ5wQ-CgkoP9IRFfY2LyOrvyUSvzzHuD_qe3vqfrm4Js9ZBUwKQYTC8apZYw1Cz78uo6w3gZazQJ3CYiaIPXeXbpTu1uFF4IKuw9mUvpo5ynuO-KViWOfBWBqceEFfZuCfmmzTtE5chS7BNd-SHY0wzf_tIog
543[#] https://www.cimer.gov.tr/?bim=CfDJ8CLd_u-3vtlEmchj_bWBwBeSpPMH0yB3kD8IbqZ5wQ-CgkoP9IRFfY2LyOrvyUSvzzHuD_qe3vqfrm4Js9ZBUwKQYTC8apZYw1Cz78uo6w3gZazQJ3CYiaIPXeXbpTu1uFF4IKuw9mUvpo5ynuO-KViWOfBWBqceEFfZuCfmmzTtE5chS7BNd-SHY0wzf_tIog
544[#] https://play.google.com/store/apps/details?id=tr.gov.egm.polisradyosu
545[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
546[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
547--------------------------------------------------
548[!] 354 Internal links Discovered
549[+] https://www.egm.gov.tr///kurumlar/egm.gov.tr/Tasarım/favicon-egm-32.png
550[+] https://www.egm.gov.tr///Areas/WebPart/Contents/EHeader/css/EHeader.css
551[+] http://www.egm.gov.tr
552[+] http://www.egm.gov.tr
553[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas
554[+] https://www.egm.gov.tr////www.egm.gov.tr/hakkimizda
555[+] https://www.egm.gov.tr////www.egm.gov.tr/tarihce
556[+] https://www.egm.gov.tr////www.egm.gov.tr/genel-mudurlerimiz-2019
557[+] https://www.egm.gov.tr////www.egm.gov.tr/teskilat-semasi
558[+] https://www.egm.gov.tr////www.egm.gov.tr/bizi-taniyin
559[+] https://www.egm.gov.tr////www.egm.gov.tr/rutbeler
560[+] https://www.egm.gov.tr////www.egm.gov.tr/teftiskurulu
561[+] https://www.egm.gov.tr////www.egm.gov.tr/ozelguvenlikdenetleme
562[+] https://www.egm.gov.tr////www.egm.gov.tr/hukukmusavirligi
563[+] https://www.egm.gov.tr////www.egm.gov.tr/icdenetim
564[+] https://www.egm.gov.tr////www.egm.gov.tr/ozelharekat
565[+] https://www.egm.gov.tr////www.egm.gov.tr/daire-baskanliklari
566[+] https://www.egm.gov.tr////www.egm.gov.tr/il-emniyet-mudurlukleri
567[+] https://www.egm.gov.tr////www.egm.gov.tr/egitim-birimleri
568[+] https://www.egm.gov.tr////www.egm.gov.tr/digerbirimler
569[+] https://www.egm.gov.tr////www.egm.gov.tr/haberler
570[+] https://www.egm.gov.tr////www.egm.gov.tr/duyurular
571[+] https://www.egm.gov.tr////www.egm.gov.tr/sehitlerimiz
572[+] https://www.egm.gov.tr////www.egm.gov.tr/ataturk-ve-turk-polisi
573[+] https://www.egm.gov.tr////www.egm.gov.tr/dolandiricilik
574[+] https://www.egm.gov.tr////www.egm.gov.tr/narkotik-suclar
575[+] https://www.egm.gov.tr////www.egm.gov.tr/kacakcilik-ve-organize-suclar
576[+] https://www.egm.gov.tr////www.egm.gov.tr/sosyal-medya-dolandiriciligi
577[+] https://www.egm.gov.tr////www.egm.gov.tr/trafikte-hiz-ve-kaza-riski
578[+] https://www.egm.gov.tr////www.egm.gov.tr/vatandaslik-haklari
579[+] https://www.egm.gov.tr////www.egm.gov.tr/sikca-sorulan-sorular
580[+] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
581[+] https://onlineislemler.egm.gov.tr/Sayfalar/TrafikCezaSorgulama.aspx
582[+] https://onlineislemler.egm.gov.tr/Sayfalar/insanhaklari.aspx
583[+] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
584[+] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
585[+] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
586[+] https://www.egm.gov.tr////www.egm.gov.tr/bilgi-edinme
587[+] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
588[+] https://arackiralama.egm.gov.tr/
589[+] https://www.egm.gov.tr////www.egm.gov.tr/egm-mobil
590[+] https://www.egm.gov.tr////www.egm.gov.tr/kayip-alarmi
591[+] https://www.egm.gov.tr////www.egm.gov.tr/ozel-guvenlik-bilgi-sistemi
592[+] https://www.egm.gov.tr////www.egm.gov.tr/sosyalhizmetler
593[+] https://www.egm.gov.tr////www.egm.gov.tr/kayip-sahiscocuklar-hakkinda-bilgi-almak-istiyorum
594[+] https://www.egm.gov.tr////www.egm.gov.tr/yabanciyim-ikametgah-ve-seyahat-haklarimla-ilgili-bilgi-almak-istiyorum
595[+] https://www.egm.gov.tr////www.egm.gov.tr/silah-ruhsati-islemleri-hakkinda-bilinmesi-gerekenler
596[+] https://www.egm.gov.tr////www.egm.gov.tr/silah-ruhsati-islemleri-hakkinda-sikca-sorulan-sorular
597[+] https://www.egm.gov.tr////www.egm.gov.tr/trafik-cezalari-hakkinda-bilgi-almak-istiyorum
598[+] https://www.egm.gov.tr////www.egm.gov.tr/terorden-arananlar-hakkinda-bilgi-almak-istiyorum
599[+] https://www.egm.gov.tr////www.egm.gov.tr/trafik-tescil-hizmetleri-hakkinda-bilgi-almak-istiyorum
600[+] https://www.egm.gov.tr/strateji/strateji-faaliyetleri
601[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurlugu
602[+] https://www.egm.gov.tr////www.egm.gov.tr/il-emniyet-mudurlukleri
603[+] https://www.egm.gov.tr////www.egm.gov.tr/en-yakin-polis-merkezi
604[+] https://www.egm.gov.tr//javascript:void(0);
605[+] https://www.egm.gov.tr//javascript:void(0);
606[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas
607[+] https://www.egm.gov.tr////www.egm.gov.tr/hakkimizda
608[+] https://www.egm.gov.tr////www.egm.gov.tr/tarihce
609[+] https://www.egm.gov.tr////www.egm.gov.tr/genel-mudurlerimiz-2019
610[+] https://www.egm.gov.tr////www.egm.gov.tr/teskilat-semasi
611[+] https://www.egm.gov.tr////www.egm.gov.tr/bizi-taniyin
612[+] https://www.egm.gov.tr////www.egm.gov.tr/rutbeler
613[+] https://www.egm.gov.tr////www.egm.gov.tr/teftiskurulu
614[+] https://www.egm.gov.tr////www.egm.gov.tr/ozelguvenlikdenetleme
615[+] https://www.egm.gov.tr////www.egm.gov.tr/hukukmusavirligi
616[+] https://www.egm.gov.tr////www.egm.gov.tr/icdenetim
617[+] https://www.egm.gov.tr////www.egm.gov.tr/ozelharekat
618[+] https://www.egm.gov.tr////www.egm.gov.tr/daire-baskanliklari
619[+] https://www.egm.gov.tr////www.egm.gov.tr/il-emniyet-mudurlukleri
620[+] https://www.egm.gov.tr////www.egm.gov.tr/egitim-birimleri
621[+] https://www.egm.gov.tr////www.egm.gov.tr/digerbirimler
622[+] https://www.egm.gov.tr////www.egm.gov.tr/haberler
623[+] https://www.egm.gov.tr////www.egm.gov.tr/duyurular
624[+] https://www.egm.gov.tr////www.egm.gov.tr/sehitlerimiz
625[+] https://www.egm.gov.tr////www.egm.gov.tr/ataturk-ve-turk-polisi
626[+] https://www.egm.gov.tr////www.egm.gov.tr/dolandiricilik
627[+] https://www.egm.gov.tr////www.egm.gov.tr/yagma
628[+] https://www.egm.gov.tr////www.egm.gov.tr/hirsizlik
629[+] https://www.egm.gov.tr////www.egm.gov.tr/oto-hirsizligi
630[+] https://www.egm.gov.tr////www.egm.gov.tr/yankesicilik
631[+] https://www.egm.gov.tr////www.egm.gov.tr/atm-dolandiriciligi
632[+] https://www.egm.gov.tr////www.egm.gov.tr/evlenme-vaadiyle-dolandiricilik
633[+] https://www.egm.gov.tr////www.egm.gov.tr/sahtecilik-suclari
634[+] https://www.egm.gov.tr////www.egm.gov.tr/narkotik-suclar
635[+] https://www.egm.gov.tr////www.egm.gov.tr/ekonomik-suclar
636[+] https://www.egm.gov.tr////www.egm.gov.tr/insan-ticareti
637[+] https://www.egm.gov.tr////www.egm.gov.tr/mali-suc-ve-suc-gelirleriyle-mucadele
638[+] https://www.egm.gov.tr////www.egm.gov.tr/sosyal-medya-dolandiriciligi
639[+] https://www.egm.gov.tr////www.egm.gov.tr/psiko---teknik-degerlendirme
640[+] https://www.egm.gov.tr////www.egm.gov.tr/hava-yastigi
641[+] https://www.egm.gov.tr////www.egm.gov.tr/cocuk-koltugu-kullanimi
642[+] https://www.egm.gov.tr////www.egm.gov.tr/trafik-denetimleri
643[+] https://www.egm.gov.tr////www.egm.gov.tr/guvenli-surus-teknikleri
644[+] https://www.egm.gov.tr////www.egm.gov.tr/yaya-gecitleri
645[+] https://www.egm.gov.tr////www.egm.gov.tr/alkollu-arac-kullanimi
646[+] https://www.egm.gov.tr////www.egm.gov.tr/cep-telefonu-kullanimi
647[+] https://www.egm.gov.tr////www.egm.gov.tr/uykusuz-ve-yorgun-arac-kullanimi
648[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-kemeri-kullanimi
649[+] https://www.egm.gov.tr////www.egm.gov.tr/ceza-puani-uygulama
650[+] https://www.egm.gov.tr////www.egm.gov.tr/trafikte-hiz-ve-kaza-riski
651[+] https://www.egm.gov.tr////www.egm.gov.tr/ocak
652[+] https://www.egm.gov.tr////www.egm.gov.tr/subat
653[+] https://www.egm.gov.tr////www.egm.gov.tr/mart
654[+] https://www.egm.gov.tr/nisan
655[+] https://egm.gov.tr/mayis
656[+] https://www.egm.gov.tr////www.egm.gov.tr/temmuz
657[+] https://www.egm.gov.tr////www.egm.gov.tr/agustos
658[+] https://www.egm.gov.tr////www.egm.gov.tr/vatandaslik-haklari
659[+] https://www.egm.gov.tr////www.egm.gov.tr/sikca-sorulan-sorular
660[+] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
661[+] https://onlineislemler.egm.gov.tr/Sayfalar/TrafikCezaSorgulama.aspx
662[+] https://onlineislemler.egm.gov.tr/Sayfalar/insanhaklari.aspx
663[+] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
664[+] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
665[+] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
666[+] https://www.egm.gov.tr////www.egm.gov.tr/bilgi-edinme
667[+] https://www.egm.gov.tr////www.egm.gov.tr/egm-mobil
668[+] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
669[+] https://www.egm.gov.tr////www.egm.gov.tr/kayip-alarmi
670[+] https://arackiralama.egm.gov.tr/
671[+] https://www.egm.gov.tr////www.egm.gov.tr/ozel-guvenlik-bilgi-sistemi
672[+] https://www.egm.gov.tr////www.egm.gov.tr/sosyalhizmetler
673[+] https://www.egm.gov.tr////www.egm.gov.tr/kayip-sahiscocuklar-hakkinda-bilgi-almak-istiyorum
674[+] https://www.egm.gov.tr////www.egm.gov.tr/yabanciyim-ikametgah-ve-seyahat-haklarimla-ilgili-bilgi-almak-istiyorum
675[+] https://www.egm.gov.tr////www.egm.gov.tr/silah-ruhsati-islemleri-hakkinda-bilinmesi-gerekenler
676[+] https://www.egm.gov.tr////www.egm.gov.tr/silah-ruhsati-islemleri-hakkinda-sikca-sorulan-sorular
677[+] https://www.egm.gov.tr////www.egm.gov.tr/trafik-cezalari-hakkinda-bilgi-almak-istiyorum
678[+] https://www.egm.gov.tr////www.egm.gov.tr/terorden-arananlar-hakkinda-bilgi-almak-istiyorum
679[+] https://www.egm.gov.tr////www.egm.gov.tr/trafik-tescil-hizmetleri-hakkinda-bilgi-almak-istiyorum
680[+] https://www.egm.gov.tr/strateji/strateji-faaliyetleri
681[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurlugu
682[+] https://www.egm.gov.tr////www.egm.gov.tr/il-emniyet-mudurlukleri
683[+] https://www.egm.gov.tr////www.egm.gov.tr/en-yakin-polis-merkezi
684[+] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
685[+] https://www.egm.gov.tr///en-yakin-polis-merkezi
686[+] https://onlineislemler.egm.gov.tr/Sayfalar/default.aspx
687[+] http://www.egm.gov.tr/tem
688[+] https://www.egm.gov.tr//javascript:void(0);
689[+] https://www.egm.gov.tr///haberler
690[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-muduru-sayin-mehmet-aktasin-24-kasim-ogretmenler-gunu-mesaji
691[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-manisada-sehitligi-ziyaret-etti
692[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-manisa-il-emniyet-mudurlugu-ve-il-jandarma-komutanligini-ziyaret-etti
693[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-manisa-valiligini-ziyaret-etti
694[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-balikesir-valiligini-ve-balikesir-il-emniyet-mudurlugunu-ziyaret-etti
695[+] https://www.egm.gov.tr////www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-canakkalede-bir-dizi-ziyaret-gerceklestirdi
696[+] https://www.egm.gov.tr///duyurular
697[+] https://www.egm.gov.tr////www.egm.gov.tr/2019-1-donem-2828-sayili-sosyal-hizmetler-kanunu-kapsaminda-emniyet-genel-mudurlugu-kadrolarina-yerlestirmesi-yapilan-adaylardan-istenilen-belgeler
698[+] https://www.egm.gov.tr////www.egm.gov.tr/2018-6-donem-kadrolu-hizmetli-alimi-sozlu-veveya-uygulamali-sinav-sonucu-yedek-aday-planlamasi
699[+] https://www.egm.gov.tr////www.egm.gov.tr/2018-7-donem-sozlesmeli-avukat-alimi-sozlu-veveya-uygulamali-sinav-sonucu
700[+] https://www.egm.gov.tr////www.egm.gov.tr/2018-8donem-sozlesmeli-ucak-pilotu-alimi-sozlu-veveya-uygulamali-sinav-sonucu
701[+] https://www.egm.gov.tr////www.egm.gov.tr/egm-internet-sitemiz-yenilendi
702[+] https://www.egm.gov.tr////www.egm.gov.tr/2019-1-donem-2828-sayili-sosyal-hizmetler-kanunu-kapsaminda-emniyet-genel-mudurlugu-kadrolarina-yerlestirmesi-yapilan-adaylardan-istenilen-belgeler
703[+] https://www.egm.gov.tr////www.egm.gov.tr/2018-6-donem-kadrolu-hizmetli-alimi-sozlu-veveya-uygulamali-sinav-sonucu-yedek-aday-planlamasi
704[+] https://www.egm.gov.tr////www.egm.gov.tr/2018-7-donem-sozlesmeli-avukat-alimi-sozlu-veveya-uygulamali-sinav-sonucu
705[+] https://www.egm.gov.tr////www.egm.gov.tr/2018-8donem-sozlesmeli-ucak-pilotu-alimi-sozlu-veveya-uygulamali-sinav-sonucu
706[+] https://www.egm.gov.tr////www.egm.gov.tr/egm-internet-sitemiz-yenilendi
707[+] https://www.egm.gov.tr///agustos
708[+] https://www.egm.gov.tr///asayis-suclari
709[+] https://www.egm.gov.tr///trafik-kural-ihlalleri
710[+] https://www.egm.gov.tr///kacakcilik-ve-organize-suclar
711[+] https://www.egm.gov.tr///narkotik-suclar
712[+] https://www.egm.gov.tr//javascript:void(0);
713[+] https://www.egm.gov.tr///asayis-suclari
714[+] https://www.egm.gov.tr///trafik-kural-ihlalleri
715[+] https://www.egm.gov.tr///kacakcilik-ve-organize-suclar
716[+] https://www.egm.gov.tr///narkotik-suclar
717[+] https://www.egm.gov.tr///bizi-taniyin
718[+] https://www.egm.gov.tr////www.egm.gov.tr/genel-polis-hizmetleri
719[+] https://www.egm.gov.tr////www.egm.gov.tr/trafik-polisi
720[+] https://www.egm.gov.tr////www.egm.gov.tr/deniz-polisi
721[+] https://www.egm.gov.tr////www.egm.gov.tr/cevik-kuvvet
722[+] https://www.egm.gov.tr////www.egm.gov.tr/motosikletli-polis-timleri
723[+] https://www.egm.gov.tr////www.egm.gov.tr/cocuk-polisi
724[+] https://www.egm.gov.tr////www.egm.gov.tr/toplum-destekli-polislik
725[+] https://www.egm.gov.tr////www.egm.gov.tr/bisikletli-polis-timleri
726[+] https://www.egm.gov.tr////www.egm.gov.tr/ozel-harekat-polisi
727[+] https://www.egm.gov.tr////www.egm.gov.tr/polis-merkezi-amirligi
728[+] https://www.egm.gov.tr////www.egm.gov.tr/bomba-imha-polisi
729[+] https://www.egm.gov.tr////www.egm.gov.tr/narkotim
730[+] https://www.egm.gov.tr////www.egm.gov.tr/terorle-mucadele
731[+] https://www.egm.gov.tr////www.egm.gov.tr/kacakcilik-ve-organize-suclarla-mucadele
732[+] https://www.egm.gov.tr//" target=
733[+] https://www.egm.gov.tr//" target=
734[+] https://www.egm.gov.tr//" target=
735[+] https://www.egm.gov.tr//" target=
736[+] https://www.egm.gov.tr//" target=
737[+] https://www.egm.gov.tr//" target=
738[+] https://www.egm.gov.tr//" target=
739[+] https://www.egm.gov.tr//" target=
740[+] https://www.egm.gov.tr///sehitlerimiz
741[+] https://www.egm.gov.tr///kayip-alarmi
742[+] https://eposta.egm.gov.tr/owa/
743[+] https://www.egm.gov.tr///sehitlerimiz
744[+] https://www.egm.gov.tr///kayip-alarmi
745[+] https://eposta.egm.gov.tr/owa/
746[+] https://www.egm.gov.tr///Areas/WebPart/Contents/EFooter/css/EFooter.css
747[+] https://www.egm.gov.tr///emniyet-genel-mudurumuz-sayin-mehmet-aktas
748[+] https://www.egm.gov.tr///hakkimizda
749[+] https://www.egm.gov.tr///tarihce
750[+] https://www.egm.gov.tr///genel-mudurlerimiz-2019
751[+] https://www.egm.gov.tr///teskilat-semasi
752[+] https://www.egm.gov.tr///bizi-taniyin
753[+] https://www.egm.gov.tr///rutbeler
754[+] https://www.egm.gov.tr///teftiskurulu
755[+] https://www.egm.gov.tr///ozelguvenlikdenetleme
756[+] https://www.egm.gov.tr///hukukmusavirligi
757[+] https://www.egm.gov.tr///icdenetim
758[+] https://www.egm.gov.tr///ozelharekat
759[+] https://www.egm.gov.tr///daire-baskanliklari
760[+] https://www.egm.gov.tr///il-emniyet-mudurlukleri
761[+] https://www.egm.gov.tr///egitim-birimleri
762[+] https://www.egm.gov.tr///digerbirimler
763[+] https://www.egm.gov.tr///haberler
764[+] https://www.egm.gov.tr///duyurular
765[+] https://www.egm.gov.tr///sehitlerimiz
766[+] https://www.egm.gov.tr///ataturk-ve-turk-polisi
767[+] https://www.egm.gov.tr///dolandiricilik
768[+] https://www.egm.gov.tr///yagma
769[+] https://www.egm.gov.tr///hirsizlik
770[+] https://www.egm.gov.tr///oto-hirsizligi
771[+] https://www.egm.gov.tr///yankesicilik
772[+] https://www.egm.gov.tr///atm-dolandiriciligi
773[+] https://www.egm.gov.tr///evlenme-vaadiyle-dolandiricilik
774[+] https://www.egm.gov.tr///sahtecilik-suclari
775[+] https://www.egm.gov.tr///narkotik-suclar
776[+] https://www.egm.gov.tr///ekonomik-suclar
777[+] https://www.egm.gov.tr///insan-ticareti
778[+] https://www.egm.gov.tr///mali-suc-ve-suc-gelirleriyle-mucadele
779[+] https://www.egm.gov.tr///sosyal-medya-dolandiriciligi
780[+] https://www.egm.gov.tr///psiko---teknik-degerlendirme
781[+] https://www.egm.gov.tr///hava-yastigi
782[+] https://www.egm.gov.tr///cocuk-koltugu-kullanimi
783[+] https://www.egm.gov.tr///trafik-denetimleri
784[+] https://www.egm.gov.tr///guvenli-surus-teknikleri
785[+] https://www.egm.gov.tr///yaya-gecitleri
786[+] https://www.egm.gov.tr///alkollu-arac-kullanimi
787[+] https://www.egm.gov.tr///cep-telefonu-kullanimi
788[+] https://www.egm.gov.tr///uykusuz-ve-yorgun-arac-kullanimi
789[+] https://www.egm.gov.tr///emniyet-kemeri-kullanimi
790[+] https://www.egm.gov.tr///ceza-puani-uygulama
791[+] https://www.egm.gov.tr///trafikte-hiz-ve-kaza-riski
792[+] https://www.egm.gov.tr///ocak
793[+] https://www.egm.gov.tr///subat
794[+] https://www.egm.gov.tr///mart
795[+] https://www.egm.gov.tr/nisan
796[+] https://egm.gov.tr/mayis
797[+] https://www.egm.gov.tr///temmuz
798[+] https://www.egm.gov.tr///agustos
799[+] https://www.egm.gov.tr///vatandaslik-haklari
800[+] https://www.egm.gov.tr///sikca-sorulan-sorular
801[+] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
802[+] https://onlineislemler.egm.gov.tr/Sayfalar/TrafikCezaSorgulama.aspx
803[+] https://onlineislemler.egm.gov.tr/Sayfalar/insanhaklari.aspx
804[+] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
805[+] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
806[+] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
807[+] https://www.egm.gov.tr///bilgi-edinme
808[+] https://www.egm.gov.tr///egm-mobil
809[+] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
810[+] https://www.egm.gov.tr///kayip-alarmi
811[+] https://arackiralama.egm.gov.tr/
812[+] https://www.egm.gov.tr///ozel-guvenlik-bilgi-sistemi
813[+] https://www.egm.gov.tr///sosyalhizmetler
814[+] https://www.egm.gov.tr///kayip-sahiscocuklar-hakkinda-bilgi-almak-istiyorum
815[+] https://www.egm.gov.tr///yabanciyim-ikametgah-ve-seyahat-haklarimla-ilgili-bilgi-almak-istiyorum
816[+] https://www.egm.gov.tr///silah-ruhsati-islemleri-hakkinda-bilinmesi-gerekenler
817[+] https://www.egm.gov.tr///silah-ruhsati-islemleri-hakkinda-sikca-sorulan-sorular
818[+] https://www.egm.gov.tr///trafik-cezalari-hakkinda-bilgi-almak-istiyorum
819[+] https://www.egm.gov.tr///terorden-arananlar-hakkinda-bilgi-almak-istiyorum
820[+] https://www.egm.gov.tr///trafik-tescil-hizmetleri-hakkinda-bilgi-almak-istiyorum
821[+] https://www.egm.gov.tr/strateji/strateji-faaliyetleri
822[+] https://www.egm.gov.tr///emniyet-genel-mudurlugu
823[+] https://www.egm.gov.tr///il-emniyet-mudurlukleri
824[+] https://www.egm.gov.tr///en-yakin-polis-merkezi
825[+] https://www.egm.gov.tr///emniyet-genel-mudurumuz-sayin-mehmet-aktas
826[+] https://www.egm.gov.tr///hakkimizda
827[+] https://www.egm.gov.tr///tarihce
828[+] https://www.egm.gov.tr///genel-mudurlerimiz-2019
829[+] https://www.egm.gov.tr///teskilat-semasi
830[+] https://www.egm.gov.tr///bizi-taniyin
831[+] https://www.egm.gov.tr///rutbeler
832[+] https://www.egm.gov.tr///teftiskurulu
833[+] https://www.egm.gov.tr///ozelguvenlikdenetleme
834[+] https://www.egm.gov.tr///hukukmusavirligi
835[+] https://www.egm.gov.tr///icdenetim
836[+] https://www.egm.gov.tr///ozelharekat
837[+] https://www.egm.gov.tr///daire-baskanliklari
838[+] https://www.egm.gov.tr///il-emniyet-mudurlukleri
839[+] https://www.egm.gov.tr///egitim-birimleri
840[+] https://www.egm.gov.tr///digerbirimler
841[+] https://www.egm.gov.tr///haberler
842[+] https://www.egm.gov.tr///duyurular
843[+] https://www.egm.gov.tr///sehitlerimiz
844[+] https://www.egm.gov.tr///ataturk-ve-turk-polisi
845[+] https://www.egm.gov.tr///dolandiricilik
846[+] https://www.egm.gov.tr///yagma
847[+] https://www.egm.gov.tr///hirsizlik
848[+] https://www.egm.gov.tr///oto-hirsizligi
849[+] https://www.egm.gov.tr///yankesicilik
850[+] https://www.egm.gov.tr///atm-dolandiriciligi
851[+] https://www.egm.gov.tr///evlenme-vaadiyle-dolandiricilik
852[+] https://www.egm.gov.tr///sahtecilik-suclari
853[+] https://www.egm.gov.tr///narkotik-suclar
854[+] https://www.egm.gov.tr///ekonomik-suclar
855[+] https://www.egm.gov.tr///insan-ticareti
856[+] https://www.egm.gov.tr///mali-suc-ve-suc-gelirleriyle-mucadele
857[+] https://www.egm.gov.tr///sosyal-medya-dolandiriciligi
858[+] https://www.egm.gov.tr///psiko---teknik-degerlendirme
859[+] https://www.egm.gov.tr///hava-yastigi
860[+] https://www.egm.gov.tr///cocuk-koltugu-kullanimi
861[+] https://www.egm.gov.tr///trafik-denetimleri
862[+] https://www.egm.gov.tr///guvenli-surus-teknikleri
863[+] https://www.egm.gov.tr///yaya-gecitleri
864[+] https://www.egm.gov.tr///alkollu-arac-kullanimi
865[+] https://www.egm.gov.tr///cep-telefonu-kullanimi
866[+] https://www.egm.gov.tr///uykusuz-ve-yorgun-arac-kullanimi
867[+] https://www.egm.gov.tr///emniyet-kemeri-kullanimi
868[+] https://www.egm.gov.tr///ceza-puani-uygulama
869[+] https://www.egm.gov.tr///trafikte-hiz-ve-kaza-riski
870[+] https://www.egm.gov.tr///ocak
871[+] https://www.egm.gov.tr///subat
872[+] https://www.egm.gov.tr///mart
873[+] https://www.egm.gov.tr/nisan
874[+] https://egm.gov.tr/mayis
875[+] https://www.egm.gov.tr///temmuz
876[+] https://www.egm.gov.tr///agustos
877[+] https://www.egm.gov.tr///vatandaslik-haklari
878[+] https://www.egm.gov.tr///sikca-sorulan-sorular
879[+] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
880[+] https://onlineislemler.egm.gov.tr/Sayfalar/TrafikCezaSorgulama.aspx
881[+] https://onlineislemler.egm.gov.tr/Sayfalar/insanhaklari.aspx
882[+] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
883[+] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
884[+] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
885[+] https://www.egm.gov.tr///bilgi-edinme
886[+] https://www.egm.gov.tr///egm-mobil
887[+] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
888[+] https://www.egm.gov.tr///kayip-alarmi
889[+] https://arackiralama.egm.gov.tr/
890[+] https://www.egm.gov.tr///ozel-guvenlik-bilgi-sistemi
891[+] https://www.egm.gov.tr///sosyalhizmetler
892[+] https://www.egm.gov.tr///kayip-sahiscocuklar-hakkinda-bilgi-almak-istiyorum
893[+] https://www.egm.gov.tr///yabanciyim-ikametgah-ve-seyahat-haklarimla-ilgili-bilgi-almak-istiyorum
894[+] https://www.egm.gov.tr///silah-ruhsati-islemleri-hakkinda-bilinmesi-gerekenler
895[+] https://www.egm.gov.tr///silah-ruhsati-islemleri-hakkinda-sikca-sorulan-sorular
896[+] https://www.egm.gov.tr///trafik-cezalari-hakkinda-bilgi-almak-istiyorum
897[+] https://www.egm.gov.tr///terorden-arananlar-hakkinda-bilgi-almak-istiyorum
898[+] https://www.egm.gov.tr///trafik-tescil-hizmetleri-hakkinda-bilgi-almak-istiyorum
899[+] https://www.egm.gov.tr/strateji/strateji-faaliyetleri
900[+] https://www.egm.gov.tr///emniyet-genel-mudurlugu
901[+] https://www.egm.gov.tr///il-emniyet-mudurlukleri
902[+] https://www.egm.gov.tr///en-yakin-polis-merkezi
903--------------------------------------------------
904[!] 43 External links Discovered
905[#] https://www.turkiye.gov.tr/
906[#] https://www.icisleri.gov.tr/
907[#] https://polisdergisi.pa.edu.tr/
908[#] http://www.polisradyosu.pol.tr/Sayfalar/default.aspx
909[#] http://www.pa.edu.tr/kitaplar.html
910[#] https://www.pa.edu.tr/polis-muzesi.html
911[#] https://www.nvi.gov.tr/
912[#] https://polisdergisi.pa.edu.tr/
913[#] http://www.polisradyosu.pol.tr/Sayfalar/default.aspx
914[#] http://www.pa.edu.tr/kitaplar.html
915[#] https://www.pa.edu.tr/polis-muzesi.html
916[#] https://www.nvi.gov.tr/
917[#] http://www.asayis.pol.tr
918[#] http://www.narkotik.pol.tr
919[#] http://www.trafik.gov.tr
920[#] https://www.pa.edu.tr
921[#] https://twitter.com/EmniyetGM
922[#] https://www.instagram.com/emniyetgm
923[#] https://www.youtube.com/channel/UCXVqkvoXzIccoi1j5pYFJHw
924[#] https://www.facebook.com/EmniyetGM
925[#] http://www.jandarma.gov.tr/
926[#] https://www.sg.gov.tr/
927[#] http://www.goc.gov.tr/
928[#] https://www.afad.gov.tr/
929[#] https://www.polsan.com.tr/
930[#] http://www.terorarananlar.pol.tr/Sayfalar/default.aspx
931[#] http://www.jandarma.gov.tr/
932[#] https://www.sg.gov.tr/
933[#] http://www.goc.gov.tr/
934[#] https://www.afad.gov.tr/
935[#] https://www.polsan.com.tr/
936[#] http://www.terorarananlar.pol.tr/Sayfalar/default.aspx
937[#] http://www.polisradyosu.pol.tr/Sayfalar/default.aspx
938[#] https://polisdergisi.pa.edu.tr/
939[#] http://www.polisradyosu.pol.tr/Sayfalar/default.aspx
940[#] http://www.pa.edu.tr/kitaplar.html
941[#] https://www.pa.edu.tr/polis-muzesi.html
942[#] https://www.nvi.gov.tr/
943[#] https://polisdergisi.pa.edu.tr/
944[#] http://www.polisradyosu.pol.tr/Sayfalar/default.aspx
945[#] http://www.pa.edu.tr/kitaplar.html
946[#] https://www.pa.edu.tr/polis-muzesi.html
947[#] https://www.nvi.gov.tr/
948--------------------------------------------------
949[#] Mapping Subdomain..
950[!] Found 26 Subdomain
951- egm.gov.tr
952- dns1.egm.gov.tr
953- mx1.egm.gov.tr
954- dns2.egm.gov.tr
955- arackiralama.egm.gov.tr
956- pa.egm.gov.tr
957- dnsa.egm.gov.tr
958- posta.egm.gov.tr
959- eposta.egm.gov.tr
960- dnsb.egm.gov.tr
961- lync.egm.gov.tr
962- bilgiedinme.egm.gov.tr
963- webconf.egm.gov.tr
964- ogg.egm.gov.tr
965- cocuk.egm.gov.tr
966- giykimbil.egm.gov.tr
967- m.egm.gov.tr
968- dialin.egm.gov.tr
969- webhostadmin.egm.gov.tr
970- pmyo.egm.gov.tr
971- onlineislemler.egm.gov.tr
972- kbs.egm.gov.tr
973- dns.egm.gov.tr
974- meet.egm.gov.tr
975- av.egm.gov.tr
976- www.egm.gov.tr
977--------------------------------------------------
978[!] Done At 2019-11-23 21:24:35.910522
979#######################################################################################################################################
980[INFO] ------TARGET info------
981[*] TARGET: https://www.egm.gov.tr/
982[*] TARGET IP: 2.58.141.248
983[INFO] NO load balancer detected for www.egm.gov.tr...
984[*] DNS servers: dns.egm.gov.tr.
985[*] TARGET server: Microsoft-IIS/10.0
986[*] CC: TR
987[*] Country: Turkey
988[*] RegionCode: 06
989[*] RegionName: Ankara
990[*] City: Ankara
991[*] ASN: AS209171
992[*] BGP_PREFIX: 2.58.141.0/24
993[*] ISP: icisleri Turkiye Cumhuriyeti Icisleri Bakanligi, TR
994[INFO] SSL/HTTPS certificate detected
995[*] Issuer: issuer=C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Organization Validation Secure Server CA
996[*] Subject: subject=C = TR, postalCode = 06830, ST = CANKAYA, L = ANKARA, street = Devlet Mah.\C4\B0n\C3\B6n\C3\BC Bulvar\C4\B1 No:2 Emniyet Genel Mud\C3\BCrlugu Bakanliklar, O = Emniyet Genel Mudurlugu, OU = BTD, CN = egm.gov.tr
997[INFO] DNS enumeration:
998[*] m.egm.gov.tr 213.74.42.183
999[*] webconf.egm.gov.tr 82.222.167.175 213.74.42.167
1000[INFO] Possible abuse mails are:
1001[*] abuse@egm.gov.tr
1002[*] abuse@www.egm.gov.tr
1003[*] bilisimaglari@icisleri.gov.tr
1004[INFO] NO PAC (Proxy Auto Configuration) file FOUND
1005[INFO] Starting FUZZing in http://www.egm.gov.tr/FUzZzZzZzZz...
1006[INFO] Status code Folders
1007[INFO] NO passwords found in source code
1008[INFO] SAME content in http://www.egm.gov.tr/ AND http://2.58.141.248/
1009[INFO] Links found from https://www.egm.gov.tr/:
1010[*] https://arackiralama.egm.gov.tr/
1011[*] https://egm.gov.tr/mayis
1012[*] https://eposta.egm.gov.tr/owa/
1013[*] https://onlineislemler.egm.gov.tr/Sayfalar/default.aspx
1014[*] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
1015[*] https://onlineislemler.egm.gov.tr/Sayfalar/insanhaklari.aspx
1016[*] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
1017[*] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
1018[*] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
1019[*] https://onlineislemler.egm.gov.tr/Sayfalar/TrafikCezaSorgulama.aspx
1020[*] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
1021[*] https://play.google.com/store/apps/details?id=tr.gov.egm.polisradyosu
1022[*] https://polisdergisi.pa.edu.tr/
1023[*] https://twitter.com/EmniyetGM
1024[*] https://www.afad.gov.tr/
1025[*] https://www.cimer.gov.tr/?bim=CfDJ8CLd_u-3vtlEmchj_bWBwBeSpPMH0yB3kD8IbqZ5wQ-CgkoP9IRFfY2LyOrvyUSvzzHuD_qe3vqfrm4Js9ZBUwKQYTC8apZYw1Cz78uo6w3gZazQJ3CYiaIPXeXbpTu1uFF4IKuw9mUvpo5ynuO-KViWOfBWBqceEFfZuCfmmzTtE5chS7BNd-SHY0wzf_tIog
1026[*] https://www.egm.gov.tr/
1027[*] https://www.egm.gov.tr/2018-6-donem-kadrolu-hizmetli-alimi-sozlu-veveya-uygulamali-sinav-sonucu-yedek-aday-planlamasi
1028[*] https://www.egm.gov.tr/2018-7-donem-sozlesmeli-avukat-alimi-sozlu-veveya-uygulamali-sinav-sonucu
1029[*] https://www.egm.gov.tr/2018-8donem-sozlesmeli-ucak-pilotu-alimi-sozlu-veveya-uygulamali-sinav-sonucu
1030[*] https://www.egm.gov.tr/2019-1-donem-2828-sayili-sosyal-hizmetler-kanunu-kapsaminda-emniyet-genel-mudurlugu-kadrolarina-yerlestirmesi-yapilan-adaylardan-istenilen-belgeler
1031[*] https://www.egm.gov.tr/agustos
1032[*] https://www.egm.gov.tr/alkollu-arac-kullanimi
1033[*] https://www.egm.gov.tr/asayis-suclari
1034[*] https://www.egm.gov.tr/ataturk-ve-turk-polisi
1035[*] https://www.egm.gov.tr/atm-dolandiriciligi
1036[*] https://www.egm.gov.tr/bilgi-edinme
1037[*] https://www.egm.gov.tr/bisikletli-polis-timleri
1038[*] https://www.egm.gov.tr/bizi-taniyin
1039[*] https://www.egm.gov.tr/bomba-imha-polisi
1040[*] https://www.egm.gov.tr/cep-telefonu-kullanimi
1041[*] https://www.egm.gov.tr/cevik-kuvvet
1042[*] https://www.egm.gov.tr/ceza-puani-uygulama
1043[*] https://www.egm.gov.tr/cocuk-koltugu-kullanimi
1044[*] https://www.egm.gov.tr/cocuk-polisi
1045[*] https://www.egm.gov.tr/daire-baskanliklari
1046[*] https://www.egm.gov.tr/deniz-polisi
1047[*] https://www.egm.gov.tr/digerbirimler
1048[*] https://www.egm.gov.tr/dolandiricilik
1049[*] https://www.egm.gov.tr/duyurular
1050[*] https://www.egm.gov.tr/egitim-birimleri
1051[*] https://www.egm.gov.tr/egm-internet-sitemiz-yenilendi
1052[*] https://www.egm.gov.tr/egm-mobil
1053[*] https://www.egm.gov.tr/ekonomik-suclar
1054[*] https://www.egm.gov.tr/emniyet-genel-mudurlugu
1055[*] https://www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas
1056[*] https://www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-balikesir-valiligini-ve-balikesir-il-emniyet-mudurlugunu-ziyaret-etti
1057[*] https://www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-canakkalede-bir-dizi-ziyaret-gerceklestirdi
1058[*] https://www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-manisada-sehitligi-ziyaret-etti
1059[*] https://www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-manisa-il-emniyet-mudurlugu-ve-il-jandarma-komutanligini-ziyaret-etti
1060[*] https://www.egm.gov.tr/emniyet-genel-mudurumuz-sayin-mehmet-aktas-manisa-valiligini-ziyaret-etti
1061[*] https://www.egm.gov.tr/emniyet-genel-muduru-sayin-mehmet-aktasin-24-kasim-ogretmenler-gunu-mesaji
1062[*] https://www.egm.gov.tr/emniyet-kemeri-kullanimi
1063[*] https://www.egm.gov.tr/en-yakin-polis-merkezi
1064[*] https://www.egm.gov.tr/evlenme-vaadiyle-dolandiricilik
1065[*] https://www.egm.gov.tr/genel-mudurlerimiz-2019
1066[*] https://www.egm.gov.tr/genel-polis-hizmetleri
1067[*] https://www.egm.gov.tr/guvenli-surus-teknikleri
1068[*] https://www.egm.gov.tr/haberler
1069[*] https://www.egm.gov.tr/hakkimizda
1070[*] https://www.egm.gov.tr/hava-yastigi
1071[*] https://www.egm.gov.tr/hirsizlik
1072[*] https://www.egm.gov.tr/hukukmusavirligi
1073[*] https://www.egm.gov.tr/icdenetim
1074[*] https://www.egm.gov.tr/il-emniyet-mudurlukleri
1075[*] https://www.egm.gov.tr/insan-ticareti
1076[*] https://www.egm.gov.tr/kacakcilik-ve-organize-suclar
1077[*] https://www.egm.gov.tr/kacakcilik-ve-organize-suclarla-mucadele
1078[*] https://www.egm.gov.tr/kayip-alarmi
1079[*] https://www.egm.gov.tr/kayip-sahiscocuklar-hakkinda-bilgi-almak-istiyorum
1080[*] https://www.egm.gov.tr/mali-suc-ve-suc-gelirleriyle-mucadele
1081[*] https://www.egm.gov.tr/mart
1082[*] https://www.egm.gov.tr/#menu_132543
1083[*] https://www.egm.gov.tr/#menu_132544
1084[*] https://www.egm.gov.tr/#menu_132545
1085[*] https://www.egm.gov.tr/#menu_132546
1086[*] https://www.egm.gov.tr/#menu_132547
1087[*] https://www.egm.gov.tr/#menu_132549
1088[*] https://www.egm.gov.tr/#menu_132558
1089[*] https://www.egm.gov.tr/#menu_132559
1090[*] https://www.egm.gov.tr/#menu_132562
1091[*] https://www.egm.gov.tr/#menu_132573
1092[*] https://www.egm.gov.tr/#menu_132581
1093[*] https://www.egm.gov.tr/#menu_133196
1094[*] https://www.egm.gov.tr/#menu_133356
1095[*] https://www.egm.gov.tr/#menu_133357
1096[*] https://www.egm.gov.tr/#menu_133359
1097[*] https://www.egm.gov.tr/#menu_133372
1098[*] https://www.egm.gov.tr/#MobileSearch
1099[*] https://www.egm.gov.tr/#MobileSlideMenu
1100[*] https://www.egm.gov.tr/motosikletli-polis-timleri
1101[*] https://www.egm.gov.tr/narkotik-suclar
1102[*] https://www.egm.gov.tr/narkotim
1103[*] https://www.egm.gov.tr/nisan
1104[*] https://www.egm.gov.tr/ocak
1105[*] https://www.egm.gov.tr/oto-hirsizligi
1106[*] https://www.egm.gov.tr/ozel-guvenlik-bilgi-sistemi
1107[*] https://www.egm.gov.tr/ozelguvenlikdenetleme
1108[*] https://www.egm.gov.tr/ozelharekat
1109[*] https://www.egm.gov.tr/ozel-harekat-polisi
1110[*] https://www.egm.gov.tr/polis-merkezi-amirligi
1111[*] https://www.egm.gov.tr/psiko---teknik-degerlendirme
1112[*] https://www.egm.gov.tr/rutbeler
1113[*] https://www.egm.gov.tr/sahtecilik-suclari
1114[*] https://www.egm.gov.tr/sehitlerimiz
1115[*] https://www.egm.gov.tr/sikca-sorulan-sorular
1116[*] https://www.egm.gov.tr/silah-ruhsati-islemleri-hakkinda-bilinmesi-gerekenler
1117[*] https://www.egm.gov.tr/silah-ruhsati-islemleri-hakkinda-sikca-sorulan-sorular
1118[*] https://www.egm.gov.tr/sosyalhizmetler
1119[*] https://www.egm.gov.tr/sosyal-medya-dolandiriciligi
1120[*] https://www.egm.gov.tr/strateji/strateji-faaliyetleri
1121[*] https://www.egm.gov.tr/subat
1122[*] https://www.egm.gov.tr/tarihce
1123[*] https://www.egm.gov.tr/teftiskurulu
1124[*] https://www.egm.gov.tr/temmuz
1125[*] https://www.egm.gov.tr/terorden-arananlar-hakkinda-bilgi-almak-istiyorum
1126[*] https://www.egm.gov.tr/terorle-mucadele
1127[*] https://www.egm.gov.tr/teskilat-semasi
1128[*] https://www.egm.gov.tr/toplum-destekli-polislik
1129[*] https://www.egm.gov.tr/trafik-cezalari-hakkinda-bilgi-almak-istiyorum
1130[*] https://www.egm.gov.tr/trafik-denetimleri
1131[*] https://www.egm.gov.tr/trafik-kural-ihlalleri
1132[*] https://www.egm.gov.tr/trafik-polisi
1133[*] https://www.egm.gov.tr/trafikte-hiz-ve-kaza-riski
1134[*] https://www.egm.gov.tr/trafik-tescil-hizmetleri-hakkinda-bilgi-almak-istiyorum
1135[*] https://www.egm.gov.tr/uykusuz-ve-yorgun-arac-kullanimi
1136[*] https://www.egm.gov.tr/vatandaslik-haklari
1137[*] https://www.egm.gov.tr/yabanciyim-ikametgah-ve-seyahat-haklarimla-ilgili-bilgi-almak-istiyorum
1138[*] https://www.egm.gov.tr/yagma
1139[*] https://www.egm.gov.tr/yankesicilik
1140[*] https://www.egm.gov.tr/yaya-gecitleri
1141[*] https://www.facebook.com/EmniyetGM
1142[*] https://www.icisleri.gov.tr/
1143[*] https://www.instagram.com/emniyetgm
1144[*] https://www.nvi.gov.tr/
1145[*] https://www.pa.edu.tr/
1146[*] https://www.pa.edu.tr/polis-muzesi.html
1147[*] https://www.polsan.com.tr/
1148[*] https://www.sg.gov.tr/
1149[*] https://www.turkiye.gov.tr/
1150[*] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
1151[*] https://www.youtube.com/channel/UCXVqkvoXzIccoi1j5pYFJHw
1152[*] http://www.asayis.pol.tr/
1153[*] http://www.egm.gov.tr/
1154[*] http://www.egm.gov.tr/tem
1155[*] http://www.goc.gov.tr/
1156[*] http://www.jandarma.gov.tr/
1157[*] http://www.narkotik.pol.tr/
1158[*] http://www.pa.edu.tr/kitaplar.html
1159[*] http://www.polisradyosu.pol.tr/Sayfalar/default.aspx
1160[*] http://www.terorarananlar.pol.tr/Sayfalar/default.aspx
1161[*] http://www.trafik.gov.tr/
1162cut: intervalle de champ incorrecte
1163Saisissez « cut --help » pour plus d'informations.
1164[INFO] Shodan detected the following opened ports on 2.58.141.248:
1165[*] 443
1166[*] 80
1167[INFO] ------VirusTotal SECTION------
1168[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
1169[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
1170[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
1171[INFO] ------Alexa Rank SECTION------
1172[INFO] Percent of Visitors Rank in Country:
1173[INFO] Percent of Search Traffic:
1174[INFO] Percent of Unique Visits:
1175[INFO] Total Sites Linking In:
1176[*] Total Sites
1177[INFO] Useful links related to www.egm.gov.tr - 2.58.141.248:
1178[*] https://www.virustotal.com/pt/ip-address/2.58.141.248/information/
1179[*] https://www.hybrid-analysis.com/search?host=2.58.141.248
1180[*] https://www.shodan.io/host/2.58.141.248
1181[*] https://www.senderbase.org/lookup/?search_string=2.58.141.248
1182[*] https://www.alienvault.com/open-threat-exchange/ip/2.58.141.248
1183[*] http://pastebin.com/search?q=2.58.141.248
1184[*] http://urlquery.net/search.php?q=2.58.141.248
1185[*] http://www.alexa.com/siteinfo/www.egm.gov.tr
1186[*] http://www.google.com/safebrowsing/diagnostic?site=www.egm.gov.tr
1187[*] https://censys.io/ipv4/2.58.141.248
1188[*] https://www.abuseipdb.com/check/2.58.141.248
1189[*] https://urlscan.io/search/#2.58.141.248
1190[*] https://github.com/search?q=2.58.141.248&type=Code
1191[INFO] Useful links related to AS209171 - 2.58.141.0/24:
1192[*] http://www.google.com/safebrowsing/diagnostic?site=AS:209171
1193[*] https://www.senderbase.org/lookup/?search_string=2.58.141.0/24
1194[*] http://bgp.he.net/AS209171
1195[*] https://stat.ripe.net/AS209171
1196[INFO] Date: 23/11/19 | Time: 21:24:31
1197[INFO] Total time: 7 minute(s) and 32 second(s)
1198#######################################################################################################################################
1199Trying "egm.gov.tr"
1200;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63975
1201;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 4, ADDITIONAL: 4
1202
1203;; QUESTION SECTION:
1204;egm.gov.tr. IN ANY
1205
1206;; ANSWER SECTION:
1207egm.gov.tr. 0 IN TXT "MS=ms77319551"
1208egm.gov.tr. 0 IN TXT "MS=ms96742347"
1209egm.gov.tr. 0 IN TXT "v=spf1 mx:egm.gov.tr ip4:82.222.167.177 ip4:82.222.167.151 -all"
1210egm.gov.tr. 0 IN MX 5 mx1.egm.gov.tr.
1211egm.gov.tr. 0 IN SOA dns.egm.gov.tr. admin.egm.gov.tr. 2006061397 1200 600 1209600 3600
1212egm.gov.tr. 0 IN A 2.58.141.248
1213egm.gov.tr. 0 IN NS dnsb.egm.gov.tr.
1214egm.gov.tr. 0 IN NS dns1.egm.gov.tr.
1215egm.gov.tr. 0 IN NS dnsa.egm.gov.tr.
1216egm.gov.tr. 0 IN NS dns.egm.gov.tr.
1217
1218;; AUTHORITY SECTION:
1219egm.gov.tr. 3600 IN NS dnsb.egm.gov.tr.
1220egm.gov.tr. 3600 IN NS dns.egm.gov.tr.
1221egm.gov.tr. 3600 IN NS dns1.egm.gov.tr.
1222egm.gov.tr. 3600 IN NS dnsa.egm.gov.tr.
1223
1224;; ADDITIONAL SECTION:
1225dns1.egm.gov.tr. 43198 IN A 82.222.167.138
1226dnsa.egm.gov.tr. 43198 IN A 82.222.167.163
1227dns.egm.gov.tr. 43198 IN A 82.222.167.139
1228dnsb.egm.gov.tr. 43198 IN A 82.222.167.164
1229
1230Received 429 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 1930 ms
1231#######################################################################################################################################
1232; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace egm.gov.tr any
1233;; global options: +cmd
1234. 85895 IN NS h.root-servers.net.
1235. 85895 IN NS k.root-servers.net.
1236. 85895 IN NS j.root-servers.net.
1237. 85895 IN NS a.root-servers.net.
1238. 85895 IN NS b.root-servers.net.
1239. 85895 IN NS c.root-servers.net.
1240. 85895 IN NS l.root-servers.net.
1241. 85895 IN NS d.root-servers.net.
1242. 85895 IN NS f.root-servers.net.
1243. 85895 IN NS g.root-servers.net.
1244. 85895 IN NS m.root-servers.net.
1245. 85895 IN NS e.root-servers.net.
1246. 85895 IN NS i.root-servers.net.
1247. 85895 IN RRSIG NS 8 0 518400 20191206130000 20191123120000 22545 . LkTN0Kxd7RQqDMwjPgmvBvVq9qH3G9K904QVUPW2rFiko42gdxDA+ko6 lQdJ5nMAsSyBqasVMhbXhEtepjl8xcXTBN+3bMu9qLWThmBtkBEnTs/E Ei5lFeZU6WwjG+xPYyQack335I+Qf3xN97pWuIvKP/DJ/V4XxdFFcqL7 8/k0JskGg/SkkCHi1tNtgnoyHpff8wqk5Sf+OdJXrtZHTQ/j3wiyojcl erJVnh2rLDyFFuycUQuJVawzGxVwcheQXhqWOBiWeQ6PofyRBNWlylmw MK3qO/8RDmNuBh05zzbNhHJ1SY056U0kv66GqYXsHrOv9ci3+4MGZv9T 1y5w2A==
1248;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 540 ms
1249
1250tr. 172800 IN NS ns92.nic.tr.
1251tr. 172800 IN NS ns91.nic.tr.
1252tr. 172800 IN NS ns22.nic.tr.
1253tr. 172800 IN NS ns42.nic.tr.
1254tr. 172800 IN NS ns41.nic.tr.
1255tr. 172800 IN NS ns21.nic.tr.
1256tr. 172800 IN NS ns31.nic.tr.
1257tr. 86400 IN NSEC trade. NS RRSIG NSEC
1258tr. 86400 IN RRSIG NSEC 8 1 86400 20191206130000 20191123120000 22545 . NfKgsso6g5Nfp2syUSeHbao9LbseW3VXwP39ZuKLvN64EiNiHP7QnU5z AgDKjCZf+6CXg/LMHQCvn0w40IhthIlh3s7w7JiXGDwUCN8KEXpobJPm hkB5vA4W26akWajnibe7v1MF4kOM3lAarFd9K0sxsfjdk3RQfD2G5uFO dIghU/S90gdqlqJpZdIcjj9BRV4NY8q6R5R7Ild0i766jzpYclErsoDq Pgt36oXyM/Y4aWQaK7V+yx/z/gTAAutIdM9fc848nYfeoYonuH7k0/qH F45NRIL2K19JtrGjCxcc1KXuzoniaVqkMhhJrDpHxWf9VTQUTNWfpOJ5 GnZ7Zg==
1259;; Received 714 bytes from 2001:7fe::53#53(i.root-servers.net) in 45 ms
1260
1261egm.gov.tr. 43200 IN NS dns.egm.gov.tr.
1262egm.gov.tr. 43200 IN NS dns1.egm.gov.tr.
1263egm.gov.tr. 43200 IN NS dnsa.egm.gov.tr.
1264egm.gov.tr. 43200 IN NS dnsb.egm.gov.tr.
1265;; Received 178 bytes from 185.7.0.2#53(ns41.nic.tr) in 489 ms
1266
1267egm.gov.tr. 3600 IN A 2.58.141.248
1268egm.gov.tr. 3600 IN NS dns1.egm.gov.tr.
1269egm.gov.tr. 3600 IN NS dnsa.egm.gov.tr.
1270egm.gov.tr. 3600 IN NS dns.egm.gov.tr.
1271egm.gov.tr. 3600 IN NS dnsb.egm.gov.tr.
1272egm.gov.tr. 900 IN SOA dns.egm.gov.tr. admin.egm.gov.tr. 2006061397 1200 600 1209600 3600
1273egm.gov.tr. 3600 IN MX 5 mx1.egm.gov.tr.
1274egm.gov.tr. 3600 IN TXT "MS=ms96742347"
1275egm.gov.tr. 3600 IN TXT "MS=ms77319551"
1276egm.gov.tr. 3600 IN TXT "v=spf1 mx:egm.gov.tr ip4:82.222.167.177 ip4:82.222.167.151 -all"
1277;; Received 412 bytes from 82.222.167.138#53(dns1.egm.gov.tr) in 325 ms
1278#######################################################################################################################################
1279[*] Performing General Enumeration of Domain: egm.gov.tr
1280[-] DNSSEC is not configured for egm.gov.tr
1281[*] SOA dns.egm.gov.tr 82.222.167.139
1282[*] NS dns1.egm.gov.tr 82.222.167.138
1283[*] NS dnsb.egm.gov.tr 82.222.167.164
1284[*] NS dnsa.egm.gov.tr 82.222.167.163
1285[*] NS dns.egm.gov.tr 82.222.167.139
1286[*] MX mx1.egm.gov.tr 82.222.167.151
1287[*] A egm.gov.tr 2.58.141.248
1288[*] TXT egm.gov.tr MS=ms77319551
1289[*] TXT egm.gov.tr MS=ms96742347
1290[*] TXT egm.gov.tr v=spf1 mx:egm.gov.tr ip4:82.222.167.177 ip4:82.222.167.151 -all
1291[*] Enumerating SRV Records
1292[*] SRV _sip._tls.egm.gov.tr sipdir.online.lync.com 52.112.192.11 443 1
1293[*] SRV _sip._tls.egm.gov.tr sipdir.online.lync.com 2603:1027:0:9::b 443 1
1294[*] SRV _sipfederationtls._tcp.egm.gov.tr sipfed.online.lync.com 52.112.194.75 5061 1
1295[*] SRV _sipfederationtls._tcp.egm.gov.tr sipfed.online.lync.com 2603:1027:0:2::b 5061 1
1296[*] SRV _autodiscover._tcp.egm.gov.tr autodiscover.egm.gov.tr 82.222.167.177 443 0
1297[+] 5 Records Found
1298######################################################################################################################################
1299[*] Processing domain egm.gov.tr
1300[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
1301[+] Getting nameservers
130282.222.167.138 - dns1.egm.gov.tr
130382.222.167.164 - dnsb.egm.gov.tr
130482.222.167.163 - dnsa.egm.gov.tr
130582.222.167.139 - dns.egm.gov.tr
1306[-] Zone transfer failed
1307
1308[+] TXT records found
1309"MS=ms77319551"
1310"MS=ms96742347"
1311"v=spf1 mx:egm.gov.tr ip4:82.222.167.177 ip4:82.222.167.151 -all"
1312
1313[+] MX records found, added to target list
13145 mx1.egm.gov.tr.
1315
1316[*] Scanning egm.gov.tr for A records
13172.58.141.248 - egm.gov.tr
131882.222.167.177 - autodiscover.egm.gov.tr
131982.222.167.169 - dialin.egm.gov.tr
132082.222.167.139 - dns.egm.gov.tr
132182.222.167.138 - dns1.egm.gov.tr
1322212.175.37.100 - dns3.egm.gov.tr
1323212.175.37.101 - dns2.egm.gov.tr
132452.174.26.23 - enterpriseenrollment.egm.gov.tr
132551.144.73.160 - enterpriseregistration.egm.gov.tr
132682.222.167.169 - lync.egm.gov.tr
132752.112.192.142 - lyncdiscover.egm.gov.tr
1328213.74.42.183 - m.egm.gov.tr
132982.222.167.151 - m2.egm.gov.tr
133082.222.167.169 - meet.egm.gov.tr
133140.126.1.166 - msoid.egm.gov.tr
133220.190.129.2 - msoid.egm.gov.tr
133340.126.1.130 - msoid.egm.gov.tr
133440.126.1.128 - msoid.egm.gov.tr
133520.190.129.160 - msoid.egm.gov.tr
133682.222.167.151 - mx1.egm.gov.tr
133752.112.192.11 - sip.egm.gov.tr
1338213.74.42.167 - webconf.egm.gov.tr
133982.222.167.175 - webconf.egm.gov.tr
13402.58.141.248 - www.egm.gov.tr
1341######################################################################################################################################
1342 AVAILABLE PLUGINS
1343 -----------------
1344
1345 OpenSslCipherSuitesPlugin
1346 EarlyDataPlugin
1347 CertificateInfoPlugin
1348 HeartbleedPlugin
1349 RobotPlugin
1350 OpenSslCcsInjectionPlugin
1351 SessionRenegotiationPlugin
1352 CompressionPlugin
1353 HttpHeadersPlugin
1354 SessionResumptionPlugin
1355 FallbackScsvPlugin
1356
1357
1358
1359 CHECKING HOST(S) AVAILABILITY
1360 -----------------------------
1361
1362 2.58.141.248:443 => 2.58.141.248
1363
1364
1365
1366
1367 SCAN RESULTS FOR 2.58.141.248:443 - 2.58.141.248
1368 ------------------------------------------------
1369
1370 * Downgrade Attacks:
1371 TLS_FALLBACK_SCSV: OK - Supported
1372
1373 * Certificate Information:
1374 Content
1375 SHA1 Fingerprint: a81349e695ec2c975d88617a713f3df219f04490
1376 Common Name: egm.gov.tr
1377 Issuer: COMODO RSA Organization Validation Secure Server CA
1378 Serial Number: 163551620142899106610900430492057513492
1379 Not Before: 2019-04-26 00:00:00
1380 Not After: 2021-04-25 23:59:59
1381 Signature Algorithm: sha256
1382 Public Key Algorithm: RSA
1383 Key Size: 2048
1384 Exponent: 65537 (0x10001)
1385 DNS Subject Alternative Names: ['egm.gov.tr', 'www.egm.gov.tr']
1386
1387 Trust
1388 Hostname Validation: FAILED - Certificate does NOT match 2.58.141.248
1389 Android CA Store (9.0.0_r9): OK - Certificate is trusted
1390 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
1391 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
1392 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
1393 Windows CA Store (2019-05-27): OK - Certificate is trusted
1394 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
1395 Received Chain: egm.gov.tr --> COMODO RSA Organization Validation Secure Server CA --> COMODO RSA Certification Authority --> AddTrust External CA Root
1396 Verified Chain: egm.gov.tr --> COMODO RSA Organization Validation Secure Server CA --> COMODO RSA Certification Authority
1397 Received Chain Contains Anchor: OK - Anchor certificate not sent
1398 Received Chain Order: OK - Order is valid
1399 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
1400
1401 Extensions
1402 OCSP Must-Staple: NOT SUPPORTED - Extension not found
1403 Certificate Transparency: OK - 3 SCTs included
1404
1405 OCSP Stapling
1406 NOT SUPPORTED - Server did not send back an OCSP response
1407
1408 * OpenSSL Heartbleed:
1409 OK - Not vulnerable to Heartbleed
1410
1411 * TLSV1_1 Cipher Suites:
1412 Server rejected all cipher suites.
1413
1414 * TLSV1 Cipher Suites:
1415 Server rejected all cipher suites.
1416
1417 * TLS 1.2 Session Resumption Support:
1418 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
1419 With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
1420
1421 * OpenSSL CCS Injection:
1422 OK - Not vulnerable to OpenSSL CCS injection
1423
1424 * SSLV3 Cipher Suites:
1425 Server rejected all cipher suites.
1426
1427 * TLSV1_2 Cipher Suites:
1428 Forward Secrecy OK - Supported
1429 RC4 OK - Not Supported
1430
1431 Preferred:
1432 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Found - /Login
1433 Accepted:
1434 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Found - /Login
1435 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Found - /Login
1436 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Found - /Login
1437 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 302 Found - /Login
1438 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Found - /Login
1439 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Found - /Login
1440 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 302 Found - /Login
1441 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Found - /Login
1442
1443 * SSLV2 Cipher Suites:
1444 Server rejected all cipher suites.
1445
1446 * Deflate Compression:
1447 OK - Compression disabled
1448
1449 * TLSV1_3 Cipher Suites:
1450 Server rejected all cipher suites.
1451
1452 * Session Renegotiation:
1453 Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
1454 Secure Renegotiation: OK - Supported
1455
1456 * ROBOT Attack:
1457 OK - Not vulnerable
1458
1459
1460 SCAN COMPLETED IN 44.12 S
1461 -------------------------
1462#######################################################################################################################################
1463Domains still to check: 1
1464 Checking if the hostname egm.gov.tr. given is in fact a domain...
1465
1466Analyzing domain: egm.gov.tr.
1467 Checking NameServers using system default resolver...
1468 IP: 82.222.167.138 (Turkey)
1469 HostName: dns1.egm.gov.tr Type: NS
1470 HostName: host-82-222-167-138.reverse.superonline.net Type: PTR
1471 IP: 82.222.167.164 (Turkey)
1472 HostName: dnsb.egm.gov.tr Type: NS
1473 HostName: host-82-222-167-164.reverse.superonline.net Type: PTR
1474 IP: 82.222.167.163 (Turkey)
1475 HostName: dnsa.egm.gov.tr Type: NS
1476 HostName: host-82-222-167-163.reverse.superonline.net Type: PTR
1477 IP: 82.222.167.139 (Turkey)
1478 HostName: dns.egm.gov.tr Type: NS
1479 HostName: host-82-222-167-139.reverse.superonline.net Type: PTR
1480
1481 Checking MailServers using system default resolver...
1482 IP: 82.222.167.151 (Turkey)
1483 HostName: mx1.egm.gov.tr Type: MX
1484 HostName: mx1.egm.gov.tr Type: PTR
1485
1486 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1487 No zone transfer found on nameserver 82.222.167.163
1488^C No zone transfer found on nameserver 82.222.167.164
1489 No zone transfer found on nameserver 82.222.167.138
1490^C No zone transfer found on nameserver 82.222.167.139
1491
1492 Checking SPF record...
1493 New IP found: 82.222.167.177
1494
1495 Checking 192 most common hostnames using system default resolver...
1496 IP: 2.58.141.248 (Turkey)
1497 HostName: www.egm.gov.tr. Type: A
1498 IP: 82.222.167.139 (Turkey)
1499 HostName: dns.egm.gov.tr Type: NS
1500 HostName: host-82-222-167-139.reverse.superonline.net Type: PTR
1501 HostName: dns.egm.gov.tr. Type: A
1502
1503 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1504 Checking netblock 2.58.141.0
1505 Checking netblock 82.222.167.0
1506
1507 Searching for egm.gov.tr. emails in Google
1508 ceyhan@egm.gov.tr.
1509 mugla155@egm.gov.tr.
1510 menderes155@egm.gov.tr.
1511 eimza.destek@egm.gov.tr.
1512 osmaniyepolis@egm.gov.tr
1513 muglabilgi@egm.gov.tr.
1514 tamsosyalmedya@egm.gov.tr
1515 siber@egm.gov.tr,
1516 siber.onleme.arastirma@egm.gov.tr, - Is this real?
1517 siber@egm.gov.tr
1518 tamsosyalmedya@egm.gov.tr�
1519 omerli@egm.gov.tr.
1520 ssm@egm.gov.tr
1521
1522 Checking 7 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1523 Host 2.58.141.248 is up (reset ttl 64)
1524 Host 82.222.167.164 is up (reset ttl 64)
1525 Host 82.222.167.163 is up (reset ttl 64)
1526 Host 82.222.167.177 is up (reset ttl 64)
1527 Host 82.222.167.138 is up (reset ttl 64)
1528 Host 82.222.167.139 is up (reset ttl 64)
1529 Host 82.222.167.151 is up (reset ttl 64)
1530
1531 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1532 Scanning ip 2.58.141.248 (www.egm.gov.tr.):
1533 80/tcp open http syn-ack ttl 234 Microsoft IIS httpd 10.0
1534 443/tcp open ssl/https? syn-ack ttl 236
1535 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1536 Scanning ip 82.222.167.164 (host-82-222-167-164.reverse.superonline.net (PTR)):
1537 Scanning ip 82.222.167.163 (host-82-222-167-163.reverse.superonline.net (PTR)):
1538 Scanning ip 82.222.167.177 ():
1539 80/tcp open http-proxy syn-ack ttl 232 F5 BIG-IP load balancer http proxy
1540 |_http-title: Did not follow redirect to https://82.222.167.177/
1541 |_https-redirect: ERROR: Script execution failed (use -d to debug)
1542 443/tcp open ssl/https? syn-ack ttl 234
1543 OS Info: Service Info: Device: load balancer
1544 Scanning ip 82.222.167.138 (host-82-222-167-138.reverse.superonline.net (PTR)):
1545 53/tcp open domain? syn-ack ttl 106
1546 | fingerprint-strings:
1547 | DNSVersionBindReqTCP:
1548 | version
1549 |_ bind
1550 Scanning ip 82.222.167.139 (dns.egm.gov.tr.):
1551 Scanning ip 82.222.167.151 (mx1.egm.gov.tr (PTR)):
1552 443/tcp open ssl/https? syn-ack ttl 232
1553 |_ssl-date: TLS randomness does not represent time
1554 WebCrawling domain's web servers... up to 50 max links.
1555
1556 + URL to crawl: http://www.egm.gov.tr.
1557 + Date: 2019-11-23
1558
1559 + Crawling URL: http://www.egm.gov.tr.:
1560 + Links:
1561 + Crawling http://www.egm.gov.tr.
1562 + Searching for directories...
1563 + Searching open folders...
1564
1565--Finished--
1566Summary information for domain egm.gov.tr.
1567-----------------------------------------
1568 Domain Specific Information:
1569 Email: ceyhan@egm.gov.tr.
1570 Email: mugla155@egm.gov.tr.
1571 Email: menderes155@egm.gov.tr.
1572 Email: eimza.destek@egm.gov.tr.
1573 Email: osmaniyepolis@egm.gov.tr
1574 Email: muglabilgi@egm.gov.tr.
1575 Email: tamsosyalmedya@egm.gov.tr
1576 Email: siber@egm.gov.tr,
1577 Email: siber.onleme.arastirma@egm.gov.tr, - Is this real?
1578 Email: siber@egm.gov.tr
1579 Email: tamsosyalmedya@egm.gov.tr�
1580 Email: omerli@egm.gov.tr.
1581 Email: ssm@egm.gov.tr
1582
1583 Domain Ips Information:
1584 IP: 2.58.141.248
1585 HostName: www.egm.gov.tr. Type: A
1586 Country: Turkey
1587 Is Active: True (reset ttl 64)
1588 Port: 80/tcp open http syn-ack ttl 234 Microsoft IIS httpd 10.0
1589 Port: 443/tcp open ssl/https? syn-ack ttl 236
1590 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1591 IP: 82.222.167.164
1592 HostName: dnsb.egm.gov.tr Type: NS
1593 HostName: host-82-222-167-164.reverse.superonline.net Type: PTR
1594 Country: Turkey
1595 Is Active: True (reset ttl 64)
1596 IP: 82.222.167.163
1597 HostName: dnsa.egm.gov.tr Type: NS
1598 HostName: host-82-222-167-163.reverse.superonline.net Type: PTR
1599 Country: Turkey
1600 Is Active: True (reset ttl 64)
1601 IP: 82.222.167.177
1602 Type: SPF
1603 Is Active: True (reset ttl 64)
1604 Port: 80/tcp open http-proxy syn-ack ttl 232 F5 BIG-IP load balancer http proxy
1605 Script Info: |_http-title: Did not follow redirect to https://82.222.167.177/
1606 Script Info: |_https-redirect: ERROR: Script execution failed (use -d to debug)
1607 Port: 443/tcp open ssl/https? syn-ack ttl 234
1608 Os Info: Device: load balancer
1609 IP: 82.222.167.138
1610 HostName: dns1.egm.gov.tr Type: NS
1611 HostName: host-82-222-167-138.reverse.superonline.net Type: PTR
1612 Country: Turkey
1613 Is Active: True (reset ttl 64)
1614 Port: 53/tcp open domain? syn-ack ttl 106
1615 Script Info: | fingerprint-strings:
1616 Script Info: | DNSVersionBindReqTCP:
1617 Script Info: | version
1618 Script Info: |_ bind
1619 IP: 82.222.167.139
1620 HostName: dns.egm.gov.tr Type: NS
1621 HostName: host-82-222-167-139.reverse.superonline.net Type: PTR
1622 HostName: dns.egm.gov.tr. Type: A
1623 Country: Turkey
1624 Is Active: True (reset ttl 64)
1625 IP: 82.222.167.151
1626 HostName: mx1.egm.gov.tr Type: MX
1627 HostName: mx1.egm.gov.tr Type: PTR
1628 Type: SPF
1629 Country: Turkey
1630 Is Active: True (reset ttl 64)
1631 Port: 443/tcp open ssl/https? syn-ack ttl 232
1632 Script Info: |_ssl-date: TLS randomness does not represent time
1633
1634--------------End Summary --------------
1635-----------------------------------------
1636######################################################################################################################################
1637WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1638Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-23 21:26 EST
1639Stats: 0:01:11 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
1640SYN Stealth Scan Timing: About 42.84% done; ETC: 21:29 (0:01:35 remaining)
1641Stats: 0:05:24 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
1642SYN Stealth Scan Timing: About 99.50% done; ETC: 21:32 (0:00:02 remaining)
1643Nmap scan report for 2.58.141.248
1644Host is up (0.38s latency).
1645Not shown: 490 filtered ports, 4 closed ports
1646Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1647PORT STATE SERVICE
164880/tcp open http
1649443/tcp open https
1650
1651Nmap done: 1 IP address (1 host up) scanned in 328.31 seconds
1652#######################################################################################################################################
1653Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-23 21:32 EST
1654Nmap scan report for 2.58.141.248
1655Host is up (0.32s latency).
1656Not shown: 2 filtered ports
1657PORT STATE SERVICE
165853/udp open|filtered domain
165967/udp open|filtered dhcps
166068/udp open|filtered dhcpc
166169/udp open|filtered tftp
166288/udp open|filtered kerberos-sec
1663123/udp open|filtered ntp
1664139/udp open|filtered netbios-ssn
1665161/udp open|filtered snmp
1666162/udp open|filtered snmptrap
1667389/udp open|filtered ldap
1668500/udp open|filtered isakmp
1669520/udp open|filtered route
16702049/udp open|filtered nfs
1671
1672Nmap done: 1 IP address (1 host up) scanned in 6.80 seconds
1673#######################################################################################################################################
1674Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-23 21:35 EST
1675NSE: Loaded 163 scripts for scanning.
1676NSE: Script Pre-scanning.
1677Initiating NSE at 21:35
1678Completed NSE at 21:35, 0.00s elapsed
1679Initiating NSE at 21:35
1680Completed NSE at 21:35, 0.00s elapsed
1681Initiating Parallel DNS resolution of 1 host. at 21:35
1682Completed Parallel DNS resolution of 1 host. at 21:35, 0.02s elapsed
1683Initiating SYN Stealth Scan at 21:35
1684Scanning 2.58.141.248 [1 port]
1685Completed SYN Stealth Scan at 21:35, 2.06s elapsed (1 total ports)
1686Initiating Service scan at 21:35
1687Initiating OS detection (try #1) against 2.58.141.248
1688Retrying OS detection (try #2) against 2.58.141.248
1689Initiating Traceroute at 21:35
1690Completed Traceroute at 21:35, 6.49s elapsed
1691Initiating Parallel DNS resolution of 10 hosts. at 21:35
1692Completed Parallel DNS resolution of 10 hosts. at 21:35, 0.47s elapsed
1693NSE: Script scanning 2.58.141.248.
1694Initiating NSE at 21:35
1695Completed NSE at 21:35, 0.01s elapsed
1696Initiating NSE at 21:35
1697Completed NSE at 21:35, 0.00s elapsed
1698Nmap scan report for 2.58.141.248
1699Host is up.
1700
1701PORT STATE SERVICE VERSION
170280/tcp filtered http
1703Too many fingerprints match this host to give specific OS details
1704
1705TRACEROUTE (using proto 1/icmp)
1706HOP RTT ADDRESS
17071 312.39 ms 10.249.204.1
17082 312.47 ms 213.184.122.97
17093 312.49 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
17104 312.46 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
17115 312.52 ms bzq-179-124-190.cust.bezeqint.net (212.179.124.190)
17126 474.36 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
17137 312.56 ms et-0-0-71.cr2-fra2.ip4.gtt.net (141.136.110.50)
17148 474.41 ms ix-ae-22-0.tcore1.fr0-frankfurt.as6453.net (195.219.50.137)
17159 474.44 ms if-ae-0-2.tcore1.it5-istanbul.as6453.net (195.219.50.10)
171610 474.46 ms 5.23.0.38
171711 ... 30
1718
1719NSE: Script Post-scanning.
1720Initiating NSE at 21:35
1721Completed NSE at 21:35, 0.00s elapsed
1722Initiating NSE at 21:35
1723Completed NSE at 21:35, 0.00s elapsed
1724######################################################################################################################################
1725Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-23 21:37 EST
1726NSE: Loaded 163 scripts for scanning.
1727NSE: Script Pre-scanning.
1728Initiating NSE at 21:37
1729Completed NSE at 21:37, 0.00s elapsed
1730Initiating NSE at 21:37
1731Completed NSE at 21:37, 0.00s elapsed
1732Initiating Parallel DNS resolution of 1 host. at 21:37
1733Completed Parallel DNS resolution of 1 host. at 21:37, 0.02s elapsed
1734Initiating SYN Stealth Scan at 21:37
1735Scanning 2.58.141.248 [1 port]
1736Discovered open port 443/tcp on 2.58.141.248
1737Completed SYN Stealth Scan at 21:37, 0.57s elapsed (1 total ports)
1738Initiating Service scan at 21:37
1739Scanning 1 service on 2.58.141.248
1740Completed Service scan at 21:37, 14.83s elapsed (1 service on 1 host)
1741Initiating OS detection (try #1) against 2.58.141.248
1742Retrying OS detection (try #2) against 2.58.141.248
1743Initiating Traceroute at 21:38
1744Completed Traceroute at 21:38, 3.41s elapsed
1745Initiating Parallel DNS resolution of 11 hosts. at 21:38
1746Completed Parallel DNS resolution of 11 hosts. at 21:38, 1.06s elapsed
1747NSE: Script scanning 2.58.141.248.
1748Initiating NSE at 21:38
1749Completed NSE at 21:44, 391.45s elapsed
1750Initiating NSE at 21:44
1751Completed NSE at 21:44, 3.75s elapsed
1752Nmap scan report for 2.58.141.248
1753Host is up (0.48s latency).
1754
1755PORT STATE SERVICE VERSION
1756443/tcp open ssl/http Microsoft IIS httpd 10.0
1757| http-brute:
1758|_ Path "/" does not require authentication
1759|_http-chrono: Request times for /; avg: 2525.63ms; min: 1704.57ms; max: 5081.57ms
1760|_http-csrf: Couldn't find any CSRF vulnerabilities.
1761|_http-date: Sun, 24 Nov 2019 02:38:21 GMT; -1s from local time.
1762|_http-devframework: ASP.NET detected. Found related header.
1763|_http-dombased-xss: Couldn't find any DOM based XSS.
1764|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1765|_http-errors: Couldn't find any error pages.
1766|_http-feed: Couldn't find any feeds.
1767|_http-fetch: Please enter the complete path of the directory to save data in.
1768| http-headers:
1769| Cache-Control: public, no-cache="Set-Cookie", max-age=600
1770| Content-Type: text/html; charset=utf-8
1771| Expires: Sun, 24 Nov 2019 02:50:26 GMT
1772| Last-Modified: Sun, 24 Nov 2019 02:40:26 GMT
1773| Location: /Login/Ev/Giris
1774| Vary: *
1775| Server: Microsoft-IIS/10.0
1776| Set-Cookie: ASP.NET_SessionId=pfxeebes5v04mut3i5jlabl5; path=/; HttpOnly
1777| X-AspNetMvc-Version: 5.2
1778| X-AspNet-Version: 4.0.30319
1779| X-Powered-By: ASP.NET
1780| Date: Sun, 24 Nov 2019 02:40:25 GMT
1781| Content-Length: 132
1782| Set-Cookie: NSC_ESNS=a2bd2b3d-ed84-1dd9-9678-ba8b1843e7c4_2314277914_4249967649_00000000011319511970; Path=/; Expires=Sun, 24-Nov-2019 02:40:40 GMT
1783|
1784|_ (Request type: GET)
1785|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1786| http-methods:
1787|_ Supported Methods: GET POST OPTIONS
1788|_http-mobileversion-checker: No mobile version detected.
1789| http-security-headers:
1790| Strict_Transport_Security:
1791| HSTS not configured in HTTPS Server
1792| Cache_Control:
1793| Header: Cache-Control: public, no-cache="Set-Cookie", max-age=600
1794| Expires:
1795|_ Header: Expires: Sun, 24 Nov 2019 02:49:00 GMT
1796|_http-server-header: Microsoft-IIS/10.0
1797| http-sitemap-generator:
1798| Directory structure:
1799| Longest directory structure:
1800| Depth: 0
1801| Dir: /
1802| Total files found (by extension):
1803|_
1804|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1805|_http-title: Did not follow redirect to /Login/Ev/Giris
1806| http-traceroute:
1807| last-modified
1808| Hop #1: Sun, 24 Nov 2019 02:38:27 GMT
1809| Hop #2: Sun, 24 Nov 2019 02:38:28 GMT
1810|_ Hop #3: Sun, 24 Nov 2019 02:38:30 GMT
1811| http-vhosts:
1812| 124 names had status 302
1813| mysql
1814| devel
1815|_ipv6
1816|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
1817| http-waf-fingerprint:
1818| Detected WAF
1819|_ Citrix Netscaler
1820|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1821|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1822|_http-xssed: No previously reported XSS vuln.
1823| vulscan: VulDB - https://vuldb.com:
1824| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
1825| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
1826| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
1827| [139953] Microsoft Internet Explorer 10/11 memory corruption
1828| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
1829| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
1830| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
1831| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
1832| [136279] Microsoft Internet Explorer 10/11 memory corruption
1833| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
1834| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1835| [134682] Microsoft Internet Explorer 10/11 memory corruption
1836| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1837| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1838| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
1839| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1840| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1841| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1842| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1843| [131678] Microsoft Internet Explorer 10/11 memory corruption
1844| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
1845| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
1846| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
1847| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1848| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1849| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1850| [131618] Microsoft Internet Explorer 10/11 memory corruption
1851| [130827] Microsoft Internet Explorer 10/11 information disclosure
1852| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
1853| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
1854| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
1855| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
1856| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
1857| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
1858| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
1859| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1860| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1861| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1862| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1863| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
1864| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
1865| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
1866| [122846] Microsoft Internet Explorer 10/11 memory corruption
1867| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
1868| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1869| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
1870| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
1871| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
1872| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
1873| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
1874| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
1875| [115997] Microsoft Internet Explorer 10/11 memory corruption
1876| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
1877| [114567] Microsoft Internet Explorer 10/11 information disclosure
1878| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
1879| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
1880| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
1881| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
1882| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
1883| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
1884| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
1885| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
1886| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
1887| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1888| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
1889| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1890| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
1891| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
1892| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
1893| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1894| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1895| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
1896| [109365] Microsoft Internet Explorer 10/11 memory corruption
1897| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
1898| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
1899| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
1900| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
1901| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
1902| [102461] Microsoft Internet Explorer 10/11 memory corruption
1903| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
1904| [101007] Microsoft Internet Explorer 10/11 memory corruption
1905| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
1906| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
1907| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
1908| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
1909| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1910| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
1911| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1912| [97967] Microsoft Internet Explorer 10/11 memory corruption
1913| [97965] Microsoft Internet Explorer 10/11 memory corruption
1914| [94436] Microsoft Windows 10 Graphics memory corruption
1915| [94421] Microsoft Internet Explorer 10/11 information disclosure
1916| [94418] Microsoft Internet Explorer 10/11 privilege escalation
1917| [93427] Microsoft Internet Explorer 10/11 memory corruption
1918| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
1919| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
1920| [92561] Microsoft Internet Explorer 10/11 privilege escalation
1921| [92560] Microsoft Internet Explorer 10/11 privilege escalation
1922| [92557] Microsoft Internet Explorer 10/11 memory corruption
1923| [91560] Microsoft Windows 10 Object denial of service
1924| [91517] Microsoft Internet Explorer 10/11 memory corruption
1925| [91516] Microsoft Internet Explorer 10/11 privilege escalation
1926| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
1927| [90683] Microsoft Internet Explorer 10/11 information disclosure
1928| [89020] Microsoft Internet Explorer 10/11 information disclosure
1929| [89010] Microsoft Internet Explorer 10/11 memory corruption
1930| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1931| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
1932| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
1933| [87139] Microsoft Internet Explorer 10/11 information disclosure
1934| [82246] Microsoft Internet Explorer 10/11 memory corruption
1935| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
1936| [81271] Microsoft Windows 10 PDF Library memory corruption
1937| [81249] Microsoft Internet Explorer 10/11 memory corruption
1938| [81243] Microsoft Internet Explorer 10 memory corruption
1939| [80845] Microsoft Internet Explorer 10 memory corruption
1940| [80843] Microsoft Internet Explorer 10 memory corruption
1941| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
1942| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
1943| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
1944| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
1945| [79515] Microsoft Windows 10 Kernel memory corruption
1946| [79473] Microsoft Internet Explorer 10 memory corruption
1947| [79466] Microsoft Internet Explorer 10/11 memory corruption
1948| [79463] Microsoft Internet Explorer 10 memory corruption
1949| [79158] Microsoft Internet Explorer 10/11 memory corruption
1950| [79157] Microsoft Internet Explorer 10/11 memory corruption
1951| [79139] Microsoft Internet Explorer 10/11 memory corruption
1952| [78383] Microsoft Internet Explorer 10/11 privilege escalation
1953| [78382] Microsoft Internet Explorer 10 memory corruption
1954| [77643] Microsoft Internet Explorer 10/11 memory corruption
1955| [77597] Microsoft Internet Explorer 10/11 File denial of service
1956| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
1957| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
1958| [77005] Microsoft Internet Explorer 10/11 memory corruption
1959| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
1960| [76488] Microsoft Internet Explorer 10/11 File information disclosure
1961| [76487] Microsoft Internet Explorer 10/11 memory corruption
1962| [76475] Microsoft Internet Explorer 10/11 memory corruption
1963| [76436] Microsoft Internet Explorer 10/11 memory corruption
1964| [75781] Microsoft Internet Explorer 10/11 memory corruption
1965| [75777] Microsoft Internet Explorer 10 memory corruption
1966| [75767] Microsoft Internet Explorer 10/11 privilege escalation
1967| [75766] Microsoft Internet Explorer 10/11 memory corruption
1968| [75765] Microsoft Internet Explorer 10/11 memory corruption
1969| [75762] Microsoft Internet Explorer 10/11 memory corruption
1970| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
1971| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
1972| [75324] Microsoft Internet Explorer 10/11 memory corruption
1973| [74857] Microsoft Internet Explorer 10/11 memory corruption
1974| [73944] Microsoft Internet Explorer 10/11 memory corruption
1975| [73942] Microsoft Internet Explorer 10 memory corruption
1976| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
1977| [69144] Microsoft Internet Explorer 10/11 memory corruption
1978| [69141] Microsoft Internet Explorer 10/11 privilege escalation
1979| [69138] Microsoft Internet Explorer 10/11 memory corruption
1980| [69126] Microsoft Internet Explorer 10/11 memory corruption
1981| [69122] Microsoft Internet Explorer 10/11 memory corruption
1982| [69117] Microsoft Internet Explorer 10/11 memory corruption
1983| [69115] Microsoft Internet Explorer 10 memory corruption
1984| [69114] Microsoft Internet Explorer 10 memory corruption
1985| [68398] Microsoft Internet Explorer 10 memory corruption
1986| [68180] Microsoft Internet Explorer 10/11 privilege escalation
1987| [68179] Microsoft Internet Explorer 10/11 privilege escalation
1988| [68168] Microsoft Internet Explorer 10/11 memory corruption
1989| [67810] Microsoft Internet Explorer 10/11 memory corruption
1990| [67504] Microsoft Internet Explorer 10/11 memory corruption
1991| [67495] Microsoft Internet Explorer 10 memory corruption
1992| [67493] Microsoft Internet Explorer 10/11 memory corruption
1993| [67491] Microsoft Internet Explorer 10/11 memory corruption
1994| [67486] Microsoft Internet Explorer 10 memory corruption
1995| [67482] Microsoft Internet Explorer 10/11 memory corruption
1996| [67352] Microsoft Internet Explorer 10/11 memory corruption
1997| [67347] Microsoft Internet Explorer 10/11 memory corruption
1998| [67344] Microsoft Internet Explorer 10/11 memory corruption
1999| [67341] Microsoft Internet Explorer 10/11 memory corruption
2000| [67334] Microsoft Internet Explorer 10 memory corruption
2001| [67330] Microsoft Internet Explorer 10/11 memory corruption
2002| [67329] Microsoft Internet Explorer 10/11 memory corruption
2003| [67004] Microsoft Internet Explorer 10/11 memory corruption
2004| [13537] Microsoft Internet Explorer 10/11 memory corruption
2005| [13535] Microsoft Internet Explorer 10/11 memory corruption
2006| [13530] Microsoft Internet Explorer 10/11 memory corruption
2007| [13529] Microsoft Internet Explorer 10/11 memory corruption
2008| [13523] Microsoft Internet Explorer 10/11 memory corruption
2009| [13516] Microsoft Internet Explorer 10/11 memory corruption
2010| [13513] Microsoft Internet Explorer 10/11 memory corruption
2011| [13510] Microsoft Internet Explorer 10/11 memory corruption
2012| [13507] Microsoft Internet Explorer 10 memory corruption
2013| [13506] Microsoft Internet Explorer 10 memory corruption
2014| [13498] Microsoft Internet Explorer 10/11 memory corruption
2015| [13495] Microsoft Internet Explorer 10/11 information disclosure
2016| [13491] Microsoft Internet Explorer 10/11 memory corruption
2017| [12546] Microsoft Internet Explorer 10/11 memory corruption
2018| [12544] Microsoft Internet Explorer 10/11 memory corruption
2019| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
2020| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
2021| [11433] Microsoft Internet Explorer 10 memory corruption
2022| [10625] Microsoft Internet Explorer 10 memory corruption
2023| [10624] Microsoft Internet Explorer 10 memory corruption
2024| [10621] Microsoft Internet Explorer 10 memory corruption
2025| [10620] Microsoft Internet Explorer 10 memory corruption
2026| [10219] Microsoft Internet Explorer 10 memory corruption
2027| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
2028| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
2029| [9411] Microsoft Internet Explorer 10 memory corruption
2030| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
2031| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
2032| [9090] Microsoft Internet Explorer 10 memory corruption
2033| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
2034| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
2035| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
2036| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
2037| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
2038| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
2039| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
2040|
2041| MITRE CVE - https://cve.mitre.org:
2042| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
2043| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
2044| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2045| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2046| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
2047| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
2048| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
2049| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
2050| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
2051| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
2052| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
2053| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2054| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
2055| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
2056| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
2057| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
2058| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
2059| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
2060| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
2061| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
2062| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
2063| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
2064| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
2065| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
2066| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
2067| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
2068| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
2069| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
2070| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
2071| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
2072| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
2073| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
2074| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
2075| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
2076| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
2077| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
2078| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
2079| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
2080| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
2081| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
2082| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
2083| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
2084| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
2085| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
2086| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
2087| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
2088| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
2089| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
2090| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
2091| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
2092| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
2093| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
2094| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
2095| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
2096| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
2097| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
2098| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
2099| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
2100| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
2101| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
2102| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
2103| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
2104| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
2105| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
2106| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
2107| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
2108| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
2109| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
2110| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
2111| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
2112| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
2113| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
2114| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
2115| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
2116| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
2117| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
2118| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
2119| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
2120| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
2121| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
2122| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
2123| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
2124| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
2125| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
2126| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
2127| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
2128| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
2129| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
2130| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
2131| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
2132| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
2133| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
2134| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
2135| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
2136| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
2137| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
2138| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
2139| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
2140| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
2141| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
2142| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
2143| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
2144| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
2145| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
2146|
2147| SecurityFocus - https://www.securityfocus.com/bid/:
2148| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
2149|
2150| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2151| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
2152| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
2153|
2154| Exploit-DB - https://www.exploit-db.com:
2155| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
2156| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
2157|
2158| OpenVAS (Nessus) - http://www.openvas.org:
2159| [855384] Solaris Update for snmp/mibiisa 108870-36
2160| [855273] Solaris Update for snmp/mibiisa 108869-36
2161| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
2162|
2163| SecurityTracker - https://www.securitytracker.com:
2164| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
2165|
2166| OSVDB - http://www.osvdb.org:
2167| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
2168| [87262] Microsoft IIS FTP Command Injection Information Disclosure
2169| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
2170| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
2171| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
2172| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
2173| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
2174| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
2175| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
2176| [71856] Microsoft IIS Status Header Handling Remote Overflow
2177| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
2178| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
2179| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
2180| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
2181| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
2182| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
2183| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
2184| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
2185| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
2186| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
2187| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
2188| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
2189| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
2190| [59892] Microsoft IIS Malformed Host Header Remote DoS
2191| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
2192| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
2193| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
2194| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
2195| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
2196| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
2197| [55269] Microsoft IIS Traversal GET Request Remote DoS
2198| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
2199| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
2200| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
2201| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
2202| [52238] Microsoft IIS IDC Extension XSS
2203| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
2204| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
2205| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
2206| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
2207| [43451] Microsoft IIS HTTP Request Smuggling
2208| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
2209| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
2210| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
2211| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
2212| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
2213| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
2214| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
2215| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
2216| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
2217| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
2218| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
2219| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
2220| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
2221| [27152] Microsoft Windows IIS ASP Page Processing Overflow
2222| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
2223| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
2224| [21805] Microsoft IIS Crafted URL Remote DoS
2225| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
2226| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
2227| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
2228| [17124] Microsoft IIS Malformed WebDAV Request DoS
2229| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
2230| [17122] Microsoft IIS Permission Weakness .COM File Upload
2231| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
2232| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
2233| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
2234| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
2235| [13760] Microsoft IIS Malformed URL Request DoS
2236| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
2237| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
2238| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
2239| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
2240| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
2241| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
2242| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
2243| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
2244| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
2245| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
2246| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
2247| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
2248| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
2249| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
2250| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
2251| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
2252| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
2253| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
2254| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
2255| [11257] Microsoft IIS Malformed GET Request DoS
2256| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
2257| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
2258| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
2259| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
2260| [9200] Microsoft IIS Unspecified XSS Variant
2261| [9199] Microsoft IIS shtml.dll XSS
2262| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
2263| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
2264| [7737] Microsoft IIS ASP Redirection Function XSS
2265| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
2266| [5851] Microsoft IIS Single Dot Source Code Disclosure
2267| [5736] Microsoft IIS Relative Path System Privilege Escalation
2268| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
2269| [5633] Microsoft IIS Invalid WebDAV Request DoS
2270| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
2271| [5584] Microsoft IIS URL Redirection Malformed Length DoS
2272| [5566] Microsoft IIS Form_VBScript.asp XSS
2273| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
2274| [4864] Microsoft IIS TRACK Logging Failure
2275| [4863] Microsoft IIS Active Server Page Header DoS
2276| [4791] Microsoft IIS Response Object DoS
2277| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
2278| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
2279| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
2280| [3500] Microsoft IIS fpcount.exe Remote Overflow
2281| [3341] Microsoft IIS Redirect Response XSS
2282| [3339] Microsoft IIS HTTP Error Page XSS
2283| [3338] Microsoft IIS Help File XSS
2284| [3328] Microsoft IIS FTP Status Request DoS
2285| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
2286| [3325] Microsoft IIS HTR ISAPI Overflow
2287| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
2288| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
2289| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
2290| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
2291| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
2292| [3231] Microsoft IIS Log Bypass
2293| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
2294| [1931] Microsoft IIS MIME Content-Type Header DoS
2295| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
2296| [1826] Microsoft IIS Domain Guest Account Disclosure
2297| [1824] Microsoft IIS FTP DoS
2298| [1804] Microsoft IIS Long Request Parsing Remote DoS
2299| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
2300| [1750] Microsoft IIS File Fragment Disclosure
2301| [1543] Microsoft NT/IIS Invalid URL Request DoS
2302| [1504] Microsoft IIS File Permission Canonicalization Bypass
2303| [1465] Microsoft IIS .htr Missing Variable DoS
2304| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
2305| [1322] Microsoft IIS Malformed .htr Request DoS
2306| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
2307| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
2308| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
2309| [1170] Microsoft IIS Escape Character URL Access Bypass
2310| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
2311| [1082] Microsoft IIS Domain Resolution Access Bypass
2312| [1041] Microsoft IIS Malformed HTTP Request Header DoS
2313| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
2314| [930] Microsoft IIS Shared ASP Cache Information Disclosure
2315| [929] Microsoft IIS FTP Server NLST Command Overflow
2316| [928] Microsoft IIS Long Request Log Evasion
2317| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
2318| [814] Microsoft IIS global.asa Remote Information Disclosure
2319| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
2320| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
2321| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
2322| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
2323| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
2324| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
2325| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
2326| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
2327| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
2328| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
2329| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
2330| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
2331| [473] Microsoft IIS Multiple .cnf File Information Disclosure
2332| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
2333| [470] Microsoft IIS Form_JScript.asp XSS
2334| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
2335| [436] Microsoft IIS Unicode Remote Command Execution
2336| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
2337| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
2338| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
2339| [308] Microsoft IIS Malformed File Extension URL DoS
2340| [285] Microsoft IIS repost.asp File Upload
2341| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
2342| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
2343| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
2344| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
2345| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
2346| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
2347| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
2348| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
2349| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
2350| [98] Microsoft IIS perl.exe HTTP Path Disclosure
2351| [97] Microsoft IIS ISM.DLL HTR Request Overflow
2352| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
2353| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
2354| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
2355| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
2356| [2] Microsoft IIS ExAir search.asp Direct Request DoS
2357| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
2358| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
2359| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
2360| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
2361| [96192] Microsoft IE EUC-JP Character Encoding XSS
2362| [96191] Microsoft IE Process Integrity Level Assignment Bypass
2363| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
2364| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
2365| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
2366| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
2367| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
2368| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
2369| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
2370| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
2371| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
2372| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
2373| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
2374| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
2375| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
2376| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
2377| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
2378| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
2379| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
2380| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
2381| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
2382| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
2383| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
2384| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
2385| [94984] Microsoft IE Shift JIS Character Encoding XSS
2386| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
2387| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
2388| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
2389| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
2390| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
2391| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
2392| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
2393| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
2394| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
2395| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
2396| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
2397| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
2398| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
2399| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
2400| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
2401| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
2402| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
2403| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
2404| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
2405| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
2406| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
2407| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
2408| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
2409| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
2410| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
2411| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
2412| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
2413| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
2414| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
2415| [94507] Microsoft IE Infinite Loop DoS
2416| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
2417| [94127] Microsoft Office PNG File Handling Buffer Overflow
2418| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
2419| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
2420| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
2421| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
2422| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
2423| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
2424| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
2425| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
2426| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
2427| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
2428| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
2429| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
2430| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
2431| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
2432| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
2433| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
2434| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
2435| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
2436| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
2437| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
2438| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
2439| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
2440| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
2441| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
2442| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
2443| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
2444| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
2445| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
2446| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
2447| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
2448| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
2449| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
2450| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
2451| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
2452| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
2453| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
2454| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
2455| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
2456| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
2457| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
2458| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
2459| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
2460| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
2461| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
2462| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
2463| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2464| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
2465| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
2466| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
2467| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
2468| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
2469| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
2470| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
2471| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
2472| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
2473| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
2474| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
2475| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
2476| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
2477| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
2478| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
2479| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
2480| [92257] Microsoft IE CSS Import Handling Remote DoS
2481| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
2482| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
2483| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
2484| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
2485| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
2486| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
2487| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
2488| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
2489| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
2490| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
2491| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
2492| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
2493| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
2494| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
2495| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
2496| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
2497| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
2498| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
2499| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
2500| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
2501| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
2502| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
2503| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
2504| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
2505| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
2506| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
2507| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
2508| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
2509| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
2510| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
2511| [91150] Microsoft SharePoint Unspecified XSS
2512| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
2513| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
2514| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
2515| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
2516| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
2517| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
2518| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
2519| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
2520| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
2521| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
2522| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
2523| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
2524| [90933] Microsoft IE Arbitrary HTM File Execution
2525| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
2526| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
2527| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
2528| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
2529| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
2530| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
2531| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
2532| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
2533| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
2534| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
2535| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
2536| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
2537| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
2538| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
2539| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
2540| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
2541| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
2542| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
2543| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
2544| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
2545| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
2546| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
2547| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
2548| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
2549| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
2550| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
2551| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
2552| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
2553| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
2554| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
2555| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
2556| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
2557| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
2558| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
2559| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
2560| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
2561| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
2562| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
2563| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
2564| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
2565| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
2566| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
2567| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
2568| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
2569| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
2570| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
2571| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
2572| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
2573| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
2574| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
2575| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
2576| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
2577| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
2578| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
2579| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
2580| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
2581| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
2582| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
2583| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
2584| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
2585| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
2586| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
2587| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
2588| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
2589| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
2590| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
2591| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
2592| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
2593| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
2594| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
2595| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
2596| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
2597| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
2598| [88837] Microsoft Office Excel Memory Corruption DoS
2599| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
2600| [88811] Microsoft Visio VSD File Parsing Memory Corruption
2601| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
2602| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
2603| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
2604| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
2605| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
2606| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
2607| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2608| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
2609| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
2610| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
2611| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
2612| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
2613| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
2614| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
2615| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
2616| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
2617| [87819] Microsoft Office OneNote File Handling Memory Corruption
2618| [87273] Microsoft Office Excel XLS File Handling Overflow
2619| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
2620| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
2621| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
2622| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
2623| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
2624| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
2625| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
2626| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
2627| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
2628| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
2629| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
2630| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
2631| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
2632| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
2633| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
2634| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
2635| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
2636| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
2637| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
2638| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
2639| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
2640| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
2641| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
2642| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
2643| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
2644| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
2645| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
2646| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
2647| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
2648| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
2649| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
2650| [86732] Microsoft Office DOC File Handling Stack Overflow
2651| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
2652| [86622] Microsoft SQL Server Local Authentication Bypass
2653| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
2654| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
2655| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
2656| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
2657| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
2658| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
2659| [86057] Microsoft SQL Server Report Manager Unspecified XSS
2660| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
2661| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
2662| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
2663| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
2664| [85833] Microsoft Outlook Concealed Attachment Weakness
2665| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
2666| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
2667| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
2668| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
2669| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
2670| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
2671| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
2672| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
2673| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
2674| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
2675| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
2676| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
2677| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
2678| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
2679| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
2680| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
2681| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
2682| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
2683| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
2684| [84606] Microsoft Visio DXF File Handling Overflow
2685| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
2686| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
2687| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
2688| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
2689| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
2690| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
2691| [84599] Microsoft Windows Print Spooler Service Remote Format String
2692| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
2693| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
2694| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
2695| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
2696| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
2697| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
2698| [84553] Microsoft Help &
2699| [83860] Microsoft IE XML Data Handling Arbitrary File Access
2700| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
2701| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
2702| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
2703| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
2704| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
2705| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
2706| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
2707| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
2708| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
2709| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
2710| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
2711| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2712| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
2713| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
2714| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
2715| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
2716| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
2717| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
2718| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
2719| [83647] Microsoft SharePoint Username Unspecified XSS
2720| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
2721| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
2722| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
2723| [83439] Microsoft IE Long Unicode String Handling DoS
2724| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
2725| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
2726| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
2727| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
2728| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
2729| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
2730| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
2731| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
2732| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
2733| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
2734| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
2735| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
2736| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
2737| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
2738| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
2739| [82862] Microsoft IE EUC-JP Character Encoding XSS
2740| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
2741| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
2742| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
2743| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
2744| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
2745| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
2746| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
2747| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
2748| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
2749| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2750| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
2751| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
2752| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
2753| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
2754| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
2755| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
2756| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
2757| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
2758| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
2759| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
2760| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
2761| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
2762| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
2763| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
2764| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
2765| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
2766| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
2767| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
2768| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
2769| [81732] Microsoft Office RTF Data Handling Memory Corruption
2770| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
2771| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
2772| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
2773| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
2774| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
2775| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
2776| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
2777| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
2778| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
2779| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
2780| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
2781| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
2782| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
2783| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
2784| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
2785| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
2786| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
2787| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
2788| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
2789| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
2790| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
2791| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
2792| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
2793| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
2794| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
2795| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
2796| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
2797| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
2798| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
2799| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
2800| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
2801| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
2802| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
2803| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
2804| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
2805| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
2806| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
2807| [80173] Microsoft IE Unspecified Overflow
2808| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
2809| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
2810| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
2811| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
2812| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
2813| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
2814| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
2815| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
2816| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
2817| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
2818| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
2819| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
2820| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
2821| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
2822| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
2823| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
2824| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
2825| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
2826| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
2827| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
2828| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
2829| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
2830| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
2831| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
2832| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
2833| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
2834| [79192] Microsoft IE Javascript Dialog Origin Spoofing
2835| [79186] Microsoft IE onunload Location Field Overwrite
2836| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
2837| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
2838| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
2839| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
2840| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
2841| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
2842| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
2843| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
2844| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
2845| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
2846| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
2847| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
2848| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
2849| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
2850| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
2851| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
2852| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
2853| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
2854| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
2855| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
2856| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
2857| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
2858| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
2859| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
2860| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
2861| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
2862| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
2863| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
2864| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
2865| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
2866| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
2867| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
2868| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
2869| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
2870| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
2871| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
2872| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
2873| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
2874| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
2875| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
2876| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
2877| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
2878| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
2879| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
2880| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
2881| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
2882| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
2883| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
2884| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
2885| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
2886| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
2887| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
2888| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
2889| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
2890| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
2891| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
2892| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
2893| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
2894| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
2895| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
2896| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
2897| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
2898| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
2899| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
2900| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
2901| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
2902| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
2903| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
2904| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
2905| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
2906| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
2907| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
2908| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
2909| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
2910| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
2911| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
2912| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
2913| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
2914| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
2915| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
2916| [75393] Microsoft SharePoint Unspecified URI XSS
2917| [75391] Microsoft SharePoint Contact Details XSS
2918| [75390] Microsoft SharePoint EditForm.aspx XSS
2919| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
2920| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
2921| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
2922| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
2923| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
2924| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
2925| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
2926| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
2927| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
2928| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
2929| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
2930| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
2931| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
2932| [75250] Microsoft IE Unspecified Remote Code Execution
2933| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
2934| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
2935| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
2936| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
2937| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
2938| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
2939| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
2940| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
2941| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
2942| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
2943| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
2944| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
2945| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
2946| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
2947| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
2948| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
2949| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
2950| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
2951| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
2952| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
2953| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
2954| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
2955| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
2956| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
2957| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
2958| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
2959| [74396] Microsoft Report Viewer Control Unspecified XSS
2960| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
2961| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
2962| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
2963| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
2964| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
2965| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
2966| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
2967| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
2968| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
2969| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
2970| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
2971| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
2972| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
2973| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
2974| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
2975| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
2976| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
2977| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
2978| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
2979| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
2980| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
2981| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
2982| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
2983| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
2984| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
2985| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
2986| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
2987| [73602] Microsoft Windows nsiproxy.sys Local DoS
2988| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
2989| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
2990| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
2991| [72960] Microsoft SMB Client Response Handling Remote Code Execution
2992| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
2993| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
2994| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
2995| [72953] Microsoft IE MIME Sniffing Information Disclosure
2996| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
2997| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
2998| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
2999| [72949] Microsoft IE Drag and Drop Information Disclosure
3000| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
3001| [72947] Microsoft IE Time Element Memory Corruption
3002| [72946] Microsoft IE Drag and Drop Memory Corruption
3003| [72944] Microsoft IE SafeHTML Function XSS
3004| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
3005| [72942] Microsoft IE Link Properties Handling Memory Corruption
3006| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
3007| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
3008| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
3009| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
3010| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
3011| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
3012| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
3013| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
3014| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
3015| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
3016| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
3017| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
3018| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
3019| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
3020| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
3021| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
3022| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
3023| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
3024| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
3025| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
3026| [72696] Microsoft Reader AOLL Chunk Array Overflow
3027| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
3028| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
3029| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
3030| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
3031| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
3032| [72680] Microsoft IE UTF-7 Local Redirection XSS
3033| [72679] Microsoft IE Tags javascript:[jscodz] XSS
3034| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
3035| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
3036| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
3037| [72672] Microsoft Windows AppFix systest.sdb Local DoS
3038| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
3039| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
3040| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
3041| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
3042| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
3043| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
3044| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
3045| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
3046| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
3047| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
3048| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
3049| [71777] Microsoft IE Frame Tag Handling Information Disclosure
3050| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
3051| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
3052| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
3053| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
3054| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
3055| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
3056| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
3057| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
3058| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
3059| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
3060| [71765] Microsoft Office Excel File Validation Record Handling Overflow
3061| [71761] Microsoft Office Excel File Handling Memory Corruption
3062| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
3063| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
3064| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
3065| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
3066| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
3067| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
3068| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
3069| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
3070| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
3071| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
3072| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
3073| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
3074| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
3075| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
3076| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
3077| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
3078| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
3079| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
3080| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
3081| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
3082| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
3083| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
3084| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
3085| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
3086| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
3087| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
3088| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
3089| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
3090| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
3091| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
3092| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
3093| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
3094| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
3095| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
3096| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
3097| [71724] Microsoft IE Layouts Handling Memory Corruption
3098| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
3099| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
3100| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
3101| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
3102| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
3103| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
3104| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
3105| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
3106| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
3107| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
3108| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
3109| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
3110| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
3111| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
3112| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
3113| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
3114| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
3115| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
3116| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
3117| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
3118| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
3119| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
3120| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
3121| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
3122| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
3123| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
3124| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
3125| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
3126| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
3127| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
3128| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
3129| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
3130| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
3131| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
3132| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
3133| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
3134| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
3135| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
3136| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
3137| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
3138| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
3139| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
3140| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
3141| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
3142| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
3143| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
3144| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
3145| [69828] Microsoft IE Recursive Select Element Remote Code Execution
3146| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
3147| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
3148| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
3149| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
3150| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
3151| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
3152| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
3153| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
3154| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
3155| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
3156| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
3157| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
3158| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
3159| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
3160| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
3161| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
3162| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
3163| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
3164| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
3165| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
3166| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
3167| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
3168| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
3169| [69804] Microsoft Office PICT Image Converter Overflow
3170| [69803] Microsoft Office CGM Image Converter Overflow
3171| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
3172| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
3173| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
3174| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
3175| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
3176| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
3177| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
3178| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
3179| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
3180| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
3181| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
3182| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
3183| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
3184| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
3185| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
3186| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
3187| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
3188| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
3189| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
3190| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
3191| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
3192| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
3193| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
3194| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
3195| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
3196| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
3197| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
3198| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
3199| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
3200| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
3201| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
3202| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
3203| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
3204| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
3205| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
3206| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
3207| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
3208| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
3209| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
3210| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
3211| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
3212| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
3213| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
3214| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
3215| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
3216| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
3217| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
3218| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
3219| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
3220| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
3221| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
3222| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
3223| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
3224| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
3225| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
3226| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
3227| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
3228| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
3229| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
3230| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
3231| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
3232| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
3233| [68548] Microsoft IE / SharePoint Unspecified XSS
3234| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
3235| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
3236| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
3237| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
3238| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
3239| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
3240| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
3241| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
3242| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
3243| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
3244| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
3245| [68438] Microsoft XSS Filter Library Bypass
3246| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
3247| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
3248| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
3249| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
3250| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
3251| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
3252| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
3253| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
3254| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
3255| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
3256| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
3257| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
3258| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
3259| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
3260| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
3261| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
3262| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
3263| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
3264| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
3265| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
3266| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
3267| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
3268| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
3269| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
3270| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
3271| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
3272| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
3273| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
3274| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
3275| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
3276| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
3277| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
3278| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
3279| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
3280| [67463] Microsoft IE location.replace Address Bar Spoofing
3281| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
3282| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
3283| [67258] Microsoft ClickOnce MITM Weakness
3284| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
3285| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
3286| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
3287| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
3288| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
3289| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
3290| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
3291| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
3292| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
3293| [67000] Microsoft IE boundElements Property Handling Memory Corruption
3294| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
3295| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
3296| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
3297| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
3298| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
3299| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
3300| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
3301| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
3302| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
3303| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
3304| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
3305| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
3306| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
3307| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
3308| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
3309| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
3310| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
3311| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
3312| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
3313| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
3314| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
3315| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
3316| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
3317| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
3318| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
3319| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
3320| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
3321| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
3322| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
3323| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
3324| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
3325| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
3326| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
3327| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
3328| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
3329| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
3330| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
3331| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
3332| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
3333| [65502] Microsoft IE Unspecified DoS
3334| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
3335| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
3336| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
3337| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
3338| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
3339| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
3340| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
3341| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
3342| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
3343| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
3344| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
3345| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
3346| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
3347| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
3348| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
3349| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
3350| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
3351| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
3352| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
3353| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
3354| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
3355| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
3356| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
3357| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
3358| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
3359| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
3360| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
3361| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
3362| [65213] Microsoft IE HTML Element Handling Memory Corruption
3363| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
3364| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
3365| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
3366| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
3367| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
3368| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
3369| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
3370| [64952] Microsoft IE img Tag Hijacking Weakness
3371| [64944] Microsoft Dynamics GP Default System Password
3372| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
3373| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
3374| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
3375| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
3376| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
3377| [64828] Microsoft IE history go ActiveX Overflow DoS
3378| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
3379| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
3380| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
3381| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
3382| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
3383| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
3384| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
3385| [64533] Microsoft IE document.createElement NULL Dereference DoS
3386| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
3387| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
3388| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
3389| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
3390| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
3391| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
3392| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
3393| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
3394| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
3395| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
3396| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
3397| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
3398| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
3399| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
3400| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
3401| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
3402| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
3403| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
3404| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
3405| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
3406| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
3407| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
3408| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
3409| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
3410| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
3411| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
3412| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
3413| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
3414| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
3415| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
3416| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
3417| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
3418| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
3419| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
3420| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
3421| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
3422| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
3423| [63334] Microsoft IE Post Encoding Information Disclosure
3424| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
3425| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
3426| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
3427| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
3428| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
3429| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
3430| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
3431| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
3432| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
3433| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
3434| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
3435| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
3436| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
3437| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
3438| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
3439| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
3440| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
3441| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
3442| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
3443| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
3444| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
3445| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
3446| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
3447| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
3448| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
3449| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
3450| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
3451| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3452| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
3453| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
3454| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
3455| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
3456| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
3457| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
3458| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
3459| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
3460| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
3461| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
3462| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
3463| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
3464| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
3465| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
3466| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
3467| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
3468| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
3469| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
3470| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
3471| [62239] Microsoft Office Powerpoint File Path Handling Overflow
3472| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
3473| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
3474| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
3475| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
3476| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
3477| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
3478| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
3479| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
3480| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
3481| [61911] Microsoft IE Table Layout Reuse Memory Corruption
3482| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
3483| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
3484| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
3485| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
3486| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
3487| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
3488| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
3489| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
3490| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
3491| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
3492| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
3493| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
3494| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
3495| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
3496| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
3497| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
3498| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
3499| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
3500| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
3501| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
3502| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
3503| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
3504| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
3505| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
3506| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
3507| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
3508| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
3509| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
3510| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
3511| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
3512| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
3513| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
3514| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
3515| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
3516| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
3517| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
3518| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
3519| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
3520| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
3521| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
3522| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
3523| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
3524| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
3525| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
3526| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
3527| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
3528| [59957] Microsoft Windows SMB Response Handling Remote DoS
3529| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
3530| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
3531| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
3532| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
3533| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
3534| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
3535| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
3536| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
3537| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
3538| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
3539| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
3540| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
3541| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
3542| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
3543| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
3544| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
3545| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
3546| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
3547| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
3548| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
3549| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
3550| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
3551| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
3552| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
3553| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
3554| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
3555| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
3556| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
3557| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
3558| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
3559| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
3560| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
3561| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
3562| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
3563| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
3564| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
3565| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
3566| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
3567| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
3568| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
3569| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
3570| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
3571| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
3572| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
3573| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
3574| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
3575| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
3576| [59263] Microsoft IE IMG Tag width Handling DoS
3577| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
3578| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
3579| [59258] Microsoft Exchange ACL Modification Update Weakness
3580| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
3581| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
3582| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
3583| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
3584| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
3585| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
3586| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
3587| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
3588| [58870] Microsoft Office BMP Image Color Processing Overflow
3589| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
3590| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
3591| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
3592| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
3593| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
3594| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
3595| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3596| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
3597| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
3598| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
3599| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
3600| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
3601| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
3602| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
3603| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
3604| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
3605| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
3606| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
3607| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
3608| [58843] Microsoft Windows Media Player ASF Handling Overflow
3609| [58817] Microsoft IE Nested marquee Tag Handling DoS
3610| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
3611| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
3612| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
3613| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
3614| [58399] Microsoft IE window.print Function Loop Remote DoS
3615| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
3616| [58350] Microsoft Patterns &
3617| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
3618| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
3619| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
3620| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
3621| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
3622| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
3623| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
3624| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
3625| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
3626| [57742] Microsoft SQL Cleartext User Passwords Disclosure
3627| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
3628| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
3629| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
3630| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
3631| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
3632| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
3633| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
3634| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
3635| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
3636| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
3637| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
3638| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
3639| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
3640| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
3641| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
3642| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
3643| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
3644| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
3645| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
3646| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
3647| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
3648| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
3649| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
3650| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
3651| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
3652| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
3653| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
3654| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
3655| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
3656| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
3657| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
3658| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
3659| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
3660| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
3661| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
3662| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
3663| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
3664| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
3665| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
3666| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
3667| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
3668| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
3669| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
3670| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
3671| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
3672| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
3673| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
3674| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
3675| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
3676| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
3677| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
3678| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
3679| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
3680| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
3681| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
3682| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
3683| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
3684| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
3685| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
3686| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
3687| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
3688| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
3689| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
3690| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
3691| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
3692| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
3693| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
3694| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
3695| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
3696| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
3697| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
3698| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
3699| [54955] Microsoft Office Excel Malformed Records Handling Overflow
3700| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
3701| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
3702| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
3703| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
3704| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
3705| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
3706| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
3707| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
3708| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
3709| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
3710| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
3711| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
3712| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
3713| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
3714| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
3715| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
3716| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
3717| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
3718| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
3719| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
3720| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
3721| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
3722| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
3723| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
3724| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
3725| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
3726| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
3727| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
3728| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
3729| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
3730| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
3731| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
3732| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
3733| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
3734| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
3735| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
3736| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
3737| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
3738| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
3739| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
3740| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
3741| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
3742| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
3743| [54183] Microsoft IE Unprintable Character Document Handling DoS
3744| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
3745| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
3746| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
3747| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
3748| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
3749| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
3750| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
3751| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
3752| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
3753| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
3754| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
3755| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
3756| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
3757| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
3758| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
3759| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
3760| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
3761| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
3762| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
3763| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
3764| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
3765| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
3766| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
3767| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
3768| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
3769| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
3770| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
3771| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
3772| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
3773| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
3774| [52694] Microsoft Windows Media Player Malformed GET Request DoS
3775| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
3776| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
3777| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
3778| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
3779| [52689] Microsoft Word Document Handling HTML Object Tag DoS
3780| [52688] Microsoft Word Document Handling HTML Object Tag XSS
3781| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
3782| [52685] Microsoft Windows FTP Client Multiple Command Overflows
3783| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
3784| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
3785| [52682] Microsoft Windows Explorer ZIP Handler DoS
3786| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
3787| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
3788| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
3789| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
3790| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
3791| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
3792| [52666] Microsoft IE Malformed file:// URI Handling DoS
3793| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
3794| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
3795| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
3796| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
3797| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
3798| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
3799| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
3800| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
3801| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
3802| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
3803| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
3804| [52517] Microsoft Windows DNS Server Query Validation Spoofing
3805| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
3806| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
3807| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
3808| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
3809| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
3810| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
3811| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
3812| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
3813| [51433] Microsoft Windows Crafted CHM File Handling Overflow
3814| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
3815| [51277] Microsoft Excel HTML Tag Interpretation XSS
3816| [51259] Microsoft IE onload=screen["
3817| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
3818| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
3819| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
3820| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
3821| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
3822| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
3823| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
3824| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
3825| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
3826| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
3827| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
3828| [50598] Microsoft Office Word Table Property Handling Overflow
3829| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
3830| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
3831| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
3832| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
3833| [50592] Microsoft Office Word Malformed Value Memory Corruption
3834| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
3835| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
3836| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
3837| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
3838| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
3839| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
3840| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
3841| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
3842| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
3843| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
3844| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
3845| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
3846| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
3847| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
3848| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
3849| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
3850| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
3851| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
3852| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
3853| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
3854| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
3855| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
3856| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
3857| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
3858| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
3859| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
3860| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
3861| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
3862| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
3863| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
3864| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
3865| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
3866| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
3867| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
3868| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
3869| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
3870| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
3871| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
3872| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
3873| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
3874| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
3875| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
3876| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
3877| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
3878| [49385] Microsoft ASP.NET Request Validation <
3879| [49384] Microsoft ASP.NET Request Validation <
3880| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
3881| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
3882| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
3883| [49118] Microsoft IE HTML Object Handling Memory Corruption
3884| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
3885| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
3886| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
3887| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
3888| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
3889| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
3890| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
3891| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
3892| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
3893| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
3894| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
3895| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
3896| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
3897| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
3898| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
3899| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
3900| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3901| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
3902| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
3903| [48837] Microsoft Windows Vista Page Fault Handling DoS
3904| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
3905| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
3906| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
3907| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
3908| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
3909| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
3910| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
3911| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
3912| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
3913| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
3914| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
3915| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
3916| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
3917| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
3918| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3919| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
3920| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
3921| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
3922| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
3923| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
3924| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
3925| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
3926| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
3927| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
3928| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
3929| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
3930| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
3931| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
3932| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
3933| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
3934| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
3935| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
3936| [47410] Microsoft Office Excel connections.xml Password String Persistence
3937| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
3938| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
3939| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
3940| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
3941| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
3942| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
3943| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
3944| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
3945| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
3946| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
3947| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
3948| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
3949| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
3950| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
3951| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
3952| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
3953| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
3954| [46935] Microsoft IE Pop Up Blocker Multiple Issues
3955| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
3956| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
3957| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
3958| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
3959| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
3960| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
3961| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
3962| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
3963| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
3964| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
3965| [46772] Microsoft SQL Server Convert Function Overflow
3966| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
3967| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
3968| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
3969| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
3970| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
3971| [46630] Microsoft IE location Window Object Handling XSS
3972| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
3973| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
3974| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
3975| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
3976| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
3977| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
3978| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
3979| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
3980| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
3981| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
3982| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
3983| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
3984| [45826] Microsoft IE Local Zone Saved File URI XSS
3985| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
3986| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
3987| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
3988| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
3989| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
3990| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
3991| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
3992| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
3993| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
3994| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
3995| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
3996| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
3997| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
3998| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
3999| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
4000| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
4001| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
4002| [45262] Microsoft ISA Server Host Header Log File Content Injection
4003| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
4004| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
4005| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
4006| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
4007| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
4008| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
4009| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
4010| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
4011| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
4012| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
4013| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
4014| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
4015| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
4016| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
4017| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
4018| [44979] Microsoft SQL Server Blank sa Password Set Weakness
4019| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
4020| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
4021| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
4022| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
4023| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
4024| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
4025| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
4026| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
4027| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
4028| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
4029| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
4030| [44303] Microsoft IE body Tag Infinite Loop DoS
4031| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
4032| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
4033| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
4034| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
4035| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
4036| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
4037| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
4038| [44205] Microsoft IE Data Stream Handling Memory Corruption
4039| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
4040| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
4041| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
4042| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
4043| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
4044| [44150] Microsoft Access Crafted MDB File Handling Overflow
4045| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
4046| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
4047| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
4048| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
4049| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
4050| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
4051| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
4052| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
4053| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
4054| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
4055| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
4056| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
4057| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
4058| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
4059| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
4060| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
4061| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
4062| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
4063| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
4064| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
4065| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
4066| [42724] Microsoft Excel Style Record Handling Memory Corruption
4067| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
4068| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
4069| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
4070| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
4071| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
4072| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
4073| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
4074| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
4075| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
4076| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
4077| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
4078| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
4079| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
4080| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
4081| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
4082| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
4083| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
4084| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
4085| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
4086| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
4087| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
4088| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
4089| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
4090| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
4091| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
4092| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
4093| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
4094| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
4095| [41155] Microsoft Windows Hardware-enforced DEP Bypass
4096| [41154] Microsoft Windows XP EFS Cleartext Password Storage
4097| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
4098| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
4099| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
4100| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
4101| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
4102| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
4103| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
4104| [41060] Microsoft .NET Unspecified XSS Filter Bypass
4105| [41059] Microsoft Windows ARP Saturation Remote DoS
4106| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
4107| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
4108| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
4109| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
4110| [41041] Microsoft IE Mouse Click self.resizeTo DoS
4111| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
4112| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
4113| [41035] Microsoft IE onload Localhost DoS
4114| [41026] Microsoft IE GET Request Overflow
4115| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
4116| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
4117| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
4118| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
4119| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
4120| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
4121| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
4122| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
4123| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
4124| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
4125| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
4126| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
4127| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
4128| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
4129| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
4130| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
4131| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
4132| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
4133| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
4134| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
4135| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
4136| [39121] Microsoft IE DHTML Object Memory Corruption
4137| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
4138| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
4139| [39118] Microsoft IE Object setExpression Function Memory Corruption
4140| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
4141| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
4142| [38955] Microsoft IE history.length Variable History Disclosure
4143| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
4144| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
4145| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
4146| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
4147| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
4148| [38495] Microsoft IE Outlook Express Address Book Activex DoS
4149| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
4150| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
4151| [38488] Microsoft ISA Server File Extension Filter Bypass
4152| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
4153| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
4154| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
4155| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
4156| [38212] Microsoft IE document.open() Function Address Bar Spoofing
4157| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
4158| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
4159| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
4160| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
4161| [37637] Microsoft Windows Crafted HLP File Overflow
4162| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
4163| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
4164| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
4165| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
4166| [37632] Microsoft Word Unspecified Memory Corruption
4167| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
4168| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
4169| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
4170| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
4171| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
4172| [37626] Microsoft IE Unspecified Address Bar Spoofing
4173| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
4174| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
4175| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
4176| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
4177| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
4178| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
4179| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
4180| [36936] Microsoft Visual Basic VBP File Handling Overflow
4181| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
4182| [36934] Microsoft Agent URL Handling Remote Code Execution
4183| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
4184| [36400] Microsoft IE HTML FTP Credential Disclosure
4185| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
4186| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
4187| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
4188| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
4189| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
4190| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
4191| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
4192| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
4193| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
4194| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
4195| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
4196| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
4197| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
4198| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
4199| [36385] Microsoft Windows Media Player Skin File Handling Overflow
4200| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
4201| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
4202| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
4203| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
4204| [36147] Microsoft IE Zone Domain Specification DoS
4205| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
4206| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
4207| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
4208| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
4209| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
4210| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
4211| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
4212| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
4213| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
4214| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
4215| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
4216| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
4217| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
4218| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
4219| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
4220| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
4221| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
4222| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
4223| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
4224| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
4225| [35637] Microsoft Windows Unspecified Remote Code Execution
4226| [35568] Microsoft IE Script Variable Length DoS
4227| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
4228| [35352] Microsoft IE navcancl.htm res: URI Phishing
4229| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
4230| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
4231| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
4232| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
4233| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
4234| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
4235| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
4236| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
4237| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
4238| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
4239| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
4240| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
4241| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
4242| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
4243| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
4244| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
4245| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
4246| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
4247| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
4248| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
4249| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
4250| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
4251| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
4252| [34401] Microsoft IE Property Method Handling Memory Corruption
4253| [34400] Microsoft IE Uninitialized Object Memory Corruption
4254| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
4255| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
4256| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
4257| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
4258| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
4259| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
4260| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
4261| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
4262| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
4263| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
4264| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
4265| [34387] Microsoft Word Data Array Handling Remote Code Execution
4266| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
4267| [34385] Microsoft Word Macro Content Arbitrary Code Execution
4268| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
4269| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
4270| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
4271| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
4272| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
4273| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
4274| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
4275| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
4276| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
4277| [34077] Microsoft IE navcancl.htm res: URI XSS
4278| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
4279| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
4280| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
4281| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
4282| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
4283| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
4284| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
4285| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
4286| [33667] Microsoft Windows Vista Persistent Established Teredo Address
4287| [33666] Microsoft Windows Vista Teredo nonce Spoofing
4288| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
4289| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
4290| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
4291| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
4292| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
4293| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
4294| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
4295| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
4296| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
4297| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
4298| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
4299| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
4300| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
4301| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
4302| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
4303| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
4304| [33271] Microsoft Word Crafted Frame CSRF
4305| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
4306| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
4307| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
4308| [32630] Microsoft IE Key Press Event Focus Redirection
4309| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
4310| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
4311| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
4312| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
4313| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
4314| [32624] Microsoft IE mhtml Overflow DoS
4315| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
4316| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
4317| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
4318| [32087] Microsoft IE onunload Event Address Bar Spoofing
4319| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
4320| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
4321| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
4322| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
4323| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
4324| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
4325| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
4326| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
4327| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
4328| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
4329| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
4330| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
4331| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
4332| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
4333| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
4334| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
4335| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
4336| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
4337| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
4338| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
4339| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
4340| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
4341| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
4342| [31645] Microsoft Windows DNS Recursive Query DoS
4343| [31333] Microsoft IE Image File Embedded Content XSS
4344| [31332] Microsoft IE Scrollbar CSS Property DoS
4345| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
4346| [31330] Microsoft IE File:// URI src Tag IFrame DoS
4347| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
4348| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
4349| [31326] Microsoft IE HTML Table Tag style Attribute DoS
4350| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
4351| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
4352| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
4353| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
4354| [31321] Microsoft IE Javascript self.location Refresh DoS
4355| [31258] Microsoft Excel Palette Record Handling Overflow
4356| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
4357| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
4358| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
4359| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
4360| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
4361| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
4362| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
4363| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
4364| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
4365| [30997] Microsoft Windows .manifest File Handling Local DoS
4366| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
4367| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
4368| [30826] Microsoft Visual Basic Click Event Procedure Overflow
4369| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
4370| [30824] Microsoft Word Malformed String Memory Corruption
4371| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
4372| [30822] Microsoft IE A Tag Long Title Attribute DoS
4373| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
4374| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
4375| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
4376| [30818] Microsoft Windows Media Player ASF Parsing Overflow
4377| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
4378| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
4379| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
4380| [30814] Microsoft IE DHTML Script Function Memory Corruption
4381| [30813] Microsoft IE Script Error Handling Memory Corruption
4382| [30811] Microsoft Windows SNMP Service Remote Overflow
4383| [30405] Microsoft Windows Active Directory Unspecified DoS
4384| [30402] Microsoft w3wp Crafted COM Component Request DoS
4385| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
4386| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
4387| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
4388| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
4389| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
4390| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
4391| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
4392| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
4393| [30087] Microsoft IE Empty APPLET Tag DoS
4394| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
4395| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
4396| [29720] Microsoft PowerPoint Unspecified Code Execution
4397| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
4398| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
4399| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
4400| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
4401| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
4402| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
4403| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
4404| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
4405| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
4406| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
4407| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
4408| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
4409| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
4410| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
4411| [29440] Microsoft Word memmove Integer Overflow
4412| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
4413| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
4414| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
4415| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
4416| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
4417| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
4418| [29426] Microsoft XML Core Services XSLT Processing Overflow
4419| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
4420| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
4421| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
4422| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
4423| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
4424| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
4425| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
4426| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
4427| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
4428| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
4429| [29129] Microsoft IE wininet.dll Content-Type DoS
4430| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
4431| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
4432| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
4433| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
4434| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
4435| [28730] Microsoft Publisher PUB File Font Parsing Overflow
4436| [28729] Microsoft Windows Indexing Service Unspecified XSS
4437| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
4438| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
4439| [28723] Microsoft Works Malformed Works Spreadsheet DoS
4440| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
4441| [28614] Microsoft IE input/div Tag width Conflict DoS
4442| [28539] Microsoft Word 2000 Unspecified Code Execution
4443| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
4444| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
4445| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
4446| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
4447| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
4448| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
4449| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
4450| [28381] Microsoft IE ActiveX SaveFile Handling DoS
4451| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
4452| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
4453| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
4454| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
4455| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
4456| [27854] Microsoft IE Chained CSS Imports Memory Corruption
4457| [27853] Microsoft IE HTML Rendering Memory Corruption
4458| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
4459| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
4460| [27850] Microsoft IE Cross Site Window Location Information Disclosure
4461| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
4462| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
4463| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
4464| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
4465| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
4466| [27844] Microsoft Windows DNS Client Service Record Response Overflow
4467| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
4468| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
4469| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
4470| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
4471| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
4472| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
4473| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
4474| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
4475| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
4476| [27373] Microsoft IE Native Function Iteration NULL Dereference
4477| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
4478| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
4479| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
4480| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
4481| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
4482| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
4483| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
4484| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
4485| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
4486| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
4487| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
4488| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
4489| [27150] Microsoft Office MSO.DLL String Processing Overflow
4490| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
4491| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
4492| [27147] Microsoft Office PNG Processing Unspecified Code Execution
4493| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
4494| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
4495| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
4496| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
4497| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
4498| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
4499| [27059] Microsoft IE FolderItem Object NULL Dereference
4500| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
4501| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
4502| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
4503| [27053] Microsoft Excel Asian Language Style Option Overflow
4504| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
4505| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
4506| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
4507| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
4508| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
4509| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
4510| [26837] Microsoft IE Frameset inside Table NULL Dereference
4511| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
4512| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
4513| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
4514| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
4515| [26527] Microsoft Excel Malformed URL String Handling Overflow
4516| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
4517| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
4518| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
4519| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
4520| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
4521| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
4522| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
4523| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
4524| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
4525| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
4526| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
4527| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
4528| [26434] Microsoft JScript Object Release Memory Corruption
4529| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
4530| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
4531| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
4532| [26430] Microsoft Windows Media Player PNG Processing Overflow
4533| [26193] Microsoft NetMeeting Unspecified Remote DoS
4534| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
4535| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
4536| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
4537| [25635] Microsoft Word Unspecified Code Execution
4538| [25501] Microsoft Windows itss.dll CHM Processing Overflow
4539| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
4540| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
4541| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
4542| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
4543| [25003] Microsoft Office mailto: Arbitrary File Access
4544| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
4545| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
4546| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
4547| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
4548| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
4549| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
4550| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
4551| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
4552| [24542] Microsoft IE Unspecified Address Bar Spoofing
4553| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
4554| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
4555| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
4556| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
4557| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
4558| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
4559| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
4560| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
4561| [24208] Microsoft .NET Framework ILDASM Overflow
4562| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
4563| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
4564| [24095] Microsoft IE Arbitrary HTA File Execution
4565| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
4566| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
4567| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
4568| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
4569| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
4570| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
4571| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
4572| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
4573| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
4574| [23657] Microsoft IE ActiveX Killbit Setting Bypass
4575| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
4576| [23608] Microsoft IE Iframe Folder Delete Weakness
4577| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
4578| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
4579| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
4580| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
4581| [23307] Microsoft IE window.status Memory Leak DoS
4582| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
4583| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
4584| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
4585| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
4586| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
4587| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
4588| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
4589| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
4590| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
4591| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
4592| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
4593| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
4594| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
4595| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
4596| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4597| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4598| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4599| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4600| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
4601| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
4602| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
4603| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
4604| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
4605| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
4606| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
4607| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
4608| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
4609| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
4610| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
4611| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
4612| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
4613| [22354] Microsoft IE Malformed table datasrc Tag DoS
4614| [22351] Microsoft IE Modal Security Dialog Race Condition
4615| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
4616| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
4617| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
4618| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
4619| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
4620| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
4621| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
4622| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
4623| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
4624| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
4625| [21562] Microsoft IE CSS Crafted p Element DoS
4626| [21536] Microsoft Windows backup File Name Extension Overflow
4627| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
4628| [21510] Microsoft Windows SynAttackProtect Bypass
4629| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
4630| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
4631| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
4632| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
4633| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
4634| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
4635| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
4636| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
4637| [20497] Microsoft Windows 98SE User32.dll Icon DoS
4638| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
4639| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
4640| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
4641| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
4642| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
4643| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
4644| [20271] Microsoft IE settimeout Function Recursion DoS
4645| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
4646| [20248] Microsoft IE Embedded Content Processing XSS
4647| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
4648| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
4649| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
4650| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
4651| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
4652| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
4653| [20199] Microsoft IE Image Saturation Handling DoS
4654| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
4655| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
4656| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
4657| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
4658| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
4659| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
4660| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
4661| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
4662| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
4663| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
4664| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
4665| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
4666| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
4667| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
4668| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
4669| [19905] Microsoft Collaboration Data Objects Remote Overflow
4670| [19904] Microsoft Windows DTC Packet Relay DoS
4671| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
4672| [19902] Microsoft Windows COM+ Remote Code Execution
4673| [19901] Microsoft Windows FTP Client Arbitrary File Write
4674| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
4675| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
4676| [19898] Microsoft Windows Web View Arbitrary Script Injection
4677| [19876] Microsoft AntiSpyware Registry Extension Bypass
4678| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
4679| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
4680| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
4681| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
4682| [19796] Microsoft IE Malformed IFRAME File Source DoS
4683| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
4684| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
4685| [19662] Microsoft IE XMLHTTP HTTP Request Injection
4686| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
4687| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
4688| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
4689| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
4690| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
4691| [19089] Microsoft IE Unspecified Remote Code Execution
4692| [19029] Microsoft IE Meta Refresh Parsing Weakness
4693| [19024] Microsoft IE Automatic MIME Detection Weakness
4694| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
4695| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
4696| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
4697| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
4698| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
4699| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
4700| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
4701| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
4702| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
4703| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
4704| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
4705| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
4706| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
4707| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
4708| [18681] Microsoft Windows XP User Account Manager Hidden User
4709| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
4710| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
4711| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
4712| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
4713| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
4714| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
4715| [18607] Microsoft Windows Print Spooler Service Remote Overflow
4716| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
4717| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
4718| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
4719| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
4720| [18493] Microsoft Windows USB Device Driver Overflow
4721| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
4722| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
4723| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
4724| [18459] Microsoft ActiveSync Sync Request Saturation DoS
4725| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
4726| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
4727| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
4728| [18152] Microsoft IE Image File Handling Remote DoS
4729| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
4730| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
4731| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
4732| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
4733| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
4734| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
4735| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
4736| [17829] Microsoft Office .doc Font Parsing Overflow
4737| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
4738| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
4739| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
4740| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
4741| [17707] Microsoft Front Page Malformed HTML Edit DoS
4742| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
4743| [17671] Microsoft Site Server viewcode.asp Information Disclosure
4744| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
4745| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
4746| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
4747| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
4748| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
4749| [17665] Microsoft Site Server Default.asp XSS
4750| [17664] Microsoft Site Server remind.asp Information Disclosure
4751| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
4752| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
4753| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
4754| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
4755| [17659] Microsoft Site Server vs.asp Information Disclosure
4756| [17658] Microsoft Site Server default.asp Information Disclosure
4757| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
4758| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
4759| [17655] Microsoft Site Server DSN.asp Information Disclosure
4760| [17654] Microsoft Site Server driver.asp Information Disclosure
4761| [17653] Microsoft Site Server domain.asp Information Disclosure
4762| [17652] Microsoft Site Server findserver.asp Information Disclosure
4763| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
4764| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
4765| [17342] Microsoft ISA Server Basic Credentials Exposure
4766| [17334] Microsoft IE Script Code Obfuscation (Ghost)
4767| [17314] Microsoft IE XML Redirect Information Disclosure
4768| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
4769| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
4770| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
4771| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
4772| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
4773| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
4774| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
4775| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
4776| [17305] Microsoft Windows HTML Help (CHM) File Overflow
4777| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
4778| [17218] Microsoft IE Stack Overflow Saturation DoS
4779| [17217] Microsoft IE Embedded File Recursion DoS
4780| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
4781| [17159] Microsoft IE Malformed FTP URL DoS
4782| [17158] Microsoft IE Crafted BMP Size Setting DoS
4783| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
4784| [17094] Microsoft IE window() Function Arbitrary Code Execution
4785| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
4786| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
4787| [16827] Microsoft WGA Multiple Method Validation Bypass
4788| [16814] Microsoft Word mcw File Processing Overflow
4789| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
4790| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
4791| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
4792| [16342] Microsoft IE Cross Site Mouse Click Disclosure
4793| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
4794| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
4795| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
4796| [15757] Microsoft SQL Server sa Account Default Null Password
4797| [15739] Microsoft Windows Malformed Image Rendering DoS
4798| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
4799| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
4800| [15480] Microsoft Outlook From Header Comma Parsing Failure
4801| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
4802| [15470] Microsoft Word Unspecified Overflow
4803| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
4804| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
4805| [15466] Microsoft IE Content Advisor Overflow
4806| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
4807| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
4808| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
4809| [15462] Microsoft Windows CSRSS Local Overflow
4810| [15461] Microsoft Windows Object Management Malformed Request DoS
4811| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
4812| [15459] Microsoft Windows Font Processing Local Privilege Escalation
4813| [15458] Microsoft Windows Message Queuing Remote Overflow
4814| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
4815| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
4816| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
4817| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
4818| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
4819| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
4820| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
4821| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
4822| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
4823| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
4824| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
4825| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
4826| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
4827| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
4828| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
4829| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
4830| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
4831| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
4832| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
4833| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
4834| [15219] Microsoft IE XML Object Arbitrary File Access
4835| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
4836| [15217] Microsoft IE input Tag Rendering DoS
4837| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
4838| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
4839| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
4840| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
4841| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
4842| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
4843| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
4844| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
4845| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
4846| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
4847| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
4848| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
4849| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
4850| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
4851| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
4852| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
4853| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
4854| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
4855| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
4856| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
4857| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
4858| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
4859| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
4860| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
4861| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
4862| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
4863| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
4864| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
4865| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
4866| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
4867| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
4868| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
4869| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
4870| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
4871| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
4872| [13609] Microsoft Windows Hyperlink Object Library Overflow
4873| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
4874| [13607] Microsoft IE CDF Cross-Domain Code Execution
4875| [13606] Microsoft IE createControlRange() Function Heap Corruption
4876| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
4877| [13604] Microsoft IE Drag-and-Drop File Injection
4878| [13602] Microsoft Windows OLE Input Validation Overflow
4879| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
4880| [13600] Microsoft Windows SMB Transaction Data Overflow
4881| [13599] Microsoft Windows License Logging Service Overflow
4882| [13597] Microsoft Windows Media Player PNG File Overflow
4883| [13596] Microsoft Windows XP Named Pipe Username Disclosure
4884| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
4885| [13594] Microsoft Office XP URL Overflow
4886| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
4887| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
4888| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
4889| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
4890| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
4891| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
4892| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
4893| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
4894| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
4895| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
4896| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
4897| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
4898| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
4899| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
4900| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
4901| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
4902| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
4903| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
4904| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
4905| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
4906| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
4907| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
4908| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
4909| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
4910| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
4911| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
4912| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
4913| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
4914| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
4915| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
4916| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
4917| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
4918| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
4919| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
4920| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
4921| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
4922| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
4923| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
4924| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
4925| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
4926| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
4927| [13330] Microsoft Windows HKLM Registry Key Locking DoS
4928| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
4929| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
4930| [13258] Microsoft IE Excel File Address Bar Spoofing
4931| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
4932| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
4933| [13132] Microsoft IE %20 URL Spoofing
4934| [13040] Microsoft IE Javascript Load Local File Path Disclosure
4935| [13020] Microsoft Windows XP RPC Cache Memory Leak
4936| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
4937| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
4938| [12862] Microsoft IE USER32.CharLowerA Exception DoS
4939| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
4940| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
4941| [12832] Microsoft Windows Indexing Service Query Overflow
4942| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
4943| [12709] Microsoft HTML Parser Malformed Javascript DoS
4944| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
4945| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
4946| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
4947| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
4948| [12625] Microsoft Windows winhlp32.exe Overflow
4949| [12624] Microsoft Windows Kernel ANI File Parsing DoS
4950| [12623] Microsoft Windows LoadImage API Overflow
4951| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
4952| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
4953| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
4954| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
4955| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
4956| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
4957| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
4958| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
4959| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
4960| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
4961| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
4962| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
4963| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
4964| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
4965| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
4966| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
4967| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
4968| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
4969| [12299] Microsoft IE FTP URL Arbitrary Command Injection
4970| [12277] Microsoft IE sysimage: Local File Existence Disclosure
4971| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
4972| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
4973| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
4974| [12163] Microsoft IE Save Picture As File Extension Spoofing
4975| [12123] Microsoft Windows ipconfig.exe Overflow
4976| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
4977| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
4978| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
4979| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
4980| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
4981| [11956] Microsoft Outlook/Express Message body NUL Character DoS
4982| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
4983| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
4984| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
4985| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
4986| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
4987| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
4988| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
4989| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
4990| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
4991| [11946] Microsoft IE/Outlook Malformed XBM File DoS
4992| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
4993| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
4994| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
4995| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
4996| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
4997| [11940] Microsoft Outlook Blocked Attachment Access
4998| [11939] Microsoft Outlook Attachment Spoofed Content Type
4999| [11938] Microsoft Outlook Express Attachment Filename Overflow
5000| [11937] Microsoft Outlook 98 Hidden Drive Access
5001| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
5002| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
5003| [11918] Microsoft IE execCommand() File Extension Spoofing
5004| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
5005| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
5006| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
5007| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
5008| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
5009| [11799] Microsoft Windows SMB Signing Group Policy Modification
5010| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
5011| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
5012| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
5013| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
5014| [11580] Microsoft IE res: URI Handler File Existence Disclosure
5015| [11479] Microsoft Windows NT Double Dot Samba Client DoS
5016| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
5017| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
5018| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
5019| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
5020| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
5021| [11473] Microsoft Windows NT Messenger Service Long Username DoS
5022| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
5023| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
5024| [11470] Microsoft Windows NT Help File Utility Overflow
5025| [11469] Microsoft Windows NT Malformed File Image Header DoS
5026| [11468] Microsoft Windows NT IOCTL Function DoS
5027| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
5028| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
5029| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
5030| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
5031| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
5032| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
5033| [11423] Microsoft Outlook Malformed Header DoS
5034| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
5035| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
5036| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
5037| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
5038| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
5039| [11416] Microsoft Outlook/Express Blank Header DoS
5040| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
5041| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
5042| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
5043| [11274] Microsoft IE "
5044| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
5045| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
5046| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
5047| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
5048| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
5049| [11170] Microsoft IE iframe Malformed base href DoS
5050| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
5051| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
5052| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
5053| [11158] Microsoft Windows NT Malformed Token Ring DoS
5054| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
5055| [11152] Microsoft IE Malformed HTML Style DoS
5056| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
5057| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
5058| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
5059| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
5060| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
5061| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
5062| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
5063| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
5064| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
5065| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
5066| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
5067| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
5068| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
5069| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
5070| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
5071| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
5072| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
5073| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
5074| [10975] Microsoft Windows NT Winpopup Long Username DoS
5075| [10967] Microsoft IE Javascript User Homepage Address Spoofing
5076| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
5077| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
5078| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
5079| [10935] Microsoft Word Macro Security Model Bypass
5080| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
5081| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
5082| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
5083| [10756] Microsoft MSN heartbeat.ocx Component Overflow
5084| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
5085| [10735] Microsoft Excel Virus Warning Mechanism Bypass
5086| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
5087| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
5088| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
5089| [10709] Microsoft IE SSL Cached Content Spoofing
5090| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
5091| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
5092| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
5093| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
5094| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
5095| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
5096| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
5097| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
5098| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
5099| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
5100| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
5101| [10693] Microsoft Windows Unspecified Kernel Local DoS
5102| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
5103| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
5104| [10690] Microsoft Windows Management APIs Local Privilege Escalation
5105| [10689] Microsoft Windows NetDDE Remote Overflow
5106| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
5107| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
5108| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
5109| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
5110| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
5111| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
5112| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
5113| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
5114| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
5115| [10615] Microsoft Windows NT linux smbmount Request DoS
5116| [10614] Microsoft Windows NT %systemroot% Path Inclusion
5117| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
5118| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
5119| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
5120| [10606] Microsoft Windows LSA NULL Policy Handle DoS
5121| [10604] Microsoft Windows NT PATH Working Directory Inclusion
5122| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
5123| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
5124| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
5125| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
5126| [10379] Microsoft SQL Server Large Query DoS
5127| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
5128| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
5129| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
5130| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
5131| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
5132| [10183] Microsoft SQL Server xp_sprintf Function DoS
5133| [10181] Microsoft SQL Server formatmessage Function DoS
5134| [10166] Microsoft SQL Server raiserror Function DoS
5135| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
5136| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
5137| [10157] Microsoft SQL Server BULK INSERT Query Overflow
5138| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
5139| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
5140| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
5141| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
5142| [10152] Microsoft SQL Server xp_printstatements Function Overflow
5143| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
5144| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
5145| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
5146| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
5147| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
5148| [10146] Microsoft SQL Server xp_sprintf Function Overflow
5149| [10145] Microsoft SQL Server formatmessage Function Overflow
5150| [10144] Microsoft SQL Server raiserror Function Overflow
5151| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
5152| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
5153| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
5154| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
5155| [10139] Microsoft SQL Server Agent Arbitrary File Creation
5156| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
5157| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
5158| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
5159| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
5160| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
5161| [10132] Microsoft SQL Server Authentication Function Remote Overflow
5162| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
5163| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
5164| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
5165| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
5166| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
5167| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
5168| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
5169| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
5170| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
5171| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
5172| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
5173| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
5174| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
5175| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
5176| [9671] Microsoft IE onUnload Address Bar Spoofing
5177| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
5178| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
5179| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
5180| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
5181| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
5182| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
5183| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
5184| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
5185| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
5186| [9348] Microsoft Windows NT Non-NTFS File System Insecure
5187| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
5188| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
5189| [9172] Microsoft IE File/Directory Existence Disclosure
5190| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
5191| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
5192| [9141] Microsoft Windows File Icon Spoofing
5193| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
5194| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
5195| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
5196| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
5197| [8941] Microsoft IE Merlin.speak Function CPU DoS
5198| [8706] Solaris mibiisa MIB Parsing Remote Overflow
5199| [8428] Microsoft NetMeeting Malformed Packets DoS
5200| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
5201| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
5202| [8335] Microsoft IE mshtml.dll Null Pointer DoS
5203| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
5204| [8277] Microsoft IE Malformed GIF Double-free DoS
5205| [8276] Microsoft IE Malformed BMP Overflow
5206| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
5207| [8243] Microsoft SMS Port 2702 DoS
5208| [8224] Microsoft IE CSS Memory Corruption DoS
5209| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
5210| [8210] Microsoft HTML Control Large Form Field DoS
5211| [8161] Microsoft Windows NT Invalid User Privileges
5212| [8160] Microsoft Windows NT File/Directory Invalid Permissions
5213| [8148] Microsoft IE Arbitrary File Write (What a Drag)
5214| [8129] Microsoft IE CSS Malformed div element DoS
5215| [8112] Microsoft Windows NT Weak Account Password Policy
5216| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
5217| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
5218| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
5219| [7963] Microsoft IE parent.window.open location.cache Script Execution
5220| [7951] Microsoft SMS Remote Control Client DoS
5221| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
5222| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
5223| [7914] Microsoft IE .FOLDER File Type Execution
5224| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
5225| [7912] Microsoft IE showHelp() Arbitrary File Execution
5226| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
5227| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
5228| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
5229| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
5230| [7905] Microsoft IE ie5setup.exe Multple Service Disable
5231| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
5232| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
5233| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
5234| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
5235| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
5236| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
5237| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
5238| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
5239| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
5240| [7895] Microsoft IE MS-DOS Device Name URL DoS
5241| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
5242| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
5243| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
5244| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
5245| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
5246| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
5247| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
5248| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
5249| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
5250| [7885] Microsoft Java Implementation Applet Tag DoS
5251| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
5252| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
5253| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
5254| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
5255| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
5256| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
5257| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
5258| [7877] Microsoft Java Virtual Machine Class.forName Overflow
5259| [7876] Microsoft IE .isp File Arbitrary Command Execution
5260| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
5261| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
5262| [7866] Microsoft IE Frame Spoofing Content Injection
5263| [7864] Microsoft IE URL History FTP Credential Disclosure
5264| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
5265| [7862] Microsoft IE User DAT File History Disclosure
5266| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
5267| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
5268| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
5269| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
5270| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
5271| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
5272| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
5273| [7854] Microsoft IE Chinese Character Scrolling DoS
5274| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
5275| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
5276| [7851] Microsoft IE Multiple Form Field DoS
5277| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
5278| [7849] Microsoft IE Javascript location.replace Recursive DoS
5279| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
5280| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
5281| [7846] Microsoft IE PNG Invalid Length Code DoS
5282| [7845] Microsoft IE Encoded URL Information Disclosure
5283| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
5284| [7843] Microsoft IE URLMON.DLL Multiple Overflows
5285| [7842] Microsoft IE File Upload Control Arbitrary File Access
5286| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
5287| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
5288| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
5289| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
5290| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
5291| [7836] Microsoft IE EMBED Tag Overflow
5292| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
5293| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
5294| [7833] Microsoft IE/OE res: Protocol Library Overflow
5295| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
5296| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
5297| [7830] Microsoft IE mk: URL Handling Remote Overflow
5298| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
5299| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
5300| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
5301| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
5302| [7825] Microsoft IE Domain Frame Arbitrary File Access
5303| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
5304| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
5305| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
5306| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
5307| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
5308| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
5309| [7818] Microsoft IE Page Redirect Authentication Credential Leak
5310| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
5311| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
5312| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
5313| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
5314| [7803] Microsoft Windows showHelp Arbitrary Code Execution
5315| [7802] Microsoft IE File Download Extension Spoofing
5316| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
5317| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
5318| [7798] Microsoft Windows Task Scheduler Remote Overflow
5319| [7793] Microsoft Outlook Express Header Validation DoS
5320| [7779] Microsoft IE AnchorClick Cross Zone Scripting
5321| [7778] Microsoft Outlook Window Opener Script Execution
5322| [7777] Microsoft Windows Media Control Preview Script Execution
5323| [7776] Microsoft IE Download Window Filename Filetype Spoofing
5324| [7775] Microsoft IE Channel Link Script Injection
5325| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
5326| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
5327| [7762] Microsoft Java Virtual Machine Cross-Site Communication
5328| [7739] Microsoft IE plugin.ocx Load() Method Overflow
5329| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
5330| [7608] Microsoft Index Server Internet Data Query Path Disclosure
5331| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
5332| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
5333| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
5334| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
5335| [7293] Microsoft Plus! Compressed Folder Password Disclosure
5336| [7202] Microsoft PowerPoint 2000 File Loader Overflow
5337| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
5338| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
5339| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
5340| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
5341| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
5342| [7117] Microsoft Windows RPC Locator Remote Overflow
5343| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
5344| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
5345| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
5346| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
5347| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
5348| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
5349| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
5350| [6965] Microsoft ISA Server 2000 SSL Packet DoS
5351| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
5352| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
5353| [6931] Microsoft IE/Outlook Double Null Character DoS
5354| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
5355| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
5356| [6742] Microsoft DirectPlay Packet Validation DoS
5357| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
5358| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
5359| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
5360| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
5361| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
5362| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
5363| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
5364| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
5365| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
5366| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
5367| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
5368| [6079] Microsoft Outlook Remote XML Loading
5369| [6074] Microsoft Windows Me HSC hcp:// URL XSS
5370| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
5371| [6031] Microsoft Exchange Multiple SMTP Command DoS
5372| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
5373| [5998] Microsoft Outlook Predictable File Caching
5374| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
5375| [5968] Microsoft Windows ARP Packet DoS
5376| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
5377| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
5378| [5936] Microsoft SMTP Service 4xx Error Code DoS
5379| [5887] Microsoft Access 97 Cleartext Password Storage
5380| [5884] Microsoft Site Server ASP Upload Remote Command Execution
5381| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
5382| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
5383| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
5384| [5694] Microsoft IE Address Bar URL Spoofing
5385| [5687] Microsoft Windows IE and Explorer Share Name Overflow
5386| [5686] Microsoft Windows Telnet Service Account Information Disclosure
5387| [5608] Microsoft NetMeeting Malformed String DoS
5388| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
5389| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
5390| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
5391| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
5392| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
5393| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
5394| [5390] Microsoft Exchange NTLM Null Session Mail Relay
5395| [5357] Microsoft Multiple Products for Mac File URL Overflow
5396| [5356] Microsoft IE for Mac Local AppleScript Invocation
5397| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
5398| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
5399| [5343] Microsoft SQL Server SQLXML root Parameter XSS
5400| [5342] Microsoft IE Malformed Web Page Zone Spoofing
5401| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
5402| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
5403| [5261] Microsoft Windows ASN.1 Double Free Code Execution
5404| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
5405| [5259] Microsoft Windows Negotiate SSP Code Execution
5406| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
5407| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
5408| [5256] Microsoft Windows Unspecified H.323 Code Execution
5409| [5255] Microsoft Windows Management Privilege Escalation
5410| [5254] Microsoft Windows Utility Manager Privilege Escalation
5411| [5253] Microsoft Windows Help and Support Center Command Execution
5412| [5252] Microsoft Windows Metafile Code Execution
5413| [5251] Microsoft Windows Winlogon Command Execution
5414| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
5415| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
5416| [5248] Microsoft Windows LSASS Remote Overflow
5417| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
5418| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
5419| [5245] Microsoft Windows RPCSS Large Length Field DoS
5420| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
5421| [5241] Microsoft Jet Database Engine Remote Code Execution
5422| [5179] Microsoft Windows 2000 microsoft-ds DoS
5423| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
5424| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
5425| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
5426| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
5427| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
5428| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
5429| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
5430| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
5431| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
5432| [5134] Microsoft IE Reference Local HTML Resource Script Execution
5433| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
5434| [5129] Microsoft IE Download File Origin Spoofing
5435| [5126] Microsoft BackOffice Authentication Bypass
5436| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
5437| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
5438| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
5439| [4951] Microsoft IE CLASSID Remote DoS
5440| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
5441| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
5442| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
5443| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
5444| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
5445| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
5446| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
5447| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
5448| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
5449| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
5450| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
5451| [4654] iisCart2000 File Upload
5452| [4627] Microsoft IE Text Control Overflow
5453| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
5454| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
5455| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
5456| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
5457| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
5458| [4186] Microsoft IE Cookie Path Traversal
5459| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
5460| [4168] Microsoft Outlook 2002 mailto URI Script Injection
5461| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
5462| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
5463| [3903] Microsoft Windows WINS Server Remote Overflow
5464| [3902] Microsoft Windows ASN.1 Library Integer Overflow
5465| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
5466| [3879] Microsoft IE File Identification Variant
5467| [3791] Microsoft IE Travel Log Arbitrary Script Execution
5468| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
5469| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
5470| [3501] Microsoft FrontPage form_results Information Disclosure
5471| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
5472| [3457] Microsoft MDAC Broadcast Reply Overflow
5473| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
5474| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
5475| [3384] Microsoft FrontPage htimage.exe Overflow
5476| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
5477| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
5478| [3381] Microsoft FrontPage imagemap.exe Overflow
5479| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
5480| [3313] Microsoft Word Form Protection Bypass
5481| [3307] Microsoft IE showHelp() Zone Restriction Bypass
5482| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
5483| [3225] Microsoft IE for Mac Information Disclosure
5484| [3213] SecureIIS Error Page Information Disclosure
5485| [3212] SecureIIS Encoded URI Arbitrary File Access
5486| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
5487| [3209] SecureIIS HTTP Request Overflow Protection Bypass
5488| [3195] Microsoft Exchange OWA REFERER Header XSS
5489| [3184] IISShield HTTP Request Bypass Ruleset
5490| [3183] iisPROTECT Encoded URL Authentication Bypass
5491| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
5492| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
5493| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
5494| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
5495| [3108] Microsoft Office 98 Macintosh Information Disclosure
5496| [3106] Microsoft Windows Password Authentication Security Point of Failure
5497| [3104] Microsoft IE PPC Overwrite Arbitrary Files
5498| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
5499| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
5500| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
5501| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
5502| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
5503| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
5504| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
5505| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
5506| [3066] Microsoft IE Custom HTTP Errors Script Injection
5507| [3065] Microsoft IE Unparsable XML File XSS
5508| [3056] Microsoft IE MSN/Alexa Information Leak
5509| [3055] Microsoft IE Spoofed URL
5510| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
5511| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
5512| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
5513| [3051] Microsoft IE MHT Web Archive Overflow
5514| [3050] Microsoft IE dragDrop Method Local File Reading
5515| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
5516| [3036] Microsoft IE dynsrc File Information Leak
5517| [3035] Microsoft WebBrowser Control t:video File Execution
5518| [3034] Microsoft IE JavaScript script src Local File Enumeration
5519| [3033] Microsoft IE Content Type/Disposition File Execution
5520| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
5521| [3031] Microsoft IE document.Open Same Origin Policy Violation
5522| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
5523| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
5524| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
5525| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
5526| [3010] Microsoft IE OWC XMLURL File Existence Verification
5527| [3009] Microsoft IE OWC Load File Existence Verification
5528| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
5529| [3007] Microsoft IE OWC LoadText Read Arbitrary File
5530| [3006] Microsoft IE OWC Script Execution
5531| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
5532| [3004] Microsoft IE Gopher Client Overflow
5533| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
5534| [3002] Microsoft IE File Extension Dot Parsing
5535| [3001] Microsoft IE XP HCP URI Handler File Deletion
5536| [2999] Microsoft IE Powerpoint Mouse-Over Execute
5537| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
5538| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
5539| [2996] Microsoft IE Object Zone Redirection
5540| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
5541| [2994] Microsoft IE (NewWindow).location.assign Save Reference
5542| [2993] Microsoft IE % URL Encoding XSS
5543| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
5544| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
5545| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
5546| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
5547| [2985] Microsoft IE execCommand Object Caching
5548| [2984] Microsoft IE getElementsByTagName Object Caching
5549| [2983] Microsoft IE getElementsByName Object Caching
5550| [2982] Microsoft IE getElementById Object Caching
5551| [2981] Microsoft IE elementFromPoint Object Caching
5552| [2980] Microsoft IE createRange Object Caching
5553| [2979] Microsoft IE external Object Caching
5554| [2978] Microsoft IE showModalDialog Object Caching
5555| [2977] Microsoft IE XML Datasource Read Local Files
5556| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
5557| [2975] Microsoft IE Back Button XSS
5558| [2974] Microsoft IE/Outlook Temporary Internet File Execution
5559| [2973] Microsoft IE Third Party Plugin Rendering XSS
5560| [2972] Microsoft IE showModalDialog Script Execution
5561| [2971] Microsoft WMP File Attachment Script Execution
5562| [2970] Microsoft IE cssText Arbitrary File Access
5563| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
5564| [2968] Microsoft IE File Download Dialog Overflow
5565| [2967] Microsoft IE Object Type Property Overflow
5566| [2966] Microsoft IE BR549.DLL Overflow
5567| [2965] Microsoft IE Cache Script Execution in My Zone
5568| [2963] Microsoft IE align HTML Converter Overflow
5569| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
5570| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
5571| [2917] Microsoft Access Known Database Attack
5572| [2801] Microsoft Word and Excel Execution of Arbitrary Code
5573| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
5574| [2784] Microsoft IE Component Function Information Disclosure
5575| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
5576| [2751] Microsoft Word Macro Name Handling Overflow
5577| [2745] Microsoft HTML Help Control Privilege Escalation
5578| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
5579| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
5580| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
5581| [2679] Microsoft Outlook Web Access XSS
5582| [2678] Microsoft Windows Overflow in ListBox and
5583| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
5584| [2675] Microsoft Windows HCP protocol Overflow
5585| [2674] Microsoft Exchange SMTP Extended Request Overflow
5586| [2670] Microsoft Windows RPC Race Condition DoS
5587| [2657] Microsoft Windows Message Queuing Service Heap Overflow
5588| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
5589| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
5590| [2642] Microsoft Windows Unauthorised Thread Termination
5591| [2592] Microsoft PowerPoint Modify Protection Bypass
5592| [2572] Microsoft BizTalk Server Insecure Permissions
5593| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
5594| [2544] Microsoft ASP.NET Request Validation Bypass
5595| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
5596| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
5597| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
5598| [2508] Microsoft Visual Basic for Applications Buffer Overflow
5599| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
5600| [2506] Microsoft Word/Works Automated Macro Execution
5601| [2453] Microsoft IE My Computer Zone Caching Issue
5602| [2451] Microsoft IE Object Data Header Type Safe File Execution
5603| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
5604| [2368] IISShield Crafted HTTP Request Filtering Bypass
5605| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
5606| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
5607| [2320] Microsoft ISA Server HTTP Error Handler XSS
5608| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
5609| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
5610| [2298] Microsoft ISA Server Error Page XSS
5611| [2291] Microsoft IE DOM Script Source Recursive DoS
5612| [2288] Microsoft Utility Manager Local Privilege Escalation
5613| [2283] Microsoft Exchange OWA Execute Arbitrary Code
5614| [2262] Microsoft Windows Media Player DHTML Local Zone Access
5615| [2247] Microsoft Windows Media Services Remote Command Execution #2
5616| [2244] Microsoft Windows 2000 ShellExecute() API Let
5617| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
5618| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
5619| [2100] Microsoft Windows RPC DCOM Interface Overflow
5620| [2096] Microsoft ISA Server SurfControl Web Filter
5621| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
5622| [2073] Microsoft Windows XP Network Share Provider Overflow
5623| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
5624| [2061] Microsoft Outlook HTML Mail Script Execution
5625| [2060] Microsoft IE Known Local File Script Execution
5626| [2051] Microsoft Windows User Shell Buffer Overflow
5627| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
5628| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
5629| [2046] Microsoft IE Forced Script Execution
5630| [2045] Microsoft IE HTML Document Directive Overflow
5631| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
5632| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
5633| [2041] Microsoft Office for Macintosh Network PID Checker DoS
5634| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
5635| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
5636| [2008] Microsoft IE Same Origin Policy Violation
5637| [2004] Microsoft IE Cross-frame Remote File Access
5638| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
5639| [1992] Microsoft IE Cookie Disclosure
5640| [1990] Microsoft Windows Terminal Services False IP Address
5641| [1982] Microsoft IE about: URI XSS
5642| [1978] Microsoft IE for Mac OS Download Execution
5643| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
5644| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
5645| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
5646| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
5647| [1957] Microsoft Exchange OWA Malformed Request DoS
5648| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
5649| [1934] Microsoft ISA Server Invalid URL Error Message XSS
5650| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
5651| [1932] Microsoft ISA Server H.323 Memory Leak DoS
5652| [1928] Microsoft Windows NNTP Malformed Post DoS
5653| [1915] Microsoft Windows Media Player .NSC File Overflow
5654| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
5655| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
5656| [1867] Microsoft Word Document Macro Execution
5657| [1864] Microsoft SQL Server Administrator Cached Connection
5658| [1861] Microsoft Windows Telnet Local System Call DoS
5659| [1860] Microsoft Windows Telnet Service Handle Leak DoS
5660| [1859] Microsoft Windows Telnet Multiple Sessions DoS
5661| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
5662| [1856] Microsoft Exchange OWA Embedded Script Execution
5663| [1852] Microsoft Outlook Address Book Spoofing Weakness
5664| [1840] Microsoft Windows Media Player Internet Shortcut Execution
5665| [1838] Microsoft Word .asd Macro File Execution
5666| [1837] Microsoft Word RTF Template Macro Execution
5667| [1832] Microsoft IE Spoofed SSL Certificates
5668| [1831] Microsoft IE Server Certificate Validation Failure
5669| [1820] Microsoft Index Server Search Parameter Overflow
5670| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
5671| [1764] Microsoft Windows 2000 Domain Controller DoS
5672| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
5673| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
5674| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
5675| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
5676| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
5677| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
5678| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
5679| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
5680| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
5681| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
5682| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
5683| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
5684| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
5685| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
5686| [1607] Microsoft Windows 9x Invalid Driver Type DoS
5687| [1606] Microsoft IE Cached Web Credentials Disclosure
5688| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
5689| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
5690| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
5691| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
5692| [1563] Microsoft Windows / Office DLL Search Path Weakness
5693| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
5694| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
5695| [1537] Microsoft Outlook Rich Text Format Information Disclosure
5696| [1530] Microsoft Money Cleartext Password Storage
5697| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
5698| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
5699| [1502] Microsoft IE Scriptlet Rendering
5700| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
5701| [1491] Microsoft Windows 9x IPX Ping Packet DoS
5702| [1475] Microsoft Outlook/Express Cache Bypass
5703| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
5704| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
5705| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
5706| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
5707| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
5708| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
5709| [1428] Microsoft IE/Office ActiveX Object Execution
5710| [1427] Microsoft IE VBA Code Execution
5711| [1399] Microsoft Windows 2000 Windows Station Access
5712| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
5713| [1369] Microsoft SQL Server DTS Password Disclosure
5714| [1368] Microsoft Media Encoder Request Parsing Local DoS
5715| [1358] Microsoft Windows NT HostAnnouncement DoS
5716| [1342] Microsoft IE DocumentComplete() Cross Frame Access
5717| [1341] Microsoft IE ActiveX Combined Component Attributes
5718| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
5719| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
5720| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
5721| [1297] Microsoft Windows 2000 Active Directory Object Attribute
5722| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
5723| [1272] Microsoft Excel XLM Arbitrary Macro Execution
5724| [1268] Microsoft Windows TCP/IP Printing Service DoS
5725| [1257] Microsoft Windows Media License Manager DoS
5726| [1251] Microsoft Windows MS DOS Device Name DoS
5727| [1250] Microsoft SQL Server Non-Validated Query
5728| [1244] Microsoft Clip Art Buffer Overflow
5729| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
5730| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
5731| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
5732| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
5733| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
5734| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
5735| [1188] Microsoft CIS IMAP Server Remote Overflow
5736| [1166] Microsoft Windows NT LsaLookupSids() DoS
5737| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
5738| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
5739| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
5740| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
5741| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
5742| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
5743| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
5744| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
5745| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
5746| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
5747| [1076] Microsoft Windows IP Source Routing
5748| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
5749| [1069] Microsoft IE Import/Export Favorites
5750| [1056] Microsoft Java Virtual Machine Sandbox Bypass
5751| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
5752| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
5753| [1046] Microsoft Windows telnet.exe Argument Overflow
5754| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
5755| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
5756| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
5757| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
5758| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
5759| [1010] Microsoft Windows NT Malformed LSA Request DoS
5760| [967] Microsoft Windows NT WINS Service Malformed Data DoS
5761| [945] Microsoft Windows 95/98 SMB Authentication Replay
5762| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
5763| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
5764| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
5765| [922] Microsoft NetMeeting Clipboard Remote Overflow
5766| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
5767| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
5768| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
5769| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
5770| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
5771| [863] Microsoft Exchange Malformed Mail Attribute DoS
5772| [858] Microsoft Windows NCM Handler Local Privilege Elevation
5773| [852] Microsoft Exchange EHLO Long Hostname Overflow
5774| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
5775| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
5776| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
5777| [773] Microsoft Windows 2000 Group Policy File Lock DoS
5778| [772] Microsoft Windows Multiple UNC Provider Request Overflow
5779| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
5780| [736] Microsoft Windows SMB Enumeration Information Disclosure
5781| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
5782| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
5783| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
5784| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
5785| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
5786| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
5787| [665] Microsoft Windows 95 Online Registration Information Disclosure
5788| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
5789| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
5790| [601] Microsoft Exchange Server LDAP Bind Function Overflow
5791| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
5792| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
5793| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
5794| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
5795| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
5796| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
5797| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
5798| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
5799| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
5800| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
5801| [457] Microsoft Exchange Malformed MIME Header DoS
5802| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
5803| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
5804| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
5805| [423] Microsoft Windows File Share Password Protection Bypass
5806| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
5807| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
5808| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
5809| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
5810| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
5811| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
5812| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
5813| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
5814| [334] Microsoft Windows Registry: Permission to Modify Common Paths
5815| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
5816| [331] Microsoft Windows Remote Registry Access
5817| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
5818| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
5819| [304] Microsoft Windows NT service pack level via remote registry access
5820| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
5821| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
5822| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
5823| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
5824| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
5825| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
5826| [129] Microsoft Windows NT FTP 'guest' Account
5827| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
5828| [68] Microsoft FrontPage Extensions .pwd File Permissions
5829| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
5830|_
5831Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5832OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
5833No OS matches for host
5834Network Distance: 15 hops
5835Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
5836
5837TRACEROUTE (using port 443/tcp)
5838HOP RTT ADDRESS
58391 387.47 ms 10.249.204.1
58402 387.57 ms 213.184.122.97
58413 387.54 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
58424 387.61 ms bzq-219-189-185.cablep.bezeqint.net (62.219.189.185)
58435 387.58 ms bzq-114-65-2.cust.bezeqint.net (192.114.65.2)
58446 387.65 ms bzq-219-189-126.dsl.bezeqint.net (62.219.189.126)
58457 387.71 ms bzq-179-124-42.cust.bezeqint.net (212.179.124.42)
58468 387.70 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
58479 549.14 ms if-ae-0-2.tcore1.it5-istanbul.as6453.net (195.219.50.10)
584810 224.71 ms ix-ae-22-0.tcore1.fr0-frankfurt.as6453.net (195.219.50.137)
584911 478.70 ms if-ae-0-2.tcore1.it5-istanbul.as6453.net (195.219.50.10)
585012 ... 14
585115 478.56 ms 2.58.141.248
5852
5853NSE: Script Post-scanning.
5854Initiating NSE at 21:44
5855Completed NSE at 21:44, 0.00s elapsed
5856Initiating NSE at 21:44
5857Completed NSE at 21:44, 0.00s elapsed
5858######################################################################################################################################
5859Version: 1.11.13-static
5860OpenSSL 1.0.2-chacha (1.0.2g-dev)
5861
5862Connected to 2.58.141.248
5863
5864Testing SSL server 2.58.141.248 on port 443 using SNI name 2.58.141.248
5865
5866 TLS Fallback SCSV:
5867Server does not support TLS Fallback SCSV
5868
5869 TLS renegotiation:
5870Session renegotiation not supported
5871
5872 TLS Compression:
5873Compression disabled
5874
5875 Heartbleed:
5876TLS 1.2 not vulnerable to heartbleed
5877TLS 1.1 not vulnerable to heartbleed
5878TLS 1.0 not vulnerable to heartbleed
5879
5880 Supported Server Cipher(s):
5881Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
5882Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
5883Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
5884Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
5885Accepted TLSv1.2 256 bits AES256-GCM-SHA384
5886Accepted TLSv1.2 128 bits AES128-GCM-SHA256
5887Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5888Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5889
5890 SSL Certificate:
5891Signature Algorithm: sha256WithRSAEncryption
5892RSA Key Strength: 2048
5893
5894Subject: egm.gov.tr
5895Altnames: DNS:egm.gov.tr, DNS:www.egm.gov.tr
5896Issuer: COMODO RSA Organization Validation Secure Server CA
5897
5898Not valid before: Apr 26 00:00:00 2019 GMT
5899Not valid after: Apr 25 23:59:59 2021 GMT
5900######################################################################################################################################
5901Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-23 21:46 EST
5902NSE: Loaded 47 scripts for scanning.
5903NSE: Script Pre-scanning.
5904Initiating NSE at 21:46
5905Completed NSE at 21:46, 0.00s elapsed
5906Initiating NSE at 21:46
5907Completed NSE at 21:46, 0.00s elapsed
5908Initiating Parallel DNS resolution of 1 host. at 21:46
5909Completed Parallel DNS resolution of 1 host. at 21:46, 0.02s elapsed
5910Initiating SYN Stealth Scan at 21:46
5911Scanning 2.58.141.248 [65535 ports]
5912SYN Stealth Scan Timing: About 2.70% done; ETC: 22:06 (0:18:35 remaining)
5913SYN Stealth Scan Timing: About 8.11% done; ETC: 21:59 (0:11:31 remaining)
5914SYN Stealth Scan Timing: About 16.34% done; ETC: 21:56 (0:07:46 remaining)
5915SYN Stealth Scan Timing: About 25.08% done; ETC: 21:54 (0:06:01 remaining)
5916SYN Stealth Scan Timing: About 33.57% done; ETC: 21:54 (0:04:59 remaining)
5917SYN Stealth Scan Timing: About 42.10% done; ETC: 21:54 (0:04:09 remaining)
5918SYN Stealth Scan Timing: About 52.37% done; ETC: 21:53 (0:03:12 remaining)
5919SYN Stealth Scan Timing: About 63.70% done; ETC: 21:53 (0:02:17 remaining)
5920SYN Stealth Scan Timing: About 75.00% done; ETC: 21:52 (0:01:30 remaining)
5921SYN Stealth Scan Timing: About 85.97% done; ETC: 21:52 (0:00:49 remaining)
5922Completed SYN Stealth Scan at 21:52, 349.37s elapsed (65535 total ports)
5923Initiating Service scan at 21:52
5924Initiating OS detection (try #1) against 2.58.141.248
5925Retrying OS detection (try #2) against 2.58.141.248
5926Initiating Traceroute at 21:52
5927Completed Traceroute at 21:52, 0.40s elapsed
5928Initiating Parallel DNS resolution of 2 hosts. at 21:52
5929Completed Parallel DNS resolution of 2 hosts. at 21:52, 0.17s elapsed
5930NSE: Script scanning 2.58.141.248.
5931Initiating NSE at 21:52
5932Completed NSE at 21:52, 0.00s elapsed
5933Initiating NSE at 21:52
5934Completed NSE at 21:52, 0.00s elapsed
5935Nmap scan report for 2.58.141.248
5936Host is up (0.35s latency).
5937Not shown: 65532 filtered ports
5938PORT STATE SERVICE VERSION
593925/tcp closed smtp
5940139/tcp closed netbios-ssn
5941445/tcp closed microsoft-ds
5942Too many fingerprints match this host to give specific OS details
5943Network Distance: 2 hops
5944
5945TRACEROUTE (using port 25/tcp)
5946HOP RTT ADDRESS
59471 392.98 ms 10.249.204.1
59482 392.98 ms 2.58.141.248
5949
5950NSE: Script Post-scanning.
5951Initiating NSE at 21:52
5952Completed NSE at 21:52, 0.00s elapsed
5953Initiating NSE at 21:52
5954Completed NSE at 21:52, 0.00s elapsed
5955######################################################################################################################################
5956Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-23 21:52 EST
5957NSE: Loaded 47 scripts for scanning.
5958NSE: Script Pre-scanning.
5959Initiating NSE at 21:52
5960Completed NSE at 21:52, 0.00s elapsed
5961Initiating NSE at 21:52
5962Completed NSE at 21:52, 0.00s elapsed
5963Initiating Parallel DNS resolution of 1 host. at 21:52
5964Completed Parallel DNS resolution of 1 host. at 21:52, 0.02s elapsed
5965Initiating UDP Scan at 21:52
5966Scanning 2.58.141.248 [15 ports]
5967Completed UDP Scan at 21:52, 4.91s elapsed (15 total ports)
5968Initiating Service scan at 21:52
5969Scanning 13 services on 2.58.141.248
5970Service scan Timing: About 7.69% done; ETC: 22:13 (0:19:24 remaining)
5971Completed Service scan at 21:54, 102.60s elapsed (13 services on 1 host)
5972Initiating OS detection (try #1) against 2.58.141.248
5973Retrying OS detection (try #2) against 2.58.141.248
5974Initiating Traceroute at 21:54
5975Completed Traceroute at 21:54, 7.36s elapsed
5976Initiating Parallel DNS resolution of 1 host. at 21:54
5977Completed Parallel DNS resolution of 1 host. at 21:54, 0.00s elapsed
5978NSE: Script scanning 2.58.141.248.
5979Initiating NSE at 21:54
5980Completed NSE at 21:55, 7.90s elapsed
5981Initiating NSE at 21:55
5982Completed NSE at 21:55, 2.03s elapsed
5983Nmap scan report for 2.58.141.248
5984Host is up (0.26s latency).
5985
5986PORT STATE SERVICE VERSION
598753/udp open|filtered domain
598867/udp open|filtered dhcps
598968/udp open|filtered dhcpc
599069/udp open|filtered tftp
599188/udp open|filtered kerberos-sec
5992123/udp open|filtered ntp
5993137/udp filtered netbios-ns
5994138/udp filtered netbios-dgm
5995139/udp open|filtered netbios-ssn
5996161/udp open|filtered snmp
5997162/udp open|filtered snmptrap
5998389/udp open|filtered ldap
5999500/udp open|filtered isakmp
6000|_ike-version: ERROR: Script execution failed (use -d to debug)
6001520/udp open|filtered route
60022049/udp open|filtered nfs
6003Too many fingerprints match this host to give specific OS details
6004
6005TRACEROUTE (using port 138/udp)
6006HOP RTT ADDRESS
60071 162.93 ms 10.249.204.1
60082 ... 3
60094 339.73 ms 10.249.204.1
60105 415.88 ms 10.249.204.1
60116 415.87 ms 10.249.204.1
60127 415.87 ms 10.249.204.1
60138 415.87 ms 10.249.204.1
60149 415.84 ms 10.249.204.1
601510 254.22 ms 10.249.204.1
601611 ... 18
601719 163.24 ms 10.249.204.1
601820 341.52 ms 10.249.204.1
601921 ... 27
602028 162.98 ms 10.249.204.1
602129 ...
602230 165.33 ms 10.249.204.1
6023
6024NSE: Script Post-scanning.
6025Initiating NSE at 21:55
6026Completed NSE at 21:55, 0.00s elapsed
6027Initiating NSE at 21:55
6028Completed NSE at 21:55, 0.00s elapsed
6029#######################################################################################################################################
6030 Anonymous JTSEC #OpTurkey Full Recon #12