· 6 years ago · Nov 30, 2019, 06:04 PM
1#######################################################################################################################################
2======================================================================================================================================
3Hostname www.trade.gov.tr ISP Turk Telekom
4Continent Asia Flag
5TR
6Country Turkey Country Code TR
7Region Ankara Local time 30 Nov 2019 17:22 +03
8City Ankara Postal Code 06200
9IP Address 95.0.51.12 Latitude 39.962
10 Longitude 32.787
11=======================================================================================================================================
12#######################################################################################################################################
13> www.trade.gov.tr
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.trade.gov.tr
19Address: 95.0.51.12
20>
21#######################################################################################################################################
22** Domain Name: trade.gov.tr
23
24** Registrant:
25 T.C Ekonomi Bakanlığı
26 T.C. Ekonomi Bakanlığı Bilgi İşlem Dairesi
27 Başkanlığı İnönü Bulvarı No:36 Emek
28 Ankara,
29 Türkiye
30 oktay.ustundag@ekonomi.gov.tr
31 + 90-312-2047971-
32 + 90-312-2152061
33
34
35** Administrative Contact:
36NIC Handle : teb48-metu
37Organization Name : T.C. Ekonomi Bakanlığı
38Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
39 No: 63 PK: 06530 Çankaya/ANKARA
40 Ankara,06510
41 Türkiye
42Phone : + 90-312-2048125-
43Fax : + 90-312-2122061-
44
45
46** Technical Contact:
47NIC Handle : teb48-metu
48Organization Name : T.C. Ekonomi Bakanlığı
49Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
50 No: 63 PK: 06530 Çankaya/ANKARA
51 Ankara,06510
52 Türkiye
53Phone : + 90-312-2048125-
54Fax : + 90-312-2122061-
55
56
57** Billing Contact:
58NIC Handle : teb48-metu
59Organization Name : T.C. Ekonomi Bakanlığı
60Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
61 No: 63 PK: 06530 Çankaya/ANKARA
62 Ankara,06510
63 Türkiye
64Phone : + 90-312-2048125-
65Fax : + 90-312-2122061-
66
67
68** Domain Servers:
69ns1.ekonomi.gov.tr
70ns2.ekonomi.gov.tr
71
72** Additional Info:
73Created on..............: 2010-Oct-13.
74Expires on..............: 2021-Oct-12.
75#######################################################################################################################################
76[+] Target : www.trade.gov.tr
77
78[+] IP Address : 95.0.51.12
79
80[+] Headers :
81
82[+] Cache-Control : private
83[+] Content-Type : text/html; charset=utf-8
84[+] Server : Microsoft-IIS/10.0
85[+] X-AspNetMvc-Version : 5.2
86[+] X-AspNet-Version : 4.0.30319
87[+] X-Powered-By : ASP.NET
88[+] Access-Control-Allow-Origin : *
89[+] Date : Sat, 30 Nov 2019 14:27:42 GMT
90[+] Content-Length : 50217
91
92[+] SSL Certificate Information :
93
94[+] organizationalUnitName : Domain Control Validated
95[+] commonName : *.trade.gov.tr
96[+] countryName : BE
97[+] organizationName : GlobalSign nv-sa
98[+] commonName : AlphaSSL CA - SHA256 - G2
99[+] Version : 3
100[+] Serial Number : 08DB1C3F0DE8DFCB304E9721
101[+] Not Before : Jul 19 15:39:48 2018 GMT
102[+] Not After : Jul 19 15:39:48 2020 GMT
103[+] OCSP : ('http://ocsp2.globalsign.com/gsalphasha2g2',)
104[+] subject Alt Name : (('DNS', '*.trade.gov.tr'), ('DNS', 'trade.gov.tr'))
105[+] CA Issuers : ('http://secure2.alphassl.com/cacert/gsalphasha2g2r1.crt',)
106[+] CRL Distribution Points : ('http://crl2.alphassl.com/gs/gsalphasha2g2.crl',)
107
108[+] Whois Lookup :
109
110[+] NIR : None
111[+] ASN Registry : ripencc
112[+] ASN : 9121
113[+] ASN CIDR : 95.0.0.0/17
114[+] ASN Country Code : TR
115[+] ASN Date : 2008-10-14
116[+] ASN Description : TTNET, TR
117[+] cidr : 95.0.51.0/24
118[+] name : Turkish_Customs_Administrations
119[+] handle : MKG18-RIPE
120[+] range : 95.0.51.0 - 95.0.51.255
121[+] description : Anafartalar Cad. No:6 Kat:14 Ulus Ankara TURKEY
122[+] country : TR
123[+] state : None
124[+] city : None
125[+] address : Anafartalar Cad. No:6 Kat:14 Ulus Ankara TURKEY
126[+] postal_code : None
127[+] emails : None
128[+] created : 2011-12-12T14:08:41Z
129[+] updated : 2011-12-12T14:08:41Z
130
131[+] Crawling Target...
132
133[+] Looking for robots.txt........[ Not Found ]
134[+] Looking for sitemap.xml.......[ Not Found ]
135[+] Extracting CSS Links..........[ 1 ]
136[+] Extracting Javascript Links...[ 1 ]
137[+] Extracting Internal Links.....[ 2 ]
138[+] Extracting External Links.....[ 6 ]
139[+] Extracting Images.............[ 19 ]
140
141[+] Total Links Extracted : 29
142
143[+] Dumping Links in /opt/FinalRecon/dumps/www.trade.gov.tr.dump
144[+] Completed!
145#######################################################################################################################################
146[i] Scanning Site: https://www.trade.gov.tr
147
148
149
150B A S I C I N F O
151====================
152
153
154[+] Site Title: Republic of Turkey - Ministry of Trade
155[+] IP address: 95.0.51.12
156[+] Web Server: Microsoft-IIS/10.0
157[+] CMS: Could Not Detect
158[+] Cloudflare: Not Detected
159[+] Robots File: Could NOT Find robots.txt!
160
161
162
163
164W H O I S L O O K U P
165========================
166
167 ** Domain Name: trade.gov.tr
168
169** Registrant:
170 T.C Ekonomi Bakanlığı
171 T.C. Ekonomi Bakanlığı Bilgi İşlem Dairesi
172 Başkanlığı İnönü Bulvarı No:36 Emek
173 Ankara,
174 Türkiye
175 oktay.ustundag@ekonomi.gov.tr
176 + 90-312-2047971-
177 + 90-312-2152061
178
179
180** Administrative Contact:
181NIC Handle : teb48-metu
182Organization Name : T.C. Ekonomi Bakanlığı
183Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
184 No: 63 PK: 06530 Çankaya/ANKARA
185 Ankara,06510
186 Türkiye
187Phone : + 90-312-2048125-
188Fax : + 90-312-2122061-
189
190
191** Technical Contact:
192NIC Handle : teb48-metu
193Organization Name : T.C. Ekonomi Bakanlığı
194Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
195 No: 63 PK: 06530 Çankaya/ANKARA
196 Ankara,06510
197 Türkiye
198Phone : + 90-312-2048125-
199Fax : + 90-312-2122061-
200
201
202** Billing Contact:
203NIC Handle : teb48-metu
204Organization Name : T.C. Ekonomi Bakanlığı
205Address : T.C. Ekonomi Bakanlığı Söğütözü Mah. 2176. Sk.
206 No: 63 PK: 06530 Çankaya/ANKARA
207 Ankara,06510
208 Türkiye
209Phone : + 90-312-2048125-
210Fax : + 90-312-2122061-
211
212
213** Domain Servers:
214ns1.ekonomi.gov.tr
215ns2.ekonomi.gov.tr
216
217** Additional Info:
218Created on..............: 2010-Oct-13.
219Expires on..............: 2021-Oct-12.
220
221
222
223
224G E O I P L O O K U P
225=========================
226
227[i] IP Address: 95.0.51.12
228[i] Country: Turkey
229[i] State: Ankara
230[i] City: Ankara
231[i] Latitude: 39.9619
232[i] Longitude: 32.7916
233
234
235
236
237H T T P H E A D E R S
238=======================
239
240
241[i] HTTP/1.1 200 OK
242[i] Cache-Control: private
243[i] Content-Type: text/html; charset=utf-8
244[i] Server: Microsoft-IIS/10.0
245[i] Set-Cookie: ASP.NET_SessionId=0r0pxk1n452ihp1oq1qnxqko; path=/; HttpOnly
246[i] X-AspNetMvc-Version: 5.2
247[i] X-AspNet-Version: 4.0.30319
248[i] X-Powered-By: ASP.NET
249[i] Access-Control-Allow-Origin: *
250[i] Date: Sat, 30 Nov 2019 14:28:07 GMT
251[i] Connection: close
252[i] Content-Length: 50217
253
254
255
256
257D N S L O O K U P
258===================
259
260trade.gov.tr. 3599 IN A 95.0.51.12
261trade.gov.tr. 3599 IN NS ns2.ekonomi.gov.tr.
262trade.gov.tr. 3599 IN NS ns3.ekonomi.gov.tr.
263trade.gov.tr. 3599 IN NS ns2.
264trade.gov.tr. 3599 IN NS ns1.ekonomi.gov.tr.
265trade.gov.tr. 3599 IN SOA ns1.ekonomi.gov.tr. hostmaster. 25 900 600 86400 3600
266trade.gov.tr. 3599 IN MX 10 mail2.ekonomi.gov.tr.
267trade.gov.tr. 3599 IN TXT "v=spf1 redirect=ekonomi.gov.tr"
268
269
270
271
272S U B N E T C A L C U L A T I O N
273====================================
274
275Address = 95.0.51.12
276Network = 95.0.51.12 / 32
277Netmask = 255.255.255.255
278Broadcast = not needed on Point-to-Point links
279Wildcard Mask = 0.0.0.0
280Hosts Bits = 0
281Max. Hosts = 1 (2^0 - 0)
282Host Range = { 95.0.51.12 - 95.0.51.12 }
283
284
285
286N M A P P O R T S C A N
287============================
288
289Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-30 14:28 UTC
290Nmap scan report for trade.gov.tr (95.0.51.12)
291Host is up (0.13s latency).
292rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
293
294PORT STATE SERVICE
29521/tcp filtered ftp
29622/tcp filtered ssh
29723/tcp filtered telnet
29880/tcp open http
299110/tcp filtered pop3
300143/tcp filtered imap
301443/tcp open https
3023389/tcp filtered ms-wbt-server
303
304Nmap done: 1 IP address (1 host up) scanned in 3.12 seconds
305
306
307
308S U B - D O M A I N F I N D E R
309==================================
310
311
312[i] Total Subdomains Found : 2
313
314[+] Subdomain: test.trade.gov.tr
315[-] IP: 95.0.51.12
316
317[+] Subdomain: www.trade.gov.tr
318[-] IP: 95.0.51.12
319
320######################################################################################################################################
321[+] Starting At 2019-11-30 09:28:06.941748
322[+] Collecting Information On: https://www.trade.gov.tr/
323[#] Status: 200
324--------------------------------------------------
325[#] Web Server Detected: Microsoft-IIS/10.0
326[#] X-Powered-By: ASP.NET
327[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
328[+] CORS Wildcard Detected !
329- Cache-Control: private
330- Content-Type: text/html; charset=utf-8
331- Server: Microsoft-IIS/10.0
332- Set-Cookie: ASP.NET_SessionId=43aez2fip52vtlcllls5l4ii; path=/; HttpOnly
333- X-AspNetMvc-Version: 5.2
334- X-AspNet-Version: 4.0.30319
335- X-Powered-By: ASP.NET
336- Access-Control-Allow-Origin: *
337- Date: Sat, 30 Nov 2019 14:28:07 GMT
338- Content-Length: 50217
339--------------------------------------------------
340[#] Finding Location..!
341[#] status: success
342[#] country: Turkey
343[#] countryCode: TR
344[#] region: 42
345[#] regionName: Konya
346[#] city: Konya
347[#] zip:
348[#] lat: 37.8912
349[#] lon: 32.4806
350[#] timezone: Europe/Istanbul
351[#] isp: Turk Telekomunikasyon Anonim Sirketi
352[#] org: Turkish Customs Administrations
353[#] as: AS9121 Turk Telekomunikasyon Anonim Sirketi
354[#] query: 95.0.51.12
355--------------------------------------------------
356[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
357--------------------------------------------------
358[#] Starting Reverse DNS
359[!] Found 4 any Domain
360- ticaret.gov.tr
361- trade.gov.tr
362- www.ticaret.gov.tr
363- www.trade.gov.tr
364--------------------------------------------------
365[!] Scanning Open Port
366[#] 80/tcp open http
367[#] 443/tcp open https
368--------------------------------------------------
369[+] Collecting Information Disclosure!
370[#] Detecting sitemap.xml file
371[-] sitemap.xml file not Found!?
372[#] Detecting robots.txt file
373[-] robots.txt file not Found!?
374[#] Detecting GNU Mailman
375[-] GNU Mailman App Not Detected!?
376--------------------------------------------------
377[+] Crawling Url Parameter On: https://www.trade.gov.tr/
378--------------------------------------------------
379[#] Searching Html Form !
380[-] No Html Form Found!?
381--------------------------------------------------
382[!] Found 9 dom parameter
383[#] https://www.trade.gov.tr//#
384[#] https://www.trade.gov.tr//#
385[#] https://www.trade.gov.tr//#
386[#] https://www.trade.gov.tr//#
387[#] https://www.trade.gov.tr//#
388[#] https://www.trade.gov.tr//#
389[#] https://www.trade.gov.tr//#
390[#] https://www.trade.gov.tr//#
391[#] https://www.trade.gov.tr//#
392--------------------------------------------------
393[!] 1 Internal Dynamic Parameter Discovered
394[+] https://www.trade.gov.tr///v2/app.css?v=3
395--------------------------------------------------
396[!] 2 External Dynamic Parameter Discovered
397[#] http://www.yoikk.gov.tr/index.cfm?dilSecim=2
398[#] https://www.youtube.com/channel/UC9MQ2MVIMlRRzjPcsZFQ5PQ?&ab_channel=TicaretBakanl%C4%B1%C4%9F%C4%B1
399--------------------------------------------------
400[!] 53 Internal links Discovered
401[+] https://www.trade.gov.tr///kurumsal
402[+] https://www.trade.gov.tr///yurtdisi-teskilati
403[+] https://www.trade.gov.tr///ithalat
404[+] https://www.trade.gov.tr///ihracat
405[+] https://www.trade.gov.tr///hizmet-ticareti
406[+] https://www.trade.gov.tr///dis-iliskiler
407[+] https://www.trade.gov.tr///urun-guvenligi
408[+] https://www.trade.gov.tr///haberler
409[+] https://www.trade.gov.tr///ekonomi-haberleri
410[+] https://www.trade.gov.tr///ticari-haberler
411[+] https://www.trade.gov.tr///kurumsal-haberler
412[+] https://www.trade.gov.tr///destekler
413[+] https://www.trade.gov.tr///iletisim/iletisim
414[+] https://www.trade.gov.tr///
415[+] https://www.trade.gov.tr///uygulamalar
416[+] https://www.trade.gov.tr///
417[+] https://www.trade.gov.tr///about-ministry
418[+] https://www.trade.gov.tr///about-ministry/minister-of-trade
419[+] https://www.trade.gov.tr///about-ministry/gonca-yilmaz-batur
420[+] https://www.trade.gov.tr///about-ministry/sezai-ucarmak
421[+] https://www.trade.gov.tr///about-ministry/riza-tuna-turagay
422[+] https://www.trade.gov.tr///about-ministry/organizational-structure
423[+] https://www.trade.gov.tr///legislation/export
424[+] https://www.trade.gov.tr///investment/homepage
425[+] https://www.trade.gov.tr///free-zones/general-outlook
426[+] https://www.trade.gov.tr///fdi/law
427[+] https://www.trade.gov.tr///statistics/statistics
428[+] https://www.trade.gov.tr///contact/contact
429[+] https://www.trade.gov.tr///announcements/foreign-trade-expectation-survey-of-3rd-quarter-of-2019
430[+] https://www.trade.gov.tr///about-ministry/minister-of-trade
431[+] https://www.trade.gov.tr///commercial-representatives
432[+] https://www.trade.gov.tr///free-trade-agreements
433[+] https://www.trade.gov.tr///economic-outlook
434[+] https://www.trade.gov.tr///sectoral-reports
435[+] https://www.trade.gov.tr///multinational-relations
436[+] https://www.trade.gov.tr///free-zones
437[+] https://www.trade.gov.tr///sub-page2.html
438[+] https://www.trade.gov.tr///establishing-company-in-turkey
439[+] https://www.trade.gov.tr///news
440[+] https://www.trade.gov.tr///news/u-s-international-trade-in-goods-and-services-may-2019
441[+] https://www.trade.gov.tr///focus-business-turkey
442[+] https://www.trade.gov.tr/data/5da9c4b013b87619b82d2d18/FBT October 2019.pdf
443[+] https://www.trade.gov.tr///focus-business-turkey/focus-business-turkey-september-2019
444[+] https://www.trade.gov.tr///focus-business-turkey/focus-business-turkey-august-2019
445[+] https://www.trade.gov.tr/data/5d3812e413b876143465b090/FBT July 2019.pdf
446[+] https://www.trade.gov.tr///focus-business-turkey/focus-business-turkey-june-2019
447[+] https://www.trade.gov.tr///turquality
448[+] https://www.trade.gov.tr///turkish-contracting-services
449[+] https://www.trade.gov.tr///buy-turkish-products
450[+] https://www.trade.gov.tr///trade-fairs-and-buyers-mission
451[+] https://www.trade.gov.tr///turkey-and-eu
452[+] https://www.trade.gov.tr///national-contact-point-for-oecd-guidelines-for-multinational-enterprises
453[+] https://www.trade.gov.tr///2023-export-strategy
454--------------------------------------------------
455[!] 10 External links Discovered
456[#] https://cdn.ticaret.gov.tr/images/favicons/apple-touch-icon.png
457[#] https://cdn.ticaret.gov.tr/images/favicons/favicon-32x32.png
458[#] https://cdn.ticaret.gov.tr/images/favicons/favicon-16x16.png
459[#] https://cdn.ticaret.gov.tr/images/favicons/site.webmanifest
460[#] https://cdn.ticaret.gov.tr/images/favicons/safari-pinned-tab.svg
461[#] https://cdn.ticaret.gov.tr/images/favicons/favicon.ico
462[#] https://kms.kaysis.gov.tr/Home/Kurum/24308261
463[#] https://risk.gtb.gov.tr/web
464[#] https://www.ticaret.gov.tr
465[#] https://twitter.com/ticaret
466--------------------------------------------------
467[#] Mapping Subdomain..
468[!] Found 3 Subdomain
469- mail2.trade.gov.tr
470- test.trade.gov.tr
471- www.trade.gov.tr
472--------------------------------------------------
473[!] Done At 2019-11-30 09:28:54.502103
474######################################################################################################################################
475[INFO] ------TARGET info------
476[*] TARGET: https://www.trade.gov.tr/
477[*] Same target https://www.trade.gov.tr/ was previously analyzed 1 time(s)
478[*] TARGET IP: 95.0.51.12
479[INFO] NO load balancer detected for www.trade.gov.tr...
480[*] DNS servers: ns1.ekonomi.gov.tr.
481[*] TARGET server: Microsoft-IIS/10.0
482[*] CC: TR
483[*] Country: Turkey
484[*] RegionCode: 42
485[*] RegionName: Konya
486[*] City: Konya
487[*] ASN: AS9121
488[*] BGP_PREFIX: 95.0.0.0/12
489[*] ISP: TTNet Turk Telekomunikasyon Anonim Sirketi, TR
490[INFO] SSL/HTTPS certificate detected
491[*] Issuer: issuer=C = BE, O = GlobalSign nv-sa, CN = AlphaSSL CA - SHA256 - G2
492[*] Subject: subject=OU = Domain Control Validated, CN = *.trade.gov.tr
493[INFO] DNS enumeration:
494[*] mail2.trade.gov.tr 212.174.119.132
495[*] test.trade.gov.tr 95.0.51.12
496[INFO] Possible abuse mails are:
497[*] abuse@trade.gov.tr
498[*] abuse@ttnet.com.tr
499[*] abuse@www.trade.gov.tr
500[INFO] NO PAC (Proxy Auto Configuration) file FOUND
501[INFO] Starting FUZZing in http://www.trade.gov.tr/FUzZzZzZzZz...
502[INFO] Status code Folders
503[*] 200 http://www.trade.gov.tr/news
504[ALERT] Look in the source code. It may contain passwords
505
506Recherche 95.0.51.12
507Connexion HTTP à 95.0.51.12
508Envoi de la requête HTTP.
509Requête HTTP envoyée. Attente de réponse.
510HTTP/1.1 302 Found
511Transfert de données terminé
512HTTP/1.1 302 Found
513Utilisation de https://95.0.51.12/
514Recherche 95.0.51.12
515Connexion HTTPS à 95.0.51.12
516Alerte ! : Unable to make secure connection to remote host.
517
518lynx : accès impossible au fichier de départ http://95.0.51.12/
519[INFO] Links found from https://www.trade.gov.tr/ http://95.0.51.12/:
520[*] https://kms.kaysis.gov.tr/Home/Kurum/24308261
521[*] https://risk.gtb.gov.tr/web
522[*] https://twitter.com/ticaret
523[*] https://www.ticaret.gov.tr/
524[*] https://www.trade.gov.tr/
525[*] https://www.trade.gov.tr/2023-export-strategy
526[*] https://www.trade.gov.tr/about-ministry
527[*] https://www.trade.gov.tr/about-ministry/gonca-yilmaz-batur
528[*] https://www.trade.gov.tr/about-ministry/minister-of-trade
529[*] https://www.trade.gov.tr/about-ministry/organizational-structure
530[*] https://www.trade.gov.tr/about-ministry/riza-tuna-turagay
531[*] https://www.trade.gov.tr/about-ministry/sezai-ucarmak
532[*] https://www.trade.gov.tr/announcements/foreign-trade-expectation-survey-of-3rd-quarter-of-2019
533[*] https://www.trade.gov.tr/buy-turkish-products
534[*] https://www.trade.gov.tr/commercial-representatives
535[*] https://www.trade.gov.tr/contact/contact
536[*] https://www.trade.gov.tr/data/5d3812e413b876143465b090/FBT July 2019.pdf
537[*] https://www.trade.gov.tr/data/5da9c4b013b87619b82d2d18/FBT October 2019.pdf
538[*] https://www.trade.gov.tr/destekler
539[*] https://www.trade.gov.tr/dis-iliskiler
540[*] https://www.trade.gov.tr/economic-outlook
541[*] https://www.trade.gov.tr/ekonomi-haberleri
542[*] https://www.trade.gov.tr/establishing-company-in-turkey
543[*] https://www.trade.gov.tr/fdi/law
544[*] https://www.trade.gov.tr/focus-business-turkey
545[*] https://www.trade.gov.tr/focus-business-turkey/focus-business-turkey-august-2019
546[*] https://www.trade.gov.tr/focus-business-turkey/focus-business-turkey-june-2019
547[*] https://www.trade.gov.tr/focus-business-turkey/focus-business-turkey-september-2019
548[*] https://www.trade.gov.tr/free-trade-agreements
549[*] https://www.trade.gov.tr/free-zones
550[*] https://www.trade.gov.tr/free-zones/general-outlook
551[*] https://www.trade.gov.tr/haberler
552[*] https://www.trade.gov.tr/hizmet-ticareti
553[*] https://www.trade.gov.tr/ihracat
554[*] https://www.trade.gov.tr/iletisim/iletisim
555[*] https://www.trade.gov.tr/investment/homepage
556[*] https://www.trade.gov.tr/ithalat
557[*] https://www.trade.gov.tr/kurumsal
558[*] https://www.trade.gov.tr/kurumsal-haberler
559[*] https://www.trade.gov.tr/legislation/export
560[*] https://www.trade.gov.tr/multinational-relations
561[*] https://www.trade.gov.tr/national-contact-point-for-oecd-guidelines-for-multinational-enterprises
562[*] https://www.trade.gov.tr/news
563[*] https://www.trade.gov.tr/news/u-s-international-trade-in-goods-and-services-may-2019
564[*] https://www.trade.gov.tr/sectoral-reports
565[*] https://www.trade.gov.tr/statistics/statistics
566[*] https://www.trade.gov.tr/sub-page2.html
567[*] https://www.trade.gov.tr/ticari-haberler
568[*] https://www.trade.gov.tr/trade-fairs-and-buyers-mission
569[*] https://www.trade.gov.tr/turkey-and-eu
570[*] https://www.trade.gov.tr/turkish-contracting-services
571[*] https://www.trade.gov.tr/turquality
572[*] https://www.trade.gov.tr/urun-guvenligi
573[*] https://www.trade.gov.tr/uygulamalar
574[*] https://www.trade.gov.tr/yurtdisi-teskilati
575[*] https://www.youtube.com/channel/UC9MQ2MVIMlRRzjPcsZFQ5PQ?&ab_channel=TicaretBakanl%C4%B1%C4%9F%C4%B1
576[*] http://www.yoikk.gov.tr/index.cfm?dilSecim=2
577cut: intervalle de champ incorrecte
578Saisissez « cut --help » pour plus d'informations.
579[INFO] BING shows 95.0.51.12 is shared with 30,900 hosts/vhosts
580[INFO] Shodan detected the following opened ports on 95.0.51.12:
581[*] 3
582[*] 443
583[*] 7
584[*] 8
585[*] 80
586[INFO] ------VirusTotal SECTION------
587[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
588[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
589[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
590[INFO] ------Alexa Rank SECTION------
591[INFO] Percent of Visitors Rank in Country:
592[INFO] Percent of Search Traffic:
593[INFO] Percent of Unique Visits:
594[INFO] Total Sites Linking In:
595[*] Total Sites
596[INFO] Useful links related to www.trade.gov.tr - 95.0.51.12:
597[*] https://www.virustotal.com/pt/ip-address/95.0.51.12/information/
598[*] https://www.hybrid-analysis.com/search?host=95.0.51.12
599[*] https://www.shodan.io/host/95.0.51.12
600[*] https://www.senderbase.org/lookup/?search_string=95.0.51.12
601[*] https://www.alienvault.com/open-threat-exchange/ip/95.0.51.12
602[*] http://pastebin.com/search?q=95.0.51.12
603[*] http://urlquery.net/search.php?q=95.0.51.12
604[*] http://www.alexa.com/siteinfo/www.trade.gov.tr
605[*] http://www.google.com/safebrowsing/diagnostic?site=www.trade.gov.tr
606[*] https://censys.io/ipv4/95.0.51.12
607[*] https://www.abuseipdb.com/check/95.0.51.12
608[*] https://urlscan.io/search/#95.0.51.12
609[*] https://github.com/search?q=95.0.51.12&type=Code
610[INFO] Useful links related to AS9121 - 95.0.0.0/12:
611[*] http://www.google.com/safebrowsing/diagnostic?site=AS:9121
612[*] https://www.senderbase.org/lookup/?search_string=95.0.0.0/12
613[*] http://bgp.he.net/AS9121
614[*] https://stat.ripe.net/AS9121
615[INFO] Date: 30/11/19 | Time: 09:30:06
616[INFO] Total time: 2 minute(s) and 3 second(s)
617######################################################################################################################################
618Trying "trade.gov.tr"
619;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7769
620;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 4, ADDITIONAL: 2
621
622;; QUESTION SECTION:
623;trade.gov.tr. IN ANY
624
625;; ANSWER SECTION:
626trade.gov.tr. 0 IN TXT "v=spf1 redirect=ekonomi.gov.tr"
627trade.gov.tr. 0 IN MX 10 mail2.ekonomi.gov.tr.
628trade.gov.tr. 0 IN SOA ns1.ekonomi.gov.tr. hostmaster. 25 900 600 86400 3600
629trade.gov.tr. 0 IN A 95.0.51.12
630trade.gov.tr. 0 IN NS ns1.ekonomi.gov.tr.
631trade.gov.tr. 0 IN NS ns3.ekonomi.gov.tr.
632trade.gov.tr. 0 IN NS ns2.
633trade.gov.tr. 0 IN NS ns2.ekonomi.gov.tr.
634
635;; AUTHORITY SECTION:
636trade.gov.tr. 2505 IN NS ns1.ekonomi.gov.tr.
637trade.gov.tr. 2505 IN NS ns3.ekonomi.gov.tr.
638trade.gov.tr. 2505 IN NS ns2.
639trade.gov.tr. 2505 IN NS ns2.ekonomi.gov.tr.
640
641;; ADDITIONAL SECTION:
642ns2.ekonomi.gov.tr. 43200 IN A 212.174.119.212
643ns1.ekonomi.gov.tr. 43200 IN A 212.174.119.211
644
645Received 324 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 1228 ms
646#######################################################################################################################################
647; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace trade.gov.tr any
648;; global options: +cmd
649. 80387 IN NS g.root-servers.net.
650. 80387 IN NS b.root-servers.net.
651. 80387 IN NS i.root-servers.net.
652. 80387 IN NS d.root-servers.net.
653. 80387 IN NS a.root-servers.net.
654. 80387 IN NS c.root-servers.net.
655. 80387 IN NS f.root-servers.net.
656. 80387 IN NS l.root-servers.net.
657. 80387 IN NS e.root-servers.net.
658. 80387 IN NS k.root-servers.net.
659. 80387 IN NS j.root-servers.net.
660. 80387 IN NS m.root-servers.net.
661. 80387 IN NS h.root-servers.net.
662. 80387 IN RRSIG NS 8 0 518400 20191213050000 20191130040000 22545 . s6CUca4axVYgPnaCzRUHGiuICEJKUvle32Pab+HYhLMu8djsCiCN1pa9 m9NNI1dxJsLqIDyR9FpugJ0sd3o9u4DqoqQd/L7YUgAw8SJ4ey6KyVYT HT4moZ9o5OgcOJncsv+jmWMXRwS3K4H1Qw/AI88ywGVN5xL4g4BgjP3+ /yUS5JUGmrbcy0FnqvW2cx4rcuzkMxQg6x9Rei+kEklrfYdgTkbgJeFc xCRE9rH6ikE7RrtTCV3HgeJdYUz/DhMVP5ISFS6adqfyEi7c1El+CeDz TVyplOYBnpQIQMx4+0ONRNv2GwVpYNd8hphNb84WyU0ZUak3K4KwSwka TPalaA==
663;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 243 ms
664
665tr. 172800 IN NS ns21.nic.tr.
666tr. 172800 IN NS ns22.nic.tr.
667tr. 172800 IN NS ns31.nic.tr.
668tr. 172800 IN NS ns41.nic.tr.
669tr. 172800 IN NS ns42.nic.tr.
670tr. 172800 IN NS ns91.nic.tr.
671tr. 172800 IN NS ns92.nic.tr.
672tr. 86400 IN NSEC trade. NS RRSIG NSEC
673tr. 86400 IN RRSIG NSEC 8 1 86400 20191213050000 20191130040000 22545 . EHN0QhlnHfGekR/XHP5fY1IBWRQOzEK5Xy6GsmC/CilFnLGA9OI9co6c L6ZbTIgc4RC/+wClNhMlZjtACMcYaRy9rSK26+R++FAOxT9ePCCvd7Pb 6EdgxLnq0XPqpXNNoZMT4paSRClZQhyeAJLfFKuDkeMpiHFp7e9AUeYO UiSRb7k4O4LcmL9B3OpHpsFiN01Ux4jottEkBOwwghVfABUX0FUzRPn2 KbxuARzALtcDn0o5G42jTJwv32emek+Odg0wJ6whezOytio6ADQP5M/K jd/kBZXDBuR3lOGAWdK1tB1CKY5yQJNYeiU040cCNr4oRyIZ/L9DwcBW V6MlLg==
674;; Received 716 bytes from 192.58.128.30#53(j.root-servers.net) in 175 ms
675
676trade.gov.tr. 43200 IN NS ns1.ekonomi.gov.tr.
677trade.gov.tr. 43200 IN NS ns2.ekonomi.gov.tr.
678;; Received 117 bytes from 162.88.55.1#53(ns92.nic.tr) in 339 ms
679
680;; Connection to 212.174.119.212#53(212.174.119.212) for trade.gov.tr failed: connection refused.
681;; Connection to 212.174.119.211#53(212.174.119.211) for trade.gov.tr failed: connection refused.
682######################################################################################################################################
683[*] Processing domain trade.gov.tr
684[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
685[+] Getting nameservers
686212.174.119.212 - ns2.ekonomi.gov.tr
687212.174.119.211 - ns1.ekonomi.gov.tr
688[-] Zone transfer failed
689
690[+] TXT records found
691"v=spf1 redirect=ekonomi.gov.tr"
692
693[+] MX records found, added to target list
69410 mail2.ekonomi.gov.tr.
695
696[*] Scanning trade.gov.tr for A records
69795.0.51.12 - trade.gov.tr
698212.174.119.132 - mail2.trade.gov.tr
69995.0.51.12 - test.trade.gov.tr
700#######################################################################################################################################
701Domains still to check: 1
702 Checking if the hostname trade.gov.tr. given is in fact a domain...
703
704Analyzing domain: trade.gov.tr.
705 Checking NameServers using system default resolver...
706 IP: 212.174.119.211 (Turkey)
707 HostName: ns1.ekonomi.gov.tr Type: NS
708 HostName: 212.174.119.211.static.ttnet.com.tr Type: PTR
709 IP: 212.174.119.212 (Turkey)
710 HostName: ns2.ekonomi.gov.tr Type: NS
711 HostName: 212.174.119.212.static.ttnet.com.tr Type: PTR
712
713 Checking MailServers using system default resolver...
714 IP: 212.174.119.132 (Turkey)
715 HostName: mail2.ekonomi.gov.tr Type: MX
716 HostName: mail2.economy.gov.tr Type: PTR
717
718 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
719 No zone transfer found on nameserver 212.174.119.211
720 No zone transfer found on nameserver 212.174.119.212
721
722 Checking SPF record...
723
724 Checking 192 most common hostnames using system default resolver...
725 IP: 95.0.51.12 (Turkey)
726 HostName: www.trade.gov.tr. Type: A
727 IP: 95.0.51.12 (Turkey)
728 HostName: www.trade.gov.tr. Type: A
729 HostName: test.trade.gov.tr. Type: A
730 HostName: 95.0.51.12.static.ttnet.com.tr Type: PTR
731
732 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
733 Checking netblock 95.0.51.0
734 Checking netblock 212.174.119.0
735
736 Searching for trade.gov.tr. emails in Google
737 helsinki@trade.gov.tr.
738 soysalc@trade.gov.tr
739
740 Checking 4 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
741 Host 95.0.51.12 is up (reset ttl 64)
742 Host 212.174.119.132 is up (reset ttl 64)
743 Host 212.174.119.211 is up (reset ttl 64)
744 Host 212.174.119.212 is up (reset ttl 64)
745
746 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
747 Scanning ip 95.0.51.12 (95.0.51.12.static.ttnet.com.tr (PTR)):
748 80/tcp open http syn-ack ttl 115 Microsoft IIS httpd 10.0
749 |_http-server-header: Microsoft-IIS/10.0
750 443/tcp open ssl/http syn-ack ttl 114 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
751 |_http-server-header: Microsoft-HTTPAPI/2.0
752 |_http-title: Not Found
753 | ssl-cert: Subject: commonName=*.ticaret.gov.tr
754 | Subject Alternative Name: DNS:*.ticaret.gov.tr, DNS:ticaret.gov.tr
755 | Issuer: commonName=AlphaSSL CA - SHA256 - G2/organizationName=GlobalSign nv-sa/countryName=BE
756 | Public Key type: rsa
757 | Public Key bits: 2048
758 | Signature Algorithm: sha256WithRSAEncryption
759 | Not valid before: 2018-07-13T14:07:33
760 | Not valid after: 2020-07-13T14:07:33
761 | MD5: d4da aac5 0f1d fc22 958d fd58 5979 c669
762 |_SHA-1: 42f9 3e6d 754c 5492 9cc9 0640 24c9 5232 0112 2195
763 |_ssl-date: 2019-11-30T15:21:55+00:00; -1s from scanner time.
764 | tls-alpn:
765 | h2
766 |_ http/1.1
767 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
768 |_clock-skew: -1s
769 Scanning ip 212.174.119.132 (mail2.economy.gov.tr (PTR)):
770 2000/tcp open cisco-sccp? syn-ack ttl 52
771 5060/tcp open sip? syn-ack ttl 52
772 Scanning ip 212.174.119.211 (212.174.119.211.static.ttnet.com.tr (PTR)):
773 2000/tcp open cisco-sccp? syn-ack ttl 52
774 5060/tcp open sip? syn-ack ttl 53
775 Scanning ip 212.174.119.212 (212.174.119.212.static.ttnet.com.tr (PTR)):
776 2000/tcp open cisco-sccp? syn-ack ttl 52
777 5060/tcp open sip? syn-ack ttl 52
778 WebCrawling domain's web servers... up to 50 max links.
779
780 + URL to crawl: http://www.trade.gov.tr.
781 + Date: 2019-11-30
782
783 + Crawling URL: http://www.trade.gov.tr.:
784 + Links:
785 + Crawling http://www.trade.gov.tr. ([Errno -2] Name or service not known)
786 + Searching for directories...
787 + Searching open folders...
788
789
790 + URL to crawl: http://test.trade.gov.tr.
791 + Date: 2019-11-30
792
793 + Crawling URL: http://test.trade.gov.tr.:
794 + Links:
795 + Crawling http://test.trade.gov.tr. (400 Bad Request)
796 + Searching for directories...
797 + Searching open folders...
798
799
800 + URL to crawl: https://www.trade.gov.tr.
801 + Date: 2019-11-30
802
803 + Crawling URL: https://www.trade.gov.tr.:
804 + Links:
805 + Crawling https://www.trade.gov.tr. ([Errno 104] Connection reset by peer)
806 + Searching for directories...
807 + Searching open folders...
808
809
810 + URL to crawl: https://test.trade.gov.tr.
811 + Date: 2019-11-30
812
813 + Crawling URL: https://test.trade.gov.tr.:
814 + Links:
815 + Crawling https://test.trade.gov.tr. ([Errno 104] Connection reset by peer)
816 + Searching for directories...
817 + Searching open folders...
818
819--Finished--
820Summary information for domain trade.gov.tr.
821-----------------------------------------
822 Domain Specific Information:
823 Email: helsinki@trade.gov.tr.
824 Email: soysalc@trade.gov.tr
825
826 Domain Ips Information:
827 IP: 95.0.51.12
828 HostName: www.trade.gov.tr. Type: A
829 HostName: test.trade.gov.tr. Type: A
830 HostName: 95.0.51.12.static.ttnet.com.tr Type: PTR
831 Country: Turkey
832 Is Active: True (reset ttl 64)
833 Port: 80/tcp open http syn-ack ttl 115 Microsoft IIS httpd 10.0
834 Script Info: |_http-server-header: Microsoft-IIS/10.0
835 Port: 443/tcp open ssl/http syn-ack ttl 114 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
836 Script Info: |_http-server-header: Microsoft-HTTPAPI/2.0
837 Script Info: |_http-title: Not Found
838 Script Info: | ssl-cert: Subject: commonName=*.ticaret.gov.tr
839 Script Info: | Subject Alternative Name: DNS:*.ticaret.gov.tr, DNS:ticaret.gov.tr
840 Script Info: | Issuer: commonName=AlphaSSL CA - SHA256 - G2/organizationName=GlobalSign nv-sa/countryName=BE
841 Script Info: | Public Key type: rsa
842 Script Info: | Public Key bits: 2048
843 Script Info: | Signature Algorithm: sha256WithRSAEncryption
844 Script Info: | Not valid before: 2018-07-13T14:07:33
845 Script Info: | Not valid after: 2020-07-13T14:07:33
846 Script Info: | MD5: d4da aac5 0f1d fc22 958d fd58 5979 c669
847 Script Info: |_SHA-1: 42f9 3e6d 754c 5492 9cc9 0640 24c9 5232 0112 2195
848 Script Info: |_ssl-date: 2019-11-30T15:21:55+00:00; -1s from scanner time.
849 Script Info: | tls-alpn:
850 Script Info: | h2
851 Script Info: |_ http/1.1
852 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
853 Script Info: |_clock-skew: -1s
854 IP: 212.174.119.132
855 HostName: mail2.ekonomi.gov.tr Type: MX
856 HostName: mail2.economy.gov.tr Type: PTR
857 Country: Turkey
858 Is Active: True (reset ttl 64)
859 Port: 2000/tcp open cisco-sccp? syn-ack ttl 52
860 Port: 5060/tcp open sip? syn-ack ttl 52
861 IP: 212.174.119.211
862 HostName: ns1.ekonomi.gov.tr Type: NS
863 HostName: 212.174.119.211.static.ttnet.com.tr Type: PTR
864 Country: Turkey
865 Is Active: True (reset ttl 64)
866 Port: 2000/tcp open cisco-sccp? syn-ack ttl 52
867 Port: 5060/tcp open sip? syn-ack ttl 53
868 IP: 212.174.119.212
869 HostName: ns2.ekonomi.gov.tr Type: NS
870 HostName: 212.174.119.212.static.ttnet.com.tr Type: PTR
871 Country: Turkey
872 Is Active: True (reset ttl 64)
873 Port: 2000/tcp open cisco-sccp? syn-ack ttl 52
874 Port: 5060/tcp open sip? syn-ack ttl 52
875#######################################################################################################################################
876traceroute to www.trade.gov.tr (95.0.51.12), 30 hops max, 60 byte packets
877 1 10.252.204.1 (10.252.204.1) 360.923 ms 360.894 ms 360.871 ms
878 2 213.184.122.97 (213.184.122.97) 360.851 ms 360.832 ms 360.807 ms
879 3 bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9) 360.796 ms 360.777 ms 360.704 ms
880 4 bzq-219-189-185.dsl.bezeqint.net (62.219.189.185) 438.295 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185) 360.675 ms 360.651 ms
881 5 bzq-179-124-122.cust.bezeqint.net (212.179.124.122) 438.223 ms bzq-219-189-2.cablep.bezeqint.net (62.219.189.2) 360.591 ms bzq-179-124-122.cust.bezeqint.net (212.179.124.122) 438.165 ms
882 6 bzq-179-124-78.cust.bezeqint.net (212.179.124.78) 438.132 ms bzq-179-124-30.cust.bezeqint.net (212.179.124.30) 572.128 ms bzq-219-189-57.dsl.bezeqint.net (62.219.189.57) 481.683 ms
883 7 bzq-179-72-241.cust.bezeqint.net (212.179.72.241) 481.724 ms ae9.cr1-lon2.ip4.gtt.net (46.33.89.185) 481.663 ms bzq-179-72-241.cust.bezeqint.net (212.179.72.241) 481.675 ms
884 8 ip4.gtt.net (77.67.98.54) 481.563 ms 481.574 ms ae-0.r24.londen12.uk.bb.gin.ntt.net (129.250.4.140) 571.842 ms
885 9 ip4.gtt.net (77.67.98.54) 481.556 ms 481.393 ms ae-0.r24.londen12.uk.bb.gin.ntt.net (129.250.4.140) 481.413 ms
88610 ae-0.r24.londen12.uk.bb.gin.ntt.net (129.250.4.140) 571.668 ms ae-5.r25.frnkge08.de.bb.gin.ntt.net (129.250.5.80) 416.024 ms ae-6.r24.frnkge08.de.bb.gin.ntt.net (129.250.3.13) 416.000 ms
88711 ae-5.r25.frnkge08.de.bb.gin.ntt.net (129.250.5.80) 416.002 ms 416.005 ms ae-6.r24.frnkge08.de.bb.gin.ntt.net (129.250.3.13) 383.407 ms
88812 fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134) 617.830 ms ae-5.r25.frnkge08.de.bb.gin.ntt.net (129.250.5.80) 617.713 ms ae-2.r01.mlanit01.it.bb.gin.ntt.net (129.250.3.182) 617.725 ms
88913 34-acibadem-xrs-t2-2---306-mil-col-3.statik.turktelekom.com.tr (212.156.141.93) 826.583 ms ae-2.r01.mlanit01.it.bb.gin.ntt.net (129.250.3.182) 617.767 ms 617.675 ms
89014 fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134) 617.734 ms 34-acibadem-xrs-t2-2---306-mil-col-3.statik.turktelekom.com.tr (212.156.141.93) 826.477 ms fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134) 617.661 ms
89115 34-acibadem-xrs-t2-2---306-mil-col-3.statik.turktelekom.com.tr (212.156.141.93) 826.419 ms fastweb-0.r01.mlanit01.it.bb.gin.ntt.net (81.25.202.134) 826.364 ms 212.156.252.68.static.turktelekom.com.tr (212.156.252.68) 3493.434 ms
89216 34-acibadem-xrs-t2-2---306-mil-col-3.statik.turktelekom.com.tr (212.156.141.93) 3493.354 ms * *
89317 06-ulus-xrs-t2-2---00-gayrettepe-xrs-t2-2.statik.turktelekom.com.tr (81.212.207.113) 641.217 ms 212.156.120.184.static.turktelekom.com.tr (212.156.120.184) 641.073 ms 212.156.108.249.55-bafrasanayi-ess1-t4-1.55-bafra-t4-1.statik.turktelekom.com.tr (212.156.108.249) 641.150 ms
89418 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187) 641.042 ms * *
89519 212.156.108.249.55-bafrasanayi-ess1-t4-1.55-bafra-t4-1.statik.turktelekom.com.tr (212.156.108.249) 640.921 ms 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187) 640.934 ms 212.156.108.249.55-bafrasanayi-ess1-t4-1.55-bafra-t4-1.statik.turktelekom.com.tr (212.156.108.249) 640.871 ms
89620 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187) 640.896 ms * ######################################################################################################################################
897----- trade.gov.tr -----
898
899
900Host's addresses:
901__________________
902
903trade.gov.tr. 2069 IN A 95.0.51.12
904
905
906Name Servers:
907______________
908
909ns1.ekonomi.gov.tr. 43198 IN A 212.174.119.211
910ns2.ekonomi.gov.tr. 3598 IN A 212.174.119.212
911
912
913Mail (MX) Servers:
914___________________
915
916mail2.ekonomi.gov.tr. 3600 IN A 212.174.119.132
917
918
919
920
921
922Google Results:
923________________
924
925test.trade.gov.tr. 2 IN A 95.0.51.12
926
927
928Brute forcing with /usr/share/dnsenum/dns.txt:
929_______________________________________________
930
931mail2.trade.gov.tr. 3359 IN A 212.174.119.132
932www.trade.gov.tr. 3516 IN A 95.0.51.12
933
934
935Launching Whois Queries:
936_________________________
937
938 whois ip result: 95.0.51.0 -> 95.0.51.0/24
939 whois ip result: 212.174.119.0 -> 212.174.0.0/15
940
941
942trade.gov.tr____________
943
944 212.174.0.0/15
945 95.0.51.0/24
946#######################################################################################################################################
947Source:
948whois.ripe.net
949IP Address:
95095.0.51.12
951######################################################################################################################################
952URLCrazy Domain Report
953Domain : www.trade.gov.tr
954Keyboard : qwerty
955At : 2019-11-30 12:04:37 -0500
956
957# Please wait. 145 hostnames to process
958
959Typo Type Typo DNS-A CC-A DNS-MX Extn
960------------------------------------------------------------------------------------------------------------------------------------------
961Character Omission ww.trade.gov.tr ? gov.tr
962Character Omission www.rade.gov.tr ? gov.tr
963Character Omission www.tade.gov.tr ? gov.tr
964Character Omission www.trad.gov.tr ? gov.tr
965Character Omission www.trae.gov.tr ? gov.tr
966Character Omission www.trde.gov.tr ? gov.tr
967Character Omission wwwtrade.gov.tr ? gov.tr
968Character Repeat www.traade.gov.tr ? gov.tr
969Character Repeat www.tradde.gov.tr ? gov.tr
970Character Repeat www.tradee.gov.tr ? gov.tr
971Character Repeat www.trrade.gov.tr ? gov.tr
972Character Repeat www.ttrade.gov.tr ? gov.tr
973Character Repeat wwww.trade.gov.tr ? gov.tr
974Character Swap ww.wtrade.gov.tr ? gov.tr
975Character Swap www.rtade.gov.tr ? gov.tr
976Character Swap www.tarde.gov.tr ? gov.tr
977Character Swap www.traed.gov.tr ? gov.tr
978Character Swap www.trdae.gov.tr ? gov.tr
979Character Swap wwwt.rade.gov.tr ? gov.tr
980Character Replacement eww.trade.gov.tr ? gov.tr
981Character Replacement qww.trade.gov.tr ? gov.tr
982Character Replacement wew.trade.gov.tr ? gov.tr
983Character Replacement wqw.trade.gov.tr ? gov.tr
984Character Replacement wwe.trade.gov.tr ? gov.tr
985Character Replacement wwq.trade.gov.tr ? gov.tr
986Character Replacement www.rrade.gov.tr ? gov.tr
987Character Replacement www.teade.gov.tr ? gov.tr
988Character Replacement www.trade.gov.tt ? tt
989Character Replacement www.tradr.gov.tr ? gov.tr
990Character Replacement www.tradw.gov.tr ? gov.tr
991Character Replacement www.trafe.gov.tr ? gov.tr
992Character Replacement www.trase.gov.tr ? gov.tr
993Character Replacement www.trsde.gov.tr ? gov.tr
994Character Replacement www.ttade.gov.tr ? gov.tr
995Character Replacement www.yrade.gov.tr ? gov.tr
996Double Character Replacement eew.trade.gov.tr ? gov.tr
997Double Character Replacement qqw.trade.gov.tr ? gov.tr
998Double Character Replacement wee.trade.gov.tr ? gov.tr
999Double Character Replacement wqq.trade.gov.tr ? gov.tr
1000Character Insertion weww.trade.gov.tr ? gov.tr
1001Character Insertion wqww.trade.gov.tr ? gov.tr
1002Character Insertion wwew.trade.gov.tr ? gov.tr
1003Character Insertion wwqw.trade.gov.tr ? gov.tr
1004Character Insertion www.trader.gov.tr ? gov.tr
1005Character Insertion www.tradew.gov.tr ? gov.tr
1006Character Insertion www.tradfe.gov.tr ? gov.tr
1007Character Insertion www.tradse.gov.tr ? gov.tr
1008Character Insertion www.trasde.gov.tr ? gov.tr
1009Character Insertion www.treade.gov.tr ? gov.tr
1010Character Insertion www.trtade.gov.tr ? gov.tr
1011Character Insertion www.tyrade.gov.tr ? gov.tr
1012Character Insertion wwwe.trade.gov.tr ? gov.tr
1013Character Insertion wwwq.trade.gov.tr ? gov.tr
1014Missing Dot wwwwww.trade.gov.tr ? gov.tr
1015Singular or Pluralise trade.gov.tr 95.0.51.12 TR,TURKEY mail2.ekonomi.gov.tr gov.tr
1016Singular or Pluralise trades.gov.tr ? gov.tr
1017Vowel Swap www.trada.gov.tr ? gov.tr
1018Vowel Swap www.tradi.gov.tr ? gov.tr
1019Vowel Swap www.trado.gov.tr ? gov.tr
1020Vowel Swap www.tradu.gov.tr ? gov.tr
1021Vowel Swap www.trede.gov.tr ? gov.tr
1022Vowel Swap www.tride.gov.tr ? gov.tr
1023Vowel Swap www.trode.gov.tr ? gov.tr
1024Vowel Swap www.trude.gov.tr ? gov.tr
1025Bit Flipping 7ww.trade.gov.tr ? gov.tr
1026Bit Flipping gww.trade.gov.tr ? gov.tr
1027Bit Flipping sww.trade.gov.tr ? gov.tr
1028Bit Flipping uww.trade.gov.tr ? gov.tr
1029Bit Flipping vww.trade.gov.tr ? gov.tr
1030Bit Flipping w7w.trade.gov.tr ? gov.tr
1031Bit Flipping wgw.trade.gov.tr ? gov.tr
1032Bit Flipping wsw.trade.gov.tr ? gov.tr
1033Bit Flipping wuw.trade.gov.tr ? gov.tr
1034Bit Flipping wvw.trade.gov.tr ? gov.tr
1035Bit Flipping ww7.trade.gov.tr ? gov.tr
1036Bit Flipping wwg.trade.gov.tr ? gov.tr
1037Bit Flipping wws.trade.gov.tr ? gov.tr
1038Bit Flipping wwu.trade.gov.tr ? gov.tr
1039Bit Flipping wwv.trade.gov.tr ? gov.tr
1040Bit Flipping www.4rade.gov.tr ? gov.tr
1041Bit Flipping www.drade.gov.tr ? gov.tr
1042Bit Flipping www.prade.gov.tr ? gov.tr
1043Bit Flipping www.t2ade.gov.tr ? gov.tr
1044Bit Flipping www.tbade.gov.tr ? gov.tr
1045Bit Flipping www.tpade.gov.tr ? gov.tr
1046Bit Flipping www.tradd.gov.tr ? gov.tr
1047Bit Flipping www.trade.gov.pr ? pr
1048Bit Flipping www.trade.gov.tp ? tp
1049Bit Flipping www.trade.gov.tv ? tv
1050Bit Flipping www.tradg.gov.tr ? gov.tr
1051Bit Flipping www.tradm.gov.tr ? gov.tr
1052Bit Flipping www.traee.gov.tr ? gov.tr
1053Bit Flipping www.trale.gov.tr ? gov.tr
1054Bit Flipping www.trate.gov.tr ? gov.tr
1055Bit Flipping www.trcde.gov.tr ? gov.tr
1056Bit Flipping www.trqde.gov.tr ? gov.tr
1057Bit Flipping www.tsade.gov.tr ? gov.tr
1058Bit Flipping www.tvade.gov.tr ? gov.tr
1059Bit Flipping www.tzade.gov.tr ? gov.tr
1060Bit Flipping www.urade.gov.tr ? gov.tr
1061Bit Flipping www.vrade.gov.tr ? gov.tr
1062Bit Flipping wwwntrade.gov.tr ? gov.tr
1063Homoglyphs vvvvvv.trade.gov.tr ? gov.tr
1064Homoglyphs vvvvw.trade.gov.tr ? gov.tr
1065Homoglyphs vvwvv.trade.gov.tr ? gov.tr
1066Homoglyphs vvww.trade.gov.tr ? gov.tr
1067Homoglyphs wvvvv.trade.gov.tr ? gov.tr
1068Homoglyphs wvvw.trade.gov.tr ? gov.tr
1069Homoglyphs wwvv.trade.gov.tr ? gov.tr
1070Homoglyphs www.tracle.gov.tr ? gov.tr
1071Wrong TLD trade.ca ? ca
1072Wrong TLD trade.ch 176.10.114.132 CH,SWITZERLAND mail.trade.ch ch
1073Wrong TLD trade.com 149.126.74.93 IL,ISRAEL Trade-com.mail.protection.outlook.com com
1074Wrong TLD trade.de ? de
1075Wrong TLD trade.edu ? edu
1076Wrong TLD trade.es 80.65.12.10 NL,NETHERLANDS mail.trade.es es
1077Wrong TLD trade.fr 194.150.236.25 FR,FRANCE mx.hiwit.net fr
1078Wrong TLD trade.it 198.72.81.140 alt4.aspmx.l.google.com it
1079Wrong TLD trade.jp 157.7.209.20 JP,JAPAN mail.trade.jp jp
1080Wrong TLD trade.net 45.33.23.183 net
1081Wrong TLD trade.nl 91.195.240.126 DE,GERMANY localhost nl
1082Wrong TLD trade.no 216.37.42.60 US,UNITED STATES trade.no no
1083Wrong TLD trade.org 69.172.201.153 US,UNITED STATES org
1084Wrong TLD trade.ru 212.42.42.10 RU,RUSSIAN FEDERATION mx.ropnet.ru ru
1085Wrong TLD trade.se 91.195.240.126 DE,GERMANY localhost se
1086Wrong TLD trade.us 91.195.240.126 DE,GERMANY localhost us
1087Wrong SLD trade.av.tr ? av.tr
1088Wrong SLD trade.bbs.tr ? bbs.tr
1089Wrong SLD trade.bel.tr ? bel.tr
1090Wrong SLD trade.biz.tr ? biz.tr
1091Wrong SLD trade.com.tr ? com.tr
1092Wrong SLD trade.dr.tr ? dr.tr
1093Wrong SLD trade.edu.tr ? edu.tr
1094Wrong SLD trade.gen.tr ? gen.tr
1095Wrong SLD trade.info.tr ? info.tr
1096Wrong SLD trade.k12.tr ? k12.tr
1097Wrong SLD trade.mil.tr ? mil.tr
1098Wrong SLD trade.name.tr ? name.tr
1099Wrong SLD trade.nc.tr ? nc.tr
1100Wrong SLD trade.net.tr ? net.tr
1101Wrong SLD trade.org.tr ? org.tr
1102Wrong SLD trade.pol.tr ? pol.tr
1103Wrong SLD trade.tel.tr ? tel.tr
1104Wrong SLD trade.tv.tr ? tv.tr
1105Wrong SLD trade.web.tr ? web.tr
1106######################################################################################################################################
1107Privileges have been dropped to "nobody:nogroup" for security reasons.
1108
1109Processed queries: 0
1110Received packets: 0
1111Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
1112Current incoming rate: 0 pps, average: 0 pps
1113Current success rate: 0 pps, average: 0 pps
1114Finished total: 0, success: 0 (0.00%)
1115Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
1116Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1117Response: | Success: | Total:
1118OK: | 0 ( 0.00%) | 0 ( 0.00%)
1119NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
1120SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
1121REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
1122FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1123
1124
1125
1126Processed queries: 1919
1127Received packets: 2040
1128Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
1129Current incoming rate: 2037 pps, average: 2037 pps
1130Current success rate: 1172 pps, average: 1172 pps
1131Finished total: 1174, success: 1174 (100.00%)
1132Mismatched domains: 222 (10.94%), IDs: 0 (0.00%)
1133Failures: 0: 19.34%, 1: 103.83%, 2: 33.48%, 3: 6.22%, 4: 0.60%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1134Response: | Success: | Total:
1135OK: | 131 ( 11.16%) | 141 ( 6.95%)
1136NXDOMAIN: | 974 ( 82.96%) | 1110 ( 54.71%)
1137SERVFAIL: | 69 ( 5.88%) | 71 ( 3.50%)
1138REFUSED: | 0 ( 0.00%) | 707 ( 34.84%)
1139FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1140
1141
1142
1143Processed queries: 1919
1144Received packets: 3141
1145Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
1146Current incoming rate: 1098 pps, average: 1567 pps
1147Current success rate: 593 pps, average: 883 pps
1148Finished total: 1769, success: 1769 (100.00%)
1149Mismatched domains: 541 (17.32%), IDs: 0 (0.00%)
1150Failures: 0: 12.83%, 1: 43.02%, 2: 26.34%, 3: 14.47%, 4: 8.71%, 5: 2.66%, 6: 0.34%, 7: 0.06%, 8: 0.06%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1151Response: | Success: | Total:
1152OK: | 180 ( 10.18%) | 195 ( 6.24%)
1153NXDOMAIN: | 1506 ( 85.13%) | 1930 ( 61.78%)
1154SERVFAIL: | 83 ( 4.69%) | 86 ( 2.75%)
1155REFUSED: | 0 ( 0.00%) | 913 ( 29.23%)
1156FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1157
1158
1159
1160Processed queries: 1919
1161Received packets: 3367
1162Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
1163Current incoming rate: 225 pps, average: 1120 pps
1164Current success rate: 113 pps, average: 626 pps
1165Finished total: 1883, success: 1883 (100.00%)
1166Mismatched domains: 608 (18.16%), IDs: 0 (0.00%)
1167Failures: 0: 12.06%, 1: 40.41%, 2: 24.75%, 3: 10.83%, 4: 6.27%, 5: 4.14%, 6: 2.23%, 7: 0.85%, 8: 0.27%, 9: 0.11%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1168Response: | Success: | Total:
1169OK: | 187 ( 9.93%) | 205 ( 6.12%)
1170NXDOMAIN: | 1607 ( 85.34%) | 2089 ( 62.40%)
1171SERVFAIL: | 89 ( 4.73%) | 92 ( 2.75%)
1172REFUSED: | 0 ( 0.00%) | 962 ( 28.73%)
1173FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1174
1175
1176
1177Processed queries: 1919
1178Received packets: 3426
1179Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
1180Current incoming rate: 58 pps, average: 854 pps
1181Current success rate: 24 pps, average: 476 pps
1182Finished total: 1908, success: 1908 (100.00%)
1183Mismatched domains: 635 (18.64%), IDs: 0 (0.00%)
1184Failures: 0: 11.90%, 1: 39.88%, 2: 24.42%, 3: 10.69%, 4: 6.18%, 5: 3.46%, 6: 2.04%, 7: 1.15%, 8: 0.37%, 9: 0.31%, 10: 0.16%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1185Response: | Success: | Total:
1186OK: | 190 ( 9.96%) | 208 ( 6.11%)
1187NXDOMAIN: | 1629 ( 85.38%) | 2134 ( 62.64%)
1188SERVFAIL: | 89 ( 4.66%) | 95 ( 2.79%)
1189REFUSED: | 0 ( 0.00%) | 970 ( 28.47%)
1190FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1191
1192
1193
1194Processed queries: 1919
1195Received packets: 3461
1196Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
1197Current incoming rate: 34 pps, average: 690 pps
1198Current success rate: 6 pps, average: 382 pps
1199Finished total: 1915, success: 1915 (100.00%)
1200Mismatched domains: 658 (19.12%), IDs: 0 (0.00%)
1201Failures: 0: 11.85%, 1: 39.74%, 2: 24.33%, 3: 10.65%, 4: 6.16%, 5: 3.45%, 6: 2.04%, 7: 0.89%, 8: 0.37%, 9: 0.37%, 10: 0.16%, 11: 0.05%, 12: 0.16%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1202Response: | Success: | Total:
1203OK: | 190 ( 9.92%) | 208 ( 6.04%)
1204NXDOMAIN: | 1636 ( 85.43%) | 2158 ( 62.70%)
1205SERVFAIL: | 89 ( 4.65%) | 99 ( 2.88%)
1206REFUSED: | 0 ( 0.00%) | 977 ( 28.38%)
1207FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1208
1209
1210
1211Processed queries: 1919
1212Received packets: 3471
1213Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
1214Current incoming rate: 9 pps, average: 577 pps
1215Current success rate: 0 pps, average: 318 pps
1216Finished total: 1916, success: 1916 (100.00%)
1217Mismatched domains: 666 (19.29%), IDs: 0 (0.00%)
1218Failures: 0: 11.85%, 1: 39.72%, 2: 24.32%, 3: 10.65%, 4: 6.16%, 5: 3.44%, 6: 2.04%, 7: 0.89%, 8: 0.37%, 9: 0.31%, 10: 0.10%, 11: 0.10%, 12: 0.10%, 13: 0.05%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1219Response: | Success: | Total:
1220OK: | 190 ( 9.92%) | 208 ( 6.03%)
1221NXDOMAIN: | 1637 ( 85.44%) | 2166 ( 62.75%)
1222SERVFAIL: | 89 ( 4.65%) | 100 ( 2.90%)
1223REFUSED: | 0 ( 0.00%) | 978 ( 28.33%)
1224FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1225
1226
1227
1228Processed queries: 1919
1229Received packets: 3474
1230Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
1231Current incoming rate: 2 pps, average: 495 pps
1232Current success rate: 0 pps, average: 273 pps
1233Finished total: 1917, success: 1917 (100.00%)
1234Mismatched domains: 668 (19.33%), IDs: 0 (0.00%)
1235Failures: 0: 11.84%, 1: 39.70%, 2: 24.31%, 3: 10.64%, 4: 6.16%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.37%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.10%, 14: 0.00%, 15: 0.00%, 16: 0.05%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1236Response: | Success: | Total:
1237OK: | 190 ( 9.91%) | 208 ( 6.02%)
1238NXDOMAIN: | 1638 ( 85.45%) | 2169 ( 62.78%)
1239SERVFAIL: | 89 ( 4.64%) | 100 ( 2.89%)
1240REFUSED: | 0 ( 0.00%) | 978 ( 28.31%)
1241FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1242
1243
1244
1245Processed queries: 1919
1246Received packets: 3477
1247Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
1248Current incoming rate: 2 pps, average: 433 pps
1249Current success rate: 0 pps, average: 239 pps
1250Finished total: 1918, success: 1918 (100.00%)
1251Mismatched domains: 670 (19.38%), IDs: 0 (0.00%)
1252Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.05%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1253Response: | Success: | Total:
1254OK: | 190 ( 9.91%) | 208 ( 6.02%)
1255NXDOMAIN: | 1639 ( 85.45%) | 2170 ( 62.75%)
1256SERVFAIL: | 89 ( 4.64%) | 100 ( 2.89%)
1257REFUSED: | 0 ( 0.00%) | 979 ( 28.31%)
1258FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1259
1260
1261
1262Processed queries: 1919
1263Received packets: 3480
1264Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
1265Current incoming rate: 2 pps, average: 385 pps
1266Current success rate: 0 pps, average: 212 pps
1267Finished total: 1918, success: 1918 (100.00%)
1268Mismatched domains: 673 (19.45%), IDs: 0 (0.00%)
1269Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.10%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1270Response: | Success: | Total:
1271OK: | 190 ( 9.91%) | 208 ( 6.01%)
1272NXDOMAIN: | 1639 ( 85.45%) | 2170 ( 62.70%)
1273SERVFAIL: | 89 ( 4.64%) | 102 ( 2.95%)
1274REFUSED: | 0 ( 0.00%) | 980 ( 28.32%)
1275FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1276
1277
1278
1279Processed queries: 1919
1280Received packets: 3483
1281Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
1282Current incoming rate: 2 pps, average: 347 pps
1283Current success rate: 0 pps, average: 191 pps
1284Finished total: 1918, success: 1918 (100.00%)
1285Mismatched domains: 676 (19.52%), IDs: 0 (0.00%)
1286Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.05%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1287Response: | Success: | Total:
1288OK: | 190 ( 9.91%) | 208 ( 6.00%)
1289NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.70%)
1290SERVFAIL: | 89 ( 4.64%) | 103 ( 2.97%)
1291REFUSED: | 0 ( 0.00%) | 980 ( 28.29%)
1292FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1293
1294
1295
1296Processed queries: 1919
1297Received packets: 3492
1298Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
1299Current incoming rate: 8 pps, average: 316 pps
1300Current success rate: 0 pps, average: 174 pps
1301Finished total: 1918, success: 1918 (100.00%)
1302Mismatched domains: 685 (19.72%), IDs: 0 (0.00%)
1303Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.05%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1304Response: | Success: | Total:
1305OK: | 190 ( 9.91%) | 208 ( 5.99%)
1306NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.54%)
1307SERVFAIL: | 89 ( 4.64%) | 111 ( 3.20%)
1308REFUSED: | 0 ( 0.00%) | 981 ( 28.25%)
1309FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1310
1311
1312
1313Processed queries: 1919
1314Received packets: 3497
1315Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
1316Current incoming rate: 4 pps, average: 290 pps
1317Current success rate: 0 pps, average: 159 pps
1318Finished total: 1918, success: 1918 (100.00%)
1319Mismatched domains: 690 (19.84%), IDs: 0 (0.00%)
1320Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.05%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1321Response: | Success: | Total:
1322OK: | 190 ( 9.91%) | 208 ( 5.98%)
1323NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.45%)
1324SERVFAIL: | 89 ( 4.64%) | 115 ( 3.31%)
1325REFUSED: | 0 ( 0.00%) | 982 ( 28.23%)
1326FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1327
1328
1329
1330Processed queries: 1919
1331Received packets: 3500
1332Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
1333Current incoming rate: 2 pps, average: 268 pps
1334Current success rate: 0 pps, average: 147 pps
1335Finished total: 1918, success: 1918 (100.00%)
1336Mismatched domains: 693 (19.91%), IDs: 0 (0.00%)
1337Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.05%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1338Response: | Success: | Total:
1339OK: | 190 ( 9.91%) | 208 ( 5.98%)
1340NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.40%)
1341SERVFAIL: | 89 ( 4.64%) | 117 ( 3.36%)
1342REFUSED: | 0 ( 0.00%) | 983 ( 28.24%)
1343FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1344
1345
1346
1347Processed queries: 1919
1348Received packets: 3501
1349Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
1350Current incoming rate: 0 pps, average: 249 pps
1351Current success rate: 0 pps, average: 136 pps
1352Finished total: 1918, success: 1918 (100.00%)
1353Mismatched domains: 694 (19.93%), IDs: 0 (0.00%)
1354Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.05%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1355Response: | Success: | Total:
1356OK: | 190 ( 9.91%) | 208 ( 5.97%)
1357NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.38%)
1358SERVFAIL: | 89 ( 4.64%) | 117 ( 3.36%)
1359REFUSED: | 0 ( 0.00%) | 984 ( 28.26%)
1360FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1361
1362
1363
1364Processed queries: 1919
1365Received packets: 3502
1366Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
1367Current incoming rate: 0 pps, average: 233 pps
1368Current success rate: 0 pps, average: 127 pps
1369Finished total: 1918, success: 1918 (100.00%)
1370Mismatched domains: 695 (19.95%), IDs: 0 (0.00%)
1371Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.05%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1372Response: | Success: | Total:
1373OK: | 190 ( 9.91%) | 208 ( 5.97%)
1374NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.36%)
1375SERVFAIL: | 89 ( 4.64%) | 117 ( 3.36%)
1376REFUSED: | 0 ( 0.00%) | 985 ( 28.28%)
1377FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1378
1379
1380
1381Processed queries: 1919
1382Received packets: 3503
1383Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
1384Current incoming rate: 0 pps, average: 218 pps
1385Current success rate: 0 pps, average: 119 pps
1386Finished total: 1918, success: 1918 (100.00%)
1387Mismatched domains: 696 (19.98%), IDs: 0 (0.00%)
1388Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.05%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1389Response: | Success: | Total:
1390OK: | 190 ( 9.91%) | 208 ( 5.97%)
1391NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.34%)
1392SERVFAIL: | 89 ( 4.64%) | 117 ( 3.36%)
1393REFUSED: | 0 ( 0.00%) | 986 ( 28.30%)
1394FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1395
1396
1397
1398Processed queries: 1919
1399Received packets: 3505
1400Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
1401Current incoming rate: 1 pps, average: 205 pps
1402Current success rate: 0 pps, average: 112 pps
1403Finished total: 1918, success: 1918 (100.00%)
1404Mismatched domains: 698 (20.02%), IDs: 0 (0.00%)
1405Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.05%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1406Response: | Success: | Total:
1407OK: | 190 ( 9.91%) | 208 ( 5.97%)
1408NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.31%)
1409SERVFAIL: | 89 ( 4.64%) | 117 ( 3.36%)
1410REFUSED: | 0 ( 0.00%) | 988 ( 28.34%)
1411FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1412
1413
1414
1415Processed queries: 1919
1416Received packets: 3507
1417Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
1418Current incoming rate: 1 pps, average: 194 pps
1419Current success rate: 0 pps, average: 106 pps
1420Finished total: 1918, success: 1918 (100.00%)
1421Mismatched domains: 700 (20.07%), IDs: 0 (0.00%)
1422Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.05%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1423Response: | Success: | Total:
1424OK: | 190 ( 9.91%) | 208 ( 5.96%)
1425NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.27%)
1426SERVFAIL: | 89 ( 4.64%) | 117 ( 3.35%)
1427REFUSED: | 0 ( 0.00%) | 990 ( 28.38%)
1428FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1429
1430
1431
1432Processed queries: 1919
1433Received packets: 3509
1434Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
1435Current incoming rate: 1 pps, average: 184 pps
1436Current success rate: 0 pps, average: 100 pps
1437Finished total: 1918, success: 1918 (100.00%)
1438Mismatched domains: 702 (20.11%), IDs: 0 (0.00%)
1439Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.05%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1440Response: | Success: | Total:
1441OK: | 190 ( 9.91%) | 208 ( 5.96%)
1442NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.23%)
1443SERVFAIL: | 89 ( 4.64%) | 118 ( 3.38%)
1444REFUSED: | 0 ( 0.00%) | 991 ( 28.40%)
1445FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1446
1447
1448
1449Processed queries: 1919
1450Received packets: 3511
1451Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
1452Current incoming rate: 1 pps, average: 175 pps
1453Current success rate: 0 pps, average: 95 pps
1454Finished total: 1918, success: 1918 (100.00%)
1455Mismatched domains: 704 (20.16%), IDs: 0 (0.00%)
1456Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.05%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1457Response: | Success: | Total:
1458OK: | 190 ( 9.91%) | 208 ( 5.96%)
1459NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.20%)
1460SERVFAIL: | 89 ( 4.64%) | 118 ( 3.38%)
1461REFUSED: | 0 ( 0.00%) | 993 ( 28.44%)
1462FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1463
1464
1465
1466Processed queries: 1919
1467Received packets: 3513
1468Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
1469Current incoming rate: 1 pps, average: 166 pps
1470Current success rate: 0 pps, average: 91 pps
1471Finished total: 1918, success: 1918 (100.00%)
1472Mismatched domains: 706 (20.21%), IDs: 0 (0.00%)
1473Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.05%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1474Response: | Success: | Total:
1475OK: | 190 ( 9.91%) | 208 ( 5.95%)
1476NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.16%)
1477SERVFAIL: | 89 ( 4.64%) | 119 ( 3.41%)
1478REFUSED: | 0 ( 0.00%) | 994 ( 28.45%)
1479FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1480
1481
1482
1483Processed queries: 1919
1484Received packets: 3513
1485Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
1486Current incoming rate: 0 pps, average: 159 pps
1487Current success rate: 0 pps, average: 87 pps
1488Finished total: 1918, success: 1918 (100.00%)
1489Mismatched domains: 706 (20.21%), IDs: 0 (0.00%)
1490Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1491Response: | Success: | Total:
1492OK: | 190 ( 9.91%) | 208 ( 5.95%)
1493NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.16%)
1494SERVFAIL: | 89 ( 4.64%) | 119 ( 3.41%)
1495REFUSED: | 0 ( 0.00%) | 994 ( 28.45%)
1496FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1497
1498
1499
1500Processed queries: 1919
1501Received packets: 3513
1502Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
1503Current incoming rate: 0 pps, average: 152 pps
1504Current success rate: 0 pps, average: 83 pps
1505Finished total: 1918, success: 1918 (100.00%)
1506Mismatched domains: 706 (20.21%), IDs: 0 (0.00%)
1507Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1508Response: | Success: | Total:
1509OK: | 190 ( 9.91%) | 208 ( 5.95%)
1510NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.16%)
1511SERVFAIL: | 89 ( 4.64%) | 119 ( 3.41%)
1512REFUSED: | 0 ( 0.00%) | 994 ( 28.45%)
1513FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1514
1515
1516
1517Processed queries: 1919
1518Received packets: 3514
1519Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
1520Current incoming rate: 0 pps, average: 146 pps
1521Current success rate: 0 pps, average: 79 pps
1522Finished total: 1918, success: 1918 (100.00%)
1523Mismatched domains: 707 (20.23%), IDs: 0 (0.00%)
1524Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1525Response: | Success: | Total:
1526OK: | 190 ( 9.91%) | 208 ( 5.95%)
1527NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.15%)
1528SERVFAIL: | 89 ( 4.64%) | 119 ( 3.40%)
1529REFUSED: | 0 ( 0.00%) | 995 ( 28.47%)
1530FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1531
1532
1533
1534Processed queries: 1919
1535Received packets: 3515
1536Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1537Current incoming rate: 0 pps, average: 140 pps
1538Current success rate: 0 pps, average: 76 pps
1539Finished total: 1918, success: 1918 (100.00%)
1540Mismatched domains: 708 (20.25%), IDs: 0 (0.00%)
1541Failures: 0: 11.84%, 1: 39.68%, 2: 24.30%, 3: 10.64%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
1542Response: | Success: | Total:
1543OK: | 190 ( 9.91%) | 208 ( 5.95%)
1544NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.13%)
1545SERVFAIL: | 89 ( 4.64%) | 119 ( 3.40%)
1546REFUSED: | 0 ( 0.00%) | 996 ( 28.49%)
1547FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1548
1549
1550
1551Processed queries: 1919
1552Received packets: 3515
1553Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
1554Current incoming rate: 0 pps, average: 140 pps
1555Current success rate: 0 pps, average: 76 pps
1556Finished total: 1919, success: 1918 (99.95%)
1557Mismatched domains: 708 (20.25%), IDs: 0 (0.00%)
1558Failures: 0: 11.83%, 1: 39.66%, 2: 24.28%, 3: 10.63%, 4: 6.15%, 5: 3.44%, 6: 2.03%, 7: 0.89%, 8: 0.36%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.10%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
1559Response: | Success: | Total:
1560OK: | 190 ( 9.91%) | 208 ( 5.95%)
1561NXDOMAIN: | 1639 ( 85.45%) | 2172 ( 62.13%)
1562SERVFAIL: | 89 ( 4.64%) | 119 ( 3.40%)
1563REFUSED: | 0 ( 0.00%) | 996 ( 28.49%)
1564FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1565www.trade.gov.tr
156695.0.51.12
1567#######################################################################################################################################
1568[+] www.trade.gov.tr has no SPF record!
1569[*] No DMARC record found. Looking for organizational record
1570[*] Found organizational DMARC record:
1571[*] v=DMARC1;p=reject;sp=reject;pct=100;adkim=r;aspf=r;fo=1;ri=86400;rua=mailto:postmaster@trade.gov.tr
1572[-] Organizational subdomain policy explicitly set to reject
1573[-] Spoofing not possible for www.trade.gov.tr
1574#######################################################################################################################################
1575INFO[0000] Starting to process queue....
1576INFO[0000] Starting to process permutations....
1577INFO[0000] FORBIDDEN http://trade-s3.s3.amazonaws.com (http://trade.gov.tr)
1578INFO[0000] FORBIDDEN http://trade-dev.s3.amazonaws.com (http://trade.gov.tr)
1579INFO[0000] FORBIDDEN http://data-trade.s3.amazonaws.com (http://trade.gov.tr)
1580INFO[0000] FORBIDDEN http://trade-tmp.s3.amazonaws.com (http://trade.gov.tr)
1581INFO[0000] FORBIDDEN http://temp-trade.s3.amazonaws.com (http://trade.gov.tr)
1582INFO[0000] FORBIDDEN http://trade-bucket.s3.amazonaws.com (http://trade.gov.tr)
1583INFO[0000] FORBIDDEN http://trade-data.s3.amazonaws.com (http://trade.gov.tr)
1584INFO[0000] FORBIDDEN http://trade-backup.s3.amazonaws.com (http://trade.gov.tr)
1585INFO[0000] PUBLIC http://trade-services.s3.us-east-2.amazonaws.com/ (http://trade.gov.tr)
1586INFO[0000] FORBIDDEN http://trade-uploads.s3.amazonaws.com (http://trade.gov.tr)
1587INFO[0000] FORBIDDEN http://trade-staging.s3.amazonaws.com (http://trade.gov.tr)
1588INFO[0000] FORBIDDEN http://trade-downloads.s3.amazonaws.com (http://trade.gov.tr)
1589INFO[0000] FORBIDDEN http://trade.s3.amazonaws.com (http://trade.gov.tr)
1590INFO[0000] PUBLIC http://public-trade.s3.ap-northeast-2.amazonaws.com/ (http://trade.gov.tr)
1591INFO[0000] FORBIDDEN http://backup-trade.s3.amazonaws.com (http://trade.gov.tr)
1592INFO[0000] FORBIDDEN http://trade-elb.s3.amazonaws.com (http://trade.gov.tr)
1593INFO[0000] FORBIDDEN http://trade-logs.s3.amazonaws.com (http://trade.gov.tr)
1594INFO[0000] FORBIDDEN http://bucket-trade.s3.amazonaws.com (http://trade.gov.tr)
1595INFO[0001] FORBIDDEN http://trade-media.s3.amazonaws.com (http://trade.gov.tr)
1596######################################################################################################################################
1597WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1598Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 12:11 EST
1599Nmap scan report for www.trade.gov.tr (95.0.51.12)
1600Host is up (0.22s latency).
1601rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
1602Not shown: 490 filtered ports, 4 closed ports
1603Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1604PORT STATE SERVICE
160580/tcp open http
1606443/tcp open https
1607
1608Nmap done: 1 IP address (1 host up) scanned in 17.64 seconds
1609#######################################################################################################################################
1610Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 12:11 EST
1611Nmap scan report for www.trade.gov.tr (95.0.51.12)
1612Host is up (0.021s latency).
1613rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
1614Not shown: 2 filtered ports
1615PORT STATE SERVICE
161653/udp open|filtered domain
161767/udp open|filtered dhcps
161868/udp open|filtered dhcpc
161969/udp open|filtered tftp
162088/udp open|filtered kerberos-sec
1621123/udp open|filtered ntp
1622139/udp open|filtered netbios-ssn
1623161/udp open|filtered snmp
1624162/udp open|filtered snmptrap
1625389/udp open|filtered ldap
1626500/udp open|filtered isakmp
1627520/udp open|filtered route
16282049/udp open|filtered nfs
1629
1630Nmap done: 1 IP address (1 host up) scanned in 1.61 seconds
1631######################################################################################################################################
1632HTTP/1.1 500 Internal Server Error
1633Cache-Control: private
1634Content-Length: 7991
1635Content-Type: text/html; charset=utf-8
1636Server: Microsoft-IIS/10.0
1637X-AspNet-Version: 4.0.30319
1638X-Powered-By: ASP.NET
1639Access-Control-Allow-Origin: *
1640Date: Sat, 30 Nov 2019 17:11:57 GMT
1641
1642Allow: OPTIONS, TRACE, GET, HEAD, POST
1643#######################################################################################################################################
1644
1645wig - WebApp Information Gatherer
1646
1647
1648Scanning https://www.trade.gov.tr...
1649_____________________________ SITE INFO _____________________________
1650IP Title
165195.0.51.12 Republic of Turkey - Ministry of Trade
1652
1653______________________________ VERSION ______________________________
1654Name Versions Type
1655ASP.NET 4.0.30319 Platform
1656IIS 10.0 Platform
1657jQuery 3.4.1 JavaScript
1658
1659____________________________ INTERESTING ____________________________
1660URL Note Type
1661/test/ Test directory Interesting
1662/none_existing_page_123 ASP.NET detailed error Interesting
1663
1664_______________________ PLATFORM OBSERVATIONS _______________________
1665Platform URL Type
1666ASP.NET 4.0.30319 / Observation
1667ASP.NET 4.7.3429.0 /none_existing_page_123 Observation
1668
1669_____________________________________________________________________
1670Time: 77.8 sec Urls: 613 Fingerprints: 40401
1671#######################################################################################################################################
1672Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 12:13 EST
1673NSE: Loaded 163 scripts for scanning.
1674NSE: Script Pre-scanning.
1675Initiating NSE at 12:13
1676Completed NSE at 12:13, 0.00s elapsed
1677Initiating NSE at 12:13
1678Completed NSE at 12:13, 0.00s elapsed
1679Initiating Parallel DNS resolution of 1 host. at 12:13
1680Completed Parallel DNS resolution of 1 host. at 12:13, 0.02s elapsed
1681Initiating SYN Stealth Scan at 12:13
1682Scanning www.trade.gov.tr (95.0.51.12) [1 port]
1683Discovered open port 80/tcp on 95.0.51.12
1684Completed SYN Stealth Scan at 12:13, 0.19s elapsed (1 total ports)
1685Initiating Service scan at 12:13
1686Scanning 1 service on www.trade.gov.tr (95.0.51.12)
1687Completed Service scan at 12:13, 6.34s elapsed (1 service on 1 host)
1688Initiating OS detection (try #1) against www.trade.gov.tr (95.0.51.12)
1689Retrying OS detection (try #2) against www.trade.gov.tr (95.0.51.12)
1690Initiating Traceroute at 12:13
1691Completed Traceroute at 12:13, 3.11s elapsed
1692Initiating Parallel DNS resolution of 15 hosts. at 12:13
1693Completed Parallel DNS resolution of 15 hosts. at 12:13, 6.50s elapsed
1694NSE: Script scanning 95.0.51.12.
1695Initiating NSE at 12:13
1696NSE: [http-wordpress-enum 95.0.51.12:80] got no answers from pipelined queries
1697Completed NSE at 12:19, 337.14s elapsed
1698Initiating NSE at 12:19
1699Completed NSE at 12:19, 1.40s elapsed
1700Nmap scan report for www.trade.gov.tr (95.0.51.12)
1701Host is up (0.18s latency).
1702rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
1703
1704PORT STATE SERVICE VERSION
170580/tcp open http Microsoft IIS httpd 10.0
1706|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
1707| http-brute:
1708|_ Path "/" does not require authentication
1709|_http-chrono: Request times for /; avg: 9155.47ms; min: 8544.55ms; max: 11361.88ms
1710|_http-csrf: Couldn't find any CSRF vulnerabilities.
1711|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1712|_http-dombased-xss: Couldn't find any DOM based XSS.
1713|_http-errors: ERROR: Script execution failed (use -d to debug)
1714|_http-feed: Couldn't find any feeds.
1715|_http-fetch: Please enter the complete path of the directory to save data in.
1716| http-internal-ip-disclosure:
1717|_ Internal IP Leaked: 172.30.1.208
1718|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1719|_http-mobileversion-checker: No mobile version detected.
1720|_http-security-headers:
1721|_http-server-header: Microsoft-IIS/10.0
1722| http-sitemap-generator:
1723| Directory structure:
1724| Longest directory structure:
1725| Depth: 0
1726| Dir: /
1727| Total files found (by extension):
1728|_
1729|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1730|_http-traceroute: ERROR: Script execution failed (use -d to debug)
1731| http-vhosts:
1732|_127 names had status ERROR
1733|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
1734|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1735|_http-xssed: No previously reported XSS vuln.
1736| vulscan: VulDB - https://vuldb.com:
1737| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
1738| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
1739| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
1740| [139953] Microsoft Internet Explorer 10/11 memory corruption
1741| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
1742| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
1743| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
1744| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
1745| [136279] Microsoft Internet Explorer 10/11 memory corruption
1746| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
1747| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1748| [134682] Microsoft Internet Explorer 10/11 memory corruption
1749| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1750| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1751| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
1752| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1753| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1754| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1755| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1756| [131678] Microsoft Internet Explorer 10/11 memory corruption
1757| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
1758| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
1759| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
1760| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1761| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1762| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1763| [131618] Microsoft Internet Explorer 10/11 memory corruption
1764| [130827] Microsoft Internet Explorer 10/11 information disclosure
1765| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
1766| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
1767| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
1768| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
1769| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
1770| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
1771| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
1772| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1773| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1774| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1775| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1776| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
1777| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
1778| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
1779| [122846] Microsoft Internet Explorer 10/11 memory corruption
1780| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
1781| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1782| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
1783| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
1784| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
1785| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
1786| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
1787| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
1788| [115997] Microsoft Internet Explorer 10/11 memory corruption
1789| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
1790| [114567] Microsoft Internet Explorer 10/11 information disclosure
1791| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
1792| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
1793| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
1794| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
1795| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
1796| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
1797| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
1798| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
1799| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
1800| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1801| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
1802| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1803| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
1804| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
1805| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
1806| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1807| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1808| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
1809| [109365] Microsoft Internet Explorer 10/11 memory corruption
1810| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
1811| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
1812| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
1813| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
1814| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
1815| [102461] Microsoft Internet Explorer 10/11 memory corruption
1816| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
1817| [101007] Microsoft Internet Explorer 10/11 memory corruption
1818| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
1819| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
1820| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
1821| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
1822| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1823| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
1824| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1825| [97967] Microsoft Internet Explorer 10/11 memory corruption
1826| [97965] Microsoft Internet Explorer 10/11 memory corruption
1827| [94436] Microsoft Windows 10 Graphics memory corruption
1828| [94421] Microsoft Internet Explorer 10/11 information disclosure
1829| [94418] Microsoft Internet Explorer 10/11 privilege escalation
1830| [93427] Microsoft Internet Explorer 10/11 memory corruption
1831| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
1832| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
1833| [92561] Microsoft Internet Explorer 10/11 privilege escalation
1834| [92560] Microsoft Internet Explorer 10/11 privilege escalation
1835| [92557] Microsoft Internet Explorer 10/11 memory corruption
1836| [91560] Microsoft Windows 10 Object denial of service
1837| [91517] Microsoft Internet Explorer 10/11 memory corruption
1838| [91516] Microsoft Internet Explorer 10/11 privilege escalation
1839| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
1840| [90683] Microsoft Internet Explorer 10/11 information disclosure
1841| [89020] Microsoft Internet Explorer 10/11 information disclosure
1842| [89010] Microsoft Internet Explorer 10/11 memory corruption
1843| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1844| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
1845| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
1846| [87139] Microsoft Internet Explorer 10/11 information disclosure
1847| [82246] Microsoft Internet Explorer 10/11 memory corruption
1848| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
1849| [81271] Microsoft Windows 10 PDF Library memory corruption
1850| [81249] Microsoft Internet Explorer 10/11 memory corruption
1851| [81243] Microsoft Internet Explorer 10 memory corruption
1852| [80845] Microsoft Internet Explorer 10 memory corruption
1853| [80843] Microsoft Internet Explorer 10 memory corruption
1854| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
1855| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
1856| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
1857| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
1858| [79515] Microsoft Windows 10 Kernel memory corruption
1859| [79473] Microsoft Internet Explorer 10 memory corruption
1860| [79466] Microsoft Internet Explorer 10/11 memory corruption
1861| [79463] Microsoft Internet Explorer 10 memory corruption
1862| [79158] Microsoft Internet Explorer 10/11 memory corruption
1863| [79157] Microsoft Internet Explorer 10/11 memory corruption
1864| [79139] Microsoft Internet Explorer 10/11 memory corruption
1865| [78383] Microsoft Internet Explorer 10/11 privilege escalation
1866| [78382] Microsoft Internet Explorer 10 memory corruption
1867| [77643] Microsoft Internet Explorer 10/11 memory corruption
1868| [77597] Microsoft Internet Explorer 10/11 File denial of service
1869| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
1870| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
1871| [77005] Microsoft Internet Explorer 10/11 memory corruption
1872| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
1873| [76488] Microsoft Internet Explorer 10/11 File information disclosure
1874| [76487] Microsoft Internet Explorer 10/11 memory corruption
1875| [76475] Microsoft Internet Explorer 10/11 memory corruption
1876| [76436] Microsoft Internet Explorer 10/11 memory corruption
1877| [75781] Microsoft Internet Explorer 10/11 memory corruption
1878| [75777] Microsoft Internet Explorer 10 memory corruption
1879| [75767] Microsoft Internet Explorer 10/11 privilege escalation
1880| [75766] Microsoft Internet Explorer 10/11 memory corruption
1881| [75765] Microsoft Internet Explorer 10/11 memory corruption
1882| [75762] Microsoft Internet Explorer 10/11 memory corruption
1883| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
1884| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
1885| [75324] Microsoft Internet Explorer 10/11 memory corruption
1886| [74857] Microsoft Internet Explorer 10/11 memory corruption
1887| [73944] Microsoft Internet Explorer 10/11 memory corruption
1888| [73942] Microsoft Internet Explorer 10 memory corruption
1889| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
1890| [69144] Microsoft Internet Explorer 10/11 memory corruption
1891| [69141] Microsoft Internet Explorer 10/11 privilege escalation
1892| [69138] Microsoft Internet Explorer 10/11 memory corruption
1893| [69126] Microsoft Internet Explorer 10/11 memory corruption
1894| [69122] Microsoft Internet Explorer 10/11 memory corruption
1895| [69117] Microsoft Internet Explorer 10/11 memory corruption
1896| [69115] Microsoft Internet Explorer 10 memory corruption
1897| [69114] Microsoft Internet Explorer 10 memory corruption
1898| [68398] Microsoft Internet Explorer 10 memory corruption
1899| [68180] Microsoft Internet Explorer 10/11 privilege escalation
1900| [68179] Microsoft Internet Explorer 10/11 privilege escalation
1901| [68168] Microsoft Internet Explorer 10/11 memory corruption
1902| [67810] Microsoft Internet Explorer 10/11 memory corruption
1903| [67504] Microsoft Internet Explorer 10/11 memory corruption
1904| [67495] Microsoft Internet Explorer 10 memory corruption
1905| [67493] Microsoft Internet Explorer 10/11 memory corruption
1906| [67491] Microsoft Internet Explorer 10/11 memory corruption
1907| [67486] Microsoft Internet Explorer 10 memory corruption
1908| [67482] Microsoft Internet Explorer 10/11 memory corruption
1909| [67352] Microsoft Internet Explorer 10/11 memory corruption
1910| [67347] Microsoft Internet Explorer 10/11 memory corruption
1911| [67344] Microsoft Internet Explorer 10/11 memory corruption
1912| [67341] Microsoft Internet Explorer 10/11 memory corruption
1913| [67334] Microsoft Internet Explorer 10 memory corruption
1914| [67330] Microsoft Internet Explorer 10/11 memory corruption
1915| [67329] Microsoft Internet Explorer 10/11 memory corruption
1916| [67004] Microsoft Internet Explorer 10/11 memory corruption
1917| [13537] Microsoft Internet Explorer 10/11 memory corruption
1918| [13535] Microsoft Internet Explorer 10/11 memory corruption
1919| [13530] Microsoft Internet Explorer 10/11 memory corruption
1920| [13529] Microsoft Internet Explorer 10/11 memory corruption
1921| [13523] Microsoft Internet Explorer 10/11 memory corruption
1922| [13516] Microsoft Internet Explorer 10/11 memory corruption
1923| [13513] Microsoft Internet Explorer 10/11 memory corruption
1924| [13510] Microsoft Internet Explorer 10/11 memory corruption
1925| [13507] Microsoft Internet Explorer 10 memory corruption
1926| [13506] Microsoft Internet Explorer 10 memory corruption
1927| [13498] Microsoft Internet Explorer 10/11 memory corruption
1928| [13495] Microsoft Internet Explorer 10/11 information disclosure
1929| [13491] Microsoft Internet Explorer 10/11 memory corruption
1930| [12546] Microsoft Internet Explorer 10/11 memory corruption
1931| [12544] Microsoft Internet Explorer 10/11 memory corruption
1932| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
1933| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
1934| [11433] Microsoft Internet Explorer 10 memory corruption
1935| [10625] Microsoft Internet Explorer 10 memory corruption
1936| [10624] Microsoft Internet Explorer 10 memory corruption
1937| [10621] Microsoft Internet Explorer 10 memory corruption
1938| [10620] Microsoft Internet Explorer 10 memory corruption
1939| [10219] Microsoft Internet Explorer 10 memory corruption
1940| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
1941| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
1942| [9411] Microsoft Internet Explorer 10 memory corruption
1943| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
1944| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
1945| [9090] Microsoft Internet Explorer 10 memory corruption
1946| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
1947| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
1948| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
1949| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
1950| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
1951| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
1952| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
1953|
1954| MITRE CVE - https://cve.mitre.org:
1955| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
1956| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
1957| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1958| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1959| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
1960| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
1961| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1962| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1963| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1964| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1965| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1966| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1967| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
1968| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
1969| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
1970| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
1971| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
1972| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
1973| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
1974| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
1975| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
1976| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
1977| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
1978| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
1979| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
1980| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
1981| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
1982| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
1983| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
1984| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
1985| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
1986| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
1987| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
1988| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
1989| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
1990| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
1991| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
1992| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
1993| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
1994| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
1995| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
1996| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
1997| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
1998| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
1999| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
2000| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
2001| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
2002| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
2003| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
2004| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
2005| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
2006| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
2007| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
2008| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
2009| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
2010| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
2011| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
2012| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
2013| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
2014| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
2015| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
2016| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
2017| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
2018| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
2019| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
2020| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
2021| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
2022| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
2023| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
2024| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
2025| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
2026| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
2027| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
2028| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
2029| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
2030| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
2031| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
2032| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
2033| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
2034| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
2035| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
2036| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
2037| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
2038| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
2039| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
2040| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
2041| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
2042| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
2043| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
2044| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
2045| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
2046| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
2047| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
2048| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
2049| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
2050| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
2051| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
2052| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
2053| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
2054| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
2055| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
2056| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
2057| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
2058| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
2059|
2060| SecurityFocus - https://www.securityfocus.com/bid/:
2061| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
2062|
2063| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2064| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
2065| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
2066|
2067| Exploit-DB - https://www.exploit-db.com:
2068| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
2069| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
2070|
2071| OpenVAS (Nessus) - http://www.openvas.org:
2072| [855384] Solaris Update for snmp/mibiisa 108870-36
2073| [855273] Solaris Update for snmp/mibiisa 108869-36
2074| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
2075|
2076| SecurityTracker - https://www.securitytracker.com:
2077| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
2078|
2079| OSVDB - http://www.osvdb.org:
2080| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
2081| [87262] Microsoft IIS FTP Command Injection Information Disclosure
2082| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
2083| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
2084| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
2085| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
2086| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
2087| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
2088| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
2089| [71856] Microsoft IIS Status Header Handling Remote Overflow
2090| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
2091| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
2092| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
2093| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
2094| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
2095| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
2096| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
2097| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
2098| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
2099| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
2100| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
2101| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
2102| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
2103| [59892] Microsoft IIS Malformed Host Header Remote DoS
2104| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
2105| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
2106| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
2107| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
2108| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
2109| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
2110| [55269] Microsoft IIS Traversal GET Request Remote DoS
2111| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
2112| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
2113| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
2114| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
2115| [52238] Microsoft IIS IDC Extension XSS
2116| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
2117| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
2118| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
2119| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
2120| [43451] Microsoft IIS HTTP Request Smuggling
2121| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
2122| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
2123| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
2124| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
2125| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
2126| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
2127| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
2128| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
2129| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
2130| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
2131| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
2132| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
2133| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
2134| [27152] Microsoft Windows IIS ASP Page Processing Overflow
2135| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
2136| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
2137| [21805] Microsoft IIS Crafted URL Remote DoS
2138| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
2139| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
2140| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
2141| [17124] Microsoft IIS Malformed WebDAV Request DoS
2142| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
2143| [17122] Microsoft IIS Permission Weakness .COM File Upload
2144| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
2145| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
2146| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
2147| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
2148| [13760] Microsoft IIS Malformed URL Request DoS
2149| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
2150| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
2151| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
2152| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
2153| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
2154| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
2155| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
2156| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
2157| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
2158| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
2159| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
2160| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
2161| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
2162| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
2163| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
2164| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
2165| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
2166| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
2167| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
2168| [11257] Microsoft IIS Malformed GET Request DoS
2169| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
2170| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
2171| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
2172| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
2173| [9200] Microsoft IIS Unspecified XSS Variant
2174| [9199] Microsoft IIS shtml.dll XSS
2175| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
2176| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
2177| [7737] Microsoft IIS ASP Redirection Function XSS
2178| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
2179| [5851] Microsoft IIS Single Dot Source Code Disclosure
2180| [5736] Microsoft IIS Relative Path System Privilege Escalation
2181| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
2182| [5633] Microsoft IIS Invalid WebDAV Request DoS
2183| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
2184| [5584] Microsoft IIS URL Redirection Malformed Length DoS
2185| [5566] Microsoft IIS Form_VBScript.asp XSS
2186| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
2187| [4864] Microsoft IIS TRACK Logging Failure
2188| [4863] Microsoft IIS Active Server Page Header DoS
2189| [4791] Microsoft IIS Response Object DoS
2190| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
2191| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
2192| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
2193| [3500] Microsoft IIS fpcount.exe Remote Overflow
2194| [3341] Microsoft IIS Redirect Response XSS
2195| [3339] Microsoft IIS HTTP Error Page XSS
2196| [3338] Microsoft IIS Help File XSS
2197| [3328] Microsoft IIS FTP Status Request DoS
2198| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
2199| [3325] Microsoft IIS HTR ISAPI Overflow
2200| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
2201| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
2202| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
2203| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
2204| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
2205| [3231] Microsoft IIS Log Bypass
2206| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
2207| [1931] Microsoft IIS MIME Content-Type Header DoS
2208| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
2209| [1826] Microsoft IIS Domain Guest Account Disclosure
2210| [1824] Microsoft IIS FTP DoS
2211| [1804] Microsoft IIS Long Request Parsing Remote DoS
2212| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
2213| [1750] Microsoft IIS File Fragment Disclosure
2214| [1543] Microsoft NT/IIS Invalid URL Request DoS
2215| [1504] Microsoft IIS File Permission Canonicalization Bypass
2216| [1465] Microsoft IIS .htr Missing Variable DoS
2217| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
2218| [1322] Microsoft IIS Malformed .htr Request DoS
2219| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
2220| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
2221| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
2222| [1170] Microsoft IIS Escape Character URL Access Bypass
2223| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
2224| [1082] Microsoft IIS Domain Resolution Access Bypass
2225| [1041] Microsoft IIS Malformed HTTP Request Header DoS
2226| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
2227| [930] Microsoft IIS Shared ASP Cache Information Disclosure
2228| [929] Microsoft IIS FTP Server NLST Command Overflow
2229| [928] Microsoft IIS Long Request Log Evasion
2230| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
2231| [814] Microsoft IIS global.asa Remote Information Disclosure
2232| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
2233| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
2234| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
2235| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
2236| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
2237| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
2238| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
2239| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
2240| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
2241| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
2242| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
2243| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
2244| [473] Microsoft IIS Multiple .cnf File Information Disclosure
2245| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
2246| [470] Microsoft IIS Form_JScript.asp XSS
2247| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
2248| [436] Microsoft IIS Unicode Remote Command Execution
2249| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
2250| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
2251| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
2252| [308] Microsoft IIS Malformed File Extension URL DoS
2253| [285] Microsoft IIS repost.asp File Upload
2254| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
2255| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
2256| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
2257| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
2258| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
2259| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
2260| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
2261| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
2262| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
2263| [98] Microsoft IIS perl.exe HTTP Path Disclosure
2264| [97] Microsoft IIS ISM.DLL HTR Request Overflow
2265| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
2266| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
2267| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
2268| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
2269| [2] Microsoft IIS ExAir search.asp Direct Request DoS
2270| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
2271| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
2272| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
2273| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
2274| [96192] Microsoft IE EUC-JP Character Encoding XSS
2275| [96191] Microsoft IE Process Integrity Level Assignment Bypass
2276| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
2277| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
2278| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
2279| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
2280| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
2281| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
2282| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
2283| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
2284| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
2285| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
2286| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
2287| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
2288| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
2289| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
2290| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
2291| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
2292| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
2293| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
2294| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
2295| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
2296| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
2297| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
2298| [94984] Microsoft IE Shift JIS Character Encoding XSS
2299| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
2300| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
2301| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
2302| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
2303| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
2304| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
2305| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
2306| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
2307| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
2308| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
2309| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
2310| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
2311| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
2312| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
2313| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
2314| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
2315| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
2316| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
2317| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
2318| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
2319| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
2320| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
2321| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
2322| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
2323| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
2324| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
2325| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
2326| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
2327| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
2328| [94507] Microsoft IE Infinite Loop DoS
2329| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
2330| [94127] Microsoft Office PNG File Handling Buffer Overflow
2331| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
2332| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
2333| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
2334| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
2335| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
2336| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
2337| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
2338| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
2339| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
2340| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
2341| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
2342| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
2343| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
2344| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
2345| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
2346| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
2347| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
2348| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
2349| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
2350| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
2351| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
2352| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
2353| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
2354| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
2355| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
2356| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
2357| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
2358| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
2359| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
2360| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
2361| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
2362| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
2363| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
2364| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
2365| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
2366| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
2367| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
2368| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
2369| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
2370| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
2371| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
2372| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
2373| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
2374| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
2375| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
2376| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2377| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
2378| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
2379| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
2380| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
2381| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
2382| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
2383| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
2384| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
2385| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
2386| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
2387| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
2388| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
2389| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
2390| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
2391| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
2392| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
2393| [92257] Microsoft IE CSS Import Handling Remote DoS
2394| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
2395| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
2396| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
2397| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
2398| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
2399| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
2400| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
2401| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
2402| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
2403| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
2404| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
2405| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
2406| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
2407| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
2408| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
2409| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
2410| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
2411| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
2412| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
2413| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
2414| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
2415| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
2416| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
2417| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
2418| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
2419| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
2420| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
2421| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
2422| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
2423| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
2424| [91150] Microsoft SharePoint Unspecified XSS
2425| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
2426| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
2427| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
2428| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
2429| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
2430| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
2431| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
2432| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
2433| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
2434| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
2435| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
2436| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
2437| [90933] Microsoft IE Arbitrary HTM File Execution
2438| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
2439| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
2440| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
2441| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
2442| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
2443| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
2444| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
2445| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
2446| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
2447| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
2448| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
2449| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
2450| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
2451| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
2452| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
2453| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
2454| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
2455| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
2456| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
2457| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
2458| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
2459| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
2460| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
2461| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
2462| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
2463| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
2464| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
2465| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
2466| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
2467| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
2468| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
2469| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
2470| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
2471| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
2472| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
2473| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
2474| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
2475| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
2476| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
2477| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
2478| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
2479| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
2480| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
2481| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
2482| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
2483| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
2484| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
2485| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
2486| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
2487| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
2488| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
2489| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
2490| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
2491| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
2492| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
2493| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
2494| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
2495| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
2496| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
2497| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
2498| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
2499| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
2500| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
2501| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
2502| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
2503| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
2504| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
2505| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
2506| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
2507| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
2508| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
2509| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
2510| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
2511| [88837] Microsoft Office Excel Memory Corruption DoS
2512| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
2513| [88811] Microsoft Visio VSD File Parsing Memory Corruption
2514| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
2515| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
2516| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
2517| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
2518| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
2519| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
2520| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2521| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
2522| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
2523| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
2524| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
2525| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
2526| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
2527| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
2528| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
2529| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
2530| [87819] Microsoft Office OneNote File Handling Memory Corruption
2531| [87273] Microsoft Office Excel XLS File Handling Overflow
2532| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
2533| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
2534| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
2535| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
2536| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
2537| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
2538| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
2539| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
2540| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
2541| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
2542| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
2543| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
2544| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
2545| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
2546| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
2547| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
2548| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
2549| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
2550| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
2551| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
2552| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
2553| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
2554| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
2555| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
2556| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
2557| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
2558| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
2559| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
2560| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
2561| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
2562| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
2563| [86732] Microsoft Office DOC File Handling Stack Overflow
2564| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
2565| [86622] Microsoft SQL Server Local Authentication Bypass
2566| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
2567| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
2568| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
2569| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
2570| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
2571| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
2572| [86057] Microsoft SQL Server Report Manager Unspecified XSS
2573| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
2574| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
2575| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
2576| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
2577| [85833] Microsoft Outlook Concealed Attachment Weakness
2578| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
2579| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
2580| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
2581| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
2582| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
2583| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
2584| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
2585| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
2586| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
2587| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
2588| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
2589| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
2590| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
2591| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
2592| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
2593| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
2594| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
2595| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
2596| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
2597| [84606] Microsoft Visio DXF File Handling Overflow
2598| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
2599| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
2600| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
2601| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
2602| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
2603| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
2604| [84599] Microsoft Windows Print Spooler Service Remote Format String
2605| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
2606| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
2607| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
2608| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
2609| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
2610| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
2611| [84553] Microsoft Help &
2612| [83860] Microsoft IE XML Data Handling Arbitrary File Access
2613| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
2614| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
2615| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
2616| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
2617| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
2618| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
2619| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
2620| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
2621| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
2622| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
2623| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
2624| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2625| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
2626| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
2627| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
2628| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
2629| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
2630| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
2631| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
2632| [83647] Microsoft SharePoint Username Unspecified XSS
2633| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
2634| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
2635| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
2636| [83439] Microsoft IE Long Unicode String Handling DoS
2637| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
2638| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
2639| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
2640| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
2641| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
2642| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
2643| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
2644| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
2645| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
2646| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
2647| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
2648| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
2649| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
2650| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
2651| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
2652| [82862] Microsoft IE EUC-JP Character Encoding XSS
2653| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
2654| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
2655| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
2656| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
2657| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
2658| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
2659| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
2660| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
2661| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
2662| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2663| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
2664| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
2665| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
2666| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
2667| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
2668| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
2669| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
2670| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
2671| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
2672| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
2673| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
2674| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
2675| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
2676| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
2677| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
2678| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
2679| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
2680| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
2681| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
2682| [81732] Microsoft Office RTF Data Handling Memory Corruption
2683| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
2684| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
2685| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
2686| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
2687| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
2688| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
2689| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
2690| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
2691| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
2692| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
2693| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
2694| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
2695| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
2696| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
2697| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
2698| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
2699| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
2700| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
2701| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
2702| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
2703| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
2704| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
2705| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
2706| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
2707| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
2708| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
2709| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
2710| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
2711| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
2712| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
2713| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
2714| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
2715| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
2716| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
2717| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
2718| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
2719| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
2720| [80173] Microsoft IE Unspecified Overflow
2721| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
2722| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
2723| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
2724| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
2725| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
2726| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
2727| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
2728| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
2729| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
2730| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
2731| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
2732| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
2733| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
2734| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
2735| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
2736| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
2737| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
2738| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
2739| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
2740| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
2741| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
2742| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
2743| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
2744| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
2745| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
2746| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
2747| [79192] Microsoft IE Javascript Dialog Origin Spoofing
2748| [79186] Microsoft IE onunload Location Field Overwrite
2749| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
2750| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
2751| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
2752| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
2753| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
2754| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
2755| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
2756| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
2757| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
2758| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
2759| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
2760| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
2761| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
2762| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
2763| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
2764| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
2765| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
2766| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
2767| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
2768| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
2769| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
2770| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
2771| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
2772| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
2773| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
2774| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
2775| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
2776| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
2777| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
2778| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
2779| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
2780| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
2781| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
2782| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
2783| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
2784| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
2785| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
2786| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
2787| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
2788| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
2789| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
2790| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
2791| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
2792| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
2793| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
2794| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
2795| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
2796| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
2797| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
2798| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
2799| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
2800| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
2801| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
2802| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
2803| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
2804| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
2805| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
2806| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
2807| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
2808| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
2809| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
2810| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
2811| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
2812| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
2813| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
2814| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
2815| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
2816| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
2817| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
2818| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
2819| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
2820| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
2821| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
2822| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
2823| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
2824| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
2825| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
2826| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
2827| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
2828| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
2829| [75393] Microsoft SharePoint Unspecified URI XSS
2830| [75391] Microsoft SharePoint Contact Details XSS
2831| [75390] Microsoft SharePoint EditForm.aspx XSS
2832| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
2833| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
2834| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
2835| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
2836| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
2837| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
2838| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
2839| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
2840| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
2841| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
2842| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
2843| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
2844| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
2845| [75250] Microsoft IE Unspecified Remote Code Execution
2846| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
2847| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
2848| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
2849| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
2850| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
2851| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
2852| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
2853| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
2854| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
2855| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
2856| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
2857| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
2858| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
2859| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
2860| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
2861| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
2862| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
2863| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
2864| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
2865| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
2866| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
2867| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
2868| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
2869| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
2870| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
2871| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
2872| [74396] Microsoft Report Viewer Control Unspecified XSS
2873| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
2874| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
2875| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
2876| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
2877| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
2878| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
2879| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
2880| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
2881| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
2882| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
2883| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
2884| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
2885| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
2886| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
2887| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
2888| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
2889| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
2890| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
2891| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
2892| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
2893| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
2894| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
2895| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
2896| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
2897| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
2898| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
2899| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
2900| [73602] Microsoft Windows nsiproxy.sys Local DoS
2901| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
2902| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
2903| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
2904| [72960] Microsoft SMB Client Response Handling Remote Code Execution
2905| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
2906| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
2907| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
2908| [72953] Microsoft IE MIME Sniffing Information Disclosure
2909| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
2910| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
2911| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
2912| [72949] Microsoft IE Drag and Drop Information Disclosure
2913| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
2914| [72947] Microsoft IE Time Element Memory Corruption
2915| [72946] Microsoft IE Drag and Drop Memory Corruption
2916| [72944] Microsoft IE SafeHTML Function XSS
2917| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
2918| [72942] Microsoft IE Link Properties Handling Memory Corruption
2919| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
2920| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
2921| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
2922| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
2923| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
2924| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
2925| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
2926| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
2927| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
2928| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
2929| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
2930| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
2931| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
2932| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
2933| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
2934| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
2935| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
2936| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
2937| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
2938| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
2939| [72696] Microsoft Reader AOLL Chunk Array Overflow
2940| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
2941| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
2942| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
2943| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
2944| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
2945| [72680] Microsoft IE UTF-7 Local Redirection XSS
2946| [72679] Microsoft IE Tags javascript:[jscodz] XSS
2947| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
2948| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
2949| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
2950| [72672] Microsoft Windows AppFix systest.sdb Local DoS
2951| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
2952| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
2953| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
2954| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
2955| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
2956| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
2957| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
2958| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
2959| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
2960| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
2961| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
2962| [71777] Microsoft IE Frame Tag Handling Information Disclosure
2963| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
2964| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
2965| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
2966| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
2967| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
2968| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
2969| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
2970| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
2971| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
2972| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
2973| [71765] Microsoft Office Excel File Validation Record Handling Overflow
2974| [71761] Microsoft Office Excel File Handling Memory Corruption
2975| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
2976| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
2977| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
2978| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
2979| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
2980| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
2981| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
2982| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
2983| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
2984| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
2985| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
2986| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
2987| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
2988| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
2989| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
2990| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
2991| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
2992| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
2993| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
2994| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
2995| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
2996| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
2997| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
2998| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
2999| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
3000| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
3001| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
3002| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
3003| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
3004| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
3005| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
3006| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
3007| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
3008| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
3009| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
3010| [71724] Microsoft IE Layouts Handling Memory Corruption
3011| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
3012| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
3013| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
3014| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
3015| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
3016| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
3017| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
3018| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
3019| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
3020| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
3021| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
3022| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
3023| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
3024| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
3025| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
3026| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
3027| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
3028| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
3029| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
3030| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
3031| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
3032| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
3033| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
3034| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
3035| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
3036| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
3037| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
3038| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
3039| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
3040| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
3041| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
3042| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
3043| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
3044| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
3045| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
3046| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
3047| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
3048| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
3049| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
3050| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
3051| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
3052| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
3053| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
3054| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
3055| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
3056| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
3057| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
3058| [69828] Microsoft IE Recursive Select Element Remote Code Execution
3059| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
3060| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
3061| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
3062| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
3063| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
3064| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
3065| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
3066| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
3067| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
3068| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
3069| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
3070| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
3071| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
3072| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
3073| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
3074| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
3075| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
3076| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
3077| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
3078| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
3079| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
3080| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
3081| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
3082| [69804] Microsoft Office PICT Image Converter Overflow
3083| [69803] Microsoft Office CGM Image Converter Overflow
3084| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
3085| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
3086| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
3087| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
3088| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
3089| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
3090| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
3091| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
3092| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
3093| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
3094| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
3095| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
3096| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
3097| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
3098| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
3099| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
3100| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
3101| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
3102| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
3103| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
3104| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
3105| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
3106| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
3107| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
3108| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
3109| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
3110| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
3111| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
3112| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
3113| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
3114| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
3115| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
3116| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
3117| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
3118| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
3119| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
3120| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
3121| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
3122| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
3123| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
3124| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
3125| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
3126| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
3127| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
3128| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
3129| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
3130| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
3131| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
3132| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
3133| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
3134| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
3135| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
3136| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
3137| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
3138| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
3139| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
3140| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
3141| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
3142| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
3143| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
3144| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
3145| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
3146| [68548] Microsoft IE / SharePoint Unspecified XSS
3147| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
3148| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
3149| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
3150| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
3151| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
3152| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
3153| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
3154| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
3155| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
3156| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
3157| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
3158| [68438] Microsoft XSS Filter Library Bypass
3159| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
3160| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
3161| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
3162| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
3163| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
3164| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
3165| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
3166| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
3167| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
3168| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
3169| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
3170| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
3171| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
3172| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
3173| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
3174| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
3175| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
3176| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
3177| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
3178| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
3179| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
3180| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
3181| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
3182| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
3183| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
3184| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
3185| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
3186| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
3187| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
3188| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
3189| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
3190| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
3191| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
3192| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
3193| [67463] Microsoft IE location.replace Address Bar Spoofing
3194| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
3195| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
3196| [67258] Microsoft ClickOnce MITM Weakness
3197| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
3198| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
3199| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
3200| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
3201| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
3202| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
3203| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
3204| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
3205| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
3206| [67000] Microsoft IE boundElements Property Handling Memory Corruption
3207| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
3208| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
3209| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
3210| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
3211| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
3212| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
3213| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
3214| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
3215| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
3216| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
3217| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
3218| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
3219| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
3220| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
3221| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
3222| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
3223| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
3224| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
3225| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
3226| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
3227| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
3228| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
3229| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
3230| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
3231| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
3232| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
3233| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
3234| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
3235| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
3236| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
3237| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
3238| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
3239| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
3240| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
3241| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
3242| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
3243| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
3244| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
3245| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
3246| [65502] Microsoft IE Unspecified DoS
3247| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
3248| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
3249| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
3250| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
3251| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
3252| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
3253| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
3254| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
3255| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
3256| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
3257| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
3258| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
3259| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
3260| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
3261| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
3262| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
3263| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
3264| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
3265| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
3266| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
3267| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
3268| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
3269| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
3270| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
3271| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
3272| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
3273| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
3274| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
3275| [65213] Microsoft IE HTML Element Handling Memory Corruption
3276| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
3277| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
3278| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
3279| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
3280| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
3281| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
3282| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
3283| [64952] Microsoft IE img Tag Hijacking Weakness
3284| [64944] Microsoft Dynamics GP Default System Password
3285| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
3286| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
3287| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
3288| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
3289| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
3290| [64828] Microsoft IE history go ActiveX Overflow DoS
3291| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
3292| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
3293| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
3294| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
3295| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
3296| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
3297| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
3298| [64533] Microsoft IE document.createElement NULL Dereference DoS
3299| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
3300| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
3301| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
3302| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
3303| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
3304| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
3305| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
3306| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
3307| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
3308| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
3309| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
3310| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
3311| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
3312| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
3313| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
3314| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
3315| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
3316| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
3317| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
3318| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
3319| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
3320| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
3321| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
3322| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
3323| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
3324| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
3325| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
3326| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
3327| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
3328| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
3329| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
3330| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
3331| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
3332| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
3333| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
3334| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
3335| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
3336| [63334] Microsoft IE Post Encoding Information Disclosure
3337| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
3338| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
3339| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
3340| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
3341| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
3342| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
3343| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
3344| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
3345| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
3346| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
3347| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
3348| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
3349| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
3350| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
3351| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
3352| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
3353| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
3354| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
3355| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
3356| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
3357| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
3358| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
3359| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
3360| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
3361| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
3362| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
3363| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
3364| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3365| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
3366| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
3367| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
3368| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
3369| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
3370| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
3371| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
3372| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
3373| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
3374| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
3375| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
3376| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
3377| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
3378| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
3379| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
3380| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
3381| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
3382| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
3383| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
3384| [62239] Microsoft Office Powerpoint File Path Handling Overflow
3385| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
3386| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
3387| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
3388| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
3389| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
3390| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
3391| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
3392| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
3393| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
3394| [61911] Microsoft IE Table Layout Reuse Memory Corruption
3395| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
3396| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
3397| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
3398| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
3399| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
3400| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
3401| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
3402| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
3403| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
3404| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
3405| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
3406| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
3407| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
3408| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
3409| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
3410| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
3411| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
3412| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
3413| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
3414| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
3415| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
3416| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
3417| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
3418| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
3419| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
3420| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
3421| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
3422| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
3423| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
3424| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
3425| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
3426| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
3427| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
3428| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
3429| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
3430| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
3431| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
3432| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
3433| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
3434| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
3435| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
3436| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
3437| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
3438| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
3439| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
3440| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
3441| [59957] Microsoft Windows SMB Response Handling Remote DoS
3442| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
3443| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
3444| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
3445| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
3446| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
3447| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
3448| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
3449| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
3450| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
3451| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
3452| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
3453| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
3454| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
3455| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
3456| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
3457| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
3458| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
3459| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
3460| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
3461| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
3462| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
3463| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
3464| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
3465| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
3466| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
3467| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
3468| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
3469| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
3470| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
3471| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
3472| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
3473| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
3474| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
3475| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
3476| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
3477| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
3478| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
3479| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
3480| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
3481| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
3482| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
3483| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
3484| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
3485| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
3486| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
3487| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
3488| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
3489| [59263] Microsoft IE IMG Tag width Handling DoS
3490| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
3491| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
3492| [59258] Microsoft Exchange ACL Modification Update Weakness
3493| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
3494| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
3495| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
3496| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
3497| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
3498| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
3499| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
3500| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
3501| [58870] Microsoft Office BMP Image Color Processing Overflow
3502| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
3503| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
3504| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
3505| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
3506| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
3507| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
3508| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3509| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
3510| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
3511| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
3512| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
3513| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
3514| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
3515| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
3516| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
3517| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
3518| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
3519| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
3520| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
3521| [58843] Microsoft Windows Media Player ASF Handling Overflow
3522| [58817] Microsoft IE Nested marquee Tag Handling DoS
3523| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
3524| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
3525| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
3526| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
3527| [58399] Microsoft IE window.print Function Loop Remote DoS
3528| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
3529| [58350] Microsoft Patterns &
3530| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
3531| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
3532| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
3533| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
3534| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
3535| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
3536| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
3537| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
3538| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
3539| [57742] Microsoft SQL Cleartext User Passwords Disclosure
3540| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
3541| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
3542| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
3543| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
3544| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
3545| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
3546| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
3547| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
3548| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
3549| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
3550| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
3551| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
3552| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
3553| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
3554| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
3555| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
3556| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
3557| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
3558| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
3559| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
3560| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
3561| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
3562| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
3563| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
3564| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
3565| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
3566| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
3567| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
3568| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
3569| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
3570| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
3571| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
3572| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
3573| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
3574| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
3575| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
3576| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
3577| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
3578| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
3579| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
3580| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
3581| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
3582| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
3583| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
3584| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
3585| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
3586| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
3587| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
3588| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
3589| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
3590| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
3591| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
3592| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
3593| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
3594| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
3595| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
3596| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
3597| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
3598| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
3599| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
3600| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
3601| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
3602| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
3603| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
3604| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
3605| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
3606| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
3607| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
3608| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
3609| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
3610| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
3611| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
3612| [54955] Microsoft Office Excel Malformed Records Handling Overflow
3613| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
3614| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
3615| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
3616| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
3617| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
3618| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
3619| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
3620| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
3621| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
3622| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
3623| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
3624| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
3625| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
3626| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
3627| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
3628| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
3629| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
3630| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
3631| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
3632| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
3633| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
3634| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
3635| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
3636| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
3637| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
3638| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
3639| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
3640| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
3641| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
3642| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
3643| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
3644| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
3645| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
3646| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
3647| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
3648| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
3649| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
3650| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
3651| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
3652| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
3653| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
3654| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
3655| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
3656| [54183] Microsoft IE Unprintable Character Document Handling DoS
3657| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
3658| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
3659| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
3660| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
3661| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
3662| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
3663| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
3664| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
3665| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
3666| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
3667| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
3668| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
3669| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
3670| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
3671| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
3672| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
3673| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
3674| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
3675| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
3676| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
3677| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
3678| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
3679| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
3680| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
3681| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
3682| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
3683| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
3684| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
3685| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
3686| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
3687| [52694] Microsoft Windows Media Player Malformed GET Request DoS
3688| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
3689| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
3690| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
3691| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
3692| [52689] Microsoft Word Document Handling HTML Object Tag DoS
3693| [52688] Microsoft Word Document Handling HTML Object Tag XSS
3694| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
3695| [52685] Microsoft Windows FTP Client Multiple Command Overflows
3696| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
3697| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
3698| [52682] Microsoft Windows Explorer ZIP Handler DoS
3699| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
3700| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
3701| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
3702| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
3703| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
3704| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
3705| [52666] Microsoft IE Malformed file:// URI Handling DoS
3706| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
3707| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
3708| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
3709| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
3710| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
3711| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
3712| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
3713| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
3714| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
3715| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
3716| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
3717| [52517] Microsoft Windows DNS Server Query Validation Spoofing
3718| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
3719| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
3720| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
3721| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
3722| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
3723| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
3724| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
3725| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
3726| [51433] Microsoft Windows Crafted CHM File Handling Overflow
3727| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
3728| [51277] Microsoft Excel HTML Tag Interpretation XSS
3729| [51259] Microsoft IE onload=screen["
3730| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
3731| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
3732| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
3733| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
3734| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
3735| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
3736| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
3737| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
3738| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
3739| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
3740| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
3741| [50598] Microsoft Office Word Table Property Handling Overflow
3742| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
3743| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
3744| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
3745| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
3746| [50592] Microsoft Office Word Malformed Value Memory Corruption
3747| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
3748| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
3749| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
3750| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
3751| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
3752| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
3753| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
3754| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
3755| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
3756| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
3757| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
3758| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
3759| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
3760| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
3761| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
3762| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
3763| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
3764| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
3765| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
3766| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
3767| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
3768| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
3769| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
3770| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
3771| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
3772| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
3773| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
3774| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
3775| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
3776| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
3777| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
3778| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
3779| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
3780| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
3781| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
3782| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
3783| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
3784| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
3785| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
3786| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
3787| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
3788| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
3789| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
3790| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
3791| [49385] Microsoft ASP.NET Request Validation <
3792| [49384] Microsoft ASP.NET Request Validation <
3793| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
3794| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
3795| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
3796| [49118] Microsoft IE HTML Object Handling Memory Corruption
3797| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
3798| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
3799| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
3800| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
3801| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
3802| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
3803| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
3804| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
3805| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
3806| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
3807| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
3808| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
3809| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
3810| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
3811| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
3812| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
3813| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3814| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
3815| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
3816| [48837] Microsoft Windows Vista Page Fault Handling DoS
3817| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
3818| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
3819| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
3820| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
3821| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
3822| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
3823| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
3824| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
3825| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
3826| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
3827| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
3828| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
3829| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
3830| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
3831| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3832| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
3833| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
3834| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
3835| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
3836| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
3837| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
3838| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
3839| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
3840| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
3841| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
3842| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
3843| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
3844| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
3845| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
3846| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
3847| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
3848| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
3849| [47410] Microsoft Office Excel connections.xml Password String Persistence
3850| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
3851| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
3852| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
3853| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
3854| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
3855| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
3856| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
3857| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
3858| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
3859| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
3860| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
3861| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
3862| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
3863| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
3864| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
3865| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
3866| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
3867| [46935] Microsoft IE Pop Up Blocker Multiple Issues
3868| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
3869| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
3870| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
3871| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
3872| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
3873| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
3874| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
3875| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
3876| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
3877| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
3878| [46772] Microsoft SQL Server Convert Function Overflow
3879| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
3880| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
3881| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
3882| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
3883| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
3884| [46630] Microsoft IE location Window Object Handling XSS
3885| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
3886| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
3887| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
3888| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
3889| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
3890| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
3891| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
3892| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
3893| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
3894| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
3895| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
3896| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
3897| [45826] Microsoft IE Local Zone Saved File URI XSS
3898| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
3899| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
3900| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
3901| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
3902| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
3903| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
3904| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
3905| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
3906| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
3907| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
3908| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
3909| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
3910| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
3911| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
3912| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
3913| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
3914| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
3915| [45262] Microsoft ISA Server Host Header Log File Content Injection
3916| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
3917| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
3918| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
3919| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
3920| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
3921| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
3922| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
3923| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
3924| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
3925| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
3926| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
3927| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
3928| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
3929| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
3930| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
3931| [44979] Microsoft SQL Server Blank sa Password Set Weakness
3932| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
3933| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
3934| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
3935| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
3936| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
3937| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
3938| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
3939| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
3940| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
3941| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
3942| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
3943| [44303] Microsoft IE body Tag Infinite Loop DoS
3944| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
3945| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
3946| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
3947| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
3948| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
3949| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
3950| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
3951| [44205] Microsoft IE Data Stream Handling Memory Corruption
3952| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
3953| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
3954| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
3955| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
3956| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
3957| [44150] Microsoft Access Crafted MDB File Handling Overflow
3958| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
3959| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
3960| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
3961| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
3962| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
3963| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
3964| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
3965| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
3966| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
3967| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
3968| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
3969| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
3970| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
3971| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
3972| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
3973| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
3974| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
3975| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
3976| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
3977| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
3978| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
3979| [42724] Microsoft Excel Style Record Handling Memory Corruption
3980| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
3981| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
3982| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
3983| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
3984| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
3985| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
3986| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
3987| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
3988| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
3989| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
3990| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
3991| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
3992| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
3993| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
3994| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
3995| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
3996| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
3997| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
3998| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
3999| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
4000| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
4001| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
4002| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
4003| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
4004| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
4005| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
4006| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
4007| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
4008| [41155] Microsoft Windows Hardware-enforced DEP Bypass
4009| [41154] Microsoft Windows XP EFS Cleartext Password Storage
4010| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
4011| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
4012| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
4013| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
4014| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
4015| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
4016| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
4017| [41060] Microsoft .NET Unspecified XSS Filter Bypass
4018| [41059] Microsoft Windows ARP Saturation Remote DoS
4019| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
4020| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
4021| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
4022| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
4023| [41041] Microsoft IE Mouse Click self.resizeTo DoS
4024| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
4025| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
4026| [41035] Microsoft IE onload Localhost DoS
4027| [41026] Microsoft IE GET Request Overflow
4028| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
4029| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
4030| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
4031| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
4032| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
4033| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
4034| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
4035| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
4036| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
4037| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
4038| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
4039| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
4040| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
4041| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
4042| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
4043| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
4044| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
4045| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
4046| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
4047| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
4048| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
4049| [39121] Microsoft IE DHTML Object Memory Corruption
4050| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
4051| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
4052| [39118] Microsoft IE Object setExpression Function Memory Corruption
4053| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
4054| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
4055| [38955] Microsoft IE history.length Variable History Disclosure
4056| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
4057| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
4058| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
4059| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
4060| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
4061| [38495] Microsoft IE Outlook Express Address Book Activex DoS
4062| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
4063| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
4064| [38488] Microsoft ISA Server File Extension Filter Bypass
4065| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
4066| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
4067| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
4068| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
4069| [38212] Microsoft IE document.open() Function Address Bar Spoofing
4070| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
4071| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
4072| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
4073| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
4074| [37637] Microsoft Windows Crafted HLP File Overflow
4075| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
4076| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
4077| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
4078| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
4079| [37632] Microsoft Word Unspecified Memory Corruption
4080| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
4081| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
4082| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
4083| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
4084| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
4085| [37626] Microsoft IE Unspecified Address Bar Spoofing
4086| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
4087| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
4088| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
4089| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
4090| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
4091| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
4092| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
4093| [36936] Microsoft Visual Basic VBP File Handling Overflow
4094| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
4095| [36934] Microsoft Agent URL Handling Remote Code Execution
4096| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
4097| [36400] Microsoft IE HTML FTP Credential Disclosure
4098| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
4099| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
4100| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
4101| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
4102| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
4103| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
4104| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
4105| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
4106| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
4107| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
4108| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
4109| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
4110| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
4111| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
4112| [36385] Microsoft Windows Media Player Skin File Handling Overflow
4113| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
4114| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
4115| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
4116| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
4117| [36147] Microsoft IE Zone Domain Specification DoS
4118| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
4119| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
4120| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
4121| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
4122| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
4123| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
4124| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
4125| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
4126| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
4127| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
4128| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
4129| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
4130| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
4131| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
4132| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
4133| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
4134| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
4135| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
4136| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
4137| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
4138| [35637] Microsoft Windows Unspecified Remote Code Execution
4139| [35568] Microsoft IE Script Variable Length DoS
4140| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
4141| [35352] Microsoft IE navcancl.htm res: URI Phishing
4142| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
4143| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
4144| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
4145| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
4146| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
4147| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
4148| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
4149| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
4150| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
4151| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
4152| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
4153| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
4154| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
4155| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
4156| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
4157| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
4158| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
4159| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
4160| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
4161| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
4162| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
4163| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
4164| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
4165| [34401] Microsoft IE Property Method Handling Memory Corruption
4166| [34400] Microsoft IE Uninitialized Object Memory Corruption
4167| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
4168| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
4169| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
4170| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
4171| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
4172| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
4173| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
4174| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
4175| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
4176| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
4177| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
4178| [34387] Microsoft Word Data Array Handling Remote Code Execution
4179| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
4180| [34385] Microsoft Word Macro Content Arbitrary Code Execution
4181| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
4182| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
4183| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
4184| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
4185| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
4186| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
4187| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
4188| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
4189| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
4190| [34077] Microsoft IE navcancl.htm res: URI XSS
4191| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
4192| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
4193| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
4194| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
4195| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
4196| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
4197| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
4198| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
4199| [33667] Microsoft Windows Vista Persistent Established Teredo Address
4200| [33666] Microsoft Windows Vista Teredo nonce Spoofing
4201| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
4202| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
4203| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
4204| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
4205| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
4206| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
4207| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
4208| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
4209| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
4210| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
4211| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
4212| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
4213| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
4214| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
4215| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
4216| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
4217| [33271] Microsoft Word Crafted Frame CSRF
4218| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
4219| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
4220| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
4221| [32630] Microsoft IE Key Press Event Focus Redirection
4222| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
4223| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
4224| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
4225| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
4226| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
4227| [32624] Microsoft IE mhtml Overflow DoS
4228| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
4229| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
4230| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
4231| [32087] Microsoft IE onunload Event Address Bar Spoofing
4232| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
4233| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
4234| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
4235| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
4236| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
4237| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
4238| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
4239| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
4240| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
4241| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
4242| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
4243| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
4244| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
4245| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
4246| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
4247| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
4248| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
4249| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
4250| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
4251| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
4252| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
4253| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
4254| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
4255| [31645] Microsoft Windows DNS Recursive Query DoS
4256| [31333] Microsoft IE Image File Embedded Content XSS
4257| [31332] Microsoft IE Scrollbar CSS Property DoS
4258| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
4259| [31330] Microsoft IE File:// URI src Tag IFrame DoS
4260| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
4261| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
4262| [31326] Microsoft IE HTML Table Tag style Attribute DoS
4263| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
4264| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
4265| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
4266| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
4267| [31321] Microsoft IE Javascript self.location Refresh DoS
4268| [31258] Microsoft Excel Palette Record Handling Overflow
4269| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
4270| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
4271| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
4272| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
4273| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
4274| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
4275| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
4276| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
4277| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
4278| [30997] Microsoft Windows .manifest File Handling Local DoS
4279| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
4280| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
4281| [30826] Microsoft Visual Basic Click Event Procedure Overflow
4282| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
4283| [30824] Microsoft Word Malformed String Memory Corruption
4284| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
4285| [30822] Microsoft IE A Tag Long Title Attribute DoS
4286| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
4287| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
4288| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
4289| [30818] Microsoft Windows Media Player ASF Parsing Overflow
4290| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
4291| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
4292| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
4293| [30814] Microsoft IE DHTML Script Function Memory Corruption
4294| [30813] Microsoft IE Script Error Handling Memory Corruption
4295| [30811] Microsoft Windows SNMP Service Remote Overflow
4296| [30405] Microsoft Windows Active Directory Unspecified DoS
4297| [30402] Microsoft w3wp Crafted COM Component Request DoS
4298| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
4299| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
4300| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
4301| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
4302| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
4303| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
4304| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
4305| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
4306| [30087] Microsoft IE Empty APPLET Tag DoS
4307| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
4308| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
4309| [29720] Microsoft PowerPoint Unspecified Code Execution
4310| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
4311| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
4312| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
4313| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
4314| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
4315| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
4316| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
4317| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
4318| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
4319| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
4320| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
4321| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
4322| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
4323| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
4324| [29440] Microsoft Word memmove Integer Overflow
4325| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
4326| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
4327| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
4328| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
4329| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
4330| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
4331| [29426] Microsoft XML Core Services XSLT Processing Overflow
4332| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
4333| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
4334| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
4335| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
4336| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
4337| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
4338| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
4339| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
4340| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
4341| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
4342| [29129] Microsoft IE wininet.dll Content-Type DoS
4343| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
4344| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
4345| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
4346| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
4347| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
4348| [28730] Microsoft Publisher PUB File Font Parsing Overflow
4349| [28729] Microsoft Windows Indexing Service Unspecified XSS
4350| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
4351| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
4352| [28723] Microsoft Works Malformed Works Spreadsheet DoS
4353| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
4354| [28614] Microsoft IE input/div Tag width Conflict DoS
4355| [28539] Microsoft Word 2000 Unspecified Code Execution
4356| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
4357| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
4358| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
4359| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
4360| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
4361| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
4362| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
4363| [28381] Microsoft IE ActiveX SaveFile Handling DoS
4364| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
4365| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
4366| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
4367| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
4368| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
4369| [27854] Microsoft IE Chained CSS Imports Memory Corruption
4370| [27853] Microsoft IE HTML Rendering Memory Corruption
4371| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
4372| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
4373| [27850] Microsoft IE Cross Site Window Location Information Disclosure
4374| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
4375| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
4376| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
4377| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
4378| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
4379| [27844] Microsoft Windows DNS Client Service Record Response Overflow
4380| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
4381| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
4382| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
4383| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
4384| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
4385| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
4386| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
4387| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
4388| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
4389| [27373] Microsoft IE Native Function Iteration NULL Dereference
4390| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
4391| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
4392| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
4393| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
4394| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
4395| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
4396| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
4397| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
4398| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
4399| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
4400| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
4401| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
4402| [27150] Microsoft Office MSO.DLL String Processing Overflow
4403| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
4404| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
4405| [27147] Microsoft Office PNG Processing Unspecified Code Execution
4406| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
4407| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
4408| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
4409| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
4410| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
4411| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
4412| [27059] Microsoft IE FolderItem Object NULL Dereference
4413| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
4414| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
4415| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
4416| [27053] Microsoft Excel Asian Language Style Option Overflow
4417| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
4418| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
4419| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
4420| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
4421| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
4422| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
4423| [26837] Microsoft IE Frameset inside Table NULL Dereference
4424| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
4425| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
4426| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
4427| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
4428| [26527] Microsoft Excel Malformed URL String Handling Overflow
4429| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
4430| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
4431| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
4432| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
4433| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
4434| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
4435| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
4436| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
4437| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
4438| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
4439| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
4440| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
4441| [26434] Microsoft JScript Object Release Memory Corruption
4442| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
4443| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
4444| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
4445| [26430] Microsoft Windows Media Player PNG Processing Overflow
4446| [26193] Microsoft NetMeeting Unspecified Remote DoS
4447| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
4448| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
4449| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
4450| [25635] Microsoft Word Unspecified Code Execution
4451| [25501] Microsoft Windows itss.dll CHM Processing Overflow
4452| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
4453| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
4454| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
4455| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
4456| [25003] Microsoft Office mailto: Arbitrary File Access
4457| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
4458| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
4459| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
4460| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
4461| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
4462| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
4463| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
4464| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
4465| [24542] Microsoft IE Unspecified Address Bar Spoofing
4466| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
4467| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
4468| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
4469| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
4470| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
4471| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
4472| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
4473| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
4474| [24208] Microsoft .NET Framework ILDASM Overflow
4475| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
4476| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
4477| [24095] Microsoft IE Arbitrary HTA File Execution
4478| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
4479| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
4480| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
4481| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
4482| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
4483| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
4484| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
4485| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
4486| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
4487| [23657] Microsoft IE ActiveX Killbit Setting Bypass
4488| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
4489| [23608] Microsoft IE Iframe Folder Delete Weakness
4490| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
4491| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
4492| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
4493| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
4494| [23307] Microsoft IE window.status Memory Leak DoS
4495| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
4496| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
4497| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
4498| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
4499| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
4500| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
4501| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
4502| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
4503| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
4504| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
4505| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
4506| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
4507| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
4508| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
4509| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4510| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4511| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4512| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4513| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
4514| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
4515| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
4516| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
4517| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
4518| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
4519| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
4520| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
4521| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
4522| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
4523| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
4524| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
4525| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
4526| [22354] Microsoft IE Malformed table datasrc Tag DoS
4527| [22351] Microsoft IE Modal Security Dialog Race Condition
4528| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
4529| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
4530| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
4531| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
4532| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
4533| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
4534| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
4535| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
4536| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
4537| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
4538| [21562] Microsoft IE CSS Crafted p Element DoS
4539| [21536] Microsoft Windows backup File Name Extension Overflow
4540| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
4541| [21510] Microsoft Windows SynAttackProtect Bypass
4542| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
4543| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
4544| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
4545| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
4546| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
4547| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
4548| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
4549| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
4550| [20497] Microsoft Windows 98SE User32.dll Icon DoS
4551| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
4552| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
4553| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
4554| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
4555| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
4556| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
4557| [20271] Microsoft IE settimeout Function Recursion DoS
4558| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
4559| [20248] Microsoft IE Embedded Content Processing XSS
4560| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
4561| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
4562| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
4563| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
4564| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
4565| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
4566| [20199] Microsoft IE Image Saturation Handling DoS
4567| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
4568| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
4569| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
4570| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
4571| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
4572| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
4573| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
4574| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
4575| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
4576| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
4577| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
4578| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
4579| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
4580| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
4581| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
4582| [19905] Microsoft Collaboration Data Objects Remote Overflow
4583| [19904] Microsoft Windows DTC Packet Relay DoS
4584| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
4585| [19902] Microsoft Windows COM+ Remote Code Execution
4586| [19901] Microsoft Windows FTP Client Arbitrary File Write
4587| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
4588| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
4589| [19898] Microsoft Windows Web View Arbitrary Script Injection
4590| [19876] Microsoft AntiSpyware Registry Extension Bypass
4591| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
4592| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
4593| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
4594| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
4595| [19796] Microsoft IE Malformed IFRAME File Source DoS
4596| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
4597| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
4598| [19662] Microsoft IE XMLHTTP HTTP Request Injection
4599| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
4600| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
4601| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
4602| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
4603| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
4604| [19089] Microsoft IE Unspecified Remote Code Execution
4605| [19029] Microsoft IE Meta Refresh Parsing Weakness
4606| [19024] Microsoft IE Automatic MIME Detection Weakness
4607| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
4608| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
4609| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
4610| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
4611| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
4612| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
4613| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
4614| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
4615| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
4616| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
4617| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
4618| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
4619| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
4620| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
4621| [18681] Microsoft Windows XP User Account Manager Hidden User
4622| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
4623| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
4624| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
4625| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
4626| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
4627| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
4628| [18607] Microsoft Windows Print Spooler Service Remote Overflow
4629| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
4630| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
4631| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
4632| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
4633| [18493] Microsoft Windows USB Device Driver Overflow
4634| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
4635| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
4636| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
4637| [18459] Microsoft ActiveSync Sync Request Saturation DoS
4638| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
4639| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
4640| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
4641| [18152] Microsoft IE Image File Handling Remote DoS
4642| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
4643| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
4644| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
4645| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
4646| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
4647| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
4648| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
4649| [17829] Microsoft Office .doc Font Parsing Overflow
4650| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
4651| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
4652| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
4653| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
4654| [17707] Microsoft Front Page Malformed HTML Edit DoS
4655| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
4656| [17671] Microsoft Site Server viewcode.asp Information Disclosure
4657| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
4658| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
4659| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
4660| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
4661| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
4662| [17665] Microsoft Site Server Default.asp XSS
4663| [17664] Microsoft Site Server remind.asp Information Disclosure
4664| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
4665| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
4666| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
4667| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
4668| [17659] Microsoft Site Server vs.asp Information Disclosure
4669| [17658] Microsoft Site Server default.asp Information Disclosure
4670| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
4671| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
4672| [17655] Microsoft Site Server DSN.asp Information Disclosure
4673| [17654] Microsoft Site Server driver.asp Information Disclosure
4674| [17653] Microsoft Site Server domain.asp Information Disclosure
4675| [17652] Microsoft Site Server findserver.asp Information Disclosure
4676| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
4677| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
4678| [17342] Microsoft ISA Server Basic Credentials Exposure
4679| [17334] Microsoft IE Script Code Obfuscation (Ghost)
4680| [17314] Microsoft IE XML Redirect Information Disclosure
4681| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
4682| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
4683| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
4684| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
4685| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
4686| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
4687| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
4688| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
4689| [17305] Microsoft Windows HTML Help (CHM) File Overflow
4690| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
4691| [17218] Microsoft IE Stack Overflow Saturation DoS
4692| [17217] Microsoft IE Embedded File Recursion DoS
4693| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
4694| [17159] Microsoft IE Malformed FTP URL DoS
4695| [17158] Microsoft IE Crafted BMP Size Setting DoS
4696| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
4697| [17094] Microsoft IE window() Function Arbitrary Code Execution
4698| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
4699| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
4700| [16827] Microsoft WGA Multiple Method Validation Bypass
4701| [16814] Microsoft Word mcw File Processing Overflow
4702| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
4703| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
4704| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
4705| [16342] Microsoft IE Cross Site Mouse Click Disclosure
4706| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
4707| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
4708| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
4709| [15757] Microsoft SQL Server sa Account Default Null Password
4710| [15739] Microsoft Windows Malformed Image Rendering DoS
4711| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
4712| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
4713| [15480] Microsoft Outlook From Header Comma Parsing Failure
4714| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
4715| [15470] Microsoft Word Unspecified Overflow
4716| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
4717| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
4718| [15466] Microsoft IE Content Advisor Overflow
4719| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
4720| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
4721| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
4722| [15462] Microsoft Windows CSRSS Local Overflow
4723| [15461] Microsoft Windows Object Management Malformed Request DoS
4724| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
4725| [15459] Microsoft Windows Font Processing Local Privilege Escalation
4726| [15458] Microsoft Windows Message Queuing Remote Overflow
4727| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
4728| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
4729| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
4730| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
4731| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
4732| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
4733| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
4734| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
4735| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
4736| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
4737| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
4738| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
4739| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
4740| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
4741| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
4742| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
4743| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
4744| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
4745| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
4746| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
4747| [15219] Microsoft IE XML Object Arbitrary File Access
4748| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
4749| [15217] Microsoft IE input Tag Rendering DoS
4750| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
4751| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
4752| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
4753| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
4754| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
4755| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
4756| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
4757| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
4758| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
4759| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
4760| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
4761| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
4762| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
4763| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
4764| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
4765| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
4766| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
4767| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
4768| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
4769| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
4770| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
4771| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
4772| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
4773| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
4774| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
4775| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
4776| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
4777| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
4778| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
4779| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
4780| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
4781| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
4782| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
4783| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
4784| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
4785| [13609] Microsoft Windows Hyperlink Object Library Overflow
4786| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
4787| [13607] Microsoft IE CDF Cross-Domain Code Execution
4788| [13606] Microsoft IE createControlRange() Function Heap Corruption
4789| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
4790| [13604] Microsoft IE Drag-and-Drop File Injection
4791| [13602] Microsoft Windows OLE Input Validation Overflow
4792| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
4793| [13600] Microsoft Windows SMB Transaction Data Overflow
4794| [13599] Microsoft Windows License Logging Service Overflow
4795| [13597] Microsoft Windows Media Player PNG File Overflow
4796| [13596] Microsoft Windows XP Named Pipe Username Disclosure
4797| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
4798| [13594] Microsoft Office XP URL Overflow
4799| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
4800| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
4801| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
4802| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
4803| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
4804| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
4805| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
4806| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
4807| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
4808| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
4809| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
4810| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
4811| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
4812| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
4813| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
4814| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
4815| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
4816| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
4817| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
4818| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
4819| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
4820| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
4821| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
4822| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
4823| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
4824| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
4825| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
4826| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
4827| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
4828| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
4829| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
4830| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
4831| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
4832| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
4833| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
4834| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
4835| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
4836| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
4837| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
4838| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
4839| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
4840| [13330] Microsoft Windows HKLM Registry Key Locking DoS
4841| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
4842| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
4843| [13258] Microsoft IE Excel File Address Bar Spoofing
4844| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
4845| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
4846| [13132] Microsoft IE %20 URL Spoofing
4847| [13040] Microsoft IE Javascript Load Local File Path Disclosure
4848| [13020] Microsoft Windows XP RPC Cache Memory Leak
4849| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
4850| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
4851| [12862] Microsoft IE USER32.CharLowerA Exception DoS
4852| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
4853| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
4854| [12832] Microsoft Windows Indexing Service Query Overflow
4855| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
4856| [12709] Microsoft HTML Parser Malformed Javascript DoS
4857| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
4858| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
4859| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
4860| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
4861| [12625] Microsoft Windows winhlp32.exe Overflow
4862| [12624] Microsoft Windows Kernel ANI File Parsing DoS
4863| [12623] Microsoft Windows LoadImage API Overflow
4864| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
4865| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
4866| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
4867| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
4868| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
4869| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
4870| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
4871| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
4872| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
4873| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
4874| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
4875| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
4876| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
4877| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
4878| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
4879| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
4880| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
4881| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
4882| [12299] Microsoft IE FTP URL Arbitrary Command Injection
4883| [12277] Microsoft IE sysimage: Local File Existence Disclosure
4884| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
4885| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
4886| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
4887| [12163] Microsoft IE Save Picture As File Extension Spoofing
4888| [12123] Microsoft Windows ipconfig.exe Overflow
4889| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
4890| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
4891| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
4892| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
4893| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
4894| [11956] Microsoft Outlook/Express Message body NUL Character DoS
4895| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
4896| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
4897| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
4898| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
4899| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
4900| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
4901| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
4902| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
4903| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
4904| [11946] Microsoft IE/Outlook Malformed XBM File DoS
4905| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
4906| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
4907| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
4908| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
4909| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
4910| [11940] Microsoft Outlook Blocked Attachment Access
4911| [11939] Microsoft Outlook Attachment Spoofed Content Type
4912| [11938] Microsoft Outlook Express Attachment Filename Overflow
4913| [11937] Microsoft Outlook 98 Hidden Drive Access
4914| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
4915| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
4916| [11918] Microsoft IE execCommand() File Extension Spoofing
4917| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
4918| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
4919| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
4920| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
4921| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
4922| [11799] Microsoft Windows SMB Signing Group Policy Modification
4923| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
4924| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
4925| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
4926| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
4927| [11580] Microsoft IE res: URI Handler File Existence Disclosure
4928| [11479] Microsoft Windows NT Double Dot Samba Client DoS
4929| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
4930| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
4931| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
4932| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
4933| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
4934| [11473] Microsoft Windows NT Messenger Service Long Username DoS
4935| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
4936| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
4937| [11470] Microsoft Windows NT Help File Utility Overflow
4938| [11469] Microsoft Windows NT Malformed File Image Header DoS
4939| [11468] Microsoft Windows NT IOCTL Function DoS
4940| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
4941| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
4942| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
4943| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
4944| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
4945| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
4946| [11423] Microsoft Outlook Malformed Header DoS
4947| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
4948| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
4949| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
4950| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
4951| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
4952| [11416] Microsoft Outlook/Express Blank Header DoS
4953| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
4954| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
4955| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
4956| [11274] Microsoft IE "
4957| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
4958| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
4959| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
4960| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
4961| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
4962| [11170] Microsoft IE iframe Malformed base href DoS
4963| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
4964| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
4965| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
4966| [11158] Microsoft Windows NT Malformed Token Ring DoS
4967| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
4968| [11152] Microsoft IE Malformed HTML Style DoS
4969| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
4970| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
4971| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
4972| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
4973| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
4974| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
4975| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
4976| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
4977| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
4978| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
4979| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
4980| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
4981| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
4982| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
4983| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
4984| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
4985| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
4986| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
4987| [10975] Microsoft Windows NT Winpopup Long Username DoS
4988| [10967] Microsoft IE Javascript User Homepage Address Spoofing
4989| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
4990| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
4991| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
4992| [10935] Microsoft Word Macro Security Model Bypass
4993| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
4994| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
4995| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
4996| [10756] Microsoft MSN heartbeat.ocx Component Overflow
4997| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
4998| [10735] Microsoft Excel Virus Warning Mechanism Bypass
4999| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
5000| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
5001| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
5002| [10709] Microsoft IE SSL Cached Content Spoofing
5003| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
5004| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
5005| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
5006| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
5007| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
5008| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
5009| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
5010| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
5011| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
5012| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
5013| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
5014| [10693] Microsoft Windows Unspecified Kernel Local DoS
5015| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
5016| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
5017| [10690] Microsoft Windows Management APIs Local Privilege Escalation
5018| [10689] Microsoft Windows NetDDE Remote Overflow
5019| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
5020| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
5021| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
5022| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
5023| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
5024| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
5025| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
5026| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
5027| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
5028| [10615] Microsoft Windows NT linux smbmount Request DoS
5029| [10614] Microsoft Windows NT %systemroot% Path Inclusion
5030| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
5031| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
5032| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
5033| [10606] Microsoft Windows LSA NULL Policy Handle DoS
5034| [10604] Microsoft Windows NT PATH Working Directory Inclusion
5035| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
5036| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
5037| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
5038| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
5039| [10379] Microsoft SQL Server Large Query DoS
5040| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
5041| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
5042| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
5043| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
5044| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
5045| [10183] Microsoft SQL Server xp_sprintf Function DoS
5046| [10181] Microsoft SQL Server formatmessage Function DoS
5047| [10166] Microsoft SQL Server raiserror Function DoS
5048| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
5049| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
5050| [10157] Microsoft SQL Server BULK INSERT Query Overflow
5051| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
5052| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
5053| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
5054| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
5055| [10152] Microsoft SQL Server xp_printstatements Function Overflow
5056| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
5057| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
5058| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
5059| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
5060| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
5061| [10146] Microsoft SQL Server xp_sprintf Function Overflow
5062| [10145] Microsoft SQL Server formatmessage Function Overflow
5063| [10144] Microsoft SQL Server raiserror Function Overflow
5064| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
5065| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
5066| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
5067| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
5068| [10139] Microsoft SQL Server Agent Arbitrary File Creation
5069| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
5070| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
5071| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
5072| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
5073| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
5074| [10132] Microsoft SQL Server Authentication Function Remote Overflow
5075| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
5076| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
5077| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
5078| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
5079| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
5080| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
5081| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
5082| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
5083| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
5084| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
5085| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
5086| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
5087| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
5088| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
5089| [9671] Microsoft IE onUnload Address Bar Spoofing
5090| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
5091| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
5092| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
5093| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
5094| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
5095| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
5096| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
5097| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
5098| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
5099| [9348] Microsoft Windows NT Non-NTFS File System Insecure
5100| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
5101| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
5102| [9172] Microsoft IE File/Directory Existence Disclosure
5103| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
5104| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
5105| [9141] Microsoft Windows File Icon Spoofing
5106| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
5107| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
5108| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
5109| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
5110| [8941] Microsoft IE Merlin.speak Function CPU DoS
5111| [8706] Solaris mibiisa MIB Parsing Remote Overflow
5112| [8428] Microsoft NetMeeting Malformed Packets DoS
5113| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
5114| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
5115| [8335] Microsoft IE mshtml.dll Null Pointer DoS
5116| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
5117| [8277] Microsoft IE Malformed GIF Double-free DoS
5118| [8276] Microsoft IE Malformed BMP Overflow
5119| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
5120| [8243] Microsoft SMS Port 2702 DoS
5121| [8224] Microsoft IE CSS Memory Corruption DoS
5122| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
5123| [8210] Microsoft HTML Control Large Form Field DoS
5124| [8161] Microsoft Windows NT Invalid User Privileges
5125| [8160] Microsoft Windows NT File/Directory Invalid Permissions
5126| [8148] Microsoft IE Arbitrary File Write (What a Drag)
5127| [8129] Microsoft IE CSS Malformed div element DoS
5128| [8112] Microsoft Windows NT Weak Account Password Policy
5129| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
5130| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
5131| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
5132| [7963] Microsoft IE parent.window.open location.cache Script Execution
5133| [7951] Microsoft SMS Remote Control Client DoS
5134| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
5135| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
5136| [7914] Microsoft IE .FOLDER File Type Execution
5137| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
5138| [7912] Microsoft IE showHelp() Arbitrary File Execution
5139| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
5140| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
5141| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
5142| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
5143| [7905] Microsoft IE ie5setup.exe Multple Service Disable
5144| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
5145| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
5146| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
5147| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
5148| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
5149| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
5150| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
5151| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
5152| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
5153| [7895] Microsoft IE MS-DOS Device Name URL DoS
5154| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
5155| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
5156| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
5157| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
5158| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
5159| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
5160| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
5161| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
5162| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
5163| [7885] Microsoft Java Implementation Applet Tag DoS
5164| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
5165| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
5166| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
5167| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
5168| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
5169| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
5170| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
5171| [7877] Microsoft Java Virtual Machine Class.forName Overflow
5172| [7876] Microsoft IE .isp File Arbitrary Command Execution
5173| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
5174| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
5175| [7866] Microsoft IE Frame Spoofing Content Injection
5176| [7864] Microsoft IE URL History FTP Credential Disclosure
5177| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
5178| [7862] Microsoft IE User DAT File History Disclosure
5179| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
5180| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
5181| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
5182| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
5183| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
5184| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
5185| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
5186| [7854] Microsoft IE Chinese Character Scrolling DoS
5187| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
5188| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
5189| [7851] Microsoft IE Multiple Form Field DoS
5190| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
5191| [7849] Microsoft IE Javascript location.replace Recursive DoS
5192| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
5193| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
5194| [7846] Microsoft IE PNG Invalid Length Code DoS
5195| [7845] Microsoft IE Encoded URL Information Disclosure
5196| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
5197| [7843] Microsoft IE URLMON.DLL Multiple Overflows
5198| [7842] Microsoft IE File Upload Control Arbitrary File Access
5199| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
5200| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
5201| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
5202| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
5203| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
5204| [7836] Microsoft IE EMBED Tag Overflow
5205| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
5206| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
5207| [7833] Microsoft IE/OE res: Protocol Library Overflow
5208| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
5209| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
5210| [7830] Microsoft IE mk: URL Handling Remote Overflow
5211| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
5212| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
5213| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
5214| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
5215| [7825] Microsoft IE Domain Frame Arbitrary File Access
5216| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
5217| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
5218| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
5219| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
5220| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
5221| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
5222| [7818] Microsoft IE Page Redirect Authentication Credential Leak
5223| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
5224| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
5225| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
5226| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
5227| [7803] Microsoft Windows showHelp Arbitrary Code Execution
5228| [7802] Microsoft IE File Download Extension Spoofing
5229| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
5230| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
5231| [7798] Microsoft Windows Task Scheduler Remote Overflow
5232| [7793] Microsoft Outlook Express Header Validation DoS
5233| [7779] Microsoft IE AnchorClick Cross Zone Scripting
5234| [7778] Microsoft Outlook Window Opener Script Execution
5235| [7777] Microsoft Windows Media Control Preview Script Execution
5236| [7776] Microsoft IE Download Window Filename Filetype Spoofing
5237| [7775] Microsoft IE Channel Link Script Injection
5238| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
5239| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
5240| [7762] Microsoft Java Virtual Machine Cross-Site Communication
5241| [7739] Microsoft IE plugin.ocx Load() Method Overflow
5242| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
5243| [7608] Microsoft Index Server Internet Data Query Path Disclosure
5244| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
5245| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
5246| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
5247| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
5248| [7293] Microsoft Plus! Compressed Folder Password Disclosure
5249| [7202] Microsoft PowerPoint 2000 File Loader Overflow
5250| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
5251| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
5252| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
5253| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
5254| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
5255| [7117] Microsoft Windows RPC Locator Remote Overflow
5256| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
5257| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
5258| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
5259| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
5260| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
5261| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
5262| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
5263| [6965] Microsoft ISA Server 2000 SSL Packet DoS
5264| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
5265| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
5266| [6931] Microsoft IE/Outlook Double Null Character DoS
5267| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
5268| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
5269| [6742] Microsoft DirectPlay Packet Validation DoS
5270| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
5271| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
5272| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
5273| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
5274| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
5275| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
5276| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
5277| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
5278| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
5279| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
5280| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
5281| [6079] Microsoft Outlook Remote XML Loading
5282| [6074] Microsoft Windows Me HSC hcp:// URL XSS
5283| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
5284| [6031] Microsoft Exchange Multiple SMTP Command DoS
5285| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
5286| [5998] Microsoft Outlook Predictable File Caching
5287| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
5288| [5968] Microsoft Windows ARP Packet DoS
5289| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
5290| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
5291| [5936] Microsoft SMTP Service 4xx Error Code DoS
5292| [5887] Microsoft Access 97 Cleartext Password Storage
5293| [5884] Microsoft Site Server ASP Upload Remote Command Execution
5294| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
5295| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
5296| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
5297| [5694] Microsoft IE Address Bar URL Spoofing
5298| [5687] Microsoft Windows IE and Explorer Share Name Overflow
5299| [5686] Microsoft Windows Telnet Service Account Information Disclosure
5300| [5608] Microsoft NetMeeting Malformed String DoS
5301| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
5302| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
5303| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
5304| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
5305| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
5306| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
5307| [5390] Microsoft Exchange NTLM Null Session Mail Relay
5308| [5357] Microsoft Multiple Products for Mac File URL Overflow
5309| [5356] Microsoft IE for Mac Local AppleScript Invocation
5310| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
5311| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
5312| [5343] Microsoft SQL Server SQLXML root Parameter XSS
5313| [5342] Microsoft IE Malformed Web Page Zone Spoofing
5314| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
5315| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
5316| [5261] Microsoft Windows ASN.1 Double Free Code Execution
5317| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
5318| [5259] Microsoft Windows Negotiate SSP Code Execution
5319| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
5320| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
5321| [5256] Microsoft Windows Unspecified H.323 Code Execution
5322| [5255] Microsoft Windows Management Privilege Escalation
5323| [5254] Microsoft Windows Utility Manager Privilege Escalation
5324| [5253] Microsoft Windows Help and Support Center Command Execution
5325| [5252] Microsoft Windows Metafile Code Execution
5326| [5251] Microsoft Windows Winlogon Command Execution
5327| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
5328| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
5329| [5248] Microsoft Windows LSASS Remote Overflow
5330| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
5331| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
5332| [5245] Microsoft Windows RPCSS Large Length Field DoS
5333| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
5334| [5241] Microsoft Jet Database Engine Remote Code Execution
5335| [5179] Microsoft Windows 2000 microsoft-ds DoS
5336| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
5337| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
5338| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
5339| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
5340| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
5341| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
5342| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
5343| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
5344| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
5345| [5134] Microsoft IE Reference Local HTML Resource Script Execution
5346| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
5347| [5129] Microsoft IE Download File Origin Spoofing
5348| [5126] Microsoft BackOffice Authentication Bypass
5349| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
5350| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
5351| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
5352| [4951] Microsoft IE CLASSID Remote DoS
5353| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
5354| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
5355| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
5356| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
5357| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
5358| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
5359| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
5360| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
5361| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
5362| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
5363| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
5364| [4654] iisCart2000 File Upload
5365| [4627] Microsoft IE Text Control Overflow
5366| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
5367| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
5368| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
5369| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
5370| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
5371| [4186] Microsoft IE Cookie Path Traversal
5372| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
5373| [4168] Microsoft Outlook 2002 mailto URI Script Injection
5374| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
5375| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
5376| [3903] Microsoft Windows WINS Server Remote Overflow
5377| [3902] Microsoft Windows ASN.1 Library Integer Overflow
5378| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
5379| [3879] Microsoft IE File Identification Variant
5380| [3791] Microsoft IE Travel Log Arbitrary Script Execution
5381| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
5382| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
5383| [3501] Microsoft FrontPage form_results Information Disclosure
5384| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
5385| [3457] Microsoft MDAC Broadcast Reply Overflow
5386| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
5387| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
5388| [3384] Microsoft FrontPage htimage.exe Overflow
5389| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
5390| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
5391| [3381] Microsoft FrontPage imagemap.exe Overflow
5392| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
5393| [3313] Microsoft Word Form Protection Bypass
5394| [3307] Microsoft IE showHelp() Zone Restriction Bypass
5395| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
5396| [3225] Microsoft IE for Mac Information Disclosure
5397| [3213] SecureIIS Error Page Information Disclosure
5398| [3212] SecureIIS Encoded URI Arbitrary File Access
5399| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
5400| [3209] SecureIIS HTTP Request Overflow Protection Bypass
5401| [3195] Microsoft Exchange OWA REFERER Header XSS
5402| [3184] IISShield HTTP Request Bypass Ruleset
5403| [3183] iisPROTECT Encoded URL Authentication Bypass
5404| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
5405| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
5406| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
5407| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
5408| [3108] Microsoft Office 98 Macintosh Information Disclosure
5409| [3106] Microsoft Windows Password Authentication Security Point of Failure
5410| [3104] Microsoft IE PPC Overwrite Arbitrary Files
5411| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
5412| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
5413| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
5414| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
5415| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
5416| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
5417| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
5418| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
5419| [3066] Microsoft IE Custom HTTP Errors Script Injection
5420| [3065] Microsoft IE Unparsable XML File XSS
5421| [3056] Microsoft IE MSN/Alexa Information Leak
5422| [3055] Microsoft IE Spoofed URL
5423| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
5424| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
5425| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
5426| [3051] Microsoft IE MHT Web Archive Overflow
5427| [3050] Microsoft IE dragDrop Method Local File Reading
5428| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
5429| [3036] Microsoft IE dynsrc File Information Leak
5430| [3035] Microsoft WebBrowser Control t:video File Execution
5431| [3034] Microsoft IE JavaScript script src Local File Enumeration
5432| [3033] Microsoft IE Content Type/Disposition File Execution
5433| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
5434| [3031] Microsoft IE document.Open Same Origin Policy Violation
5435| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
5436| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
5437| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
5438| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
5439| [3010] Microsoft IE OWC XMLURL File Existence Verification
5440| [3009] Microsoft IE OWC Load File Existence Verification
5441| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
5442| [3007] Microsoft IE OWC LoadText Read Arbitrary File
5443| [3006] Microsoft IE OWC Script Execution
5444| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
5445| [3004] Microsoft IE Gopher Client Overflow
5446| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
5447| [3002] Microsoft IE File Extension Dot Parsing
5448| [3001] Microsoft IE XP HCP URI Handler File Deletion
5449| [2999] Microsoft IE Powerpoint Mouse-Over Execute
5450| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
5451| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
5452| [2996] Microsoft IE Object Zone Redirection
5453| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
5454| [2994] Microsoft IE (NewWindow).location.assign Save Reference
5455| [2993] Microsoft IE % URL Encoding XSS
5456| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
5457| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
5458| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
5459| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
5460| [2985] Microsoft IE execCommand Object Caching
5461| [2984] Microsoft IE getElementsByTagName Object Caching
5462| [2983] Microsoft IE getElementsByName Object Caching
5463| [2982] Microsoft IE getElementById Object Caching
5464| [2981] Microsoft IE elementFromPoint Object Caching
5465| [2980] Microsoft IE createRange Object Caching
5466| [2979] Microsoft IE external Object Caching
5467| [2978] Microsoft IE showModalDialog Object Caching
5468| [2977] Microsoft IE XML Datasource Read Local Files
5469| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
5470| [2975] Microsoft IE Back Button XSS
5471| [2974] Microsoft IE/Outlook Temporary Internet File Execution
5472| [2973] Microsoft IE Third Party Plugin Rendering XSS
5473| [2972] Microsoft IE showModalDialog Script Execution
5474| [2971] Microsoft WMP File Attachment Script Execution
5475| [2970] Microsoft IE cssText Arbitrary File Access
5476| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
5477| [2968] Microsoft IE File Download Dialog Overflow
5478| [2967] Microsoft IE Object Type Property Overflow
5479| [2966] Microsoft IE BR549.DLL Overflow
5480| [2965] Microsoft IE Cache Script Execution in My Zone
5481| [2963] Microsoft IE align HTML Converter Overflow
5482| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
5483| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
5484| [2917] Microsoft Access Known Database Attack
5485| [2801] Microsoft Word and Excel Execution of Arbitrary Code
5486| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
5487| [2784] Microsoft IE Component Function Information Disclosure
5488| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
5489| [2751] Microsoft Word Macro Name Handling Overflow
5490| [2745] Microsoft HTML Help Control Privilege Escalation
5491| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
5492| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
5493| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
5494| [2679] Microsoft Outlook Web Access XSS
5495| [2678] Microsoft Windows Overflow in ListBox and
5496| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
5497| [2675] Microsoft Windows HCP protocol Overflow
5498| [2674] Microsoft Exchange SMTP Extended Request Overflow
5499| [2670] Microsoft Windows RPC Race Condition DoS
5500| [2657] Microsoft Windows Message Queuing Service Heap Overflow
5501| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
5502| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
5503| [2642] Microsoft Windows Unauthorised Thread Termination
5504| [2592] Microsoft PowerPoint Modify Protection Bypass
5505| [2572] Microsoft BizTalk Server Insecure Permissions
5506| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
5507| [2544] Microsoft ASP.NET Request Validation Bypass
5508| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
5509| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
5510| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
5511| [2508] Microsoft Visual Basic for Applications Buffer Overflow
5512| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
5513| [2506] Microsoft Word/Works Automated Macro Execution
5514| [2453] Microsoft IE My Computer Zone Caching Issue
5515| [2451] Microsoft IE Object Data Header Type Safe File Execution
5516| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
5517| [2368] IISShield Crafted HTTP Request Filtering Bypass
5518| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
5519| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
5520| [2320] Microsoft ISA Server HTTP Error Handler XSS
5521| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
5522| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
5523| [2298] Microsoft ISA Server Error Page XSS
5524| [2291] Microsoft IE DOM Script Source Recursive DoS
5525| [2288] Microsoft Utility Manager Local Privilege Escalation
5526| [2283] Microsoft Exchange OWA Execute Arbitrary Code
5527| [2262] Microsoft Windows Media Player DHTML Local Zone Access
5528| [2247] Microsoft Windows Media Services Remote Command Execution #2
5529| [2244] Microsoft Windows 2000 ShellExecute() API Let
5530| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
5531| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
5532| [2100] Microsoft Windows RPC DCOM Interface Overflow
5533| [2096] Microsoft ISA Server SurfControl Web Filter
5534| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
5535| [2073] Microsoft Windows XP Network Share Provider Overflow
5536| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
5537| [2061] Microsoft Outlook HTML Mail Script Execution
5538| [2060] Microsoft IE Known Local File Script Execution
5539| [2051] Microsoft Windows User Shell Buffer Overflow
5540| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
5541| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
5542| [2046] Microsoft IE Forced Script Execution
5543| [2045] Microsoft IE HTML Document Directive Overflow
5544| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
5545| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
5546| [2041] Microsoft Office for Macintosh Network PID Checker DoS
5547| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
5548| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
5549| [2008] Microsoft IE Same Origin Policy Violation
5550| [2004] Microsoft IE Cross-frame Remote File Access
5551| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
5552| [1992] Microsoft IE Cookie Disclosure
5553| [1990] Microsoft Windows Terminal Services False IP Address
5554| [1982] Microsoft IE about: URI XSS
5555| [1978] Microsoft IE for Mac OS Download Execution
5556| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
5557| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
5558| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
5559| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
5560| [1957] Microsoft Exchange OWA Malformed Request DoS
5561| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
5562| [1934] Microsoft ISA Server Invalid URL Error Message XSS
5563| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
5564| [1932] Microsoft ISA Server H.323 Memory Leak DoS
5565| [1928] Microsoft Windows NNTP Malformed Post DoS
5566| [1915] Microsoft Windows Media Player .NSC File Overflow
5567| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
5568| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
5569| [1867] Microsoft Word Document Macro Execution
5570| [1864] Microsoft SQL Server Administrator Cached Connection
5571| [1861] Microsoft Windows Telnet Local System Call DoS
5572| [1860] Microsoft Windows Telnet Service Handle Leak DoS
5573| [1859] Microsoft Windows Telnet Multiple Sessions DoS
5574| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
5575| [1856] Microsoft Exchange OWA Embedded Script Execution
5576| [1852] Microsoft Outlook Address Book Spoofing Weakness
5577| [1840] Microsoft Windows Media Player Internet Shortcut Execution
5578| [1838] Microsoft Word .asd Macro File Execution
5579| [1837] Microsoft Word RTF Template Macro Execution
5580| [1832] Microsoft IE Spoofed SSL Certificates
5581| [1831] Microsoft IE Server Certificate Validation Failure
5582| [1820] Microsoft Index Server Search Parameter Overflow
5583| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
5584| [1764] Microsoft Windows 2000 Domain Controller DoS
5585| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
5586| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
5587| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
5588| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
5589| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
5590| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
5591| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
5592| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
5593| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
5594| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
5595| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
5596| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
5597| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
5598| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
5599| [1607] Microsoft Windows 9x Invalid Driver Type DoS
5600| [1606] Microsoft IE Cached Web Credentials Disclosure
5601| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
5602| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
5603| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
5604| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
5605| [1563] Microsoft Windows / Office DLL Search Path Weakness
5606| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
5607| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
5608| [1537] Microsoft Outlook Rich Text Format Information Disclosure
5609| [1530] Microsoft Money Cleartext Password Storage
5610| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
5611| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
5612| [1502] Microsoft IE Scriptlet Rendering
5613| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
5614| [1491] Microsoft Windows 9x IPX Ping Packet DoS
5615| [1475] Microsoft Outlook/Express Cache Bypass
5616| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
5617| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
5618| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
5619| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
5620| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
5621| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
5622| [1428] Microsoft IE/Office ActiveX Object Execution
5623| [1427] Microsoft IE VBA Code Execution
5624| [1399] Microsoft Windows 2000 Windows Station Access
5625| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
5626| [1369] Microsoft SQL Server DTS Password Disclosure
5627| [1368] Microsoft Media Encoder Request Parsing Local DoS
5628| [1358] Microsoft Windows NT HostAnnouncement DoS
5629| [1342] Microsoft IE DocumentComplete() Cross Frame Access
5630| [1341] Microsoft IE ActiveX Combined Component Attributes
5631| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
5632| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
5633| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
5634| [1297] Microsoft Windows 2000 Active Directory Object Attribute
5635| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
5636| [1272] Microsoft Excel XLM Arbitrary Macro Execution
5637| [1268] Microsoft Windows TCP/IP Printing Service DoS
5638| [1257] Microsoft Windows Media License Manager DoS
5639| [1251] Microsoft Windows MS DOS Device Name DoS
5640| [1250] Microsoft SQL Server Non-Validated Query
5641| [1244] Microsoft Clip Art Buffer Overflow
5642| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
5643| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
5644| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
5645| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
5646| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
5647| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
5648| [1188] Microsoft CIS IMAP Server Remote Overflow
5649| [1166] Microsoft Windows NT LsaLookupSids() DoS
5650| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
5651| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
5652| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
5653| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
5654| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
5655| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
5656| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
5657| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
5658| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
5659| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
5660| [1076] Microsoft Windows IP Source Routing
5661| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
5662| [1069] Microsoft IE Import/Export Favorites
5663| [1056] Microsoft Java Virtual Machine Sandbox Bypass
5664| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
5665| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
5666| [1046] Microsoft Windows telnet.exe Argument Overflow
5667| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
5668| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
5669| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
5670| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
5671| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
5672| [1010] Microsoft Windows NT Malformed LSA Request DoS
5673| [967] Microsoft Windows NT WINS Service Malformed Data DoS
5674| [945] Microsoft Windows 95/98 SMB Authentication Replay
5675| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
5676| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
5677| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
5678| [922] Microsoft NetMeeting Clipboard Remote Overflow
5679| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
5680| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
5681| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
5682| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
5683| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
5684| [863] Microsoft Exchange Malformed Mail Attribute DoS
5685| [858] Microsoft Windows NCM Handler Local Privilege Elevation
5686| [852] Microsoft Exchange EHLO Long Hostname Overflow
5687| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
5688| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
5689| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
5690| [773] Microsoft Windows 2000 Group Policy File Lock DoS
5691| [772] Microsoft Windows Multiple UNC Provider Request Overflow
5692| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
5693| [736] Microsoft Windows SMB Enumeration Information Disclosure
5694| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
5695| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
5696| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
5697| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
5698| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
5699| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
5700| [665] Microsoft Windows 95 Online Registration Information Disclosure
5701| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
5702| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
5703| [601] Microsoft Exchange Server LDAP Bind Function Overflow
5704| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
5705| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
5706| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
5707| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
5708| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
5709| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
5710| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
5711| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
5712| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
5713| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
5714| [457] Microsoft Exchange Malformed MIME Header DoS
5715| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
5716| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
5717| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
5718| [423] Microsoft Windows File Share Password Protection Bypass
5719| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
5720| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
5721| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
5722| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
5723| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
5724| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
5725| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
5726| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
5727| [334] Microsoft Windows Registry: Permission to Modify Common Paths
5728| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
5729| [331] Microsoft Windows Remote Registry Access
5730| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
5731| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
5732| [304] Microsoft Windows NT service pack level via remote registry access
5733| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
5734| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
5735| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
5736| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
5737| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
5738| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
5739| [129] Microsoft Windows NT FTP 'guest' Account
5740| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
5741| [68] Microsoft FrontPage Extensions .pwd File Permissions
5742| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
5743|_
5744Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5745Device type: general purpose
5746Running (JUST GUESSING): Microsoft Windows 2016 (89%), FreeBSD 6.X (85%)
5747OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:freebsd:freebsd:6.2
5748Aggressive OS guesses: Microsoft Windows Server 2016 (89%), FreeBSD 6.2-RELEASE (85%)
5749No exact OS matches for host (test conditions non-ideal).
5750Uptime guess: 5.649 days (since Sun Nov 24 20:45:10 2019)
5751Network Distance: 21 hops
5752TCP Sequence Prediction: Difficulty=261 (Good luck!)
5753IP ID Sequence Generation: Incremental
5754Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
5755
5756TRACEROUTE (using port 80/tcp)
5757HOP RTT ADDRESS
57581 92.31 ms 10.244.204.1
57592 92.37 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
57603 92.41 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
57614 92.40 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
57625 92.37 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
57636 92.46 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
57647 92.45 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
57658 92.50 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
57669 92.49 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
576710 28.68 ms 87.128.239.249
576811 180.53 ms 217.239.46.2
576912 132.47 ms 217.239.46.2
577013 132.46 ms 80.157.206.134
577114 ... 17
577218 159.62 ms 06-balgat-t3-1---06-balgat-t2-2.statik.turktelekom.com.tr (195.175.169.187)
577319 219.84 ms 95.0.51.254.static.ttnet.com.tr (95.0.51.254)
577420 219.87 ms 95.0.51.254.static.ttnet.com.tr (95.0.51.254)
577521 170.55 ms 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
5776
5777NSE: Script Post-scanning.
5778Initiating NSE at 12:19
5779Completed NSE at 12:19, 0.00s elapsed
5780Initiating NSE at 12:19
5781Completed NSE at 12:19, 0.00s elapsed
5782#######################################################################################################################################
5783------------------------------------------------------------------------------------------------------------------------
5784
5785[ ! ] Starting SCANNER INURLBR 2.1 at [30-11-2019 12:19:57]
5786[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
5787It is the end user's responsibility to obey all applicable local, state and federal laws.
5788Developers assume no liability and are not responsible for any misuse or damage caused by this program
5789
5790[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
5791[ INFO ][ DORK ]::[ site:www.trade.gov.tr ]
5792[ INFO ][ SEARCHING ]:: {
5793[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.ni ]
5794
5795[ INFO ][ SEARCHING ]::
5796-[:::]
5797[ INFO ][ ENGINE ]::[ GOOGLE API ]
5798
5799[ INFO ][ SEARCHING ]::
5800-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
5801[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.ml ID: 003917828085772992913:gmoeray5sa8 ]
5802
5803[ INFO ][ SEARCHING ]::
5804-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
5805
5806[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
5807
5808
5809 _[ - ]::--------------------------------------------------------------------------------------------------------------
5810|_[ + ] [ 0 / 100 ]-[12:20:12] [ - ]
5811|_[ + ] Target:: [ https://www.trade.gov.tr/ ]
5812|_[ + ] Exploit::
5813|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5814|_[ + ] More details:: / - / , ISP:
5815|_[ + ] Found:: UNIDENTIFIED
5816
5817 _[ - ]::--------------------------------------------------------------------------------------------------------------
5818|_[ + ] [ 1 / 100 ]-[12:20:14] [ - ]
5819|_[ + ] Target:: [ https://www.trade.gov.tr/news ]
5820|_[ + ] Exploit::
5821|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5822|_[ + ] More details:: / - / , ISP:
5823|_[ + ] Found:: UNIDENTIFIED
5824
5825 _[ - ]::--------------------------------------------------------------------------------------------------------------
5826|_[ + ] [ 2 / 100 ]-[12:20:15] [ - ]
5827|_[ + ] Target:: [ https://www.trade.gov.tr/investment ]
5828|_[ + ] Exploit::
5829|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5830|_[ + ] More details:: / - / , ISP:
5831|_[ + ] Found:: UNIDENTIFIED
5832
5833 _[ - ]::--------------------------------------------------------------------------------------------------------------
5834|_[ + ] [ 3 / 100 ]-[12:20:16] [ - ]
5835|_[ + ] Target:: [ https://www.trade.gov.tr/statistics ]
5836|_[ + ] Exploit::
5837|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5838|_[ + ] More details:: / - / , ISP:
5839|_[ + ] Found:: UNIDENTIFIED
5840
5841 _[ - ]::--------------------------------------------------------------------------------------------------------------
5842|_[ + ] [ 4 / 100 ]-[12:20:17] [ - ]
5843|_[ + ] Target:: [ https://www.trade.gov.tr/announcements ]
5844|_[ + ] Exploit::
5845|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5846|_[ + ] More details:: / - / , ISP:
5847|_[ + ] Found:: UNIDENTIFIED
5848
5849 _[ - ]::--------------------------------------------------------------------------------------------------------------
5850|_[ + ] [ 5 / 100 ]-[12:20:19] [ - ]
5851|_[ + ] Target:: [ https://www.trade.gov.tr/fdi ]
5852|_[ + ] Exploit::
5853|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5854|_[ + ] More details:: / - / , ISP:
5855|_[ + ] Found:: UNIDENTIFIED
5856
5857 _[ - ]::--------------------------------------------------------------------------------------------------------------
5858|_[ + ] [ 6 / 100 ]-[12:20:21] [ - ]
5859|_[ + ] Target:: [ https://www.trade.gov.tr/BakanaUlasin ]
5860|_[ + ] Exploit::
5861|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5862|_[ + ] More details:: / - / , ISP:
5863|_[ + ] Found:: UNIDENTIFIED
5864
5865 _[ - ]::--------------------------------------------------------------------------------------------------------------
5866|_[ + ] [ 7 / 100 ]-[12:20:22] [ - ]
5867|_[ + ] Target:: [ https://www.trade.gov.tr/yoikk ]
5868|_[ + ] Exploit::
5869|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5870|_[ + ] More details:: / - / , ISP:
5871|_[ + ] Found:: UNIDENTIFIED
5872
5873 _[ - ]::--------------------------------------------------------------------------------------------------------------
5874|_[ + ] [ 8 / 100 ]-[12:20:24] [ - ]
5875|_[ + ] Target:: [ https://www.trade.gov.tr/legislation ]
5876|_[ + ] Exploit::
5877|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5878|_[ + ] More details:: / - / , ISP:
5879|_[ + ] Found:: UNIDENTIFIED
5880
5881 _[ - ]::--------------------------------------------------------------------------------------------------------------
5882|_[ + ] [ 9 / 100 ]-[12:20:25] [ - ]
5883|_[ + ] Target:: [ https://www.trade.gov.tr/contact ]
5884|_[ + ] Exploit::
5885|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5886|_[ + ] More details:: / - / , ISP:
5887|_[ + ] Found:: UNIDENTIFIED
5888
5889 _[ - ]::--------------------------------------------------------------------------------------------------------------
5890|_[ + ] [ 10 / 100 ]-[12:20:26] [ - ]
5891|_[ + ] Target:: [ https://www.trade.gov.tr/turquality ]
5892|_[ + ] Exploit::
5893|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5894|_[ + ] More details:: / - / , ISP:
5895|_[ + ] Found:: UNIDENTIFIED
5896
5897 _[ - ]::--------------------------------------------------------------------------------------------------------------
5898|_[ + ] [ 11 / 100 ]-[12:20:27] [ - ]
5899|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes ]
5900|_[ + ] Exploit::
5901|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5902|_[ + ] More details:: / - / , ISP:
5903|_[ + ] Found:: UNIDENTIFIED
5904
5905 _[ - ]::--------------------------------------------------------------------------------------------------------------
5906|_[ + ] [ 12 / 100 ]-[12:20:29] [ - ]
5907|_[ + ] Target:: [ https://www.trade.gov.tr/investment/faq ]
5908|_[ + ] Exploit::
5909|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5910|_[ + ] More details:: / - / , ISP:
5911|_[ + ] Found:: UNIDENTIFIED
5912
5913 _[ - ]::--------------------------------------------------------------------------------------------------------------
5914|_[ + ] [ 13 / 100 ]-[12:20:30] [ - ]
5915|_[ + ] Target:: [ https://www.trade.gov.tr/investment/eligibility ]
5916|_[ + ] Exploit::
5917|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5918|_[ + ] More details:: / - / , ISP:
5919|_[ + ] Found:: UNIDENTIFIED
5920
5921 _[ - ]::--------------------------------------------------------------------------------------------------------------
5922|_[ + ] [ 14 / 100 ]-[12:20:31] [ - ]
5923|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/export ]
5924|_[ + ] Exploit::
5925|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5926|_[ + ] More details:: / - / , ISP:
5927|_[ + ] Found:: UNIDENTIFIED
5928
5929 _[ - ]::--------------------------------------------------------------------------------------------------------------
5930|_[ + ] [ 15 / 100 ]-[12:20:32] [ - ]
5931|_[ + ] Target:: [ https://www.trade.gov.tr/economic-outlook ]
5932|_[ + ] Exploit::
5933|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5934|_[ + ] More details:: / - / , ISP:
5935|_[ + ] Found:: UNIDENTIFIED
5936
5937 _[ - ]::--------------------------------------------------------------------------------------------------------------
5938|_[ + ] [ 16 / 100 ]-[12:20:34] [ - ]
5939|_[ + ] Target:: [ https://www.trade.gov.tr/sectoral-reports ]
5940|_[ + ] Exploit::
5941|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5942|_[ + ] More details:: / - / , ISP:
5943|_[ + ] Found:: UNIDENTIFIED
5944
5945 _[ - ]::--------------------------------------------------------------------------------------------------------------
5946|_[ + ] [ 17 / 100 ]-[12:20:35] [ - ]
5947|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/law ]
5948|_[ + ] Exploit::
5949|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5950|_[ + ] More details:: / - / , ISP:
5951|_[ + ] Found:: UNIDENTIFIED
5952
5953 _[ - ]::--------------------------------------------------------------------------------------------------------------
5954|_[ + ] [ 18 / 100 ]-[12:20:36] [ - ]
5955|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones ]
5956|_[ + ] Exploit::
5957|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5958|_[ + ] More details:: / - / , ISP:
5959|_[ + ] Found:: UNIDENTIFIED
5960
5961 _[ - ]::--------------------------------------------------------------------------------------------------------------
5962|_[ + ] [ 19 / 100 ]-[12:20:37] [ - ]
5963|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistics ]
5964|_[ + ] Exploit::
5965|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5966|_[ + ] More details:: / - / , ISP:
5967|_[ + ] Found:: UNIDENTIFIED
5968
5969 _[ - ]::--------------------------------------------------------------------------------------------------------------
5970|_[ + ] [ 20 / 100 ]-[12:20:38] [ - ]
5971|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import ]
5972|_[ + ] Exploit::
5973|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5974|_[ + ] More details:: / - / , ISP:
5975|_[ + ] Found:: UNIDENTIFIED
5976
5977 _[ - ]::--------------------------------------------------------------------------------------------------------------
5978|_[ + ] [ 21 / 100 ]-[12:20:40] [ - ]
5979|_[ + ] Target:: [ https://www.trade.gov.tr/commercial-representatives ]
5980|_[ + ] Exploit::
5981|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5982|_[ + ] More details:: / - / , ISP:
5983|_[ + ] Found:: UNIDENTIFIED
5984
5985 _[ - ]::--------------------------------------------------------------------------------------------------------------
5986|_[ + ] [ 22 / 100 ]-[12:20:41] [ - ]
5987|_[ + ] Target:: [ https://www.trade.gov.tr/contact/contact ]
5988|_[ + ] Exploit::
5989|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5990|_[ + ] More details:: / - / , ISP:
5991|_[ + ] Found:: UNIDENTIFIED
5992
5993 _[ - ]::--------------------------------------------------------------------------------------------------------------
5994|_[ + ] [ 23 / 100 ]-[12:20:42] [ - ]
5995|_[ + ] Target:: [ https://www.trade.gov.tr/investment/contact ]
5996|_[ + ] Exploit::
5997|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
5998|_[ + ] More details:: / - / , ISP:
5999|_[ + ] Found:: UNIDENTIFIED
6000
6001 _[ - ]::--------------------------------------------------------------------------------------------------------------
6002|_[ + ] [ 24 / 100 ]-[12:20:44] [ - ]
6003|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry ]
6004|_[ + ] Exploit::
6005|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6006|_[ + ] More details:: / - / , ISP:
6007|_[ + ] Found:: UNIDENTIFIED
6008
6009 _[ - ]::--------------------------------------------------------------------------------------------------------------
6010|_[ + ] [ 25 / 100 ]-[12:20:45] [ - ]
6011|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations ]
6012|_[ + ] Exploit::
6013|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6014|_[ + ] More details:: / - / , ISP:
6015|_[ + ] Found:: UNIDENTIFIED
6016
6017 _[ - ]::--------------------------------------------------------------------------------------------------------------
6018|_[ + ] [ 26 / 100 ]-[12:20:46] [ - ]
6019|_[ + ] Target:: [ https://www.trade.gov.tr/investment/links ]
6020|_[ + ] Exploit::
6021|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6022|_[ + ] More details:: / - / , ISP:
6023|_[ + ] Found:: UNIDENTIFIED
6024
6025 _[ - ]::--------------------------------------------------------------------------------------------------------------
6026|_[ + ] [ 27 / 100 ]-[12:20:48] [ - ]
6027|_[ + ] Target:: [ https://www.trade.gov.tr/investment/procedures ]
6028|_[ + ] Exploit::
6029|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6030|_[ + ] More details:: / - / , ISP:
6031|_[ + ] Found:: UNIDENTIFIED
6032
6033 _[ - ]::--------------------------------------------------------------------------------------------------------------
6034|_[ + ] [ 28 / 100 ]-[12:20:49] [ - ]
6035|_[ + ] Target:: [ https://www.trade.gov.tr/legislationfree-zones ]
6036|_[ + ] Exploit::
6037|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6038|_[ + ] More details:: / - / , ISP:
6039|_[ + ] Found:: UNIDENTIFIED
6040
6041 _[ - ]::--------------------------------------------------------------------------------------------------------------
6042|_[ + ] [ 29 / 100 ]-[12:20:52] [ - ]
6043|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/statistics ]
6044|_[ + ] Exploit::
6045|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6046|_[ + ] More details:: / - / , ISP:
6047|_[ + ] Found:: UNIDENTIFIED
6048
6049 _[ - ]::--------------------------------------------------------------------------------------------------------------
6050|_[ + ] [ 30 / 100 ]-[12:20:54] [ - ]
6051|_[ + ] Target:: [ https://www.trade.gov.tr/investment/application-process ]
6052|_[ + ] Exploit::
6053|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6054|_[ + ] More details:: / - / , ISP:
6055|_[ + ] Found:: UNIDENTIFIED
6056
6057 _[ - ]::--------------------------------------------------------------------------------------------------------------
6058|_[ + ] [ 31 / 100 ]-[12:20:56] [ - ]
6059|_[ + ] Target:: [ https://www.trade.gov.tr/investment/incentive-instruments ]
6060|_[ + ] Exploit::
6061|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6062|_[ + ] More details:: / - / , ISP:
6063|_[ + ] Found:: UNIDENTIFIED
6064
6065 _[ - ]::--------------------------------------------------------------------------------------------------------------
6066|_[ + ] [ 32 / 100 ]-[12:20:57] [ - ]
6067|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements ]
6068|_[ + ] Exploit::
6069|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6070|_[ + ] More details:: / - / , ISP:
6071|_[ + ] Found:: UNIDENTIFIED
6072
6073 _[ - ]::--------------------------------------------------------------------------------------------------------------
6074|_[ + ] [ 33 / 100 ]-[12:20:58] [ - ]
6075|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-incentives ]
6076|_[ + ] Exploit::
6077|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6078|_[ + ] More details:: / - / , ISP:
6079|_[ + ] Found:: UNIDENTIFIED
6080
6081 _[ - ]::--------------------------------------------------------------------------------------------------------------
6082|_[ + ] [ 34 / 100 ]-[12:21:00] [ - ]
6083|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey ]
6084|_[ + ] Exploit::
6085|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6086|_[ + ] More details:: / - / , ISP:
6087|_[ + ] Found:: UNIDENTIFIED
6088
6089 _[ - ]::--------------------------------------------------------------------------------------------------------------
6090|_[ + ] [ 35 / 100 ]-[12:21:01] [ - ]
6091|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content ]
6092|_[ + ] Exploit::
6093|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6094|_[ + ] More details:: / - / , ISP:
6095|_[ + ] Found:: UNIDENTIFIED
6096
6097 _[ - ]::--------------------------------------------------------------------------------------------------------------
6098|_[ + ] [ 36 / 100 ]-[12:21:03] [ - ]
6099|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu ]
6100|_[ + ] Exploit::
6101|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6102|_[ + ] More details:: / - / , ISP:
6103|_[ + ] Found:: UNIDENTIFIED
6104
6105 _[ - ]::--------------------------------------------------------------------------------------------------------------
6106|_[ + ] [ 37 / 100 ]-[12:21:04] [ - ]
6107|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services ]
6108|_[ + ] Exploit::
6109|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6110|_[ + ] More details:: / - / , ISP:
6111|_[ + ] Found:: UNIDENTIFIED
6112
6113 _[ - ]::--------------------------------------------------------------------------------------------------------------
6114|_[ + ] [ 38 / 100 ]-[12:21:05] [ - ]
6115|_[ + ] Target:: [ https://www.trade.gov.tr/buy-turkish-products ]
6116|_[ + ] Exploit::
6117|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6118|_[ + ] More details:: / - / , ISP:
6119|_[ + ] Found:: UNIDENTIFIED
6120
6121 _[ - ]::--------------------------------------------------------------------------------------------------------------
6122|_[ + ] [ 39 / 100 ]-[12:21:06] [ - ]
6123|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistic-content ]
6124|_[ + ] Exploit::
6125|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6126|_[ + ] More details:: / - / , ISP:
6127|_[ + ] Found:: UNIDENTIFIED
6128
6129 _[ - ]::--------------------------------------------------------------------------------------------------------------
6130|_[ + ] [ 40 / 100 ]-[12:21:08] [ - ]
6131|_[ + ] Target:: [ https://www.trade.gov.tr/2023-export-strategy ]
6132|_[ + ] Exploit::
6133|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6134|_[ + ] More details:: / - / , ISP:
6135|_[ + ] Found:: UNIDENTIFIED
6136
6137 _[ - ]::--------------------------------------------------------------------------------------------------------------
6138|_[ + ] [ 41 / 100 ]-[12:21:09] [ - ]
6139|_[ + ] Target:: [ https://www.trade.gov.tr/legislationforeign-direct-investment ]
6140|_[ + ] Exploit::
6141|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6142|_[ + ] More details:: / - / , ISP:
6143|_[ + ] Found:: UNIDENTIFIED
6144
6145 _[ - ]::--------------------------------------------------------------------------------------------------------------
6146|_[ + ] [ 42 / 100 ]-[12:21:10] [ - ]
6147|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/strategic-investments ]
6148|_[ + ] Exploit::
6149|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6150|_[ + ] More details:: / - / , ISP:
6151|_[ + ] Found:: UNIDENTIFIED
6152
6153 _[ - ]::--------------------------------------------------------------------------------------------------------------
6154|_[ + ] [ 43 / 100 ]-[12:21:12] [ - ]
6155|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/general-investments ]
6156|_[ + ] Exploit::
6157|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6158|_[ + ] More details:: / - / , ISP:
6159|_[ + ] Found:: UNIDENTIFIED
6160
6161 _[ - ]::--------------------------------------------------------------------------------------------------------------
6162|_[ + ] [ 44 / 100 ]-[12:21:13] [ - ]
6163|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/morocco ]
6164|_[ + ] Exploit::
6165|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6166|_[ + ] More details:: / - / , ISP:
6167|_[ + ] Found:: UNIDENTIFIED
6168
6169 _[ - ]::--------------------------------------------------------------------------------------------------------------
6170|_[ + ] [ 45 / 100 ]-[12:21:15] [ - ]
6171|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/priority-investments ]
6172|_[ + ] Exploit::
6173|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6174|_[ + ] More details:: / - / , ISP:
6175|_[ + ] Found:: UNIDENTIFIED
6176
6177 _[ - ]::--------------------------------------------------------------------------------------------------------------
6178|_[ + ] [ 46 / 100 ]-[12:21:16] [ - ]
6179|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/regional-investments ]
6180|_[ + ] Exploit::
6181|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6182|_[ + ] More details:: / - / , ISP:
6183|_[ + ] Found:: UNIDENTIFIED
6184
6185 _[ - ]::--------------------------------------------------------------------------------------------------------------
6186|_[ + ] [ 47 / 100 ]-[12:21:17] [ - ]
6187|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/lebanon ]
6188|_[ + ] Exploit::
6189|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6190|_[ + ] More details:: / - / , ISP:
6191|_[ + ] Found:: UNIDENTIFIED
6192
6193 _[ - ]::--------------------------------------------------------------------------------------------------------------
6194|_[ + ] [ 48 / 100 ]-[12:21:19] [ - ]
6195|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/tunisia ]
6196|_[ + ] Exploit::
6197|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6198|_[ + ] More details:: / - / , ISP:
6199|_[ + ] Found:: UNIDENTIFIED
6200
6201 _[ - ]::--------------------------------------------------------------------------------------------------------------
6202|_[ + ] [ 49 / 100 ]-[12:21:20] [ - ]
6203|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/syria ]
6204|_[ + ] Exploit::
6205|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6206|_[ + ] More details:: / - / , ISP:
6207|_[ + ] Found:: UNIDENTIFIED
6208
6209 _[ - ]::--------------------------------------------------------------------------------------------------------------
6210|_[ + ] [ 50 / 100 ]-[12:21:22] [ - ]
6211|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones/general-outlook ]
6212|_[ + ] Exploit::
6213|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6214|_[ + ] More details:: / - / , ISP:
6215|_[ + ] Found:: UNIDENTIFIED
6216
6217 _[ - ]::--------------------------------------------------------------------------------------------------------------
6218|_[ + ] [ 51 / 100 ]-[12:21:23] [ - ]
6219|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/malaysia ]
6220|_[ + ] Exploit::
6221|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6222|_[ + ] More details:: / - / , ISP:
6223|_[ + ] Found:: UNIDENTIFIED
6224
6225 _[ - ]::--------------------------------------------------------------------------------------------------------------
6226|_[ + ] [ 52 / 100 ]-[12:21:24] [ - ]
6227|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/moldova ]
6228|_[ + ] Exploit::
6229|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6230|_[ + ] More details:: / - / , ISP:
6231|_[ + ] Found:: UNIDENTIFIED
6232
6233 _[ - ]::--------------------------------------------------------------------------------------------------------------
6234|_[ + ] [ 53 / 100 ]-[12:21:26] [ - ]
6235|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/chile ]
6236|_[ + ] Exploit::
6237|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6238|_[ + ] More details:: / - / , ISP:
6239|_[ + ] Found:: UNIDENTIFIED
6240
6241 _[ - ]::--------------------------------------------------------------------------------------------------------------
6242|_[ + ] [ 54 / 100 ]-[12:21:27] [ - ]
6243|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/georgia ]
6244|_[ + ] Exploit::
6245|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6246|_[ + ] More details:: / - / , ISP:
6247|_[ + ] Found:: UNIDENTIFIED
6248
6249 _[ - ]::--------------------------------------------------------------------------------------------------------------
6250|_[ + ] [ 55 / 100 ]-[12:21:28] [ - ]
6251|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/serbia ]
6252|_[ + ] Exploit::
6253|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6254|_[ + ] More details:: / - / , ISP:
6255|_[ + ] Found:: UNIDENTIFIED
6256
6257 _[ - ]::--------------------------------------------------------------------------------------------------------------
6258|_[ + ] [ 56 / 100 ]-[12:21:29] [ - ]
6259|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/mauritius ]
6260|_[ + ] Exploit::
6261|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6262|_[ + ] More details:: / - / , ISP:
6263|_[ + ] Found:: UNIDENTIFIED
6264
6265 _[ - ]::--------------------------------------------------------------------------------------------------------------
6266|_[ + ] [ 57 / 100 ]-[12:21:31] [ - ]
6267|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/palestine ]
6268|_[ + ] Exploit::
6269|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6270|_[ + ] More details:: / - / , ISP:
6271|_[ + ] Found:: UNIDENTIFIED
6272
6273 _[ - ]::--------------------------------------------------------------------------------------------------------------
6274|_[ + ] [ 58 / 100 ]-[12:21:32] [ - ]
6275|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/albania ]
6276|_[ + ] Exploit::
6277|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6278|_[ + ] More details:: / - / , ISP:
6279|_[ + ] Found:: UNIDENTIFIED
6280
6281 _[ - ]::--------------------------------------------------------------------------------------------------------------
6282|_[ + ] [ 59 / 100 ]-[12:21:33] [ - ]
6283|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/efta ]
6284|_[ + ] Exploit::
6285|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6286|_[ + ] More details:: / - / , ISP:
6287|_[ + ] Found:: UNIDENTIFIED
6288
6289 _[ - ]::--------------------------------------------------------------------------------------------------------------
6290|_[ + ] [ 60 / 100 ]-[12:21:34] [ - ]
6291|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/singapore ]
6292|_[ + ] Exploit::
6293|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6294|_[ + ] More details:: / - / , ISP:
6295|_[ + ] Found:: UNIDENTIFIED
6296
6297 _[ - ]::--------------------------------------------------------------------------------------------------------------
6298|_[ + ] [ 61 / 100 ]-[12:21:36] [ - ]
6299|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/israel ]
6300|_[ + ] Exploit::
6301|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6302|_[ + ] More details:: / - / , ISP:
6303|_[ + ] Found:: UNIDENTIFIED
6304
6305 _[ - ]::--------------------------------------------------------------------------------------------------------------
6306|_[ + ] [ 62 / 100 ]-[12:21:37] [ - ]
6307|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/macedonia ]
6308|_[ + ] Exploit::
6309|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6310|_[ + ] More details:: / - / , ISP:
6311|_[ + ] Found:: UNIDENTIFIED
6312
6313 _[ - ]::--------------------------------------------------------------------------------------------------------------
6314|_[ + ] [ 63 / 100 ]-[12:21:38] [ - ]
6315|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/sezai-ucarmak ]
6316|_[ + ] Exploit::
6317|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6318|_[ + ] More details:: / - / , ISP:
6319|_[ + ] Found:: UNIDENTIFIED
6320
6321 _[ - ]::--------------------------------------------------------------------------------------------------------------
6322|_[ + ] [ 64 / 100 ]-[12:21:39] [ - ]
6323|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/egypt ]
6324|_[ + ] Exploit::
6325|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6326|_[ + ] More details:: / - / , ISP:
6327|_[ + ] Found:: UNIDENTIFIED
6328
6329 _[ - ]::--------------------------------------------------------------------------------------------------------------
6330|_[ + ] [ 65 / 100 ]-[12:21:40] [ - ]
6331|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/bilateral-investment-treaties ]
6332|_[ + ] Exploit::
6333|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6334|_[ + ] More details:: / - / , ISP:
6335|_[ + ] Found:: UNIDENTIFIED
6336
6337 _[ - ]::--------------------------------------------------------------------------------------------------------------
6338|_[ + ] [ 66 / 100 ]-[12:21:42] [ - ]
6339|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey/2018 ]
6340|_[ + ] Exploit::
6341|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6342|_[ + ] More details:: / - / , ISP:
6343|_[ + ] Found:: UNIDENTIFIED
6344
6345 _[ - ]::--------------------------------------------------------------------------------------------------------------
6346|_[ + ] [ 67 / 100 ]-[12:21:43] [ - ]
6347|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/focus-business-turkey ]
6348|_[ + ] Exploit::
6349|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6350|_[ + ] More details:: / - / , ISP:
6351|_[ + ] Found:: UNIDENTIFIED
6352
6353 _[ - ]::--------------------------------------------------------------------------------------------------------------
6354|_[ + ] [ 68 / 100 ]-[12:21:45] [ - ]
6355|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/montenegro ]
6356|_[ + ] Exploit::
6357|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6358|_[ + ] More details:: / - / , ISP:
6359|_[ + ] Found:: UNIDENTIFIED
6360
6361 _[ - ]::--------------------------------------------------------------------------------------------------------------
6362|_[ + ] [ 69 / 100 ]-[12:21:46] [ - ]
6363|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey/2017 ]
6364|_[ + ] Exploit::
6365|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6366|_[ + ] More details:: / - / , ISP:
6367|_[ + ] Found:: UNIDENTIFIED
6368
6369 _[ - ]::--------------------------------------------------------------------------------------------------------------
6370|_[ + ] [ 70 / 100 ]-[12:21:47] [ - ]
6371|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/documents ]
6372|_[ + ] Exploit::
6373|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6374|_[ + ] More details:: / - / , ISP:
6375|_[ + ] Found:: UNIDENTIFIED
6376
6377 _[ - ]::--------------------------------------------------------------------------------------------------------------
6378|_[ + ] [ 71 / 100 ]-[12:21:49] [ - ]
6379|_[ + ] Target:: [ https://www.trade.gov.tr/establishing-company-in-turkey ]
6380|_[ + ] Exploit::
6381|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6382|_[ + ] More details:: / - / , ISP:
6383|_[ + ] Found:: UNIDENTIFIED
6384
6385 _[ - ]::--------------------------------------------------------------------------------------------------------------
6386|_[ + ] [ 72 / 100 ]-[12:21:50] [ - ]
6387|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/organizational-structure ]
6388|_[ + ] Exploit::
6389|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6390|_[ + ] More details:: / - / , ISP:
6391|_[ + ] Found:: UNIDENTIFIED
6392
6393 _[ - ]::--------------------------------------------------------------------------------------------------------------
6394|_[ + ] [ 73 / 100 ]-[12:21:51] [ - ]
6395|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/large-scale-investments ]
6396|_[ + ] Exploit::
6397|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6398|_[ + ] More details:: / - / , ISP:
6399|_[ + ] Found:: UNIDENTIFIED
6400
6401 _[ - ]::--------------------------------------------------------------------------------------------------------------
6402|_[ + ] [ 74 / 100 ]-[12:21:52] [ - ]
6403|_[ + ] Target:: [ https://www.trade.gov.tr/news/fed-cuts-interest-rates ]
6404|_[ + ] Exploit::
6405|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6406|_[ + ] More details:: / - / , ISP:
6407|_[ + ] Found:: UNIDENTIFIED
6408
6409 _[ - ]::--------------------------------------------------------------------------------------------------------------
6410|_[ + ] [ 75 / 100 ]-[12:21:54] [ - ]
6411|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/faroe-islands ]
6412|_[ + ] Exploit::
6413|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6414|_[ + ] More details:: / - / , ISP:
6415|_[ + ] Found:: UNIDENTIFIED
6416
6417 _[ - ]::--------------------------------------------------------------------------------------------------------------
6418|_[ + ] [ 76 / 100 ]-[12:21:55] [ - ]
6419|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tax-deduction ]
6420|_[ + ] Exploit::
6421|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6422|_[ + ] More details:: / - / , ISP:
6423|_[ + ] Found:: UNIDENTIFIED
6424
6425 _[ - ]::--------------------------------------------------------------------------------------------------------------
6426|_[ + ] [ 77 / 100 ]-[12:21:56] [ - ]
6427|_[ + ] Target:: [ https://www.trade.gov.tr/news/ecbs-monetary-policy-decision ]
6428|_[ + ] Exploit::
6429|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6430|_[ + ] More details:: / - / , ISP:
6431|_[ + ] Found:: UNIDENTIFIED
6432
6433 _[ - ]::--------------------------------------------------------------------------------------------------------------
6434|_[ + ] [ 78 / 100 ]-[12:21:57] [ - ]
6435|_[ + ] Target:: [ https://www.trade.gov.tr/news/unemployment-at-8-1 ]
6436|_[ + ] Exploit::
6437|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6438|_[ + ] More details:: / - / , ISP:
6439|_[ + ] Found:: UNIDENTIFIED
6440
6441 _[ - ]::--------------------------------------------------------------------------------------------------------------
6442|_[ + ] [ 79 / 100 ]-[12:21:58] [ - ]
6443|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/vat-refund ]
6444|_[ + ] Exploit::
6445|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6446|_[ + ] More details:: / - / , ISP:
6447|_[ + ] Found:: UNIDENTIFIED
6448
6449 _[ - ]::--------------------------------------------------------------------------------------------------------------
6450|_[ + ] [ 80 / 100 ]-[12:21:59] [ - ]
6451|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/minister-of-trade ]
6452|_[ + ] Exploit::
6453|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6454|_[ + ] More details:: / - / , ISP:
6455|_[ + ] Found:: UNIDENTIFIED
6456
6457 _[ - ]::--------------------------------------------------------------------------------------------------------------
6458|_[ + ] [ 81 / 100 ]-[12:22:00] [ - ]
6459|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/riza-tuna-turagay ]
6460|_[ + ] Exploit::
6461|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6462|_[ + ] More details:: / - / , ISP:
6463|_[ + ] Found:: UNIDENTIFIED
6464
6465 _[ - ]::--------------------------------------------------------------------------------------------------------------
6466|_[ + ] [ 82 / 100 ]-[12:22:02] [ - ]
6467|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/land-allocation ]
6468|_[ + ] Exploit::
6469|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6470|_[ + ] More details:: / - / , ISP:
6471|_[ + ] Found:: UNIDENTIFIED
6472
6473 _[ - ]::--------------------------------------------------------------------------------------------------------------
6474|_[ + ] [ 83 / 100 ]-[12:22:03] [ - ]
6475|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import/trade-defence-policy ]
6476|_[ + ] Exploit::
6477|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6478|_[ + ] More details:: / - / , ISP:
6479|_[ + ] Found:: UNIDENTIFIED
6480
6481 _[ - ]::--------------------------------------------------------------------------------------------------------------
6482|_[ + ] [ 84 / 100 ]-[12:22:04] [ - ]
6483|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/gonca-yilmaz-batur ]
6484|_[ + ] Exploit::
6485|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6486|_[ + ] More details:: / - / , ISP:
6487|_[ + ] Found:: UNIDENTIFIED
6488
6489 _[ - ]::--------------------------------------------------------------------------------------------------------------
6490|_[ + ] [ 85 / 100 ]-[12:22:05] [ - ]
6491|_[ + ] Target:: [ https://www.trade.gov.tr/trade-fairs-and-buyers-mission ]
6492|_[ + ] Exploit::
6493|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6494|_[ + ] More details:: / - / , ISP:
6495|_[ + ] Found:: UNIDENTIFIED
6496
6497 _[ - ]::--------------------------------------------------------------------------------------------------------------
6498|_[ + ] [ 86 / 100 ]-[12:22:06] [ - ]
6499|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations/wto-and-multilaretal ]
6500|_[ + ] Exploit::
6501|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6502|_[ + ] More details:: / - / , ISP:
6503|_[ + ] Found:: UNIDENTIFIED
6504
6505 _[ - ]::--------------------------------------------------------------------------------------------------------------
6506|_[ + ] [ 87 / 100 ]-[12:22:07] [ - ]
6507|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tesvik-haritasi ]
6508|_[ + ] Exploit::
6509|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6510|_[ + ] More details:: / - / , ISP:
6511|_[ + ] Found:: UNIDENTIFIED
6512
6513 _[ - ]::--------------------------------------------------------------------------------------------------------------
6514|_[ + ] [ 88 / 100 ]-[12:22:09] [ - ]
6515|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services/turkish-contracting-services ]
6516|_[ + ] Exploit::
6517|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6518|_[ + ] More details:: / - / , ISP:
6519|_[ + ] Found:: UNIDENTIFIED
6520
6521 _[ - ]::--------------------------------------------------------------------------------------------------------------
6522|_[ + ] [ 89 / 100 ]-[12:22:10] [ - ]
6523|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/interest-rate-support ]
6524|_[ + ] Exploit::
6525|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6526|_[ + ] More details:: / - / , ISP:
6527|_[ + ] Found:: UNIDENTIFIED
6528
6529 _[ - ]::--------------------------------------------------------------------------------------------------------------
6530|_[ + ] [ 90 / 100 ]-[12:22:11] [ - ]
6531|_[ + ] Target:: [ https://www.trade.gov.tr/news/chinas-economy-worsens-in-july ]
6532|_[ + ] Exploit::
6533|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6534|_[ + ] More details:: / - / , ISP:
6535|_[ + ] Found:: UNIDENTIFIED
6536
6537 _[ - ]::--------------------------------------------------------------------------------------------------------------
6538|_[ + ] [ 91 / 100 ]-[12:22:12] [ - ]
6539|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/republic-of-korea ]
6540|_[ + ] Exploit::
6541|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6542|_[ + ] More details:: / - / , ISP:
6543|_[ + ] Found:: UNIDENTIFIED
6544
6545 _[ - ]::--------------------------------------------------------------------------------------------------------------
6546|_[ + ] [ 92 / 100 ]-[12:22:16] [ - ]
6547|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-falls ]
6548|_[ + ] Exploit::
6549|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6550|_[ + ] More details:: / - / , ISP:
6551|_[ + ] Found:: UNIDENTIFIED
6552
6553 _[ - ]::--------------------------------------------------------------------------------------------------------------
6554|_[ + ] [ 93 / 100 ]-[12:22:19] [ - ]
6555|_[ + ] Target:: [ https://www.trade.gov.tr/news/weekly-jobless-claims-unexpectedly-fall ]
6556|_[ + ] Exploit::
6557|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6558|_[ + ] More details:: / - / , ISP:
6559|_[ + ] Found:: UNIDENTIFIED
6560
6561 _[ - ]::--------------------------------------------------------------------------------------------------------------
6562|_[ + ] [ 94 / 100 ]-[12:22:20] [ - ]
6563|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/customs-duty-exemption ]
6564|_[ + ] Exploit::
6565|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6566|_[ + ] More details:: / - / , ISP:
6567|_[ + ] Found:: UNIDENTIFIED
6568
6569 _[ - ]::--------------------------------------------------------------------------------------------------------------
6570|_[ + ] [ 95 / 100 ]-[12:22:23] [ - ]
6571|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/product-safety-and-technical-regulation ]
6572|_[ + ] Exploit::
6573|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6574|_[ + ] More details:: / - / , ISP:
6575|_[ + ] Found:: UNIDENTIFIED
6576
6577 _[ - ]::--------------------------------------------------------------------------------------------------------------
6578|_[ + ] [ 96 / 100 ]-[12:22:25] [ - ]
6579|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu/turkey-and-the-eu ]
6580|_[ + ] Exploit::
6581|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6582|_[ + ] More details:: / - / , ISP:
6583|_[ + ] Found:: UNIDENTIFIED
6584
6585 _[ - ]::--------------------------------------------------------------------------------------------------------------
6586|_[ + ] [ 97 / 100 ]-[12:22:26] [ - ]
6587|_[ + ] Target:: [ https://www.trade.gov.tr/news/opec-oil-production-narrowed-in-december ]
6588|_[ + ] Exploit::
6589|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6590|_[ + ] More details:: / - / , ISP:
6591|_[ + ] Found:: UNIDENTIFIED
6592
6593 _[ - ]::--------------------------------------------------------------------------------------------------------------
6594|_[ + ] [ 98 / 100 ]-[12:22:31] [ - ]
6595|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-edges-downwards ]
6596|_[ + ] Exploit::
6597|_[ + ] Information Server:: , , IP::0
6598|_[ + ] More details::
6599|_[ + ] Found:: UNIDENTIFIED
6600
6601 _[ - ]::--------------------------------------------------------------------------------------------------------------
6602|_[ + ] [ 99 / 100 ]-[12:22:32] [ - ]
6603|_[ + ] Target:: [ https://www.trade.gov.tr/news/boj-to-retain-ultra-low-rates ]
6604|_[ + ] Exploit::
6605|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
6606|_[ + ] More details:: / - / , ISP:
6607|_[ + ] Found:: UNIDENTIFIED
6608
6609[ INFO ] [ Shutting down ]
6610[ INFO ] [ End of process INURLBR at [30-11-2019 12:22:32]
6611[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
6612[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
6613|_________________________________________________________________________________________
6614
6615\_________________________________________________________________________________________/
6616#######################################################################################################################################
6617HTTP/2 200
6618cache-control: private
6619content-length: 50217
6620content-type: text/html; charset=utf-8
6621server: Microsoft-IIS/10.0
6622set-cookie: ASP.NET_SessionId=3ks0iqn3ssymvuvigakf0rjt; path=/; HttpOnly
6623x-aspnetmvc-version: 5.2
6624x-aspnet-version: 4.0.30319
6625x-powered-by: ASP.NET
6626access-control-allow-origin: *
6627date: Sat, 30 Nov 2019 17:22:36 GMT
6628#######################################################################################################################################
6629https://www.trade.gov.tr [200 OK] ASP_NET[4.0.30319][MVC5.2], Cookies[ASP.NET_SessionId], Country[TURKEY][TR], HTML5, HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[95.0.51.12], Microsoft-IIS[10.0], Open-Graph-Protocol, Script, Title[Republic of Turkey - Ministry of Trade], UncommonHeaders[x-aspnetmvc-version,access-control-allow-origin], X-Powered-By[ASP.NET], X-UA-Compatible[IE=edge]
6630########################################################################################################################################
6631
6632wig - WebApp Information Gatherer
6633
6634
6635Scanning https://www.trade.gov.tr...
6636_____________________________ SITE INFO _____________________________
6637IP Title
663895.0.51.12 Republic of Turkey - Ministry of Trade
6639
6640______________________________ VERSION ______________________________
6641Name Versions Type
6642ASP.NET 4.0.30319 Platform
6643IIS 10.0 Platform
6644jQuery 3.4.1 JavaScript
6645
6646____________________________ INTERESTING ____________________________
6647URL Note Type
6648/test/ Test directory Interesting
6649/none_existing_page_123 ASP.NET detailed error Interesting
6650
6651_______________________ PLATFORM OBSERVATIONS _______________________
6652Platform URL Type
6653ASP.NET 4.0.30319 / Observation
6654ASP.NET 4.7.3429.0 /none_existing_page_123 Observation
6655
6656_____________________________________________________________________
6657Time: 1.4 sec Urls: 613 Fingerprints: 40401
6658#######################################################################################################################################
6659tee: /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/nmap-www.trade.gov.tr-port443: Aucun fichier ou dossier de ce type
6660Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 12:22 EST
6661NSE: Loaded 163 scripts for scanning.
6662NSE: Script Pre-scanning.
6663Initiating NSE at 12:22
6664Completed NSE at 12:22, 0.00s elapsed
6665Initiating NSE at 12:22
6666Completed NSE at 12:22, 0.00s elapsed
6667Initiating Parallel DNS resolution of 1 host. at 12:22
6668Completed Parallel DNS resolution of 1 host. at 12:22, 0.03s elapsed
6669Initiating SYN Stealth Scan at 12:22
6670Scanning www.trade.gov.tr (95.0.51.12) [1 port]
6671Discovered open port 443/tcp on 95.0.51.12
6672Completed SYN Stealth Scan at 12:22, 0.19s elapsed (1 total ports)
6673Initiating Service scan at 12:22
6674Scanning 1 service on www.trade.gov.tr (95.0.51.12)
6675Completed Service scan at 12:23, 13.48s elapsed (1 service on 1 host)
6676Initiating OS detection (try #1) against www.trade.gov.tr (95.0.51.12)
6677Retrying OS detection (try #2) against www.trade.gov.tr (95.0.51.12)
6678Initiating Traceroute at 12:23
6679Completed Traceroute at 12:23, 0.30s elapsed
6680Initiating Parallel DNS resolution of 17 hosts. at 12:23
6681Completed Parallel DNS resolution of 17 hosts. at 12:23, 5.67s elapsed
6682NSE: Script scanning 95.0.51.12.
6683Initiating NSE at 12:23
6684Completed NSE at 12:26, 160.53s elapsed
6685Initiating NSE at 12:26
6686Completed NSE at 12:26, 2.10s elapsed
6687Nmap scan report for www.trade.gov.tr (95.0.51.12)
6688Host is up (0.18s latency).
6689rDNS record for 95.0.51.12: 95.0.51.12.static.ttnet.com.tr
6690
6691PORT STATE SERVICE VERSION
6692443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
6693|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
6694| http-brute:
6695|_ Path "/" does not require authentication
6696|_http-chrono: Request times for /; avg: 2291.41ms; min: 1421.94ms; max: 3194.80ms
6697|_http-csrf: Couldn't find any CSRF vulnerabilities.
6698|_http-date: Sat, 30 Nov 2019 17:23:38 GMT; -5s from local time.
6699|_http-devframework: ASP.NET detected. Found related header.
6700|_http-dombased-xss: Couldn't find any DOM based XSS.
6701|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
6702|_http-errors: ERROR: Script execution failed (use -d to debug)
6703|_http-exif-spider: ERROR: Script execution failed (use -d to debug)
6704|_http-feed: Couldn't find any feeds.
6705|_http-fetch: Please enter the complete path of the directory to save data in.
6706| http-fileupload-exploiter:
6707|
6708| Couldn't find a file-type field.
6709|
6710|_ Couldn't find a file-type field.
6711| http-headers:
6712| Cache-Control: private
6713| Content-Type: text/html; charset=utf-8
6714| Server: Microsoft-IIS/10.0
6715| Set-Cookie: ASP.NET_SessionId=s40uo2th35hmaki14iqtwumr; path=/; HttpOnly
6716| X-AspNetMvc-Version: 5.2
6717| X-AspNet-Version: 4.0.30319
6718| X-Powered-By: ASP.NET
6719| Access-Control-Allow-Origin: *
6720| Date: Sat, 30 Nov 2019 17:23:53 GMT
6721| Connection: close
6722| Content-Length: 50217
6723|
6724|_ (Request type: GET)
6725|_http-jsonp-detection: Couldn't find any JSONP endpoints.
6726| http-methods:
6727|_ Supported Methods: GET POST OPTIONS
6728|_http-mobileversion-checker: No mobile version detected.
6729| http-php-version: Logo query returned unknown hash aca975c23e5048e1e844304f76d8f71e
6730|_Credits query returned unknown hash aca975c23e5048e1e844304f76d8f71e
6731| http-security-headers:
6732| Strict_Transport_Security:
6733| HSTS not configured in HTTPS Server
6734| Cache_Control:
6735|_ Header: Cache-Control: private
6736| http-server-header:
6737| Microsoft-HTTPAPI/2.0
6738|_ Microsoft-IIS/10.0
6739| http-sitemap-generator:
6740| Directory structure:
6741| /
6742| Other: 4
6743| /about-ministry/
6744| Other: 2
6745| /data/5d3812e413b876143465b090/
6746| pdf: 1
6747| /focus-business-turkey/
6748| Other: 1
6749| /free-zones/
6750| Other: 1
6751| /imgs/
6752| png: 3
6753| /legislation/
6754| Other: 1
6755| /news/
6756| Other: 1
6757| /v2/images/
6758| png: 2
6759| Longest directory structure:
6760| Depth: 2
6761| Dir: /v2/images/
6762| Total files found (by extension):
6763|_ Other: 10; pdf: 1; png: 5
6764| http-sql-injection:
6765| Possible sqli for queries:
6766| https://www.trade.gov.tr:443/v2/app.js?v=3%27%20OR%20sqlspider
6767| https://www.trade.gov.tr:443/v2/app.js?v=3%27%20OR%20sqlspider
6768| https://www.trade.gov.tr:443/v2/app.js?v=3%27%20OR%20sqlspider
6769| https://www.trade.gov.tr:443/v2/app.js?v=3%27%20OR%20sqlspider
6770|_ https://www.trade.gov.tr:443/v2/app.js?v=3%27%20OR%20sqlspider
6771|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
6772|_http-title: Republic of Turkey - Ministry of Trade
6773|_http-traceroute: ERROR: Script execution failed (use -d to debug)
6774| http-vhosts:
6775| www.trade.gov.tr : 200
6776| test.trade.gov.tr : 200
6777| ssh.trade.gov.tr
6778|_124 names had status 404
6779|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
6780|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
6781|_http-xssed: No previously reported XSS vuln.
6782| vulscan: VulDB - https://vuldb.com:
6783| [141625] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 DirectX memory corruption
6784| [141624] Microsoft Windows 7 SP1/Server 2008 R2 SP1 Graphics Component information disclosure
6785| [139966] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Kernel information disclosure
6786| [139923] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Graphics Component information disclosure
6787| [139905] Microsoft Windows Server 2008 SP2 DHCP Server memory corruption
6788| [137573] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6789| [137567] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6790| [137566] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6791| [137565] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6792| [137564] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6793| [136343] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6794| [136342] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6795| [136341] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6796| [136316] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6797| [136315] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6798| [136313] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6799| [136311] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6800| [136309] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6801| [136302] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6802| [136298] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure
6803| [136297] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Win32k memory corruption
6804| [131683] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Win32k memory corruption
6805| [131642] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Active Directory privilege escalation
6806| [127822] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2012 Kernel information disclosure
6807| [125103] Microsoft Windows Server 2008 SP2 Graphics Component information disclosure
6808| [123853] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Kernel Memory information disclosure
6809| [122858] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 LNK memory corruption
6810| [122833] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI+ memory corruption
6811| [121109] Microsoft Wireless Display Adapter V2 2.0.8350/2.0.8365/2.0.8372 privilege escalation
6812| [120449] Microsoft Forefront Unified Access Gateway 2000 InitParams.aspx Parameter Server-Side Request Forgery
6813| [119469] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Kernel privilege escalation
6814| [116015] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1 memory corruption
6815| [114563] Microsoft Office 2007 SP3/2010 SP2/2013/2013 RT SP1 memory corruption
6816| [114528] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI privilege escalation
6817| [114524] Microsoft ASP.NET Core 2.0 denial of service
6818| [114523] Microsoft ASP.NET Core 2.0 Kestrel Web Application privilege escalation
6819| [113257] Microsoft Windows 7 SP1/Server 2008 SP2/Server 2012 Kernel information disclosure
6820| [113256] Microsoft Windows 7 SP1/Server 2008 SP2/Server 2012 Kernel information disclosure
6821| [113255] Microsoft Windows 7 SP1/Server 2008 SP2/Server 2012 Kernel information disclosure
6822| [113247] Microsoft Windows 7 SP1/Server 2008 R2 SP1 EOT Font Engine information disclosure
6823| [113246] Microsoft Windows 7 SP1/Server 2008 R2 SP1 EOT Font Engine information disclosure
6824| [113245] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2012 EOT Font Engine information disclosure
6825| [113244] Microsoft Windows 7 SP1/Server 2008 R2 SP1 EOT Font Engine information disclosure
6826| [113235] Microsoft Outlook 2007 SP3/2010 SP2/2013 SP1/2016 privilege escalation
6827| [113234] Microsoft Office 2007 SP2/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6828| [113216] Microsoft Outlook 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6829| [112285] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6830| [112284] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6831| [112283] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6832| [112282] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6833| [111578] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6834| [111577] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6835| [111576] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6836| [111575] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6837| [111574] Microsoft Word 2003/2007/2010/2013/2016 Equation Editor memory corruption
6838| [111573] Microsoft Office 2007/2010/2013/2016 Equation Editor memory corruption
6839| [111572] Microsoft Office 2007/2010/2013/2016 Equation Editor memory corruption
6840| [111570] Microsoft Office 2007/2010/2013/2016 Equation Editor memory corruption
6841| [111568] Microsoft Excel 2007/2010/2013/2016 memory corruption
6842| [111566] Microsoft Word 2007/2010/2013/2016 memory corruption
6843| [111565] Microsoft Word 2007/2010/2013 Email Message memory corruption
6844| [111563] Microsoft Outlook 2007/2010/2013/2016 Email Message privilege escalation
6845| [111347] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Color Management Icm32.dll information disclosure
6846| [109388] Microsoft Office 2007 SP3/2010 SP2/2013 SP1/2016 memory corruption
6847| [109387] Microsoft ASP.NET Core 2.0 privilege escalation
6848| [109386] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6849| [109385] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 Security Feature Macro privilege escalation
6850| [109381] Microsoft Office/Word 2007 SP3/2010 SP2 memory corruption
6851| [107703] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6852| [106530] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6853| [106528] Microsoft PowerPoint 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6854| [106515] Microsoft Publisher 2007 SP3/2010 SP2 memory corruption
6855| [106497] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Uniscribe memory corruption
6856| [106476] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6857| [106475] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6858| [105051] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 Font Library privilege escalation
6859| [105032] Microsoft Internet Explorer 9/10 on Server 2008/Server 2012 memory corruption
6860| [102513] Microsoft Windows Server 2003 SP2/XP SP3 OLE olecnv32.dll privilege escalation
6861| [102512] Microsoft Windows Server 2003 SP2/XP SP3 rpc privilege escalation
6862| [102511] Microsoft Windows Server 2003 SP2/XP SP3 RDP EsteemAudit privilege escalation
6863| [102447] Microsoft PowerPoint/SharePoint Server 2007 SP3 privilege escalation
6864| [102444] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 privilege escalation
6865| [102442] Microsoft Outlook 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 Bypass privilege escalation
6866| [102441] Microsoft Outlook 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6867| [102401] Microsoft Windows 7 SP1/Server 2008 R2 SP1 GDI USP10!NextCharInLiga Uniscribe Font information disclosure
6868| [101491] Microsoft Windows up to XP SP3/Server 2003 SP2 Remote Desktop Protocol gpkcsp.dll memory corruption
6869| [101017] Microsoft Office 2007 SP3/2010 SP2/2016 memory corruption
6870| [101012] Microsoft Office 2007 SP3/2010 SP2/2011/2013 SP1/2016 memory corruption
6871| [101011] Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 ActiveX Object Memory memory corruption
6872| [100854] Microsoft Windows Server 2003 SP2 RRAS ERRATICGOPHER memory corruption
6873| [99904] Microsoft Windows Server 2003 SP2/XP SP3 SmartCard Authentication RDP Packet EsteemAudit privilege escalation
6874| [99698] Microsoft OneNote 2007 SP3/2010 SP2 DLL Loader privilege escalation
6875| [99684] Microsoft Excel 2007 SP3/2010 SP2 Memory information disclosure
6876| [99654] Microsoft Outlook 2007 SP3/2010 SP2/2011/2013 SP1/2016 Email Message privilege escalation
6877| [99653] Microsoft Outlook 2007 SP3/2010 SP2/2011/2013 SP1/2016 Email Message privilege escalation
6878| [99533] Microsoft Office 2007/2010/2013/2016 RTF Document Necurs Dridex memory corruption
6879| [98561] Microsoft IIS 6.0 on Windows Server 2003 WebDAV ScStoragePathFromUrl Long Header memory corruption
6880| [98092] Microsoft SharePoint Server 2007 SP3 memory corruption
6881| [98088] Microsoft SharePoint Server 2007 SP3 memory corruption
6882| [98087] Microsoft Office 2007 SP3/2010 SP2 memory corruption
6883| [98086] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6884| [98085] Microsoft Excel 2007 SP3 memory corruption
6885| [98084] Microsoft Word 2007 SP3/2010 SP2/2011 memory corruption
6886| [98083] Microsoft Word 2007 SP3/2010 SP2/2011 memory corruption
6887| [98078] Microsoft Word/Excel 2007 SP3 memory corruption
6888| [98072] Microsoft Office 2007 SP3/2010 SP2/Word Viewer Graphics Component privilege escalation
6889| [98071] Microsoft Office 2007 SP3/2010 SP2/Word Viewer GDI+ information disclosure
6890| [98070] Microsoft Office 2007 SP3/2010 SP2/Word Viewer GDI+ information disclosure
6891| [94450] Microsoft Office 2007 SP3/2010 SP2/2011 memory corruption
6892| [94449] Microsoft Office 2007 SP3/2010 SP2/2011/2013 SP1 information disclosure
6893| [94448] Microsoft Office 2007 SP3/2010 SP2/2011/2013 SP1 information disclosure
6894| [94445] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1 information disclosure
6895| [94441] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 privilege escalation
6896| [94440] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6897| [94439] Microsoft Office 2007 SP3/2011 privilege escalation
6898| [94438] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 privilege escalation
6899| [93542] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1 memory corruption
6900| [93541] Microsoft Office 2007 SP3 denial of service
6901| [93539] Microsoft Office 2007/2010 SP2/2011 memory corruption
6902| [93538] Microsoft Office 2007/2010 SP2/2011/2013 SP1 memory corruption
6903| [93537] Microsoft Office 2007/2010 SP2/2011 memory corruption
6904| [93396] Microsoft Office 2007/2010/2011 memory corruption
6905| [93395] Microsoft Office 2007/2010/2011 memory corruption
6906| [93394] Microsoft Office 2007/2010 memory corruption
6907| [92596] Microsoft Windows 7 SP1/Server 2008 R2/Server 2008 SP2/Vista SP2 Internet Messaging API File information disclosure
6908| [91554] Microsoft Exchange 2007/2010/2013/2016 Email information disclosure
6909| [91553] Microsoft Office 2007/2010/2013/2013 RT/2016 memory corruption
6910| [91552] Microsoft Office 2007/2010/2013/2013 RT/2016 spoofing
6911| [91551] Microsoft Office 2007/2010/2013/2013 RT/2016 memory corruption
6912| [91549] Microsoft Office 2007/2010/2013/2013 RT/2016 memory corruption
6913| [91548] Microsoft Office 2007/2010/2013/2013 RT/2016 memory corruption
6914| [91546] Microsoft Office 2007/2010/2013/2013 RT memory corruption
6915| [91545] Microsoft Office 2007/2010 memory corruption
6916| [91544] Microsoft Office 2007/2010/2013/2013 RT/2016 memory corruption
6917| [91542] Microsoft Office 2007/2010/2013/2013 RT/2016 information disclosure
6918| [90707] Microsoft OneNote 2007/2010/2013/2013 RT/2016 information disclosure
6919| [90706] Microsoft Office 2007/2010/2013/2013 RT Graphics memory corruption
6920| [90705] Microsoft Office 2007/2010/2011 memory corruption
6921| [90703] Microsoft Office 2007/2010/2013/2013 RT/2016 memory corruption
6922| [89039] Microsoft Office 2007 SP3/2010 SP2/2011/2013 RT SP1/2013 SP1 memory corruption
6923| [89034] Microsoft Windows Server 2008/Vista SP2 JScript/VBScript memory corruption
6924| [87960] Microsoft Windows Server 2008 R2/Server 2012/Server 2012 R2 Active Directory denial of service
6925| [87955] Microsoft Exchange 2007/2010/2013/2016 Oracle Outside In Libraries privilege escalation
6926| [87954] Microsoft Exchange 2007/2010/2013/2016 Oracle Outside In Libraries privilege escalation
6927| [87953] Microsoft Exchange 2007/2010/2013/2016 Oracle Outside In Libraries privilege escalation
6928| [87939] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 OLE DLL memory corruption
6929| [87938] Microsoft Office 2007 SP3/2010 SP2/2011 information disclosure
6930| [87937] Microsoft Office 2007 SP3/2010 SP2/2011 memory corruption
6931| [87935] Microsoft Windows Server 2008 R2 SP1/Server 2008 SP2/Vista SP2 VBScript/JScript memory corruption
6932| [87934] Microsoft Windows Server 2008 R2 SP1/Server 2008 SP2/Vista SP2 VBScript/JScript memory corruption
6933| [87933] Microsoft Windows Server 2008 R2 SP1/Server 2008 SP2/Vista SP2 VBScript/JScript memory corruption
6934| [87147] Microsoft Office 2007/2010 memory corruption
6935| [87145] Microsoft Windows Server 2008/Vista SP2 JScript/VBScript memory corruption
6936| [87144] Microsoft Windows Server 2008/Vista SP2 JScript/VBScript memory corruption
6937| [82228] Microsoft Excel 2007 SP3/2010 SP2 Office Document memory corruption
6938| [82225] Microsoft Word 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1 Office Document memory corruption
6939| [82224] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 Office Document memory corruption
6940| [81273] Microsoft Office 2007/2010/2013/2016 memory corruption
6941| [81272] Microsoft Office 2007/2010/2013 memory corruption
6942| [81265] Microsoft Windows Server 2008/Vista SP2 Library Loader memory corruption
6943| [80872] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6944| [80871] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6945| [80869] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
6946| [79506] Microsoft Windows 7/Server 2008/Server 2008 R2/Vista Library Loader memory corruption
6947| [79505] Microsoft Office 2007 memory corruption
6948| [79504] Microsoft Office 2007/2010/2013/2016 memory corruption
6949| [79503] Microsoft Office 2007/2010/2013 memory corruption
6950| [79502] Microsoft Office 2007/2010/2011 memory corruption
6951| [79501] Microsoft Office 2007/2010 memory corruption
6952| [79499] Microsoft Windows 7/Server 2008 R2 Uniscribe memory corruption
6953| [79493] Microsoft Windows Server 2008/Vista Graphics memory corruption
6954| [79190] Microsoft Word 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 Office Document memory corruption
6955| [79189] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1/2016 Office Document memory corruption
6956| [79187] Microsoft Office 2007 SP3/2010 SP2/2013 SP1/2016 Sandbox privilege escalation
6957| [79167] Microsoft Windows 7/Server 2008/Server 2008 R2/Vista Journal memory corruption
6958| [78372] Microsoft Visio 2007 SP3/2010 SP2 UML Data memory corruption
6959| [78371] Microsoft SharePoint Server 2007 SP3/2010 SP2 InfoPath Forms Services XXE information disclosure
6960| [77646] Microsoft Office 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1 EPS Image memory corruption
6961| [77629] Microsoft Excel 2007 SP3/2010 SP2/2011/2016 Office Document memory corruption
6962| [77627] Microsoft Excel 2007 SP3/2010 SP2 Office Document memory corruption
6963| [77626] Microsoft Excel 2007 SP3/2010 SP2/2011/2016 Office Document memory corruption
6964| [77617] Microsoft Office 2007 SP3/2010 SP2 OpenType Font memory corruption
6965| [77252] Microsoft Office 2007 SP3/2010 SP2 Office Graphics Library Font memory corruption
6966| [77038] Microsoft Windows Server 2008 SP2 UDDI Services cross site scripting
6967| [76497] Microsoft PowerPoint 2007 SP3/2010 SP2/2013 SP1 Office Document memory corruption
6968| [76491] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1 Office Document memory corruption
6969| [76467] Microsoft Word 2007 SP3/2010 SP2/2011/2013 RT SP1/2013 SP1 Office Document memory corruption
6970| [76466] Microsoft Word 2007 SP3/2010 SP2/2011/2013 RT SP1/2013 SP1 Office Document memory corruption
6971| [76464] Microsoft Excel 2007 SP3/2010 SP2/2013 RT SP1/2013 SP1 Office Document memory corruption
6972| [76463] Microsoft Excel 2007 SP3/2010 SP2/2011/2013 RT SP1/2013 SP1 Office Document memory corruption
6973| [76449] Microsoft Windows 8/8.1/Server 2008/Server 2012/Server 2012 R2 Hyper-V memory corruption
6974| [76440] Microsoft SQL Server 2008/2008 R2/2012/2014 Virtual Function Uninitialized Memory memory corruption
6975| [76439] Microsoft SQL Server 2008/2008 R2/2012/2014 Uninitialized Memory memory corruption
6976| [76438] Microsoft SQL Server 2008/2008 R2/2012/2014 Pointer Casting privilege escalation
6977| [75783] Microsoft Windows Server 2008/Server 2012 Active Directory Federation Services cross site scripting
6978| [75338] Microsoft SharePoint 2007/2010/2013 Content privilege escalation
6979| [75337] Microsoft Office 2007 SP3/2010 SP2/2011/2013 RT SP1/2013 SP1 memory corruption
6980| [75336] Microsoft Office 2007 SP3/2010 SP2/2011/2013 RT SP1/2013 SP1 memory corruption
6981| [74845] Microsoft Office 2007/2010/2013 Document Use-After-Free memory corruption
6982| [74844] Microsoft Office 2007/2010 Document Use-After-Free memory corruption
6983| [74837] Microsoft Office 2007/2010/2011/2013 RTF Document Use-After-Free privilege escalation
6984| [73979] Microsoft Exchange Server 2003 CU7/2003 SP1 Meeting privilege escalation
6985| [73978] Microsoft Exchange Server 2003 CU7/2003 SP1 cross site scripting
6986| [73977] Microsoft Exchange Server 2003 CU7/2003 SP1 cross site scripting
6987| [73976] Microsoft Exchange Server 2003 CU7/2003 SP1 cross site scripting
6988| [73975] Microsoft Exchange Server 2003 CU7/2003 SP1 cross site scripting
6989| [73964] Microsoft SharePoint 2007/2010/2013 cross site scripting
6990| [69158] Microsoft Office 2007/2010/2013 Use-After-Free memory corruption
6991| [69157] Microsoft Office 2007/2010/2013 OneTableDocumentStream memory corruption
6992| [68416] Microsoft Exchange 2007/2010/2013 Outlook Web Access Token spoofing
6993| [68409] Microsoft Office 2007/2010/2013 Use-After-Free memory corruption
6994| [68408] Microsoft Excel 2007/2010/2013 memory corruption
6995| [68407] Microsoft Excel 2007/2010 memory corruption
6996| [68405] Microsoft Word 2007/2010 Index Use-After-Free memory corruption
6997| [68195] Microsoft Windows 7/Server 2003/Server 2008/Vista Input Method Editor Sandbox privilege escalation
6998| [68189] Microsoft Windows Server 2003 SP2 TCP/IP Stack Stack-Based memory corruption
6999| [68188] Microsoft Word 2007 File memory corruption
7000| [68187] Microsoft Word 2007 File memory corruption
7001| [68186] Microsoft Word 2007 File memory corruption
7002| [67829] Microsoft Office 2007/2010/2011 Object memory corruption
7003| [67825] Microsoft .NET Framework 2.0/3.5/3.5.1 ASLR privilege escalation
7004| [71337] Microsoft Office 2000/2004/XP memory corruption
7005| [67355] Microsoft OneNote 2007 File Processing privilege escalation
7006| [67354] Microsoft SQL Server 2008 R2 SP2/2008 SP3/2012 SP1/2014 SQL Master Data Services cross site scripting
7007| [67353] Microsoft SQL Server 2008 R2 SP2/2008 SP3/2012 SP1/2014 T-SQL Query Stack-Based memory corruption
7008| [67018] Microsoft Windows Server 2008/Server 2012/Server 2012 R2 Service Bus AMQP Message denial of service
7009| [13545] Microsoft Word 2007 Embedded Font memory corruption
7010| [13397] Microsoft Windows 2000/Server 2003/XP DHCP Response DHCP ACK spoofing
7011| [13462] Microsoft Visual Studio 2002/2003/2005/2010 Debug Interface msdia.dll PDB File memory corruption
7012| [13229] Microsoft Office 2007/2010/2013 Common Control Library MSCOMCTL.OCX privilege escalation
7013| [13227] Microsoft Office 2007/2010/2013 Chinese Grammar Checker Library privilege escalation
7014| [13226] Microsoft SharePoint Server 2007/2010/2013 Page memory corruption
7015| [13225] Microsoft SharePoint Server 2007/2010/2013 cross site scripting
7016| [13224] Microsoft SharePoint Server 2007/2010/2013 Page memory corruption
7017| [12859] Microsoft Word 2003 Office Document Stack-Based memory corruption
7018| [12852] Microsoft Publisher 2003/2007 Publisher File pubconv.dll memory corruption
7019| [12845] Microsoft Word 2003 Office File Stack-Based memory corruption
7020| [12844] Microsoft Word 2007/2010 Office File memory corruption
7021| [12843] Microsoft Office 2007/2010/2011/2013 XML Parser Nested Entities Memory Consumption denial of service
7022| [12687] Microsoft Word/Office/Outlook 2003/2007/2010/2013 RTF Document memory corruption
7023| [12530] Microsoft Windows Server 2003/Server 2008/Server 2012/Vista/XP Security Account Manager Lockout privilege escalation
7024| [12266] Microsoft .NET Framework 2.0 SP2/3.5.1 ASLR Bypass privilege escalation
7025| [12070] Apple Pages 2.0/2.0.1/2.0.2/5.0/5.0.1 on Mac Microsoft Word Document memory corruption
7026| [11950] Microsoft Office Compability Pack/Word 2007 SP3 File memory corruption
7027| [11949] Microsoft Word Viewer/Office Compatibility Pack/Word 2003 SP3/2007 SP3 File memory corruption
7028| [11494] Microsoft .NET Framework 2.0 SP2/3.5.1/4/4.5/4.5.1 MAC Authentication privilege escalation
7029| [11448] Microsoft Office 2007/2010 Address Space Layout Randomization privilege escalation
7030| [11148] Microsoft Office 2003/2007 WordPerfect Document epsimp32.flt memory corruption
7031| [11146] Microsoft Office 2003/2007 epsimp32.flt memory corruption
7032| [11230] Microsoft Word 2003 DOC Document Embedded Image denial of service
7033| [11081] Microsoft Windows Server 2008/Vista TIFF Image memory corruption
7034| [10648] Microsoft Word 2007 Word File memory corruption
7035| [10647] Microsoft Word 2003 Word File memory corruption
7036| [10643] Microsoft SharePoint Server 2007/2010/2013 Input Sanitizer memory corruption
7037| [10642] Microsoft SharePoint Server 2007/2010 Content Display in Frames privilege escalation
7038| [10247] Microsoft SharePoint Server 2007/2010/2013 Online Cloud cross site scripting
7039| [10245] Microsoft Office 2003/2007/2010 Word File memory corruption
7040| [10244] Microsoft Office 2003 SP3 Word File memory corruption
7041| [10243] Microsoft Office 2003/2007 Word File memory corruption
7042| [10242] Microsoft Office 2007 Word File memory corruption
7043| [10241] Microsoft Office 2007 Word File memory corruption
7044| [10240] Microsoft Office 2003/2007/2010 Word File memory corruption
7045| [10239] Microsoft Office 2003/2007 Word File memory corruption
7046| [10238] Microsoft Excel 2003/2007 XML External Entity Data information disclosure
7047| [10237] Microsoft Excel 2003/2007/2010 XML External Entity Data information disclosure
7048| [10236] Microsoft Word/Office 2003/2007 XML External Entity Data information disclosure
7049| [10234] Microsoft Word/Sharepoint 2003 SP3/2007 SP3/2010 SP1 Office File memory corruption
7050| [10232] Microsoft Word/Sharepoint 2003 SP3/2007 SP3/2010 SP1 Office File memory corruption
7051| [10231] Microsoft Word/Sharepoint 2003 SP3/2007 SP3/2010 SP1 Office File memory corruption
7052| [10230] Microsoft Word/Sharepoint 2003 SP3/2007 SP3/2010 SP1 Office File memory corruption
7053| [10229] Microsoft Access 2007/2010/2013 Access File ACCDB File memory corruption
7054| [10228] Microsoft Access 2007/2010/2013 Access File ACCDB File memory corruption
7055| [10227] Microsoft Access 2007/2010/2013 Access File ACCDB File memory corruption
7056| [10192] Microsoft Windows 7/2000/Server 2003 SP2/Vista/XP SP3 Windows Theme File privilege escalation
7057| [10191] Microsoft Windows Server 2003/XP OLE Object privilege escalation
7058| [10190] Microsoft Windows 7/8/Server 2008/Vista Active Directory denial of service
7059| [10189] Microsoft Outlook 2007/2010 S/MIME privilege escalation
7060| [9941] Microsoft Windows Server 2003/XP Unicode Scripts Processor USP10.DLL Uniscribe Font memory corruption
7061| [9929] Microsoft Windows Server 2008/Server 2012 Active Directory Federation Services Unspecified Account information disclosure
7062| [9715] Microsoft PowerPoint 2007 DirectShow Runtime quartz.dll GetMaxSampleSize denial of service
7063| [9397] Microsoft .NET Framework 2.0 SP2/3.5/3.5.1/4/4.5 Array privilege escalation
7064| [9394] Microsoft .NET Framework 2.0 SP2/3.5/3.5.1/4/4.5 on 64-bit Array memory corruption
7065| [9393] Microsoft .NET Framework 2.0 SP2/3.5/3.5.1/4/4.5 Permission privilege escalation
7066| [8738] Microsoft Visio 2003 SP3/2007 SP3/2010 SP1 XML Parser File information disclosure
7067| [8737] Microsoft Word 2003 SP3 Shape Data Parser File memory corruption
7068| [8736] Microsoft Publisher 2003 SP3 PUB File memory corruption
7069| [8735] Microsoft Publisher 2003 SP3/2007 SP3/2010 SP1 PUB File memory corruption
7070| [8734] Microsoft Publisher 2003 SP3 PUB File memory corruption
7071| [8733] Microsoft Publisher 2003 SP3 PUB File memory corruption
7072| [8732] Microsoft Publisher 2003 SP3 PUB File memory corruption
7073| [8731] Microsoft Publisher 2003 SP3 PUB File memory corruption
7074| [8730] Microsoft Publisher 2003 SP3 PUB File memory corruption
7075| [8729] Microsoft Publisher 2003 SP3 PUB File memory corruption
7076| [8728] Microsoft Publisher 2003 SP3 PUB File memory corruption
7077| [8727] Microsoft Publisher 2003 SP3 PUB File memory corruption
7078| [8726] Microsoft Publisher 2003 PUB File Eingabe memory corruption
7079| [8723] Microsoft .NET Framework 2.0 SP2/3.5/3.5.1/4/4.5 XML File spoofing
7080| [7643] Microsoft Windows Server 2008 R2/Server 2012 NFS Server NULL Pointer Dereference denial of service
7081| [7642] Microsoft Exchange 2007/2010 Outlook Web Access vspdx.dll) privilege escalation
7082| [7641] Microsoft Windows Server 2003/Server 2008/Vista/XP DirectShow Quartz.dll memory corruption
7083| [8589] Microsoft System Center Operations Manager 2007 R2/2007 SP1 ViewTypeManager.aspx cross site scripting
7084| [7252] Microsoft System Center Operations Manager 2007 ExecuteTask.aspx cross site scripting
7085| [7251] Microsoft System Center Operations Manager 2007 cross site scripting
7086| [7248] Microsoft Windows 7/Server 2008 R2 Print Spooler privilege escalation
7087| [7121] Microsoft Exchange 2007/2010 RSS Feed denial of service
7088| [7118] Microsoft Windows Server 2008 R2/Server 2012 IP-HTTPS unknown vulnerability
7089| [62914] Microsoft Office 2003 SP3/2007 SP3/2008/2010 SP1/2011 Spreadsheet Use-After-Free memory corruption
7090| [7058] Microsoft Windows 7/Server 2008 R2 DHCPv6 Message denial of service
7091| [6935] Microsoft Office Excel 2003/2007/2010 Input Sanitizer File Stack-based memory corruption
7092| [6934] Microsoft Office Excel 2003/2007/2010 Input Sanitizer memory corruption
7093| [6933] Microsoft Office Excel 2003/2007/2010 SerAuxErrBar File memory corruption
7094| [6929] Microsoft .NET Framework 2.0 SP2/3.5/3.5.1/4/4.5 Web Proxy Setting Auto-Discovery memory corruption
7095| [6927] Microsoft .NET Framework 2.0 SP2/3.5.1 Trusted Code Function information disclosure
7096| [6918] Microsoft Excel 2007 SP2 Input Sanitizer File memory corruption
7097| [6830] Microsoft Word 2007/2010 File memory corruption
7098| [6819] Microsoft Excel 2007 File memory corruption
7099| [6627] Microsoft Windows 7/Server 2008 R2 Kerberos denial of service
7100| [6626] Microsoft SharePoint/Lync/Infopath 2007/2010 HTML Sanitization cross site scripting
7101| [6621] Microsoft Word 2007 PAPX memory corruption
7102| [62239] Microsoft Systems Management Server 2003 Configuration Manager Reflected cross site scripting
7103| [5945] Microsoft Office 2007/2010 Computer Graphics Metafile memory corruption
7104| [5939] Microsoft Windows 7/Server 2003/Server 2008 R2/Vista/XP Print Spooler Service memory corruption
7105| [5938] Microsoft Windows 7/Server 2003/Server 2008 R2/Vista/XP Remote Administration Protocol netapi32.dll RAP Request denial of service
7106| [5933] Microsoft SQL Server 2000/2005/2008/2008 R2 Common Controls TabStrip ActiveX MSCOMCTL.OCX memory corruption
7107| [5932] Microsoft Office 2003/2007/2010 Common Controls TabStrip ActiveX MSCOMCTL.OCX memory corruption
7108| [5654] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP information disclosure
7109| [5653] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP win32k.sys memory corruption
7110| [5652] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP win32k.sys memory corruption
7111| [5650] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP memory corruption
7112| [5649] Microsoft Office 2003/2007/2010 libraries memory corruption
7113| [5645] Microsoft SharePoint 2007/2010/3.0 Reflected cross site scripting
7114| [5643] Microsoft SharePoint 2007/2010 information disclosure
7115| [5642] Microsoft SharePoint 2007 cross site request forgery
7116| [5553] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP OpenType Font atmfd.dll denial of service
7117| [5524] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP memory corruption
7118| [5518] Microsoft .NET Framework 2.0 SP2/3.5/3.5.1/4/4.5 memory corruption
7119| [5362] Microsoft Office 2003/2007 GDI+ memory corruption
7120| [5291] Microsoft Visual Studio 2008 Incremental Linker link.exe ConvertRgImgSymToRgImgSymEx memory corruption
7121| [5268] Microsoft Office 2008 on Mac RTF Pfragment File memory corruption
7122| [5080] Microsoft SQL Server 2005/2008/2008R2 CREATE DATABASE sql injection
7123| [5050] Microsoft Office 2007 WPS Converter Heap-based memory corruption
7124| [5049] Microsoft SQL Server 2000/2005/2008 MSCOMCTL.OCX privilege escalation
7125| [5048] Microsoft Office 2003/2007/2010 MSCOMCTL.OCX privilege escalation
7126| [5046] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Windows Authenticode Signature Verification WinVerifyTrust Signature privilege escalation
7127| [4803] Microsoft Windows Server 2003/Server 2008 DNS Server Domain Resource Record Query Parser denial of service
7128| [4802] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Remote Desktop Protocol denial of service
7129| [4798] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Remote Desktop Service memory corruption
7130| [60205] Microsoft .NET Framework 2.0 SP2/3.5.1 Heap-based memory corruption
7131| [4642] Microsoft .NET Framework 2.0 SP2/3.5.1/4 XAML Browser Application memory corruption
7132| [60065] Microsoft Windows 2000 mod_sql unknown vulnerability
7133| [4535] Microsoft Windows Server 2003/XP Object Packager packager.exe privilege escalation
7134| [4534] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Line21 DirectShow Filter Quartz.dll/Qdvd.dll Media File memory corruption
7135| [4533] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Multimedia Library winmm.dll MIDI File memory corruption
7136| [4507] Microsoft .NET Framework 2.0 SP2/3.5 SP1/3.5.1/4.0 Forms Authentication privilege escalation
7137| [59666] Microsoft Publisher 2003/2007 "Publisher memory corruption
7138| [4482] Microsoft Word 2007/2010/2011 Document Parser memory corruption
7139| [4480] Microsoft Excel 2003 memory corruption
7140| [4478] Microsoft Windows Server 2003/XP OLE Objects Memory Management memory corruption
7141| [4477] Microsoft PowerPoint 2007 SP2/2008 OfficeArt Use-After-Free memory corruption
7142| [4474] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Active Directory Query memory corruption
7143| [4473] Microsoft PowerPoint 2007 SP2/2010 DLL-Loader memory corruption
7144| [4471] Microsoft Office 2003/2007 Publisher Out-of-Bounds memory corruption
7145| [4470] Microsoft Office 2003 SP3 memory corruption
7146| [4453] Microsoft Excel 2003 Record Parser memory corruption
7147| [4446] Microsoft Office 2007/2008 OfficeArt Record Parser memory corruption
7148| [4445] Microsoft Office 2007/2010/2011 Word Document Parser memory corruption
7149| [4438] Microsoft Windows 7/Server 2008/Vista TCP/IP Reference Counter denial of service
7150| [5358] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP TrueType Font Handling memory corruption
7151| [59005] Microsoft Host Integration Server 2004 denial of service
7152| [58492] Microsoft SharePoint Server 2007 Spreadsheet memory corruption
7153| [58491] Microsoft Office 2004/2007/2008/2010/2011 Spreadsheet memory corruption
7154| [58490] Microsoft Office Compatibility Pack 2007 Spreadsheet memory corruption
7155| [58489] Microsoft Office 2004/2007/2008/2010/2011 Spreadsheet memory corruption
7156| [58488] Microsoft Office 2007/2010 memory corruption
7157| [4412] Microsoft Office 2003/2007 Library Loader unknown vulnerability
7158| [4411] Microsoft Excel 2003 memory corruption
7159| [4409] Microsoft Windows Server 2003/Server 2008 WINS unknown vulnerability
7160| [58240] Microsoft Visio 2003/2007 memory corruption
7161| [58237] Microsoft Visio 2003/2007/2010 memory corruption
7162| [4396] Microsoft Windows 7/Server 2008/Vista TCP/IP Stack denial of service
7163| [4393] Microsoft Windows Server 2008 DNS Service memory corruption
7164| [4391] Microsoft .NET Framework 2.0 SP2/3.5.1/4 Socket Restriction privilege escalation
7165| [4390] Microsoft Windows Server 2008 Remote Desktop Web Access cross site scripting
7166| [4388] Microsoft Windows 7/Server 2008/Vista File Metadata Parser denial of service
7167| [57691] Microsoft SQL Server 2008 Web Service information disclosure
7168| [57690] Microsoft Excel 2002/2003 Spreadsheet memory corruption
7169| [57689] Microsoft Excel 2002 Spreadsheet memory corruption
7170| [57688] Microsoft Excel 2002 Spreadsheet memory corruption
7171| [57687] Microsoft Excel 2002/2003/2007 Spreadsheet memory corruption
7172| [57686] Microsoft Excel 2002 Spreadsheet memory corruption
7173| [57685] Microsoft Excel 2002/2003/2007 Array Access memory corruption
7174| [57684] Microsoft Excel 2002/2003/2007/2010 Spreadsheet memory corruption
7175| [4369] Microsoft Excel 2002/2003/2007 memory corruption
7176| [4367] Microsoft Windows Server 2008 Hyper-V VMBus denial of service
7177| [4362] Microsoft Windows 7/Server 2008/Vista denial of service
7178| [57420] Microsoft PowerPoint 2002/2003 memory corruption
7179| [4349] Microsoft Office 2004/2007/2008 Presentation File Parser memory corruption
7180| [4348] Microsoft PowerPoint 2002/2003/2007 memory corruption
7181| [57077] Microsoft Excel 2002 Uninitialized Memory memory corruption
7182| [57078] Microsoft Office 2003/2007/Xp docx unknown vulnerability
7183| [57079] Microsoft PowerPoint 2002/2003/2007/2010 memory corruption
7184| [57076] Microsoft Excel 2002/2003 memory corruption
7185| [57075] Microsoft Excel 2002/2003 memory corruption
7186| [57074] Microsoft Excel 2002 memory corruption
7187| [57073] Microsoft Excel 2002/2003/2007/2010 memory corruption
7188| [4334] Microsoft .NET Framework 2.0 SP2/3.5 SP1/3.5.1/4.0 JIT Compiler memory corruption
7189| [4332] Microsoft PowerPoint 2007/2010 memory corruption
7190| [4301] Microsoft Windows Server 2003 SMB Browser Heap-based denial of service
7191| [56475] Microsoft Office 2004/2008 memory corruption
7192| [56414] Microsoft Visio 2002/2003/2007 ELEMENTS.DLL memory corruption
7193| [56413] Microsoft Visio 2002/2003/2007 Exception ORMELEMS.DLL memory corruption
7194| [4298] Microsoft Windows 7/Server 2008 JScript/VBScript Engine information disclosure
7195| [4297] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP OpenType Compact Font Format Driver privilege escalation
7196| [4296] Microsoft Windows Server 2003/XP LSASS Authentication Request unknown vulnerability
7197| [4295] Microsoft Windows 7/Server 2008 Kerberos weak authentication
7198| [4294] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Driver win32k.sys unknown vulnerability
7199| [4293] Microsoft Windows Server 2003/XP Kerberos CRC32 Checksum privilege escalation
7200| [4292] Microsoft Windows Server 2003/XP CSRSS Logoff privilege escalation
7201| [4289] Microsoft Excel 2007 Shape Data Parser memory corruption
7202| [4286] Microsoft PowerPoint 2002 SP3/2003 SP3/2004/2007 SP2/2008 OfficeArt Container Parser memory corruption
7203| [4279] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP MHTML cross site scripting
7204| [56176] Microsoft Windows 7/Server 2003/XP fxscover.exe CDrawPoly::Serialize memory corruption
7205| [55772] Microsoft Publisher 2002 pubconv.dll memory corruption
7206| [55771] Microsoft Publisher 2002/2003/2010 memory corruption
7207| [55765] Microsoft Office 2003/Xp Integer memory corruption
7208| [55764] Microsoft Office 2003/Xp memory corruption
7209| [55750] Microsoft Publisher 2002/2003 pubconv.dll memory corruption
7210| [55749] Microsoft Publisher 2002/2003/2007/2010 pubconv.dll memory corruption
7211| [55748] Microsoft Publisher 2002/2003/2007 pubconv.dll memory corruption
7212| [4230] Microsoft Exchange 2007 on 64-bit RPC store.exe MAPI Request denial of service
7213| [4229] Microsoft SharePoint 2007 Document Conversion Launcher Service Eingabeung\xC3\xBCltigkeit
7214| [4228] Microsoft Windows Server 2008 Hyper-V VMBus denial of service
7215| [4224] Microsoft Windows 7/Server 2008/Vista Consent User Interface privilege escalation
7216| [4231] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Driver win32k.sys GreEnableEUDC denial of service
7217| [55420] Microsoft Office 2007/2010 memory corruption
7218| [55419] Microsoft Office 2004/2008/2011/Xp memory corruption
7219| [55412] Microsoft PowerPoint Viewer 2007 memory corruption
7220| [55411] Microsoft PowerPoint 2002/2003 memory corruption
7221| [4204] Microsoft Windows Server 2008 Color Control Panel Eingabeung\xC3\xBCltigkeit
7222| [54995] Microsoft Office 2004/2008 memory corruption
7223| [54994] Microsoft Office 2004/2008 Out-of-Bounds memory corruption
7224| [54993] Microsoft Office Compatibility Pack 2007 memory corruption
7225| [54992] Microsoft Excel 2002 memory corruption
7226| [54991] Microsoft Office 2004 Future memory corruption
7227| [54990] Microsoft Office 2004 memory corruption
7228| [54989] Microsoft Office 2004/2008 memory corruption
7229| [54988] Microsoft Excel 2002 memory corruption
7230| [54987] Microsoft Excel 2002 memory corruption
7231| [54986] Microsoft Excel 2002/2003 memory corruption
7232| [54985] Microsoft Office Compatibility Pack 2003/2004/2007/2008 memory corruption
7233| [54984] Microsoft Office 2004/2008 memory corruption
7234| [54983] Microsoft Excel 2002 Integer memory corruption
7235| [54980] Microsoft Word 2002/2003 memory corruption
7236| [54979] Microsoft Word 2002 memory corruption
7237| [54978] Microsoft Word 2002 memory corruption
7238| [54977] Microsoft Word 2002 Heap-based memory corruption
7239| [54976] Microsoft Word 2002 memory corruption
7240| [54975] Microsoft Word 2002 memory corruption
7241| [54974] Microsoft Word 2002 memory corruption
7242| [54973] Microsoft Word 2002 memory corruption
7243| [54972] Microsoft Word 2002 memory corruption
7244| [54971] Microsoft Word 2002 memory corruption
7245| [4197] Microsoft SharePoint 2007/3.0 cross site scripting
7246| [4196] Microsoft Word 2002/2003/2007/2010 Stack-based memory corruption
7247| [4194] Microsoft Windows 7/Server 2008/Vista SChannel Client Certificate Request denial of service
7248| [54774] Microsoft Word 2003 word_crash_11.8326.8324_poc.doc denial of service
7249| [54757] Microsoft SharePoint Server 2007 HTML Sanitization SafeHTML cross site scripting
7250| [4186] Microsoft Outlook 2002/2003/2007 Content Parser Heap-based memory corruption
7251| [54584] Microsoft Visual C++ 2005 AtlTraceTool8.exe unknown vulnerability
7252| [54554] Microsoft Groove 2007 mso.dll memory corruption
7253| [4187] Microsoft Windows 7/Server 2008/Vista TCP/IP Stack Ipv4SetEchoRequestCreate denial of service
7254| [54322] Microsoft Word 2002/2003 memory corruption
7255| [54321] Microsoft Office Compatibility Pack 2007 memory corruption
7256| [54320] Microsoft Office Compatibility Pack 2007 memory corruption
7257| [54319] Microsoft Office Compatibility Pack 2007 memory corruption
7258| [54318] Microsoft .NET Framework 2.0 SP1/2.0 SP2/3.5/3.5 SP1/3.5.1 Interfaces memory corruption
7259| [4165] Microsoft Windows 7/Server 2008/Vista TCP/IP Stack denial of service
7260| [4162] Microsoft Windows 7/Server 2008/Vista Kernel memory corruption
7261| [4159] Microsoft Excel 2002/2003 SXDB PivotTable Cache Data Record memory corruption
7262| [4149] Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Shell Shortcut Parser memory corruption
7263| [54083] Microsoft Access 2003 ActiveX Control ACCWIZ.dll memory corruption
7264| [4146] Microsoft Outlook 2002/2003/2007 SMB Attachment PR_ATTACH_METHOD memory corruption
7265| [4145] Microsoft Access 2003/2007 ActiveX ACCWIZ.dll memory corruption
7266| [54617] Microsoft Outlook Web Access up to 2007 cross site request forgery
7267| [4151] Microsoft Windows Server 2008/Vista NtUserCheckAccessForIntegrityLevel memory corruption
7268| [53591] Microsoft Windows Server 2003 GetServerName cross site scripting
7269| [53505] Microsoft Excel 2002/2007 memory corruption
7270| [53501] Microsoft Excel 2002 memory corruption
7271| [53500] Microsoft Excel 2002 memory corruption
7272| [53499] Microsoft Excel 2002 memory corruption
7273| [53495] Microsoft Excel 2002/2003/2007 memory corruption
7274| [53494] Microsoft Excel 2002 Stack-based memory corruption
7275| [53504] Microsoft Excel 2002 memory corruption
7276| [53503] Microsoft Excel 2002 Stack-Based memory corruption
7277| [53502] Microsoft Excel 2002 Heap-based memory corruption
7278| [53498] Microsoft Excel 2002 Stack-based memory corruption
7279| [53497] Microsoft Excel 2002 memory corruption
7280| [53496] Microsoft Excel 2002 memory corruption
7281| [53493] Microsoft Excel 2002/2003/2007 memory corruption
7282| [4133] Microsoft Office 2003/2007/Xp COM Object Instantiator memory corruption
7283| [53366] Microsoft ASP.NET 2.0 cross site scripting
7284| [53385] Microsoft Exchange Server 2007 Outlook Web Access cross site scripting
7285| [53164] Microsoft Office 2003/2007/Xp ActiveX Control VBE6.DLL memory corruption
7286| [53054] Microsoft VISIO 2002/2003/2007 VISIODWG.DLL memory corruption
7287| [4125] Microsoft SharePoint 2007/3.0 help.aspx cross site scripting
7288| [52777] Microsoft Publisher 2002/2003/2007 memory corruption
7289| [52773] Microsoft Visio 2002/2003/2007 memory corruption
7290| [52772] Microsoft Visio 2002/2003/2007 memory corruption
7291| [4107] Microsoft Windows 7/Server 2008 Kernel denial of service
7292| [4103] Microsoft Windows Server 2003 Media Services Stack-based memory corruption
7293| [52543] Microsoft Virtual PC 2007 unknown vulnerability
7294| [52148] Microsoft Office 2004/2007/2008 Uninitialized Memory memory corruption
7295| [52147] Microsoft Office 2004/2007/2008 Spreadsheet Uninitialized Memory memory corruption
7296| [52146] Microsoft Office 2004/2007/2008 Spreadsheet Heap-based memory corruption
7297| [52145] Microsoft Office 2004/2007/2008 Spreadsheet Heap-based memory corruption
7298| [52144] Microsoft Office 2004/2007/2008 Spreadsheet memory corruption
7299| [52143] Microsoft Office 2004/2007/2008 Spreadsheet memory corruption
7300| [4090] Microsoft Excel 2002/2003/2007 memory corruption
7301| [52036] Microsoft Windows 2000 MsgBox memory corruption
7302| [51995] Microsoft SharePoint Server up to 2006 cross site scripting
7303| [51810] Microsoft Office 2004/Xp MSO.DLL memory corruption
7304| [51802] Microsoft PowerPoint 2003 Stack-based memory corruption
7305| [51801] Microsoft PowerPoint 2003 Stack-based memory corruption
7306| [51800] Microsoft PowerPoint 2002/2003 Use-After-Free memory corruption
7307| [51799] Microsoft PowerPoint 2002/2003 memory corruption
7308| [51798] Microsoft PowerPoint 2002/2003 Heap-based memory corruption
7309| [4082] Microsoft PowerPoint 2002 SP3 memory corruption
7310| [54550] Microsoft PowerPoint 2007 rpawinet.dll memory corruption
7311| [54556] Microsoft Visio 2003 mfc71enu.dll unknown vulnerability
7312| [51497] Microsoft Windows Live Messenger 2009 ActiveX Control msnmsgr.exe denial of service
7313| [51133] Microsoft Windows 2000 SP4/Server 2003 SP2/SP3/XP SP2 memory corruption
7314| [51074] Microsoft Office 2002/2003 Integer memory corruption
7315| [4069] Microsoft Project 2003/2007 Project Memory Validator memory corruption
7316| [50794] Microsoft Office 2004/2008 Spreadsheet memory corruption
7317| [50793] Microsoft Office 2004/2008 Spreadsheet memory corruption
7318| [50792] Microsoft Office 2004/2008 Spreadsheet memory corruption
7319| [50791] Microsoft Office 2004/2008 Spreadsheet memory corruption
7320| [50790] Microsoft Office 2004/2008 Spreadsheet Heap-based memory corruption
7321| [50788] Microsoft Office 2004/2008 Spreadsheet memory corruption
7322| [50787] Microsoft Office 2004/2008 Spreadsheet memory corruption
7323| [50786] Microsoft Windows 2000 llssrv.exe memory corruption
7324| [50789] Microsoft Office 2004/2008 Spreadsheet memory corruption
7325| [4056] Microsoft Word 2002/2003 File Information Block Parser Stack-based memory corruption
7326| [50660] Microsoft SharePoint Server 2007 unknown vulnerability
7327| [50443] Microsoft PowerPoint 2007 Integer memory corruption
7328| [50432] Microsoft .NET Framework 2.0/2.0 SP1/2.0 SP2/3.5/3.5 SP1 memory corruption
7329| [49866] Microsoft Windows Server 2003 memory corruption
7330| [4031] Microsoft Windows Server 2008/Vista SMB Processor EducatedScholar memory corruption
7331| [4030] Microsoft Windows Server 2008/Vista Wireless LAN AutoConfig Service Heap-based memory corruption
7332| [4029] Microsoft Windows 2000/XP TCP/IP Window Size denial of service
7333| [49745] Microsoft Windows Server 2003 denial of service
7334| [49395] Microsoft Office 2000/2003/XP Office Web Components Heap-based memory corruption
7335| [49394] Microsoft Windows Server 2003 memory corruption
7336| [49389] Microsoft Office 2000/2003/XP Office Web Components memory corruption
7337| [49390] Microsoft Office 2000/2003/XP Office Web Components memory corruption
7338| [49198] Microsoft Visual Studio 2005 information disclosure
7339| [49047] Microsoft Virtual Server 2005 privilege escalation
7340| [49046] Microsoft Windows Server 2003 quartz.dll memory corruption
7341| [49045] Microsoft Windows Server 2003 quartz.dll memory corruption
7342| [49044] Microsoft ISA Server 2006 privilege escalation
7343| [3999] Microsoft Office 2007 Pointer memory corruption
7344| [4000] Microsoft Office 2003/Sp3/Xp Web Components memory corruption
7345| [48894] Microsoft Windows Server 2003 msvidctl.dll memory corruption
7346| [48572] Microsoft PowerPoint 2002 FL21WIN.DLL memory corruption
7347| [48517] Microsoft Windows 2000 Memory Leak memory corruption
7348| [48516] Microsoft Windows Server 2008 unknown vulnerability
7349| [48512] Microsoft Windows Server 2008 unknown vulnerability
7350| [48515] Microsoft Office Word Viewer 2003 memory corruption
7351| [48514] Microsoft Office Word Viewer 2003 Stack-based memory corruption
7352| [48554] Microsoft Excel 2000/2003/2007 memory corruption
7353| [48157] Microsoft PowerPoint 2002 Sound memory corruption
7354| [48156] Microsoft PowerPoint 2000 Stack-based memory corruption
7355| [48154] Microsoft PowerPoint 2002 Sound PP7X32.DLL memory corruption
7356| [48152] Microsoft PowerPoint 2002 PP4X32.DLL memory corruption
7357| [48150] Microsoft PowerPoint 2002 Sound memory corruption
7358| [48147] Microsoft PowerPoint 2002 Sound memory corruption
7359| [48146] Microsoft PowerPoint 2002 Integer memory corruption
7360| [48155] Microsoft PowerPoint 2002 Notes Container Heap-based memory corruption
7361| [48153] Microsoft PowerPoint 2002 Sound memory corruption
7362| [48151] Microsoft PowerPoint 2002 Stack-based memory corruption
7363| [48149] Microsoft PowerPoint 2002 memory corruption
7364| [48148] Microsoft PowerPoint 2002 Sound memory corruption
7365| [3974] Microsoft PowerPoint 2000/2002/2003 Sound Data Stack-based memory corruption
7366| [3973] Microsoft PowerPoint 2000/2002/2003 Notes Container Stack-based memory corruption
7367| [3972] Microsoft PowerPoint 2000/2002/2003 BuildList memory corruption
7368| [3971] Microsoft PowerPoint 2000/2002/2003 Object Stack-based memory corruption
7369| [3970] Microsoft PowerPoint 2000/2002/2003 Paragraph Stack-based memory corruption
7370| [3969] Microsoft PowerPoint 2000/2002/2003 Atom Stack-based memory corruption
7371| [47719] Microsoft Windows 2000 Stack-based memory corruption
7372| [47720] Microsoft Internet Security And Acceleration Server 2006 Forms Authentication cookieauth.dll cross site scripting
7373| [47716] Microsoft Office Converter Pack 2003 WPFT632.CNV memory corruption
7374| [47715] Microsoft Windows 2000 Wordpad memory corruption
7375| [47718] Microsoft Excel 2000/2002/2003/2007 Spreadsheet memory corruption
7376| [3960] Microsoft Windows 2000/Server 2003/XP DirectShow MJPEG memory corruption
7377| [3952] Microsoft ISA Server 2004/2006 denial of service
7378| [3946] Microsoft PowerPoint 2000/2002/2003/2004 memory corruption
7379| [47091] Microsoft Windows Server 2008 unknown vulnerability
7380| [47090] Microsoft Windows Server 2008 unknown vulnerability
7381| [3939] Microsoft Windows 2000 DNS spoofing
7382| [3938] Microsoft Windows 2000 SSL weak authentication
7383| [3937] Microsoft Windows 2000 memory corruption
7384| [3932] Microsoft Excel 2000/2002/2003/2004/2007 Object Reference memory corruption
7385| [46620] Microsoft Windows Live Messenger 2009 msnmsgr.exe denial of service
7386| [46455] Microsoft Exchange Server 2007 denial of service
7387| [46454] Microsoft Exchange Server 2007 memory corruption
7388| [46453] Microsoft Visio 2002/2003/2007 memory corruption
7389| [46452] Microsoft Visio 2002/2003/2007 memory corruption
7390| [46451] Microsoft Visio 2002/2003/2007 memory corruption
7391| [46327] Microsoft Word 2007 information disclosure
7392| [45758] Microsoft Money 2006 ActiveX Control prtstb06.dll denial of service
7393| [45381] Microsoft Windows Server 2008/Vista SP1 Explorer memory corruption
7394| [45380] Microsoft Windows Server 2008/Vista SP1 Search memory corruption
7395| [45379] Microsoft Office SharePoint Server 2007 denial of service
7396| [3896] Microsoft SQL Server up to 2005 sp_replwritetovarbin memory corruption
7397| [3892] Microsoft Excel 2000/2002/2003 Formula memory corruption
7398| [3891] Microsoft Excel 2000/2002/2003 memory corruption
7399| [3890] Microsoft Excel 2000/2002/2003 NAME Index memory corruption
7400| [3889] Microsoft Word 2000/2002/2003/2007 Table Property Stack-based memory corruption
7401| [3888] Microsoft Word 2000/2002/2003/2007 RTF Stylesheet memory corruption
7402| [3887] Microsoft Word 2000/2002/2003/2007 memory corruption
7403| [3886] Microsoft Word 2000/2002/2003/2007 ControlWord Heap-based memory corruption
7404| [3885] Microsoft Word 2000/2002/2003/2007 memory corruption
7405| [3884] Microsoft Word 2000/2002/2003/2007 memory corruption
7406| [3883] Microsoft Word 2000/2002/2003/2007 RTF Heap-based memory corruption
7407| [3882] Microsoft Word 2000/2002/2003/2007 LFO memory corruption
7408| [3880] Microsoft Visual Basic up to 2003 ActiveX Control Mschrt20.ocx memory corruption
7409| [3879] Microsoft Visual Basic up to 2003 ActiveX Control mscomct2.ocx memory corruption
7410| [3878] Microsoft Visual Basic up to 2003 ActiveX Control mshflxgd.ocx memory corruption
7411| [3877] Microsoft Visual Basic up to 2003 ActiveX Control msflxgrd.ocx memory corruption
7412| [3876] Microsoft Visual Basic up to 2003 ActiveX Control msdatgrd.ocx memory corruption
7413| [45197] Microsoft Windows 2000 nskey.dll memory corruption
7414| [45063] Microsoft Windows Server 2003 Active Directory unknown vulnerability
7415| [45040] Microsoft .NET Framework 2.0.50727 Code Access Security unknown vulnerability
7416| [44855] DjVu Activex Control For Microsoft Office 2000 3.0 ActiveX Control DjVu_ActiveX_MSOffice.dll memory corruption
7417| [44665] Microsoft Peachtree Accounting 2004 ActiveX Control PAWWeb11.ocx unknown vulnerability
7418| [44589] Microsoft Exchange Server 2003 Outlook Web Access unknown vulnerability
7419| [3845] Microsoft Windows 2000 SP4 Active Directory memory corruption
7420| [44533] Microsoft Windows 2000 mqsvc.exe memory corruption
7421| [3844] Microsoft Excel 2003 REPT memory corruption
7422| [3843] Microsoft Excel up to 2007 BIFF File Heap-based memory corruption
7423| [3842] Microsoft Excel 2003 VBA Performance Cache Stack-based memory corruption
7424| [44405] Microsoft Digital Image 2006 ActiveX Control PipPPush.DLL unknown vulnerability
7425| [44047] Microsoft SQL Server 2000 ActiveX Control SQLVDIRLib.SQLVDirControl memory corruption
7426| [43981] Microsoft Organization Chart 2.00 orgchart.exe memory corruption
7427| [43957] Microsoft Office 2003/2007/Xp gdiplus.dll memory corruption
7428| [43956] Microsoft Office 2003/2007/Xp gdiplus.dll memory corruption
7429| [43955] Microsoft Office 2003/2007/Xp gdiplus.dll memory corruption
7430| [43952] Microsoft Office 2003/2007/Xp URI memory corruption
7431| [43676] Microsoft Windows 2000/Server 2003/Vista/XP memory corruption
7432| [43675] Microsoft Windows 2000/Server 2003/Vista/XP of memory corruption
7433| [43662] Microsoft PowerPoint Viewer 2000 SP3/2002 SP3/2003 SP2/2007 SP1 memory corruption
7434| [43661] Microsoft PowerPoint Viewer 2003 memory corruption
7435| [43660] Microsoft PowerPoint Viewer 2003 Integer memory corruption
7436| [43657] Microsoft Office 2000/2003/Xp memory corruption
7437| [43654] Microsoft SharePoint Server 2007 memory corruption
7438| [43653] Microsoft Office 2000/2002/2004/2008 memory corruption
7439| [43652] Microsoft Office 2000/2002/2003/2004/2008 memory corruption
7440| [3797] Microsoft Windows Server 2008/Vista IPsec Policy Designfehler
7441| [3796] Microsoft Office 2000 WPG memory corruption
7442| [3795] Microsoft Office 2000/2003/Xp BMP Image BMPIMP32.FLT memory corruption
7443| [3794] Microsoft Office 2000/2003/Xp PICT bits_per_pixel memory corruption
7444| [3793] Microsoft Office 2000/2003/Xp PICT memory corruption
7445| [3792] Microsoft Office 2000 EPS File memory corruption
7446| [3783] Microsoft Word 2002 memory corruption
7447| [43103] Microsoft Exchange Srv 2007 Sp1 Outlook Web Access cross site scripting
7448| [43102] Microsoft Windows 2000 SP4/Server 2003 SP2/Server 2008 DNS Cache privilege escalation
7449| [3778] Microsoft Exchange 2003/2007 Outlook Web Access cross site scripting
7450| [3777] Microsoft Windows Server 2008/Vista SP1 Explorer memory corruption
7451| [43087] Microsoft Office Snapshot Viewer ActiveX up to Office 2003 Snapshot Viewer ActiveX Control snapview.ocx memory corruption
7452| [43096] Microsoft Publisher 2003/2007 Crypto API unknown vulnerability
7453| [42816] Microsoft Word 2000/2003 memory corruption
7454| [42732] Microsoft Windows Server 2003/Vista/XP denial of service
7455| [42731] Microsoft Windows Server 2003 denial of service
7456| [3732] Microsoft Windows 2000/Server 2003 WINS memory corruption
7457| [3701] Microsoft Word 2003 CSS Heap-based memory corruption
7458| [3700] Microsoft Word 2003 RTF Document Heap-based memory corruption
7459| [42065] Microsoft SharePoint Server 2.0 Rich Text Editor cross site scripting
7460| [41881] Microsoft Office 2003/2007/2007 Sp1/Xp memory corruption
7461| [41880] Microsoft Project 2000/2002/2003 memory corruption
7462| [41879] Microsoft Windows 2000/Server 2003/Vista Stack-based memory corruption
7463| [41878] Microsoft Windows 2000/Server 2003/Vista spoofing
7464| [41877] Microsoft Windows Server 2003 vbscript.dll memory corruption
7465| [3671] Microsoft Visio 2002/2003/2003 Sp3/2007/2007 Sp1 memory corruption
7466| [3670] Microsoft Visio 2002/2003/2003 Sp3/2007/2007 Sp1 Object memory corruption
7467| [41455] Microsoft Office 2000/2003/2004/Xp memory corruption
7468| [41454] Microsoft Excel 2000/2002/2003/2007 memory corruption
7469| [41453] Microsoft Excel 2000/2002/2003 memory corruption
7470| [41452] Microsoft Excel 2000/2002/2003/2007 memory corruption
7471| [41451] Microsoft Excel 2000/2002/2003 memory corruption
7472| [41450] Microsoft Excel 2000 memory corruption
7473| [41449] Microsoft Excel 2000/2002/2003 memory corruption
7474| [41448] Microsoft Office 2000/Xp Office Web Components memory corruption
7475| [3648] Microsoft Excel 2003 memory corruption
7476| [3647] Microsoft Outlook up to 2007 mailto URI memory corruption
7477| [41003] Microsoft Office 2000/2003/2004/Xp memory corruption
7478| [41002] Microsoft Office 2000/2003/Xp memory corruption
7479| [41001] Microsoft Works 2005/8.0 wkcvqd01.dll memory corruption
7480| [41000] Microsoft Works 2005/8.0 memory corruption
7481| [40998] Microsoft Publisher 2000/2002/2003 memory corruption
7482| [40994] Microsoft Works 2005/8.0 wkcvqd01.dll memory corruption
7483| [40987] Microsoft Windows 2000 denial of service
7484| [40736] Microsoft ActiveX 2.0 ActiveX Control privilege escalation
7485| [3552] Microsoft Excel 2000/2002/2003 File memory corruption
7486| [40242] Microsoft Publisher 2000/2002/2003/2007 Crash denial of service
7487| [40020] Microsoft Office 2007 ZIP Container unknown vulnerability
7488| [39769] Microsoft Windows 2000 cryptgenrandom weak encryption
7489| [39749] Microsoft Windows 2000 msjet40.dll memory corruption
7490| [39655] Microsoft Windows Server 2003 spoofing
7491| [39324] Microsoft Windows Mobile 2005 SMS unknown vulnerability
7492| [3373] Microsoft Word 2000/2002 memory corruption
7493| [38999] Microsoft Windows Server 2003 explorer.exe denial of service
7494| [38899] Microsoft ISA Server 2004 information disclosure
7495| [38728] Microsoft SQL Server 2005 Enterprise Manager sqldmo.dll memory corruption
7496| [38326] Microsoft Windows 2000 attemptwrite memory corruption
7497| [3241] Microsoft Excel 2000/2003/2004/XP SP3 rtWnDesk memory corruption
7498| [3223] Microsoft Windows Server 2003/XP URI privilege escalation
7499| [3212] Microsoft DirectX February 2006 RLE Compression Targa Files Heap-based memory corruption
7500| [37739] Microsoft Excel 2000/2002/2003/2004/2007 memory corruption
7501| [37738] Microsoft Office 2002/2003 memory corruption
7502| [3176] Microsoft Excel 2000/2002/2003/2007 File Attribute memory corruption
7503| [3175] Microsoft Excel 2000/2002/2003/2007 Active Worksheet memory corruption
7504| [3174] Microsoft Excel 2000/2002/2003/2007 Version Information memory corruption
7505| [3172] Microsoft Office Publisher 2007 Pointer memory corruption
7506| [37566] Microsoft Excel 2003 unknown vulnerability
7507| [37526] Microsoft Windows 2000/Server 2003 denial of service
7508| [37248] Microsoft Visio 2002 Packaging memory corruption
7509| [37251] Microsoft Windows 2000 memory corruption
7510| [3119] Microsoft Visio 2002 Object memory corruption
7511| [3118] Microsoft Visio 2002 Data memory corruption
7512| [37093] Microsoft Windows Server 2003 Error Message unknown vulnerability
7513| [37010] Microsoft Office 2000 ActiveX Control ouactrl.ocx memory corruption
7514| [36628] Microsoft Word 2000/2002/2003/2004 winword.exe memory corruption
7515| [36616] Microsoft Works 2004/2005/2006 memory corruption
7516| [36621] Microsoft Exchange Server 2000 Integer denial of service
7517| [36620] Microsoft Exchange Server 2000 Outlook Web Access cross site scripting
7518| [36619] Microsoft Exchange Server 2000/2003/2007 MIME Email memory corruption
7519| [36618] Microsoft Exchange Server 2000 NULL Pointer Dereference denial of service
7520| [36617] Microsoft Excel 2000/2002/2003/2004 memory corruption
7521| [36623] Microsoft BizTalk Server 2004 ActiveX Control capicom.dll memory corruption
7522| [3067] Microsoft Office 2000/2003/2004/2007/Xp Drawing Object memory corruption
7523| [3065] Microsoft Excel 2000/2002/2003/2007 Filter Stack-based memory corruption
7524| [3064] Microsoft Excel 2000/2002/2003/2004/2007 set Font memory corruption
7525| [3063] Microsoft Excel 2000/2002/2003/2007 BIFF Record Stack-based memory corruption
7526| [3012] Microsoft Windows 2000/Server 2003 DNS Service Stack-based memory corruption
7527| [36039] Microsoft Content Management Server 2001 memory corruption
7528| [36052] Microsoft Windows 2000 Heap-based memory corruption
7529| [36051] Microsoft Word 2007 file798-1.doc memory corruption
7530| [36050] Microsoft Word 2007 file789-1.doc memory corruption
7531| [36040] Microsoft Content Management Server 2001 cross site scripting
7532| [3004] Microsoft Windows up to 2003/XP URL Parser memory corruption
7533| [36041] Microsoft .NET Framework 2.0.50727.42 cross site scripting
7534| [36002] Microsoft Windows 2000/XP denial of service
7535| [2990] Microsoft Windows 2000/Vista/XP Animated Cursor Stack-based memory corruption
7536| [36515] Microsoft Windows 2000/Server 2003/XP memory corruption
7537| [35846] Microsoft Windows 2000/Server 2003 Default Configuration information disclosure
7538| [35373] Microsoft Excel 2003 denial of service
7539| [35372] Microsoft Office 2003 denial of service
7540| [35206] Microsoft Windows Server 2003/XP Crash denial of service
7541| [35161] Microsoft ISA Server 2004 unknown vulnerability
7542| [35236] Microsoft Publisher 2007 memory corruption
7543| [2939] Microsoft Word 2000 memory corruption
7544| [34994] Microsoft Windows 2000 OLE Dialog memory corruption
7545| [34993] Microsoft Office 2000/2003/Xp memory corruption
7546| [35001] Microsoft Office 2000/2003/2004/Xp memory corruption
7547| [35000] Microsoft Word 2000/2002/2003 memory corruption
7548| [2933] Microsoft Windows 2000 SP4/Server 2003 SP1/XP SP2 OLE Dialog Stack-based memory corruption
7549| [2894] Microsoft Office 2000/2003/2004/Xp Undefined String Format String
7550| [2884] Microsoft Word 2000/2002/2003 memory corruption
7551| [34321] Microsoft Office 2000/2003/2004/Xp Spreadsheet Heap-based memory corruption
7552| [34320] Microsoft Office 2000/2003/2004/Xp memory corruption
7553| [34319] Microsoft Office 2000/2003/2004/Xp memory corruption
7554| [34318] Microsoft Office 2000/2003/2004/Xp memory corruption
7555| [34322] Microsoft Office 2000/2003/Xp memory corruption
7556| [2811] Microsoft Windows 2000/Server 2003/XP VML Vector Markup Language Integer memory corruption
7557| [2810] Microsoft Outlook 2000/2002/2003 Office Saved Search OSS File memory corruption
7558| [2809] Microsoft Outlook 2000/2002/2003 Header denial of service
7559| [2808] Microsoft Outlook 2000/2002/2003 Meeting VEVENT memory corruption
7560| [2807] Microsoft Excel 2000/2002/2003 XLS File memory corruption
7561| [34126] Microsoft Office 2003 memory corruption
7562| [34122] Microsoft Office Web Components 2000 memory corruption
7563| [2789] Microsoft Windows 2000/XP RPC Request NetrWkstaUserEnum denial of service
7564| [2765] Microsoft Project Server 2003 pdsrequest.asp weak authentication
7565| [33851] Microsoft Word 2000/2002/2003 12122006-djtest.doc memory corruption
7566| [2739] Microsoft Windows 2000 Remote Installation Service Fehlende Authentifizierung
7567| [2738] Microsoft Windows 2000/Server 2003/XP SNMP memory corruption
7568| [2737] Microsoft Windows Server 2003/XP Manifest denial of service
7569| [33766] Microsoft Word 2000/2002/2003 memory corruption
7570| [2718] Microsoft Word 2000/2002/2003 DOC Document memory corruption
7571| [2717] Microsoft Windows 2000 Print Spooler Memory Consumption denial of service
7572| [2689] Microsoft Windows up to 2000 SP4 Active Directory denial of service
7573| [2688] Microsoft Windows 2000/Server 2003/XP Client Service for Netware denial of service
7574| [2687] Microsoft Windows 2000/Server 2003/XP Agent ActiveX ACF File Heap-based memory corruption
7575| [2686] Microsoft Windows 2000/Server 2003/XP Client Service for Netware memory corruption
7576| [2684] Microsoft Windows 2000/XP Workstation Service Stack-based memory corruption
7577| [2659] Microsoft Windows 2000/XP GDI Crash memory corruption
7578| [2655] Microsoft Windows 2000/Server 2003/XP XML Core Services memory corruption
7579| [33067] Microsoft Visual Studio .net 2005 ActiveX Control wmiscriptutils.dll memory corruption
7580| [2610] Microsoft PowerPoint 2003 PPT Document NULL Pointer Dereference denial of service
7581| [32693] Microsoft Word 2004 memory corruption
7582| [32686] Microsoft Office 2000/2001/2003/2004 Integer memory corruption
7583| [32690] Microsoft Office 2000/2003/2004/Xp memory corruption
7584| [32676] Microsoft Office 2000/2001/2003/2004 memory corruption
7585| [32675] Microsoft Office 2000/2003/2004/Xp memory corruption
7586| [32694] Microsoft Windows 2000 memory corruption
7587| [32689] Microsoft Excel 2000/2002/2003/2004/XP memory corruption
7588| [32688] Microsoft Excel 2000/2002/2003/2004/XP memory corruption
7589| [32687] Microsoft Word 2000/2002 memory corruption
7590| [32685] Microsoft Office 2000/2001/2003/2004 memory corruption
7591| [2601] Microsoft Windows Server 2003/XP IPv6 Stack denial of service
7592| [2600] Microsoft Windows Server 2003/XP IPv6 Stack TCP denial of service
7593| [2599] Microsoft Windows Server 2003/XP IPv6 Stack ICMP denial of service
7594| [2598] Microsoft Windows Server 2003/XP Object Packager privilege escalation
7595| [2597] Microsoft Office 2003/Xp Smart-Tag Parser memory corruption
7596| [2596] Microsoft Office 2000/2003/2004/Xp Value Read memory corruption
7597| [2595] Microsoft Office 2000/2001/2003/2004 Diagram Value memory corruption
7598| [2594] Microsoft Office 2000/2001/2003/2004 Document memory corruption
7599| [2593] Microsoft ASP.NET 2.0 cross site scripting
7600| [141652] Microsoft Windows up to Server 2019 Common Log File System Driver information disclosure
7601| [141639] Microsoft SharePoint Foundation 2013 SP1 cross site request forgery
7602| [141637] Microsoft Windows up to Server 2019 AppX Deployment Server privilege escalation
7603| [141636] Microsoft ASP.NET Core 2.1/2.2/3.0 Project Template privilege escalation
7604| [141635] Microsoft .NET Core 2.1/2.2 denial of service
7605| [141633] Microsoft Excel up to 2019 memory corruption
7606| [141631] Microsoft Windows up to Server 2019 SMB Client Driver information disclosure
7607| [141630] Microsoft Windows up to Server 2019 denial of service
7608| [141629] Microsoft Windows up to Server 2019 Update Delivery Optimization privilege escalation
7609| [141627] Microsoft Windows up to Server 2019 GDI information disclosure
7610| [141626] Microsoft Windows up to Server 2019 Win32k memory corruption
7611| [141621] Microsoft Windows up to Server 2019 Kernel information disclosure
7612| [141620] Microsoft Windows up to Server 2019 Active Directory Federation Services cross site scripting
7613| [141619] Microsoft Windows up to Server 2019 ALPC privilege escalation
7614| [141618] Microsoft Windows up to Server 2019 hdAudio.sys privilege escalation
7615| [141617] Microsoft Windows up to Server 2019 Store Installer privilege escalation
7616| [141616] Microsoft Windows up to Server 2019 ALPC privilege escalation
7617| [141615] Microsoft Windows up to Server 2019 Winlogon privilege escalation
7618| [141614] Microsoft Windows up to Server 2019 Compatibility Appraiser privilege escalation
7619| [141611] Microsoft Office up to 2019 Security Feature privilege escalation
7620| [141610] Microsoft Excel up to 2019 information disclosure
7621| [141609] Microsoft SharePoint Foundation 2013 SP1 cross site scripting
7622| [141608] Microsoft SharePoint Enterprise Server 2013 SP1/2016/2019 cross site request forgery
7623| [141607] Microsoft SharePoint Enterprise Server 2010 SP2/2013 SP1/2016/2019 privilege escalation
7624| [141606] Microsoft Windows up to Server 2019 Win32k memory corruption
7625| [141605] Microsoft Windows up to Server 2019 Hyper-V information disclosure
7626| [141604] Microsoft Windows up to Server 2019 AppX Deployment Server privilege escalation
7627| [141603] Microsoft Windows up to Server 2019 GDI information disclosure
7628| [141602] Microsoft Windows up to Server 2019 DirectWrite information disclosure
7629| [141601] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7630| [141600] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7631| [141599] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7632| [141598] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7633| [141597] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7634| [141596] Microsoft Windows up to Server 2019 DirectWrite information disclosure
7635| [141595] Microsoft Windows up to Server 2019 DirectWrite information disclosure
7636| [141594] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7637| [141593] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7638| [141592] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7639| [141591] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7640| [141590] Microsoft Windows up to Server 2019 Text Service Framework command injection
7641| [141589] Microsoft Exchange Server 2016 CU12/2016 CU13/2019 CU1/2019 CU2 denial of service
7642| [141583] Microsoft Lync Server 2013 Conference directory traversal
7643| [141581] Microsoft Windows up to Server 2016 Hyper-V denial of service
7644| [141580] Microsoft Windows up to Server 2019 Transaction Manager information disclosure
7645| [141579] Microsoft Windows up to Server 2016 DirectX information disclosure
7646| [141577] Microsoft Windows up to Server 2019 Common Log File System Driver privilege escalation
7647| [141575] Microsoft Windows up to Server 2019 lnk File privilege escalation
7648| [141564] Microsoft SharePoint Enterprise Server 2010 SP1/2013 SP1/2016/2019 Markup Application Package privilege escalation
7649| [141561] Microsoft Windows up to Server 2019 Remote Desktop privilege escalation
7650| [141560] Microsoft Windows up to Server 2019 Remote Desktop privilege escalation
7651| [139972] Microsoft Windows up to Server 2019 HTTP2 HTTP.sys denial of service
7652| [139971] Microsoft Windows up to Server 2019 HTTP2 HTTP.sys denial of service
7653| [139970] Microsoft Windows up to Server 2019 HTTP2 HTTP.sys denial of service
7654| [139969] Microsoft Windows up to Server 2019 HTTP2 HTTP.sys denial of service
7655| [139968] Microsoft Windows up to Server 2019 HTTP2 HTTP.sys denial of service
7656| [139965] Microsoft Windows up to Server 2019 Kernel information disclosure
7657| [139963] Microsoft Windows up to Server 2019 Remote Desktop Protocol information disclosure
7658| [139962] Microsoft Windows up to Server 2019 Remote Desktop Protocol denial of service
7659| [139960] Microsoft Windows up to Server 2019 DHCP Server denial of service
7660| [139958] Microsoft Windows up to Server 2019 DHCP Server denial of service
7661| [139957] Microsoft SharePoint Server 2013 SP1/2016/2019 cross site scripting
7662| [139956] Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019 Session Object information disclosure
7663| [139955] Microsoft Windows up to Server 2019 SyncController.dll privilege escalation
7664| [139949] Microsoft Windows up to Server 2019 XmlLite Runtime XmlLite.dll denial of service
7665| [139946] Microsoft Windows up to Server 2019 Core Shell COM Server Registrar COM Call privilege escalation
7666| [139942] Microsoft Windows up to Server 2019 rpcss.dll memory corruption
7667| [139941] Microsoft Windows up to Server 2019 DirectX memory corruption
7668| [139937] Microsoft Windows up to Server 2019 Azure Active Directory information disclosure
7669| [139936] Microsoft Windows up to Server 2019 SymCrypt information disclosure
7670| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
7671| [139934] Microsoft Windows 7 SP1/Server 2018 R2 SP1/Server 2018 SP2 Win32k memory corruption
7672| [139933] Microsoft Windows up to Server 2019 p2pimsvc privilege escalation
7673| [139932] Microsoft Windows up to Server 2019 Kernel memory corruption
7674| [139931] Microsoft Windows up to Server 2019 File Signature Security Feature CAB File privilege escalation
7675| [139930] Microsoft Windows up to Server 2019 ALPC privilege escalation
7676| [139928] Microsoft Windows up to Server 2019 Kernel memory corruption
7677| [139927] Microsoft Windows up to Server 2019 Graphics Component information disclosure
7678| [139926] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7679| [139925] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7680| [139924] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7681| [139922] Microsoft Windows up to Server 2019 Graphics Component information disclosure
7682| [139921] Microsoft Windows up to Server 2019 Graphics Component information disclosure
7683| [139920] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7684| [139919] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7685| [139918] Microsoft Windows up to Server 2019 Graphics Component information disclosure
7686| [139917] Microsoft Windows up to Server 2019 Graphics Component information disclosure
7687| [139916] Microsoft Windows up to Server 2019 XML Core Services MSXML Parser privilege escalation
7688| [139914] Microsoft Windows up to Server 2019 Hyper-V Network Switch denial of service
7689| [139913] Microsoft Windows up to Server 2019 Hyper-V Network Switch denial of service
7690| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
7691| [139911] Microsoft Windows up to Server 2019 denial of service
7692| [139910] Microsoft Windows up to Server 2019 Hyper-V Network Switch denial of service
7693| [139909] Microsoft Windows up to Server 2019 Hyper-V Network Switch denial of service
7694| [139908] Microsoft Windows up to Server 2019 Bluetooth weak encryption
7695| [139907] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
7696| [139906] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
7697| [139902] Microsoft Word up to 2019 memory corruption
7698| [139901] Microsoft Outlook up to 2019 memory corruption
7699| [139895] Microsoft Windows up to Server 2019 lnk File privilege escalation
7700| [139894] Microsoft Windows up to Server 2019 VBScript Engine memory corruption
7701| [139893] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
7702| [139892] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
7703| [139891] Microsoft Windows up to Server 2019 Font Library memory corruption
7704| [139890] Microsoft Windows up to Server 2019 Font Library memory corruption
7705| [139889] Microsoft Windows up to Server 2019 Font Library memory corruption
7706| [139888] Microsoft Windows up to Server 2019 Font Library memory corruption
7707| [139887] Microsoft Windows up to Server 2019 Font Library memory corruption
7708| [139886] Microsoft Windows up to Server 2019 Font Library memory corruption
7709| [139880] Microsoft Windows up to Server 2019 Hyper-V memory corruption
7710| [139879] Microsoft Windows up to Server 2019 DHCP Client memory corruption
7711| [139878] Microsoft Windows up to Server 2019 Hyper-V Network Switch memory corruption
7712| [139877] Microsoft Outlook up to 2019 memory corruption
7713| [139876] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
7714| [139875] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
7715| [137590] Microsoft ASP.NET Core 2.1/2.2 Open Redirect
7716| [137589] Microsoft Exchange Server 2013 CU23/2016 CU12/2016 CU13/2019 CU1/2019 CU2 cross site scripting
7717| [137588] Microsoft Exchange Server 2010 SP3/2013 CU23/2016 CU12/2016 CU13 Web Services privilege escalation
7718| [137587] Microsoft SharePoint Server 2013 SP1/2016/2019 cross site scripting
7719| [137586] Microsoft Windows up to Server 2019 AppX Deployment Service privilege escalation
7720| [137585] Microsoft Windows up to Server 2019 AppX Deployment Service privilege escalation
7721| [137584] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7722| [137583] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7723| [137581] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7724| [137580] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7725| [137579] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7726| [137578] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7727| [137577] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7728| [137576] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7729| [137575] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7730| [137574] Microsoft Windows up to Server 2019 DirectWrite memory corruption
7731| [137568] Microsoft Windows up to Server 2019 Remote Desktop Protocol information disclosure
7732| [137563] Microsoft Windows up to Server 2019 DirectWrite information disclosure
7733| [137562] Microsoft Windows up to Server 2019 Win32k information disclosure
7734| [137561] Microsoft Windows up to Server 2019 GDI information disclosure
7735| [137560] Microsoft Windows up to Server 2019 GDI information disclosure
7736| [137559] Microsoft Windows up to Server 2019 DirectWrite information disclosure
7737| [137555] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7738| [137554] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7739| [137553] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7740| [137549] Microsoft Windows up to Server 2016 DLL privilege escalation
7741| [137544] Microsoft Windows up to Server 2019 Kernel information disclosure
7742| [137543] Microsoft Windows up to Server 2019 Kernel information disclosure
7743| [137542] Microsoft SQL Server 2014 SP2/2016 SP1/2017 privilege escalation
7744| [137541] Microsoft Windows up to Server 2019 memory corruption
7745| [137540] Microsoft Windows up to Server 2019 Error Reporting privilege escalation
7746| [137539] Microsoft Windows up to Server 2016 DirectX memory corruption
7747| [137538] Microsoft Windows Server 1803/Server 1903/Server 2016/Server 2019 ADFS Security Feature privilege escalation
7748| [137537] Microsoft Windows up to Server 2019 Hyper-V denial of service
7749| [137535] Microsoft Windows up to Server 2019 Remote Desktop Service privilege escalation
7750| [137533] Microsoft Windows up to Server 2019 SymCrypt denial of service
7751| [137527] Microsoft Windows up to Server 2019 GDI+ memory corruption
7752| [137512] Microsoft Windows up to Server 2019 DHCP memory corruption
7753| [136414] Microsoft Azure DevOps Server 2019 cross site request forgery
7754| [136349] Microsoft Windows up to Server 2019 Event Viewer eventvwr.msc XML External Entity
7755| [136348] Microsoft Windows up to Server 2019 Task Scheduler privilege escalation
7756| [136347] Microsoft Windows up to Server 2019 AppXSVC privilege escalation
7757| [136345] Microsoft Windows up to Server 2019 Windows Shell privilege escalation
7758| [136344] Microsoft Windows up to Server 2019 GDI information disclosure
7759| [136340] Microsoft Windows up to Server 2019 GDI information disclosure
7760| [136337] Microsoft Windows up to Server 2019 Comctl32.dll memory corruption
7761| [136336] Microsoft Windows up to Server 2019 Kernel privilege escalation
7762| [136335] Microsoft Windows up to Server 2019 NTLM Downgrade weak authentication
7763| [136334] Microsoft Windows up to Server 2019 Kernel information disclosure
7764| [136333] Microsoft SharePoint Server 2010 SP2/2013 SP1/2016/2019 cross site scripting
7765| [136330] Microsoft SharePoint Server 2010 SP2/2013 SP1/2016/2019 cross site scripting
7766| [136329] Microsoft SharePoint Server 2016/2019 cross site scripting
7767| [136328] Microsoft SharePoint Server 2010 SP2/2013 SP1/2016/2019 cross site scripting
7768| [136327] Microsoft Lync Server 2010/2013 denial of service
7769| [136326] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7770| [136325] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7771| [136324] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7772| [136323] Microsoft Windows up to Server 2019 denial of service
7773| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
7774| [136320] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7775| [136319] Microsoft Windows up to Server 2019 Security Credentials information disclosure
7776| [136318] Microsoft Windows up to Server 2019 DirectX privilege escalation
7777| [136317] Microsoft Windows up to Server 2019 Win32k memory corruption
7778| [136314] Microsoft Windows up to Server 2019 Win32k memory corruption
7779| [136312] Microsoft Windows up to Server 2019 GDI information disclosure
7780| [136310] Microsoft Windows up to Server 2019 GDI information disclosure
7781| [136308] Microsoft Windows up to Server 2019 Audio Service privilege escalation
7782| [136306] Microsoft Windows up to Server 2019 Storage Service privilege escalation
7783| [136305] Microsoft Windows up to Server 2019 User Profile Service privilege escalation
7784| [136304] Microsoft Windows up to Server 2019 Common Log File System Driver privilege escalation
7785| [136303] Microsoft Windows up to Server 2019 Storage Service privilege escalation
7786| [136301] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7787| [136299] Microsoft Windows up to Server 2019 Local Security Authority Subsystem Service Reboot denial of service
7788| [136296] Microsoft Windows up to Server 2019 Common Log File System Driver memory corruption
7789| [136295] Microsoft Windows up to Server 2019 ALPC privilege escalation
7790| [136293] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7791| [136292] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7792| [136291] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7793| [136290] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7794| [136289] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7795| [136288] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7796| [136287] Microsoft Windows up to Server 2019 Hyper-V denial of service
7797| [136286] Microsoft Windows up to Server 2019 Hyper-V denial of service
7798| [136285] Microsoft Windows up to Server 2019 Hyper-V denial of service
7799| [136284] Microsoft Windows up to Server 2019 Kernel memory corruption
7800| [136276] Microsoft Windows up to Server 2019 Hyper-V memory corruption
7801| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
7802| [136274] Microsoft Windows up to Server 2019 ActiveX memory corruption
7803| [136273] Microsoft Windows up to Server 2019 Hyper-V memory corruption
7804| [134750] Microsoft ASP.NET Core 2.1/2.2 denial of service
7805| [134745] Microsoft SharePoint Foundation 2013 SP1 cross site scripting
7806| [134744] Microsoft Windows up to Server 2019 GDI information disclosure
7807| [134743] Microsoft SharePoint Server 2013 SP1/2016 cross site scripting
7808| [134742] Microsoft SharePoint Enterprise Server 2016/2019 cross site scripting
7809| [134741] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
7810| [134740] Microsoft SharePoint Enterprise Server 2013 SP1/2016 privilege escalation
7811| [134739] Microsoft SharePoint Foundation 2010 SP2/2013 SP2 cross site scripting
7812| [134738] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
7813| [134737] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
7814| [134736] Microsoft Office 2010 SP2 Access Connectivity Engine memory corruption
7815| [134735] Microsoft Office up to 2019 Access Connectivity Engine memory corruption
7816| [134734] Microsoft Office up to 2019 Access Connectivity Engine memory corruption
7817| [134733] Microsoft Windows up to Server 2019 Unified Write Filter privilege escalation
7818| [134731] Microsoft Windows up to Server 2019 Symlink privilege escalation
7819| [134729] Microsoft Windows up to Server 2019 Storage Service privilege escalation
7820| [134725] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7821| [134724] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7822| [134723] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7823| [134722] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7824| [134721] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7825| [134720] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7826| [134719] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7827| [134718] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7828| [134717] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7829| [134716] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7830| [134715] Microsoft Windows up to Server 2019 Win32k memory corruption
7831| [134714] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7832| [134713] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7833| [134712] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7834| [134710] Microsoft Windows up to Server 2019 GDI information disclosure
7835| [134709] Microsoft Windows up to Server 2019 Kernel privilege escalation
7836| [134706] Microsoft Windows up to Server 2019 Error Reporting privilege escalation
7837| [134701] Microsoft Windows up to Server 2019 Windows Defender Application Control privilege escalation
7838| [134700] Microsoft Windows up to Server 2019 Diagnostic Hub privilege escalation
7839| [134699] Microsoft Windows up to Server 2019 NDIS ndis.sys memory corruption
7840| [134698] Microsoft Windows up to Server 2019 OLE memory corruption
7841| [134684] Microsoft Windows up to Server 2019 DHCP Server memory corruption
7842| [134678] Microsoft Windows up to Server 2019 GDI+ memory corruption
7843| [133236] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7844| [133234] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7845| [133232] Microsoft Azure DevOps Server 2019 cross site scripting
7846| [133229] Microsoft Azure DevOps Server 2019 cross site scripting
7847| [133224] Microsoft Exchange Server 2013 CU22/2016 CU11/2016 CU12/2019/2019 CU1 Outlook Web Access privilege escalation
7848| [133223] Microsoft Azure DevOps Server 2019 Content Security Policy privilege escalation
7849| [133222] Microsoft Windows up to Server 2019 Remote Registry Service memory corruption
7850| [133221] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7851| [133220] Microsoft Windows up to Server 2019 GDI Memory information disclosure
7852| [133219] Microsoft Windows up to Server 2019 Win32k Memory information disclosure
7853| [133218] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7854| [133217] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7855| [133216] Microsoft Windows up to Server 2019 Kernel Memory information disclosure
7856| [133215] Microsoft Windows up to Server 2019 VBScript Engine memory corruption
7857| [133214] Microsoft Windows up to Server 2019 AppX Deployment Service privilege escalation
7858| [133213] Microsoft Windows up to Server 2019 Kernel Memory information disclosure
7859| [133212] Microsoft Windows up to Server 2019 Terminal Services Memory information disclosure
7860| [133211] Microsoft Windows up to Server 2019 Task Scheduler information disclosure
7861| [133209] Microsoft Windows up to Server 2019 LUAFV Driver luafv.sys privilege escalation
7862| [133206] Microsoft SharePoint Enterprise Server 2010 SP2/2013 SP1/2016/2019 cross site scripting
7863| [133205] Microsoft SharePoint Enterprise Server 2013 SP1/2016/2019 cross site scripting
7864| [133204] Microsoft Office/Excel up to 2019 memory corruption
7865| [133203] Microsoft Office up to 2019 Access Connectivity Engine memory corruption
7866| [133202] Microsoft Office up to 2019 Access Connectivity Engine memory corruption
7867| [133201] Microsoft Office up to 2019 Access Connectivity Engine memory corruption
7868| [133200] Microsoft Office up to 2019 Access Connectivity Engine memory corruption
7869| [133199] Microsoft Office 2010 SP2 Access Connectivity Engine memory corruption
7870| [133198] Microsoft Exchange Server up to 2019 CU1 Outlook Web Access cross site scripting
7871| [133197] Microsoft ASP.NET Core 2.2 Request denial of service
7872| [133196] Microsoft Windows up to Server 2019 Win32k information disclosure
7873| [133195] Microsoft Windows up to Server 2019 LUAFV Driver luafv.sys privilege escalation
7874| [133194] Microsoft Windows up to Server 2019 GDI Memory information disclosure
7875| [133193] Microsoft Windows up to Server 2019 LUAFV Driver luafv.sys privilege escalation
7876| [133192] Microsoft Windows up to Server 2019 OLE Automation privilege escalation
7877| [133189] Microsoft Windows up to Server 2019 CSRSS memory corruption
7878| [133188] Microsoft Windows up to Server 2019 LUAFV Driver luafv.sys privilege escalation
7879| [133187] Microsoft Windows up to Server 2019 LUAFV Driver luafv.sys privilege escalation
7880| [133186] Microsoft Windows up to Server 2019 TCP/IP Stack Fragmented IP Packet information disclosure
7881| [133185] Microsoft Windows up to Server 2019 Win32k memory corruption
7882| [133183] Microsoft Windows up to Server 2019 Win32k memory corruption
7883| [133182] Microsoft Windows up to Server 2019 Win32k memory corruption
7884| [133181] Microsoft Office/Excel/PowerPoint up to 2019 URL Document Code Execution
7885| [133180] Microsoft Windows up to Server 2019 MS XML Code Execution
7886| [133179] Microsoft Windows up to Server 2019 MS XML Code Execution
7887| [133177] Microsoft Windows up to Server 2019 Device Guard luafv.sys privilege escalation
7888| [133174] Microsoft Windows up to Server 2019 GDI+ privilege escalation
7889| [133173] Microsoft Windows up to Server 2019 IOleCvt Interface privilege escalation
7890| [133166] Microsoft Windows up to Server 2019 MS XML Code Execution
7891| [133165] Microsoft Windows up to Server 2019 MS XML Code Execution
7892| [133164] Microsoft Windows up to Server 2019 MS XML Code Execution
7893| [133163] Microsoft Windows up to Server 2019 MS XML Code Execution
7894| [133162] Microsoft Windows up to Server 2019 MS XML Code Execution
7895| [131687] Microsoft Team Foundation Server 2017 Update 3.1/2018 Update 3.2/2018 Updated 1.2 cross site scripting
7896| [131685] Microsoft Windows up to Server 2019 SMB information disclosure
7897| [131684] Microsoft Visual Studio 2017 Version 15.9 C++ Redistributable Installer privilege escalation
7898| [131681] Microsoft Windows up to Server 2019 Win32k memory corruption
7899| [131679] Microsoft Windows up to Server 2019 Kernel information disclosure
7900| [131675] Microsoft SharePoint 2013 SP1/2016 cross site scripting
7901| [131674] Microsoft Windows up to Server 2019 Win32k information disclosure
7902| [131673] Microsoft Windows up to Server 2019 Kernel information disclosure
7903| [131672] Microsoft Windows up to Server 2019 GDI information disclosure
7904| [131671] Microsoft Windows up to Server 2019 VBScript Engine memory corruption
7905| [131668] Microsoft Windows up to Server 2019 AppX Deployment Server privilege escalation
7906| [131667] Microsoft Windows up to Server 2019 Comctl32.dll memory corruption
7907| [131663] Microsoft Windows up to Server 2019 Print Spooler information disclosure
7908| [131658] Microsoft Windows up to Server 2019 information disclosure
7909| [131657] Microsoft Windows up to Server 2019 denial of service
7910| [131656] Microsoft Office 2010 SP2 Connectivity Engine memory corruption
7911| [131653] Microsoft Windows up to Server 2019 SMB information disclosure
7912| [131652] Microsoft Windows up to Server 2019 SMB information disclosure
7913| [131651] Microsoft Windows up to Server 2019 Kernel information disclosure
7914| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
7915| [131649] Microsoft Windows up to Server 2019 Kernel memory corruption
7916| [131648] Microsoft Windows up to Server 2019 Hyper-V denial of service
7917| [131644] Microsoft Windows up to Server 2019 Hyper-V denial of service
7918| [131638] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7919| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7920| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7921| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7922| [131629] Microsoft Windows up to Server 2019 Deployment Services TFTP Server memory corruption
7923| [131628] Microsoft Windows up to Server 2019 ActiveX memory corruption
7924| [131619] Microsoft Windows up to Server 2019 MS XML privilege escalation
7925| [131334] Microsoft Team Foundation Server 2018 Update 3.2 cross site scripting
7926| [131333] Microsoft Team Foundation Server 2018 Update 3.2 cross site scripting
7927| [131328] Microsoft Windows up to Server 2016 Kernel information disclosure
7928| [130832] Microsoft 2013 SP1 spoofing
7929| [130828] Microsoft Exchange Server 2010 SP3/2013 CU22/2016 CU12/2019 CU1 EWS privilege escalation
7930| [130826] Microsoft Office 2010 SP2 Connectivity Engine memory corruption
7931| [130825] Microsoft Office up to 2019 Connectivity Engine memory corruption
7932| [130824] Microsoft Office up to 2019 Connectivity Engine memory corruption
7933| [130823] Microsoft Office up to 2019 Connectivity Engine privilege escalation
7934| [130822] Microsoft Office up to 2019 Connectivity Engine privilege escalation
7935| [130821] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
7936| [130820] Microsoft Windows up to Server 2012 R2 GDI information disclosure
7937| [130818] Microsoft Windows up to Server 2019 GDI information disclosure
7938| [130817] Microsoft Windows up to Server 2019 Storage Service privilege escalation
7939| [130814] Microsoft Windows up to Server 2019 privilege escalation
7940| [130809] Microsoft Windows up to Server 2019 Defender Firewall Security privilege escalation
7941| [130808] Microsoft Windows up to Server 2019 information disclosure
7942| [130807] Microsoft Windows up to Server 2019 Hyper-V information disclosure
7943| [130806] Microsoft Windows up to Server 2019 SMB privilege escalation
7944| [130805] Microsoft Windows up to Server 2019 Device Guard privilege escalation
7945| [130804] Microsoft Windows up to Server 2019 Device Guard privilege escalation
7946| [130803] Microsoft Windows up to Server 2019 SMB privilege escalation
7947| [130802] Microsoft Windows up to Server 2019 Win32k information disclosure
7948| [130801] Microsoft Windows up to Server 2019 Device Guard privilege escalation
7949| [130800] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7950| [130799] Microsoft Windows up to Server 2016 Win32k memory corruption
7951| [130798] Microsoft Windows up to Server 2019 GDI information disclosure
7952| [130797] Microsoft Windows up to Server 2019 GDI information disclosure
7953| [130796] Microsoft Windows up to Server 2019 GDI information disclosure
7954| [130793] Microsoft Windows up to Server 2019 GDI information disclosure
7955| [130792] Microsoft Windows up to Server 2019 HID information disclosure
7956| [130791] Microsoft Windows up to Server 2019 HID information disclosure
7957| [130790] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7958| [130789] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7959| [130788] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7960| [130787] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7961| [130786] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
7962| [130784] Microsoft Windows up to Server 2019 GDI+ memory corruption
7963| [130782] Microsoft Windows up to Server 2019 DHCP Server memory corruption
7964| [130781] Microsoft Windows up to Server 2019 GDI+ memory corruption
7965| [129847] Microsoft Team Foundation Server 2017 Update 3.1/2018 Update 1.2/2018 Update 3.2 information disclosure
7966| [129846] Microsoft Team Foundation Server 2018 Update 3.2 cross site scripting
7967| [129845] Microsoft Skype for Business 2015 CU 8 Request cross site scripting
7968| [128765] Microsoft Visual Studio 2017 Version 15.9 C++ Construct privilege escalation
7969| [128764] Microsoft Exchange Server 2010 SP3/2013 CU21/2016 CU10/2016 CU11/2019 PowerShell API information disclosure
7970| [128761] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7971| [128760] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7972| [128759] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7973| [128758] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7974| [128757] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7975| [128756] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7976| [128755] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7977| [128754] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7978| [128753] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7979| [128752] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
7980| [128751] Microsoft Windows up to Server 2019 Data Sharing Service privilege escalation
7981| [128750] Microsoft Windows up to Server 2019 Runtime privilege escalation
7982| [128749] Microsoft Windows up to Server 2019 Kernel information disclosure
7983| [128747] Microsoft ASP.NET Core 2.1 Web Request denial of service
7984| [128746] Microsoft SharePoint Enterprise Server 2013 SP1/2016/2019 cross site scripting
7985| [128745] Microsoft Office up to 2019 Word Macro information disclosure
7986| [128742] Microsoft SharePoint Enterprise Server 2013 SP1/2016/2019 cross site scripting
7987| [128741] Microsoft SharePoint Enterprise Server 2016 cross site scripting
7988| [128740] Microsoft SharePoint Enterprise Server 2013 SP1 cross site scripting
7989| [128739] Microsoft Windows up to Server 2019 Kernel information disclosure
7990| [128738] Microsoft Windows up to Server 2019 Subsystem for Linux information disclosure
7991| [128737] Microsoft Windows up to Server 2019 COM Desktop Broker privilege escalation
7992| [128736] Microsoft Windows up to Server 2019 Kernel information disclosure
7993| [128735] Microsoft ASP.NET Core 2.1/2.2 Web Request denial of service
7994| [128733] Microsoft Windows up to Server 2019 Authentication Request privilege escalation
7995| [128729] Microsoft Visual Studio 2010 SP1/2012 Update 5 vscontent File information disclosure
7996| [128728] Microsoft Windows up to Server 2019 Kernel information disclosure
7997| [128727] Microsoft Windows up to Server 2019 Data Sharing Service privilege escalation
7998| [128726] Microsoft Windows up to Server 2019 Data Sharing Service privilege escalation
7999| [128725] Microsoft Windows up to Server 2019 Data Sharing Service privilege escalation
8000| [128718] Microsoft Windows up to Server 2019 Hyper-V memory corruption
8001| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
8002| [127925] Microsoft SharePoint Enterprise Server 2016 Web Request cross site scripting
8003| [127882] Microsoft Dynamics NAV 2016/2017 Web Request cross site scripting
8004| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
8005| [127880] Microsoft Windows up to Server 2019 Win32k Object memory corruption
8006| [127828] Microsoft Windows up to Server 2019 Win32k memory corruption
8007| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
8008| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
8009| [127825] Microsoft SharePoint Enterprise Server 2010 SP2/2013 SP1/2016 privilege escalation
8010| [127824] Microsoft Excel up to 2019 Out-of-Bounds memory corruption
8011| [127823] Microsoft Windows up to Server 2012 R2 Kernel information disclosure
8012| [127821] Microsoft Windows up to Server 2019 Connected User Experiences and Telemetry Service denial of service
8013| [127820] Microsoft Windows up to Server 2019 Kernel memory corruption
8014| [127819] Microsoft Exchange Server 2016 CU10/2016 CU11 Profile Data privilege escalation
8015| [127817] Microsoft Excel up to 2019 information disclosure
8016| [127816] Microsoft Windows up to Server 2019 GDI information disclosure
8017| [127815] Microsoft Windows up to Server 2019 GDI information disclosure
8018| [127814] Microsoft SharePoint Enterprise Server 2010 SP2/2013 SP1/2016 Search cross site request forgery
8019| [127812] Microsoft Windows up to Server 2019 Remote Procedure Call information disclosure
8020| [127806] Microsoft Outlook up to 2019 memory corruption
8021| [127805] Microsoft Excel up to 2019 memory corruption
8022| [127804] Microsoft Excel up to 2019 memory corruption
8023| [127803] Microsoft Windows up to Server 2019 Text-To-Speech memory corruption
8024| [127801] Microsoft Windows up to Server 2019 DNS Server privilege escalation
8025| [126938] Microsoft Team Foundation Server 2018 Update 1.1/2018 Update 3 Code Execution
8026| [126755] Microsoft .NET Core 2.1 privilege escalation
8027| [126754] Microsoft Skype for Business/Lync Server 2013 SP1/2016 Emoji denial of service
8028| [126750] Microsoft Windows up to Server 2019 ALPC privilege escalation
8029| [126749] Microsoft Exchange Server 2010/2013/2016/2019 privilege escalation
8030| [126747] Microsoft SharePoint Enterprise Server 2013 SP1 Folder information disclosure
8031| [126746] Microsoft Outlook 2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
8032| [126745] Microsoft Project 2010 SP2/2013 SP1/2016 memory corruption
8033| [126744] Microsoft Office up to 2019 Word memory corruption
8034| [126743] Microsoft SharePoint Enterprise Server 2013 SP1/2016/2019 cross site scripting
8035| [126742] Microsoft SharePoint Enterprise Server 2013 SP1/2016/2019 cross site scripting
8036| [126739] Microsoft Windows up to Server 2012 R2 Win32k information disclosure
8037| [126737] Microsoft Windows up to Server 2012 R2 DirectX information disclosure
8038| [126736] Microsoft Windows up to Server 2019 Win32k memory corruption
8039| [126735] Microsoft Windows up to Server 2019 DirectX privilege escalation
8040| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
8041| [126730] Microsoft Windows up to Server 2019 Active Directory Federation Services cross site scripting
8042| [126728] Microsoft Office/SharePoint 2010 SP2 Word memory corruption
8043| [126727] Microsoft Outlook 2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
8044| [126726] Microsoft Outlook 2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
8045| [126725] Microsoft Windows up to Server 2019 DirectX memory corruption
8046| [126722] Microsoft Windows up to Server 2019 PowerShell privilege escalation
8047| [126718] Microsoft Windows up to Server 2016 Search memory corruption
8048| [126717] Microsoft Outlook 2010 SP2/2013 RT SP1/2013 SP1/2016/2019 memory corruption
8049| [126716] Microsoft Office up to 2019 Excel memory corruption
8050| [126714] Microsoft Windows up to Server 2019 PowerShell unknown vulnerability
8051| [126713] Microsoft Windows up to Server 2019 VBScript Engine memory corruption
8052| [126712] Microsoft Windows up to Server 2016 Graphics Component memory corruption
8053| [126711] Microsoft Windows up to Server 2019 Deployment Services TFTP Server memory corruption
8054| [125123] Microsoft Windows up to Server 2019 Codecs Library information disclosure
8055| [125122] Microsoft Windows up to Server 2016 TCP/IP information disclosure
8056| [125121] Microsoft Windows up to Server 2019 DirectX memory corruption
8057| [125120] Microsoft Windows up to Server 2019 Windows Media Player information disclosure
8058| [125119] Microsoft Windows up to Server 2019 Windows Media Player information disclosure
8059| [125116] Microsoft Exchange Server 2013 CU21/2016 CU10 privilege escalation
8060| [125115] Microsoft Windows up to Server 2019 Theme API privilege escalation
8061| [125114] Microsoft Windows up to Server 2019 Windows Shell privilege escalation
8062| [125113] Microsoft Windows up to Server 2019 Kernel memory corruption
8063| [125111] Microsoft Windows up to Server 2019 Device Guard Code Integrity Policy privilege escalation
8064| [125110] Microsoft Windows up to Server 2019 DNS Global Blocklist privilege escalation
8065| [125109] Microsoft Windows up to Server 2019 NTFS privilege escalation
8066| [125108] Microsoft Windows up to Server 2019 Filter Manager memory corruption
8067| [125107] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8068| [125106] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8069| [125105] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8070| [125104] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8071| [125102] Microsoft Office/Word 2010 SP2/2013 RT SP1/2013 SP1/2016/2019 Protected View memory corruption
8072| [125100] Microsoft Office/PowerPoint 2010 SP2/2013 RT SP1/2013 SP1/2016/2019 Protected View memory corruption
8073| [125099] Microsoft Office/Excel up to 2019 Protected View memory corruption
8074| [125098] Microsoft Windows up to Server 2019 JET Database Engine privilege escalation
8075| [125097] Microsoft Windows up to Server 2019 DirectX Graphics memory corruption
8076| [125096] Microsoft Windows up to Server 2019 Win32k memory corruption
8077| [125095] Microsoft Exchange Server 2013 CU21/2016 CU10 Outlook Web Access cross site scripting
8078| [125093] Microsoft Windows up to Server 2019 Hyper-V memory corruption
8079| [125092] Microsoft Windows up to Server 2019 Hyper-V memory corruption
8080| [125091] Microsoft Windows up to Server 2019 MS XML privilege escalation
8081| [124371] Microsoft Exchange Server up to 2010 SP3 Outlook Web Access /owa/auth/logon.aspx Parameter Server-Side Request Forgery
8082| [124217] Microsoft Windows Server 2012/Server 2016 Active Directory Federation Services /adfs/ls Server-Side Request Forgery
8083| [123995] Microsoft Lync 2011 on Mac Security Feature Messages Download privilege escalation
8084| [123881] Microsoft Windows up to Server 2016 Sandbox privilege escalation
8085| [123874] Microsoft Windows up to Server 2016 Kernel information disclosure
8086| [123872] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 SMB information disclosure
8087| [123868] Microsoft Windows up to Server 2016 Hyper-V denial of service
8088| [123864] Microsoft Windows up to Server 2016 Hyper-V information disclosure
8089| [123862] Microsoft SharePoint Enterprise Server 2010 SP2/2013 RT SP1/2013 SP1/2016 cross site scripting
8090| [123861] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R information disclosure
8091| [123860] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8092| [123859] Microsoft SharePoint Enterprise Server 2010 SP2/2013 SP1/2016 cross site scripting
8093| [123851] Microsoft Windows up to Server 2016 ALPC privilege escalation
8094| [123849] Microsoft Windows up to Server 2016 SMB denial of service
8095| [123846] Microsoft Office 2016 on Win/Mac memory corruption
8096| [123844] Microsoft Word 2013 RT SP1/2013 SP1/2016 PDF File memory corruption
8097| [123843] Microsoft Windows up to Server 2016 JET Database Engine memory corruption
8098| [123842] Microsoft Windows up to Server 2016 JET Database Engine memory corruption
8099| [123830] Microsoft Windows up to Server 2016 Hyper-V memory corruption
8100| [123828] Microsoft Windows up to Server 2016 Win32k Graphics privilege escalation
8101| [123827] Microsoft Windows up to Server 2016 Image memory corruption
8102| [123825] Microsoft Windows up to Server 2016 MSXML Parser privilege escalation
8103| [123823] Microsoft Windows up to Server 2016 Hyper-V privilege escalation
8104| [122887] Microsoft Office 2016 on Mac AutoUpdate memory corruption
8105| [122886] Microsoft Windows up to Server 2016 DirectX Graphics memory corruption
8106| [122885] Microsoft Windows up to Server 2016 DirectX Graphics memory corruption
8107| [122884] Microsoft Windows up to Server 2016 Win32k memory corruption
8108| [122883] Microsoft Windows up to Server 2016 DirectX Graphics memory corruption
8109| [122875] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R information disclosure
8110| [122874] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8111| [122873] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R information disclosure
8112| [122871] Microsoft PowerPoint 2010 SP2 memory corruption
8113| [122870] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8114| [122861] Microsoft Windows up to Server 2016 Microsoft COM for Windows privilege escalation
8115| [122850] Microsoft Visual Studio 2015 Update 3/2017/2017 Version 15.8 Diagnostic Hub privilege escalation
8116| [122849] Microsoft Windows up to Server 2016 Diagnostic Hub privilege escalation
8117| [122848] Microsoft Windows Security Feature 2FA weak authentication
8118| [122834] Microsoft Windows up to Server 2016 LNK memory corruption
8119| [122825] Microsoft Windows up to Server 2016 Graphics memory corruption
8120| [122823] Microsoft SQL Server 2016 SP1/2016 SP2/2017 memory corruption
8121| [121208] Microsoft Outlook 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R Attachment privilege escalation
8122| [121118] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8123| [121116] Microsoft Windows up to Server 2016 Sandbox privilege escalation
8124| [121114] Microsoft Access 2013 SP1/2016/2016 C2R memory corruption
8125| [121111] Microsoft Windows up to Server 2016 Kernel memory corruption
8126| [121110] Microsoft Windows up to Server 2016 Wordpad privilege escalation
8127| [121107] Microsoft Windows up to Server 2016 DNSAPI DNSAPI.dll denial of service
8128| [121106] Microsoft SharePoint Enterprise Server 2013 SP1/2016 privilege escalation
8129| [121105] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8130| [121098] Microsoft Office 2016/2016 C2R memory corruption
8131| [121092] Microsoft Windows up to Server 2016 FTP Server denial of service
8132| [121090] Microsoft Visual Studio up to 2017 Version 15.8 Preview privilege escalation
8133| [119479] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
8134| [119477] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016 information disclosure
8135| [119476] Microsoft Publisher 2010 SP2 OLE Object PUB File privilege escalation
8136| [119475] Microsoft Outlook 2010 SP2/2013 RT SP1/2013 SP1/2016 Attachment privilege escalation
8137| [119474] Microsoft Windows up to Server 2016 GDI information disclosure
8138| [119470] Microsoft Windows up to Server 2016 HTTP HTTP.sys denial of service
8139| [119468] Microsoft Windows up to Server 2016 Device Guard Code Integrity Policy privilege escalation
8140| [119467] Microsoft Windows up to Server 2016 Hypervisor privilege escalation
8141| [119465] Microsoft Windows up to Server 2016 Device Guard Code Integrity Policy privilege escalation
8142| [119464] Microsoft Windows up to Server 2016 Device Guard Code Integrity Policy privilege escalation
8143| [119463] Microsoft Windows up to Server 2016 Device Guard Code Integrity Policy privilege escalation
8144| [119461] Microsoft Windows up to Server 2016 Device Guard Code Integrity Policy privilege escalation
8145| [119460] Microsoft Windows up to Server 2016 Device Guard Code Integrity Policy privilege escalation
8146| [119459] Microsoft Windows up to Server 2016 memory corruption
8147| [119457] Microsoft Windows up to Server 2016 Desktop Bridge privilege escalation
8148| [119456] Microsoft Windows up to Server 2016 Kernel information disclosure
8149| [119455] Microsoft Windows up to Server 2016 denial of service
8150| [119454] Microsoft Windows up to Server 2016 Device Guard Code Integrity Policy privilege escalation
8151| [119452] Microsoft Windows up to Server 2016 HIDParser memory corruption
8152| [119448] Microsoft Windows up to Server 2016 Code Integrity Module denial of service
8153| [119447] Microsoft Windows up to Server 2016 NTFS privilege escalation
8154| [119441] Microsoft Windows up to Server 2016 Media Foundation memory corruption
8155| [119437] Microsoft Windows up to Server 2016 HTTP Protocol Stack Http.sys memory corruption
8156| [119436] Microsoft Windows up to Server 2016 memory corruption
8157| [119431] Microsoft Windows up to Server 2016 DNSAPI DNSAPI.dll DNS Response privilege escalation
8158| [118120] Microsoft Office 2016 on Mac XML Data Code Execution
8159| [117561] Microsoft SharePoint Enterprise Server 2010 SP2/2013 SP1 Web Request cross site scripting
8160| [117560] Microsoft Exchange Server up to 2016 CU9 Code Execution memory corruption
8161| [117559] Microsoft Exchange Server 2016 CU8/2016 CU9 Outlook Web Access Web Request cross site scripting
8162| [117558] Microsoft Windows up to Server 2016 Code Execution memory corruption
8163| [117507] Microsoft Infopath 2013 SP1 memory corruption
8164| [117505] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R information disclosure
8165| [117504] Microsoft Office 2010 SP2 information disclosure
8166| [117503] Microsoft Exchange Server 2013 CU19/2013 CU20/2016 CU8/2016 CU9 Outlook Web Access cross site scripting
8167| [117502] Microsoft SharePoint Enterprise Server 2010 SP2/2013 SP1/2016 cross site scripting
8168| [117501] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8169| [117500] Microsoft Exchange Server 2016 CU8/2016 CU9 Outlook Web Access cross site scripting
8170| [117499] Microsoft Exchange Server up to 2016 CU9 information disclosure
8171| [117498] Microsoft Office 2016 C2R Security Feature privilege escalation
8172| [117497] Microsoft SharePoint Enterprise Server 2010/2013 SP1/2016 cross site scripting
8173| [117480] Microsoft Windows up to Server 2016 COM Serialized privilege escalation
8174| [117473] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8175| [117472] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8176| [117471] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8177| [117470] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8178| [117469] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8179| [117468] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8180| [117444] Microsoft Windows up to Server 2016 Hyper-V vSMB memory corruption
8181| [117443] Microsoft Windows up to Server 2016 Hyper-V memory corruption
8182| [117442] Microsoft Windows up to Server 2016 VBScript Engine memory corruption
8183| [116132] Microsoft Office 2016 Memory information disclosure
8184| [116051] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8185| [116050] Microsoft SharePoint Enterprise Server 2010 SP2/2013/2016 cross site scripting
8186| [116049] Microsoft SharePoint Enterprise Server 2013/2016 privilege escalation
8187| [116048] Microsoft Windows up to Server 2016 DirectX Graphics Kernel Subsystem memory corruption
8188| [116047] Microsoft Windows up to Server 2016 OpenType Font Driver atmfd.dll memory corruption
8189| [116046] Microsoft SharePoint Enterprise Server 2013/2016 Share cross site scripting
8190| [116045] Microsoft Windows up to Server 2016 JET Database Engine memory corruption
8191| [116039] Microsoft Windows up to Server 2016 Remote Desktop Protocol denial of service
8192| [116031] Microsoft Windows up to Server 2016 Kernel ASLR information disclosure
8193| [116030] Microsoft Windows up to Server 2016 SNMP Service denial of service
8194| [116026] Microsoft Windows up to Server 2016 Kernel information disclosure
8195| [116024] Microsoft Windows up to Server 2016 HTTP.sys denial of service
8196| [116023] Microsoft Office up to 2016 C2R information disclosure
8197| [116022] Microsoft Excel 2010 SP2 memory corruption
8198| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
8199| [116019] Microsoft Windows up to Server 2016 Kernel information disclosure
8200| [116018] Microsoft Office 2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8201| [116017] Microsoft Excel up to 2016 C2R memory corruption
8202| [116016] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 Graphics memory corruption
8203| [116014] Microsoft Office 2013 RT SP1/2013 SP1/2016/2016 C2R memory corruption
8204| [116013] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1 memory corruption
8205| [116008] Microsoft Windows up to Server 2016 Graphics memory corruption
8206| [116007] Microsoft Windows up to Server 2016 Graphics memory corruption
8207| [116006] Microsoft Windows up to Server 2016 Graphics memory corruption
8208| [116005] Microsoft Windows up to Server 2016 Graphics memory corruption
8209| [116004] Microsoft Windows up to Server 2016 Graphics memory corruption
8210| [116003] Microsoft Windows up to Server 2016 VBScript Engine memory corruption
8211| [115994] Microsoft Windows up to Server 2016 Malware Protection Engine memory corruption
8212| [115804] Microsoft Windows up to Server 2016 Malware Protection Engine privilege escalation
8213| [114579] Microsoft Exchange Server up to 2017 CU8 Outlook Web Access information disclosure
8214| [114574] Microsoft SharePoint Enterprise Server 2016 privilege escalation
8215| [114573] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8216| [114571] Microsoft Exchange Server 2016 CU7/2016 CU8 Outlook Web Access information disclosure
8217| [114570] Microsoft Exchange Server 2010 SP3/2013 CU18/2013 CU19/2016 CU7/2016 CU8 Outlook Web Access Fake privilege escalation
8218| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
8219| [114564] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8220| [114562] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8221| [114560] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8222| [114559] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8223| [114558] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8224| [114557] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8225| [114556] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8226| [114555] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8227| [114554] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8228| [114553] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8229| [114552] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8230| [114551] Microsoft Excel up to 2016 C2R Security Feature privilege escalation
8231| [114549] Microsoft Access 2010 SP2/2013 SP1/2016 memory corruption
8232| [114548] Microsoft Windows up to Server 2016 CNG Security Feature cng.sys privilege escalation
8233| [114547] Microsoft Windows up to Server 2016 Kernel information disclosure
8234| [114546] Microsoft Windows up to Server 2016 Kernel information disclosure
8235| [114545] Microsoft Windows up to Server 2016 Kernel information disclosure
8236| [114544] Microsoft Windows up to Server 2016 Kernel information disclosure
8237| [114543] Microsoft Windows up to Server 2016 Kernel information disclosure
8238| [114542] Microsoft Windows up to Server 2016 Kernel information disclosure
8239| [114541] Microsoft Windows up to Server 2016 Kernel information disclosure
8240| [114540] Microsoft Windows up to Server 2016 Kernel information disclosure
8241| [114536] Microsoft Windows up to Server 2016 CredSSP privilege escalation
8242| [114535] Microsoft Windows up to Server 2016 Hyper-V denial of service
8243| [114531] Microsoft Windows up to Server 2016 Windows Installer privilege escalation
8244| [114530] Microsoft Windows up to Server 2016 GDI privilege escalation
8245| [114529] Microsoft Windows up to Server 2016 GDI privilege escalation
8246| [114527] Microsoft Windows up to Server 2016 Kernel information disclosure
8247| [114526] Microsoft Windows up to Server 2016 Kernel information disclosure
8248| [114525] Microsoft Windows up to Server 2016 Kernel information disclosure
8249| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
8250| [114521] Microsoft Windows up to Server 2016 Video Control privilege escalation
8251| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
8252| [114518] Microsoft Windows up to Server 2016 Remote Assistance information disclosure
8253| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
8254| [114516] Microsoft Windows up to Server 2016 Windows Shell privilege escalation
8255| [113835] Microsoft Identity Manager 2016 SP1 cross site scripting
8256| [113264] Microsoft Windows 8.1/RT 8.1/Server 2012 R2 SMBv2/SMBv3 denial of service
8257| [113260] Microsoft Windows up to Server 2016 Kernel memory corruption
8258| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
8259| [113254] Microsoft Windows up to Server 2016 Kernel information disclosure
8260| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
8261| [113252] Microsoft Windows up to Server 2016 Kernel memory corruption
8262| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
8263| [113249] Microsoft Windows up to Server 2016 Kernel memory corruption
8264| [113248] Microsoft Windows up to Server 2016 Kernel information disclosure
8265| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
8266| [113242] Microsoft Windows up to Server 2016 Common Log File System Driver memory corruption
8267| [113241] Microsoft Windows up to Server 2016 Common Log File System Driver memory corruption
8268| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
8269| [113237] Microsoft SharePoint Enterprise Server 2016 cross site scripting
8270| [113236] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8271| [113233] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 Uninitialized Memory information disclosure
8272| [113232] Microsoft Excel 2016 memory corruption
8273| [113230] Microsoft Windows up to Server 2016 Scripting Engine information disclosure
8274| [113229] Microsoft Windows up to Server 2016 StructuredQuery memory corruption
8275| [111580] Microsoft Office 2016 on Mac Email Attachment spoofing
8276| [111571] Microsoft SharePoint Enterprise Server 2013/2016 Access cross site scripting
8277| [111567] Microsoft Office 2010/2013/2016 memory corruption
8278| [111564] Microsoft Word 2016 memory corruption
8279| [111562] Microsoft SharePoint Server 2010/2013/2016 Web Request cross site scripting
8280| [111561] Microsoft SharePoint Server 2010/2013/2016 Web Request cross site scripting
8281| [128730] Microsoft Windows up to Server 2019 JET Database Engine memory corruption
8282| [111358] Microsoft Windows up to Server 2016 IPsec denial of service
8283| [110553] Microsoft Office 2016 C2R information disclosure
8284| [110552] Microsoft SharePoint Enterprise Server 2016 Web Request privilege escalation
8285| [110551] Microsoft Excel 2016 C2R memory corruption
8286| [110550] Microsoft PowerPoint 2013 RT SP1/2013 SP1/2016 information disclosure
8287| [110549] Microsoft Exchange Server 2016 CU6/2016 CU7 Outlook Web Access privilege escalation
8288| [110547] Microsoft Windows up to Server 2016 its:// Protocol information disclosure
8289| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
8290| [110522] Microsoft Windows up to Server 2016 RRAS privilege escalation
8291| [110350] Microsoft Windows up to Server 2016 Malware Protection Engine memory corruption
8292| [110318] Microsoft Windows up to Server 2016 Malware Protection Engine memory corruption
8293| [109391] Microsoft SharePoint Enterprise Server 2016 Project Server cross site request forgery
8294| [109389] Microsoft Excel 2016 Click-to-Run memory corruption
8295| [109360] Microsoft Windows up to Server 2016 Windows Search denial of service
8296| [107759] Microsoft Windows up to Server 2016 SMB denial of service
8297| [107757] Microsoft Windows up to Server 2016 JET Database Engine memory corruption
8298| [107756] Microsoft Windows up to Server 2016 JET Database Engine memory corruption
8299| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
8300| [107744] Microsoft Windows up to Server 2016 DNSAPI DNSAPI.dll DNS Response privilege escalation
8301| [107741] Microsoft Outlook 2016 Secure Connection Mail information disclosure
8302| [107740] Microsoft Windows up to Server 2016 Graphics memory corruption
8303| [107739] Microsoft Windows up to Server 2016 Graphics memory corruption
8304| [107738] Microsoft Windows up to Server 2016 Search information disclosure
8305| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
8306| [107732] Microsoft Outlook 2010 SP2/2013 RT SP1/2013 SP1/2016 Bypass privilege escalation
8307| [107730] Microsoft Windows up to Server 2016 Search Remote memory corruption
8308| [107729] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8309| [107728] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8310| [107727] Microsoft SharePoint Enterprise Server 2013 SP1/2016 cross site scripting
8311| [107724] Microsoft Windows up to Server 2016 Text Services Framework memory corruption
8312| [107723] Microsoft Windows up to Server 2016 SMB information disclosure
8313| [107698] Microsoft Office 2016 memory corruption
8314| [107593] InFocus Mondopad 2.2.08 Excel Spreadsheet Microsoft Office Document Credentials information disclosure
8315| [106544] Microsoft Exchange Server 2016 Outlook Web Access cross site scripting
8316| [106531] Microsoft SharePoint Foundation 2013 SP1 cross site scripting
8317| [106529] Microsoft PowerPoint 2016 memory corruption
8318| [106523] Microsoft Windows up to Server 2016 PDF Library memory corruption
8319| [106518] Microsoft Edge on Win10/Server 2016 memory corruption
8320| [106516] Microsoft Windows up to Server 2016 PDF Library memory corruption
8321| [106498] Microsoft Windows up to Server 2016 Shell privilege escalation
8322| [106496] Microsoft Windows up to Server 2016 Uniscribe information disclosure
8323| [106495] Microsoft Windows up to Server 2012 R2 Uniscribe memory corruption
8324| [106492] Microsoft Windows Server 2012/Server 2012 R2/Server 2016 DHCP Service memory corruption
8325| [106489] Microsoft Windows up to Server 2016 Graphics Win32k win32k!fsc_CalcGrayRow memory corruption
8326| [106474] Microsoft Office 2016 memory corruption
8327| [106473] Microsoft SharePoint Server 2013 SP1 cross site scripting
8328| [106472] Microsoft Windows up to Server 2016 Bluetooth Driver Object BlueBorne spoofing
8329| [106470] Microsoft Excel 2011 on Mac memory corruption
8330| [106455] Microsoft Exchange Server 2013/2016 information disclosure
8331| [106454] Microsoft Windows up to Server 2016 Windows NetBT Session Services race condition memory corruption
8332| [105048] Microsoft Edge on Win10/Server 2016 Scripting Engine memory corruption
8333| [105047] Microsoft Edge on Win10/Server 2016 Scripting Engine EntryCall memory corruption
8334| [105046] Microsoft Edge on Win10/Server 2016 Javascript Engine memory corruption
8335| [105040] Microsoft Edge on Win10/Server 2016 Scripting Engine memory corruption
8336| [105038] Microsoft Edge on Win10/Server 2016 Javascript Engine Out-of-Bounds memory corruption
8337| [105037] Microsoft Edge on Win10/Server 2016 Javascript Engine PreVisitCatch memory corruption
8338| [105035] Microsoft SharePoint Server 2010 SP2 cross site scripting
8339| [105033] Microsoft Edge 38.14393.1066.0 on Win10/Server 2016 Use-After-Free information disclosure
8340| [105029] Microsoft Edge on Win10/Server 2016 Javascript Engine ProcessLinkFailedAsmJsModule memory corruption
8341| [105027] Microsoft Edge on Win10/Server 2016 _SelectValueInternal information disclosure
8342| [105024] Microsoft Edge on Win10/Server 2016 Javascript Engine memory corruption
8343| [105023] Microsoft Edge on Win10/Server 2016 Javascript Engine memory corruption
8344| [105017] Microsoft Windows up to Server 2016 Error Reporting information disclosure
8345| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
8346| [105011] Microsoft Windows up to Server 2016 Windows Search memory corruption
8347| [105010] Microsoft Windows up to Server 2016 Win32k memory corruption
8348| [105009] Microsoft Windows up to Server 2016 Input Method Editor memory corruption
8349| [105008] Microsoft SQL Server 2012/2014/2016 Analysis Services information disclosure
8350| [104990] Microsoft Windows up to Server 2016 JET Database Engine memory corruption
8351| [104989] Microsoft Windows up to Server 2016 NetBIOS denial of service
8352| [104584] Microsoft Outlook up to 2016 C2R Document File privilege escalation
8353| [104583] Microsoft Outlook up to 2016 C2R Email memory corruption
8354| [104582] Microsoft Outlook up to 2016 C2R Object memory corruption
8355| [103468] Microsoft Exchange Server 2010 SP3/2013 CU16/2013 SP3/2016 CU5 Open Redirect
8356| [103446] Microsoft Windows up to Server 2016 Search Object privilege escalation
8357| [103445] Microsoft Windows up to Server 2016 Wordpad privilege escalation
8358| [103444] Microsoft Windows up to Server 2016 Explorer denial of service
8359| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
8360| [103441] Microsoft Windows up to Server 2016 Object HTTP.sys information disclosure
8361| [103431] Microsoft Windows up to Server 2016 PowerShell PSObject Object privilege escalation
8362| [103429] Microsoft Windows up to Server 2016 Kerberos weak authentication
8363| [103426] Microsoft Exchange Server 2010 SP3/2013 CU16/2013 SP3/2016 CU5 OWA Request cross site scripting
8364| [103425] Microsoft Exchange Server 2010 SP3/2013 CU16/2013 SP3/2016 CU5 OWA Request cross site scripting
8365| [103420] Microsoft Windows up to Server 2016 Kerberos Bypass privilege escalation
8366| [103417] Microsoft Windows up to Server 2016 Windows Shell privilege escalation
8367| [102544] Microsoft Edge on Win10/Server 2016 Fetch API information disclosure
8368| [102543] Microsoft Edge on Win10/Server 2016 Javascript XML DOM Object information disclosure
8369| [102463] Microsoft Project Server 2013 SP1 cross site scripting
8370| [102460] Microsoft Outlook 2016 on Mac HTML spoofing
8371| [102448] Microsoft SharePoint Enterprise Server 2016 Reflected cross site scripting
8372| [102446] Microsoft Office up to 2016 privilege escalation
8373| [102445] Microsoft Office 2010 SP2/2011/2013 RT SP1/2013 SP1/2016 privilege escalation
8374| [102443] Microsoft Office up to 2016 privilege escalation
8375| [102412] Microsoft Windows up to Server 2016 PDF information disclosure
8376| [102397] Microsoft Outlook 2010 SP1/2013 SP1/2016 DLL Loader privilege escalation
8377| [102396] Microsoft Office 2013 SP1/2016 DLL Loader privilege escalation
8378| [102386] Microsoft Windows up to Server 2012 R2 Uniscribe privilege escalation
8379| [102385] Microsoft Windows up to Server 2016 Font Library privilege escalation
8380| [102376] Microsoft Windows up to Server 2016 CAB File privilege escalation
8381| [102375] Microsoft Windows up to Server 2016 PDF Parser privilege escalation
8382| [102374] Microsoft Windows up to Server 2016 PDF Parser privilege escalation
8383| [102373] Microsoft Windows up to Server 2016 Uniscribe Font USP10!MergeLigRecords memory corruption
8384| [101817] Microsoft Windows up to Server 2016 Malware Protection Engine denial of service
8385| [101816] Microsoft Windows up to Server 2016 Malware Protection Engine setCaller memory corruption
8386| [101815] Microsoft Windows up to Server 2016 Malware Protection Engine Use-After-Free memory corruption
8387| [101814] Microsoft Windows up to Server 2016 Malware Protection Engine denial of service
8388| [101813] Microsoft Windows up to Server 2016 Malware Protection Engine memory corruption
8389| [101812] Microsoft Windows up to Server 2016 Malware Protection Engine denial of service
8390| [101811] Microsoft Windows up to Server 2016 Malware Protection Engine denial of service
8391| [101810] Microsoft Windows up to Server 2016 Malware Protection Engine denial of service
8392| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
8393| [101020] Microsoft SharePoint Foundation 2013 SP1 cross site scripting
8394| [101019] Microsoft Skype for Business 2016 memory corruption
8395| [101018] Microsoft SharePoint 2010 SP2/2013 SP1/2016 memory corruption
8396| [101016] Microsoft PowerPoint 2011 on Mac memory corruption
8397| [101015] Microsoft PowerPoint 2011 on Mac memory corruption
8398| [101014] Microsoft Office 2010 SP2/2016 memory corruption
8399| [101013] Microsoft Office 2010 SP2/2016 memory corruption
8400| [101002] Microsoft Windows up to Server 2016 SMBv1 Server memory corruption
8401| [101001] Microsoft Windows up to Server 2016 SMBv1 Server memory corruption
8402| [101000] Microsoft Windows up to Server 2016 SMBv1 Server memory corruption
8403| [100999] Microsoft Windows up to Server 2016 SMBv1 Server memory corruption
8404| [100918] Microsoft Windows 8/8.1/10/Server 2012/Server 2016 Malware Protection Service Type Confusion privilege escalation
8405| [99697] Microsoft SharePoint Server 2010 SP1/2010 SP2 Excel Services cross site scripting
8406| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
8407| [99682] Microsoft Outlook 2011 on Mac HTML Tag Validator spoofing
8408| [99681] Microsoft Windows up to Server 2016 OLE Integrity-Level Check privilege escalation
8409| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
8410| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
8411| [98096] Microsoft Exchange 2013 SP1 privilege escalation
8412| [98095] Microsoft Lync for Mac 2011 Certificate Validation weak authentication
8413| [98094] Microsoft SharePoint Server 2013 SP1 cross site scripting
8414| [98093] Microsoft SharePoint Server/Office Web Apps 2010 SP2 memory corruption
8415| [98091] Microsoft SharePoint Server/Office Web Apps 2010 SP2 memory corruption
8416| [98090] Microsoft SharePoint Server 2010 SP2/2013 SP1 information disclosure
8417| [98089] Microsoft Office Web Apps 2013 SP1 memory corruption
8418| [98082] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 denial of service
8419| [98081] Microsoft Excel up to 2016 information disclosure
8420| [98080] Microsoft Excel 2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
8421| [98079] Microsoft Word 2016 memory corruption
8422| [98076] Microsoft Lync/Skype for Business 2010/2013/2016 Graphics Component privilege escalation
8423| [98075] Microsoft Lync/Skype for Business 2010/2013/2016 GDI+ information disclosure
8424| [98074] Microsoft Lync/Skype for Business 2010/2013/2016 GDI+ information disclosure
8425| [98073] Microsoft Office 2010 SP2/Word Viewer Graphics Component information disclosure
8426| [98069] Microsoft Windows up to Server 2012 R2 Color Management memory corruption
8427| [98056] Microsoft Windows up to Server 2016 DNS Query information disclosure
8428| [98054] Microsoft Windows up to Server 2016 SMBv2/SMBv3 NULL Pointer Dereference memory corruption
8429| [98017] Microsoft Windows up to Server 2016 PDF memory corruption
8430| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
8431| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
8432| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
8433| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
8434| [96521] Microsoft Windows 8.1/10/Server 2012/Server 2016 SMB Response mrxsmb20.sys denial of service
8435| [95781] Microsoft PowerPoint 2016 Java Embedded Object privilege escalation
8436| [95125] Microsoft Word/SharePoint Enterprise Server 2016 Document privilege escalation
8437| [94451] Microsoft Office 2011 memory corruption
8438| [94447] Microsoft Office 2010 SP2 memory corruption
8439| [94446] Microsoft Office 2016 memory corruption
8440| [94444] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 OLE DLL Loader memory corruption
8441| [94443] Microsoft Office up to 2016 information disclosure
8442| [94442] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 privilege escalation
8443| [93964] Microsoft Windows 7 Excel Starter 2010 XXE information disclosure
8444| [93543] Microsoft SQL Server 2016 FILESTREAM Path privilege escalation
8445| [93540] Microsoft Excel 2010 SP2/2011/2016 memory corruption
8446| [93416] Microsoft SQL Server 2014 SP2/2016/up to 2012 SP3 Server Agent atxcore.dll privilege escalation
8447| [93415] Microsoft SQL Server 2016 MDS API cross site scripting
8448| [93414] Microsoft SQL Server up to 2012 SP3 RDBMS Engine privilege escalation
8449| [93413] Microsoft SQL Server 2016/up to 2014 SP2 RDBMS Engine privilege escalation
8450| [93412] Microsoft SQL Server 2016 RDBMS Engine privilege escalation
8451| [93393] Microsoft Office up to 2016 memory corruption
8452| [93392] Microsoft Office up to 2016 memory corruption
8453| [93391] Microsoft Office up to 2016 memory corruption
8454| [93389] Microsoft Windows up to Server 2016 Media Foundation memory corruption
8455| [93388] Microsoft Windows up to Server 2016 Animation Manager Stylesheets memory corruption
8456| [92587] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 Transaction Manager privilege escalation
8457| [92584] Microsoft Office up to 2016 memory corruption
8458| [91571] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library information disclosure
8459| [91570] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library information disclosure
8460| [91556] Microsoft Exchange 2016 Meeting Invation cross site scripting
8461| [91555] Microsoft Exchange 2013/2016 Link spoofing
8462| [91550] Microsoft Office 2016 memory corruption
8463| [91547] Microsoft Office 2010 memory corruption
8464| [91543] Microsoft Office up to 2016 memory corruption
8465| [91541] Microsoft Office 2013/2016 APP-V ASLR privilege escalation
8466| [90711] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF privilege escalation
8467| [90710] Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 Netlogon privilege escalation
8468| [90704] Microsoft Office 2013/2013 RT/2016 memory corruption
8469| [89043] Microsoft Office up to 2016 memory corruption
8470| [89041] Microsoft Office up to 2016 memory corruption
8471| [89040] Microsoft Office 2010 SP2/2011/2013 RT SP1/2013 SP1/2016 memory corruption
8472| [89038] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 Security Feature privilege escalation
8473| [89037] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1/2016 memory corruption
8474| [87961] Microsoft Windows up to Server 2012 R2 Search denial of service
8475| [87959] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF information disclosure
8476| [87958] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF memory corruption
8477| [87957] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF information disclosure
8478| [87956] Microsoft Exchange 2013/2016 Oracle Outside In Libraries information disclosure
8479| [87944] Microsoft Windows Server 2012/Server 2012 R2 Virtual PCI Memory information disclosure
8480| [87940] Microsoft Windows Server 2012/Server 2012 R2 DNS Server Use-After-Free memory corruption
8481| [87936] Microsoft Office up to 2016 memory corruption
8482| [87166] Microsoft Windows up to Server 2012 R2 DirectX Graphics Kernel Subsystem privilege escalation
8483| [87156] Microsoft Windows 8.1/10/RT 8.1/Server 2012 R2 Shell memory corruption
8484| [87149] Microsoft Office up to 2016 memory corruption
8485| [87148] Microsoft Office 2010 Graphics memory corruption
8486| [87146] Microsoft Office 2011/2013/2013 RT/2016 memory corruption
8487| [82229] Microsoft Excel 2010 SP2 Office Document memory corruption
8488| [82223] Microsoft Windows 8.1/10/Server 2012 R2 Hyper-V Memory information disclosure
8489| [82222] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Memory information disclosure
8490| [82221] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Hyper-V privilege escalation
8491| [81274] Microsoft Office up to 2016 memory corruption
8492| [81270] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 PDF Library memory corruption
8493| [81269] Microsoft Windows up to Server 2012 R2 Media Parser memory corruption
8494| [81268] Microsoft Windows up to Server 2012 R2 Media Parser memory corruption
8495| [80886] Microsoft SharePoint Foundation 2013 SP1 cross site scripting
8496| [80885] Microsoft Windows 7 SP1/8.1/10/Server 2012/Server 2012 R2 RDP memory corruption
8497| [80878] Microsoft Windows Server 2012 R2 Active Directory Federation Service denial of service
8498| [80874] Microsoft Windows 7 SP1/8.1/10/Server 2012/Server 2012 R2 RDP privilege escalation
8499| [80870] Microsoft Office up to 2016 memory corruption
8500| [80868] Microsoft Office up to 2016 memory corruption
8501| [80867] Microsoft Office up to 2016 memory corruption
8502| [80865] Microsoft Windows 8.1/RT 8.1/Server 2012/Server 2012 R2 DLL Loader memory corruption
8503| [80860] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 Reader memory corruption
8504| [80859] Microsoft Windows 8.1/10/Server 2012/Server 2012 R2 PDF Library memory corruption
8505| [80231] Microsoft Excel up to 2016 Office Document memory corruption
8506| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
8507| [80228] Microsoft Exchange Server 2016 Outlook Web Access cross site scripting
8508| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
8509| [80226] Microsoft Exchange Server 2016 Outlook Web Access cross site scripting
8510| [80218] Microsoft Office up to 2016 ASLR privilege escalation
8511| [80217] Microsoft SharePoint Foundation 2013 SP1 Access Control Policy cross site scripting
8512| [80216] Microsoft Office up to 2016 Office Document memory corruption
8513| [80206] Microsoft SharePoint Foundation 2013 SP1 Access Control Policy cross site scripting
8514| [128763] Microsoft Exchange Server 2016 CU10/2016 CU11/2019 memory corruption
8515| [79508] Microsoft Windows up to Server 2012 R2 Library Loader memory corruption
8516| [79500] Microsoft Office 2010/2011/2016 memory corruption
8517| [79183] Microsoft Windows up to Server 2012 R2 IPsec denial of service
8518| [79173] Microsoft Windows up to Server 2012 R2 Graphics information disclosure
8519| [79117] Microsoft Outlook 2011/2016 on Mac HTML spoofing
8520| [78375] Microsoft SharePoint Server/SharePoint Foundation 2013 SP1 cross site scripting
8521| [77645] Microsoft Exchange Server 2013 CU8/2013 CU9 Outlook Web Access cross site scripting
8522| [77644] Microsoft Exchange Server 2013 CU8/2013 CU9 Outlook Web Access cross site scripting
8523| [77638] Microsoft Lync Server 2013 cross site scripting
8524| [77628] Microsoft SharePoint Foundation 2013 SP1 cross site scripting
8525| [77612] Microsoft Exchange Server 2013 CU8/2013 CU9 Outlook Web Access Stack-Based information disclosure
8526| [77050] Microsoft Office up to 2016 memory corruption
8527| [77037] Microsoft Windows Server 2012/Server 2012 R2 System Center Operations Manager cross site scripting
8528| [76461] Microsoft Windows up to Server 2012 R2 Domain-Controller Communication Credentials information disclosure
8529| [76460] Microsoft Windows 7 SP1/8/Server 2012 RDP Server Service memory corruption
8530| [76448] Microsoft Windows 8.1/Server 2012 R2 Hyper-V memory corruption
8531| [75793] Microsoft Exchange Server 2013 CU8 cross site scripting
8532| [75792] Microsoft Exchange Server 2013 SP1 CU8 cross site request forgery
8533| [75791] Microsoft Office 2013 SP1 Office Document Uninitialized Memory memory corruption
8534| [75787] Microsoft Exchange Server 2013 SP1 CU8 Same Origin Policy privilege escalation
8535| [75786] Microsoft Office 2010 SP2/2013 RT SP1/2013 SP1 Office Document memory corruption
8536| [66976] Microsoft Access 2010 VBA Datatype denial of service
8537| [74848] Microsoft SharePoint Foundation/SharePoint Server 2013 SP1 cross site scripting
8538| [74842] Microsoft Windows 8.1/Server 2012 R2 Hyper-V denial of service
8539| [74836] Microsoft Project Server 2010 SP2/2013 SP1 cross site scripting
8540| [74835] Microsoft Office 2011 on Mac Use-After-Free cross site scripting
8541| [74834] Microsoft Windows Server 2012 R2 Active Directory Federation Services 3.0 privilege escalation
8542| [74833] Microsoft Windows 7 SP1/8/8.1/Server 2012/Server 2012 R2 HTTP Request HTTP.sys privilege escalation
8543| [74393] Microsoft SharePoint Server 2013 Foundation cross site scripting
8544| [73967] Microsoft Office up to 2013 SP1 Office File memory corruption
8545| [73966] Microsoft Office up to 2013 SP1 RTF File memory corruption
8546| [73965] Microsoft Office up to 2013 SP1 Use-After-Free memory corruption
8547| [73961] Microsoft Windows 7 SP1/8/8.1/Server 2012/Server 2012 R2 Remote Desktop Protocol Object Management denial of service
8548| [69162] Microsoft System Center Virtual Machine Manager 2012 privilege escalation
8549| [69160] Microsoft Windows up to Server 2012 Process privilege escalation
8550| [69156] Microsoft Office 2010 Object memory corruption
8551| [68593] Microsoft Windows up to Server 2012 Network Location Awareness Service privilege escalation
8552| [68417] Microsoft Exchange 2013 Outlook Web Access Token spoofing
8553| [68191] Microsoft SharePoint 2010 cross site scripting
8554| [67828] Microsoft ASP.NET MVC 2/3/4/5/5.1 System.Web.Mvc.dll cross site scripting
8555| [67518] Microsoft Lync 2013 denial of service
8556| [67517] Microsoft Lync 2013 Script Reflected cross site scripting
8557| [67516] Microsoft Lync 2010/2013 denial of service
8558| [67362] Microsoft Windows up to Server 2012 R2 Remote Procedure Call privilege escalation
8559| [67360] Microsoft SharePoint 2013 App Permission Management cross site scripting
8560| [13549] Microsoft Windows 7/8/8.1/Server 2012 Remote Desktop Protocol weak encryption
8561| [13547] Microsoft Lync 2010/2013 Meeting cross site scripting
8562| [13228] Microsoft Office 2013 Document privilege escalation
8563| [68577] Microsoft ASP.NET 2014.3.1209 Telerik UI RadAsyncUpload directory traversal
8564| [12267] Microsoft Forefront Security for Exchange Server 2010 Mail memory corruption
8565| [12263] Microsoft Windows up to Server 2012 Direct2D 2D Geometric Figure memory corruption
8566| [12238] Microsoft Windows 8/RT/Server 2012 IPv6 denial of service
8567| [12185] Microsoft .NET Framework 2/4 HMAC weak authentication
8568| [12183] Microsoft .NET Framework 2/4 DTD denial of service
8569| [11673] Microsoft Windows Live Movie Maker 2011 WAV File denial of service
8570| [11468] Microsoft Exchange 2010/2013 cross site scripting
8571| [11466] Microsoft Office 2013 File Response information disclosure
8572| [11457] Microsoft SharePoint Server/Office Web Apps 2010 SP1/2010 SP2/2013 W3WP Service Account privilege escalation
8573| [11150] Microsoft Windows 8/Server 2012 Hyper-V Data Structure Value Crash privilege escalation
8574| [11004] Microsoft Windows Server 2012 R2 RDP Restricted Admin Mode weak authentication
8575| [10250] Microsoft SharePoint Server up to 2013 W3WP Process denial of service
8576| [10249] Microsoft SharePoint 2010/2003/2007/2.0/3.0 Workflow memory corruption
8577| [10248] Microsoft SharePoint Server up to 2013 cross site scripting
8578| [9943] Microsoft Windows Server 2012 NAT Driver ICMP Packet denial of service
8579| [8739] Microsoft Windows Essentials up to 2012 Windows Writer Eingabe information disclosure
8580| [8725] Microsoft Lync 2010/2013 Use-After-Free memory corruption
8581| [8722] Microsoft Windows 8/RT/Server 2012 HTTP.sys denial of service
8582| [8206] Microsoft SharePoint Server 2010 SP1 HTML Sanitization Component cross site scripting
8583| [8203] Microsoft Windows up to 2012 AD LDAP Query denial of service
8584| [8200] Microsoft SharePoint Server 2013 ACL information disclosure
8585| [7971] Microsoft Office for Mac 2011 up to 14.3.1 on Mac HTML5 Mail Message Parser File information disclosure
8586| [7969] Microsoft OneNote 2010 SP1 ONE File information disclosure
8587| [7968] Microsoft SharePoint Server 2010 SP1 Input Validator Eingabe Crash denial of service
8588| [7967] Microsoft SharePoint Server 2010 SP1 User Account Eingabe Crash information disclosure
8589| [7966] Microsoft SharePoint Server 2010 SP1 Eingabe Crash cross site scripting
8590| [7965] Microsoft SharePoint Server 2010 SP1 User Account Callback URL privilege escalation
8591| [7964] Microsoft Visio 2010 Tree Object Type File memory corruption
8592| [7343] Microsoft Lync 2012 HTTP Format String
8593| [7258] Microsoft Windows up to 8/Server 2012 SSL/TLS race condition
8594| [7230] Microsoft Excel 2010 SP1 on 32-bit XLS File Formatting Information Crash denial of service
8595| [6831] Microsoft Office Picture Manager 2010 File memory corruption
8596| [62720] EMC NetWorker Module for Microsoft Applications up to 2.2.0 memory corruption
8597| [6624] Microsoft SQL Server up to 2012 Report Manager cross site scripting
8598| [62238] Microsoft Visual Studio Team Foundation Server 2010 cross site scripting
8599| [5946] Microsoft Visio/Visio Viewer up to 2010 SP1 File memory corruption
8600| [5644] Microsoft SharePoint 2010 scriptesx.ashx cross site scripting
8601| [5641] Microsoft SharePoint 2010 cross site scripting
8602| [60943] Microsoft Dynamics AX 2012 Enterprise Portal cross site scripting
8603| [12311] Microsoft Lync 2010 Search race condition
8604| [60570] Microsoft Forefront Unified Access Gateway 2010 information disclosure
8605| [60569] Microsoft Forefront Unified Access Gateway 2010 spoofing
8606| [60208] Microsoft Visio Viewer 2010 memory corruption
8607| [60207] Microsoft Visio Viewer 2010 memory corruption
8608| [60206] Microsoft Visio Viewer 2010 memory corruption
8609| [4640] Microsoft SharePoint 2010 inplview.aspx cross site scripting
8610| [4636] Microsoft SharePoint 2010 wizardlist.aspx cross site scripting
8611| [4635] Microsoft SharePoint 2010 themeweb.aspx cross site scripting
8612| [59008] Microsoft Forefront Unified Access Gateway 2010 Crash denial of service
8613| [58995] Microsoft Forefront Unified Access Gateway 2010 memory corruption
8614| [58994] Microsoft Forefront Unified Access Gateway 2010 Reflected cross site scripting
8615| [58993] Microsoft Forefront Unified Access Gateway 2010 Reflected cross site scripting
8616| [4424] Microsoft Host Integration Server up to 2010 denial of service
8617| [4420] Microsoft Forefront Unified Access Gateway 2010 memory corruption
8618| [58487] Microsoft SharePoint Foundation 2010 cross site scripting
8619| [58486] Microsoft SharePoint Foundation 2010 Reflected cross site scripting
8620| [58485] Microsoft SharePoint Foundation 2010 EditForm.aspx cross site scripting
8621| [4414] Microsoft SharePoint 2010 cross site scripting
8622| [4413] Microsoft SharePoint 2010/2007/3.0 XML/XLS unknown vulnerability
8623| [91971] Microsoft Skype 2.2.x/5.2.x/5.3.x denial of service
8624| [57693] Microsoft Forefront Threat Management Gateway 2010 NSPLookupServiceNext memory corruption
8625| [56028] Microsoft Data Access Components 2.8 memory corruption
8626| [55777] Microsoft Windows Movie Maker 2.6 memory corruption
8627| [55424] Microsoft Forefront Unified Access Gateway 2010 Signurl.asp cross site scripting
8628| [55415] Microsoft Forefront Unified Access Gateway 2010 cross site scripting
8629| [55414] Microsoft Forefront Unified Access Gateway 2010 cross site scripting
8630| [55413] Microsoft Forefront Unified Access Gateway 2010 spoofing
8631| [54341] Microsoft Windows Movie Maker 2.1 memory corruption
8632| [54549] Microsoft PowerPoint 2010 pptimpconv.dll memory corruption
8633| [4009] Microsoft NET Framework 2.x/3.x denial of service
8634| [45681] Microsoft Internet Explorer 8 Beta 2 privilege escalation
8635| [45449] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
8636| [45448] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
8637| [45446] Microsoft Internet Explorer 8 Beta 2 XSS Filter cross site scripting
8638| [2927] Microsoft Data Access Components 2.x ADODB.Connection ActiveX Control memory corruption
8639| [32692] Microsoft XML Core Services up to 2.6 memory corruption
8640| [32691] Microsoft XML Core Services up to 2.6 memory corruption
8641|
8642| MITRE CVE - https://cve.mitre.org:
8643| [CVE-2013-3661] The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
8644| [CVE-2013-3660] The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
8645| [CVE-2013-3174] DirectShow in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted GIF file, aka "DirectShow Arbitrary Memory Overwrite Vulnerability."
8646| [CVE-2013-3173] Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overwrite Vulnerability."
8647| [CVE-2013-3172] Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to cause a denial of service (system hang) via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overflow Vulnerability."
8648| [CVE-2013-3171] The serialization functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly check the permissions of delegate objects, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a partial-trust relationship, aka "Delegate Serialization Vulnerability."
8649| [CVE-2013-3167] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Information Disclosure Vulnerability."
8650| [CVE-2013-3154] The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."
8651| [CVE-2013-3138] Integer overflow in the TCP/IP kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (system hang) via crafted TCP packets, aka "TCP/IP Integer Overflow Vulnerability."
8652| [CVE-2013-3136] The kernel in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 on 32-bit platforms does not properly handle unspecified page-fault system calls, which allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Kernel Information Disclosure Vulnerability."
8653| [CVE-2013-3134] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 on 64-bit platforms does not properly allocate arrays of structures, which allows remote attackers to execute arbitrary code via a crafted .NET Framework application that changes array data, aka "Array Allocation Vulnerability."
8654| [CVE-2013-3133] Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Anonymous Method Injection Vulnerability."
8655| [CVE-2013-3132] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Delegate Reflection Bypass Vulnerability."
8656| [CVE-2013-3131] Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5, and Silverlight 5 before 5.1.20513.0, does not properly prevent changes to data in multidimensional arrays of structures, which allows remote attackers to execute arbitrary code via (1) a crafted .NET Framework application or (2) a crafted Silverlight application, aka "Array Access Violation Vulnerability."
8657| [CVE-2013-1345] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."
8658| [CVE-2013-1340] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Dereference Vulnerability."
8659| [CVE-2013-1339] The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability."
8660| [CVE-2013-1336] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check signatures, which allows remote attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity, aka "XML Digital Signature Spoofing Vulnerability."
8661| [CVE-2013-1335] Microsoft Word 2003 SP3 and Word Viewer allow remote attackers to execute arbitrary code via crafted shape data in a Word document, aka "Word Shape Corruption Vulnerability."
8662| [CVE-2013-1334] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability."
8663| [CVE-2013-1332] dxgkrnl.sys (aka the DirectX graphics kernel subsystem) in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
8664| [CVE-2013-1331] Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability."
8665| [CVE-2013-1329] Integer signedness error in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers a buffer underflow, aka "Publisher Buffer Underflow Vulnerability."
8666| [CVE-2013-1328] Microsoft Publisher 2003 SP3, 2007 SP3, and 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers incorrect pointer handling, aka "Publisher Pointer Handling Vulnerability."
8667| [CVE-2013-1327] Integer signedness error in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper memory allocation, aka "Publisher Signed Integer Vulnerability."
8668| [CVE-2013-1323] Microsoft Publisher 2003 SP3 does not properly handle NULL values for unspecified data items, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Incorrect NULL Value Handling Vulnerability."
8669| [CVE-2013-1322] Microsoft Publisher 2003 SP3 does not properly check table range data, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Invalid Range Check Vulnerability."
8670| [CVE-2013-1321] Microsoft Publisher 2003 SP3 does not properly check the data type of an unspecified return value, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Return Value Validation Vulnerability."
8671| [CVE-2013-1320] Buffer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Buffer Overflow Vulnerability."
8672| [CVE-2013-1319] Microsoft Publisher 2003 SP3 does not properly check the return value of an unspecified method, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Return Value Handling Vulnerability."
8673| [CVE-2013-1318] Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers access to an invalid pointer, aka "Publisher Corrupt Interface Pointer Vulnerability."
8674| [CVE-2013-1317] Integer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper allocation-size calculation, aka "Publisher Integer Overflow Vulnerability."
8675| [CVE-2013-1316] Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative Value Allocation Vulnerability."
8676| [CVE-2013-1302] Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability."
8677| [CVE-2013-1301] Microsoft Visio 2003 SP3 2007 SP3, and 2010 SP1 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, aka "XML External Entities Resolution Vulnerability."
8678| [CVE-2013-1300] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
8679| [CVE-2013-1295] The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "CSRSS Memory Corruption Vulnerability."
8680| [CVE-2013-1294] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."
8681| [CVE-2013-1293] The NTFS kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application that leverages improper handling of objects in memory, aka "NTFS NULL Pointer Dereference Vulnerability."
8682| [CVE-2013-1292] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."
8683| [CVE-2013-1291] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 Gold and SP1, and Windows 8 allows local users to cause a denial of service (reboot) via a crafted OpenType font, aka "OpenType Font Parsing Vulnerability" or "Win32k Font Parsing Vulnerability."
8684| [CVE-2013-1287] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1286.
8685| [CVE-2013-1286] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1287.
8686| [CVE-2013-1285] The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1286 and CVE-2013-1287.
8687| [CVE-2013-1283] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."
8688| [CVE-2013-1281] The NFS server in Microsoft Windows Server 2008 R2 and R2 SP1 and Server 2012 allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via an attempted renaming of a file or folder located on a read-only share, aka "NULL Dereference Vulnerability."
8689| [CVE-2013-1280] The kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Reference Count Vulnerability."
8690| [CVE-2013-1279] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1278.
8691| [CVE-2013-1278] Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1279.
8692| [CVE-2013-1277] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8693| [CVE-2013-1276] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8694| [CVE-2013-1275] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8695| [CVE-2013-1274] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8696| [CVE-2013-1273] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8697| [CVE-2013-1272] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8698| [CVE-2013-1271] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8699| [CVE-2013-1270] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8700| [CVE-2013-1269] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8701| [CVE-2013-1268] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8702| [CVE-2013-1267] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8703| [CVE-2013-1266] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8704| [CVE-2013-1265] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8705| [CVE-2013-1264] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8706| [CVE-2013-1263] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8707| [CVE-2013-1262] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8708| [CVE-2013-1261] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8709| [CVE-2013-1260] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8710| [CVE-2013-1259] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8711| [CVE-2013-1258] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8712| [CVE-2013-1257] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8713| [CVE-2013-1256] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8714| [CVE-2013-1255] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8715| [CVE-2013-1254] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8716| [CVE-2013-1253] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8717| [CVE-2013-1252] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8718| [CVE-2013-1251] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8719| [CVE-2013-1250] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8720| [CVE-2013-1249] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8721| [CVE-2013-1248] Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
8722| [CVE-2013-0095] Outlook in Microsoft Office for Mac 2008 before 12.3.6 and Office for Mac 2011 before 14.3.2 allows remote attackers to trigger access to a remote URL and consequently confirm the rendering of an HTML e-mail message by including unspecified HTML5 elements and leveraging the installation of a WebKit browser on the victim's machine, aka "Unintended Content Loading Vulnerability."
8723| [CVE-2013-0077] Quartz.dll in DirectShow in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers to execute arbitrary code via crafted media content in (1) a media file, (2) a media stream, or (3) a Microsoft Office document, aka "Media Decompression Vulnerability."
8724| [CVE-2013-0076] The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Reference Count Vulnerability."
8725| [CVE-2013-0075] The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability."
8726| [CVE-2013-0073] The Windows Forms (aka WinForms) component in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly restrict the privileges of a callback function during object creation, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "WinForms Callback Elevation Vulnerability."
8727| [CVE-2013-0013] The SSL provider component in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle encrypted packets, which allows man-in-the-middle attackers to conduct SSLv2 downgrade attacks against (1) SSLv3 sessions or (2) TLS sessions by intercepting handshakes and injecting content, aka "Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability."
8728| [CVE-2013-0011] The Print Spooler in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted print job, aka "Windows Print Spooler Components Vulnerability."
8729| [CVE-2013-0010] Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka "System Center Operations Manager Web Console XSS Vulnerability," a different vulnerability than CVE-2013-0009.
8730| [CVE-2013-0009] Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attackers to inject arbitrary web script or HTML via crafted input, aka "System Center Operations Manager Web Console XSS Vulnerability," a different vulnerability than CVE-2013-0010.
8731| [CVE-2013-0008] win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."
8732| [CVE-2013-0004] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate the permissions of objects in memory, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Double Construction Vulnerability."
8733| [CVE-2013-0003] Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a missing array-size check during a memory copy operation, aka "S.DS.P Buffer Overflow Vulnerability."
8734| [CVE-2013-0002] Buffer overflow in the Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages improper counting of objects during a memory copy operation, aka "WinForms Buffer Overflow Vulnerability."
8735| [CVE-2013-0001] The Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 4, and 4.5 does not properly initialize memory arrays, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a pointer to an unmanaged memory location, aka "System Drawing Information Disclosure Vulnerability."
8736| [CVE-2012-5672] Microsoft Excel Viewer (aka Xlview.exe) and Excel in Microsoft Office 2007 (aka Office 12) allow remote attackers to cause a denial of service (read access violation and application crash) via a crafted spreadsheet file, as demonstrated by a .xls file with battery voltage data.
8737| [CVE-2012-4791] Microsoft Exchange Server 2007 SP3 and 2010 SP1 and SP2 allows remote authenticated users to cause a denial of service (Information Store service hang) by subscribing to a crafted RSS feed, aka "RSS Feed May Cause Exchange DoS Vulnerability."
8738| [CVE-2012-4786] The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."
8739| [CVE-2012-4776] The Web Proxy Auto-Discovery (WPAD) functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not validate configuration data that is returned during acquisition of proxy settings, which allows remote attackers to execute arbitrary JavaScript code by providing crafted data during execution of (1) an XAML browser application (aka XBAP) or (2) a .NET Framework application, aka "Web Proxy Auto-Discovery Vulnerability."
8740| [CVE-2012-4774] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted (1) file name or (2) subfolder name that triggers use of unallocated memory as the destination of a copy operation, aka "Windows Filename Parsing Vulnerability."
8741| [CVE-2012-2897] The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT, as used by Google Chrome before 22.0.1229.79 and other programs, do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted TrueType font file, aka "Windows Font Parsing Vulnerability" or "TrueType Font Parsing Vulnerability."
8742| [CVE-2012-2556] The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability."
8743| [CVE-2012-2553] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
8744| [CVE-2012-2552] Cross-site scripting (XSS) vulnerability in the SQL Server Report Manager in Microsoft SQL Server 2000 Reporting Services SP2 and SQL Server 2005 SP4, 2008 SP2 and SP3, 2008 R2 SP1, and 2012 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "Reflected XSS Vulnerability."
8745| [CVE-2012-2551] The server in Kerberos in Microsoft Windows Server 2008 R2 and R2 SP1, and Windows 7 Gold and SP1, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted session request, aka "Kerberos NULL Dereference Vulnerability."
8746| [CVE-2012-2543] Stack-based buffer overflow in Microsoft Excel 2007 SP2 and SP3 and 2010 SP1
8747| [CVE-2012-2539] Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1
8748| [CVE-2012-2536] Cross-site scripting (XSS) vulnerability in Microsoft Systems Management Server 2003 SP3 and System Center Configuration Manager 2007 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Reflected XSS Vulnerability."
8749| [CVE-2012-2530] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
8750| [CVE-2012-2529] Integer overflow in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Windows Kernel Integer Overflow Vulnerability."
8751| [CVE-2012-2528] Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1
8752| [CVE-2012-2527] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
8753| [CVE-2012-2524] Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Computer Graphics Metafile (CGM) file, aka "CGM File Format Memory Corruption Vulnerability."
8754| [CVE-2012-2520] Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Communicator 2007 R2, Lync 2010 and 2010 Attendee, SharePoint Server 2007 SP2 and SP3 and 2010 SP1, Groove Server 2010 SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability."
8755| [CVE-2012-2519] Untrusted search path vulnerability in Entity Framework in ADO.NET in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, and 4 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .NET application, aka ".NET Framework Insecure Library Loading Vulnerability."
8756| [CVE-2012-1896] Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not properly consider trust levels during construction of output data, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka "Code Access Security Info Disclosure Vulnerability."
8757| [CVE-2012-1895] The reflection implementation in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5.1, and 4 does not properly enforce object permissions, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka "Reflection Bypass Vulnerability."
8758| [CVE-2012-1893] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate callback parameters during creation of a hook procedure, which allows local users to gain privileges via a crafted application, aka "Win32k Incorrect Type Handling Vulnerability."
8759| [CVE-2012-1890] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle keyboard-layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout Vulnerability."
8760| [CVE-2012-1887] Use-after-free vulnerability in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1, and Office 2008 and 2011 for Mac, allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel SST Invalid Length Use After Free Vulnerability."
8761| [CVE-2012-1886] Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1
8762| [CVE-2012-1885] Heap-based buffer overflow in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1
8763| [CVE-2012-1870] The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."
8764| [CVE-2012-1867] Integer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted TrueType font file that triggers incorrect memory allocation, aka "Font Resource Refcount Integer Overflow Vulnerability."
8765| [CVE-2012-1866] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "Clipboard Format Atom Name Handling Vulnerability."
8766| [CVE-2012-1865] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "String Atom Class Name Handling Vulnerability," a different vulnerability than CVE-2012-1864.
8767| [CVE-2012-1864] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle user-mode input passed to kernel mode for driver objects, which allows local users to gain privileges via a crafted application, aka "String Atom Class Name Handling Vulnerability," a different vulnerability than CVE-2012-1865.
8768| [CVE-2012-1863] Cross-site scripting (XSS) vulnerability in Microsoft Office SharePoint Server 2007 SP2 and SP3 Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via crafted JavaScript elements in a URL, aka "SharePoint Reflected List Parameter Vulnerability."
8769| [CVE-2012-1862] Open redirect vulnerability in Microsoft Office SharePoint Server 2007 SP2 and SP3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL, aka "SharePoint URL Redirection Vulnerability."
8770| [CVE-2012-1860] Microsoft Office SharePoint Server 2007 SP2 and SP3, SharePoint Server 2010 Gold and SP1, and Office Web Apps 2010 Gold and SP1 do not properly check permissions for search scopes, which allows remote authenticated users to obtain sensitive information or cause a denial of service (data modification) by changing a parameter in a search-scope URL, aka "SharePoint Search Scope Vulnerability."
8771| [CVE-2012-1858] The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document, aka "HTML Sanitization Vulnerability."
8772| [CVE-2012-1856] The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."
8773| [CVE-2012-1855] Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly handle function pointers, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Memory Access Vulnerability."
8774| [CVE-2012-1854] Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1
8775| [CVE-2012-1851] Format string vulnerability in the Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted response, aka "Print Spooler Service Format String Vulnerability."
8776| [CVE-2012-1850] The Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle RAP responses, which allows remote attackers to cause a denial of service (service hang) via crafted RAP packets, aka "Remote Administration Protocol Denial of Service Vulnerability."
8777| [CVE-2012-1848] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Scrollbar Calculation Vulnerability."
8778| [CVE-2012-1847] Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1
8779| [CVE-2012-1537] Heap-based buffer overflow in DirectPlay in DirectX 9.0 through 11.1 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted Office document, aka "DirectPlay Heap Overflow Vulnerability."
8780| [CVE-2012-1528] Integer overflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Overflow Vulnerability."
8781| [CVE-2012-1527] Integer underflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Underflow Vulnerability."
8782| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
8783| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
8784| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
8785| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
8786| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
8787| [CVE-2012-1194] The resolver in the DNS Server service in Microsoft Windows Server 2008 before R2 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
8788| [CVE-2012-0185] Heap-based buffer overflow in Microsoft Excel 2007 SP2 and SP3 and 2010 Gold and SP1, Excel Viewer, and Office Compatibility Pack SP2 and SP3 allows remote attackers to execute arbitrary code via a crafted spreadsheet that triggers incorrect handling of memory during opening, aka "Excel MergeCells Record Heap Overflow Vulnerability."
8789| [CVE-2012-0184] Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1
8790| [CVE-2012-0183] Microsoft Word 2003 SP3 and 2007 SP2 and SP3, Office 2008 and 2011 for Mac, and Office Compatibility Pack SP2 and SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "RTF Mismatch Vulnerability."
8791| [CVE-2012-0182] Microsoft Word 2007 SP2 and SP3 does not properly handle memory during the parsing of Word documents, which allows remote attackers to execute arbitrary code via a crafted document, aka "Word PAPX Section Corruption Vulnerability."
8792| [CVE-2012-0181] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly manage Keyboard Layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout File Vulnerability."
8793| [CVE-2012-0180] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability."
8794| [CVE-2012-0179] Double free vulnerability in tcpip.sys in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that binds an IPv6 address to a local interface, aka "TCP/IP Double Free Vulnerability."
8795| [CVE-2012-0178] Race condition in partmgr.sys in Windows Partition Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that makes multiple simultaneous Plug and Play (PnP) Configuration Manager function calls, aka "Plug and Play (PnP) Configuration Manager Vulnerability."
8796| [CVE-2012-0177] Heap-based buffer overflow in the Office Works File Converter in Microsoft Office 2007 SP2, Works 9, and Works 6-9 File Converter allows remote attackers to execute arbitrary code via a crafted Works (aka .wps) file, aka "Office WPS Converter Heap Overflow Vulnerability."
8797| [CVE-2012-0175] The Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted name for a (1) file or (2) directory, aka "Command Injection Vulnerability."
8798| [CVE-2012-0174] Windows Firewall in tcpip.sys in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly enforce firewall rules for outbound broadcast packets, which allows remote attackers to obtain potentially sensitive information by observing broadcast traffic on a local network, aka "Windows Firewall Bypass Vulnerability."
8799| [CVE-2012-0173] The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability," a different vulnerability than CVE-2012-0002.
8800| [CVE-2012-0167] Heap-based buffer overflow in the Office GDI+ library in Microsoft Office 2003 SP3 and 2007 SP2 and SP3 allows remote attackers to execute arbitrary code via a crafted EMF image in an Office document, aka "GDI+ Heap Overflow Vulnerability."
8801| [CVE-2012-0165] GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2 and Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1 does not properly validate record types in EMF images, which allows remote attackers to execute arbitrary code via a crafted image, aka "GDI+ Record Type Vulnerability."
8802| [CVE-2012-0163] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate function parameters, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Parameter Validation Vulnerability."
8803| [CVE-2012-0161] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."
8804| [CVE-2012-0160] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."
8805| [CVE-2012-0159] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview
8806| [CVE-2012-0158] The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1
8807| [CVE-2012-0157] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle window messaging, which allows local users to gain privileges via a crafted application that calls the PostMessage function, aka "PostMessage Function Vulnerability."
8808| [CVE-2012-0156] DirectWrite in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly render Unicode characters, which allows remote attackers to cause a denial of service (application hang) via a (1) instant message or (2) web site, aka "DirectWrite Application Denial of Service Vulnerability."
8809| [CVE-2012-0154] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers keyboard layout errors, aka "Keyboard Layout Use After Free Vulnerability."
8810| [CVE-2012-0152] The Remote Desktop Protocol (RDP) service in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (application hang) via a series of crafted packets, aka "Terminal Server Denial of Service Vulnerability."
8811| [CVE-2012-0151] The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability."
8812| [CVE-2012-0150] Buffer overflow in msvcrt.dll in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted media file, aka "Msvcrt.dll Buffer Overflow Vulnerability."
8813| [CVE-2012-0149] afd.sys in the Ancillary Function Driver in Microsoft Windows Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
8814| [CVE-2012-0148] afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 on 64-bit platforms does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "AfdPoll Elevation of Privilege Vulnerability."
8815| [CVE-2012-0143] Microsoft Excel 2003 SP3 and Office 2008 for Mac do not properly handle memory during the opening of files, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Memory Corruption Using Various Modified Bytes Vulnerability."
8816| [CVE-2012-0142] Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1
8817| [CVE-2012-0141] Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1
8818| [CVE-2012-0015] Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not properly calculate the length of an unspecified buffer, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Heap Corruption Vulnerability."
8819| [CVE-2012-0014] Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4, and Silverlight 4 before 4.1.10111, does not properly restrict access to memory associated with unmanaged objects, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Unmanaged Objects Vulnerability."
8820| [CVE-2012-0013] Incomplete blacklist vulnerability in the Windows Packager configuration in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted ClickOnce application in a Microsoft Office document, related to .application files, aka "Assembly Execution Vulnerability."
8821| [CVE-2012-0009] Untrusted search path vulnerability in the Windows Object Packager configuration in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a Trojan horse executable file in the current working directory, as demonstrated by a directory that contains a file with an embedded packaged object, aka "Object Packager Insecure Executable Launching Vulnerability."
8822| [CVE-2012-0008] Untrusted search path vulnerability in Microsoft Visual Studio 2008 SP1, 2010, and 2010 SP1 allows local users to gain privileges via a Trojan horse add-in in an unspecified directory, aka "Visual Studio Add-In Vulnerability."
8823| [CVE-2012-0006] The DNS server in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 does not properly handle objects in memory during record lookup, which allows remote attackers to cause a denial of service (daemon restart) via a crafted query, aka "DNS Denial of Service Vulnerability."
8824| [CVE-2012-0005] The Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2, when a Chinese, Japanese, or Korean system locale is used, can access uninitialized memory during the processing of Unicode characters, which allows local users to gain privileges via a crafted application, aka "CSRSS Elevation of Privilege Vulnerability."
8825| [CVE-2012-0004] Unspecified vulnerability in DirectShow in DirectX in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted media file, related to Quartz.dll, Qdvd.dll, closed captioning, and the Line21 DirectShow filter, aka "DirectShow Remote Code Execution Vulnerability."
8826| [CVE-2012-0003] Unspecified vulnerability in winmm.dll in Windows Multimedia Library in Windows Media Player (WMP) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers to execute arbitrary code via a crafted MIDI file, aka "MIDI Remote Code Execution Vulnerability."
8827| [CVE-2012-0002] The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability."
8828| [CVE-2012-0001] The kernel in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly load structured exception handling tables, which allows context-dependent attackers to bypass the SafeSEH security feature by leveraging a Visual C++ .NET 2003 application, aka "Windows Kernel SafeSEH Bypass Vulnerability."
8829| [CVE-2011-5046] The Graphics Device Interface (GDI) in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted data, as demonstrated by a large height attribute of an IFRAME element rendered by Safari, aka "GDI Access Violation Vulnerability."
8830| [CVE-2011-4434] Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 do not properly enforce AppLocker rules, which allows local users to bypass intended access restrictions via a (1) macro or (2) scripting feature in an application, as demonstrated by Microsoft Office applications and the SANDBOX_INERT and LOAD_IGNORE_CODE_AUTHZ_LEVEL flags.
8831| [CVE-2011-3417] The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0, when sliding expiry is enabled, does not properly handle cached content, which allows remote attackers to obtain access to arbitrary user accounts via a crafted URL, aka "ASP.NET Forms Authentication Ticket Caching Vulnerability."
8832| [CVE-2011-3416] The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote authenticated users to obtain access to arbitrary user accounts via a crafted username, aka "ASP.Net Forms Authentication Bypass Vulnerability."
8833| [CVE-2011-3415] Open redirect vulnerability in the Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted return URL, aka "Insecure Redirect in .NET Form Authentication Vulnerability."
8834| [CVE-2011-3414] The CaseInsensitiveHashProvider.getHashCode function in the HashTable implementation in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka "Collisions in HashTable May Cause DoS Vulnerability."
8835| [CVE-2011-3413] Microsoft PowerPoint 2007 SP2
8836| [CVE-2011-3412] Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, allows remote attackers to execute arbitrary code via a crafted Publisher file that leverages incorrect memory handling, aka "Publisher Memory Corruption Vulnerability."
8837| [CVE-2011-3411] Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that leverages incorrect handling of values in memory, aka "Publisher Invalid Pointer Vulnerability."
8838| [CVE-2011-3410] Array index error in Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, allows remote attackers to execute arbitrary code via a crafted Publisher file that leverages incorrect handling of values in memory, aka "Publisher Out-of-bounds Array Index Vulnerability."
8839| [CVE-2011-3408] Csrsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka "CSRSS Local Privilege Elevation Vulnerability."
8840| [CVE-2011-3406] Buffer overflow in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote authenticated users to execute arbitrary code via a crafted query that leverages incorrect memory initialization, aka "Active Directory Buffer Overflow Vulnerability."
8841| [CVE-2011-3403] Microsoft Excel 2003 SP3 and Office 2004 for Mac do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a crafted Excel spreadsheet, aka "Record Memory Corruption Vulnerability."
8842| [CVE-2011-3402] Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability."
8843| [CVE-2011-3400] Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 do not properly handle OLE objects in memory, which allows remote attackers to execute arbitrary code via a crafted object in a file, aka "OLE Property Vulnerability."
8844| [CVE-2011-3397] The Microsoft Time component in DATIME.DLL in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted web site that leverages an unspecified "binary behavior" in Internet Explorer, aka "Microsoft Time Remote Code Execution Vulnerability."
8845| [CVE-2011-3396] Untrusted search path vulnerability in Microsoft PowerPoint 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "PowerPoint Insecure Library Loading Vulnerability."
8846| [CVE-2011-2019] Untrusted search path vulnerability in Microsoft Internet Explorer 9 on Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an HTML file, aka "Internet Explorer Insecure Library Loading Vulnerability."
8847| [CVE-2011-2018] The kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, and Windows 7 Gold and SP1 does not properly initialize objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Exception Handler Vulnerability."
8848| [CVE-2011-2016] Untrusted search path vulnerability in Windows Mail and Windows Meeting Space in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .eml or .wcinv file, aka "Windows Mail Insecure Library Loading Vulnerability."
8849| [CVE-2011-2014] The LDAP over SSL (aka LDAPS) implementation in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not examine Certificate Revocation Lists (CRLs), which allows remote authenticated users to bypass intended certificate restrictions and access Active Directory resources by leveraging a revoked X.509 certificate for a domain account, aka "LDAPS Authentication Bypass Vulnerability."
8850| [CVE-2011-2013] Integer overflow in the TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code by sending a sequence of crafted UDP packets to a closed port, aka "Reference Counter Overflow Vulnerability."
8851| [CVE-2011-2011] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, aka "Win32k Use After Free Vulnerability."
8852| [CVE-2011-2008] Microsoft Host Integration Server (HIS) 2004 SP1, 2006 SP1, 2009, and 2010 allows remote attackers to cause a denial of service (SNA Server service outage) via crafted TCP or UDP traffic, aka "Access of Unallocated Memory DoS Vulnerability."
8853| [CVE-2011-2007] Microsoft Host Integration Server (HIS) 2004 SP1, 2006 SP1, 2009, and 2010 allows remote attackers to cause a denial of service (SNA Server service outage) via crafted TCP or UDP traffic, aka "Endless Loop DoS in snabase.exe Vulnerability."
8854| [CVE-2011-2005] afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
8855| [CVE-2011-2004] Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font file, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2011-3402.
8856| [CVE-2011-2003] Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted .fon file, aka "Font Library File Buffer Overrun Vulnerability."
8857| [CVE-2011-2002] win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle TrueType fonts, which allows local users to cause a denial of service (system hang) via a crafted font file, aka "Win32k TrueType Font Type Translation Vulnerability."
8858| [CVE-2011-1991] Multiple untrusted search path vulnerabilities in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .rtf, or .txt file, related to (1) deskpan.dll in the Display Panning CPL Extension, (2) EAPHost Authenticator Service, (3) Folder Redirection, (4) HyperTerminal, (5) the Japanese Input Method Editor (IME), and (6) Microsoft Management Console (MMC), aka "Windows Components Insecure Library Loading Vulnerability."
8859| [CVE-2011-1990] Microsoft Excel 2007 SP2
8860| [CVE-2011-1989] Microsoft Excel 2003 SP3 and 2007 SP2
8861| [CVE-2011-1988] Microsoft Excel 2003 SP3 and 2007 SP2
8862| [CVE-2011-1987] Array index error in Microsoft Excel 2003 SP3 and 2007 SP2
8863| [CVE-2011-1986] Use-after-free vulnerability in Microsoft Excel 2003 SP3 allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Use after Free WriteAV Vulnerability."
8864| [CVE-2011-1985] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer De-reference Vulnerability."
8865| [CVE-2011-1984] WINS in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 allows local users to gain privileges by sending crafted packets over the loopback interface, aka "WINS Local Elevation of Privilege Vulnerability."
8866| [CVE-2011-1983] Use-after-free vulnerability in Microsoft Office 2007 SP2 and SP3, Office 2010 Gold and SP1, and Office for Mac 2011 allows remote attackers to execute arbitrary code via a crafted Word document, aka "Word Use After Free Vulnerability."
8867| [CVE-2011-1982] Microsoft Office 2007 SP2, and 2010 Gold and SP1, does not initialize an unspecified object pointer during the opening of Word documents, which allows remote attackers to execute arbitrary code via a crafted document, aka "Office Uninitialized Object Pointer Vulnerability."
8868| [CVE-2011-1980] Untrusted search path vulnerability in Microsoft Office 2003 SP3 and 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .ppt, or .xls file, aka "Office Component Insecure Library Loading Vulnerability."
8869| [CVE-2011-1979] Microsoft Visio 2003 SP3 and 2007 SP2 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "Move Around the Block RCE Vulnerability."
8870| [CVE-2011-1978] Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4 does not properly validate the System.Net.Sockets trust level, which allows remote attackers to obtain sensitive information or trigger arbitrary outbound network traffic via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Socket Restriction Bypass Vulnerability."
8871| [CVE-2011-1976] Cross-site scripting (XSS) vulnerability in the Report Viewer Control in Microsoft Visual Studio 2005 SP1 and Report Viewer 2005 SP1 allows remote attackers to inject arbitrary web script or HTML via a parameter in a data source, aka "Report Viewer Controls XSS Vulnerability."
8872| [CVE-2011-1975] Untrusted search path vulnerability in the Data Access Tracing component in Windows Data Access Components (Windows DAC) 6.0 in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an Excel .xlsx file, aka "Data Access Components Insecure Library Loading Vulnerability."
8873| [CVE-2011-1974] NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "NDISTAPI Elevation of Privilege Vulnerability."
8874| [CVE-2011-1972] Microsoft Visio 2003 SP3, 2007 SP2, and 2010 Gold and SP1 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "pStream Release RCE Vulnerability."
8875| [CVE-2011-1971] The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly parse file metadata, which allows local users to cause a denial of service (reboot) via a crafted file, aka "Windows Kernel Metadata Parsing DOS Vulnerability."
8876| [CVE-2011-1970] The DNS server in Microsoft Windows Server 2003 SP2 and Windows Server 2008 SP2, R2, and R2 SP1 does not properly initialize memory, which allows remote attackers to cause a denial of service (service outage) via a query for a nonexistent domain, aka "DNS Uninitialized Memory Corruption Vulnerability."
8877| [CVE-2011-1968] The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly process packets in memory, which allows remote attackers to cause a denial of service (reboot) by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, as exploited in the wild in 2011, aka "Remote Desktop Protocol Vulnerability."
8878| [CVE-2011-1967] Winsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka "CSRSS Vulnerability."
8879| [CVE-2011-1966] The DNS server in Microsoft Windows Server 2008 SP2, R2, and R2 SP1 does not properly handle NAPTR queries that trigger recursive processing, which allows remote attackers to execute arbitrary code via a crafted query, aka "DNS NAPTR Query Vulnerability."
8880| [CVE-2011-1965] Tcpip.sys in the TCP/IP stack in Microsoft Windows 7 Gold and SP1 and Windows Server 2008 R2 and R2 SP1 does not properly implement URL-based QoS, which allows remote attackers to cause a denial of service (reboot) via a crafted URL to a web server, aka "TCP/IP QOS Denial of Service Vulnerability."
8881| [CVE-2011-1894] The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for embedded content in an HTML document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted EMBED element in a web page that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability."
8882| [CVE-2011-1893] Cross-site scripting (XSS) vulnerability in Microsoft Office SharePoint Server 2010, Windows SharePoint Services 2.0 and 3.0 SP2, and SharePoint Foundation 2010 allows remote attackers to inject arbitrary web script or HTML via the URI, aka "SharePoint XSS Vulnerability."
8883| [CVE-2011-1892] Microsoft Office Groove 2007 SP2, SharePoint Workspace 2010 Gold and SP1, Office Forms Server 2007 SP2, Office SharePoint Server 2007 SP2, Office SharePoint Server 2010 Gold and SP1, Office Groove Data Bridge Server 2007 SP2, Office Groove Management Server 2007 SP2, Groove Server 2010 Gold and SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, and Office Web Apps 2010 Gold and SP1 do not properly handle Web Parts containing XML classes referencing external entities, which allows remote authenticated users to read arbitrary files via a crafted XML and XSL file, aka "SharePoint Remote File Disclosure Vulnerability."
8884| [CVE-2011-1888] win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Null Pointer De-reference Vulnerability."
8885| [CVE-2011-1887] win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Null Pointer De-reference Vulnerability."
8886| [CVE-2011-1885] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Null Pointer De-reference Vulnerability."
8887| [CVE-2011-1884] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8888| [CVE-2011-1883] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8889| [CVE-2011-1882] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8890| [CVE-2011-1881] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Null Pointer De-reference Vulnerability."
8891| [CVE-2011-1880] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Null Pointer De-reference Vulnerability."
8892| [CVE-2011-1879] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8893| [CVE-2011-1878] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8894| [CVE-2011-1877] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, aka "Win32k Use After Free Vulnerability."
8895| [CVE-2011-1876] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8896| [CVE-2011-1875] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8897| [CVE-2011-1874] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
8898| [CVE-2011-1873] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 on 64-bit platforms does not properly validate pointers during the parsing of OpenType (aka OTF) fonts, which allows remote attackers to execute arbitrary code via a crafted font file, aka "Win32k OTF Validation Vulnerability."
8899| [CVE-2011-1872] Hyper-V in Microsoft Windows Server 2008 Gold, SP2, R2, and R2 SP1 allows guest OS users to cause a denial of service (host OS infinite loop) via malformed machine instructions in a VMBus packet, aka "VMBus Persistent DoS Vulnerability."
8900| [CVE-2011-1871] Tcpip.sys in the TCP/IP stack in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a series of crafted ICMP messages, aka "ICMP Denial of Service Vulnerability."
8901| [CVE-2011-1870] Integer overflow in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP SrvWriteConsoleOutputString Vulnerability."
8902| [CVE-2011-1869] The Distributed File System (DFS) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote DFS servers to cause a denial of service (system hang) via a crafted referral response, aka "DFS Referral Response Vulnerability."
8903| [CVE-2011-1868] The Distributed File System (DFS) implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate fields in DFS responses, which allows remote DFS servers to execute arbitrary code via a crafted response, aka "DFS Memory Corruption Vulnerability."
8904| [CVE-2011-1508] Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, does not properly manage memory allocations for function pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Function Pointer Overwrite Vulnerability."
8905| [CVE-2011-1284] Integer overflow in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP SrvWriteConsoleOutput Vulnerability."
8906| [CVE-2011-1283] The Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2 does not ensure that an unspecified array index has a non-negative value before performing read and write operations, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP SrvSetConsoleNumberOfCommand Vulnerability."
8907| [CVE-2011-1282] The Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly initialize memory and consequently uses a NULL pointer in an unspecified function call, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP SrvSetConsoleLocalEUDC Vulnerability."
8908| [CVE-2011-1281] The Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly restrict the number of console objects for a process, which allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that triggers an incorrect memory assignment for a user transaction, aka "CSRSS Local EOP AllocConsole Vulnerability."
8909| [CVE-2011-1280] The XML Editor in Microsoft InfoPath 2007 SP2 and 2010
8910| [CVE-2011-1279] Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information during parsing of Excel spreadsheets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted spreadsheet, aka "Excel Out of Bounds WriteAV Vulnerability."
8911| [CVE-2011-1278] Microsoft Excel 2002 SP3 and Office 2004 for Mac do not properly validate record information during parsing of Excel spreadsheets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted spreadsheet, aka "Excel WriteAV Vulnerability."
8912| [CVE-2011-1277] Microsoft Excel 2002 SP3, Office 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information during parsing of Excel spreadsheets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted spreadsheet, aka "Excel Memory Corruption Vulnerability."
8913| [CVE-2011-1276] Buffer overflow in Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2
8914| [CVE-2011-1275] Microsoft Excel 2002 SP3
8915| [CVE-2011-1274] Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2
8916| [CVE-2011-1273] Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010
8917| [CVE-2011-1272] Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2
8918| [CVE-2011-1270] Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "Presentation Buffer Overrun RCE Vulnerability."
8919| [CVE-2011-1269] Microsoft PowerPoint 2002 SP3, 2003 SP3, and 2007 SP2
8920| [CVE-2011-1268] The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Response Parsing Vulnerability."
8921| [CVE-2011-1267] The SMB server in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (system hang) via a crafted (1) SMBv1 or (2) SMBv2 request, aka "SMB Request Parsing Vulnerability."
8922| [CVE-2011-1264] Cross-site scripting (XSS) vulnerability in Active Directory Certificate Services Web Enrollment in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "Active Directory Certificate Services Vulnerability."
8923| [CVE-2011-1263] Cross-site scripting (XSS) vulnerability in the logon page in Remote Desktop Web Access (RD Web Access) in Microsoft Windows Server 2008 R2 and R2 SP1 allows remote attackers to inject arbitrary web script or HTML via the URI, aka "Remote Desktop Web Access Vulnerability."
8924| [CVE-2011-1253] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5.1, and 4, and Silverlight 4 before 4.0.60831, does not properly restrict inheritance, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Class Inheritance Vulnerability."
8925| [CVE-2011-1252] Cross-site scripting (XSS) vulnerability in the SafeHTML function in the toStaticHTML API in Microsoft Internet Explorer 7 and 8, Office SharePoint Server 2007 SP2, Office SharePoint Server 2010 Gold and SP1, Groove Server 2010 Gold and SP1, Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified strings, aka "toStaticHTML Information Disclosure Vulnerability" or "HTML Sanitization Vulnerability."
8926| [CVE-2011-1249] The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
8927| [CVE-2011-1248] WINS in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, R2, and R2 SP1 does not properly handle socket send exceptions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets, related to unintended stack-frame values and buffer passing, aka "WINS Service Failed Response Vulnerability."
8928| [CVE-2011-1247] Untrusted search path vulnerability in the Microsoft Active Accessibility component in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Active Accessibility Insecure Library Loading Vulnerability."
8929| [CVE-2011-1242] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8930| [CVE-2011-1241] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8931| [CVE-2011-1240] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8932| [CVE-2011-1239] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8933| [CVE-2011-1238] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8934| [CVE-2011-1237] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8935| [CVE-2011-1236] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8936| [CVE-2011-1235] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8937| [CVE-2011-1234] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8938| [CVE-2011-1233] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8939| [CVE-2011-1232] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8940| [CVE-2011-1231] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8941| [CVE-2011-1230] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8942| [CVE-2011-1229] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8943| [CVE-2011-1228] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8944| [CVE-2011-1227] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8945| [CVE-2011-1226] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8946| [CVE-2011-1225] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8947| [CVE-2011-0980] Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly parse Office Art objects, which allows remote attackers to execute arbitrary code via vectors related to a function pointer, aka "Excel Dangling Pointer Vulnerability."
8948| [CVE-2011-0979] Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010
8949| [CVE-2011-0978] Stack-based buffer overflow in Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2
8950| [CVE-2011-0977] Use-after-free vulnerability in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via malformed shape data in the Office drawing file format, aka "Microsoft Office Graphic Object Dereferencing Vulnerability."
8951| [CVE-2011-0976] Microsoft PowerPoint 2002 SP3, 2003 SP3, and 2007 SP2
8952| [CVE-2011-0677] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8953| [CVE-2011-0676] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
8954| [CVE-2011-0675] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8955| [CVE-2011-0674] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8956| [CVE-2011-0672] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8957| [CVE-2011-0671] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8958| [CVE-2011-0670] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8959| [CVE-2011-0667] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8960| [CVE-2011-0666] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8961| [CVE-2011-0665] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8962| [CVE-2011-0664] Microsoft .NET Framework 2.0 SP1 and SP2, 3.5 Gold and SP1, 3.5.1, and 4.0, and Silverlight 4 before 4.0.60531.0, does not properly validate arguments to unspecified networking API functions, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Array Offset Vulnerability."
8963| [CVE-2011-0662] Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
8964| [CVE-2011-0661] The SMB Server service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate fields in SMB requests, which allows remote attackers to execute arbitrary code via a malformed request in a (1) SMBv1 or (2) SMBv2 packet, aka "SMB Transaction Parsing Vulnerability."
8965| [CVE-2011-0660] The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Response Parsing Vulnerability."
8966| [CVE-2011-0658] Integer underflow in the OLE Automation protocol implementation in VBScript.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted WMF file, aka "OLE Automation Underflow Vulnerability."
8967| [CVE-2011-0657] DNSAPI.dll in the DNS client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process DNS queries, which allows remote attackers to execute arbitrary code via (1) a crafted LLMNR broadcast query or (2) a crafted application, aka "DNS Query Vulnerability."
8968| [CVE-2011-0656] Microsoft PowerPoint 2002 SP3, 2003 SP3, 2007 SP2, and 2010
8969| [CVE-2011-0655] Microsoft PowerPoint 2007 SP2 and 2010
8970| [CVE-2011-0654] Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information.
8971| [CVE-2011-0107] Untrusted search path vulnerability in Microsoft Office XP SP3, Office 2003 SP3, and Office 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Office Component Insecure Library Loading Vulnerability."
8972| [CVE-2011-0105] Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac obtain a certain length value from an uninitialized memory location, which allows remote attackers to trigger a buffer overflow and execute arbitrary code via a crafted Excel file, aka "Excel Data Initialization Vulnerability."
8973| [CVE-2011-0104] Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HLink record in an Excel file, aka "Excel Buffer Overwrite Vulnerability."
8974| [CVE-2011-0103] Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted record information in an Excel file, aka "Excel Memory Corruption Vulnerability."
8975| [CVE-2011-0101] Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RealTimeData record, related to a stTopic field, doubly-byte characters, and an incorrect pointer calculation, aka "Excel Record Parsing WriteAV Vulnerability."
8976| [CVE-2011-0098] Integer signedness error in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010
8977| [CVE-2011-0097] Integer underflow in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010
8978| [CVE-2011-0096] The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for content blocks in a document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability."
8979| [CVE-2011-0093] ELEMENTS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 does not properly parse structures during the opening of a Visio file, which allows remote attackers to execute arbitrary code via a file containing a malformed structure, aka "Visio Data Type Memory Corruption Vulnerability."
8980| [CVE-2011-0092] The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."
8981| [CVE-2011-0091] Kerberos in Microsoft Windows Server 2008 R2 and Windows 7 does not prevent a session from changing from strong encryption to DES encryption, which allows man-in-the-middle attackers to spoof network traffic and obtain sensitive information via a DES downgrade, aka "Kerberos Spoofing Vulnerability."
8982| [CVE-2011-0090] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."
8983| [CVE-2011-0089] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Window Class Improper Pointer Validation Vulnerability."
8984| [CVE-2011-0088] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Window Class Pointer Confusion Vulnerability."
8985| [CVE-2011-0087] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Insufficient User Input Validation Vulnerability."
8986| [CVE-2011-0086] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Improper User Input Validation Vulnerability."
8987| [CVE-2011-0043] Kerberos in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 supports weak hashing algorithms, which allows local users to gain privileges by operating a service that sends crafted service tickets, as demonstrated by the CRC32 algorithm, aka "Kerberos Unkeyed Checksum Vulnerability."
8988| [CVE-2011-0042] SBE.dll in the Stream Buffer Engine in Windows Media Player and Windows Media Center in Microsoft Windows XP SP2 and SP3, Windows XP Media Center Edition 2005 SP3, Windows Vista SP1 and SP2, Windows 7 Gold and SP1, and Windows Media Center TV Pack for Windows Vista does not properly parse Digital Video Recording (.dvr-ms) files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DVR-MS Vulnerability."
8989| [CVE-2011-0041] Integer overflow in gdiplus.dll in GDI+ in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold and SP2, and Office XP SP3 allows remote attackers to execute arbitrary code via a crafted EMF image, aka "GDI+ Integer Overflow Vulnerability."
8990| [CVE-2011-0040] The server in Microsoft Active Directory on Windows Server 2003 SP2 does not properly handle an update request for a service principal name (SPN), which allows remote attackers to cause a denial of service (authentication downgrade or outage) via a crafted request that triggers name collisions, aka "Active Directory SPN Validation Vulnerability."
8991| [CVE-2011-0039] The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LSASS Length Validation Vulnerability."
8992| [CVE-2011-0034] Stack-based buffer overflow in the OpenType Compact Font Format (aka OTF or CFF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted parameter values in an OpenType font, aka "OpenType Font Stack Overflow Vulnerability."
8993| [CVE-2011-0033] The OpenType Compact Font Format (CFF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate parameter values in OpenType fonts, which allows remote attackers to execute arbitrary code via a crafted font, aka "OpenType Font Encoded Character Vulnerability."
8994| [CVE-2011-0032] Untrusted search path vulnerability in DirectShow in Microsoft Windows Vista SP1 and SP2, Windows 7 Gold and SP1, Windows Server 2008 R2 and R2 SP1, and Windows Media Center TV Pack for Windows Vista allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Digital Video Recording (.dvr-ms), Windows Recorded TV Show (.wtv), or .mpg file, aka "DirectShow Insecure Library Loading Vulnerability."
8995| [CVE-2011-0031] The (1) JScript 5.8 and (2) VBScript 5.8 scripting engines in Microsoft Windows Server 2008 R2 and Windows 7 do not properly load decoded scripts obtained from web pages, which allows remote attackers to trigger memory corruption and consequently obtain sensitive information via a crafted web site, aka "Scripting Engines Information Disclosure Vulnerability."
8996| [CVE-2011-0030] The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted application that continues to execute throughout the logout of one user and the login session of the next user, aka "CSRSS Elevation of Privilege Vulnerability," a different vulnerability than CVE-2010-0023.
8997| [CVE-2011-0028] WordPad in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly parse fields in Word documents, which allows remote attackers to execute arbitrary code via a crafted .doc file, aka "WordPad Converter Parsing Vulnerability."
8998| [CVE-2010-5082] Untrusted search path vulnerability in colorcpl.exe 6.0.6000.16386 in the Color Control Panel in Microsoft Windows Server 2008 SP2, R2, and R2 SP1 allows local users to gain privileges via a Trojan horse sti.dll file in the current working directory, as demonstrated by a directory that contains a .camp, .cdmp, .gmmp, .icc, or .icm file, aka "Color Control Panel Insecure Library Loading Vulnerability."
8999| [CVE-2010-4701] Heap-based buffer overflow in the CDrawPoly::Serialize function in fxscover.exe in Microsoft Windows Fax Services Cover Page Editor 5.2 r2 in Windows XP Professional SP3, Server 2003 R2 Enterprise Edition SP2, and Windows 7 Professional allows remote attackers to execute arbitrary code via a long record in a Fax Cover Page (.cov) file. NOTE: some of these details are obtained from third party information.
9000| [CVE-2010-4669] The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7 allows remote attackers to cause a denial of service (CPU consumption and system hang) by sending many Router Advertisement (RA) messages with different source addresses, as demonstrated by the flood_router6 program in the thc-ipv6 package.
9001| [CVE-2010-4562] Microsoft Windows 2008, 7, Vista, 2003, 2000, and XP, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. NOTE: due to a typo, some sources map CVE-2010-4562 to a ProFTPd mod_sql vulnerability, but that issue is covered by CVE-2010-4652.
9002| [CVE-2010-4398] Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."
9003| [CVE-2010-4182] Untrusted search path vulnerability in the Data Access Objects (DAO) library (dao360.dll) in Microsoft Windows XP Professional SP3, Windows Server 2003 R2 Enterprise Edition SP3, Windows Vista Business SP1, and Windows 7 Professional allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse msjet49.dll that is located in the same folder as a file that is processed by dao360.dll. NOTE: the provenance of this information is unknown
9004| [CVE-2010-3974] fxscover.exe in the Fax Cover Page Editor in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly parse FAX cover pages, which allows remote attackers to execute arbitrary code via a crafted .cov file, aka "Fax Cover Page Editor Memory Corruption Vulnerability."
9005| [CVE-2010-3970] Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability."
9006| [CVE-2010-3966] Untrusted search path vulnerability in Microsoft Windows Server 2008 R2 and Windows 7, when BranchCache is supported, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an EML file, an RSS file, or a WPOST file, aka "BranchCache Insecure Library Loading Vulnerability."
9007| [CVE-2010-3965] Untrusted search path vulnerability in Windows Media Encoder 9 on Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Windows Media Profile (PRX) file, aka "Insecure Library Loading Vulnerability."
9008| [CVE-2010-3964] Unrestricted file upload vulnerability in the Document Conversions Launcher Service in Microsoft Office SharePoint Server 2007 SP2, when the Document Conversions Load Balancer Service is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka "Malformed Request Code Execution Vulnerability."
9009| [CVE-2010-3963] Buffer overflow in the Routing and Remote Access NDProxy component in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, related to the Routing and Remote Access service (RRAS) and improper copying from user mode to the kernel, aka "Kernel NDProxy Buffer Overflow Vulnerability."
9010| [CVE-2010-3961] The Consent User Interface (UI) in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle an unspecified registry-key value, which allows local users with SeImpersonatePrivilege rights to gain privileges via a crafted application, aka "Consent UI Impersonation Vulnerability."
9011| [CVE-2010-3960] Hyper-V in Microsoft Windows Server 2008 Gold, SP2, and R2 allows guest OS users to cause a denial of service (host OS hang) by sending a crafted encapsulated packet over the VMBus, aka "Hyper-V VMBus Vulnerability."
9012| [CVE-2010-3959] The OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a crafted CMAP table in an OpenType font, aka "OpenType CMAP Table Vulnerability."
9013| [CVE-2010-3958] The x86 JIT compiler in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 does not properly compile function calls, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Stack Corruption Vulnerability."
9014| [CVE-2010-3957] Double free vulnerability in the OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Double Free Vulnerability."
9015| [CVE-2010-3956] The OpenType Font (OTF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly perform array indexing, which allows local users to gain privileges via a crafted OpenType font, aka "OpenType Font Index Vulnerability."
9016| [CVE-2010-3955] pubconv.dll (aka the Publisher Converter DLL) in Microsoft Publisher 2002 SP3 does not properly perform array indexing, which allows remote attackers to execute arbitrary code via a crafted Publisher file that uses an old file format, aka "Array Indexing Memory Corruption Vulnerability."
9017| [CVE-2010-3954] Microsoft Publisher 2002 SP3, 2003 SP3, and 2010 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Publisher file, aka "Microsoft Publisher Memory Corruption Vulnerability."
9018| [CVE-2010-3946] Integer overflow in the PICT image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted PICT image in an Office document, aka "PICT Image Converter Integer Overflow Vulnerability."
9019| [CVE-2010-3945] Buffer overflow in the CGM image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted CGM image in an Office document, aka "CGM Image Converter Buffer Overrun Vulnerability."
9020| [CVE-2010-3944] win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."
9021| [CVE-2010-3943] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly link driver objects, which allows local users to gain privileges via a crafted application that triggers linked-list corruption, aka "Win32k Cursor Linking Vulnerability."
9022| [CVE-2010-3942] win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for copies from user mode, which allows local users to gain privileges via a crafted application, aka "Win32k WriteAV Vulnerability."
9023| [CVE-2010-3941] Double free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold and SP2, and Windows 7 allows local users to gain privileges via a crafted application, aka "Win32k Double Free Vulnerability."
9024| [CVE-2010-3940] Double free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a crafted application, aka "Win32k PFE Pointer Double Free Vulnerability."
9025| [CVE-2010-3939] Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via vectors related to improper memory allocation for copies from user mode, aka "Win32k Buffer Overflow Vulnerability."
9026| [CVE-2010-3937] Microsoft Exchange Server 2007 SP2 on the x64 platform allows remote authenticated users to cause a denial of service (infinite loop and MSExchangeIS outage) via a crafted RPC request, aka "Exchange Server Infinite Loop Vulnerability."
9027| [CVE-2010-3338] The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the security context of scheduled tasks, which allows local users to gain privileges via a crafted application, aka "Task Scheduler Vulnerability." NOTE: this might overlap CVE-2010-3888.
9028| [CVE-2010-3337] Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Loading Vulnerability." NOTE: this might overlap CVE-2010-3141 and CVE-2010-3142.
9029| [CVE-2010-3336] Microsoft Office XP SP3, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "MSO Large SPID Read AV Vulnerability."
9030| [CVE-2010-3335] Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "Drawing Exception Handling Vulnerability."
9031| [CVE-2010-3334] Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Office document containing an Office Art Drawing record with crafted msofbtSp records and unspecified flags, which triggers memory corruption, aka "Office Art Drawing Records Vulnerability."
9032| [CVE-2010-3333] Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."
9033| [CVE-2010-3332] Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
9034| [CVE-2010-3324] The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka "HTML Sanitization Vulnerability," a different vulnerability than CVE-2010-1257.
9035| [CVE-2010-3243] Cross-site scripting (XSS) vulnerability in the toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2 and Office SharePoint Server 2007 SP2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "HTML Sanitization Vulnerability."
9036| [CVE-2010-3242] Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Ghost Record Type Parsing Vulnerability."
9037| [CVE-2010-3241] Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate binary file-format information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Out-of-Bounds Memory Write in Parsing Vulnerability."
9038| [CVE-2010-3240] Microsoft Excel 2002 SP3 and 2007 SP2
9039| [CVE-2010-3239] Microsoft Excel 2002 SP3 does not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Extra Out of Boundary Record Parsing Vulnerability."
9040| [CVE-2010-3238] Microsoft Excel 2002 SP3 and 2003 SP3, and Office 2004 for Mac, does not properly validate binary file-format information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Negative Future Function Vulnerability."
9041| [CVE-2010-3237] Microsoft Excel 2002 SP3 and Office 2004 for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Merge Cell Record Pointer Vulnerability."
9042| [CVE-2010-3236] Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Out Of Bounds Array Vulnerability."
9043| [CVE-2010-3235] Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Formula Biff Record Vulnerability."
9044| [CVE-2010-3234] Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Formula Substream Memory Corruption Vulnerability."
9045| [CVE-2010-3233] Microsoft Excel 2002 SP3 and 2003 SP3 does not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted .wk3 (aka Lotus 1-2-3 workbook) file, aka "Lotus 1-2-3 Workbook Parsing Vulnerability."
9046| [CVE-2010-3232] Microsoft Excel 2003 SP3 and 2007 SP2
9047| [CVE-2010-3231] Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Excel Record Parsing Memory Corruption Vulnerability."
9048| [CVE-2010-3230] Integer overflow in Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel document with crafted record information, aka "Excel Record Parsing Integer Overflow Vulnerability."
9049| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
9050| [CVE-2010-3227] Stack-based buffer overflow in the UpdateFrameTitleForDocument method in the CFrameWnd class in mfc42.dll in the Microsoft Foundation Class (MFC) Library in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows context-dependent attackers to execute arbitrary code via a long window title that this library attempts to create at the request of an application, as demonstrated by the Trident PowerZip 7.2 Build 4010 application, aka "Windows MFC Document Title Updating Buffer Overflow Vulnerability."
9051| [CVE-2010-3223] The user interface in Microsoft Cluster Service (MSCS) in Microsoft Windows Server 2008 R2 does not properly set administrative-share permissions for new cluster disks that are shared as part of a failover cluster, which allows remote attackers to read or modify data on these disks via requests to the associated share, aka "Permissions on New Cluster Disks Vulnerability."
9052| [CVE-2010-3222] Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability."
9053| [CVE-2010-3221] Microsoft Word 2002 SP3 and 2003 SP3, Office 2004 for Mac, and Word Viewer do not properly handle a malformed record during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Parsing Vulnerability."
9054| [CVE-2010-3220] Unspecified vulnerability in Microsoft Word 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Parsing Vulnerability."
9055| [CVE-2010-3219] Array index vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Index Parsing Vulnerability."
9056| [CVE-2010-3218] Heap-based buffer overflow in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via malformed records in a Word document, aka "Word Heap Overflow Vulnerability."
9057| [CVE-2010-3217] Double free vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a Word document with crafted List Format Override (LFO) records, aka "Word Pointer Vulnerability."
9058| [CVE-2010-3216] Microsoft Word 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a crafted Word document containing bookmarks that trigger use of an invalid pointer and memory corruption, aka "Word Bookmarks Vulnerability."
9059| [CVE-2010-3215] Microsoft Word 2002 SP3 and Office 2004 for Mac do not properly handle unspecified return values during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Return Value Vulnerability."
9060| [CVE-2010-3214] Stack-based buffer overflow in Microsoft Word 2002 SP3, 2003 SP3, 2007 SP2, and 2010
9061| [CVE-2010-3213] Cross-site request forgery (CSRF) vulnerability in Microsoft Outlook Web Access (owa/ev.owa) 2007 through SP2 allows remote attackers to hijack the authentication of e-mail users for requests that perform Outlook requests, as demonstrated by setting the auto-forward rule.
9062| [CVE-2010-3200] MSO.dll in Microsoft Word 2003 SP3 11.8326.11.8324 allows remote attackers to cause a denial of service (NULL pointer dereference and multiple-instance application crash) via a crafted buffer in a Word document, as demonstrated by word_crash_11.8326.8324_poc.doc.
9063| [CVE-2010-3190] Untrusted search path vulnerability in the Microsoft Foundation Class (MFC) Library in Microsoft Visual Studio .NET 2003 SP1
9064| [CVE-2010-3148] Untrusted search path vulnerability in Microsoft Visio 2003 SP3 allows local users to gain privileges via a Trojan horse mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .vsd, .vdx, .vst, or .vtx file, aka "Microsoft Visio Insecure Library Loading Vulnerability."
9065| [CVE-2010-3147] Untrusted search path vulnerability in wab.exe 6.00.2900.5512 in Windows Address Book in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a Trojan horse wab32res.dll file in the current working directory, as demonstrated by a directory that contains a Windows Address Book (WAB), VCF (aka vCard), or P7C file, aka "Insecure Library Loading Vulnerability." NOTE: the codebase for this product may overlap the codebase for the product referenced in CVE-2010-3143.
9066| [CVE-2010-3146] Multiple untrusted search path vulnerabilities in Microsoft Groove 2007 SP2 allow local users to gain privileges via a Trojan horse (1) mso.dll or (2) GroovePerfmon.dll file in the current working directory, as demonstrated by a directory that contains a Groove vCard (.vcg) or Groove Tool Archive (.gta) file, aka "Microsoft Groove Insecure Library Loading Vulnerability."
9067| [CVE-2010-3144] Untrusted search path vulnerability in the Internet Connection Signup Wizard in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a Trojan horse smmscrpt.dll file in the current working directory, as demonstrated by a directory that contains an ISP or INS file, aka "Internet Connection Signup Wizard Insecure Library Loading Vulnerability."
9068| [CVE-2010-3142] Untrusted search path vulnerability in Microsoft Office PowerPoint 2007 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse rpawinet.dll that is located in the same folder as a .odp, .pothtml, .potm, .potx, .ppa, .ppam, .pps, .ppt, .ppthtml, .pptm, .pptxml, .pwz, .sldm, .sldx, and .thmx file.
9069| [CVE-2010-2750] Array index error in Microsoft Word 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Index Vulnerability."
9070| [CVE-2010-2748] Microsoft Word 2002 SP3 and Office 2004 for Mac do not properly check an unspecified boundary during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Boundary Check Vulnerability."
9071| [CVE-2010-2747] Microsoft Word 2002 SP3 and Office 2004 for Mac do not properly handle an uninitialized pointer during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Uninitialized Pointer Vulnerability."
9072| [CVE-2010-2746] Heap-based buffer overflow in Comctl32.dll (aka the common control library) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when a third-party SVG viewer is used, allows remote attackers to execute arbitrary code via a crafted HTML document that triggers unspecified messages from this viewer, aka "Comctl32 Heap Overflow Vulnerability."
9073| [CVE-2010-2744] The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly manage a window class, which allows local users to gain privileges by creating a window, then using (1) the SetWindowLongPtr function to modify the popup menu structure, or (2) the SwitchWndProc function with a switch window information pointer, which is not re-initialized when a WM_NCCREATE message is processed, aka "Win32k Window Class Vulnerability."
9074| [CVE-2010-2742] The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability."
9075| [CVE-2010-2741] The OpenType Font (OTF) format driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 performs an incorrect integer calculation during font processing, which allows local users to gain privileges via a crafted application, aka "OpenType Font Validation Vulnerability."
9076| [CVE-2010-2740] The OpenType Font (OTF) format driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly perform memory allocation during font parsing, which allows local users to gain privileges via a crafted application, aka "OpenType Font Parsing Vulnerability."
9077| [CVE-2010-2739] Buffer overflow in the CreateDIBPalette function in win32k.sys in Microsoft Windows XP SP3, Server 2003 R2 Enterprise SP2, Vista Business SP1, Windows 7, and Server 2008 SP2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code by performing a clipboard operation (GetClipboardData API function) with a crafted bitmap with a palette that contains a large number of colors.
9078| [CVE-2010-2738] The Uniscribe (aka new Unicode Script Processor) implementation in USP10.DLL in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2, and Microsoft Office XP SP3, 2003 SP3, and 2007 SP2, does not properly validate tables associated with malformed OpenType fonts, which allows remote attackers to execute arbitrary code via a crafted (1) web site or (2) Office document, aka "Uniscribe Font Parsing Engine Memory Corruption Vulnerability."
9079| [CVE-2010-2729] The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability."
9080| [CVE-2010-2728] Heap-based buffer overflow in Microsoft Outlook 2002 SP3, 2003 SP3, and 2007 SP2, when Online Mode for an Exchange Server is enabled, allows remote attackers to execute arbitrary code via a crafted e-mail message, aka "Heap Based Buffer Overflow in Outlook Vulnerability."
9081| [CVE-2010-2573] Integer underflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3, PowerPoint Viewer SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Integer Underflow Causes Heap Corruption Vulnerability."
9082| [CVE-2010-2572] Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka "PowerPoint Parsing Buffer Overflow Vulnerability."
9083| [CVE-2010-2571] Array index error in pubconv.dll (aka the Publisher Converter DLL) in Microsoft Publisher 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher 97 file, aka "Memory Corruption Due To Invalid Index Into Array in Pubconv.dll Vulnerability."
9084| [CVE-2010-2570] Heap-based buffer overflow in pubconv.dll (aka the Publisher Converter DLL) in Microsoft Publisher 2002 SP3, 2003 SP3, 2007 SP2, and 2010 allows remote attackers to execute arbitrary code via a crafted Publisher file that uses an old file format, aka "Heap Overrun in pubconv.dll Vulnerability."
9085| [CVE-2010-2569] pubconv.dll (aka the Publisher Converter DLL) in Microsoft Publisher 2002 SP3, 2003 SP3, and 2007 SP2 does not properly handle an unspecified size field in certain older file formats, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted Publisher file, aka "Size Value Heap Corruption in pubconv.dll Vulnerability."
9086| [CVE-2010-2568] Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
9087| [CVE-2010-2567] The RPC client implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly allocate memory during the parsing of responses, which allows remote RPC servers and man-in-the-middle attackers to execute arbitrary code via a malformed response, aka "RPC Memory Corruption Vulnerability."
9088| [CVE-2010-2566] The Secure Channel (aka SChannel) security package in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, does not properly validate certificate request messages from TLS and SSL servers, which allows remote servers to execute arbitrary code via a crafted SSL response, aka "SChannel Malformed Certificate Request Remote Code Execution Vulnerability."
9089| [CVE-2010-2563] The Word 97 text converter in the WordPad Text Converters in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly parse malformed structures in Word 97 documents, which allows remote attackers to execute arbitrary code via a crafted document containing an unspecified value that is used in a loop counter, aka "WordPad Word 97 Text Converter Memory Corruption Vulnerability."
9090| [CVE-2010-2562] Microsoft Office Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly parse the Excel file format, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Excel file, aka "Excel Memory Corruption Vulnerability."
9091| [CVE-2010-2555] The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the length of strings in the registry, which allows local users to gain privileges or cause a denial of service (memory corruption) via vectors involving a long string, aka "Tracing Memory Corruption Vulnerability."
9092| [CVE-2010-2554] The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 has incorrect ACLs on its registry keys, which allows local users to gain privileges via vectors involving a named pipe and impersonation, aka "Tracing Registry Key ACL Vulnerability."
9093| [CVE-2010-2552] Stack consumption vulnerability in the SMB Server in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to cause a denial of service (system hang) via a malformed SMBv2 compounded request, aka "SMB Stack Exhaustion Vulnerability."
9094| [CVE-2010-2551] The SMB Server in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate an internal variable in an SMB packet, which allows remote attackers to cause a denial of service (system hang) via a crafted (1) SMBv1 or (2) SMBv2 packet, aka "SMB Variable Validation Vulnerability."
9095| [CVE-2010-2550] The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate fields in an SMB request, which allows remote attackers to execute arbitrary code via a crafted SMB packet, aka "SMB Pool Overflow Vulnerability."
9096| [CVE-2010-2549] Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges or cause a denial of service (system crash) by using a large number of calls to the NtUserCheckAccessForIntegrityLevel function to trigger a failure in the LockProcessByClientId function, leading to deletion of an in-use process object, aka "Win32k Reference Count Vulnerability."
9097| [CVE-2010-2265] Cross-site scripting (XSS) vulnerability in the GetServerName function in sysinfo/commonFunc.js in Microsoft Windows Help and Support Center for Windows XP and Windows Server 2003 allows remote attackers to inject arbitrary web script or HTML via the svr parameter to sysinfo/sysinfomain.htm. NOTE: this can be leveraged with CVE-2010-1885 to execute arbitrary commands without user interaction.
9098| [CVE-2010-2091] Microsoft Outlook Web Access (OWA) 8.2.254.0, when Internet Explorer 7 on Windows Server 2003 is used, does not properly handle the id parameter in a Folder IPF.Note action to the default URI, which might allow remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via an invalid value.
9099| [CVE-2010-2084] Microsoft ASP.NET 2.0 does not prevent setting the InnerHtml property on a control that inherits from HtmlContainerControl, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to an attribute.
9100| [CVE-2010-1903] Microsoft Office Word 2002 SP3 and 2003 SP3, and Office Word Viewer, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed record in a Word file, aka "Word HTML Linked Objects Memory Corruption Vulnerability."
9101| [CVE-2010-1902] Buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2
9102| [CVE-2010-1901] Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2
9103| [CVE-2010-1900] Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2
9104| [CVE-2010-1898] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP1, 2.0 SP2, 3.5, 3.5 SP1, and 3.5.1, and Microsoft Silverlight 2 and 3 before 3.0.50611.0 on Windows and before 3.0.41130.0 on Mac OS X, does not properly handle interfaces and delegations to virtual methods, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate Vulnerability."
9105| [CVE-2010-1897] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback parameters during window creation, which allows local users to gain privileges via a crafted application, aka "Win32k Window Creation Vulnerability."
9106| [CVE-2010-1896] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2 do not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Win32k User Input Validation Vulnerability."
9107| [CVE-2010-1895] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly perform memory allocation before copying user-mode data to kernel mode, which allows local users to gain privileges via a crafted application, aka "Win32k Pool Overflow Vulnerability."
9108| [CVE-2010-1894] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly handle unspecified exceptions, which allows local users to gain privileges via a crafted application, aka "Win32k Exception Handling Vulnerability."
9109| [CVE-2010-1893] Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows Networking Vulnerability."
9110| [CVE-2010-1892] The TCP/IP stack in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle malformed IPv6 packets, which allows remote attackers to cause a denial of service (system hang) via multiple crafted packets, aka "IPv6 Memory Corruption Vulnerability."
9111| [CVE-2010-1891] The Client/Server Runtime Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2, when a Chinese, Japanese, or Korean locale is enabled, does not properly allocate memory for transactions, which allows local users to gain privileges via a crafted application, aka "CSRSS Local Elevation of Privilege Vulnerability."
9112| [CVE-2010-1890] The kernel in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate ACLs on kernel objects, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Improper Validation Vulnerability."
9113| [CVE-2010-1889] Double free vulnerability in the kernel in Microsoft Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2, allows local users to gain privileges via a crafted application, related to object initialization during error handling, aka "Windows Kernel Double Free Vulnerability."
9114| [CVE-2010-1887] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate an unspecified system-call argument, which allows local users to cause a denial of service (system hang) via a crafted application, aka "Win32k Bounds Checking Vulnerability."
9115| [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
9116| [CVE-2010-1885] The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability."
9117| [CVE-2010-1883] Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted table in an embedded font, aka "Embedded OpenType Font Integer Overflow Vulnerability."
9118| [CVE-2010-1882] Multiple buffer overflows in the MPEG Layer-3 Audio Codec for Microsoft DirectShow in l3codecx.ax in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allow remote attackers to execute arbitrary code via an MPEG Layer-3 audio stream in (1) a crafted media file or (2) crafted streaming content, aka "MPEG Layer-3 Audio Decoder Buffer Overflow Vulnerability."
9119| [CVE-2010-1881] The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka "ACCWIZ.dll Uninitialized Variable Vulnerability."
9120| [CVE-2010-1880] Unspecified vulnerability in Quartz.dll for DirectShow on Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1, and Server 2008 allows remote attackers to execute arbitrary code via a media file with crafted compression data, aka "MJPEG Media Decompression Vulnerability."
9121| [CVE-2010-1735] The SfnLOGONNOTIFY function in win32k.sys in the kernel in Microsoft Windows 2000, XP, and Server 2003 allows local users to cause a denial of service (system crash) via a 0x4c value in the second argument (aka the Msg argument) of a PostMessage function call for the DDEMLEvent window.
9122| [CVE-2010-1734] The SfnINSTRING function in win32k.sys in the kernel in Microsoft Windows 2000, XP, and Server 2003 allows local users to cause a denial of service (system crash) via a 0x18d value in the second argument (aka the Msg argument) of a PostMessage function call for the DDEMLEvent window.
9123| [CVE-2010-1690] The DNS implementation in smtpsvc.dll before 6.0.2600.5949 in Microsoft Windows 2000 SP4 and earlier, Windows XP SP3 and earlier, Windows Server 2003 SP2 and earlier, Windows Server 2008 SP2 and earlier, Windows Server 2008 R2, Exchange Server 2003 SP3 and earlier, Exchange Server 2007 SP2 and earlier, and Exchange Server 2010 does not verify that transaction IDs of responses match transaction IDs of queries, which makes it easier for man-in-the-middle attackers to spoof DNS responses, a different vulnerability than CVE-2010-0024 and CVE-2010-0025.
9124| [CVE-2010-1689] The DNS implementation in smtpsvc.dll before 6.0.2600.5949 in Microsoft Windows 2000 SP4 and earlier, Windows XP SP3 and earlier, Windows Server 2003 SP2 and earlier, Windows Server 2008 SP2 and earlier, Windows Server 2008 R2, Exchange Server 2003 SP3 and earlier, Exchange Server 2007 SP2 and earlier, and Exchange Server 2010 uses predictable transaction IDs that are formed by incrementing a previous ID by 1, which makes it easier for man-in-the-middle attackers to spoof DNS responses, a different vulnerability than CVE-2010-0024 and CVE-2010-0025.
9125| [CVE-2010-1263] Windows Shell and WordPad in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7
9126| [CVE-2010-1257] Cross-site scripting (XSS) vulnerability in the toStaticHTML API, as used in Microsoft Office InfoPath 2003 SP3, 2007 SP1, and 2007 SP2
9127| [CVE-2010-1255] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 allows local users to execute arbitrary code via vectors related to "glyph outline information" and TrueType fonts, aka "Win32k TrueType Font Parsing Vulnerability."
9128| [CVE-2010-1253] Microsoft Office Excel 2002 SP3, 2007 SP1, and SP2
9129| [CVE-2010-1252] Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Excel file, aka "Excel String Variable Vulnerability."
9130| [CVE-2010-1251] Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Excel file, aka "Excel Record Stack Corruption Vulnerability."
9131| [CVE-2010-1250] Heap-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with malformed (1) EDG (0x88) and (2) Publisher (0x89) records, aka "Excel EDG Memory Corruption Vulnerability."
9132| [CVE-2010-1249] Buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with a malformed ExternName (0x23) record, aka "Excel Memory Corruption Vulnerability," a different vulnerability than CVE-2010-0823 and CVE-2010-1247.
9133| [CVE-2010-1248] Buffer overflow in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Excel file with a malformed HFPicture (0x866) record, aka "Excel HFPicture Memory Corruption Vulnerability."
9134| [CVE-2010-1247] Unspecified vulnerability in Microsoft Office Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel file with a malformed RTD (0x813) record that triggers heap corruption, aka "Excel Memory Corruption Vulnerability," a different vulnerability than CVE-2010-0823 and CVE-2010-1249.
9135| [CVE-2010-1246] Stack-based buffer overflow in Microsoft Office Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel file with a malformed RTD (0x813) record, aka "Excel RTD Memory Corruption Vulnerability."
9136| [CVE-2010-1245] Unspecified vulnerability in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with a malformed SxView (0xB0) record, aka "Excel Record Memory Corruption Vulnerability," a different vulnerability than CVE-2010-0824 and CVE-2010-0821.
9137| [CVE-2010-1225] The memory-management implementation in the Virtual Machine Monitor (aka VMM or hypervisor) in Microsoft Virtual PC 2007 Gold and SP1, Virtual Server 2005 Gold and R2 SP1, and Windows Virtual PC does not properly restrict access from the guest OS to memory locations in the VMM work area, which allows context-dependent attackers to bypass certain anti-exploitation protection mechanisms on the guest OS via crafted input to a vulnerable application. NOTE: the vendor reportedly found that only systems with an otherwise vulnerable application are affected, because "the memory areas accessible from the guest cannot be leveraged to achieve either remote code execution or elevation of privilege and ... no data from the host is exposed to the guest OS."
9138| [CVE-2010-1175] Microsoft Internet Explorer 7.0 on Windows XP and Windows Server 2003 allows remote attackers to have an unspecified impact via a certain XML document that references a crafted web site in the SRC attribute of an image element, related to a "0day Vulnerability."
9139| [CVE-2010-0917] Stack-based buffer overflow in VBScript in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, might allow user-assisted remote attackers to execute arbitrary code via a long string in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution when the F1 key is pressed, a different vulnerability than CVE-2010-0483.
9140| [CVE-2010-0824] Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Excel file with a malformed WOPT (0x80B) record, aka "Excel Record Memory Corruption Vulnerability," a different vulnerability than CVE-2010-0821 and CVE-2010-1245.
9141| [CVE-2010-0823] Unspecified vulnerability in Microsoft Office Excel 2002 SP3, 2003 SP3, 2007 SP1 and SP2
9142| [CVE-2010-0822] Stack-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with a crafted OBJ (0x5D) record, aka "Excel Object Stack Overflow Vulnerability."
9143| [CVE-2010-0821] Unspecified vulnerability in Microsoft Office Excel 2002 SP3, 2003 SP3, 2007 SP1 and SP2
9144| [CVE-2010-0820] Heap-based buffer overflow in the Local Security Authority Subsystem Service (LSASS), as used in Active Directory in Microsoft Windows Server 2003 SP2 and Windows Server 2008 Gold, SP2, and R2
9145| [CVE-2010-0819] Unspecified vulnerability in the Windows OpenType Compact Font Format (CFF) driver in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users to execute arbitrary code via unknown vectors related to improper validation when copying data from user mode to kernel mode, aka "OpenType CFF Font Driver Memory Corruption Vulnerability."
9146| [CVE-2010-0818] The MPEG-4 codec in the Windows Media codecs in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 does not properly handle crafted media content with MPEG-4 video encoding, which allows remote attackers to execute arbitrary code via a file in an unspecified "supported format," aka "MPEG-4 Codec Vulnerability."
9147| [CVE-2010-0817] Cross-site scripting (XSS) vulnerability in _layouts/help.aspx in Microsoft SharePoint Server 2007 12.0.0.6421 and possibly earlier, and SharePoint Services 3.0 SP1 and SP2, versions, allows remote attackers to inject arbitrary web script or HTML via the cid0 parameter.
9148| [CVE-2010-0815] VBE6.DLL in Microsoft Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Visual Basic for Applications (VBA), and VBA SDK 6.3 through 6.5 does not properly search for ActiveX controls that are embedded in documents, which allows remote attackers to execute arbitrary code via a crafted document, aka "VBE6.DLL Stack Memory Corruption Vulnerability."
9149| [CVE-2010-0814] The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka "Access ActiveX Control Vulnerability."
9150| [CVE-2010-0812] Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to bypass intended IPv4 source-address restrictions via a mismatched IPv6 source address in a tunneled ISATAP packet, aka "ISATAP IPv6 Source Address Spoofing Vulnerability."
9151| [CVE-2010-0811] Multiple unspecified vulnerabilities in the Microsoft Internet Explorer 8 Developer Tools ActiveX control in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute arbitrary code via unknown vectors that "corrupt the system state," aka "Microsoft Internet Explorer 8 Developer Tools Vulnerability."
9152| [CVE-2010-0810] The kernel in Microsoft Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, does not properly handle unspecified exceptions, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Exception Handler Vulnerability."
9153| [CVE-2010-0719] An unspecified API in Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7 does not validate arguments, which allows local users to cause a denial of service (system crash) via a crafted application.
9154| [CVE-2010-0487] The Authenticode Signature verification functionality in cabview.dll in Cabinet File Viewer Shell Extension 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows remote attackers to execute arbitrary code via a modified cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "Cabview Corruption Validation Vulnerability."
9155| [CVE-2010-0486] The WinVerifyTrust function in Authenticode Signature Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows user-assisted remote attackers to execute arbitrary code via a modified (1) Portable Executable (PE) or (2) cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "WinVerifyTrust Signature Validation Vulnerability."
9156| [CVE-2010-0485] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 "do not properly validate all callback parameters when creating a new window," which allows local users to execute arbitrary code, aka "Win32k Window Creation Vulnerability."
9157| [CVE-2010-0484] The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 "do not properly validate changes in certain kernel objects," which allows local users to execute arbitrary code via vectors related to Device Contexts (DC) and the GetDCEx function, aka "Win32k Improper Data Validation Vulnerability."
9158| [CVE-2010-0483] vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability."
9159| [CVE-2010-0482] The kernel in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate relocation sections of image files, which allows local users to cause a denial of service (reboot) via a crafted file, aka "Windows Kernel Malformed Image Vulnerability."
9160| [CVE-2010-0481] The kernel in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly translate a registry key's virtual path to its real path, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Virtual Path Parsing Vulnerability."
9161| [CVE-2010-0480] Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability."
9162| [CVE-2010-0479] Buffer overflow in Microsoft Office Publisher 2002 SP3, 2003 SP3, and 2007 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Microsoft Office Publisher File Conversion TextBox Processing Buffer Overflow Vulnerability."
9163| [CVE-2010-0478] Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability."
9164| [CVE-2010-0477] The SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly handle (1) SMBv1 and (2) SMBv2 response packets, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted packet that causes the client to read the entirety of the response, and then improperly interact with the Winsock Kernel (WSK), aka "SMB Client Message Size Vulnerability."
9165| [CVE-2010-0476] The SMB client in Microsoft Windows Server 2003 SP2, Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted SMB transaction response that uses (1) SMBv1 or (2) SMBv2, aka "SMB Client Response Parsing Vulnerability."
9166| [CVE-2010-0278] A certain ActiveX control in msgsc.14.0.8089.726.dll in Microsoft Windows Live Messenger 2009 build 14.0.8089.726 on Windows Vista and Windows 7 allows remote attackers to cause a denial of service (msnmsgr.exe crash) by calling the ViewProfile method with a crafted argument during an MSN Messenger session.
9167| [CVE-2010-0270] The SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate fields in SMB transaction responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Transaction Vulnerability."
9168| [CVE-2010-0269] The SMB client in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for SMB responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Memory Allocation Vulnerability."
9169| [CVE-2010-0268] Unspecified vulnerability in the Windows Media Player ActiveX control in Windows Media Player (WMP) 9 on Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows remote attackers to execute arbitrary code via crafted media content, aka "Media Player Remote Code Execution Vulnerability."
9170| [CVE-2010-0266] Microsoft Office Outlook 2002 SP3, 2003 SP3, and 2007 SP1 and SP2 does not properly verify e-mail attachments with a PR_ATTACH_METHOD property value of ATTACH_BY_REFERENCE, which allows user-assisted remote attackers to execute arbitrary code via a crafted message, aka "Microsoft Outlook SMB Attachment Vulnerability."
9171| [CVE-2010-0265] Buffer overflow in Microsoft Windows Movie Maker 2.1, 2.6, and 6.0, and Microsoft Producer 2003, allows remote attackers to execute arbitrary code via a crafted project (.MSWMM) file, aka "Movie Maker and Producer Buffer Overflow Vulnerability."
9172| [CVE-2010-0264] Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Microsoft Office Excel DbOrParamQry Record Parsing Vulnerability."
9173| [CVE-2010-0263] Microsoft Office Excel 2007 SP1 and SP2
9174| [CVE-2010-0262] Microsoft Office Excel 2007 SP1 and SP2 and Office 2004 for Mac do not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet that triggers access of an uninitialized stack variable, aka "Microsoft Office Excel FNGROUPNAME Record Uninitialized Memory Vulnerability."
9175| [CVE-2010-0261] Heap-based buffer overflow in Microsoft Office Excel 2007 SP1 and SP2 and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted spreadsheet in which "a MDXSET record is broken up into several records," aka "Microsoft Office Excel MDXSET Record Heap Overflow Vulnerability."
9176| [CVE-2010-0260] Heap-based buffer overflow in Microsoft Office Excel 2007 SP1 and SP2
9177| [CVE-2010-0258] Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2
9178| [CVE-2010-0257] Microsoft Office Excel 2002 SP3 does not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Microsoft Office Excel Record Memory Corruption Vulnerability."
9179| [CVE-2010-0256] Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 and SP2 does not properly calculate unspecified indexes associated with Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Visio Index Calculation Memory Corruption Vulnerability."
9180| [CVE-2010-0254] Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 and SP2 does not properly validate attributes in Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Visio Attribute Validation Memory Corruption Vulnerability."
9181| [CVE-2010-0252] The Microsoft Data Analyzer ActiveX control (aka the Office Excel ActiveX control for Data Analysis) in max3activex.dll in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted web page that corrupts the "system state," aka "Microsoft Data Analyzer ActiveX Control Vulnerability."
9182| [CVE-2010-0250] Heap-based buffer overflow in DirectShow in Microsoft DirectX, as used in the AVI Filter on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2, and in Quartz on Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, allows remote attackers to execute arbitrary code via an AVI file with a crafted length field in an unspecified video stream, which is not properly handled by the RLE video decompressor, aka "DirectShow Heap Overflow Vulnerability."
9183| [CVE-2010-0249] Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4
9184| [CVE-2010-0243] Buffer overflow in MSO.DLL in Microsoft Office XP SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Office document, aka "MSO.DLL Buffer Overflow."
9185| [CVE-2010-0242] The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows remote attackers to cause a denial of service (system hang) via crafted packets with malformed TCP selective acknowledgement (SACK) values, aka "TCP/IP Selective Acknowledgement Vulnerability."
9186| [CVE-2010-0241] The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when IPv6 is enabled, does not properly perform bounds checking on ICMPv6 Route Information packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "ICMPv6 Route Information Vulnerability."
9187| [CVE-2010-0240] The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when a custom network driver is used, does not properly handle local fragmentation of Encapsulating Security Payload (ESP) over UDP packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "Header MDL Fragmentation Vulnerability."
9188| [CVE-2010-0239] The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when IPv6 is enabled, does not properly perform bounds checking on ICMPv6 Router Advertisement packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "ICMPv6 Router Advertisement Vulnerability."
9189| [CVE-2010-0238] Unspecified vulnerability in registry-key validation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Registry Key Vulnerability."
9190| [CVE-2010-0237] The kernel in Microsoft Windows 2000 SP4 and XP SP2 and SP3 allows local users to gain privileges by creating a symbolic link from an untrusted registry hive to a trusted registry hive, aka "Windows Kernel Symbolic Link Creation Vulnerability."
9191| [CVE-2010-0236] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not properly allocate memory for the destination key associated with a symbolic-link registry key, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Allocation Vulnerability."
9192| [CVE-2010-0235] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not perform the expected validation before creating a symbolic link, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Symbolic Link Value Vulnerability."
9193| [CVE-2010-0234] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate a registry-key argument to an unspecified system call, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Null Pointer Vulnerability."
9194| [CVE-2010-0233] Double free vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows local users to gain privileges via a crafted application, aka "Windows Kernel Double Free Vulnerability."
9195| [CVE-2010-0232] The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges by crafting a VDM_TIB data structure in the Thread Environment Block (TEB), and then calling the NtVdmControl function to start the Windows Virtual DOS Machine (aka NTVDM) subsystem, leading to improperly handled exceptions involving the #GP trap handler (nt!KiTrap0D), aka "Windows Kernel Exception Handler Vulnerability."
9196| [CVE-2010-0231] The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not use a sufficient source of entropy, which allows remote attackers to obtain access to files and other SMB resources via a large number of authentication requests, related to server-generated challenges, certain "duplicate values," and spoofing of an authentication token, aka "SMB NTLM Authentication Lack of Entropy Vulnerability."
9197| [CVE-2010-0035] The Key Distribution Center (KDC) in Kerberos in Microsoft Windows 2000 SP4, Server 2003 SP2, and Server 2008 Gold and SP2, when a trust relationship with a non-Windows Kerberos realm exists, allows remote authenticated users to cause a denial of service (NULL pointer dereference and domain controller outage) via a crafted Ticket Granting Ticket (TGT) renewal request, aka "Kerberos Null Pointer Dereference Vulnerability."
9198| [CVE-2010-0034] Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "Office PowerPoint Viewer TextCharsAtom Record Stack Overflow Vulnerability."
9199| [CVE-2010-0033] Stack-based buffer overflow in Microsoft Office PowerPoint 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Viewer TextBytesAtom Record Stack Overflow Vulnerability."
9200| [CVE-2010-0032] Use-after-free vulnerability in Microsoft Office PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "OEPlaceholderAtom Use After Free Vulnerability."
9201| [CVE-2010-0031] Array index error in Microsoft Office PowerPoint 2002 SP3 and 2003 SP3, and PowerPoint in Office 2004 for Mac, allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint OEPlaceholderAtom 'placementId' Invalid Array Indexing Vulnerability."
9202| [CVE-2010-0030] Heap-based buffer overflow in Microsoft Office PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint LinkedSlideAtom Heap Overflow Vulnerability."
9203| [CVE-2010-0029] Buffer overflow in Microsoft Office PowerPoint 2002 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint File Path Handling Buffer Overflow Vulnerability."
9204| [CVE-2010-0028] Integer overflow in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted JPEG (.JPG) file, aka "MS Paint Integer Overflow Vulnerability."
9205| [CVE-2010-0027] The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input parameters, which allows remote attackers to execute arbitrary local programs via a crafted URL, aka "URL Validation Vulnerability."
9206| [CVE-2010-0026] The Hyper-V server implementation in Microsoft Windows Server 2008 Gold, SP2, and R2 on the x64 platform allows guest OS users to cause a denial of service (host OS hang) via a crafted application that executes a malformed series of machine instructions, aka "Hyper-V Instruction Set Validation Vulnerability."
9207| [CVE-2010-0025] The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2000 SP3, does not properly allocate memory for SMTP command replies, which allows remote attackers to read fragments of e-mail messages by sending a series of invalid commands and then sending a STARTTLS command, aka "SMTP Memory Allocation Vulnerability."
9208| [CVE-2010-0024] The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2003 SP2, does not properly parse MX records, which allows remote DNS servers to cause a denial of service (service outage) via a crafted response to a DNS MX record query, aka "SMTP Server MX Record Vulnerability."
9209| [CVE-2010-0023] The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted application that continues to execute throughout the logout of one user and the login session of the next user, aka "CSRSS Local Privilege Elevation Vulnerability."
9210| [CVE-2010-0022] The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate the share and servername fields in SMB packets, which allows remote attackers to cause a denial of service (system hang) via a crafted packet, aka "SMB Null Pointer Vulnerability."
9211| [CVE-2010-0021] Multiple race conditions in the SMB implementation in the Server service in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allow remote attackers to cause a denial of service (system hang) via a crafted (1) SMBv1 or (2) SMBv2 Negotiate packet, aka "SMB Memory Corruption Vulnerability."
9212| [CVE-2010-0020] The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate request fields, which allows remote authenticated users to execute arbitrary code via a malformed request, aka "SMB Pathname Overflow Vulnerability."
9213| [CVE-2010-0018] Integer overflow in the Embedded OpenType (EOT) Font Engine (t2embed.dll) in Microsoft Windows 2000 SP4
9214| [CVE-2010-0017] Race condition in the SMB client implementation in Microsoft Windows Server 2008 R2 and Windows 7 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code, and in the SMB client implementation in Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges, via a crafted SMB Negotiate response, aka "SMB Client Race Condition Vulnerability."
9215| [CVE-2010-0016] The SMB client implementation in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate response fields, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted response, aka "SMB Client Pool Corruption Vulnerability."
9216| [CVE-2009-4313] ir32_32.dll 3.24.15.3 in the Indeo32 codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to cause a denial of service (heap corruption) or execute arbitrary code via malformed data in a stream in a media file, as demonstrated by an AVI file.
9217| [CVE-2009-4312] Unspecified vulnerability in the Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via crafted media content, as reported to Microsoft by Dave Lenoe of Adobe.
9218| [CVE-2009-4311] Unspecified vulnerability in the Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via crafted media content, as reported to Microsoft by Paul Byrne of NGS Software. NOTE: this might overlap CVE-2008-3615.
9219| [CVE-2009-4310] Stack-based buffer overflow in the Intel Indeo41 codec for Windows Media Player in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via crafted compressed video data in an IV41 stream in a media file, leading to many loop iterations, as demonstrated by data in an AVI file.
9220| [CVE-2009-4309] Heap-based buffer overflow in the Intel Indeo41 codec for Windows Media Player in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a large size value in a movi record in an IV41 stream in a media file, as demonstrated by an AVI file.
9221| [CVE-2009-4210] The Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted media content.
9222| [CVE-2009-3830] The download functionality in Team Services in Microsoft Office SharePoint Server 2007 12.0.0.4518 and 12.0.0.6219 allows remote attackers to read ASP.NET source code via pathnames in the SourceUrl and Source parameters to _layouts/download.aspx.
9223| [CVE-2009-3678] Integer overflow in cdd.dll in the Canonical Display Driver (CDD) in Microsoft Windows Server 2008 R2 and Windows 7 on 64-bit platforms, when the Windows Aero theme is installed, allows context-dependent attackers to cause a denial of service (reboot) or possibly execute arbitrary code via a crafted image file that triggers incorrect data parsing after user-mode data is copied to kernel mode, as demonstrated using "Browse with Irfanview" and certain actions on a folder containing a large number of thumbnail images in Resample mode, possibly related to the ATI graphics driver or win32k.sys, aka "Canonical Display Driver Integer Overflow Vulnerability."
9224| [CVE-2009-3677] The Internet Authentication Service (IAS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly verify the credentials in an MS-CHAP v2 Protected Extensible Authentication Protocol (PEAP) authentication request, which allows remote attackers to access network resources via a malformed request, aka "MS-CHAP Authentication Bypass Vulnerability."
9225| [CVE-2009-3676] The SMB client in the kernel in Microsoft Windows Server 2008 R2 and Windows 7 allows remote SMB servers and man-in-the-middle attackers to cause a denial of service (infinite loop and system hang) via a (1) SMBv1 or (2) SMBv2 response packet that contains (a) an incorrect length value in a NetBIOS header or (b) an additional length field at the end of this response packet, aka "SMB Client Incomplete Response Vulnerability."
9226| [CVE-2009-3675] LSASS.exe in the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote authenticated users to cause a denial of service (CPU consumption) via a malformed ISAKMP request over IPsec, aka "Local Security Authority Subsystem Service Resource Exhaustion Vulnerability."
9227| [CVE-2009-3450] Multiple cross-site scripting (XSS) vulnerabilities in WebCoreModule.ashx in RADactive I-Load before 2008.2.5.0 allow remote attackers to inject arbitrary web script or HTML via parameters with names beginning with __ (underscore underscore) sequences, which are incompatible with an XSS protection mechanism provided by Microsoft ASP.NET.
9228| [CVE-2009-3135] Stack-based buffer overflow in Microsoft Office Word 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, Open XML File Format Converter for Mac, Office Word Viewer 2003 SP3, and Office Word Viewer allow remote attackers to execute arbitrary code via a Word document with a malformed File Information Block (FIB) structure, aka "Microsoft Office Word File Information Memory Corruption Vulnerability."
9229| [CVE-2009-3134] Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2
9230| [CVE-2009-3133] Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a spreadsheet containing a malformed object that triggers memory corruption, related to "loading Excel records," aka "Excel Document Parsing Memory Corruption Vulnerability."
9231| [CVE-2009-3132] Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2
9232| [CVE-2009-3131] Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2
9233| [CVE-2009-3130] Heap-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a spreadsheet containing a malformed Binary File Format (aka BIFF) record that triggers memory corruption, aka "Excel Document Parsing Heap Overflow Vulnerability."
9234| [CVE-2009-3129] Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2
9235| [CVE-2009-3128] Microsoft Office Excel 2002 SP3 and 2003 SP3, and Office Excel Viewer 2003 SP3, does not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a spreadsheet with a malformed record object, aka "Excel SxView Memory Corruption Vulnerability."
9236| [CVE-2009-3127] Microsoft Office Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, Open XML File Format Converter for Mac, and Office Excel Viewer 2003 SP3 do not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Cache Memory Corruption Vulnerability."
9237| [CVE-2009-3126] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Integer Overflow Vulnerability."
9238| [CVE-2009-3103] Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
9239| [CVE-2009-3020] win32k.sys in Microsoft Windows Server 2003 SP2 allows remote attackers to cause a denial of service (system crash) by referencing a crafted .eot file in the src descriptor of an @font-face Cascading Style Sheets (CSS) rule in an HTML document, possibly related to the Embedded OpenType (EOT) Font Engine, a different vulnerability than CVE-2006-0010, CVE-2009-0231, and CVE-2009-0232. NOTE: some of these details are obtained from third party information.
9240| [CVE-2009-2653] ** DISPUTED ** The NtUserConsoleControl function in win32k.sys in Microsoft Windows XP SP2 and SP3, and Server 2003 before SP1, allows local administrators to bypass unspecified "security software" and gain privileges via a crafted call that triggers an overwrite of an arbitrary memory location. NOTE: the vendor disputes the significance of this report, stating that 'the Administrator to SYSTEM "escalation" is not a security boundary we defend.'
9241| [CVE-2009-2532] Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC do not properly process the command value in an SMB Multi-Protocol Negotiate Request packet, which allows remote attackers to execute arbitrary code via a crafted SMBv2 packet to the Server service, aka "SMBv2 Command Value Vulnerability."
9242| [CVE-2009-2526] Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 do not properly validate fields in SMBv2 packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted packet to the Server service, aka "SMBv2 Infinite Loop Vulnerability."
9243| [CVE-2009-2524] Integer underflow in the NTLM authentication feature in the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to cause a denial of service (reboot) via a malformed packet, aka "Local Security Authority Subsystem Service Integer Overflow Vulnerability."
9244| [CVE-2009-2523] The License Logging Server (llssrv.exe) in Microsoft Windows 2000 SP4 allows remote attackers to execute arbitrary code via an RPC message containing a string without a null terminator, which triggers a heap-based buffer overflow in the LlsrLicenseRequestW method, aka "License Logging Server Heap Overflow Vulnerability."
9245| [CVE-2009-2519] The DHTML Editing Component ActiveX control in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly format HTML markup, which allows remote attackers to execute arbitrary code via a crafted web site that triggers "system state" corruption, aka "DHTML Editing Component ActiveX Control Vulnerability."
9246| [CVE-2009-2517] The kernel in Microsoft Windows Server 2003 SP2 does not properly handle unspecified exceptions when an error condition occurs, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Exception Handler Vulnerability."
9247| [CVE-2009-2516] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly validate data sent from user mode, which allows local users to gain privileges via a crafted PE .exe file that triggers a NULL pointer dereference during chain traversal, aka "Windows Kernel NULL Pointer Dereference Vulnerability."
9248| [CVE-2009-2515] Integer underflow in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows local users to gain privileges via a crafted application that triggers an incorrect truncation of a 64-bit integer to a 32-bit integer, aka "Windows Kernel Integer Underflow Vulnerability."
9249| [CVE-2009-2514] win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not correctly parse font code during construction of a directory-entry table, which allows remote attackers to execute arbitrary code via a crafted Embedded OpenType (EOT) font, aka "Win32k EOT Parsing Vulnerability."
9250| [CVE-2009-2513] The Graphics Device Interface (GDI) in win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Insufficient Data Validation Vulnerability."
9251| [CVE-2009-2511] Integer overflow in the CryptoAPI component in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows man-in-the-middle attackers to spoof arbitrary SSL servers and other entities via an X.509 certificate that has a malformed ASN.1 Object Identifier (OID) and was issued by a legitimate Certification Authority, aka "Integer Overflow in X.509 Object Identifiers Vulnerability."
9252| [CVE-2009-2510] The CryptoAPI component in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, as used by Internet Explorer and other applications, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, aka "Null Truncation in X.509 Common Name Vulnerability," a related issue to CVE-2009-2408.
9253| [CVE-2009-2509] Active Directory Federation Services (ADFS) in Microsoft Windows Server 2003 SP2 and Server 2008 Gold and SP2 does not properly validate headers in HTTP requests, which allows remote authenticated users to execute arbitrary code via a crafted request to an IIS web server, aka "Remote Code Execution in ADFS Vulnerability."
9254| [CVE-2009-2508] The single sign-on implementation in Active Directory Federation Services (ADFS) in Microsoft Windows Server 2003 SP2 and Server 2008 Gold and SP2 does not properly remove credentials at the end of a network session, which allows physically proximate attackers to obtain the credentials of a previous user of the same web browser by using data from the browser's cache, aka "Single Sign On Spoofing in ADFS Vulnerability."
9255| [CVE-2009-2507] A certain ActiveX control in the Indexing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly process URLs, which allows remote attackers to execute arbitrary programs via unspecified vectors that cause a "vulnerable binary" to load and run, aka "Memory Corruption in Indexing Service Vulnerability."
9256| [CVE-2009-2506] Integer overflow in the text converters in Microsoft Office Word 2002 SP3 and 2003 SP3
9257| [CVE-2009-2505] The Internet Authentication Service (IAS) in Microsoft Windows Vista SP2 and Server 2008 SP2 does not properly validate MS-CHAP v2 Protected Extensible Authentication Protocol (PEAP) authentication requests, which allows remote attackers to execute arbitrary code via crafted structures in a malformed request, aka "Internet Authentication Service Memory Corruption Vulnerability."
9258| [CVE-2009-2504] Multiple integer overflows in unspecified APIs in GDI+ in Microsoft .NET Framework 1.1 SP1, .NET Framework 2.0 SP1 and SP2, Windows XP SP2 and SP3, Windows Server 2003 SP2, Vista Gold and SP1, Server 2008 Gold, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allow remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "GDI+ .NET API Vulnerability."
9259| [CVE-2009-2503] GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Windows Server 2003 SP2, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 does not properly allocate an unspecified buffer, which allows remote attackers to execute arbitrary code via a crafted TIFF image file that triggers memory corruption, aka "GDI+ TIFF Memory Corruption Vulnerability."
9260| [CVE-2009-2502] Buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted TIFF image file, aka "GDI+ TIFF Buffer Overflow Vulnerability."
9261| [CVE-2009-2501] Heap-based buffer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted PNG image file, aka "GDI+ PNG Heap Overflow Vulnerability."
9262| [CVE-2009-2500] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted WMF image file, aka "GDI+ WMF Integer Overflow Vulnerability."
9263| [CVE-2009-2498] Microsoft Windows Media Format Runtime 9.0, 9.5, and 11 and Windows Media Services 9.1 and 2008 do not properly parse malformed headers in Advanced Systems Format (ASF) files, which allows remote attackers to execute arbitrary code via a crafted (1) .asf, (2) .wmv, or (3) .wma file, aka "Windows Media Header Parsing Invalid Free Vulnerability."
9264| [CVE-2009-2497] The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0, 2.0 SP1, 2.0 SP2, 3.5, and 3.5 SP1, and Silverlight 2, does not properly handle interfaces, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted Silverlight application, (3) a crafted ASP.NET application, or (4) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Vulnerability."
9265| [CVE-2009-2496] Heap-based buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Office Web Components Heap Corruption Vulnerability."
9266| [CVE-2009-2495] The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1 does not properly enforce string termination, which allows remote attackers to obtain sensitive information via a crafted HTML document with an ATL (1) component or (2) control that triggers a buffer over-read, related to ATL headers and buffer allocation, aka "ATL Null String Vulnerability."
9267| [CVE-2009-2494] The Active Template Library (ATL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via vectors related to erroneous free operations after reading a variant from a stream and deleting this variant, aka "ATL Object Type Mismatch Vulnerability."
9268| [CVE-2009-2493] The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1
9269| [CVE-2009-1930] The Telnet service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote Telnet servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, aka "Telnet Credential Reflection Vulnerability," a related issue to CVE-2000-0834.
9270| [CVE-2009-1929] Heap-based buffer overflow in the Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2
9271| [CVE-2009-1928] Stack consumption vulnerability in the LDAP service in Active Directory on Microsoft Windows 2000 SP4, Server 2003 SP2, and Server 2008 Gold and SP2
9272| [CVE-2009-1926] Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to cause a denial of service (TCP outage) via a series of TCP sessions that have pending data and a (1) small or (2) zero receive window size, and remain in the FIN-WAIT-1 or FIN-WAIT-2 state indefinitely, aka "TCP/IP Orphaned Connections Vulnerability."
9273| [CVE-2009-1925] The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 does not properly manage state information, which allows remote attackers to execute arbitrary code by sending packets to a listening service, and thereby triggering misinterpretation of an unspecified field as a function pointer, aka "TCP/IP Timestamps Code Execution Vulnerability."
9274| [CVE-2009-1924] Integer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 allows remote WINS replication partners to execute arbitrary code via crafted data structures in a packet, aka "WINS Integer Overflow Vulnerability."
9275| [CVE-2009-1923] Heap-based buffer overflow in the Windows Internet Name Service (WINS) component for Microsoft Windows 2000 SP4 and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted WINS replication packet that triggers an incorrect buffer-length calculation, aka "WINS Heap Overflow Vulnerability."
9276| [CVE-2009-1922] The Message Queuing (aka MSMQ) service for Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP2, and Vista Gold does not properly validate unspecified IOCTL request data from user mode before passing this data to kernel mode, which allows local users to gain privileges via a crafted request, aka "MSMQ Null Pointer Vulnerability."
9277| [CVE-2009-1546] Integer overflow in Avifil32.dll in the Windows Media file handling functionality in Microsoft Windows allows remote attackers to execute arbitrary code on a Windows 2000 SP4 system via a crafted AVI file, or cause a denial of service on a Windows XP SP2 or SP3, Server 2003 SP2, Vista Gold, SP1, or SP2, or Server 2008 Gold or SP2 system via a crafted AVI file, aka "AVI Integer Overflow Vulnerability."
9278| [CVE-2009-1545] Unspecified vulnerability in Avifil32.dll in the Windows Media file handling functionality in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a malformed header in a crafted AVI file, aka "Malformed AVI Header Vulnerability."
9279| [CVE-2009-1544] Double free vulnerability in the Workstation service in Microsoft Windows allows remote authenticated users to gain privileges via a crafted RPC message to a Windows XP SP2 or SP3 or Server 2003 SP2 system, or cause a denial of service via a crafted RPC message to a Vista Gold, SP1, or SP2 or Server 2008 Gold or SP2 system, aka "Workstation Service Memory Corruption Vulnerability."
9280| [CVE-2009-1542] The Virtual Machine Monitor (VMM) in Microsoft Virtual PC 2004 SP1, 2007, and 2007 SP1, and Microsoft Virtual Server 2005 R2 SP1, does not enforce CPU privilege-level requirements for all machine instructions, which allows guest OS users to execute arbitrary kernel-mode code and gain privileges within the guest OS via a crafted application, aka "Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability."
9281| [CVE-2009-1539] The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DirectX Size Validation Vulnerability."
9282| [CVE-2009-1538] The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 performs updates to pointers without properly validating unspecified data values, which allows remote attackers to execute arbitrary code via a crafted QuickTime media file, aka "DirectX Pointer Validation Vulnerability."
9283| [CVE-2009-1537] Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted QuickTime media file, as exploited in the wild in May 2009, aka "DirectX NULL Byte Overwrite Vulnerability."
9284| [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
9285| [CVE-2009-1534] Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote attackers to execute arbitrary code via crafted property values, aka "Office Web Components Buffer Overflow Vulnerability."
9286| [CVE-2009-1533] Buffer overflow in the Works for Windows document converters in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, Office 2007 SP1, and Works 8.5 and 9 allows remote attackers to execute arbitrary code via a crafted Works .wps file that triggers memory corruption, aka "File Converter Buffer Overflow Vulnerability."
9287| [CVE-2009-1491] McAfee GroupShield for Microsoft Exchange on Exchange Server 2000, and possibly other anti-virus or anti-spam products from McAfee or other vendors, does not scan X- headers for malicious content, which allows remote attackers to bypass virus detection via a crafted message, as demonstrated by a message with an X-Testing header and no message body.
9288| [CVE-2009-1216] Multiple unspecified vulnerabilities in (1) unlzh.c and (2) unpack.c in the gzip libraries in Microsoft Windows Server 2008, Windows Services for UNIX 3.0 and 3.5, and the Subsystem for UNIX-based Applications (SUA)
9289| [CVE-2009-1141] Microsoft Internet Explorer 6 for Windows XP SP2 and SP3 and Server 2003 SP2 allows remote attackers to execute arbitrary code via unspecified DHTML function calls related to a tr element and the "insertion, deletion and attributes of a table cell," which trigger memory corruption when the window is destroyed, aka "DHTML Object Memory Corruption Vulnerability."
9290| [CVE-2009-1139] Memory leak in the LDAP service in Active Directory on Microsoft Windows 2000 SP4 and Server 2003 SP2, and Active Directory Application Mode (ADAM) on Windows XP SP2 and SP3 and Server 2003 SP2, allows remote attackers to cause a denial of service (memory consumption and service outage) via (1) LDAP or (2) LDAPS requests with unspecified OID filters, aka "Active Directory Memory Leak Vulnerability."
9291| [CVE-2009-1138] The LDAP service in Active Directory on Microsoft Windows 2000 SP4 does not properly free memory for LDAP and LDAPS requests, which allows remote attackers to execute arbitrary code via a request that uses hexadecimal encoding, whose associated memory is not released, related to a "DN AttributeValue," aka "Active Directory Invalid Free Vulnerability." NOTE: this issue is probably a memory leak.
9292| [CVE-2009-1137] Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0226, and CVE-2009-0227.
9293| [CVE-2009-1136] The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka "Office Web Components HTML Script Vulnerability."
9294| [CVE-2009-1135] Microsoft Internet Security and Acceleration (ISA) Server 2006 Gold and SP1, when Radius OTP is enabled, uses the HTTP-Basic authentication method, which allows remote attackers to gain the privileges of an arbitrary account, and access published web pages, via vectors involving attempted access to a network resource behind the ISA Server, aka "Radius OTP Bypass Vulnerability."
9295| [CVE-2009-1134] Excel in 2007 Microsoft Office System SP1 and SP2
9296| [CVE-2009-1133] Heap-based buffer overflow in Microsoft Remote Desktop Connection (formerly Terminal Services Client) running RDP 5.0 through 6.1 on Windows, and Remote Desktop Connection Client for Mac 2.0, allows remote attackers to execute arbitrary code via unspecified parameters, aka "Remote Desktop Connection Heap Overflow Vulnerability."
9297| [CVE-2009-1132] Heap-based buffer overflow in the Wireless LAN AutoConfig Service (aka Wlansvc) in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a malformed wireless frame, aka "Wireless Frame Parsing Remote Code Execution Vulnerability."
9298| [CVE-2009-1131] Multiple stack-based buffer overflows in Microsoft Office PowerPoint 2000 SP3 allow remote attackers to execute arbitrary code via a large amount of data associated with unspecified atoms in a PowerPoint file that triggers memory corruption, aka "Data Out of Bounds Vulnerability."
9299| [CVE-2009-1130] Heap-based buffer overflow in Microsoft Office PowerPoint 2002 SP3 and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a crafted structure in a Notes container in a PowerPoint file that causes PowerPoint to read more data than was allocated when creating a C++ object, leading to an overwrite of a function pointer, aka "Heap Corruption Vulnerability."
9300| [CVE-2009-1129] Multiple stack-based buffer overflows in the PowerPoint 95 importer (PP7X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allow remote attackers to execute arbitrary code via an inconsistent record length in sound data in a file that uses a PowerPoint 95 (PPT95) native file format, aka "PP7 Memory Corruption Vulnerability," a different vulnerability than CVE-2009-1128.
9301| [CVE-2009-1128] Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 95 native file format, leading to memory corruption, aka "PP7 Memory Corruption Vulnerability," a different vulnerability than CVE-2009-1129.
9302| [CVE-2009-1127] win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not correctly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k NULL Pointer Dereferencing Vulnerability."
9303| [CVE-2009-1126] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate the user-mode input associated with the editing of an unspecified desktop parameter, which allows local users to gain privileges via a crafted application, aka "Windows Desktop Parameter Edit Vulnerability."
9304| [CVE-2009-1125] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application, aka "Windows Driver Class Registration Vulnerability."
9305| [CVE-2009-1124] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate user-mode pointers in unspecified error conditions, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Pointer Validation Vulnerability."
9306| [CVE-2009-1123] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability."
9307| [CVE-2009-1122] The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka "IIS 5.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1535.
9308| [CVE-2009-1043] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors triggered by clicking on a link, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
9309| [CVE-2009-1011] Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is for multiple integer overflows in a function that parses an optional data stream within a Microsoft Office file, leading to a heap-based buffer overflow.
9310| [CVE-2009-0901] The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1
9311| [CVE-2009-0568] The RPC Marshalling Engine (aka NDR) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly maintain its internal state, which allows remote attackers to overwrite arbitrary memory locations via a crafted RPC message that triggers incorrect pointer reading, related to "IDL interfaces containing a non-conformant varying array" and FC_SMVARRAY, FC_LGVARRAY, FC_VARIABLE_REPEAT, and FC_VARIABLE_OFFSET, aka "RPC Marshalling Engine Vulnerability."
9312| [CVE-2009-0566] Microsoft Office Publisher 2007 SP1 does not properly calculate object handler data for Publisher files, which allows remote attackers to execute arbitrary code via a crafted file in a legacy format that triggers memory corruption, aka "Pointer Dereference Vulnerability."
9313| [CVE-2009-0565] Buffer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, and 2007 SP1 and SP2
9314| [CVE-2009-0563] Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2
9315| [CVE-2009-0562] The Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 does not properly allocate memory, which allows remote attackers to execute arbitrary code via unspecified vectors that trigger "system state" corruption, aka "Office Web Components Memory Allocation Vulnerability."
9316| [CVE-2009-0561] Integer overflow in Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac
9317| [CVE-2009-0560] Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac
9318| [CVE-2009-0559] Stack-based buffer overflow in Excel in Microsoft Office 2000 SP3 and Office XP SP3 allows remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "String Copy Stack-Based Overrun Vulnerability."
9319| [CVE-2009-0558] Array index error in Excel in Microsoft Office 2000 SP3 and Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac, allows remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Array Indexing Memory Corruption Vulnerability."
9320| [CVE-2009-0557] Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac
9321| [CVE-2009-0556] Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."
9322| [CVE-2009-0554] Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability."
9323| [CVE-2009-0553] Microsoft Internet Explorer 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability."
9324| [CVE-2009-0552] Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 on Windows XP SP2 and SP3, and 6 on Windows Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability."
9325| [CVE-2009-0551] Microsoft Internet Explorer 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 does not properly handle transition errors in a request for one HTTP document followed by a request for a second HTTP document, which allows remote attackers to execute arbitrary code via vectors involving (1) multiple crafted pages on a web site or (2) a web page with crafted inline content such as banner advertisements, aka "Page Transition Memory Corruption Vulnerability."
9326| [CVE-2009-0550] Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008
9327| [CVE-2009-0549] Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac
9328| [CVE-2009-0320] Microsoft Windows XP, Server 2003 and 2008, and Vista exposes I/O activity measurements of all processes, which allows local users to obtain sensitive information, as demonstrated by reading the I/O Other Bytes column in Task Manager (aka taskmgr.exe) to estimate the number of characters that a different user entered at a runas.exe password prompt, related to a "benchmarking attack."
9329| [CVE-2009-0239] Cross-site scripting (XSS) vulnerability in Windows Search 4.0 for Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows user-assisted remote attackers to inject arbitrary web script or HTML via a crafted file that appears in a preview in a search result, aka "Script Execution in Windows Search Vulnerability."
9330| [CVE-2009-0238] Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1
9331| [CVE-2009-0235] Stack-based buffer overflow in the Word 97 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted Word 97 file that triggers memory corruption, related to use of inconsistent integer data sizes for an unspecified length field, aka "WordPad Word 97 Text Converter Stack Overflow Vulnerability."
9332| [CVE-2009-0234] The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 does not properly cache crafted DNS responses, which makes it easier for remote attackers to predict transaction IDs and poison caches by sending many crafted DNS queries that trigger "unnecessary lookups," aka "DNS Server Response Validation Vulnerability."
9333| [CVE-2009-0233] The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not reuse cached DNS responses in all applicable situations, which makes it easier for remote attackers to predict transaction IDs and poison caches by simultaneously sending crafted DNS queries and responses, aka "DNS Server Query Validation Vulnerability."
9334| [CVE-2009-0232] Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted name table, aka "Embedded OpenType Font Integer Overflow Vulnerability."
9335| [CVE-2009-0231] The Embedded OpenType (EOT) Font Engine (T2EMBED.DLL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted name table in a data record that triggers an integer truncation and a heap-based buffer overflow, aka "Embedded OpenType Font Heap Overflow Vulnerability."
9336| [CVE-2009-0230] The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability."
9337| [CVE-2009-0229] The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability."
9338| [CVE-2009-0228] Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a a crafted ShareName in a response to an RPC request, related to "printing data structures," aka "Buffer Overflow in Print Spooler Vulnerability."
9339| [CVE-2009-0227] Stack-based buffer overflow in the PowerPoint 4.2 conversion filter (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a large number of structures in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0226, and CVE-2009-1137.
9340| [CVE-2009-0226] Stack-based buffer overflow in the PowerPoint 4.2 conversion filter in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a long string in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0227, and CVE-2009-1137.
9341| [CVE-2009-0225] Microsoft Office PowerPoint 2002 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 95 native file format, leading to improper "array indexing" and memory corruption, aka "PP7 Memory Corruption Vulnerability."
9342| [CVE-2009-0224] Microsoft Office PowerPoint 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1 and SP2
9343| [CVE-2009-0223] Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0226, CVE-2009-0227, and CVE-2009-1137.
9344| [CVE-2009-0222] Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 4.0 native file format, leading to a "pointer overwrite" and memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0223, CVE-2009-0226, CVE-2009-0227, and CVE-2009-1137.
9345| [CVE-2009-0221] Integer overflow in Microsoft Office PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a PowerPoint file containing a crafted record type for "collaboration information for different slides" that contains a field that specifies a large number of records, which triggers an under-allocated buffer and a heap-based buffer overflow, aka "Integer Overflow Vulnerability."
9346| [CVE-2009-0220] Multiple stack-based buffer overflows in the PowerPoint 4.0 importer (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allow remote attackers to execute arbitrary code via crafted formatting data for paragraphs in a file that uses a PowerPoint 4.0 native file format, related to (1) an incorrect calculation from a record header, or (2) an interget that is used to specify the number of bytes to copy, aka "Legacy File Format Vulnerability."
9347| [CVE-2009-0202] Array index error in FL21WIN.DLL in the PowerPoint Freelance Windows 2.1 Translator in Microsoft PowerPoint 2000 and 2002 allows remote attackers to execute arbitrary code via a Freelance file with unspecified "layout information" that triggers a heap-based buffer overflow.
9348| [CVE-2009-0102] Microsoft Project 2000 SR1 and 2002 SP1, and Office Project 2003 SP3, does not properly handle memory allocation for Project files, which allows remote attackers to execute arbitrary code via a malformed file, aka "Project Memory Validation Vulnerability."
9349| [CVE-2009-0100] Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1
9350| [CVE-2009-0099] The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."
9351| [CVE-2009-0098] Microsoft Exchange 2000 Server SP3, Exchange Server 2003 SP2, and Exchange Server 2007 SP1 do not properly interpret Transport Neutral Encapsulation (TNEF) properties, which allows remote attackers to execute arbitrary code via a crafted TNEF message, aka "Memory Corruption Vulnerability."
9352| [CVE-2009-0097] Microsoft Office Visio 2002 SP2 and 2003 SP3 does not properly validate memory allocation for Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Memory Corruption Vulnerability."
9353| [CVE-2009-0096] Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 does not properly perform memory copy operations for object data, which allows remote attackers to execute arbitrary code via a crafted Visio document, aka "Memory Corruption Vulnerability."
9354| [CVE-2009-0095] Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 does not properly validate object data in Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Memory Validation Vulnerability."
9355| [CVE-2009-0094] The WINS server in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 does not restrict registration of the (1) "wpad" and (2) "isatap" NetBIOS names, which allows remote authenticated users to hijack the Web Proxy Auto-Discovery (WPAD) and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) features, and conduct man-in-the-middle attacks by spoofing a proxy server or ISATAP route, by registering one of these names in the WINS database, aka "WPAD WINS Server Registration Vulnerability," a related issue to CVE-2007-1692.
9356| [CVE-2009-0093] Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not restrict registration of the "wpad" hostname, which allows remote authenticated users to hijack the Web Proxy Auto-Discovery (WPAD) feature, and conduct man-in-the-middle attacks by spoofing a proxy server, via a Dynamic Update request for this hostname, aka "DNS Server Vulnerability in WPAD Registration Vulnerability," a related issue to CVE-2007-1692.
9357| [CVE-2009-0091] Microsoft .NET Framework 2.0, 2.0 SP1, and 3.5 does not properly enforce a certain type-equality constraint in .NET verifiable code, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Type Verification Vulnerability."
9358| [CVE-2009-0090] Microsoft .NET Framework 1.0 SP3, 1.1 SP1, and 2.0 SP1 does not properly validate .NET verifiable code, which allows remote attackers to obtain unintended access to stack memory, and execute arbitrary code, via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Pointer Verification Vulnerability."
9359| [CVE-2009-0089] Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Vista Gold allows remote web servers to impersonate arbitrary https web sites by using DNS spoofing to "forward a connection" to a different https web site that has a valid certificate matching its own domain name, but not a certificate matching the domain name of the host requested by the user, aka "Windows HTTP Services Certificate Name Mismatch Vulnerability."
9360| [CVE-2009-0088] The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability."
9361| [CVE-2009-0087] Unspecified vulnerability in the Word 6 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2
9362| [CVE-2009-0086] Integer underflow in Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote HTTP servers to execute arbitrary code via crafted parameter values in a response, related to error handling, aka "Windows HTTP Services Integer Underflow Vulnerability."
9363| [CVE-2009-0085] The Secure Channel (aka SChannel) authentication component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, when certificate authentication is used, does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages, which allows remote attackers to spoof authentication by crafting a TLS packet based on knowledge of the certificate but not the private key, aka "SChannel Spoofing Vulnerability."
9364| [CVE-2009-0083] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 does not properly handle invalid pointers, which allows local users to gain privileges via an application that triggers use of a crafted pointer, aka "Windows Kernel Invalid Pointer Vulnerability."
9365| [CVE-2009-0082] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate handles, which allows local users to gain privileges via a crafted application that triggers unspecified "actions," aka "Windows Kernel Handle Validation Vulnerability."
9366| [CVE-2009-0081] The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability."
9367| [CVE-2009-0079] The RPCSS service in Microsoft Windows XP SP2 and SP3 and Server 2003 SP1 and SP2 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows RPCSS Service Isolation Vulnerability."
9368| [CVE-2009-0078] The Windows Management Instrumentation (WMI) provider in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows WMI Service Isolation Vulnerability."
9369| [CVE-2008-7217] Microsoft Office 2008 for Mac, when running on Macintosh systems that restrict Office access to administrators, does not enforce this restriction for user ID 502, which allows local users with that ID to bypass intended security policy and access Office programs, related to permissions and ownership for certain directories.
9370| [CVE-2008-6819] win32k.sys in Microsoft Windows Server 2003 and Vista allows local users to cause a denial of service (system crash) via vectors related to CreateWindow, TranslateMessage, and DispatchMessage, possibly a race condition between threads, a different vulnerability than CVE-2008-1084. NOTE: some of these details are obtained from third party information.
9371| [CVE-2008-6219] nsrexecd.exe in multiple EMC Networker products including EMC NetWorker Server, Storage Node, and Client 7.3.x and 7.4, 7.4.1, 7.4.2, Client and Storage Node for Open VMS 7.3.2 ECO6 and earlier, Module for Microsoft Exchange 5.1 and earlier, Module for Microsoft Applications 2.0 and earlier, Module for Meditech 2.0 and earlier, and PowerSnap 2.4 SP1 and earlier does not properly control the allocation of memory, which allows remote attackers to cause a denial of service (memory exhaustion) via multiple crafted RPC requests.
9372| [CVE-2008-6063] Microsoft Word 2007, when the "Save as PDF" add-on is enabled, places an absolute pathname in the Subject field during an "Email as PDF" operation, which allows remote attackers to obtain sensitive information such as the sender's account name and a Temporary Internet Files subdirectory name.
9373| [CVE-2008-5912] An unspecified function in the JavaScript implementation in Microsoft Internet Explorer creates and exposes a "temporary footprint" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an "in-session phishing attack." NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
9374| [CVE-2008-5823] An ActiveX control in prtstb06.dll in Microsoft Money 2006, when used with WScript in Windows Script Host (WSH) on Windows Vista, allows remote attackers to cause a denial of service (access violation and application crash) via a zero value for the Startup property.
9375| [CVE-2008-5416] Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.2039, and earlier
9376| [CVE-2008-5232] Buffer overflow in the CallHTMLHelp method in the Microsoft Windows Media Services ActiveX control in nskey.dll 4.1.00.3917 in Windows Media Services on Microsoft Windows NT and 2000, and Avaya Media and Message Application servers, allows remote attackers to execute arbitrary code via a long argument. NOTE: the provenance of this information is unknown
9377| [CVE-2008-5112] The LDAP server in Active Directory in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 responds differently to a failed bind attempt depending on whether the user account exists and is permitted to login, which allows remote attackers to enumerate valid usernames via a series of LDAP bind requests, as demonstrated by ldapuserenum.
9378| [CVE-2008-5100] The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.
9379| [CVE-2008-5044] Race condition in Microsoft Windows Server 2003 and Vista allows local users to cause a denial of service (crash or hang) via a multi-threaded application that makes many calls to UnhookWindowsHookEx while certain other desktop activity is occurring.
9380| [CVE-2008-4844] Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.
9381| [CVE-2008-4841] The WordPad Text Converter for Word 97 files in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008. NOTE: As of 20081210, it is unclear whether this vulnerability is related to a WordPad issue disclosed on 20080925 with a 2008-crash.doc.rar example, but there are insufficient details to be sure.
9382| [CVE-2008-4837] Stack-based buffer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9383| [CVE-2008-4835] SMB in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via malformed values of unspecified "fields inside the SMB packets" in an NT Trans2 request, related to "insufficiently validating the buffer size," aka "SMB Validation Remote Code Execution Vulnerability."
9384| [CVE-2008-4834] Buffer overflow in SMB in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via malformed values of unspecified "fields inside the SMB packets" in an NT Trans request, aka "SMB Buffer Overflow Remote Code Execution Vulnerability."
9385| [CVE-2008-4493] Microsoft PicturePusher ActiveX control (PipPPush.DLL 7.00.0709), as used in Microsoft Digital Image 2006 Starter Edition, allows remote attackers to force the upload of arbitrary files by using the AddString and Post methods and a modified PostURL to construct an HTTP POST request. NOTE: this issue might only be exploitable in limited environments or non-default browser settings.
9386| [CVE-2008-4295] Microsoft Windows Mobile 6.0 on HTC Wiza 200 and HTC MDA 8125 devices does not properly handle the first attempt to establish a Bluetooth connection to a peer with a long name, which allows remote attackers to cause a denial of service (device reboot) by configuring a Bluetooth device with a long hci name and (1) connecting directly to the Windows Mobile system or (2) waiting for the Windows Mobile system to scan for nearby devices.
9387| [CVE-2008-4269] The search-ms protocol handler in Windows Explorer in Microsoft Windows Vista Gold and SP1 and Server 2008 uses untrusted parameter data obtained from incorrect parsing, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Windows Search Parsing Vulnerability."
9388| [CVE-2008-4268] The Windows Search component in Microsoft Windows Vista Gold and SP1 and Server 2008 does not properly free memory during a save operation for a Windows Search file, which allows remote attackers to execute arbitrary code via a crafted saved-search file, aka "Windows Saved Search Vulnerability."
9389| [CVE-2008-4266] Array index vulnerability in Microsoft Office Excel 2000 SP3, 2002 SP3, and 2003 SP3
9390| [CVE-2008-4265] Microsoft Office Excel 2000 SP3 allows remote attackers to execute arbitrary code via a crafted Excel spreadsheet that contains a malformed object, which triggers memory corruption during the loading of records from this spreadsheet, aka "File Format Parsing Vulnerability."
9391| [CVE-2008-4264] Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9392| [CVE-2008-4261] Stack-based buffer overflow in Microsoft Internet Explorer 5.01 SP4, 6 SP1 on Windows 2000, and 6 on Windows XP and Server 2003 does not properly handle extraneous data associated with an object embedded in a web page, which allows remote attackers to execute arbitrary code via crafted HTML tags that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
9393| [CVE-2008-4256] The Charts ActiveX control in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "Charts Control Memory Corruption Vulnerability."
9394| [CVE-2008-4255] Heap-based buffer overflow in mscomct2.ocx (aka Windows Common ActiveX control or Microsoft Animation ActiveX control) in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, and Office Project 2003 SP3 and 2007 Gold and SP1 allows remote attackers to execute arbitrary code via an AVI file with a crafted stream length, which triggers an "allocation error" and memory corruption, aka "Windows Common AVI Parsing Overflow Vulnerability."
9395| [CVE-2008-4253] The FlexGrid ActiveX control in Microsoft Visual Basic 6.0, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, Office FrontPage 2002 SP3, and Office Project 2003 SP3 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "FlexGrid Control Memory Corruption Vulnerability."
9396| [CVE-2008-4250] The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
9397| [CVE-2008-4114] srv.sys in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via an SMB WRITE_ANDX packet with an offset that is inconsistent with the packet size, related to "insufficiently validating the buffer size," as demonstrated by a request to the \PIPE\lsarpc named pipe, aka "SMB Validation Denial of Service Vulnerability."
9398| [CVE-2008-4110] Buffer overflow in the SQLVDIRLib.SQLVDirControl ActiveX control in Tools\Binn\sqlvdir.dll in Microsoft SQL Server 2000 (aka SQL Server 8.0) allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long URL in the second argument to the Connect method. NOTE: this issue is not a vulnerability in many environments, since the control is not marked as safe for scripting and would not execute with default Internet Explorer settings.
9399| [CVE-2008-4038] Buffer underflow in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a Server Message Block (SMB) request that contains a filename with a crafted length, aka "SMB Buffer Underflow Vulnerability."
9400| [CVE-2008-4037] Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.
9401| [CVE-2008-4036] Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for Virtual Address Descriptors (VADs) and a "memory allocation mapping error," aka "Virtual Address Descriptor Elevation of Privilege Vulnerability."
9402| [CVE-2008-4032] Microsoft Office SharePoint Server 2007 Gold and SP1 and Microsoft Search Server 2008 do not properly perform authentication and authorization for administrative functions, which allows remote attackers to cause a denial of service (server load), obtain sensitive information, and "create scripts that would run in the context of the site" via requests to administrative URIs, aka "Access Control Vulnerability."
9403| [CVE-2008-4031] Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9404| [CVE-2008-4030] Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9405| [CVE-2008-4028] Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9406| [CVE-2008-4027] Double free vulnerability in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9407| [CVE-2008-4026] Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9408| [CVE-2008-4025] Integer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1
9409| [CVE-2008-4024] Microsoft Office Word 2000 SP3 and 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a Word document with a crafted lcbPlcfBkfSdt field in the File Information Block (FIB), which bypasses an initialization step and triggers an "arbitrary free," aka "Word Memory Corruption Vulnerability."
9410| [CVE-2008-4023] Active Directory in Microsoft Windows 2000 SP4 does not properly allocate memory for (1) LDAP and (2) LDAPS requests, which allows remote attackers to execute arbitrary code via a crafted request, aka "Active Directory Overflow Vulnerability."
9411| [CVE-2008-4019] Integer overflow in the REPT function in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1
9412| [CVE-2008-3956] orgchart.exe in Microsoft Organization Chart 2.00 allows user-assisted attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .opx file.
9413| [CVE-2008-3704] Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows remote attackers to execute arbitrary code via a long Mask parameter, related to not "validating property values with boundary checks," as exploited in the wild in August 2008, aka "Masked Edit Control Memory Corruption Vulnerability."
9414| [CVE-2008-3648] nslookup.exe in Microsoft Windows XP SP2 allows user-assisted remote attackers to execute arbitrary code, as demonstrated by an attempted DNS zone transfer, and as exploited in the wild in August 2008.
9415| [CVE-2008-3636] Integer overflow in the IopfCompleteRequest API in the kernel in Microsoft Windows 2000, XP, Server 2003, and Vista allows context-dependent attackers to gain privileges. NOTE: this issue was originally reported for GEARAspiWDM.sys 2.0.7.5 in Gear Software CD DVD Filter driver before 4.001.7, as used in other products including Apple iTunes and multiple Symantec and Norton products, which allows local users to gain privileges via repeated IoAttachDevice IOCTL calls to \\.\GEARAspiWDMDevice in this GEARAspiWDM.sys. However, the root cause is the integer overflow in the API call itself.
9416| [CVE-2008-3479] Heap-based buffer overflow in the Microsoft Message Queuing (MSMQ) service (mqsvc.exe) in Microsoft Windows 2000 SP4 allows remote attackers to read memory contents and execute arbitrary code via a crafted RPC call, related to improper processing of parameters to string APIs, aka "Message Queuing Service Remote Code Execution Vulnerability."
9417| [CVE-2008-3477] Microsoft Excel 2000 SP3, 2002 SP3, and 2003 SP2 and SP3 does not properly validate data in the VBA Performance Cache when processing an Office document with an embedded object, which allows remote attackers to execute arbitrary code via an Excel file containing a crafted value, leading to heap-based buffer overflows, integer overflows, array index errors, and memory corruption, aka "Calendar Object Validation Vulnerability."
9418| [CVE-2008-3471] Stack-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1
9419| [CVE-2008-3466] Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."
9420| [CVE-2008-3465] Heap-based buffer overflow in an API in GDI in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows context-dependent attackers to cause a denial of service or execute arbitrary code via a WMF file with a malformed file-size parameter, which would not be properly handled by a third-party application that uses this API for a copy operation, aka "GDI Heap Overflow Vulnerability."
9421| [CVE-2008-3464] afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP1 and SP2 does not properly validate input sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, as demonstrated using crafted pointers and lengths that bypass intended ProbeForRead and ProbeForWrite restrictions, aka "AFD Kernel Overwrite Vulnerability."
9422| [CVE-2008-3460] WPGIMP32.FLT in Microsoft Office 2000 SP3, XP SP3, and 2003 SP2
9423| [CVE-2008-3068] Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.
9424| [CVE-2008-3021] Microsoft Office 2000 SP3, XP SP3, and 2003 SP2
9425| [CVE-2008-3020] Microsoft Office 2000 SP3 and XP SP3
9426| [CVE-2008-3019] Microsoft Office 2000 SP3, XP SP3, and 2003 SP2
9427| [CVE-2008-3018] Microsoft Office 2000 SP3, XP SP3, and 2003 SP2
9428| [CVE-2008-3015] Integer overflow in gdiplus.dll in GDI+ in Microsoft Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a BMP image file with a malformed BitMapInfoHeader that triggers a buffer overflow, aka "GDI+ BMP Integer Overflow Vulnerability."
9429| [CVE-2008-3014] Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka "GDI+ WMF Buffer Overrun Vulnerability."
9430| [CVE-2008-3013] gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and subsequent unknown labels, aka "GDI+ GIF Parsing Vulnerability."
9431| [CVE-2008-3012] gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka "GDI+ EMF Memory Corruption Vulnerability."
9432| [CVE-2008-3009] Microsoft Windows Media Player 6.4, Windows Media Format Runtime 7.1 through 11, and Windows Media Services 4.1, 9, and 2008 do not properly use the Service Principal Name (SPN) identifier when validating replies to authentication requests, which allows remote servers to execute arbitrary code via vectors that employ NTLM credential reflection, aka "SPN Vulnerability."
9433| [CVE-2008-3007] Argument injection vulnerability in a URI handler in Microsoft Office XP SP3, 2003 SP2 and SP3, 2007 Office System Gold and SP1, and Office OneNote 2007 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted onenote:// URL, aka "Uniform Resource Locator Validation Error Vulnerability."
9434| [CVE-2008-3006] Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1
9435| [CVE-2008-3005] Array index vulnerability in Microsoft Office Excel 2000 SP3 and 2002 SP3, and Office 2004 and 2008 for Mac allows remote attackers to execute arbitrary code via an Excel file with a crafted array index for a FORMAT record, aka the "Excel Index Array Vulnerability."
9436| [CVE-2008-3004] Microsoft Office Excel 2000 SP3, 2002 SP3, and 2003 SP2 and SP3
9437| [CVE-2008-3003] Microsoft Office Excel 2007 Gold and SP1 does not properly delete the PWD (password) string from connections.xml when a .xlsx file is configured not to save the remote data session password, which allows local users to obtain sensitive information and obtain access to a remote data source, aka the "Excel Credential Caching Vulnerability."
9438| [CVE-2008-2752] Microsoft Word 2000 9.0.2812 and 2003 11.8106.8172 does not properly handle unordered lists, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .doc file. NOTE: some of these details are obtained from third party information.
9439| [CVE-2008-2540] Apple Safari on Mac OS X, and before 3.1.2 on Windows, does not prompt the user before downloading an object that has an unrecognized content type, which allows remote attackers to place malware into the (1) Desktop directory on Windows or (2) Downloads directory on Mac OS X, and subsequently allows remote attackers to execute arbitrary code on Windows by leveraging an untrusted search path vulnerability in (a) Internet Explorer 7 on Windows XP or (b) the SearchPath function in Windows XP, Vista, and Server 2003 and 2008, aka a "Carpet Bomb" and a "Blended Threat Elevation of Privilege Vulnerability," a different issue than CVE-2008-1032. NOTE: Apple considers this a vulnerability only because the Microsoft products can load application libraries from the desktop and, as of 20080619, has not covered the issue in an advisory for Mac OS X.
9440| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
9441| [CVE-2008-2252] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."
9442| [CVE-2008-2251] Double free vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that makes system calls within multiple threads, aka "Windows Kernel Unhandled Exception Vulnerability." NOTE: according to Microsoft, this is not a duplicate of CVE-2008-4510.
9443| [CVE-2008-2250] The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate window properties sent from a parent window to a child window during creation of a new window, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Window Creation Vulnerability."
9444| [CVE-2008-2249] Integer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a malformed header in a crafted WMF file, which triggers a buffer overflow, aka "GDI Integer Overflow Vulnerability."
9445| [CVE-2008-2246] Microsoft Windows Vista through SP1 and Server 2008 do not properly import the default IPsec policy from a Windows Server 2003 domain to a Windows Server 2008 domain, which prevents IPsec rules from being enforced and allows remote attackers to bypass intended access restrictions.
9446| [CVE-2008-2245] Heap-based buffer overflow in the InternalOpenColorProfile function in mscms.dll in Microsoft Windows Image Color Management System (MSCMS) in the Image Color Management (ICM) component on Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted image file.
9447| [CVE-2008-2244] Microsoft Office Word 2002 SP3 allows remote attackers to execute arbitrary code via a .doc file that contains malformed data, as exploited in the wild in July 2008, and as demonstrated by attachement.doc.
9448| [CVE-2008-1898] A certain ActiveX control in WkImgSrv.dll 7.03.0616.0, as distributed in Microsoft Works 7 and Microsoft Office 2003 and 2007, allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via an invalid WksPictureInterface property value, which triggers an improper function call.
9449| [CVE-2008-1888] Cross-site scripting (XSS) vulnerability in Microsoft Windows SharePoint Services 2.0 allows remote attackers to inject arbitrary web script or HTML via the Picture Source (aka picture object source) field in the Rich Text Editor.
9450| [CVE-2008-1547] Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.
9451| [CVE-2008-1457] The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription request.
9452| [CVE-2008-1456] Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers.
9453| [CVE-2008-1455] A "memory calculation error" in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, 2003 SP2, and 2007 through SP1
9454| [CVE-2008-1454] Unspecified vulnerability in Microsoft DNS in Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 allows remote attackers to conduct cache poisoning attacks via unknown vectors related to accepting "records from a response that is outside the remote server's authority," aka "DNS Cache Poisoning Vulnerability," a different vulnerability than CVE-2008-1447.
9455| [CVE-2008-1451] The WINS service on Microsoft Windows 2000 SP4, and Server 2003 SP1 and SP2, does not properly validate data structures in WINS network packets, which allows local users to gain privileges via a crafted packet, aka "Memory Overwrite Vulnerability."
9456| [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
9457| [CVE-2008-1445] Active Directory on Microsoft Windows 2000 Server SP4, XP Professional SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to cause a denial of service (system hang or reboot) via a crafted LDAP request.
9458| [CVE-2008-1444] Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the "SAMI Format Parsing Vulnerability."
9459| [CVE-2008-1441] Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to cause a denial of service (system hang) via a series of Pragmatic General Multicast (PGM) packets with invalid fragment options, aka the "PGM Malformed Fragment Vulnerability."
9460| [CVE-2008-1440] Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the "PGM Invalid Length Vulnerability."
9461| [CVE-2008-1436] Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping.
9462| [CVE-2008-1435] Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote attackers to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka "Windows Saved Search Vulnerability."
9463| [CVE-2008-1434] Use-after-free vulnerability in Microsoft Word in Office 2000 and XP SP3, 2003 SP2 and SP3, and 2007 Office System SP1 and earlier allows remote attackers to execute arbitrary code via an HTML document with a large number of Cascading Style Sheets (CSS) selectors, related to a "memory handling error" that triggers memory corruption.
9464| [CVE-2008-1092] Buffer overflow in msjet40.dll before 4.0.9505.0 in Microsoft Jet Database Engine allows remote attackers to execute arbitrary code via a crafted Word file, as exploited in the wild in March 2008. NOTE: as of 20080513, Microsoft has stated that this is the same issue as CVE-2007-6026.
9465| [CVE-2008-1091] Unspecified vulnerability in Microsoft Word in Office 2000 and XP SP3, 2003 SP2 and SP3, and 2007 Office System SP1 and earlier allows remote attackers to execute arbitrary code via a Rich Text Format (.rtf) file with a malformed string that triggers a "memory calculation error" and a heap-based buffer overflow, aka "Object Parsing Vulnerability."
9466| [CVE-2008-1090] Unspecified vulnerability in Microsoft Visio 2002 SP2, 2003 SP2 and SP3, and 2007 up to SP1 allows user-assisted remote attackers to execute arbitrary code via a crafted .DXF file, aka "Visio Memory Validation Vulnerability."
9467| [CVE-2008-1089] Unspecified vulnerability in Microsoft Visio 2002 SP2, 2003 SP2 and SP3, and 2007 up to SP1 allows user-assisted remote attackers to execute arbitrary code via a Visio file containing crafted object header data, aka "Visio Object Header Vulnerability."
9468| [CVE-2008-1088] Microsoft Project 2000 Service Release 1, 2002 SP1, and 2003 SP2 allows user-assisted remote attackers to execute arbitrary code via a crafted Project file, related to improper validation of "memory resource allocations."
9469| [CVE-2008-1087] Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka "GDI Stack Overflow Vulnerability."
9470| [CVE-2008-1086] The HxTocCtrl ActiveX control (hxvz.dll), as used in Microsoft Internet Explorer 5.01 SP4 and 6 SP1, in Windows XP SP2, Server 2003 SP1 and SP2, Vista SP1, and Server 2008, allows remote attackers to execute arbitrary code via malformed arguments, which triggers memory corruption.
9471| [CVE-2008-1084] Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, through Vista SP1, and Server 2008 allows local users to execute arbitrary code via unknown vectors related to improper input validation. NOTE: it was later reported that one affected function is NtUserFnOUTSTRING in win32k.sys.
9472| [CVE-2008-1083] Heap-based buffer overflow in the CreateDIBPatternBrushPt function in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF or WMF image file with a malformed header that triggers an integer overflow, aka "GDI Heap Overflow Vulnerability."
9473| [CVE-2008-0121] A "memory calculation error" in Microsoft PowerPoint Viewer 2003 allows remote attackers to execute arbitrary code via a PowerPoint file with an invalid picture index that triggers memory corruption, aka "Memory Calculation Vulnerability."
9474| [CVE-2008-0120] Integer overflow in Microsoft PowerPoint Viewer 2003 allows remote attackers to execute arbitrary code via a PowerPoint file with a malformed picture index that triggers memory corruption, related to handling of CString objects, aka "Memory Allocation Vulnerability."
9475| [CVE-2008-0119] Unspecified vulnerability in Microsoft Publisher in Office 2000 and XP SP3, 2003 SP2 and SP3, and 2007 SP1 and earlier allows remote attackers to execute arbitrary code via a Publisher file with crafted object header data that triggers memory corruption, aka "Publisher Object Handler Validation Vulnerability."
9476| [CVE-2008-0118] Unspecified vulnerability in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, Excel Viewer 2003 up to SP3, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption from an "allocation error," aka "Microsoft Office Memory Corruption Vulnerability."
9477| [CVE-2008-0117] Unspecified vulnerability in Microsoft Excel 2000 SP3 and 2002 SP2, and Office 2004 and 2008 for Mac, allows user-assisted remote attackers to execute arbitrary code via crafted conditional formatting values, aka "Excel Conditional Formatting Vulnerability."
9478| [CVE-2008-0116] Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, Compatibility Pack, and Office 2004 and 2008 for Mac allows user-assisted remote attackers to execute arbitrary code via malformed tags in rich text, aka "Excel Rich Text Validation Vulnerability."
9479| [CVE-2008-0115] Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2007, Viewer 2003, Compatibility Pack, and Office for Mac 2004 allows user-assisted remote attackers to execute arbitrary code via malformed formulas, aka "Excel Formula Parsing Vulnerability."
9480| [CVE-2008-0114] Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office for Mac 2004 allows user-assisted remote attackers to execute arbitrary code via crafted Style records that trigger memory corruption.
9481| [CVE-2008-0113] Unspecified vulnerability in Microsoft Office Excel Viewer 2003 up to SP3 allows user-assisted remote attackers to execute arbitrary code via an Excel document with malformed cell comments that trigger memory corruption from an "allocation error," aka "Microsoft Office Cell Parsing Memory Corruption Vulnerability."
9482| [CVE-2008-0112] Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file that is not properly handled when importing the file, aka "Excel File Import Vulnerability."
9483| [CVE-2008-0111] Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2007, Viewer 2003, Compatibility Pack, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted data validation records, aka "Excel Data Validation Record Vulnerability."
9484| [CVE-2008-0110] Unspecified vulnerability in Microsoft Outlook in Office 2000 SP3, XP SP3, 2003 SP2 and Sp3, and Office System allows user-assisted remote attackers to execute arbitrary code via a crafted mailto URI.
9485| [CVE-2008-0109] Word in Microsoft Office 2000 SP3, XP SP3, Office 2003 SP2, and Office Word Viewer 2003 allows remote attackers to execute arbitrary code via crafted fields within the File Information Block (FIB) of a Word file, which triggers length calculation errors and memory corruption.
9486| [CVE-2008-0108] Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted field lengths, aka "Microsoft Works File Converter Field Length Vulnerability."
9487| [CVE-2008-0106] Buffer overflow in Microsoft SQL Server 2005 SP1 and SP2, and 2005 Express Edition SP1 and SP2, allows remote authenticated users to execute arbitrary code via a crafted insert statement.
9488| [CVE-2008-0105] Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted section header index table information, aka "Microsoft Works File Converter Index Table Vulnerability."
9489| [CVE-2008-0104] Unspecified vulnerability in Microsoft Office Publisher 2000, 2002, and 2003 SP2 allows remote attackers to execute arbitrary code via a crafted .pub file, aka "Publisher Memory Corruption Vulnerability."
9490| [CVE-2008-0103] Unspecified vulnerability in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Office document that contains a malformed object, related to a "memory handling error," aka "Microsoft Office Execution Jump Vulnerability."
9491| [CVE-2008-0102] Unspecified vulnerability in Microsoft Office Publisher 2000, 2002, and 2003 SP2 allows remote attackers to execute arbitrary code via a crafted .pub file, related to invalid "memory values," aka "Publisher Invalid Memory Reference Vulnerability."
9492| [CVE-2008-0088] Unspecified vulnerability in Active Directory on Microsoft Windows 2000 and Windows Server 2003, and Active Directory Application Mode (ADAM) on XP and Server 2003, allows remote attackers to cause a denial of service (hang and restart) via a crafted LDAP request.
9493| [CVE-2008-0087] The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses.
9494| [CVE-2008-0086] Buffer overflow in the convert function in Microsoft SQL Server 2000 SP4, 2000 Desktop Engine (MSDE 2000) SP4, and 2000 Desktop Engine (WMSDE) allows remote authenticated users to execute arbitrary code via a crafted SQL expression.
9495| [CVE-2008-0083] The (1) VBScript (VBScript.dll) and (2) JScript (JScript.dll) scripting engines 5.1 and 5.6, as used in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, do not properly decode script, which allows remote attackers to execute arbitrary code via unknown vectors.
9496| [CVE-2008-0081] Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted macros, aka "Macro Validation Vulnerability," a different vulnerability than CVE-2007-3490.
9497| [CVE-2008-0080] Heap-based buffer overflow in the WebDAV Mini-Redirector in Microsoft Windows XP SP2, Server 2003 SP1 and SP2, and Vista allows remote attackers to execute arbitrary code via a crafted WebDAV response.
9498| [CVE-2008-0020] Unspecified vulnerability in the Load method in the IPersistStreamInit interface in the Active Template Library (ATL), as used in the Microsoft Video ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption, aka "ATL Header Memcopy Vulnerability," a different vulnerability than CVE-2008-0015.
9499| [CVE-2008-0015] Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka "Microsoft Video ActiveX Control Vulnerability."
9500| [CVE-2008-0011] Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the "MJPEG Decoder Vulnerability."
9501| [CVE-2007-6753] Untrusted search path vulnerability in Shell32.dll in Microsoft Windows 2000, Windows XP, Windows Vista, Windows Server 2008, and Windows 7, when using an environment configured with a string such as %APPDATA% or %PROGRAMFILES% in a certain way, allows local users to gain privileges via a Trojan horse DLL under the current working directory, as demonstrated by iTunes and Safari.
9502| [CVE-2007-6357] Stack-based buffer overflow in Microsoft Office Access allows remote, user-assisted attackers to execute arbitrary code via a crafted Microsoft Access Database (.mdb) file. NOTE: due to the lack of details as of 20071210, it is not clear whether this issue is the same as CVE-2007-6026 or CVE-2005-0944.
9503| [CVE-2007-6329] Microsoft Office 2007 12.0.6015.5000 and MSO 12.0.6017.5000 do not sign the metadata of Office Open XML (OOXML) documents, which makes it easier for remote attackers to modify Dublin Core metadata fields, as demonstrated by the (1) LastModifiedBy and (2) creator fields in docProps/core.xml in the OOXML ZIP container.
9504| [CVE-2007-6043] The CryptGenRandom function in Microsoft Windows 2000 generates predictable values, which makes it easier for context-dependent attackers to reduce the effectiveness of cryptographic mechanisms, as demonstrated by attacks on (1) forward security and (2) backward security, related to use of eight instances of the RC4 cipher, and possibly a related issue to CVE-2007-3898.
9505| [CVE-2007-6026] Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted attackers to execute arbitrary code via a crafted MDB file database file containing a column structure with a modified column count. NOTE: this might be the same issue as CVE-2005-0944.
9506| [CVE-2007-5587] Buffer overflow in Macrovision SafeDisc secdrv.sys before 4.3.86.0, as shipped in Microsoft Windows XP SP2, XP Professional x64 and x64 SP2, Server 2003 SP1 and SP2, and Server 2003 x64 and x64 SP2 allows local users to overwrite arbitrary memory locations and gain privileges via a crafted argument to a METHOD_NEITHER IOCTL, as originally discovered in the wild.
9507| [CVE-2007-5352] Unspecified vulnerability in Local Security Authority Subsystem Service (LSASS) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2 allows local users to gain privileges via a crafted local procedure call (LPC) request.
9508| [CVE-2007-5348] Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka "GDI+ VML Buffer Overrun Vulnerability."
9509| [CVE-2007-4991] The SOCKS4 Proxy in Microsoft Internet Security and Acceleration (ISA) Server 2004 SP1 and SP2 allows remote attackers to obtain potentially sensitive information (the destination IP address of another user's session) via an empty packet.
9510| [CVE-2007-4916] Heap-based buffer overflow in the FileFind::FindFile method in (1) MFC42.dll, (2) MFC42u.dll, (3) MFC71.dll, and (4) MFC71u.dll in Microsoft Foundation Class (MFC) Library 8.0, as used by the ListFiles method in hpqutil.dll 2.0.0.138 in Hewlett-Packard (HP) All-in-One and Photo & Imaging Gallery 1.1 and probably other products, allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long first argument.
9511| [CVE-2007-4814] Buffer overflow in the SQLServer ActiveX control in the Distributed Management Objects OLE DLL (sqldmo.dll) 2000.085.2004.00 in Microsoft SQL Server Enterprise Manager 8.05.2004 allows remote attackers to execute arbitrary code via a long second argument to the Start method.
9512| [CVE-2007-3930] Interpretation conflict between Microsoft Internet Explorer and DocuWiki before 2007-06-26b allows remote attackers to inject arbitrary JavaScript and conduct cross-site scripting (XSS) attacks when spellchecking UTF-8 encoded messages via the spell_utf8test function in lib/exe/spellcheck.php, which triggers HTML document identification and script execution by Internet Explorer even though the Content-Type header is text/plain.
9513| [CVE-2007-3924] Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Netscape installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a -chrome argument to the navigatorurl URI, which are inserted into the command line that is created when invoking netscape.exe, a related issue to CVE-2007-3670. NOTE: there has been debate about whether the issue is in Internet Explorer or Netscape. As of 20070713, it is CVE's opinion that IE appears to not properly delimit the URL argument when invoking Netscape
9514| [CVE-2007-3899] Unspecified vulnerability in Microsoft Word 2000 SP3, Word 2002 SP3, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via a malformed string in a Word file, aka "Word Memory Corruption Vulnerability."
9515| [CVE-2007-3898] The DNS server in Microsoft Windows 2000 Server SP4, and Server 2003 SP1 and SP2, uses predictable transaction IDs when querying other DNS servers, which allows remote attackers to spoof DNS replies, poison the DNS cache, and facilitate further attack vectors.
9516| [CVE-2007-3896] The URL handling in Shell32.dll in the Windows shell in Microsoft Windows XP and Server 2003, with Internet Explorer 7 installed, allows remote attackers to execute arbitrary programs via invalid "%" sequences in a mailto: or other URI handler, as demonstrated using mIRC, Outlook, Firefox, Adobe Reader, Skype, and other applications. NOTE: this issue might be related to other issues involving URL handlers in Windows systems, such as CVE-2007-3845. There also might be separate but closely related issues in the applications that are invoked by the handlers.
9517| [CVE-2007-3890] Microsoft Excel in Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a Workspace with a certain index value that triggers memory corruption.
9518| [CVE-2007-3670] Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
9519| [CVE-2007-3490] Unspecified vulnerability in Microsoft Excel 2003 SP2 allows remote attackers to have an unknown impact via unspecified vectors, possibly related to the sheet name, as demonstrated by 2670.xls.
9520| [CVE-2007-3300] Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070619 allow remote attackers to bypass scanning via a crafted header in a (1) LHA or (2) RAR archive.
9521| [CVE-2007-3040] Stack-based buffer overflow in agentdpv.dll 2.0.0.3425 in Microsoft Agent on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a crafted URL to the Agent (Agent.Control) ActiveX control, which triggers an overflow within the Agent Service (agentsrv.exe) process, a different issue than CVE-2007-1205.
9522| [CVE-2007-3039] Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows attackers to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103. NOTE: this is remotely exploitable on Windows 2000 Server.
9523| [CVE-2007-3036] Unspecified vulnerability in the (1) Windows Services for UNIX 3.0 and 3.5, and (2) Subsystem for UNIX-based Applications in Microsoft Windows 2000, XP, Server 2003, and Vista allows local users to gain privileges via unspecified vectors related to "certain setuid binary files."
9524| [CVE-2007-3034] Integer overflow in the AttemptWrite function in Graphics Rendering Engine (GDI) on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted metafile (image) with a large record length value, which triggers a heap-based buffer overflow.
9525| [CVE-2007-3030] Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, and 2003 Viewer allows user-assisted remote attackers to execute arbitrary code via a malformed Excel file involving the "denoting [of] the start of a Workspace designation", which results in memory corruption, aka the "Workbook Memory Corruption Vulnerability".
9526| [CVE-2007-3029] Unspecified vulnerability in Microsoft Excel 2002 SP3 and 2003 SP2 allows user-assisted remote attackers to execute arbitrary code via a malformed Excel file containing multiple active worksheets, which results in memory corruption.
9527| [CVE-2007-3028] The LDAP service in Windows Active Directory in Microsoft Windows 2000 Server SP4 does not properly check "the number of convertible attributes", which allows remote attackers to cause a denial of service (service unavailability) via a crafted LDAP request, related to "client sent LDAP request logic," aka "Windows Active Directory Denial of Service Vulnerability". NOTE: this is probably a different issue than CVE-2007-0040.
9528| [CVE-2007-2999] Microsoft Windows Server 2003, when time restrictions are in effect for user accounts, generates different error messages for failed login attempts with a valid user name than for those with an invalid user name, which allows context-dependent attackers to determine valid Active Directory account names.
9529| [CVE-2007-2967] Multiple F-Secure anti-virus products for Microsoft Windows and Linux before 20070522 allow remote attackers to cause a denial of service (file scanning infinite loop) via certain crafted (1) ARJ archives or (2) FSG packed files.
9530| [CVE-2007-2966] Buffer overflow in the LHA decompresion component in F-Secure anti-virus products for Microsoft Windows and Linux before 20070529 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted LHA archive, related to an integer wrap, a similar issue to CVE-2006-4335.
9531| [CVE-2007-2903] Buffer overflow in the HelpPopup method in the Microsoft Office 2000 Controllo UA di Microsoft Office ActiveX control (OUACTRL.OCX) 1.0.1.9 allows remote attackers to cause a denial of service (probably winhlp32.exe crash) via a long first argument. NOTE: it is not clear whether this issue crosses privilege boundaries.
9532| [CVE-2007-2593] The Terminal Server in Microsoft Windows 2003 Server, when using TLS, allows remote attackers to bypass SSL and self-signed certificate requirements, downgrade the server security, and possibly conduct man-in-the-middle attacks via unspecified vectors, as demonstrated using the Remote Desktop Protocol (RDP) 6.0 client. NOTE: a third party claims that the vendor may have fixed this in approximately 2006.
9533| [CVE-2007-2581] Multiple cross-site scripting (XSS) vulnerabilities in Microsoft Windows SharePoint Services 3.0 for Windows Server 2003 and Office SharePoint Server 2007 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO (query string) in "every main page," as demonstrated by default.aspx.
9534| [CVE-2007-2374] Unspecified vulnerability in Microsoft Windows 2000, XP, and Server 2003 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors. NOTE: this information is based upon a vague pre-advisory with no actionable information. However, the advisory is from a reliable source.
9535| [CVE-2007-2228] rpcrt4.dll (aka the RPC runtime library) in Microsoft Windows XP SP2, XP Professional x64 Edition, Server 2003 SP1 and SP2, Server 2003 x64 Edition and x64 Edition SP2, and Vista and Vista x64 Edition allows remote attackers to cause a denial of service (RPCSS service stop and system restart) via an RPC request that uses NTLMSSP PACKET authentication with a zero-valued verification trailer signature, which triggers an invalid dereference. NOTE: this also affects Windows 2000 SP4, although the impact is an information leak.
9536| [CVE-2007-2224] Object linking and embedding (OLE) Automation, as used in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Office 2004 for Mac, and Visual Basic 6.0 allows remote attackers to execute arbitrary code via the substringData method on a TextNode object, which causes an integer overflow that leads to a buffer overflow.
9537| [CVE-2007-2221] Unspecified vulnerability in the mdsauth.dll COM object in Microsoft Windows Media Server in the Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4
9538| [CVE-2007-2219] Unspecified vulnerability in the Win32 API on Microsoft Windows 2000, XP SP2, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via certain parameters to an unspecified function.
9539| [CVE-2007-2218] Unspecified vulnerability in the Windows Schannel Security Package for Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, allows remote servers to execute arbitrary code or cause a denial of service via crafted digital signatures that are processed during an SSL handshake.
9540| [CVE-2007-2217] Kodak Image Viewer in Microsoft Windows 2000 SP4, and in some cases XP SP2 and Server 2003 SP1 and SP2, allows remote attackers to execute arbitrary code via crafted image files that trigger memory corruption, as demonstrated by a certain .tif (TIFF) file.
9541| [CVE-2007-1911] Multiple unspecified vulnerabilities in Microsoft Word 2007 allow remote attackers to cause a denial of service (CPU consumption) via crafted documents, as demonstrated by (1) file798-1.doc and (2) file613-1.doc, possibly related to a buffer overflow.
9542| [CVE-2007-1910] Buffer overflow in wwlib.dll in Microsoft Word 2007 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted document, as demonstrated by file789-1.doc.
9543| [CVE-2007-1765] Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this issue might be a duplicate of CVE-2007-0038
9544| [CVE-2007-1756] Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2003 Viewer, and Office Excel 2007 does not properly validate version information, which allows user-assisted remote attackers to execute arbitrary code via a crafted Excel file, aka "Calculation Error Vulnerability".
9545| [CVE-2007-1754] PUBCONV.DLL in Microsoft Office Publisher 2007 does not properly clear memory when transferring data from disk to memory, which allows user-assisted remote attackers to execute arbitrary code via a malformed .pub page via a certain negative value, which bypasses a sanitization procedure that initializes critical pointers to NULL, aka the "Publisher Invalid Memory Reference Vulnerability".
9546| [CVE-2007-1748] Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote attackers to execute arbitrary code via a long zone name containing character constants represented by escape sequences.
9547| [CVE-2007-1747] Unspecified vulnerability in MSO.dll in Microsoft Office 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and 2007 allows user-assisted remote attackers to execute arbitrary code via a malformed drawing object, which triggers memory corruption.
9548| [CVE-2007-1645] Buffer overflow in FutureSoft TFTP Server 2000 on Microsoft Windows 2000 SP4 allows remote attackers to execute arbitrary code via a long request on UDP port 69. NOTE: this issue might overlap CVE-2006-4781 or CVE-2005-1812.
9549| [CVE-2007-1537] \Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via the NdisTapiDispatch function.
9550| [CVE-2007-1512] Stack-based buffer overflow in the AfxOleSetEditMenu function in the MFC component in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 Gold and SP1, and Visual Studio .NET 2002 Gold and SP1, and 2003 Gold and SP1 allows user-assisted remote attackers to have an unknown impact (probably crash) via an RTF file with a malformed OLE object, which results in writing two 0x00 characters past the end of szBuffer, aka the "MFC42u.dll Off-by-Two Overflow." NOTE: this issue is due to an incomplete patch (MS07-012) for CVE-2007-0025.
9551| [CVE-2007-1347] Microsoft Windows Explorer on Windows 2000 SP4 FR and XP SP2 FR, and possibly other versions and platforms, allows remote attackers to cause a denial of service (memory corruption and crash) via an Office file with crafted document summary information, which causes an error in Ole32.dll.
9552| [CVE-2007-1239] Microsoft Excel 2003 does not properly parse .XLS files, which allows remote attackers to cause a denial of service (application crash) via a file with a (1) corrupted XML format or a (2) corrupted XLS format, which triggers a NULL pointer dereference.
9553| [CVE-2007-1238] Microsoft Office 2003 allows user-assisted remote attackers to cause a denial of service (application crash) by attempting to insert a corrupted WMF file.
9554| [CVE-2007-1215] Buffer overflow in the Graphics Device Interface (GDI) in Microsoft Windows 2000 SP4
9555| [CVE-2007-1214] Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2003 Viewer, and 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via a crafted AutoFilter filter record in an Excel BIFF8 format XLS file, which triggers memory corruption.
9556| [CVE-2007-1213] The TrueType Fonts rasterizer in Microsoft Windows 2000 SP4 allows local users to gain privileges via crafted TrueType fonts, which result in an uninitialized function pointer.
9557| [CVE-2007-1212] Buffer overflow in the Graphics Device Interface (GDI) in Microsoft Windows 2000 SP4
9558| [CVE-2007-1211] Unspecified kernel GDI functions in Microsoft Windows 2000 SP4
9559| [CVE-2007-1205] Unspecified vulnerability in Microsoft Agent (msagent\agentsvr.exe) in Windows 2000 SP4, XP SP2, and Server 2003, 2003 SP1, and 2003 SP2 allows remote attackers to execute arbitrary code via crafted URLs, which result in memory corruption.
9560| [CVE-2007-1203] Unspecified vulnerability in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2003 Viewer, 2004 for Mac, and 2007 allows user-assisted remote attackers to execute arbitrary code via a crafted set font value in an Excel file, which results in memory corruption.
9561| [CVE-2007-1202] Word (or Word Viewer) in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, 2004 for Mac, and Works Suite 2004, 2005, and 2006 does not properly parse certain rich text "property strings of certain control words," which allows user-assisted remote attackers to trigger heap corruption and execute arbitrary code, aka the "Word RTF Parsing Vulnerability."
9562| [CVE-2007-1201] Unspecified vulnerability in certain COM objects in Microsoft Office Web Components 2000 allows user-assisted remote attackers to execute arbitrary code via vectors related to DataSource that trigger memory corruption, aka "Office Web Components DataSource Vulnerability."
9563| [CVE-2007-1117] Unspecified vulnerability in Publisher 2007 in Microsoft Office 2007 allows remote attackers to execute arbitrary code via unspecified vectors, related to a "file format vulnerability." NOTE: this information is based upon a vague pre-advisory with no actionable information. However, the advisory is from a reliable source.
9564| [CVE-2007-1090] Microsoft Windows Explorer on Windows XP and 2003 allows remote user-assisted attackers to cause a denial of service (crash) via a malformed WMF file, which triggers the crash when the user browses the folder.
9565| [CVE-2007-1083] Buffer overflow in the Configuration Checker (ConfigChk) ActiveX control in VSCnfChk.dll 2.0.0.2 for Verisign Managed PKI Service, Secure Messaging for Microsoft Exchange, and Go Secure! allows remote attackers to execute arbitrary code via long arguments to the VerCompare method.
9566| [CVE-2007-0948] Heap-based buffer overflow in Microsoft Virtual PC 2004 and PC for Mac 7.1 and 7, and Virtual Server 2005 and 2005 R2, allows local guest OS administrators to execute arbitrary code on the host OS via unspecified vectors related to "interaction and initialization of components."
9567| [CVE-2007-0947] Use-after-free vulnerability in Microsoft Internet Explorer 7 on Windows XP SP2, Windows Server 2003 SP1 or SP2, or Windows Vista allows remote attackers to execute arbitrary code via crafted HTML objects, resulting in accessing deallocated memory of CMarkup objects, aka the second of two "HTML Objects Memory Corruption Vulnerabilities" and a different issue than CVE-2007-0946.
9568| [CVE-2007-0946] Unspecified vulnerability in Microsoft Internet Explorer 7 on Windows XP SP2, Windows Server 2003 SP1 or SP2, or Windows Vista allows remote attackers to execute arbitrary code via crafted HTML objects, which results in memory corruption, aka the first of two "HTML Objects Memory Corruption Vulnerabilities" and a different issue than CVE-2007-0947.
9569| [CVE-2007-0945] Microsoft Internet Explorer 6 SP1 on Windows 2000 SP4
9570| [CVE-2007-0944] Unspecified vulnerability in the CTableCol::OnPropertyChange method in Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4
9571| [CVE-2007-0942] Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4
9572| [CVE-2007-0940] Unspecified vulnerability in the Cryptographic API Component Object Model Certificates ActiveX control (CAPICOM.dll) in Microsoft CAPICOM and BizTalk Server 2004 SP1 and SP2 allows remote attackers to execute arbitrary code via unspecified vectors, aka the "CAPICOM.Certificates Vulnerability."
9573| [CVE-2007-0939] Cross-site scripting (XSS) vulnerability in Microsoft Content Management Server (MCMS) 2001 SP1 and 2002 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving HTML redirection queries, aka "Cross-site Scripting and Spoofing Vulnerability."
9574| [CVE-2007-0938] Microsoft Content Management Server (MCMS) 2001 SP1 and 2002 SP2 does not properly handle certain characters in a crafted HTTP GET request, which allows remote attackers to execute arbitrary code, aka the "CMS Memory Corruption Vulnerability."
9575| [CVE-2007-0936] Multiple unspecified vulnerabilities in Microsoft Visio 2002 allow remote user-assisted attackers to execute arbitrary code via a Visio (.VSD, VSS, .VST) file with a crafted packed object that triggers memory corruption, aka "Visio Document Packaging Vulnerability."
9576| [CVE-2007-0934] Unspecified vulnerability in Microsoft Visio 2002 allows remote user-assisted attackers to execute arbitrary code via a Visio (.VSD, VSS, .VST) file with a crafted version number that triggers memory corruption.
9577| [CVE-2007-0913] Unspecified vulnerability in Microsoft Powerpoint allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as exploited by Trojan.PPDropper.G. NOTE: as of 20070213, it is not clear whether this is the same issue as CVE-2006-5296, CVE-2006-4694, CVE-2006-3876, CVE-2006-3877, or older issues.
9578| [CVE-2007-0870] Unspecified vulnerability in Microsoft Word 2000 allows remote attackers to cause a denial of service (crash) via unknown vectors, a different vulnerability than CVE-2006-5994, CVE-2006-6456, CVE-2006-6561, and CVE-2007-0515, a variant of Exploit-MS06-027.
9579| [CVE-2007-0843] The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
9580| [CVE-2007-0811] Microsoft Internet Explorer 6.0 SP1 on Windows 2000, and 6.0 SP2 on Windows XP, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an HTML document containing a certain JavaScript for loop with an empty loop body, possibly involving getElementById.
9581| [CVE-2007-0671] Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks.
9582| [CVE-2007-0612] Multiple ActiveX controls in Microsoft Windows 2000, XP, 2003, and Vista allows remote attackers to cause a denial of service (Internet Explorer crash) by accessing the bgColor, fgColor, linkColor, alinkColor, vlinkColor, or defaultCharset properties in the (1) giffile, (2) htmlfile, (3) jpegfile, (4) mhtmlfile, (5) ODCfile, (6) pjpegfile, (7) pngfile, (8) xbmfile, (9) xmlfile, (10) xslfile, or (11) wdfile objects in (a) mshtml.dll
9583| [CVE-2007-0515] Unspecified vulnerability in Microsoft Word allows user-assisted remote attackers to execute arbitrary code on Word 2000, and cause a denial of service on Word 2003, via unknown attack vectors that trigger memory corruption, as exploited by Trojan.Mdropper.W and later by Trojan.Mdropper.X, a different issue than CVE-2006-6456, CVE-2006-5994, and CVE-2006-6561.
9584| [CVE-2007-0351] Microsoft Windows XP and Windows Server 2003 do not properly handle user logoff, which might allow local users to gain the privileges of a previous system user, possibly related to user profile unload failure. NOTE: it is not clear whether this is an issue in Windows itself, or an interaction with another product. The issue might involve ZoneAlarm not being able to terminate processes when it cannot prompt the user.
9585| [CVE-2007-0221] Integer overflow in the IMAP (IMAP4) support in Microsoft Exchange Server 2000 SP3 allows remote attackers to cause a denial of service (service hang) via crafted literals in an IMAP command, aka the "IMAP Literal Processing Vulnerability."
9586| [CVE-2007-0220] Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2000 SP3, and 2003 SP1 and SP2 allows remote attackers to execute arbitrary scripts, spoof content, or obtain sensitive information via certain UTF-encoded, script-based e-mail attachments, involving an "incorrectly handled UTF character set label".
9587| [CVE-2007-0216] wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted section length headers, aka "Microsoft Works File Converter Input Validation Vulnerability."
9588| [CVE-2007-0215] Stack-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, and 2003 Viewer allows user-assisted remote attackers to execute arbitrary code via a .XLS BIFF file with a malformed Named Graph record, which results in memory corruption.
9589| [CVE-2007-0214] The HTML Help ActiveX control (Hhctrl.ocx) in Microsoft Windows 2000 SP3, XP SP2 and Professional, 2003 SP1 allows remote attackers to execute arbitrary code via unspecified functions, related to uninitialized parameters.
9590| [CVE-2007-0213] Microsoft Exchange Server 2000 SP3, 2003 SP1 and SP2, and 2007 does not properly decode certain MIME encoded e-mails, which allows remote attackers to execute arbitrary code via a crafted base64-encoded MIME e-mail message.
9591| [CVE-2007-0211] The hardware detection functionality in the Windows Shell in Microsoft Windows XP SP2 and Professional, and Server 2003 SP1 allows local users to gain privileges via an unvalidated parameter to a function related to the "detection and registration of new hardware."
9592| [CVE-2007-0209] Microsoft Word in Office 2000 SP3, XP SP3, Office 2003 SP2, Works Suite 2004 to 2006, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via a Word file with a malformed drawing object, which leads to memory corruption.
9593| [CVE-2007-0208] Microsoft Word in Office 2000 SP3, XP SP3, Office 2003 SP2, Works Suite 2004 to 2006, and Office 2004 for Mac does not correctly check the properties of certain documents and warn the user of macro content, which allows user-assisted remote attackers to execute arbitrary code.
9594| [CVE-2007-0069] Unspecified vulnerability in the kernel in Microsoft Windows XP SP2, Server 2003, and Vista allows remote attackers to cause a denial of service (CPU consumption) and possibly execute arbitrary code via crafted (1) IGMPv3 and (2) MLDv2 packets that trigger memory corruption, aka "Windows Kernel TCP/IP/IGMPv3 and MLDv2 Vulnerability."
9595| [CVE-2007-0066] The kernel in Microsoft Windows 2000 SP4, XP SP2, and Server 2003, when ICMP Router Discovery Protocol (RDP) is enabled, allows remote attackers to cause a denial of service via fragmented router advertisement ICMP packets that trigger an out-of-bounds read, aka "Windows Kernel TCP/IP/ICMP Vulnerability."
9596| [CVE-2007-0065] Heap-based buffer overflow in Object Linking and Embedding (OLE) Automation in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, Office 2004 for Mac, and Visual basic 6.0 SP6 allows remote attackers to execute arbitrary code via a crafted script request.
9597| [CVE-2007-0064] Heap-based buffer overflow in Windows Media Format Runtime 7.1, 9, 9.5, 9.5 x64 Edition, 11, and Windows Media Services 9.1 for Microsoft Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file.
9598| [CVE-2007-0043] The Just In Time (JIT) Compiler service in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving an "unchecked buffer," probably a buffer overflow, aka ".NET JIT Compiler Vulnerability".
9599| [CVE-2007-0042] Interpretation conflict in ASP.NET in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows remote attackers to access configuration files and obtain sensitive information, and possibly bypass security mechanisms that try to constrain the final substring of a string, via %00 characters, related to use of %00 as a string terminator within POSIX functions but a data character within .NET strings, aka "Null Byte Termination Vulnerability."
9600| [CVE-2007-0041] The PE Loader service in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows remote attackers to execute arbitrary code via unspecified vectors involving an "unchecked buffer" and unvalidated message lengths, probably a buffer overflow.
9601| [CVE-2007-0040] The LDAP service in Windows Active Directory in Microsoft Windows 2000 Server SP4, Server 2003 SP1 and SP2, Server 2003 x64 Edition and SP2, and Server 2003 for Itanium-based Systems SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted LDAP request with an unspecified number of "convertible attributes."
9602| [CVE-2007-0039] The Exchange Collaboration Data Objects (EXCDO) functionality in Microsoft Exchange Server 2000 SP3, 2003 SP1 and SP2, and 2007 allows remote attackers to cause a denial of service (crash) via an Internet Calendar (iCal) file containing multiple X-MICROSOFT-CDO-MODPROPS (MODPROPS) properties in which the second MODPROPS is longer than the first, which triggers a NULL pointer dereference and an unhandled exception.
9603| [CVE-2007-0038] Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765
9604| [CVE-2007-0035] Word (or Word Viewer) in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, 2004 for Mac, and Works Suite 2004, 2005, and 2006 does not properly handle data in a certain array, which allows user-assisted remote attackers to execute arbitrary code, aka the "Word Array Overflow Vulnerability."
9605| [CVE-2007-0034] Buffer overflow in the Advanced Search (Finder.exe) feature of Microsoft Outlook 2000, 2002, and 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted Outlook Saved Searches (OSS) file that triggers memory corruption, aka "Microsoft Outlook Advanced Find Vulnerability."
9606| [CVE-2007-0033] Microsoft Outlook 2002 and 2003 allows user-assisted remote attackers to execute arbitrary code via a malformed VEVENT record in an .iCal meeting request or ICS file.
9607| [CVE-2007-0031] Heap-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via a BIFF8 spreadsheet with a PALETTE record that contains a large number of entries.
9608| [CVE-2007-0030] Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via an Excel file with an out-of-range Column field in certain BIFF8 record types, which references arbitrary memory.
9609| [CVE-2007-0029] Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via a malformed string, aka "Excel Malformed String Vulnerability."
9610| [CVE-2007-0028] Microsoft Excel 2000, 2002, 2003, Viewer 2003, Office 2004 for Mac, and Office v.X for Mac does not properly handle certain opcodes, which allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file, which results in an "Improper Memory Access Vulnerability." NOTE: an early disclosure of this issue used CVE-2006-3432, but only CVE-2007-0028 should be used.
9611| [CVE-2007-0027] Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via malformed IMDATA records that trigger memory corruption.
9612| [CVE-2007-0026] The OLE Dialog component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 allows user-assisted remote attackers to execute arbitrary code via an RTF file with a malformed OLE object that triggers memory corruption.
9613| [CVE-2007-0025] The MFC component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 and Visual Studio .NET 2000, 2002 SP1, 2003, and 2003 SP1 allows user-assisted remote attackers to execute arbitrary code via an RTF file with a malformed OLE object that triggers memory corruption. NOTE: this might be due to a stack-based buffer overflow in the AfxOleSetEditMenu function in MFC42u.dll.
9614| [CVE-2007-0024] Integer overflow in the Vector Markup Language (VML) implementation (vgx.dll) in Microsoft Internet Explorer 5.01, 6, and 7 on Windows 2000 SP4, XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted web page that contains unspecified integer properties that cause insufficient memory allocation and trigger a buffer overflow, aka the "VML Buffer Overrun Vulnerability."
9615| [CVE-2006-7210] Microsoft Windows 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (cpu consumption) via a PNG image with crafted (1) Width and (2) Height values in the IHDR block.
9616| [CVE-2006-7192] Microsoft ASP .NET Framework 2.0.50727.42 does not properly handle comment (/* */) enclosures, which allows remote attackers to bypass request filtering and conduct cross-site scripting (XSS) attacks, or cause a denial of service, as demonstrated via an xss:expression STYLE attribute in a closing XSS HTML tag.
9617| [CVE-2006-7027] Microsoft Internet Security and Acceleration (ISA) Server 2004 logs unusual ASCII characters in the Host header, including the tab, which allows remote attackers to manipulate portions of the log file and possibly leverage this for other attacks.
9618| [CVE-2006-6723] The Workstation service in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to cause a denial of service (memory consumption) via a large maxlen value in an NetrWkstaUserEnum RPC request.
9619| [CVE-2006-6696] Double free vulnerability in Microsoft Windows 2000, XP, 2003, and Vista allows local users to gain privileges by calling the MessageBox function with a MB_SERVICE_NOTIFICATION message with crafted data, which sends a HardError message to Client/Server Runtime Server Subsystem (CSRSS) process, which is not properly handled when invoking the UserHardError and GetHardErrorText functions in WINSRV.DLL.
9620| [CVE-2006-6617] projectserver/logon/pdsrequest.asp in Microsoft Project Server 2003 allows remote authenticated users to obtain the MSProjectUser password for a SQL database via a GetInitializationData request, which includes the information in the UserName and Password tags of the response.
9621| [CVE-2006-6561] Unspecified vulnerability in Microsoft Word 2000, 2002, and Word Viewer 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted DOC file that triggers memory corruption, as demonstrated via the 12122006-djtest.doc file, a different issue than CVE-2006-5994 and CVE-2006-6456.
9622| [CVE-2006-6456] Unspecified vulnerability in Microsoft Word 2000, 2002, and 2003 and Word Viewer 2003 allows remote attackers to execute code via unspecified vectors related to malformed data structures that trigger memory corruption, a different vulnerability than CVE-2006-5994.
9623| [CVE-2006-6296] The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows remote attackers to cause a denial of service (memory consumption) via an RPC request that specifies a large 'offered' value (output buffer size), a variant of CVE-2005-3644.
9624| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
9625| [CVE-2006-6133] Stack-based buffer overflow in Visual Studio Crystal Reports for Microsoft Visual Studio .NET 2002 and 2002 SP1, .NET 2003 and 2003 SP1, and 2005 and 2005 SP1 (formerly Business Objects Crystal Reports XI Professional) allows user-assisted remote attackers to execute arbitrary code via a crafted RPT file.
9626| [CVE-2006-5994] Unspecified vulnerability in Microsoft Word 2000 and 2002, Office Word and Word Viewer 2003, Word 2004 and 2004 v. X for Mac, and Works 2004, 2005, and 2006 allows remote attackers to execute arbitrary code via a Word document with a malformed string that triggers memory corruption, a different vulnerability than CVE-2006-6456.
9627| [CVE-2006-5758] The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local users to cause a denial of service (memory corruption and crash) and gain privileges by modifying the kernel structures.
9628| [CVE-2006-5586] The Graphics Rendering Engine in Microsoft Windows 2000 SP4 and XP SP2 allows local users to gain privileges via "invalid application window sizes" in layered application windows, aka the "GDI Invalid Window Size Elevation of Privilege Vulnerability."
9629| [CVE-2006-5585] The Client-Server Run-time Subsystem in Microsoft Windows XP SP2 and Server 2003 allows local users to gain privileges via a crafted file manifest within an application, aka "File Manifest Corruption Vulnerability."
9630| [CVE-2006-5584] The Remote Installation Service (RIS) in Microsoft Windows 2000 SP4 uses a TFTP server that allows anonymous access, which allows remote attackers to upload and overwrite arbitrary files to gain privileges on systems that use RIS.
9631| [CVE-2006-5583] Buffer overflow in the SNMP Service in Microsoft Windows 2000 SP4, XP SP2, Server 2003, Server 2003 SP1, and possibly other versions allows remote attackers to execute arbitrary code via a crafted SNMP packet, aka "SNMP Memory Corruption Vulnerability."
9632| [CVE-2006-5574] Unspecified vulnerability in the Brazilian Portuguese Grammar Checker in Microsoft Office 2003 and the Multilingual Interface for Office 2003, Project 2003, and Visio 2003 allows user-assisted remote attackers to execute arbitrary code via crafted text that is not properly parsed.
9633| [CVE-2006-5296] PowerPoint in Microsoft Office 2003 does not properly handle a container object whose position value exceeds the record length, which allows user-assisted attackers to cause a denial of service (NULL dereference and application crash) via a crafted PowerPoint (.PPT) file, as demonstrated by Nanika.ppt, and a different vulnerability than CVE-2006-3435, CVE-2006-3876, CVE-2006-3877, and CVE-2006-4694. NOTE: the impact of this issue was originally claimed to be arbitrary code execution, but later analysis demonstrated that this was erroneous.
9634| [CVE-2006-4854] ** REJECT ** Unspecified vulnerability in Microsoft Office 2000 (Chinese Edition) and Microsoft PowerPoint 2000 (Chinese Edition) allows user-assisted attackers to execute arbitrary code via a crafted PPT document, as exploited by malware such as Trojan.PPDropper.E. NOTE: on 20060919, Microsoft notified CVE that this is a duplicate of CVE-2006-0009.
9635| [CVE-2006-4704] Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) ActiveX control (WmiScriptUtils.dll) in Microsoft Visual Studio 2005 allows remote attackers to bypass Internet zone restrictions and execute arbitrary code by instantiating dangerous objects, aka "WMI Object Broker Vulnerability."
9636| [CVE-2006-4702] Buffer overflow in the Windows Media Format Runtime in Microsoft Windows Media Player (WMP) 6.4 and Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted Advanced Systems Format (ASF) file.
9637| [CVE-2006-4696] Unspecified vulnerability in the Server service in Microsoft Windows 2000 SP4, Server 2003 SP1 and earlier, and XP SP2 and earlier allows remote attackers to execute arbitrary code via a crafted packet, aka "SMB Rename Vulnerability."
9638| [CVE-2006-4695] Unspecified vulnerability in certain COM objects in Microsoft Office Web Components 2000 allows user-assisted remote attackers to execute arbitrary code via a crafted URL, aka "Office Web Components URL Parsing Vulnerability."
9639| [CVE-2006-4694] Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office XP and Office 2003 allows user-assisted attackers to execute arbitrary code via a crafted record in a PPT file, as exploited by malware such as Exploit:Win32/Controlppt.W, Exploit:Win32/Controlppt.X, and Exploit-PPT.d/Trojan.PPDropper.F. NOTE: it has been reported that the attack vector involves SlideShowWindows.View.GotoNamedShow.
9640| [CVE-2006-4693] Unspecified vulnerability in Microsoft Word 2004 for Mac and v.X for Mac allows remote user-assisted attackers to execute arbitrary code via a crafted string in a Word file, a different issue than CVE-2006-3647 and CVE-2006-3651.
9641| [CVE-2006-4692] Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."
9642| [CVE-2006-4691] Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.
9643| [CVE-2006-4689] Unspecified vulnerability in the driver for the Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to cause a denial of service (hang and reboot) via has unknown attack vectors, aka "NetWare Driver Denial of Service Vulnerability."
9644| [CVE-2006-4688] Buffer overflow in Client Service for NetWare (CSNW) in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via crafted messages, aka "Client Service for NetWare Memory Corruption Vulnerability."
9645| [CVE-2006-4534] Unspecified vulnerability in Microsoft Word 2000, 2002, and Office 2003 allows remote user-assisted attackers to execute arbitrary code via unspecified vectors involving a crafted file resulting in a malformed stack, as exploited by malware with names including Trojan.Mdropper.Q, Mofei, and Femo.
9646| [CVE-2006-4495] Microsoft Internet Explorer allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code by instantiating certain Windows 2000 ActiveX COM Objects including (1) ciodm.dll, (2) myinfo.dll, (3) msdxm.ocx, and (4) creator.dll.
9647| [CVE-2006-4274] ** REJECT ** Unknown vulnerability in Microsoft PowerPoint allows user-assisted attackers to execute arbitrary code via a crafted PPT document, as exploited by malware such as TROJ_MDROPPER.BH. NOTE: on 20060822, it was determined that TROJ_MDROPPER.BH was exploiting CVE-2006-0009, so this is not a new vulnerability.
9648| [CVE-2006-4219] The Terminal Services COM object (tsuserex.dll) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by instantiating it as an ActiveX object in Internet Explorer 6.0 SP1 on Microsoft Windows 2003 EE SP1 CN.
9649| [CVE-2006-4183] Heap-based buffer overflow in Microsoft DirectX SDK (February 2006) and probably earlier, including 9.0c End User Runtimes, allows context-dependent attackers to execute arbitrary code via a crafted Targa file with a run-length-encoding (RLE) compression that produces more data than expected when decoding.
9650| [CVE-2006-4071] Sign extension vulnerability in the createBrushIndirect function in the GDI library (gdi32.dll) in Microsoft Windows XP, Server 2003, and possibly other versions, allows user-assisted attackers to cause a denial of service (application crash) via a crafted WMF file.
9651| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
9652| [CVE-2006-3942] The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research
9653| [CVE-2006-3897] Stack overflow in Microsoft Internet Explorer 6 on Windows 2000 allows remote attackers to cause a denial of service (application crash) by creating an NMSA.ASFSourceMediaDescription.1 ActiveX object with a long dispValue property.
9654| [CVE-2006-3880] ** DISPUTED ** Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Small Business Server 2003 allow remote attackers to cause a denial of service (IP stack hang) via a continuous stream of packets on TCP port 135 that have incorrect TCP header checksums and random numbers in certain TCP header fields, as demonstrated by the Achilles Windows Attack Tool. NOTE: the researcher reports that the Microsoft Security Response Center has stated "Our investigation which has included code review, review of the TCPDump, and attempts on reproing the issue on multiple fresh installs of various Windows Operating Systems have all resulted in non confirmation."
9655| [CVE-2006-3877] Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via an unspecified "crafted file," a different vulnerability than CVE-2006-3435, CVE-2006-4694, and CVE-2006-3876.
9656| [CVE-2006-3876] Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via a crafted Data record in a PPT file, a different vulnerability than CVE-2006-3435 and CVE-2006-4694.
9657| [CVE-2006-3875] Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, and Excel Viewer 2003 allows user-assisted attackers to execute arbitrary code via a crafted COLINFO record in an XLS file, a different vulnerability than CVE-2006-2387 and CVE-2006-3867.
9658| [CVE-2006-3873] Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060912, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-encoded website that was the target of an HTTP redirect, due to an incomplete fix for CVE-2006-3869.
9659| [CVE-2006-3869] Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060824, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL on a website that uses HTTP 1.1 compression.
9660| [CVE-2006-3868] Unspecified vulnerability in Microsoft Office XP and 2003 allows remote user-assisted attackers to execute arbitrary code via a malformed Smart Tag.
9661| [CVE-2006-3867] Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, and Excel Viewer 2003 allows user-assisted attackers to execute arbitrary code via a crafted Lotus 1-2-3 file, a different vulnerability than CVE-2006-2387 and CVE-2006-3875.
9662| [CVE-2006-3864] Unspecified vulnerability in mso.dll in Microsoft Office 2000, XP, and 2003, and Microsoft PowerPoint 2000, XP, and 2003, allows remote user-assisted attackers to execute arbitrary code via a malformed record in a (1) .DOC, (2) .PPT, or (3) .XLS file that triggers memory corruption, related to an "array boundary condition" (possibly an array index overflow), a different vulnerability than CVE-2006-3434, CVE-2006-3650, and CVE-2006-3868.
9663| [CVE-2006-3841] Cross-site scripting (XSS) vulnerability in WebScarab before 20060718-1904, when used with Microsoft Internet Explorer 6 SP2 or Konqueror 3.5.3, allows remote attackers to inject arbitrary web script or HTML via the URL, which is not sanitized before being returned in an error message when WebScarab is not able to access the URL.
9664| [CVE-2006-3660] Unspecified vulnerability in Microsoft PowerPoint 2003 has unknown impact and user-assisted attack vectors related to powerpnt.exe. NOTE: due to the lack of available details as of 20060717, it is unclear how this is related to CVE-2006-3655, CVE-2006-3656, and CVE-2006-3590, although it is possible that they are all different.
9665| [CVE-2006-3656] Unspecified vulnerability in Microsoft PowerPoint 2003 allows user-assisted attackers to cause memory corruption via a crafted PowerPoint file, which triggers the corruption when the file is closed. NOTE: due to the lack of available details as of 20060717, it is unclear how this is related to CVE-2006-3655, CVE-2006-3660, and CVE-2006-3590, although it is possible that they are all different.
9666| [CVE-2006-3655] Unspecified vulnerability in mso.dll in Microsoft PowerPoint 2003 allows user-assisted attackers to execute arbitrary code via a crafted PowerPoint file. NOTE: due to the lack of available details as of 20060717, it is unclear how this is related to CVE-2006-3656, CVE-2006-3660, and CVE-2006-3590, although it is possible that they are all different.
9667| [CVE-2006-3652] Microsoft Internet Security and Acceleration (ISA) Server 2004 allows remote attackers to bypass file extension filters via a request with a trailing "#" character. NOTE: as of 20060715, this could not be reproduced by third parties.
9668| [CVE-2006-3651] Unspecified vulnerability in Microsoft Word 2000, 2002, and Office 2003 allows remote user-assisted attackers to execute arbitrary code via a crafted mail merge file, a different vulnerability than CVE-2006-3647 and CVE-2006-4693.
9669| [CVE-2006-3650] Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac do not properly parse the length of a chart record, which allows remote user-assisted attackers to execute arbitrary code via a Word document with an embedded malformed chart record that triggers an overwrite of pointer values with values from the document, a different vulnerability than CVE-2006-3434, CVE-2006-3864, and CVE-2006-3868.
9670| [CVE-2006-3649] Buffer overflow in Microsoft Visual Basic for Applications (VBA) SDK 6.0 through 6.4, as used by Microsoft Office 2000 SP3, Office XP SP3, Project 2000 SR1, Project 2002 SP1, Access 2000 Runtime SP3, Visio 2002 SP2, and Works Suite 2004 through 2006, allows user-assisted attackers to execute arbitrary code via unspecified document properties that are not verified when VBA is invoked to open documents.
9671| [CVE-2006-3648] Unspecified vulnerability in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 and 2003 SP1, allows remote attackers to execute arbitrary code via unspecified vectors involving unhandled exceptions, memory resident applications, and incorrectly "unloading chained exception."
9672| [CVE-2006-3647] Integer overflow in Microsoft Word 2000, 2002, 2003, 2004 for Mac, and v.X for Mac allows remote user-assisted attackers to execute arbitrary code via a crafted string in a Word document, which overflows a 16-bit integer length value, aka "Memmove Code Execution," a different vulnerability than CVE-2006-3651 and CVE-2006-4693.
9673| [CVE-2006-3643] Cross-site scripting (XSS) vulnerability in Internet Explorer 5.01 and 6 in Microsoft Windows 2000 SP4 permits access to local "HTML-embedded resource files" in the Microsoft Management Console (MMC) library, which allows remote authenticated users to execute arbitrary commands, aka "MMC Redirect Cross-Site Scripting Vulnerability."
9674| [CVE-2006-3590] mso.dll, as used by Microsoft PowerPoint 2000 through 2003, allows user-assisted attackers to execute arbitrary commands via a malformed shape container in a PPT file that leads to memory corruption, as exploited by Trojan.PPDropper.B, a different issue than CVE-2006-1540 and CVE-2006-3493.
9675| [CVE-2006-3510] The Remote Data Service Object (RDS.DataControl) in Microsoft Internet Explorer 6 on Windows 2000 allows remote attackers to cause a denial of service (crash) via a series of operations that result in an invalid length calculation when using SysAllocStringLen, then triggers a buffer over-read.
9676| [CVE-2006-3493] Buffer overflow in LsCreateLine function (mso_203) in mso.dll and mso9.dll, as used by Microsoft Word and possibly other products in Microsoft Office 2003, 2002, and 2000, allows remote user-assisted attackers to cause a denial of service (crash) via a crafted Word DOC or other Office file type. NOTE: this issue was originally reported to allow code execution, but on 20060710 Microsoft stated that code execution is not possible, and the original researcher agrees.
9677| [CVE-2006-3449] Unspecified vulnerability in Microsoft PowerPoint 2000 through 2003, possibly a buffer overflow, allows user-assisted remote attackers to execute arbitrary commands via a malformed record in the BIFF file format used in a PPT file, a different issue than CVE-2006-1540, aka "Microsoft PowerPoint Malformed Record Vulnerability."
9678| [CVE-2006-3448] Buffer overflow in the Step-by-Step Interactive Training in Microsoft Windows 2000 SP4, XP SP2 and Professional, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a long Syllabus string in crafted bookmark link files (cbo, cbl, or .cbm), a different issue than CVE-2005-1212.
9679| [CVE-2006-3445] Integer overflow in the ReadWideString function in agentdpv.dll in Microsoft Agent on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a large length value in an .ACF file, which results in a heap-based buffer overflow.
9680| [CVE-2006-3444] Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, probably a buffer overflow, allows local users to obtain privileges via unspecified vectors involving an "unchecked buffer."
9681| [CVE-2006-3443] Untrusted search path vulnerability in Winlogon in Microsoft Windows 2000 SP4, when SafeDllSearchMode is disabled, allows local users to gain privileges via a malicious DLL in the UserProfile directory, aka "User Profile Elevation of Privilege Vulnerability."
9682| [CVE-2006-3441] Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted record response. NOTE: while MS06-041 implies that there is a single issue, there are multiple vectors, and likely multiple vulnerabilities, related to (1) a heap-based buffer overflow in a DNS server response to the client, (2) a DNS server response with malformed ATMA records, and (3) a length miscalculation in TXT, HINFO, X25, and ISDN records.
9683| [CVE-2006-3440] Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
9684| [CVE-2006-3439] Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.
9685| [CVE-2006-3436] Cross-site scripting (XSS) vulnerability in Microsoft .NET Framework 2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving "ASP.NET controls that set the AutoPostBack property to true".
9686| [CVE-2006-3435] PowerPoint in Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac does not properly parse the slide notes field in a document, which allows remote user-assisted attackers to execute arbitrary code via crafted data in this field, which triggers an erroneous object pointer calculation that uses data from within the document. NOTE: this issue is different than other PowerPoint vulnerabilities including CVE-2006-4694.
9687| [CVE-2006-3434] Unspecified vulnerability in Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac allows remote user-assisted attackers to execute arbitrary code via a crafted string that triggers memory corruption.
9688| [CVE-2006-3431] Buffer overflow in certain Asian language versions of Microsoft Excel might allow user-assisted attackers to execute arbitrary code via a crafted STYLE record in a spreadsheet that triggers the overflow when the user attempts to repair the document or selects the "Style" option, as demonstrated by nanika.xls. NOTE: Microsoft has confirmed to CVE via e-mail that this is different than the other Excel vulnerabilities announced before 20060707, including CVE-2006-3059 and CVE-2006-3086.
9689| [CVE-2006-3059] Unspecified vulnerability in Microsoft Excel 2000 through 2004 allows remote user-assisted attackers to execute arbitrary code via unspecified vectors. NOTE: this is a different vulnerability than CVE-2006-3086.
9690| [CVE-2006-2492] Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.
9691| [CVE-2006-2389] Unspecified vulnerability in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via an Office file with a malformed property that triggers memory corruption related to record lengths, aka "Microsoft Office Property Vulnerability," a different vulnerability than CVE-2006-1316.
9692| [CVE-2006-2388] Microsoft Office Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via malformed cell comments, which lead to modification of "critical data offsets" during the rebuilding process.
9693| [CVE-2006-2387] Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, Excel Viewer 2003, and Microsoft Works Suite 2004 through 2006 allows user-assisted attackers to execute arbitrary code via a crafted DATETIME record in an XLS file, a different vulnerability than CVE-2006-3867 and CVE-2006-3875.
9694| [CVE-2006-2380] Microsoft Windows 2000 SP4 does not properly validate an RPC server during mutual authentication over SSL, which allows remote attackers to spoof an RPC server, aka the "RPC Mutual Authentication Vulnerability."
9695| [CVE-2006-2379] Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing.
9696| [CVE-2006-2378] Buffer overflow in the ART Image Rendering component (jgdw400.dll) in Microsoft Windows XP SP1 and Sp2, Server 2003 SP1 and earlier, and Windows 98 and Me allows remote attackers to execute arbitrary code via a crafted ART image that causes heap corruption.
9697| [CVE-2006-2374] The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows local users to cause a denial of service (hang) by calling the MrxSmbCscIoctlCloseForCopyChunk with the file handle of the shadow device, which results in a deadlock, aka the "SMB Invalid Handle Vulnerability."
9698| [CVE-2006-2373] The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows local users to execute arbitrary code by calling the MrxSmbCscIoctlOpenForCopyChunk function with the METHOD_NEITHER method flag and an arbitrary address, possibly for kernel memory, aka the "SMB Driver Elevation of Privilege Vulnerability."
9699| [CVE-2006-2372] Buffer overflow in the DHCP Client service for Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a crafted DHCP response.
9700| [CVE-2006-2371] Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," that lead to registry corruption and stack corruption, aka the "RASMAN Registry Corruption Vulnerability."
9701| [CVE-2006-2370] Buffer overflow in the Routing and Remote Access service (RRAS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," aka the "RRAS Memory Corruption Vulnerability."
9702| [CVE-2006-2334] The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
9703| [CVE-2006-2094] Microsoft Internet Explorer before Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1, when Prompt is configured in Security Settings, uses modal dialogs to verify that a user wishes to run an ActiveX control or perform other risky actions, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking an object or pressing keys that are actually applied to a "Yes" approval for executing the control.
9704| [CVE-2006-2055] Argument injection vulnerability in Microsoft Outlook 2003 SP1 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
9705| [CVE-2006-1654] Directory traversal vulnerability in the HP Color LaserJet 2500 Toolbox and Color LaserJet 4600 Toolbox on Microsoft Windows before 20060402 allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP GET request to TCP port 5225.
9706| [CVE-2006-1651] ** DISPUTED ** Microsoft ISA Server 2004 allows remote attackers to bypass certain filtering rules, including ones for (1) ICMP and (2) TCP, via IPv6 packets. NOTE: An established researcher has disputed this issue, saying that "Neither ISA Server 2004 nor Windows 2003 Basic Firewall support IPv6 filtering ... This is different network protocol."
9707| [CVE-2006-1540] MSO.DLL in Microsoft Office 2000, Office XP (2002), and Office 2003 allows user-assisted attackers to cause a denial of service and execute arbitrary code via multiple attack vectors, as originally demonstrated using a crafted document record with a malformed string, as demonstrated by replacing a certain "01 00 00 00" byte sequence with an "FF FF FF FF" byte sequence, possibly causing an invalid array index, in (1) an Excel .xls document, which triggers an access violation in ole32.dll
9708| [CVE-2006-1316] Unspecified vulnerability in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via an Office file with malformed string that triggers memory corruption related to record lengths, aka "Microsoft Office Parsing Vulnerability," a different vulnerability than CVE-2006-2389.
9709| [CVE-2006-1315] The Server Service (SRV.SYS driver) in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 up to SP1, and other products, allows remote attackers to obtain sensitive information via crafted requests that leak information in SMB buffers, which are not properly initialized, aka "SMB Information Disclosure Vulnerability."
9710| [CVE-2006-1314] Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 up to SP1, and other products, allows remote attackers to execute arbitrary code via crafted first-class Mailslot messages that triggers memory corruption and bypasses size restrictions on second-class Mailslot messages.
9711| [CVE-2006-1313] Microsoft JScript 5.1, 5.5, and 5.6 on Windows 2000 SP4, and 5.6 on Windows XP, Server 2003, Windows 98 and Windows Me, will "release objects early" in certain cases, which results in memory corruption and allows remote attackers to execute arbitrary code.
9712| [CVE-2006-1311] The RichEdit component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1
9713| [CVE-2006-1309] Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted LABEL record that triggers memory corruption.
9714| [CVE-2006-1308] Unspecified vulnerability in Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted FNGROUPCOUNT value.
9715| [CVE-2006-1306] Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted BIFF record with an attacker-controlled array index that is used for a function pointer, aka "Malformed OBJECT record Vulnerability."
9716| [CVE-2006-1305] Microsoft Outlook 2000, 2002, and 2003 allows user-assisted remote attackers to cause a denial of service (memory exhaustion and interrupted mail recovery) via malformed e-mail header information, possibly related to (1) long subject lines or (2) large numbers of recipients in To or CC headers.
9717| [CVE-2006-1304] Buffer overflow in Microsoft Excel 2000 through 2003 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted COLINFO record, which triggers the overflow during a "data filling operation."
9718| [CVE-2006-1302] Buffer overflow in Microsoft Excel 2000 through 2003 allows user-assisted attackers to execute arbitrary code via a .xls file with certain crafted fields in a SELECTION record, which triggers memory corruption, aka "Malformed SELECTION record Vulnerability."
9719| [CVE-2006-1301] Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted SELECTION record that triggers memory corruption, a different vulnerability than CVE-2006-1302.
9720| [CVE-2006-1300] Microsoft .NET framework 2.0 (ASP.NET) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to bypass access restrictions via unspecified "URL paths" that can access Application Folder objects "explicitly by name."
9721| [CVE-2006-1257] The sample files in the authfiles directory in Microsoft Commerce Server 2002 before SP2 allow remote attackers to bypass authentication by logging in to authfiles/login.asp with a valid username and any password, then going to the main site twice.
9722| [CVE-2006-1193] Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2000 SP1 through SP3, when running Outlook Web Access (OWA), allows user-assisted remote attackers to inject arbitrary HTML or web script via unknown vectors related to "HTML parsing."
9723| [CVE-2006-1184] Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0, 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to cause a denial of service (crash) via a BuildContextW request with a large (1) UuidString or (2) GuidIn of a certain length, which causes an out-of-range memory access, aka the MSDTC Denial of Service Vulnerability. NOTE: this is a variant of CVE-2005-2119.
9724| [CVE-2006-0988] The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
9725| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
9726| [CVE-2006-0187] By design, Microsoft Visual Studio 2005 automatically executes code in the Load event of a user-defined control (UserControl1_Load function), which allows user-assisted attackers to execute arbitrary code by tricking the user into opening a malicious Visual Studio project file.
9727| [CVE-2006-0034] Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote attackers to execute arbitrary code via a long fifth argument to the BuildContextW or BuildContext opcode, which triggers a bug in the NdrAllocate function, aka the MSDTC Invalid Memory Access Vulnerability.
9728| [CVE-2006-0033] Unspecified vulnerability in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via a crafted PNG image that triggers memory corruption when it is parsed.
9729| [CVE-2006-0032] Cross-site scripting (XSS) vulnerability in the Indexing Service in Microsoft Windows 2000, XP, and Server 2003, when the Encoding option is set to Auto Select, allows remote attackers to inject arbitrary web script or HTML via a UTF-7 encoded URL, which is injected into an error message whose charset is set to UTF-7.
9730| [CVE-2006-0031] Stack-based buffer overflow in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed record with a modified length value, which leads to memory corruption.
9731| [CVE-2006-0030] Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed graphic, which leads to memory corruption.
9732| [CVE-2006-0029] Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed description, which leads to memory corruption.
9733| [CVE-2006-0028] Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via a BIFF parsing format file containing malformed BOOLERR records that lead to memory corruption, probably involving invalid pointers.
9734| [CVE-2006-0023] Microsoft Windows XP SP1 and SP2 before August 2004, and possibly other operating systems and versions, uses insecure default ACLs that allow the Authenticated Users group to gain privileges by modifying critical configuration information for the (1) Simple Service Discovery Protocol (SSDP), (2) Universal Plug and Play Device Host (UPnP), (3) NetBT, (4) SCardSvr, (5) DHCP, and (6) DnsCache services, aka "Permissive Windows Services DACLs." NOTE: the NetBT, SCardSvr, DHCP, DnsCache already require privileged access to exploit.
9735| [CVE-2006-0022] Unspecified vulnerability in Microsoft PowerPoint in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP1 and SP2, Office 2004 for Mac, and v. X for Mac allows user-assisted attackers to execute arbitrary code via a PowerPoint document with a malformed record, which triggers memory corruption.
9736| [CVE-2006-0021] Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP1, allows remote attackers to cause a denial of service (hang) via an IGMP packet with an invalid IP option, aka the "IGMP v3 DoS Vulnerability."
9737| [CVE-2006-0020] An unspecified Microsoft WMF parsing application, as used in Internet Explorer 5.01 SP4 on Windows 2000 SP4, and 5.5 SP2 on Windows Millennium, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute code via a crafted WMF file with a manipulated WMF header size, possibly involving an integer overflow, a different vulnerability than CVE-2005-4560, and aka "WMF Image Parsing Memory Corruption Vulnerability."
9738| [CVE-2006-0015] Cross-site scripting (XSS) vulnerability in _vti_bin/_vti_adm/fpadmdll.dll in Microsoft FrontPage Server Extensions 2002 and SharePoint Team Services allows remote attackers to inject arbitrary web script or HTML, then leverage the attack to execute arbitrary programs or create new accounts, via the (1) operation, (2) command, and (3) name parameters.
9739| [CVE-2006-0013] Buffer overflow in the Web Client service (WebClnt.dll) for Microsoft Windows XP SP1 and SP2, and Server 2003 up to SP1, allows remote authenticated users or Guests to execute arbitrary code via crafted RPC requests, a different vulnerability than CVE-2005-1207.
9740| [CVE-2006-0012] Unspecified vulnerability in Windows Explorer in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via attack vectors involving COM objects and "crafted files and directories," aka the "Windows Shell Vulnerability."
9741| [CVE-2006-0010] Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.
9742| [CVE-2006-0009] Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted attackers to execute arbitrary code via a routing slip that is longer than specified by the provided length field, as exploited by malware such as TROJ_MDROPPER.BH and Trojan.PPDropper.E in attacks against PowerPoint.
9743| [CVE-2006-0008] The ShellAbout API call in Korean Input Method Editor (IME) in Korean versions of Microsoft Windows XP SP1 and SP2, Windows Server 2003 up to SP1, and Office 2003, allows local users to gain privileges by launching the "shell about dialog box" and clicking the "End-User License Agreement" link, which executes Notepad with the privileges of the program that displays the about box.
9744| [CVE-2006-0007] Buffer overflow in GIFIMP32.FLT, as used in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via a crafted GIF image that triggers memory corruption when it is parsed.
9745| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
9746| [CVE-2006-0004] Microsoft PowerPoint 2000 in Office 2000 SP3 has an interaction with Internet Explorer that allows remote attackers to obtain sensitive information via a PowerPoint presentation that attempts to access objects in the Temporary Internet Files Folder (TIFF).
9747| [CVE-2006-0002] Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation.
9748| [CVE-2006-0001] Stack-based buffer overflow in Microsoft Publisher 2000 through 2003 allows user-assisted remote attackers to execute arbitrary code via a crafted PUB file, which causes an overflow when parsing fonts.
9749| [CVE-2005-4717] Microsoft Internet Explorer 6.0 on Windows NT 4.0 SP6a, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, and Windows Server 2003 SP1 allows remote attackers to cause a denial of service (client crash) via a certain combination of a malformed HTML file and a CSS file that triggers a null dereference, probably related to rendering of a DIV element that contains a malformed IMG tag, as demonstrated by IEcrash.htm and IEcrash.rar.
9750| [CVE-2005-4269] mshtml.dll in Microsoft Windows XP, Server 2003, and Internet Explorer 6.0 SP1 allows attackers to cause a denial of service (access violation) by causing mshtml.dll to process button-focus events at the same time that a document is reloading, as seen in Microsoft Office InfoPath 2003 by repeatedly clicking the "Delete" button in a repeating section in a form. NOTE: the normal operation of InfoPath appears to involve a local user without any privilege boundaries, so this might not be a vulnerability in InfoPath. If no realistic scenarios exist for this problem in other products, then perhaps it should be excluded from CVE.
9751| [CVE-2005-4131] Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed range, which could lead to memory corruption involving an argument to the msvcrt.memmove function, aka "Brand new Microsoft Excel Vulnerability," as originally placed for sale on eBay as item number 7203336538.
9752| [CVE-2005-3981] ** DISPUTED ** NOTE: this issue has been disputed by third parties. Microsoft Windows XP, 2000, and 2003 allows local users to kill a writable process by using the CreateRemoteThread function with certain arguments on a process that has been opened using the OpenProcess function, possibly involving an invalid address for the start routine. NOTE: followup posts have disputed this issue, saying that if a user already has privileges to write to a process, then other functions could be called or the process could be terminated using PROCESS_TERMINATE.
9753| [CVE-2005-3945] The SynAttackProtect protection in Microsoft Windows 2003 before SP1 and Windows 2000 before SP4 with Update Roll-up uses a hash of predictable data, which allows remote attackers to cause a denial of service (CPU consumption) via a flood of SYN packets that produce identical hash values, which slows down the hash table lookups.
9754| [CVE-2005-3644] PNP_GetDeviceList (upnp_getdevicelist) in UPnP for Microsoft Windows 2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows remote attackers to cause a denial of service (memory consumption) via a DCE RPC request that specifies a large output buffer size, a variant of CVE-2006-6296, and a different vulnerability than CVE-2005-2120.
9755| [CVE-2005-3177] CHKDSK in Microsoft Windows 2000 before Update Rollup 1 for SP4, Windows XP, and Windows Server 2003, when running in fix mode, does not properly handle security descriptors if the master file table contains a large number of files or if the descriptors do not satisfy certain NTFS conventions, which could cause ACLs for some files to be reverted to less secure defaults, or cause security descriptors to be removed.
9756| [CVE-2005-3176] Microsoft Windows 2000 before Update Rollup 1 for SP4 does not record the IP address of a Windows Terminal Services client in a security log event if the client connects successfully, which could make it easier for attackers to escape detection.
9757| [CVE-2005-3175] Microsoft Windows 2000 before Update Rollup 1 for SP4 allows a local administrator to unlock a computer even if it has been locked by a domain administrator, which allows the local administrator to access the session as the domain administrator.
9758| [CVE-2005-3174] Microsoft Windows 2000 before Update Rollup 1 for SP4 allows users to log on to the domain, even when their password has expired, if the fully qualified domain name (FQDN) is 8 characters long.
9759| [CVE-2005-3173] Microsoft Windows 2000 before Update Rollup 1 for SP4 does not apply group policies if the user logs on using UPN credentials with a trailing dot, which prevents Windows 2000 from finding the correct domain controller and could allow the user to bypass intended restrictions.
9760| [CVE-2005-3172] The WideCharToMultiByte function in Microsoft Windows 2000 before Update Rollup 1 for SP4 does not properly convert strings with Japanese composite characters in the last character, which could prevent the string from being null terminated and lead to data corruption or enable buffer overflow attacks.
9761| [CVE-2005-3171] Microsoft Windows 2000 before Update Rollup 1 for SP4 records Event ID 1704 to indicate that Group Policy security settings were successfully updated, even when the processing fails such as when Ntuser.pol cannot be accessed, which could cause system administrators to believe that the system is compliant with the specified settings.
9762| [CVE-2005-3170] The LDAP client on Microsoft Windows 2000 before Update Rollup 1 for SP4 accepts certificates using LDAP Secure Sockets Layer (LDAPS) even when the Certificate Authority (CA) is not trusted, which could allow attackers to trick users into believing that they are accessing a trusted site.
9763| [CVE-2005-3169] Microsoft Windows 2000 before Update Rollup 1 for SP4, when the "audit directory service access" policy is enabled, does not record a 565 event message for File Delete Child operations on an Active Directory object in the security event log, which could allow attackers to conduct unauthorized activities without detection.
9764| [CVE-2005-3168] The SECEDIT command on Microsoft Windows 2000 before Update Rollup 1 for SP4, when using a security template to set Access Control Lists (ACLs) on folders, does not apply ACLs on folders that are listed after a long folder entry, which could result in less secure permissions than specified by the template.
9765| [CVE-2005-2122] Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to execute arbitrary commands via a shortcut (.lnk) file with long font properties that lead to a buffer overflow in the Client/Server Runtime Server Subsystem (CSRSS), a different vulnerability than CVE-2005-2118.
9766| [CVE-2005-2120] Stack-based buffer overflow in the Plug and Play (PnP) service (UMPNPMGR.DLL) in Microsoft Windows 2000 SP4, and XP SP1 and SP2, allows remote or local authenticated attackers to execute arbitrary code via a large number of "\" (backslash) characters in a registry key name, which triggers the overflow in a wsprintfW function call.
9767| [CVE-2005-2118] Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-assisted attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerability than CVE-2005-2122.
9768| [CVE-2005-2117] Web View in Windows Explorer on Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 does not properly handle certain HTML characters in preview fields, which allows remote user-assisted attackers to execute arbitrary code.
9769| [CVE-2005-1985] The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages.
9770| [CVE-2005-1984] Buffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message.
9771| [CVE-2005-1983] Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.
9772| [CVE-2005-1982] Unknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller when PKINIT smart card authentication is being used.
9773| [CVE-2005-1981] Unknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message.
9774| [CVE-2005-1907] The ISA Firewall service in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to cause a denial of service (Wspsrv.exe crash) via a large amount of SecureNAT network traffic.
9775| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
9776| [CVE-2005-1218] The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests.
9777| [CVE-2005-1216] Microsoft ISA Server 2000 allows remote attackers to connect to services utilizing the NetBIOS protocol via a NetBIOS connection with an ISA Server that uses the NetBIOS (all) predefined packet filter.
9778| [CVE-2005-1215] Microsoft ISA Server 2000 allows remote attackers to poison the ISA cache or bypass content restriction policies via a malformed HTTP request packet containing multiple Content-Length headers.
9779| [CVE-2005-1208] Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
9780| [CVE-2005-1207] Buffer overflow in the Web Client service in Microsoft Windows XP and Windows Server 2003 allows remote authenticated users to execute arbitrary code via a crafted WebDAV request containing special parameters.
9781| [CVE-2005-1206] Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability."
9782| [CVE-2005-1205] The Telnet client for Microsoft Windows XP, Windows Server 2003, and Windows Services for UNIX allows remote attackers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
9783| [CVE-2005-1052] Microsoft Outlook 2003 and Outlook Web Access (OWA) 2003 do not properly display comma separated addresses in the From field in an e-mail message, which could allow remote attackers to spoof e-mail addresses.
9784| [CVE-2005-0921] Microsoft Outlook 2002 Connector for IBM Lotus Domino 2.0 allows local users to save passwords and login credentials locally, even when password caching is disabled by a group policy.
9785| [CVE-2005-0820] Microsoft Office InfoPath 2003 SP1 includes sensitive information in the Manifest.xsf file in a custom .xsn form, which allows attackers to obtain printer and network information, obtain the database name, username, and password, or obtain the internal web server name.
9786| [CVE-2005-0738] Stack consumption vulnerability in Microsoft Exchange Server 2003 SP1 allows users to cause a denial of service (hang) by deleting or moving a folder with deeply nested subfolders, which causes Microsoft Exchange Information Store service (Store.exe) to hang as a result of a large number of recursive calls.
9787| [CVE-2005-0564] Stack-based buffer overflow in Microsoft Word 2000 and Word 2002, and Microsoft Works Suites 2000 through 2004, might allow remote attackers to execute arbitrary code via a .doc file with long font information.
9788| [CVE-2005-0558] Buffer overflow in Microsoft Word 2000, Word 2002, and Word 2003 allows remote attackers to execute arbitrary code via a crafted document.
9789| [CVE-2005-0551] Stack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value.
9790| [CVE-2005-0550] Buffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".
9791| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
9792| [CVE-2005-0063] The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
9793| [CVE-2005-0061] The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.
9794| [CVE-2005-0060] Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application.
9795| [CVE-2005-0059] Buffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message.
9796| [CVE-2005-0058] Buffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers elevate privileges or execute arbitrary code via a crafted message.
9797| [CVE-2005-0048] Microsoft Windows XP SP2 and earlier, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vulnerability."
9798| [CVE-2004-2527] The local and remote desktop login screens in Microsoft Windows XP before SP2 and 2003 allow remote attackers to cause a denial of service (CPU and memory consumption) by repeatedly using the WinKey+"U" key combination, which causes multiple copies of Windows Utility Manager to be loaded more quickly than they can be closed when the copies detect that another instance is running.
9799| [CVE-2004-2482] Microsoft Outlook 2000 and 2003, when configured to use Microsoft Word 2000 or 2003 as the e-mail editor and when forwarding e-mail, does not properly handle an opening OBJECT tag that does not have a closing OBJECT tag, which causes Outlook to automatically download the URI in the data property of the OBJECT tag and might allow remote attackers to execute arbitrary code.
9800| [CVE-2004-2365] Memory leak in Microsoft Windows XP and Windows Server 2003 allows local users to cause a denial of service (memory exhaustion) by repeatedly creating and deleting directories using a non-standard tool such as smbmount.
9801| [CVE-2004-2339] ** DISPUTED ** Microsoft Windows 2000, XP, and possibly 2003 allows local users with the SeDebugPrivilege privilege to execute arbitrary code as kernel and read or write kernel memory via the NtSystemDebugControl function, which does not verify its pointer arguments. Note: this issue has been disputed, since Administrator privileges are typically required to exploit this issue, thus privilege boundaries are not crossed.
9802| [CVE-2004-1080] The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
9803| [CVE-2004-0963] Buffer overflow in Microsoft Word 2002 (10.6612.6714) SP3, and possibly other versions, allows remote attackers to cause a denial of service (application exception) and possibly execute arbitrary code in winword.exe via certain unexpected values in a .doc file, including (1) an offset that triggers an out-of-bounds memory access, (2) a certain value that causes a large memory copy as triggered by an integer conversion error, and other values.
9804| [CVE-2004-0897] The Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length of a message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
9805| [CVE-2004-0892] Microsoft Proxy Server 2.0 and Microsoft ISA Server 2000 (which is included in Small Business Server 2000 and Small Business Server 2003 Premium Edition) allows remote attackers to spoof trusted Internet content on a specially crafted webpage via spoofed reverse DNS lookup results.
9806| [CVE-2004-0846] Unknown vulnerability in Microsoft Excel 2000, 2002, 2001 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via a malicious file containing certain parameters that are not properly validated.
9807| [CVE-2004-0840] The SMTP (Simple Mail Transfer Protocol) component of Microsoft Windows XP 64-bit Edition, Windows Server 2003, Windows Server 2003 64-bit Edition, and the Exchange Routing Engine component of Exchange Server 2003, allows remote attackers to execute arbitrary code via a malicious DNS response message containing length values that are not properly validated.
9808| [CVE-2004-0728] The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address.
9809| [CVE-2004-0726] The Windows Media Player control in Microsoft Windows 2000 allows remote attackers to execute arbitrary script in the local computer zone via an ASX filename that contains javascript, which is executed in the local context in a preview panel.
9810| [CVE-2004-0575] Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.
9811| [CVE-2004-0574] The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
9812| [CVE-2004-0573] Buffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
9813| [CVE-2004-0540] Microsoft Windows 2000, when running in a domain whose Fully Qualified Domain Name (FQDN) is exactly 8 characters long, does not prevent users with expired passwords from logging on to the domain.
9814| [CVE-2004-0503] Microsoft Outlook 2003 allows remote attackers to bypass the default zone restrictions and execute script within media files via a Rich Text Format (RTF) message containing an OLE object for the Windows Media Player, which bypasses Media Player's setting to disallow scripting and may lead to unprompted installation of an executable when exploited in conjunction with predictable-file-location exposures such as CVE-2004-0502.
9815| [CVE-2004-0379] Multiple cross-site scripting (XSS) vulnerabilities in Microsoft SharePoint Portal Server 2001 allow remote attackers to process arbitrary web content and steal cookies via certain server scripts.
9816| [CVE-2004-0284] Microsoft Internet Explorer 6.0, Outlook 2002, and Outlook 2003 allow remote attackers to cause a denial of service (CPU consumption), if "Do not save encrypted pages to disk" is disabled, via a web site or HTML e-mail that contains two null characters (%00) after the host name.
9817| [CVE-2004-0214] Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.
9818| [CVE-2004-0211] The kernel for Microsoft Windows Server 2003 does not reset certain values in CPU data structures, which allows local users to cause a denial of service (system crash) via a malicious program.
9819| [CVE-2004-0210] The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.
9820| [CVE-2004-0209] Unknown vulnerability in the Graphics Rendering Engine processes of Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats that involve "an unchecked buffer."
9821| [CVE-2004-0208] The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.
9822| [CVE-2004-0207] "Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API functions to change properties of privileged programs using the SetWindowLong and SetWIndowLongPtr API functions.
9823| [CVE-2004-0206] Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow.
9824| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
9825| [CVE-2004-0202] IDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.
9826| [CVE-2004-0201] Heap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041.
9827| [CVE-2004-0199] Help and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm).
9828| [CVE-2004-0124] The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability."
9829| [CVE-2004-0121] Argument injection vulnerability in Microsoft Outlook 2002 does not sufficiently filter parameters of mailto: URLs when using them as arguments when calling OUTLOOK.EXE, which allows remote attackers to use script code in the Local Machine zone and execute arbitrary programs.
9830| [CVE-2004-0120] The Microsoft Secure Sockets Layer (SSL) library, as used in Windows 2000, Windows XP, and Windows Server 2003, allows remote attackers to cause a denial of service via malformed SSL messages.
9831| [CVE-2004-0116] An Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field.
9832| [CVE-2003-1378] Microsoft Outlook Express 6.0 and Outlook 2000, with the security zone set to Internet Zone, allows remote attackers to execute arbitrary programs via an HTML email with the CODEBASE parameter set to the program, a vulnerability similar to CAN-2002-0077.
9833| [CVE-2003-1106] The SMTP service in Microsoft Windows 2000 before SP4 allows remote attackers to cause a denial of service (crash or hang) via an e-mail message with a malformed time stamp in the FILETIME attribute.
9834| [CVE-2003-0908] The Utility Manager in Microsoft Windows 2000 executes winhlp32.exe with system privileges, which allows local users to execute arbitrary code via a "Shatter" style attack using a Windows message that accesses the context sensitive help button in the GUI, as demonstrated using the File Open dialog in the Help window, a different vulnerability than CVE-2004-0213.
9835| [CVE-2003-0906] Buffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image.
9836| [CVE-2003-0904] Microsoft Exchange 2003 and Outlook Web Access (OWA), when configured to use NTLM authentication, does not properly reuse HTTP connections, which can cause OWA users to view mailboxes of other users when Kerberos has been disabled as an authentication method for IIS 6.0, e.g. when SharePoint Services 2.0 is installed.
9837| [CVE-2003-0839] Directory traversal vulnerability in the "Shell Folders" capability in Microsoft Windows Server 2003 allows remote attackers to read arbitrary files via .. (dot dot) sequences in a "shell:" link.
9838| [CVE-2003-0825] The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.
9839| [CVE-2003-0824] Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.
9840| [CVE-2003-0822] Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
9841| [CVE-2003-0821] Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
9842| [CVE-2003-0820] Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
9843| [CVE-2003-0819] Buffer overflow in the H.323 filter of Microsoft Internet Security and Acceleration Server 2000 allows remote attackers to execute arbitrary code in the Microsoft Firewall Service via certain H.323 traffic, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
9844| [CVE-2003-0818] Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
9845| [CVE-2003-0807] Buffer overflow in the COM Internet Services and in the RPC over HTTP Proxy components for Microsoft Windows NT Server 4.0, NT 4.0 Terminal Server Edition, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service via a crafted request.
9846| [CVE-2003-0806] Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code.
9847| [CVE-2003-0719] Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets.
9848| [CVE-2003-0665] Buffer overflow in the ActiveX control for Microsoft Access Snapshot Viewer for Access 97, 2000, and 2002 allows remote attackers to execute arbitrary code via long parameters to the control.
9849| [CVE-2003-0664] Microsoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows attackers to bypass the macro security model and automatically execute arbitrary macros via a malicious document.
9850| [CVE-2003-0662] Buffer overflow in Troubleshooter ActiveX Control (Tshoot.ocx) in Microsoft Windows 2000 SP4 and earlier allows remote attackers to execute arbitrary code via an HTML document with a long argument to the RunQuery2 method.
9851| [CVE-2003-0660] The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers execute arbitrary code without user approval.
9852| [CVE-2003-0533] Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm.
9853| [CVE-2003-0526] Cross-site scripting (XSS) vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to inject arbitrary web script via a URL containing the script in the domain name portion, which is not properly cleansed in the default error pages (1) 500.htm for "500 Internal Server error" or (2) 404.htm for "404 Not Found."
9854| [CVE-2003-0506] Microsoft NetMeeting 3.01 2000 before SP4 allows remote attackers to cause a denial of service (shutdown of NetMeeting conference) via malformed packets, as demonstrated via the chat conversation.
9855| [CVE-2003-0505] Directory traversal vulnerability in Microsoft NetMeeting 3.01 2000 before SP4 allows remote attackers to read arbitrary files via "..\.." (dot dot) sequences in a file transfer request.
9856| [CVE-2003-0496] Microsoft SQL Server before Windows 2000 SP4 allows local users to gain privileges as the SQL Server user by calling the xp_fileexist extended stored procedure with a named pipe as an argument instead of a normal file.
9857| [CVE-2003-0352] Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
9858| [CVE-2003-0345] Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
9859| [CVE-2003-0232] Microsoft SQL Server 7, 2000, and MSDE allows local users to execute arbitrary code via a certain request to the Local Procedure Calls (LPC) port that leads to a buffer overflow.
9860| [CVE-2003-0231] Microsoft SQL Server 7, 2000, and MSDE allows local or remote authenticated users to cause a denial of service (crash or hang) via a long request to a named pipe.
9861| [CVE-2003-0230] Microsoft SQL Server 7, 2000, and MSDE allows local users to gain privileges by hijacking a named pipe during the authentication of another user, aka the "Named Pipe Hijacking" vulnerability.
9862| [CVE-2003-0227] The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request.
9863| [CVE-2003-0118] SQL injection vulnerability in the Document Tracking and Administration (DTA) website of Microsoft BizTalk Server 2000 and 2002 allows remote attackers to execute operating system commands via a request to (1) rawdocdata.asp or (2) RawCustomSearchField.asp containing an embedded SQL statement.
9864| [CVE-2003-0117] Buffer overflow in the HTTP receiver function (BizTalkHTTPReceive.dll ISAPI) of Microsoft BizTalk Server 2002 allows attackers to execute arbitrary code via a certain request to the HTTP receiver.
9865| [CVE-2003-0110] The Winsock Proxy service in Microsoft Proxy Server 2.0 and the Microsoft Firewall service in Internet Security and Acceleration (ISA) Server 2000 allow remote attackers to cause a denial of service (CPU consumption or packet storm) via a spoofed, malformed packet to UDP port 1745.
9866| [CVE-2003-0109] Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0.
9867| [CVE-2003-0011] Unknown vulnerability in the DNS intrusion detection application filter for Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to cause a denial of service (blocked traffic to DNS servers) via a certain type of incoming DNS request that is not properly handled.
9868| [CVE-2003-0007] Microsoft Outlook 2002 does not properly handle requests to encrypt email messages with V1 Exchange Server Security certificates, which causes Outlook to send the email in plaintext, aka "Flaw in how Outlook 2002 handles V1 Exchange Server Security Certificates could lead to Information Disclosure."
9869| [CVE-2003-0003] Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information.
9870| [CVE-2003-0002] Cross-site scripting vulnerability (XSS) in ManualLogin.asp script for Microsoft Content Management Server (MCMS) 2001 allows remote attackers to execute arbitrary script via the REASONTXT parameter.
9871| [CVE-2002-2101] Microsoft Outlook 2002 allows remote attackers to execute arbitrary JavaScript code, even when scripting is disabled, via an "about:" or "javascript:" URI in the href attribute of an "a" tag.
9872| [CVE-2002-2100] Microsoft Outlook 2002 allows remote attackers to embed bypass the file download restrictions for attachments via an HTML email message that uses an IFRAME to reference malicious content.
9873| [CVE-2002-1984] Microsoft Internet Explorer 5.0.1 through 6.0 on Windows 2000 or Windows XP allows remote attackers to cause a denial of service (crash) via an OBJECT tag that contains a crafted CLASSID (CLSID) value of "CLSID:00022613-0000-0000-C000-000000000046".
9874| [CVE-2002-1981] Microsoft SQL Server 2000 through SQL Server 2000 SP2 allows the "public" role to execute the (1) sp_MSSetServerProperties or (2) sp_MSsetalertinfo stored procedures, which allows attackers to modify configuration including SQL server startup and alert settings.
9875| [CVE-2002-1933] The terminal services screensaver for Microsoft Windows 2000 does not automatically lock the terminal window if the window is minimized, which could allow local users to gain access to the terminal server window.
9876| [CVE-2002-1932] Microsoft Windows XP and Windows 2000, when configured to send administrative alerts and the "Do not overwrite events (clear log manually)" option is set, does not notify the administrator when the log reaches its maximum size, which allows local users and remote attackers to avoid detection.
9877| [CVE-2002-1876] Microsoft Exchange 2000 allows remote authenticated attackers to cause a denial of service via a large number of rapid requests, which consumes all of the licenses that are granted to Exchange by IIS.
9878| [CVE-2002-1873] Microsoft Exchange 2000, when used with Microsoft Remote Procedure Call (MSRPC), allows remote attackers to cause a denial of service (crash or memory consumption) via malformed MSRPC calls.
9879| [CVE-2002-1872] Microsoft SQL Server 6.0 through 2000, with SQL Authentication enabled, uses weak password encryption (XOR), which allows remote attackers to sniff and decrypt the password.
9880| [CVE-2002-1776] ** DISPUTED ** NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus 2002 allows remote attackers to bypass virus protection via a Word Macro virus with a .nch or .dbx extension, which is automatically recognized and executed as a Microsoft Office document. NOTE: the vendor has disputed this issue, acknowledging that the initial scan is bypassed, but the Office plug-in would detect the virus before it is executed.
9881| [CVE-2002-1712] Microsoft Windows 2000 allows remote attackers to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3.
9882| [CVE-2002-1256] The SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows attackers to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detection, e.g. by modifying group policy information sent from a domain controller.
9883| [CVE-2002-1255] Microsoft Outlook 2002 allows remote attackers to cause a denial of service (repeated failure) via an email message with a certain invalid header field that is accessed using POP3, IMAP, or WebDAV, aka "E-mail Header Processing Flaw Could Cause Outlook 2002 to Fail."
9884| [CVE-2002-1214] Buffer overflow in Microsoft PPTP Service on Windows XP and Windows 2000 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a certain PPTP packet with malformed control data.
9885| [CVE-2002-1184] The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow attackers to gain privileges as other users via Trojan horse programs.
9886| [CVE-2002-1145] The xp_runwebtask stored procedure in the Web Tasks component of Microsoft SQL Server 7.0 and 2000, Microsoft Data Engine (MSDE) 1.0, and Microsoft Desktop Engine (MSDE) 2000 can be executed by PUBLIC, which allows an attacker to gain privileges by updating a webtask that is owned by the database owner through the msdb.dbo.mswebtasks table, which does not have strong permissions.
9887| [CVE-2002-1141] An input validation error in the Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote attackers to cause a denial of service via malformed fragmented RPC client packets, aka "Denial of service by sending an invalid RPC request."
9888| [CVE-2002-1140] The Sun Microsystems RPC library Services for Unix 3.0 Interix SD, as implemented on Microsoft Windows NT4, 2000, and XP, allows remote attackers to cause a denial of service (service hang) via malformed packet fragments, aka "Improper parameter size check leading to denial of service."
9889| [CVE-2002-1138] Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, writes output files for scheduled jobs under its own privileges instead of the entity that launched it, which allows attackers to overwrite system files, aka "Flaw in Output File Handling for Scheduled Jobs."
9890| [CVE-2002-1137] Buffer overflow in the Database Console Command (DBCC) that handles user inputs in Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, allows attackers to execute arbitrary code via a long SourceDB argument in a "non-SQL OLEDB data source" such as FoxPro, a variant of CAN-2002-0644.
9891| [CVE-2002-1123] Buffer overflow in the authentication function for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows remote attackers to execute arbitrary code via a long request to TCP port 1433, aka the "Hello" overflow.
9892| [CVE-2002-1117] Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.
9893| [CVE-2002-1056] Microsoft Outlook 2000 and 2002, when configured to use Microsoft Word as the email editor, does not block scripts that are used while editing email messages in HTML or Rich Text Format (RTF), which could allow remote attackers to execute arbitrary scripts via an email that the user forwards or replies to.
9894| [CVE-2002-0982] Microsoft SQL Server 2000 SP2, when configured as a distributor, allows attackers to execute arbitrary code via the @scriptfile parameter to the sp_MScopyscript stored procedure.
9895| [CVE-2002-0975] Buffer overflow in Microsoft DirectX Files Viewer ActiveX control (xweb.ocx) 2.0.6.15 and earlier allows remote attackers to execute arbitrary via a long File parameter.
9896| [CVE-2002-0863] Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."
9897| [CVE-2002-0861] Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to bypass the "Allow paste operations via script" setting, even when it is disabled, via the (1) Copy method of the Cell object or (2) the Paste method of the Range object.
9898| [CVE-2002-0860] The LoadText method in the spreadsheet component in Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to read arbitrary files through Internet Explorer via a URL that redirects to the target file.
9899| [CVE-2002-0859] Buffer overflow in the OpenDataSource function of the Jet engine on Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code.
9900| [CVE-2002-0729] Microsoft SQL Server 2000 allows remote attackers to cause a denial of service via a malformed 0x08 packet that is missing a colon separator.
9901| [CVE-2002-0727] The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method.
9902| [CVE-2002-0724] Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows attackers to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerEnum3, aka "Unchecked Buffer in Network Share Provider Can Lead to Denial of Service".
9903| [CVE-2002-0721] Microsoft SQL Server 7.0 and 2000 installs with weak permissions for extended stored procedures that are associated with helper functions, which could allow unprivileged users, and possibly remote attackers, to run stored procedures with administrator privileges via (1) xp_execresultset, (2) xp_printstatements, or (3) xp_displayparamstmt.
9904| [CVE-2002-0719] SQL injection vulnerability in the function that services for Microsoft Content Management Server (MCMS) 2001 allows remote attackers to execute arbitrary commands via an MCMS resource request for image files or other files.
9905| [CVE-2002-0718] Web authoring command in Microsoft Content Management Server (MCMS) 2001 allows attackers to authenticate and upload executable content, by modifying the upload location, aka "Program Execution via MCMS Authoring Function."
9906| [CVE-2002-0700] Buffer overflow in a system function that performs user authentication for Microsoft Content Management Server (MCMS) 2001 allows attackers to execute code in the Local System context by authenticating to a web page that calls the function, aka "Unchecked Buffer in MDAC Function Could Enable SQL Server Compromise."
9907| [CVE-2002-0699] Unknown vulnerability in the Certificate Enrollment ActiveX Control in Microsoft Windows 98, Windows 98 Second Edition, Windows Millennium, Windows NT 4.0, Windows 2000, and Windows XP allow remote attackers to delete digital certificates on a user's system via HTML.
9908| [CVE-2002-0695] Buffer overflow in the Transact-SQL (T-SQL) OpenRowSet component of Microsoft Data Access Components (MDAC) 2.5 through 2.7 for SQL Server 7.0 or 2000 allows remote attackers to execute arbitrary code via a query that calls the OpenRowSet command.
9909| [CVE-2002-0694] The HTML Help facility in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP uses the Local Computer Security Zone when opening .chm files from the Temporary Internet Files folder, which allows remote attackers to execute arbitrary code via HTML mail that references or inserts a malicious .chm file containing shortcuts that can be executed, aka "Code Execution via Compiled HTML Help File."
9910| [CVE-2002-0693] Buffer overflow in the HTML Help ActiveX Control (hhctrl.ocx) in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute code via (1) a long parameter to the Alink function, or (2) script containing a long argument to the showHelp function.
9911| [CVE-2002-0692] Buffer overflow in SmartHTML Interpreter (shtml.dll) in Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to cause a denial of service (CPU consumption) or run arbitrary code, respectively, via a certain type of web file request.
9912| [CVE-2002-0650] The keep-alive mechanism for Microsoft SQL Server 2000 allows remote attackers to cause a denial of service (bandwidth consumption) via a "ping" style packet to the Resolution Service (UDP port 1434) with a spoofed IP address of another SQL Server system, which causes the two servers to exchange packets in an infinite loop.
9913| [CVE-2002-0649] Multiple buffer overflows in the Resolution Service for Microsoft SQL Server 2000 and Microsoft Desktop Engine 2000 (MSDE) allow remote attackers to cause a denial of service or execute arbitrary code via UDP packets to port 1434 in which (1) a 0x04 byte that causes the SQL Monitor thread to generate a long registry key name, or (2) a 0x08 byte with a long string causes heap corruption, as exploited by the Slammer/Sapphire worm.
9914| [CVE-2002-0645] SQL injection vulnerability in stored procedures for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 may allow authenticated users to execute arbitrary commands.
9915| [CVE-2002-0644] Buffer overflow in several Database Consistency Checkers (DBCCs) for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows members of the db_owner and db_ddladmin roles to execute arbitrary code.
9916| [CVE-2002-0643] The installation of Microsoft Data Engine 1.0 (MSDE 1.0), and Microsoft SQL Server 2000 creates setup.iss files with insecure permissions and does not delete them after installation, which allows local users to obtain sensitive data, including weakly encrypted passwords, to gain privileges, aka "SQL Server Installation Process May Leave Passwords on System."
9917| [CVE-2002-0642] The registry key containing the SQL Server service account information in Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, has insecure permissions, which allows local users to gain privileges, aka "Incorrect Permission on SQL Server Service Account Registry Key."
9918| [CVE-2002-0641] Buffer overflow in bulk insert procedure of Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, allows attackers with database administration privileges to execute arbitrary code via a long filename in the BULK INSERT query.
9919| [CVE-2002-0624] Buffer overflow in the password encryption function of Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, allows remote attackers to gain control of the database and execute arbitrary code via SQL Server Authentication, aka "Unchecked Buffer in Password Encryption Procedure."
9920| [CVE-2002-0623] Buffer overflow in AuthFilter ISAPI filter on Microsoft Commerce Server 2000 and 2002 allows remote attackers to execute arbitrary code via long authentication data, aka "New Variant of the ISAPI Filter Buffer Overrun".
9921| [CVE-2002-0622] The Office Web Components (OWC) package installer for Microsoft Commerce Server 2000 allows remote attackers to execute commands by passing the commands as input to the OWC package installer, aka "OWC Package Command Execution".
9922| [CVE-2002-0621] Buffer overflow in the Office Web Components (OWC) package installer used by Microsoft Commerce Server 2000 allows remote attackers to cause the process to fail or run arbitrary code in the LocalSystem security context via certain input to the OWC package installer.
9923| [CVE-2002-0620] Buffer overflow in the Profile Service of Microsoft Commerce Server 2000 allows remote attackers to cause the server to fail or run arbitrary code in the LocalSystem security context via an input field using an affected API.
9924| [CVE-2002-0619] The Mail Merge Tool in Microsoft Word 2002 for Windows, when Microsoft Access is present on a system, allows remote attackers to execute Visual Basic (VBA) scripts within a mail merge document that is saved in HTML format, aka a "Variant of MS00-071, Word Mail Merge Vulnerability" (CVE-2000-0788).
9925| [CVE-2002-0618] The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code in the Local Computer zone by embedding HTML scripts within an Excel workbook that contains an XSL stylesheet, aka "Excel XSL Stylesheet Script Execution".
9926| [CVE-2002-0617] The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by creating a hyperlink on a drawing shape in a source workbook that points to a destination workbook containing an autoexecute macro, aka "Hyperlinked Excel Workbook Macro Bypass."
9927| [CVE-2002-0616] The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by attaching an inline macro to an object within an Excel workbook, aka the "Excel Inline Macros Vulnerability."
9928| [CVE-2002-0597] LANMAN service on Microsoft Windows 2000 allows remote attackers to cause a denial of service (CPU/memory exhaustion) via a stream of malformed data to microsoft-ds port 445.
9929| [CVE-2002-0444] Microsoft Windows 2000 running the Terminal Server 90-day trial version, and possibly other versions, does not apply group policies to incoming users when the number of connections to the SYSVOL share exceeds the maximum, e.g. with a maximum number of licenses, which can allow remote authenticated users to bypass group policies.
9930| [CVE-2002-0443] Microsoft Windows 2000 allows local users to bypass the policy that prohibits reusing old passwords by changing the current password before it expires, which does not enable the check for previous passwords.
9931| [CVE-2002-0373] The Windows Media Device Manager (WMDM) Service in Microsoft Windows Media Player 7.1 on Windows 2000 systems allows local users to obtain LocalSystem rights via a program that calls the WMDM service to connect to an invalid local storage device, aka "Privilege Elevation through Windows Media Device Manager Service".
9932| [CVE-2002-0371] Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response.
9933| [CVE-2002-0368] The Store Service in Microsoft Exchange 2000 allows remote attackers to cause a denial of service (CPU consumption) via a mail message with a malformed RFC message attribute, aka "Malformed Mail Attribute can Cause Exchange 2000 to Exhaust CPU Resources."
9934| [CVE-2002-0224] The MSDTC (Microsoft Distributed Transaction Service Coordinator) for Microsoft Windows 2000, Microsoft IIS 5.0 and SQL Server 6.5 through SQL 2000 0.0 allows remote attackers to cause a denial of service (crash or hang) via malformed (random) input.
9935| [CVE-2002-0187] Cross-site scripting vulnerability in the SQLXML component of Microsoft SQL Server 2000 allows an attacker to execute arbitrary script via the root parameter as part of an XML SQL query, aka "Script Injection via XML Tag."
9936| [CVE-2002-0186] Buffer overflow in the SQLXML ISAPI extension of Microsoft SQL Server 2000 allows remote attackers to execute arbitrary code via data queries with a long content-type parameter, aka "Unchecked Buffer in SQLXML ISAPI Extension."
9937| [CVE-2002-0154] Buffer overflows in extended stored procedures for Microsoft SQL Server 7.0 and 2000 allow remote attackers to cause a denial of service or execute arbitrary code via a database query with certain long arguments.
9938| [CVE-2002-0152] Buffer overflow in various Microsoft applications for Macintosh allows remote attackers to cause a denial of service (crash) or execute arbitrary code by invoking the file:// directive with a large number of / characters, which affects Internet Explorer 5.1, Outlook Express 5.0 through 5.0.2, Entourage v. X and 2001, PowerPoint v. X, 2001, and 98, and Excel v. X and 2001 for Macintosh.
9939| [CVE-2002-0055] SMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote attackers to cause a denial of service via a command with a malformed data transfer (BDAT) request.
9940| [CVE-2002-0054] SMTP service in (1) Microsoft Windows 2000 and (2) Internet Mail Connector (IMC) in Exchange Server 5.5 does not properly handle responses to NTLM authentication, which allows remote attackers to perform mail relaying via an SMTP AUTH command using null session credentials.
9941| [CVE-2002-0050] Buffer overflow in AuthFilter ISAPI filter on Microsoft Commerce Server 2000 allows remote attackers to execute arbitrary code via long authentication data.
9942| [CVE-2002-0049] Microsoft Exchange Server 2000 System Attendant gives "Everyone" group privileges to the WinReg key, which could allow remote attackers to read or modify registry keys.
9943| [CVE-2002-0034] The Microsoft CONVERT.EXE program, when used on Windows 2000 and Windows XP systems, does not apply the default NTFS permissions when converting a FAT32 file system, which could cause the conversion to produce a file system with less secure permissions than expected.
9944| [CVE-2002-0018] In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain.
9945| [CVE-2001-1533] ** DISPUTED * Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to cause a denial of service via a flood of fragmented UDP packets. NOTE: the vendor disputes this issue, saying that it requires high bandwidth to exploit, and the server does not experience any instability. Therefore this "laws of physics" issue might not be included in CVE.
9946| [CVE-2001-1451] Memory leak in the SNMP LAN Manager (LANMAN) MIB extension for Microsoft Windows 2000 before SP3, when the Print Spooler is not running, allows remote attackers to cause a denial of service (memory consumption) via a large number of GET or GETNEXT requests.
9947| [CVE-2001-1319] Microsoft Exchange 5.5 2000 allows remote attackers to cause a denial of service (hang) via exceptional BER encodings for the LDAP filter type field, as demonstrated by the PROTOS LDAPv3 test suite.
9948| [CVE-2001-1099] The default configuration of Norton AntiVirus for Microsoft Exchange 2000 2.x allows remote attackers to identify the recipient's INBOX file path by sending an email with an attachment containing malicious content, which includes the path in the rejection notice.
9949| [CVE-2001-0986] SQLQHit.asp sample file in Microsoft Index Server 2.0 allows remote attackers to obtain sensitive information such as the physical path, file attributes, or portions of source code by directly calling sqlqhit.asp with a CiScope parameter set to (1) webinfo, (2) extended_fileinfo, (3) extended_webinfo, or (4) fileinfo.
9950| [CVE-2001-0718] Vulnerability in (1) Microsoft Excel 2002 and earlier and (2) Microsoft PowerPoint 2002 and earlier allows attackers to bypass macro restrictions and execute arbitrary commands by modifying the data stream in the document.
9951| [CVE-2001-0666] Outlook Web Access (OWA) in Microsoft Exchange 2000 allows an authenticated user to cause a denial of service (CPU consumption) via a malformed OWA request for a deeply nested folder within the user's mailbox.
9952| [CVE-2001-0658] Cross-site scripting (CSS) vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to cause other clients to execute certain script or read cookies via malicious script in an invalid URL that is not properly quoted in an error message.
9953| [CVE-2001-0628] Microsoft Word 2000 does not check AutoRecovery (.asd) files for macros, which allows a local attacker to execute arbitrary macros with the user ID of the Word user.
9954| [CVE-2001-0547] Memory leak in the proxy service in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows local attackers to cause a denial of service (resource exhaustion).
9955| [CVE-2001-0546] Memory leak in H.323 Gatekeeper Service in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to cause a denial of service (resource exhaustion) via a large amount of malformed H.323 data.
9956| [CVE-2001-0542] Buffer overflows in Microsoft SQL Server 7.0 and 2000 allow attackers with access to SQL Server to execute arbitrary code through the functions (1) raiserror, (2) formatmessage, or (3) xp_sprintf. NOTE: the C runtime format string vulnerability reported in MS01-060 is identified by CVE-2001-0879.
9957| [CVE-2001-0538] Microsoft Outlook View ActiveX Control in Microsoft Outlook 2002 and earlier allows remote attackers to execute arbitrary commands via a malicious HTML e-mail message or web page.
9958| [CVE-2001-0509] Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.
9959| [CVE-2001-0505] Multiple memory leaks in Microsoft Services for Unix 2.0 allow remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed requests to (1) the Telnet service, or (2) the NFS service.
9960| [CVE-2001-0504] Vulnerability in authentication process for SMTP service in Microsoft Windows 2000 allows remote attackers to use incorrect credentials to gain privileges and conduct activites such as mail relaying.
9961| [CVE-2001-0501] Microsoft Word 2002 and earlier allows attackers to automatically execute macros without warning the user by embedding the macros in a manner that escapes detection by the security scanner.
9962| [CVE-2001-0351] Microsoft Windows 2000 telnet service allows a local user to make a certain system call that allows the user to terminate a Telnet session and cause a denial of service.
9963| [CVE-2001-0350] Microsoft Windows 2000 telnet service creates named pipes with predictable names and does not properly verify them, which allows local users to execute arbitrary commands by creating a named pipe with the predictable name and associating a malicious program with it, the second of two variants of this vulnerability.
9964| [CVE-2001-0349] Microsoft Windows 2000 telnet service creates named pipes with predictable names and does not properly verify them, which allows local users to execute arbitrary commands by creating a named pipe with the predictable name and associating a malicious program with it, the first of two variants of this vulnerability.
9965| [CVE-2001-0348] Microsoft Windows 2000 telnet service allows attackers to cause a denial of service (crash) via a long logon command that contains a backspace.
9966| [CVE-2001-0347] Information disclosure vulnerability in Microsoft Windows 2000 telnet service allows remote attackers to determine the existence of user accounts such as Guest, or log in to the server without specifying the domain name, via a malformed userid.
9967| [CVE-2001-0346] Handle leak in Microsoft Windows 2000 telnet service allows attackers to cause a denial of service by starting a large number of sessions and terminating them.
9968| [CVE-2001-0345] Microsoft Windows 2000 telnet service allows attackers to prevent idle Telnet sessions from timing out, causing a denial of service by creating a large number of idle sessions.
9969| [CVE-2001-0344] An SQL query method in Microsoft SQL Server 2000 Gold and 7.0 using Mixed Mode allows local database users to gain privileges by reusing a cached connection of the sa administrator account.
9970| [CVE-2001-0340] An interaction between the Outlook Web Access (OWA) service in Microsoft Exchange 2000 Server and Internet Explorer allows attackers to execute malicious script code against a user's mailbox via a message attachment that contains HTML code, which is executed automatically.
9971| [CVE-2001-0261] Microsoft Windows 2000 Encrypted File System does not properly destroy backups of files that are encrypted, which allows a local attacker to recover the text of encrypted files.
9972| [CVE-2001-0245] Microsoft Index Server 2.0 in Windows NT 4.0, and Indexing Service in Windows 2000, allows remote attackers to read server-side include files via a malformed search request, aka a new variant of the "Malformed Hit-Highlighting" vulnerability.
9973| [CVE-2001-0244] Buffer overflow in Microsoft Index Server 2.0 allows remote attackers to execute arbitrary commands via a long search parameter.
9974| [CVE-2001-0240] Microsoft Word before Word 2002 allows attackers to automatically execute macros without warning the user via a Rich Text Format (RTF) document that links to a template with the embedded macro.
9975| [CVE-2001-0239] Microsoft Internet Security and Acceleration (ISA) Server 2000 Web Proxy allows remote attackers to cause a denial of service via a long web request with a specific type.
9976| [CVE-2001-0237] Memory leak in Microsoft 2000 domain controller allows remote attackers to cause a denial of service by repeatedly connecting to the Kerberos service and then disconnecting without sending any data.
9977| [CVE-2001-0146] IIS 5.0 and Microsoft Exchange 2000 allow remote attackers to cause a denial of service (memory allocation error) by repeatedly sending a series of specially formatted URL's.
9978| [CVE-2001-0048] The "Configure Your Server" tool in Microsoft 2000 domain controllers installs a blank password for the Directory Service Restore Mode, which allows attackers with physical access to the controller to install malicious programs, aka the "Directory Service Restore Mode Password" vulnerability.
9979| [CVE-2001-0005] Buffer overflow in the parsing mechanism of the file loader in Microsoft PowerPoint 2000 allows attackers to execute arbitrary commands.
9980| [CVE-2001-0003] Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password, aka the "Web Client NTLM Authentication" vulnerability.
9981| [CVE-2000-1218] The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.
9982| [CVE-2000-1217] Microsoft Windows 2000 before Service Pack 2 (SP2), when running in a non-Windows 2000 domain and using NTLM authentication, and when credentials of an account are locally cached, allows local users to bypass account lockout policies and make an unlimited number of login attempts, aka the "Domain Account Lockout" vulnerability.
9983| [CVE-2000-1209] The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida.
9984| [CVE-2000-1139] The installation of Microsoft Exchange 2000 before Rev. A creates a user account with a known password, which could allow attackers to gain privileges, aka the "Exchange User Account" vulnerability.
9985| [CVE-2000-1088] The xp_SetSQLSecurity function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
9986| [CVE-2000-1087] The xp_proxiedmetadata function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
9987| [CVE-2000-1086] The xp_printstatements function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
9988| [CVE-2000-1085] The xp_peekqueue function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
9989| [CVE-2000-1079] Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
9990| [CVE-2000-0942] The CiWebHitsFile component in Microsoft Indexing Services for Windows 2000 allows remote attackers to conduct a cross site scripting (CSS) attack via a CiRestriction parameter in a .htw request, aka the "Indexing Services Cross Site Scripting" vulnerability.
9991| [CVE-2000-0854] When a Microsoft Office 2000 document is launched, the directory of that document is first used to locate DLL's such as riched20.dll and msi.dll, which could allow an attacker to execute arbitrary commands by inserting a Trojan Horse DLL into the same directory as the document.
9992| [CVE-2000-0771] Microsoft Windows 2000 allows local users to cause a denial of service by corrupting the local security policy via malformed RPC traffic, aka the "Local Security Policy Corruption" vulnerability.
9993| [CVE-2000-0765] Buffer overflow in the HTML interpreter in Microsoft Office 2000 allows an attacker to execute arbitrary commands via a long embedded object tag, aka the "Microsoft Office HTML Object Tag" vulnerability.
9994| [CVE-2000-0756] Microsoft Outlook 2000 does not properly process long or malformed fields in vCard (.vcf) files, which allows attackers to cause a denial of service.
9995| [CVE-2000-0710] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers determine the physical path of the server components by requesting an invalid URL whose name includes a standard DOS device name.
9996| [CVE-2000-0709] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to cause a denial of service in some components by requesting a URL whose name includes a standard DOS device name.
9997| [CVE-2000-0637] Microsoft Excel 97 and 2000 allows an attacker to execute arbitrary commands by specifying a malicious .dll using the Register.ID function, aka the "Excel REGISTER.ID Function" vulnerability.
9998| [CVE-2000-0621] Microsoft Outlook 98 and 2000, and Outlook Express 4.0x and 5.0x, allow remote attackers to read files on the client's system via a malformed HTML message that stores files outside of the cache, aka the "Cache Bypass" vulnerability.
9999| [CVE-2000-0597] Microsoft Office 2000 (Excel and PowerPoint) and PowerPoint 97 are marked as safe for scripting, which allows remote attackers to force Internet Explorer or some email clients to save files to arbitrary locations via the Visual Basic for Applications (VBA) SaveAs function, aka the "Office HTML Script" vulnerability.
10000| [CVE-2000-0331] Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the "Malformed Environment Variable" vulnerability.
10001| [CVE-2000-0277] Microsoft Excel 97 and 2000 does not warn the user when executing Excel Macro Language (XLM) macros in external text files, which could allow an attacker to execute a macro virus, aka the "XLM Text Macro" vulnerability.
10002| [CVE-2013-2557] The sandbox protection mechanism in Microsoft Internet Explorer 9 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013.
10003| [CVE-2013-2556] Unspecified vulnerability in Microsoft Windows 7 allows attackers to bypass the ASLR protection mechanism via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013.
10004| [CVE-2013-2554] Unspecified vulnerability in Microsoft Windows 7 allows attackers to bypass the ASLR and DEP protection mechanisms via unknown vectors, as demonstrated against Firefox by VUPEN during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0787.
10005| [CVE-2013-2553] Unspecified vulnerability in the kernel in Microsoft Windows 7 allows local users to gain privileges via unknown vectors, as demonstrated by Nils and Jon of MWR Labs during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0912.
10006| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
10007| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
10008| [CVE-2013-1347] Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
10009| [CVE-2013-1305] HTTP.sys in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP header, aka "HTTP.sys Denial of Service Vulnerability."
10010| [CVE-2013-1290] Microsoft SharePoint Server 2013, in certain configurations involving legacy My Sites, does not properly establish default access controls for a SharePoint list, which allows remote authenticated users to bypass intended restrictions on reading list items via a direct request for a list's location, aka "Incorrect Access Rights Information Disclosure Vulnerability."
10011| [CVE-2013-1289] Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1, Groove Server 2010 SP1, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability."
10012| [CVE-2013-1284] Race condition in the kernel in Microsoft Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."
10013| [CVE-2013-0096] Writer in Microsoft Windows Essentials 2011 and 2012 allows remote attackers to bypass proxy settings and overwrite arbitrary files via crafted URL parameters, aka "Windows Essentials Improper URI Handling Vulnerability."
10014| [CVE-2013-0086] Microsoft OneNote 2010 SP1 does not properly determine buffer sizes during memory allocation, which allows remote attackers to obtain sensitive information via a crafted OneNote file, aka "Buffer Size Validation Vulnerability."
10015| [CVE-2013-0085] Buffer overflow in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to cause a denial of service (W3WP process crash and site outage) via a crafted URL, aka "Buffer Overflow Vulnerability."
10016| [CVE-2013-0084] Directory traversal vulnerability in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "SharePoint Directory Traversal Vulnerability."
10017| [CVE-2013-0083] Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via crafted content, leading to administrative command execution, aka "SharePoint XSS Vulnerability."
10018| [CVE-2013-0080] Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allow remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "Callback Function Vulnerability."
10019| [CVE-2013-0079] Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability."
10020| [CVE-2013-0005] The WCF Replace function in the Open Data (aka OData) protocol implementation in Microsoft .NET Framework 3.5, 3.5 SP1, 3.5.1, and 4, and the Management OData IIS Extension on Windows Server 2012, allows remote attackers to cause a denial of service (resource consumption and daemon restart) via crafted values in HTTP requests, aka "Replace Denial of Service Vulnerability."
10021| [CVE-2012-4969] Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.
10022| [CVE-2012-4792] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
10023| [CVE-2012-3456] Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3455, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase.
10024| [CVE-2012-3455] Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in KOffice 2.3.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3456, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase.
10025| [CVE-2012-2290] The client in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375 allows remote attackers to execute arbitrary code by sending a crafted message over a TCP communication channel.
10026| [CVE-2012-2284] The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.
10027| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
10028| [CVE-2012-1894] Microsoft Office for Mac 2011 uses world-writable permissions for the "Applications/Microsoft Office 2011/" directory and certain other directories, which allows local users to gain privileges by placing a Trojan horse executable file in one of these directories, aka "Office for Mac Improper Folder Permissions Vulnerability."
10029| [CVE-2012-1892] Cross-site scripting (XSS) vulnerability in Microsoft Visual Studio Team Foundation Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "XSS Vulnerability."
10030| [CVE-2012-1891] Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Data Access Components (WDAC) 6.0 allows remote attackers to execute arbitrary code via crafted XML data that triggers access to an uninitialized object in memory, aka "ADO Cachesize Heap Overflow RCE Vulnerability."
10031| [CVE-2012-1888] Buffer overflow in Microsoft Visio 2010 SP1 and Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file, aka "Visio DXF File Format Buffer Overflow Vulnerability."
10032| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
10033| [CVE-2012-1861] Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 Gold and SP1, SharePoint Foundation 2010 Gold and SP1, and Office Web Apps 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via crafted JavaScript elements in a URL, aka "SharePoint Script in Username Vulnerability."
10034| [CVE-2012-1859] Cross-site scripting (XSS) vulnerability in scriptresx.ashx in Microsoft SharePoint Server 2010 Gold and SP1, SharePoint Foundation 2010 Gold and SP1, and Office Web Apps 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via crafted JavaScript elements in a URL, aka "XSS scriptresx.ashx Vulnerability."
10035| [CVE-2012-1857] Cross-site scripting (XSS) vulnerability in the Enterprise Portal component in Microsoft Dynamics AX 2012 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Dynamics AX Enterprise Portal XSS Vulnerability."
10036| [CVE-2012-1849] Untrusted search path vulnerability in Microsoft Lync 2010, 2010 Attendee, and 2010 Attendant allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .ocsmeet file, aka "Lync Insecure Library Loading Vulnerability."
10037| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
10038| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10039| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10040| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10041| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
10042| [CVE-2012-0447] Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize data for image/vnd.microsoft.icon images, which allows remote attackers to obtain potentially sensitive information by reading a PNG image that was created through conversion from an ICO image.
10043| [CVE-2012-0147] Microsoft Forefront Unified Access Gateway (UAG) 2010 SP1 and SP1 Update 1 does not properly configure the default web site, which allows remote attackers to obtain sensitive information via a crafted HTTPS request, aka "Unfiltered Access to UAG Default Website Vulnerability."
10044| [CVE-2012-0146] Open redirect vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 SP1 and SP1 Update 1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL, aka "UAG Blind HTTP Redirect Vulnerability."
10045| [CVE-2012-0145] Cross-site scripting (XSS) vulnerability in wizardlist.aspx in Microsoft Office SharePoint Server 2010 Gold and SP1 and SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via JavaScript sequences in a URL, aka "XSS in wizardlist.aspx Vulnerability."
10046| [CVE-2012-0144] Cross-site scripting (XSS) vulnerability in themeweb.aspx in Microsoft Office SharePoint Server 2010 Gold and SP1 and SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via JavaScript sequences in a URL, aka "XSS in themeweb.aspx Vulnerability."
10047| [CVE-2012-0138] Microsoft Visio Viewer 2010 Gold and SP1 does not properly handle memory during the parsing of files, which allows remote attackers to execute arbitrary code via crafted attributes in a Visio file, aka "VSD File Format Memory Corruption Vulnerability," a different vulnerability than CVE-2012-0019, CVE-2012-0020, CVE-2012-0136, and CVE-2012-0137.
10048| [CVE-2012-0137] Microsoft Visio Viewer 2010 Gold and SP1 does not properly handle memory during the parsing of files, which allows remote attackers to execute arbitrary code via crafted attributes in a Visio file, aka "VSD File Format Memory Corruption Vulnerability," a different vulnerability than CVE-2012-0019, CVE-2012-0020, CVE-2012-0136, and CVE-2012-0138.
10049| [CVE-2012-0136] Microsoft Visio Viewer 2010 Gold and SP1 does not properly handle memory during the parsing of files, which allows remote attackers to execute arbitrary code via crafted attributes in a Visio file, aka "VSD File Format Memory Corruption Vulnerability," a different vulnerability than CVE-2012-0019, CVE-2012-0020, CVE-2012-0137, and CVE-2012-0138.
10050| [CVE-2012-0020] Microsoft Visio Viewer 2010 Gold and SP1 does not properly handle memory during the parsing of files, which allows remote attackers to execute arbitrary code via crafted attributes in a Visio file, aka "VSD File Format Memory Corruption Vulnerability," a different vulnerability than CVE-2012-0019, CVE-2012-0136, CVE-2012-0137, and CVE-2012-0138.
10051| [CVE-2012-0019] Microsoft Visio Viewer 2010 Gold and SP1 does not properly handle memory during the parsing of files, which allows remote attackers to execute arbitrary code via crafted attributes in a Visio file, aka "VSD File Format Memory Corruption Vulnerability," a different vulnerability than CVE-2012-0020, CVE-2012-0136, CVE-2012-0137, and CVE-2012-0138.
10052| [CVE-2012-0018] Microsoft Visio Viewer 2010 Gold and SP1 does not properly validate attributes in Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "VSD File Format Memory Corruption Vulnerability."
10053| [CVE-2012-0017] Cross-site scripting (XSS) vulnerability in inplview.aspx in Microsoft SharePoint Foundation 2010 Gold and SP1 allows remote attackers to inject arbitrary web script or HTML via JavaScript sequences in a URL, aka "XSS in inplview.aspx Vulnerability."
10054| [CVE-2011-4695] Unspecified vulnerability in Microsoft Windows 7 SP1, when Java is installed, allows local users to bypass Internet Explorer sandbox restrictions and gain privileges via unknown vectors, as demonstrated by the White Phosphorus wp_ie_sandbox_escape module for Immunity CANVAS. NOTE: as of 20111207, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
10055| [CVE-2011-2012] Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 does not properly validate session cookies, which allows remote attackers to cause a denial of service (IIS outage) via unspecified network traffic, aka "Null Session Cookie Crash."
10056| [CVE-2011-2010] The Microsoft Office Input Method Editor (IME) for Simplified Chinese in Microsoft Pinyin IME 2010, Office Pinyin SimpleFast Style 2010, and Office Pinyin New Experience Style 2010 does not properly restrict access to configuration options, which allows local users to gain privileges via the Microsoft Pinyin (aka MSPY) IME toolbar, aka "Pinyin IME Elevation Vulnerability."
10057| [CVE-2011-1969] Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 provides the MicrosoftClient.jar file containing a signed Java applet, which allows remote attackers to execute arbitrary code on client machines via unspecified vectors, aka "Poisoned Cup of Code Execution Vulnerability."
10058| [CVE-2011-1897] Cross-site scripting (XSS) vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Default Reflected XSS Vulnerability."
10059| [CVE-2011-1896] Cross-site scripting (XSS) vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "ExcelTable Reflected XSS Vulnerability."
10060| [CVE-2011-1895] CRLF injection vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 allows remote attackers to inject arbitrary HTTP headers, and conduct HTTP response splitting attacks and cross-site scripting (XSS) attacks, via unspecified vectors, aka "ExcelTable Response Splitting XSS Vulnerability."
10061| [CVE-2011-1891] Cross-site scripting (XSS) vulnerability in Microsoft Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters in a request to a script, aka "Contact Details Reflected XSS Vulnerability."
10062| [CVE-2011-1890] Cross-site scripting (XSS) vulnerability in EditForm.aspx in Microsoft Office SharePoint Server 2010 and SharePoint Foundation 2010 allows remote attackers to inject arbitrary web script or HTML via a post, aka "Editform Script Injection Vulnerability."
10063| [CVE-2011-1889] The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka "TMG Firewall Client Memory Corruption Vulnerability."
10064| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
10065| [CVE-2011-1347] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process, as demonstrated by Stephen Fewer as the third of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011.
10066| [CVE-2011-1346] Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, as demonstrated by Stephen Fewer as the second of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011.
10067| [CVE-2011-1345] Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, as demonstrated by Stephen Fewer as the first of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011, aka "Object Management Memory Corruption Vulnerability."
10068| [CVE-2011-1265] The Bluetooth Stack 2.1 in Microsoft Windows Vista SP1 and SP2 and Windows 7 Gold and SP1 does not prevent access to objects in memory that (1) were not properly initialized or (2) have been deleted, which allows remote attackers to execute arbitrary code via crafted Bluetooth packets, aka "Bluetooth Stack Vulnerability."
10069| [CVE-2011-0653] Cross-site scripting (XSS) vulnerability in Microsoft Office SharePoint Server 2010 Gold and SP1, and SharePoint Foundation 2010, allows remote attackers to inject arbitrary web script or HTML via the URI, aka "XSS in SharePoint Calendar Vulnerability."
10070| [CVE-2011-0647] The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
10071| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
10072| [CVE-2011-0037] Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.
10073| [CVE-2011-0027] Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnerability." NOTE: this might be a duplicate of CVE-2010-1117 or CVE-2010-1118.
10074| [CVE-2011-0026] Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."
10075| [CVE-2010-4643] Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
10076| [CVE-2010-4253] Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated by a PowerPoint (aka PPT) document.
10077| [CVE-2010-4121] ** DISPUTED ** The TCP-to-ODBC gateway in IBM Tivoli Provisioning Manager for OS Deployment 7.1.1.3 does not require authentication for SQL statements, which allows remote attackers to modify, create, or read database records via a session on TCP port 2020. NOTE: the vendor disputes this issue, stating that the "default Microsoft Access database is not password protected because it is intended to be used for evaluation purposes only."
10078| [CVE-2010-3967] Untrusted search path vulnerability in Microsoft Windows Movie Maker (WMM) 2.6 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Movie Maker (MSWMM) file, aka "Insecure Library Loading Vulnerability."
10079| [CVE-2010-3962] Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
10080| [CVE-2010-3936] Cross-site scripting (XSS) vulnerability in Signurl.asp in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "XSS in Signurl.asp Vulnerability."
10081| [CVE-2010-3889] Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local users to gain privileges via unknown vectors, as exploited in the wild in July 2010 by the Stuxnet worm, and identified by Microsoft researchers and other researchers.
10082| [CVE-2010-3888] Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local users to gain privileges via unknown vectors, as exploited in the wild in July 2010 by the Stuxnet worm, and identified by Kaspersky Lab researchers and other researchers.
10083| [CVE-2010-3497] Symantec Norton AntiVirus 2011 does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution. NOTE: the researcher indicates that a vendor response was received, stating that this issue "falls into the work of our Firewall and not our AV (per our methodology of layers of defense)."
10084| [CVE-2010-3454] Multiple off-by-one errors in the WW8DopTypography::ReadFromMem function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted typography information in a Microsoft Word .DOC file that triggers an out-of-bounds write.
10085| [CVE-2010-3453] The WW8ListManager::WW8ListManager function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle an unspecified number of list levels in user-defined list styles in WW8 data in a Microsoft Word document, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .DOC file that triggers an out-of-bounds write.
10086| [CVE-2010-3141] Untrusted search path vulnerability in Microsoft PowerPoint 2010 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse pptimpconv.dll that is located in the same folder as a .odp, .pot, .potm, .potx, .ppa, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .pwz, .sldm, or .sldx file.
10087| [CVE-2010-2743] The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges via a crafted application, as demonstrated in the wild in July 2010 by the Stuxnet worm, aka "Win32k Keyboard Layout Vulnerability." NOTE: this might be a duplicate of CVE-2010-3888 or CVE-2010-3889.
10088| [CVE-2010-2734] Cross-site scripting (XSS) vulnerability in the mobile portal in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "XSS Issue on UAG Mobile Portal Website in Forefront Unified Access Gateway Vulnerability."
10089| [CVE-2010-2733] Cross-site scripting (XSS) vulnerability in the Web Monitor in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "UAG XSS Allows EOP Vulnerability."
10090| [CVE-2010-2732] Open redirect vulnerability in the web interface in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka "UAG Redirection Spoofing Vulnerability."
10091| [CVE-2010-2564] Buffer overflow in Microsoft Windows Movie Maker (WMM) 2.1, 2.6, and 6.0 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted project file, aka "Movie Maker Memory Corruption Vulnerability."
10092| [CVE-2010-1184] The Microsoft wireless keyboard uses XOR encryption with a key derived from the MAC address, which makes it easier for remote attackers to obtain keystroke information and inject arbitrary commands via a nearby wireless device, as demonstrated by Keykeriki 2.
10093| [CVE-2010-1118] Unspecified vulnerability in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a use-after-free issue, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
10094| [CVE-2010-1117] Heap-based buffer overflow in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to discover the base address of a Windows .dll file, and possibly have unspecified other impact, via unknown vectors, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.
10095| [CVE-2010-0806] Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."
10096| [CVE-2010-0716] _layouts/Upload.aspx in the Documents module in Microsoft SharePoint before 2010 uses URLs with the same hostname and port number for a web site's primary files and individual users' uploaded files (aka attachments), which allows remote authenticated users to leverage same-origin relationships and conduct cross-site scripting (XSS) attacks by uploading TXT files, a related issue to CVE-2008-5026. NOTE: the vendor disputes the significance of this issue, because cross-domain isolation can be implemented when needed.
10097| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
10098| [CVE-2008-5750] Argument injection vulnerability in Microsoft Internet Explorer 8 beta 2 on Windows XP SP3 allows remote attackers to execute arbitrary commands via the --renderer-path option in a chromehtml: URI.
10099| [CVE-2008-5556] ** DISPUTED ** The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not recognize attack patterns designed to operate against web pages that are encoded with utf-7, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting crafted utf-7 content. NOTE: the vendor reportedly disputes this issue, stating "Behaviour is by design."
10100| [CVE-2008-5555] Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
10101| [CVE-2008-5554] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not properly handle some HTTP headers that appear after a CRLF sequence in a URI, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS or redirection attacks, as demonstrated by the (1) Location and (2) Set-Cookie HTTP headers. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
10102| [CVE-2008-5553] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 disables itself upon encountering a certain X-XSS-Protection HTTP header, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting this header after a CRLF sequence. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
10103| [CVE-2008-5552] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks via a CRLF sequence in conjunction with a crafted Content-Type header, as demonstrated by a header with a utf-7 charset value. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
10104| [CVE-2008-5551] The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks by injecting data at two different positions within an HTML document, related to STYLE elements and the CSS expression property, aka a "double injection."
10105| [CVE-2008-5180] Microsoft Communicator, and Communicator in Microsoft Office 2010 beta, allows remote attackers to cause a denial of service (memory consumption) via a large number of SIP INVITE requests, which trigger the creation of many sessions.
10106| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
10107| [CVE-2007-5351] Unspecified vulnerability in Server Message Block Version 2 (SMBv2) signing support in Microsoft Windows Vista allows remote attackers to force signature re-computation and execute arbitrary code via a crafted SMBv2 packet, aka "SMBv2 Signing Vulnerability."
10108| [CVE-2007-2729] Comodo Firewall Pro 2.4.18.184 and Comodo Personal Firewall 2.3.6.81, and probably older Comodo Firewall versions, do not properly test for equivalence of process identifiers for certain Microsoft Windows API functions in the NT kernel 5.0 and greater, which allows local users to call these functions, and bypass firewall rules or gain privileges, via a modified identifier that is one, two, or three greater than the canonical identifier.
10109| [CVE-2007-1534] DFSR.exe in Windows Meeting Space in Microsoft Windows Vista remains available for remote connections on TCP port 5722 for 2 minutes after Windows Meeting Space is closed, which allows remote attackers to have an unknown impact by connecting to this port during the time window.
10110| [CVE-2007-0341] Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.8.1 and earlier, when Microsoft Internet Explorer 6 is used, allows remote attackers to inject arbitrary web script or HTML via a javascript: URI in a CSS style in the convcharset parameter to the top-level URI, a different vulnerability than CVE-2005-0992.
10111| [CVE-2006-5559] The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
10112| [CVE-2006-4686] Buffer overflow in the Extensible Stylesheet Language Transformations (XSLT) processing in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted Web page.
10113| [CVE-2006-4685] The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted attackers to access content from other domains.
10114| [CVE-2006-1359] Microsoft Internet Explorer 6 and 7 Beta 2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a certain createTextRange call on a checkbox object, which results in a dereference of an invalid table pointer.
10115| [CVE-2006-0761] Buffer overflow in BlackBerry Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server 2.2 and 4.0 before SP3 Hotfix 4 for IBM Lotus Domino, 3.6 before SP7 and 5.0 before SP3 Hotfix 3 for Microsoft Exchangem, and 4.0 for Novell GroupWise before SP3 Hotfix 1 might allow user-assisted remote attackers to execute arbitrary code on the server via a crafted Microsoft Word document that is opened on a wireless device.
10116| [CVE-2006-0753] Memory leak in Microsoft Internet Explorer 6 for Windows XP Service Pack 2 allows remote attackers to cause a denial of service (memory consumption) via JavaScript that uses setInterval to repeatedly call a function to set the value of window.status.
10117| [CVE-2006-0544] urlmon.dll in Microsoft Internet Explorer 7.0 beta 2 (aka 7.0.5296.0) allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a BGSOUND element with its SRC attribute set to "file://" followed by a large number of "-" (dash of hyphen) characters.
10118| [CVE-2006-0003] Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.
10119| [CVE-2005-1929] Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product.
10120| [CVE-2005-0852] Microsoft Windows XP SP1 allows local users to cause a denial of service (system crash) via an empty datagram to a raw IP over IP socket (IP protocol 4), as originally demonstrated using code in Python 2.3.
10121| [CVE-2004-1322] Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail messages.
10122| [CVE-2003-1306] Microsoft URLScan 2.5, with the RemoveServerHeader option enabled, allows remote attackers to obtain sensitive information (server name and version) via an HTTP request that generates certain errors such as 400 "Bad Request," which leak the Server header in the response.
10123| [CVE-2003-0903] Buffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.
10124| [CVE-2003-0353] Buffer overflow in a component of SQL-DMO for Microsoft Data Access Components (MDAC) 2.5 through 2.7 allows remote attackers to execute arbitrary code via a long response to a broadcast request to UDP port 1434.
10125| [CVE-2002-1918] Buffer overflow in Microsoft Active Data Objects (ADO) in Microsoft MDAC 2.5 through 2.7 allows remote attackers to have unknown impact with unknown attack vectors. NOTE: due to the lack of details available regarding this issue, perhaps it should be REJECTED.
10126| [CVE-2002-1142] Heap-based buffer overflow in the Remote Data Services (RDS) component of Microsoft Data Access Components (MDAC) 2.1 through 2.6, and Internet Explorer 5.01 through 6.0, allows remote attackers to execute code via a malformed HTTP request to the Data Stub.
10127| [CVE-2002-1015] RealJukebox 2 1.0.2.340 and 1.0.2.379, and RealOne Player Gold 6.0.10.505, allows remote attackers to execute arbitrary script in the Local computer zone by inserting the script into the skin.ini file of an RJS archive, then referencing skin.ini from a web page after it has been extracted, which is parsed as HTML by Internet Explorer or other Microsoft-based web readers.
10128| [CVE-2002-0697] Microsoft Metadirectory Services (MMS) 2.2 allows remote attackers to bypass authentication and modify sensitive data by using an LDAP client to directly connect to MMS and bypass the checks for MMS credentials.
10129| [CVE-2002-0057] XMLHTTP control in Microsoft XML Core Services 2.6 and later does not properly handle IE Security Zone settings, which allows remote attackers to read arbitrary files by specifying a local file as an XML Data Source.
10130| [CVE-2001-1218] Microsoft Internet Explorer for Unix 5.0SP1 allows local users to possibly cause a denial of service (crash) in CDE or the X server on Solaris 2.6 by rapidly scrolling Chinese characters or maximizing the window.
10131| [CVE-2000-0563] The URLConnection function in MacOS Runtime Java (MRJ) 2.1 and earlier and the Microsoft virtual machine (VM) for MacOS allows a malicious web site operator to connect to arbitrary hosts using a HTTP redirection, in violation of the Java security model.
10132| [CVE-1999-1097] Microsoft NetMeeting 2.1 allows one client to read the contents of another client's clipboard via a CTRL-C in the chat box when the box is empty.
10133|
10134| SecurityFocus - https://www.securityfocus.com/bid/:
10135| [83154] Microsoft Windows 2000 Server CVE-2004-0540 Remote Security Vulnerability
10136| [45297] Microsoft Exchange Server 2007 Infinite Loop Remote Denial of Service Vulnerability
10137| [43419] Microsoft Excel 2002 Memory Corruption Vulnerability
10138| [43189] Microsoft Visual C++ 2008 Redistributable Package DLL Loading Arbitrary Code Execution Vulnerability
10139| [42742] Microsoft PowerPoint 2007 Multiple DLL Loading Arbitrary Code Execution Vulnerability
10140| [42695] Microsoft Groove 2007 'mso.dll' DLL Loading Arbitrary Code Execution Vulnerability
10141| [42681] Microsoft Visio 2003 'mfc71enu.dll' DLL Loading Arbitrary Code Execution Vulnerability
10142| [41843] Microsoft Outlook Web Access for Exchange Server 2003 Cross Site Request Forgery Vulnerability
10143| [39776] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
10144| [37196] RETIRED: Microsoft December 2009 Advance Notification Multiple Vulnerabilities
10145| [36940] RETIRED: Microsoft November 2009 Advance Notification Multiple Vulnerabilities
10146| [36633] RETIRED: Microsoft October 2009 Advance Notification Multiple Vulnerabilities
10147| [36239] RETIRED: Microsoft September 2009 Advance Notification Multiple Vulnerabilities
10148| [35974] RETIRED: Microsoft August 2009 Advance Notification Multiple Vulnerabilities
10149| [35617] RETIRED: Microsoft July 2009 Advance Notification Multiple Vulnerabilities
10150| [35213] RETIRED: Microsoft June 2009 Advance Notification Multiple Vulnerabilities
10151| [34867] RETIRED: Microsoft May 2009 Advance Notification Multiple Vulnerabilities
10152| [34532] Microsoft IAG 2007 ActiveX Control Multiple Stack Based Buffer Overflow Vulnerabilities
10153| [34469] Microsoft Word 2000 WordPerfect Converter Remote Code Execution Vulnerability
10154| [34450] RETIRED: Microsoft April 2009 Advance Notification Multiple Vulnerabilities
10155| [34005] RETIRED: Microsoft March 2009 Advance Notification Multiple Vulnerabilities
10156| [33639] RETIRED: Microsoft February 2009 Advance Notification Multiple Vulnerabilities
10157| [33170] RETIRED: Microsoft January 2009 Advance Notification Multiple Vulnerabilities
10158| [32632] RETIRED: Microsoft December 2008 Advance Notification Multiple Vulnerabilities
10159| [32153] Retired: Microsoft November 2008 Advance Notification Multiple Vulnerabilities
10160| [31667] Retired: Microsoft October 2008 Advance Notification Multiple Vulnerabilities
10161| [31129] RETIRED: Microsoft SQL Server 2000 'sqlvdir.dll' ActiveX Buffer Overflow Vulnerability
10162| [31014] RETIRED: Microsoft September 2008 Advance Notification Multiple Vulnerabilities
10163| [30593] RETIRED: Microsoft August 2008 Advance Notification Multiple Vulnerabilities
10164| [30075] RETIRED: Microsoft July 2008 Advance Notification Multiple Vulnerabilities
10165| [29576] RETIRED: Microsoft June 2008 Advance Notification Multiple Vulnerabilities
10166| [29108] RETIRED: Microsoft May 2008 Advance Notification Multiple Vulnerabilities
10167| [28598] RETIRED: Microsoft April 2008 Advance Notification Multiple Vulnerabilities
10168| [28124] Retired: Microsoft March 2008 Advance Notification Multiple Vulnerabilities
10169| [27674] RETIRED: Microsoft February 2008 Advance Notification Multiple Vulnerabilities
10170| [27119] RETIRED: Microsoft January 2008 Advance Notification Multiple Vulnerabilities
10171| [26739] RETIRED: Microsoft December 2007 Advance Notification Multiple Vulnerabilities
10172| [26414] Microsoft Forms 2.0 ActiveX Control Memory Access Violation Denial of Service Vulnerabilities
10173| [26380] Retired: Microsoft November 2007 Advance Notification Multiple Vulnerabilities
10174| [25991] RETIRED: Microsoft Office 2000 and XP Unspecified Word Document Handling DoS Vulnerability
10175| [25922] RETIRED: Microsoft October 2007 Advance Notification Multiple Vulnerabilities
10176| [25573] RETIRED: Microsoft September 2007 Advance Notification Multiple Vulnerabilities
10177| [25247] Retired: Microsoft August 2007 Advance Notification Multiple Vulnerabilities
10178| [24771] Retired: Microsoft July 2007 Advance Notification Multiple Vulnerabilities
10179| [24366] RETIRED: Microsoft June 2007 Advance Notification Multiple Vulnerabilities
10180| [24118] Microsoft Office 2000 UA OUACTRL.OCX ActiveX Control Buffer Overflow Vulnerability
10181| [23800] RETIRED: Microsoft May 2007 Advance Notification Multiple Vulnerabilities
10182| [23380] Microsoft Word 2007 WWLib.DLL Unspecified Document File Buffer Overflow Vulnerability
10183| [23335] RETIRED: Microsoft April 2007 Advance Notification Multiple Vulnerabilities
10184| [22716] Microsoft Office 2003 Denial of Service Vulnerability
10185| [22567] Microsoft Word 2000/2002 Document Stream Remote Code Execution Vulnerability
10186| [22328] RETIRED: Microsoft Word 2003 Unspecified Code Execution Vulnerability
10187| [22225] Microsoft Word 2000 Malformed Function Code Execution Vulnerability
10188| [21611] Microsoft Project Server 2003 PDSRequest.ASP XML Request Information Disclosure Vulnerability
10189| [21495] Microsoft Windows 2000 Remote Installation Service Remote Code Execution Vulnerability
10190| [20843] Microsoft Visual Studio 2005 WMI Object Broker Remote Code Execution Vulnerability
10191| [19636] Microsoft Windows 2000 Multiple COM Object Instantiation Code Execution Vulnerabilities
10192| [19388] Microsoft Windows 2000 Kernel Local Privilege Escalation Vulnerability
10193| [17134] Microsoft Commerce Server 2002 Authentication Bypass Vulnerability
10194| [16634] Microsoft PowerPoint 2000 Remote Information Disclosure Vulnerability
10195| [14772] Microsoft Exchange Server 2003 Exchange Information Store Denial Of Service Vulnerability
10196| [14093] Microsoft Update Rollup 1 for Windows 2000 SP4 Released - Multiple Vulnerabilities Fixed
10197| [13564] Microsoft SQL Server 2000 Multiple Vulnerabilities
10198| [13008] Microsoft Windows Server 2003 SMB Redirector Local Denial Of Service Vulnerability
10199| [12972] Microsoft Windows Server 2003 Service Pack 1 Released - Multiple Vulnerabilities Fixed
10200| [12913] Microsoft Outlook 2002 Connector For IBM Lotus Domino Policy Bypass Vulnerability
10201| [12824] Microsoft InfoPath 2003 Insecure Information Storage Vulnerability
10202| [12641] Microsoft Windows 2000 Group Policy Bypass Vulnerability
10203| [12141] Microsoft FrontPage 2000 Internet Publishing Service Provider DAV File Upload Vulnerability
10204| [11820] Microsoft Windows 2000 Resource Kit W3Who.DLL Multiple Remote Vulnerabilities
10205| [11446] Microsoft Outlook 2003 Security Policy Bypass Vulnerability
10206| [11387] Microsoft Windows 2003 Services Default SACL Access Right Weakness
10207| [10901] Microsoft Windows 2000/XP CRL File Failed Integrity Check Denial Of Service Vulnerability
10208| [10693] Microsoft Windows 2000 Media Player Control Media Preview Script Execution Vulnerability
10209| [10484] Microsoft ISA Server 2000 FTP Bounce Filtering Vulnerability
10210| [10480] Microsoft ISA Server 2000 Site And Content Rule Bypass Vulnerability
10211| [10440] Microsoft Windows 2000 Domain Expired Account Security Policy Violation Weakness
10212| [10369] Microsoft Outlook 2003 Media File Script Execution Vulnerability
10213| [10307] Microsoft Outlook 2003 Predictable File Location Weakness
10214| [10114] Microsoft Windows 2000 Domain Controller LDAP Denial Of Service Vulnerability
10215| [9409] Microsoft Exchange Server 2003 Outlook Web Access Random Mailbox Access Vulnerability
10216| [9408] Microsoft ISA Server 2000 H.323 Filter Remote Buffer Overflow Vulnerability
10217| [9118] Microsoft Exchange Server 2003 Outlook Web Access Lowered Security Settings Weakness
10218| [8833] Microsoft Windows 2000 TroubleShooter ActiveX Control Buffer Overflow Vulnerability
10219| [8522] Multiple Microsoft Windows 2003 Stack Protection Implementation Weaknesses
10220| [8397] Microsoft Windows 2000 Subnet Bandwidth Manager RSVP Server Authority Hijacking Vulnerability
10221| [8104] Microsoft Windows 2000 Unauthorized RPC Connection Weakness
10222| [8098] Microsoft Windows 2000 Terminal Services Named Pipe System Account Access Vulnerability
10223| [8093] Microsoft Windows 2000 Active Directory Forest Origin Validation Vulnerability
10224| [8090] Microsoft Windows 2000 ShellExecute() Buffer Overflow Vulnerability
10225| [8089] Microsoft Windows 2000 Unspecified Cryptnet.DLL Memory Leakage Vulnerability
10226| [8086] Microsoft Windows 2000 Port Name Buffers Potential Buffer Overflow Vulnerability
10227| [8085] Microsoft Windows 2000 ModifyDN Request Denial of Service Vulnerability
10228| [8083] Microsoft Windows 2000 Domain Controller Spoofing Vulnerability
10229| [8081] Microsoft Windows 2000 USBH_IoctlGetNodeConnectionDriverKeyName Information Disclosure Vulnerability
10230| [8063] Microsoft Commerce Server 2002 Weak Registry Key Permissions Weakness
10231| [8045] Microsoft Windows 2000 SP4 Released - Multiple Vulnerabilities Fixed
10232| [7930] Microsoft Windows 2000 Active Directory Remote Stack Overflow Vulnerability
10233| [7788] Microsoft Windows 2000/XP/2003 IPV6 ICMP Flood Denial Of Service Vulnerability
10234| [7469] Microsoft BizTalk Server 2002 HTTP Receiver Buffer Overflow Vulnerability
10235| [7360] Microsoft Windows 2000/XP Registry Editor Custom Permissions Weakness
10236| [7102] Microsoft Windows 2000 Help Facility .CNT File :Link Buffer Overflow Vulnerability
10237| [6769] Microsoft Windows 2000 RPC Service Privilege Escalation Vulnerability
10238| [6766] Microsoft Windows 2000 NetBIOS Continuation Packets Kernel Memory Leak Vulnerability
10239| [6667] Microsoft Outlook 2002 V1 Exchange Server Security Certificate Information Leakage Vulnerability
10240| [6319] Microsoft Outlook 2002 Email Header Processing Denial of Service Vulnerability
10241| [6030] Microsoft Windows 2000 SNMP Printer Query Denial of Service Vulnerability
10242| [5972] Microsoft Windows 2000/XP Full Event Log Administrative Alert Weakness
10243| [5922] Microsoft Content Management Server 2001 Cross-Site Scripting Vulnerability
10244| [5480] Microsoft Windows 2000 Network Connection Manager Privilege Elevation Vulnerability
10245| [5422] Microsoft Content Management Server 2001 SQL Injection Vulnerability
10246| [5421] Microsoft Content Management Server 2001 Arbitrary Upload Location Vulnerability
10247| [5420] Microsoft Content Management Server 2001 User Authentication Buffer Overflow Vulnerability
10248| [5415] Microsoft Windows 2000 Insecure Default File Permissions Vulnerability
10249| [5413] Microsoft Exchange 2000 Post Authorization License Exhaustion Denial Of Service Vulnerability
10250| [5412] Microsoft Exchange 2000 Multiple MSRPC Denial Of Service Vulnerabilities
10251| [5312] Microsoft SQL Server 2000 Resolution Service Denial of Service Vulnerability
10252| [5311] Microsoft SQL Server 2000 Resolution Service Stack Overflow Vulnerability
10253| [5310] Microsoft SQL Server 2000 Resolution Service Heap Overflow Vulnerability
10254| [5309] Microsoft SQL Server 2000 sp_MScopyscript SQL Injection Vulnerability
10255| [5307] Microsoft SQL Server 2000 Database Consistency Checkers Buffer Overflow Vulnerability
10256| [5253] Microsoft Windows 2000 Narrator Password Disclosure Vulnerability
10257| [5205] Microsoft SQL Server 2000 Incorrect Registry Key Permissions Vulnerability
10258| [5111] Microsoft Commerce Server 2000 OWC Package Installer Local Command Execution Vulnerability
10259| [5014] Microsoft SQL Server 2000 Password Encrypt Procedure Buffer Overflow Vulnerability
10260| [4881] Microsoft Exchange 2000 Malformed Mail Attribute DoS Vulnerability
10261| [4853] Microsoft Commerce Server 2000 Profile Service Buffer Overflow Vulnerability
10262| [4852] Microsoft Windows 2000 Remote Access Service Buffer Overflow Vulnerability
10263| [4847] Microsoft SQL Server 2000 Bulk Insert Procedure Buffer Overflow Vulnerability
10264| [4797] Microsoft MSDE/SQL Server 2000 Desktop Engine Default Configuration Vulnerability
10265| [4683] Microsoft Windows 2000 / NT Path Precedence Vulnerability
10266| [4532] Microsoft Windows 2000 Lanman Denial of Service Vulnerability
10267| [4438] Microsoft Windows 2000 Group Policy Evasion Vulnerability
10268| [4426] Microsoft Windows 2000 / NT / XP MUP UNC Request Buffer Overflow Vulnerability
10269| [4287] Microsoft Windows 2000 / NT 4.0 Process Handle Local Privilege Elevation Vulnerability
10270| [4256] Microsoft Windows 2000 Password Policy Bypass Vulnerability
10271| [4157] Microsoft Commerce Server 2000 ISAPI Buffer Overflow Vulnerability
10272| [4095] Microsoft Windows 2000 Server Terminal Services Failure To Lock Terminal Vulnerability
10273| [3652] Microsoft Windows 2000 Internet Key Exchange DoS Vulnerability
10274| [3481] Microsoft Windows 2000/XP GDI Denial of Service Vulnerability
10275| [3479] Microsoft Windows 2000 NTFS With Macintosh Client Directory Permission Vulnerability
10276| [3445] Microsoft Windows 2000/NT Terminal Server Service RDP DoS Vulnerability
10277| [3339] Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability
10278| [3305] Norton AntiVirus for Microsoft Exchange 2000 Information Disclosure Vulnerability
10279| [3291] Microsoft Windows 2000 RunAs Service Denial of Services Vulnerability
10280| [3215] Microsoft Windows 2000 IrDA Buffer Overflow Denial of Service Vulnerability
10281| [3185] Microsoft Windows 2000 RunAs Service Named Pipe Hijacking Vulnerability
10282| [3184] Microsoft Windows 2000 RunAs User Credentials Exposure Vulnerability
10283| [3146] Microsoft Windows 2000 System File Replacement Vulnerability
10284| [3115] Microsoft Windows NT and 2000 Command Prompt Reboot Vulnerability
10285| [3063] Microsoft Windows 2000 Unauthorized Password Change Vulnerability
10286| [3033] Microsoft Windows 2000 Task Manager Process Termination Vulnerability
10287| [2988] Microsoft Windows 2000 SMTP Improper Authentication Vulnerability
10288| [2929] Microsoft Windows 2000 LDAP SSL Password Modification Vulnerability
10289| [2849] Microsoft Windows 2000 Telnet Privilege Escalation Vulnerability
10290| [2846] Microsoft Windows 2000 Telnet System Call DoS Vulnerability
10291| [2844] Microsoft Windows 2000 Telnet Service DoS Vulnerability
10292| [2843] Microsoft Windows 2000 Telnet Multiple Sessions DoS Vulnerability
10293| [2838] Microsoft Windows 2000 Telnet Username DoS Vulnerability
10294| [2460] Microsoft Windows 2000 Event Viewer Buffer Overflow Vulnerability
10295| [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
10296| [2394] Microsoft Windows 2000 Domain Controller DoS Vulnerability
10297| [2341] Microsoft Windows 2000 Network DDE Escalated Privileges Vulnerability
10298| [2326] Microsoft Windows 2000 RDP DoS Vulnerability
10299| [2133] Microsoft Windows 2000 Directory Services Restore Mode Blank Password Vulnerability
10300| [2066] Microsoft Windows NT 4.0 / 2000 SNMP Registry Key Modification Vulnerability
10301| [2018] Microsoft Windows 2000 Telnet Session Timeout DoS Vulnerability
10302| [2007] Microsoft Windows 2000 DNS Memory Leak Vulnerability
10303| [1973] Microsoft Windows 2000 Domain Account Lockout Bypass Vulnerability
10304| [1958] Microsoft Exchange 2000 Server EUSR_EXSTOREEVENT Account Vulnerability
10305| [1933] Microsoft Indexing Services for Windows 2000 File Verification Vulnerability
10306| [1899] Microsoft Windows 2000 ActiveX Control Buffer Overflow Vulnerability
10307| [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
10308| [1758] Microsoft Windows 2000 Unattended Install OEMPreinstall Vulnerability
10309| [1753] Microsoft Windows NT 4.0 / 2000 Spoofed LPC Request Vulnerability
10310| [1748] Microsoft Windows NT 4.0 / 2000 Predictable LPC Message Identifier Multiple Vulnerabilities
10311| [1745] Microsoft Windows NT 4.0 / 2000 LPC Zone Memory Depletion DoS Vulnerability
10312| [1729] Microsoft Windows 2000 Simplified Chinese IME Vulnerability
10313| [1695] Microsoft Proxy 2.0 FTP Permissions Bypass Vulnerability
10314| [1692] Microsoft Proxy 2.0 Internal Network Access Vulnerability
10315| [1683] Microsoft Windows 2000 telnet.exe NTLM Authentication Vulnerability
10316| [1673] Microsoft Windows 2000 Malformed RPC Packet DoS Vulnerability
10317| [1651] Microsoft Windows 2000 Still Image Service Privilege Escalation Vulnerability
10318| [1632] Microsoft Windows 98 / NT 4.0 / 2000 File Extension Validation Vulnerability
10319| [1620] Microsoft Windows 9x / NT 4.0 / 2000 NetBIOS Cache Corruption Vulnerability
10320| [1613] Microsoft Windows 2000 Local Security Policy Corruption Vulnerability
10321| [1566] Microsoft Word 97 / 2000 Mail Merge Code Execution Vulnerability
10322| [1561] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow Vulnerability
10323| [1535] Microsoft Windows 2000 Named Pipes Predictability Vulnerability
10324| [1507] Microsoft Windows NT 4.0 / 2000 Unspecified Executable Path Vulnerability
10325| [1451] Microsoft Excel 97 / 2000 Register.ID Vulnerability
10326| [1435] Microsoft FrontPage 2000 Server Extensions Denial Of Service Vulnerability
10327| [1415] Microsoft Windows 2000 Remote CPU-overload Vulnerability
10328| [1414] Microsoft Windows 2000 Telnet Server DoS Vulnerability
10329| [1399] Microsoft Internet Explorer 5.01 and Excel/Powerpoint 2000 ActiveX Object Execution Vulnerability
10330| [1398] Microsoft Internet Explorer 5.01 and Access 2000 / 97 VBA Code Execution Vulnerability
10331| [1350] Microsoft Windows 2000 Windows Station Access Vulnerability
10332| [1304] Microsoft Windows NT 4.0 / 2000 SMB Write Request DoS Vulnerability
10333| [1301] Microsoft Windows NT 4.0 / 2000 Ignored SMB Response DoS Vulnerability
10334| [1295] Microsoft Windows 2000 Default 40-bit Encrypted Protected Store Vulnerability
10335| [1198] Microsoft Windows 2000 Default SYSKEY Configuration Vulnerability
10336| [1197] Microsoft Office 2000 UA Control Vulnerability
10337| [990] Microsoft Windows 2000 Install Unprotected ADMIN$ Share Vulnerability
10338| [945] Microsoft SMS 2.0 Default Permissions Vulnerability
10339| [539] Microsoft Windows 2000 EFS Vulnerability
10340| [180] Microsoft Windows April Fools 2001 Vulnerability
10341| [71487] Microsoft December 2014 Advance Notification Multiple Vulnerabilities
10342| [70966] RETIRED: Microsoft November 2014 Advance Notification Multiple Vulnerabilities
10343| [70367] RETIRED: Microsoft October 2014 Advance Notification Multiple Vulnerabilities
10344| [69636] RETIRED: Microsoft September 2014 Advance Notification Multiple Vulnerabilities
10345| [69108] Microsoft August 2014 Advance Notification Multiple Vulnerabilities
10346| [68367] Microsoft July 2014 Advance Notification Multiple Vulnerabilities
10347| [67905] Microsoft June 2014 Advance Notification Multiple Vulnerabilities
10348| [67298] Microsoft May 2014 Advance Notification Multiple Vulnerabilities
10349| [66639] RETIRED: Microsoft April 2014 Advance Notification Multiple Vulnerabilities
10350| [66016] Microsoft March 2014 Notification Multiple Vulnerabilities
10351| [65426] Microsoft February 2014 Notification Multiple Vulnerabilities
10352| [64757] RETIRED: Microsoft January 2014 Advance Notification Multiple Vulnerabilities
10353| [64083] RETIRED: Microsoft December 2013 Advance Notification Multiple Vulnerabilities
10354| [63604] RETIRED: Microsoft November 2013 Advance Notification Multiple Vulnerabilities
10355| [62797] RETIRED: Microsoft October 2013 Advance Notification Multiple Vulnerabilities
10356| [62228] RETIRED: Microsoft September 2013 Advance Notification Multiple Vulnerabilities
10357| [62181] Microsoft Office Pinyin IME 2010 CVE-2013-3859 Local Privilege Escalation Vulnerability
10358| [61686] Microsoft August 2013 Advance Notification Multiple Vulnerabilities
10359| [60960] RETIRED: Microsoft July 2013 Advance Notification Multiple Vulnerabilities
10360| [60394] Microsoft June 2013 Advance Notification Multiple Vulnerabilities
10361| [59785] RETIRED: Microsoft May 2013 Advance Notification Multiple Vulnerabilities
10362| [58881] RETIRED: Microsoft April 2013 Advance Notification Multiple Vulnerabilities
10363| [58380] RETIRED: Microsoft March 2013 Advance Notification Multiple Vulnerabilities
10364| [57846] RETIRED: Microsoft February 2013 Advance Notification Multiple Vulnerabilities
10365| [57137] RETIRED: Microsoft January 2013 Advance Notification Multiple Vulnerabilities
10366| [56838] RETIRED: Microsoft December 2012 Advance Notification Multiple Vulnerabilities
10367| [56450] RETIRED: Microsoft November 2012 Advance Notification Multiple Vulnerabilities
10368| [56304] Microsoft Office Excel 2010 Memory Corruption Denial of Service Vulnerability
10369| [55794] RETIRED: Microsoft October 2012 Advance Notification Multiple Vulnerabilities
10370| [55472] RETIRED: Microsoft September 2012 Advance Notification Multiple Vulnerabilities
10371| [54944] RETIRED: Microsoft August 2012 Advance Notification Multiple Vulnerabilities
10372| [54318] RETIRED: Microsoft July 2012 Advance Notification Multiple Vulnerabilities
10373| [53862] RETIRED: Microsoft June 2012 Advance Notification Multiple Vulnerabilities
10374| [53372] RETIRED: Microsoft May 2012 Advance Notification Multiple Vulnerabilities
10375| [52910] RETIRED: Microsoft April 2012 Advance Notification Multiple Vulnerabilities
10376| [52366] RETIRED: Microsoft March 2012 Advance Notification Multiple Vulnerabilities
10377| [51944] RETIRED: Microsoft February 2012 Advance Notification Multiple Vulnerabilities
10378| [51289] RETIRED: Microsoft January 2012 Advance Notification Multiple Vulnerabilities
10379| [50980] RETIRED: Microsoft December 2011 Advance Notification Multiple Vulnerabilities
10380| [50513] RETIRED: Microsoft November 2011 Advance Notification Multiple Vulnerabilities
10381| [49994] RETIRED: Microsoft October 2011 Advance Notification Multiple Vulnerabilities
10382| [49515] RETIRED: Microsoft September 2011 Advance Notification Multiple Vulnerabilities
10383| [49017] RETIRED: Microsoft August 2011 Advance Notification Multiple Vulnerabilities
10384| [48616] RETIRED: Microsoft July 2011 Advance Notification Multiple Vulnerabilities
10385| [48235] Microsoft Lync Server 2010 'ReachJoin.aspx' Remote Command Injection Vulnerability
10386| [48193] RETIRED: Microsoft June 2011 Advance Notification Multiple Vulnerabilities
10387| [47725] RETIRED: Microsoft May 2011 Advance Notification Multiple Vulnerabilities
10388| [47255] RETIRED: Microsoft April 2011 Advance Notification Multiple Vulnerabilities
10389| [46675] RETIRED: Microsoft March 2011 Advance Notification Multiple Vulnerabilities
10390| [46132] RETIRED: Microsoft February 2011 Advance Notification Multiple Vulnerabilities
10391| [45696] RETIRED: Microsoft January 2011 Advance Notification Multiple Vulnerabilities
10392| [45307] RETIRED: Microsoft December 2010 Advance Notification Multiple Vulnerabilities
10393| [44649] RETIRED: Microsoft November 2010 Advance Notification Multiple Vulnerabilities
10394| [43831] RETIRED: Microsoft October 2010 Advance Notification Multiple Vulnerabilities
10395| [43115] RETIRED: Microsoft September 2010 Advance Notification Multiple Vulnerabilities
10396| [42234] RETIRED: Microsoft August 2010 Advance Notification Multiple Vulnerabilities
10397| [41474] RETIRED: Microsoft July 2010 Advance Notification Multiple Vulnerabilities
10398| [40548] RETIRED: Microsoft June 2010 Advance Notification Multiple Vulnerabilities
10399| [39961] RETIRED: Microsoft May 2010 Advance Notification Multiple Vulnerabilities
10400| [39313] RETIRED: Microsoft April 2010 Advance Notification Multiple Vulnerabilities
10401| [38540] RETIRED: Microsoft March 2010 Advance Notification Multiple Vulnerabilities
10402| [38096] RETIRED: Microsoft February 2010 Advance Notification Multiple Vulnerabilities
10403| [37887] RETIRED: Microsoft January 2010 Advance Notification Multiple Vulnerabilities
10404| [37664] RETIRED: Microsoft January 2010 Advance Notification Multiple Vulnerabilities
10405| [32642] Microsoft Word RTF Malformed Control Word Variant 2 Remote Code Execution Vulnerability
10406|
10407| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10408| [82417] Microsoft Windows Knowledge Base Article 2801261 update is not installed
10409| [82415] Microsoft Windows Knowledge Base Article 2807986 update is not installed
10410| [82410] Microsoft Windows Knowledge Base Article 2809289 update is not installed
10411| [81859] Microsoft Windows Knowledge Base Article 2802968 update is not installed
10412| [81857] Microsoft Windows Knowledge Base Article 2809279 update is not installed
10413| [81668] Microsoft Windows Knowledge Base Article 2800277 update is not installed
10414| [77323] Microsoft Windows Knowledge Base Article 2706045 update is not installed
10415| [75949] Microsoft Windows Knowledge Base Article 2707960 update is not installed
10416| [75942] Microsoft Windows Knowledge Base Article 2706726 update is not installed
10417| [75934] Microsoft Windows Knowledge Base Article 2709162 update is not installed
10418| [75926] Microsoft Windows Knowledge Base Article 2709100 update is not installed
10419| [75905] Microsoft Windows Knowledge Base Article 2707956 update is not installed
10420| [71991] Microsoft Windows Knowledge Base Article 2607664 update is not installed
10421| [71542] Microsoft Windows Knowledge Base Article 2607702 update is not installed
10422| [70945] Microsoft Windows Knowledge Base Article 2603381 update is not installed
10423| [70150] Microsoft Windows Knowledge Base Article 2607670 update is not installed
10424| [67755] Microsoft Windows Knowledge Base Article 2503665 update is not installed
10425| [67749] Microsoft Windows Knowledge Base Article 2507938 update is not installed
10426| [66845] Microsoft Windows Knowledge Base Article 2506014 update is not installed
10427| [66844] Microsoft Windows Knowledge Base Article 2501584 update is not installed
10428| [66448] Microsoft Windows Knowledge Base Article 2508272 update is not installed
10429| [66442] Microsoft Windows Knowledge Base Article 2509553 update is not installed
10430| [66440] Microsoft Windows Knowledge Base Article 2508429 update is not installed
10431| [66438] Microsoft Windows Knowledge Base Article 2507618 update is not installed
10432| [66430] Microsoft Windows Knowledge Base Article 2503658 update is not installed
10433| [66425] Microsoft Windows Knowledge Base Article 2506223 update is not installed
10434| [65570] Microsoft Windows Knowledge Base Article 2500212 update is not installed
10435| [65568] Microsoft Windows Knowledge Base Article 2508062 update is not installed
10436| [63840] Microsoft Visual C++ 2008 Redistributable Package dynamic-linked library (DLL) code execution
10437| [63780] Microsoft PowerPoint 2007 dynamic-linked library (rpawinet.dll) code execution
10438| [63775] Microsoft Visio 2003 dynamic-linked library (mfc71enu.dll) code execution
10439| [63586] Microsoft Windows Knowledge Base Article 2207559 update is not installed
10440| [63573] Microsoft Windows Knowledge Base Article 2407132 update is not installed
10441| [62797] Microsoft Windows Knowledge Base Article 2305420 update is not installed
10442| [62149] Microsoft Windows Knowledge Base Article 2207566 update is not installed
10443| [62133] Microsoft Windows Knowledge Base Article 2405882 update is not installed
10444| [53980] Microsoft Windows 2000 License Logging Server buffer overflow
10445| [53601] Microsoft Office 2008 for Mac user ID 502 security bypass
10446| [50973] Microsoft Windows Server 2003 and Vista win32k.sys denial of service
10447| [50759] Microsoft Windows 2000 Active Directory LDAP code execution
10448| [48595] Microsoft Word 2007 Email as PDF information disclosure
10449| [46102] Microsoft Windows 2003 SP2 is not installed on the system
10450| [46101] Microsoft Windows 2003 SP1 is not installed on the system
10451| [45186] Microsoft SQL Server 2000 SQLVDIRLib.SQLVDirControl ActiveX control buffer overflow
10452| [37200] Microsoft SQL Server 2000 Service Pack 1 update is not installed
10453| [37198] Microsoft SQL Server 2000 Service Pack 3 update is not installed
10454| [34634] Microsoft Windows Server 2003 Active Directory information disclosure
10455| [34599] Microsoft Windows Server 2003 terminal server security bypass
10456| [34473] Microsoft Office 2000 ActiveX control buffer overflow
10457| [33713] Microsoft Word 2007 multiple unspecified denial of service
10458| [33712] Microsoft Word 2007 wwlib.dll buffer overflow
10459| [32631] Microsoft SQL Server 2000 Service Pack 2 update is not installed
10460| [31821] Microsoft Windows time zone update for year 2007
10461| [31196] Microsoft Office 2003 Brazilian Grammar Checker buffer overflow
10462| [30905] Microsoft Project Server 2003 pdsrequest.asp information disclosure
10463| [29546] Microsoft Windows 2000/2003 user logoff initiated
10464| [29545] Microsoft Windows 2000/2003 system time changed
10465| [29544] Microsoft Windows 2000/2003 system security access removed
10466| [29543] Microsoft Windows 2000/2003 security access granted
10467| [29542] Microsoft Windows 2000/2003 SAM notification package loaded
10468| [29541] Microsoft Windows 2000/2003 primary security token issued
10469| [29540] Microsoft Windows 2000/2003 user password reset successful
10470| [29539] Microsoft Windows 2000/2003 object indirectly accessed
10471| [29538] Microsoft Windows 2000/2003 object handle duplicated
10472| [29537] Microsoft Windows 2000/2003 logon with explicit credentials success
10473| [29536] Microsoft Windows 2000/2003 logon attempt using explicit credentials unsuccessful
10474| [29535] Microsoft Windows 2000/2003 IPSEC policy agent failed
10475| [29534] Microsoft Windows 2000/2003 IPSEC policy agent disabled
10476| [29533] Microsoft Windows 2000/2003 IPSEC policy agent changed
10477| [29532] Microsoft Windows 2000/2003 IKE security association established
10478| [29531] Microsoft Windows 2000/2003 IKE quick mode association ended
10479| [29530] Microsoft Windows 2000/2003 IKE main mode association ended
10480| [29529] Microsoft Windows 2000/2003 IKE association negotiation failed
10481| [29528] Microsoft Windows 2000/2003 IKE association peer authentication failed
10482| [29527] Microsoft Windows 2000/2003 IKE association failed invalid proposal
10483| [29526] Microsoft Windows 2000/2003 IKE association failed authentication parameters
10484| [29525] Microsoft Windows 2000/2003 DPAPI master key backup attempted
10485| [29524] Microsoft Windows 2000/2003 DPAPI key recovery attempted
10486| [29523] Microsoft Windows 2000/2003 DPAPI auditable data unprotected
10487| [29522] Microsoft Windows 2000/2003 administrative group security descriptor set
10488| [29521] Microsoft Windows 2000/2003 account name changed
10489| [29507] Microsoft Office 2003 unspecified PowerPoint NULL pointer dereference denial of service
10490| [28512] Microsoft Internet Explorer multiple Windows 2000 COM object denial of service
10491| [28005] Microsoft Windows 2000 Management Console (MMC) resource file cross-site scripting
10492| [26118] Microsoft Office 2003 mailto: information disclosure
10493| [25330] Microsoft Commerce Server 2002 authfiles/login.asp authentication bypass
10494| [24474] Microsoft Windows 2000 LDAP client accepts untrusted CA
10495| [24473] Microsoft Windows 2000 event ID 565 not logged
10496| [24472] Microsoft Windows 2000 Event ID 1704 records incorrect group policy settings
10497| [24407] Microsoft Windows 2000 SECEDIT command fails to set ACLs correctly
10498| [24405] Microsoft Windows 2000 UPN credentials with trailing dot group policy bypass
10499| [24403] Microsoft Windows 2000 WideCharToMultiByte() incorrect Japanese character conversion
10500| [24402] Microsoft Windows 2000 Terminal Service client IP not logged
10501| [24400] Microsoft Windows 2000 domain authentication can be bypassed by a local administrator
10502| [23066] Microsoft Windows XP and 2000 Server MSRPC memory allocation denial of service
10503| [22318] Microsoft SQL Server 2000 Service Pack 4 update is not installed
10504| [22183] Microsoft Exchange Server 2003 public folder denial of service
10505| [21345] Microsoft Windows 2000 Update Rollup 1 for Service Pack 4 has not been installed
10506| [21315] Microsoft Outlook 2002 connector for Domino bypass restrictions
10507| [19969] Multiple Microsoft Windows Server 2003 Edition printer driver denial of service
10508| [19965] Multiple Microsoft Windows Server 2003 Editions SMB redirector denial of service
10509| [19727] Microsoft Windows 2000 GDI32.DLL denial of service
10510| [19629] Microsoft Exchange Server 2003 folder denial of service
10511| [17826] Microsoft Outlook 2003 CID security bypass
10512| [17624] Microsoft Windows XP and Windows Server 2003 Compressed Folders buffer overflow
10513| [17621] Microsoft Windows 2003 SMTP service code execution
10514| [17560] Microsoft Windows 2000 and XP GDI library denial of service
10515| [17521] Microsoft Windows 2000 Service Pack 4 is not installed
10516| [16913] Microsoft Windows 2003 users with Synchronize directory service data privilege
10517| [16912] Microsoft Windows 2003 groups with Synchronize directory service data privilege
10518| [16909] Microsoft Windows 2003 groups with Remove computer from docking station privilege
10519| [16907] Microsoft Windows 2003 users with Create global objects privilege
10520| [16905] Microsoft Windows 2003 users or groups with Create global objects privilege
10521| [16851] Microsoft Windows 2003 and XP WinKey and U key denial of service
10522| [16704] Microsoft Windows 2000 Media Player control code execution
10523| [16582] Microsoft Windows Server 2003 kernel CPU denial of service
10524| [16572] Microsoft Windows 2003 Users with Impersonate a client after authentication privilege
10525| [16570] Microsoft Windows 2003 Users with Create global objects privilege
10526| [16564] Microsoft Windows 2003 Groups with Create global objects privilege
10527| [16562] Microsoft Windows 2003 Groups with "
10528| [16522] Microsoft Windows 2003 Impersonate a client after authentication privilege
10529| [16521] Microsoft Windows 2003 Deny Logon Through Terminal Services privilege
10530| [16520] Microsoft Windows 2003 Create global objects privilege
10531| [16276] Microsoft Windows 2000 Advanced Server fully qualified domain name security bypass
10532| [16173] Microsoft Outlook 2003 OLE object bypass restricted security zone
10533| [16119] Microsoft Outlook 2000 URL spoofing
10534| [16104] Microsoft Outlook 2003 predictable file location could allow code execution
10535| [16095] Microsoft Windows XP and Windows Server 2003 HCP URL code execution
10536| [15704] Microsoft Windows XP and Windows Server 2003 HCP URL code execution
10537| [15700] Microsoft Windows 2000 Domain Controller LSASS LDAP message denial of service
10538| [15632] Microsoft Windows 2000 Utility Manger allows privilege escalation
10539| [15414] Microsoft Outlook 2002 mailto URL allows execution of code
10540| [15263] Microsoft Windows XP and 2000 Server kernel allows elevated privileges
10541| [15057] Microsoft Windows XP and Windows Server 2003 smbmount Linux client denial of service
10542| [15038] Microsoft Windows 2000 Server Windows Media Services denial of service
10543| [15037] Microsoft Windows Server 2003 WINS /GS flag denial of service
10544| [14178] Microsoft ISA Exchange Server 2003 MS04-002 patch is not installed
10545| [14167] Microsoft ISA Server 2000 H.323 filter buffer overflow
10546| [13426] Microsoft Windows 2000 and XP RPC race condition
10547| [13423] Microsoft Windows 2000 Local Troubleshooter ActiveX control buffer overflow
10548| [13407] Microsoft Windows 2000 Server mqsvc.exe MQLocateBegin packet buffer overflow
10549| [13385] Microsoft Windows Server 2003 "
10550| [13211] Microsoft Windows 2000 and XP URG memory leak
10551| [13171] Microsoft Windows Server 2003 can allow attacker to bypass mechanism used to detect buffer overflows
10552| [13131] Microsoft Windows 2000 Message Queue Manager buffer overflow
10553| [12684] Microsoft Exchange Server OWA Outlook 2003 denial of service
10554| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
10555| [12620] Microsoft Windows 2000 Server SMTP FILETIME denial of service
10556| [12543] Microsoft Windows 2000 Accessibility Utility Manager could allow an attacker to gain privileges
10557| [12493] Microsoft Windows Shell32.dll 2000 ShellExecute function buffer overflow
10558| [12489] Microsoft Windows 2000 Server Active Directory buffer overflow
10559| [12128] Microsoft Windows 2000 and Windows NT MS03-019 patch is not installed
10560| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
10561| [12048] Microsoft Windows 2000 and Windows Server 2003 LAN Manager hash creation enabled
10562| [11901] Microsoft BizTalk Server 2002 SQL injection
10563| [11900] Microsoft BizTalk Server 2002 HTTP Receiver function buffer overflow
10564| [11816] Microsoft Windows 2000 Terminal Services MSGINA.DLL insecure access permissions
10565| [11696] Microsoft Windows 2000 Terminal Services man-in-the-middle attack
10566| [11617] Microsoft Windows 2000 MS03-007 patch is not installed on the system
10567| [11546] Microsoft Windows 2000 Windows Help Facility .cnt file buffer overflow
10568| [11329] Microsoft Windows NT and 2000 cmd.exe CD path name buffer overflow
10569| [11274] Microsoft Windows 2000 NetBIOS continuation packets denial of service
10570| [11273] Microsoft Windows 2000 RPC service could allow an attacker to gain elevated privileges
10571| [11216] Microsoft Windows NT and 2000 command prompt denial of service
10572| [11141] Microsoft Windows 2000 Terminal Services MSGINA.DLL denial of service
10573| [11133] Microsoft Outlook 2002 using V1 Exchange Server Security certificates transmits plaintext emails
10574| [10843] Microsoft Windows 2000 and XP SMB signing group policy modification
10575| [10431] Microsoft Windows 2000 SNMP LANMAN Extension memory leak denial of service
10576| [10400] Microsoft Windows 2000 RPC TCP port 135 denial of service
10577| [10377] Microsoft Windows XP and 2000 administrative alerts fail when security event log is full
10578| [10199] Microsoft Windows 2000/XP PPTP packet buffer overflow
10579| [10195] Microsoft FrontPage Server Extensions (FPSE) 2002 SmartHTML Interpreter buffer overflow
10580| [10194] Microsoft FrontPage Server Extensions (FPSE) 2000 SmartHTML Interpreter denial of service
10581| [9946] Microsoft Windows 2000 Terminal Services session screensaver fails to lock the console
10582| [9856] Microsoft Windows 2000 NCM handler routine could allow elevated privileges
10583| [9779] Microsoft Windows 2000 weak system partition permissions
10584| [9752] Microsoft Windows 2000 Service Pack 3 is not installed
10585| [9746] Microsoft Windows 2000 HTML Help item parameter buffer overflow
10586| [9625] Microsoft Windows 2000 Narrator allows login information to be audible
10587| [9154] Microsoft Data Engine (MSDE) and Microsoft SQL Server 2000 Desktop Engine have a default blank "
10588| [8867] Microsoft Windows 2000 LanMan denial of service
10589| [8813] Microsoft Windows 2000 Terminal Services allows attacker to bypass group policy settings
10590| [8759] Microsoft Windows 2000 could allow an attacker to block the application of Group Policy settings
10591| [8752] Microsoft Windows NT, 2000, and XP MUP buffer overflow
10592| [8739] Microsoft Windows 2000 DCOM memory leak
10593| [8708] Microsoft Outlook 2000 and 2002 executes embedded script in object tag when replying or forwarding HTML mail
10594| [8402] Microsoft Windows 2000 allows an attacker to bypass password policy
10595| [8307] Microsoft Windows 2000, Windows XP, and Exchange 2000 SMTP data transfer command denial of service
10596| [8304] Microsoft Windows 2000 and Exchange 5.5 SMTP service unauthorized mail privileges
10597| [8254] Microsoft Commerce Server 2000 AuthFilter ISAPI filter buffer overflow
10598| [8199] Microsoft Windows 2000 Terminal Services unlocked client
10599| [8094] Microsoft Windows 2000 and Interix 2.2 Telnet protocol option buffer overflow
10600| [8092] Microsoft Exchange 2000 System Attendant sets incorrect registry permissions
10601| [8043] Microsoft Windows NT, 2000, and XP using NTFS could allow files to be hidden
10602| [8037] Microsoft Windows 2000 empty TCP packet denial of service
10603| [8023] Microsoft Windows NT and Windows 2000 SIDs could allow an attacker to gain elevated privileges in another domain
10604| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
10605| [7667] Microsoft Windows 2000 IKE UDP packet flood denial of service
10606| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
10607| [7538] Microsoft Windows 2000 and XP Terminal services allow an attacker to spoof IP addresses
10608| [7533] Microsoft Windows 2000 RunAs service denial of service
10609| [7532] Microsoft Windows 2000 RunAs service allows local attacker to bypass pipe authentication
10610| [7531] Microsoft Windows 2000 RunAs service reveals sensitive information
10611| [7528] Microsoft Windows NT and Windows 2000 malformed RPC request denial of service
10612| [7409] Microsoft Windows 2000 and Windows XP GDI denial of service
10613| [7302] Microsoft Windows NT and 2000 Terminal Server malformed RDP packet series denial of service
10614| [7008] Microsoft Windows 2000 IrDA device denial of service
10615| [6977] Microsoft Windows NT and 2000 NNTP memory leak denial of service
10616| [6931] Microsoft Windows 2000 without Service Pack 2
10617| [6919] Microsoft Windows 2000 Task Manager does not terminate malicious files with the same name as a system process
10618| [6912] Microsoft Windows NT and 2000 Terminal Server RDP memory leak denial of service
10619| [6876] Microsoft Windows 2000 could allow an attacker to change network passwords
10620| [6803] Microsoft Windows 2000 SMTP service allows mail relaying
10621| [6745] Microsoft Windows 2000 LDAP function could allow domain user password change
10622| [6669] Microsoft Windows 2000 Telnet system call denial of service
10623| [6668] Microsoft Windows 2000 Telnet handle leak denial of service
10624| [6667] Microsoft Windows 2000 Telnet multiple idle sessions denial of service
10625| [6666] Microsoft Windows 2000 Telnet username denial of service
10626| [6665] Microsoft Windows 2000 Telnet service weak domain authentication
10627| [6664] Microsoft Windows 2000 Telnet service predictable pipe names could allow elevation of privileges
10628| [6652] Microsoft Exchange 2000 OWA script execution
10629| [6590] Microsoft Windows 2000 debug registers allow attacker to gain elevated privileges
10630| [6506] Microsoft Windows 2000 Server Kerberos denial of service
10631| [6443] Microsoft Windows 2000 catalog file could remove installed hotfixes
10632| [6160] Microsoft Windows 2000 event viewer buffer overflow
10633| [6136] Microsoft Windows 2000 domain controller denial of service
10634| [6035] Microsoft Windows 2000 Server RDP denial of service
10635| [5973] Microsoft Windows 2000 EFS allows local user to recover sensitive data
10636| [5936] Microsoft Windows 2000 Server Directory Service Restore Mode allows user to login with blank password
10637| [5800] Microsoft Windows 2000 Index Service ActiveX controls allow unauthorized access to file information
10638| [5623] Microsoft Windows NT and 2000 Phone Book service buffer overflow
10639| [5598] Microsoft Windows 2000 Telnet daemon could allow a denial of service
10640| [5585] Microsoft Windows 2000 brute force attack
10641| [5502] Microsoft Windows 2000 Indexing Services ixsso.query
10642| [5467] Microsoft Windows 2000 System Monitor ActiveX control buffer overflow
10643| [5399] Microsoft Windows NT and 2000 Network Monitor buffer overflow
10644| [5301] Microsoft Windows 2000 Simplified Chinese IME State Recognition
10645| [5263] Microsoft Office 2000 executes .dll without users knowledge
10646| [5242] Microsoft Windows 2000 Telnet client NTLM authentication weakness
10647| [5222] Microsoft Windows 2000 malformed RPC packet denial of service
10648| [5203] Microsoft Windows 2000 still image service
10649| [5171] Microsoft Windows 2000 Local Security Policy corruption
10650| [5080] Microsoft Office 2000 HTML object tag buffer overflow
10651| [5033] Microsoft Windows 2000 without Service Pack 1
10652| [5031] Microsoft Windows 2000 Service Control Manager named pipe could allow a unauthorized user to gain privileges
10653| [5015] Microsoft Windows NT and 2000 executable path
10654| [4887] Microsoft Windows 2000 Kerberos ticket renewed
10655| [4886] Microsoft Windows 2000 logon session reconnected
10656| [4885] Microsoft Windows 2000 logon session disconnected
10657| [4882] Microsoft Windows 2000 Kerberos pre-authentication failed
10658| [4873] Microsoft Windows 2000 user account mapped for logon
10659| [4872] Microsoft Windows 2000 account logon failed
10660| [4871] Microsoft Windows 2000 account used for logon
10661| [4855] Microsoft Windows 2000 group type change
10662| [4842] Microsoft Internet Explorer and Microsoft Powerpoint 2000 ActiveX object execution
10663| [4841] Microsoft Internet Explorer and Microsoft Access 2000 VBA code execution
10664| [4823] Microsoft Windows 2000 Telnet server binary stream denial of service
10665| [4819] Microsoft Windows 2000 default SYSKEY configuration
10666| [4787] Microsoft Windows 2000 user account locked out
10667| [4786] Microsoft Windows 2000 computer account created
10668| [4785] Microsoft Windows 2000 computer account changed
10669| [4784] Microsoft Windows 2000 computer account deleted
10670| [4714] Microsoft Windows 2000 "
10671| [4589] Microsoft Windows 2000 protected store can be compromised by brute force attack
10672| [4278] Microsoft Windows 2000 unattended install does not secure All Users profile
10673| [4138] Microsoft Windows 2000 system file integrity feature is disabled
10674| [4086] Microsoft Windows 2000 may not start Jaz drives correctly
10675| [4085] Microsoft Windows 2000 non-Gregorial calendar error
10676| [4084] Microsoft Windows 2000 may prevent Adobe FrameMaker files from being saved in some formats
10677| [4083] Microsoft Windows 2000 Terminal Services may damage Office files saved as HTML
10678| [4082] Microsoft Windows 2000 and Iomega parallel port drives display error
10679| [4080] Microsoft Windows 2000 AOL image support
10680| [4079] Microsoft Windows 2000 High Encryption Pack
10681| [3854] Microsoft Office 2000 security setting
10682| [1376] Microsoft Proxy 2.0 denial of service
10683| [86256] Microsoft Windows Knowledge Base Article 2876063 update is not installed
10684| [86097] Microsoft Windows Knowledge Base Article 2859537 update is not installed
10685| [86091] Microsoft Windows Knowledge Base Article 2868623 update is not installed
10686| [86089] Microsoft Windows Knowledge Base Article 2862772 update is not installed
10687| [86075] Microsoft Windows Knowledge Base Article 2850869 update is not installed
10688| [86073] Microsoft Windows Knowledge Base Article 2873872 update is not installed
10689| [86070] Microsoft Windows Knowledge Base Article 2849568 update is not installed
10690| [85245] Microsoft Windows Knowledge Base Article 2848295 update is not installed
10691| [85244] Microsoft Windows Knowledge Base Article 2847927 update is not installed
10692| [85243] Microsoft Windows Knowledge Base Article 2861561 update is not installed
10693| [85236] Microsoft Windows Knowledge Base Article 2850851 update is not installed
10694| [85227] Microsoft Windows Knowledge Base Article 2847883 update is not installed
10695| [85223] Microsoft Windows Knowledge Base Article 2846071 update is not installed
10696| [85205] Microsoft Windows Knowledge Base Article 2845187 update is not installed
10697| [84621] Microsoft Windows Knowledge Base Article 2845690 update is not installed
10698| [84619] Microsoft Windows Knowledge Base Article 2839894 update is not installed
10699| [84617] Microsoft Windows Knowledge Base Article 2839571 update is not installed
10700| [84615] Microsoft Windows Knowledge Base Article 2839229 update is not installed
10701| [84613] Microsoft Windows Knowledge Base Article 2838727 update is not installed
10702| [84156] Microsoft Windows Knowledge Base Article 2847204 update is not installed
10703| [83912] Microsoft Windows Knowledge Base Article 2829254 update is not installed
10704| [83910] Microsoft Windows Knowledge Base Article 2829530 update is not installed
10705| [83898] Microsoft Windows Knowledge Base Article 2830397 update is not installed
10706| [83886] Microsoft Windows Knowledge Base Article 2830399 update is not installed
10707| [83884] Microsoft Windows Knowledge Base Article 2834692 update is not installed
10708| [83882] Microsoft Windows Knowledge Base Article 2834695 update is not installed
10709| [83880] Microsoft Windows Knowledge Base Article 2836440 update is not installed
10710| [83876] Microsoft Windows Knowledge Base Article 2840221 update is not installed
10711| [83192] Microsoft Windows Knowledge Base Article 2817183 update is not installed
10712| [83100] Microsoft Windows Knowledge Base Article 2830914 update is not installed
10713| [83098] Microsoft Windows Knowledge Base Article 2829996 update is not installed
10714| [83093] Microsoft Windows Knowledge Base Article 2828223 update is not installed
10715| [83091] Microsoft Windows Knowledge Base Article 2813170 update is not installed
10716| [83088] Microsoft Windows Knowledge Base Article 2827663 update is not installed
10717| [83086] Microsoft Windows Knowledge Base Article 2823482 update is not installed
10718| [83084] Microsoft Windows Knowledge Base Article 2821818 update is not installed
10719| [83082] Microsoft Windows Knowledge Base Article 2820917 update is not installed
10720| [82600] Microsoft Windows Knowledge Base Article 2813707 update is not installed
10721| [82424] Microsoft Windows Knowledge Base Article 2814124 update is not installed
10722| [82422] Microsoft Windows Knowledge Base Article 2780176 update is not installed
10723| [82401] Microsoft Windows Knowledge Base Article 2813682 update is not installed
10724| [82399] Microsoft Windows Knowledge Base Article 2816264 update is not installed
10725| [81683] Microsoft Windows Knowledge Base Article 2780091 update is not installed
10726| [81681] Microsoft Windows Knowledge Base Article 2784242 update is not installed
10727| [81680] Microsoft Windows Knowledge Base Article 2790113 update is not installed
10728| [81678] Microsoft Windows Knowledge Base Article 2790655 update is not installed
10729| [81676] Microsoft Windows Knowledge Base Article 2790978 update is not installed
10730| [81674] Microsoft Windows Knowledge Base Article 2797052 update is not installed
10731| [81672] Microsoft Windows Knowledge Base Article 2799494 update is not installed
10732| [81666] Microsoft Windows Knowledge Base Article 2778344 update is not installed
10733| [81634] Microsoft Windows Knowledge Base Article 2792100 update is not installed
10734| [81339] Microsoft Windows Knowledge Base Article 2799329 update is not installed
10735| [80875] Microsoft Windows Knowledge Base Article 2756145 update is not installed
10736| [80872] Microsoft Windows Knowledge Base Article 2769324 update is not installed
10737| [80867] Microsoft Windows Knowledge Base Article 2769327 update is not installed
10738| [80865] Microsoft Windows Knowledge Base Article 2769369 update is not installed
10739| [80863] Microsoft Windows Knowledge Base Article 2778930 update is not installed
10740| [80861] Microsoft Windows Knowledge Base Article 2785220 update is not installed
10741| [80365] Microsoft Windows Knowledge Base Article 2761465 update is not installed
10742| [80360] Microsoft Windows Knowledge Base Article 2765809 update is not installed
10743| [80358] Microsoft Windows Knowledge Base Article 2770660 update is not installed
10744| [80356] Microsoft Windows Knowledge Base Article 2780642 update is not installed
10745| [80352] Microsoft Windows Knowledge Base Article 2783534 update is not installed
10746| [80349] Microsoft Windows Knowledge Base Article 2784126 update is not installed
10747| [79693] Microsoft Windows Knowledge Base Article 2745030 update is not installed
10748| [79687] Microsoft Windows Knowledge Base Article 2761451 update is not installed
10749| [79683] Microsoft Windows Knowledge Base Article 2761226 update is not installed
10750| [79679] Microsoft Windows Knowledge Base Article 2758857 update is not installed
10751| [79677] Microsoft Windows Knowledge Base Article 2727528 update is not installed
10752| [78864] Microsoft Windows Knowledge Base Article 2754670 update is not installed
10753| [78862] Microsoft Windows Knowledge Base Article 2743555 update is not installed
10754| [78858] Microsoft Windows Knowledge Base Article 2754849 update is not installed
10755| [78856] Microsoft Windows Knowledge Base Article 2724197 update is not installed
10756| [78853] Microsoft Windows Knowledge Base Article 2741517 update is not installed
10757| [78851] Microsoft Windows Knowledge Base Article 2742319 update is not installed
10758| [78848] Microsoft Windows Knowledge Base Article 2742321 update is not installed
10759| [78760] Microsoft Windows Knowledge Base Article 2744842 update is not installed
10760| [78077] Microsoft Windows Knowledge Base Article 2741528 update is not installed
10761| [78075] Microsoft Windows Knowledge Base Article 2720184 update is not installed
10762| [78071] Microsoft Windows Knowledge Base Article 2748552 update is not installed
10763| [77512] Microsoft Windows Knowledge Base Article 2740358 update is not installed
10764| [77362] Microsoft Windows Knowledge Base Article 2733918 update is not installed
10765| [77360] Microsoft Windows Knowledge Base Article 2733829 update is not installed
10766| [77357] Microsoft Windows Knowledge Base Article 2733594 update is not installed
10767| [77352] Microsoft Windows Knowledge Base Article 2731879 update is not installed
10768| [77350] Microsoft Windows Knowledge Base Article 2731847 update is not installed
10769| [77348] Microsoft Windows Knowledge Base Article 2723135 update is not installed
10770| [77346] Microsoft Windows Knowledge Base Article 2722913 update is not installed
10771| [77342] Microsoft Windows Knowledge Base Article 2720573 update is not installed
10772| [77325] Microsoft Windows Knowledge Base Article 2719584 update is not installed
10773| [76808] Microsoft Windows Knowledge Base Article 2721015 update is not installed
10774| [76725] Microsoft Windows Knowledge Base Article 2722479 update is not installed
10775| [76724] Microsoft Windows Knowledge Base Article 2719177 update is not installed
10776| [76721] Microsoft Windows Knowledge Base Article 2718523 update is not installed
10777| [76718] Microsoft Windows Knowledge Base Article 2698365 update is not installed
10778| [76711] Microsoft Windows Knowledge Base Article 2695502 update is not installed
10779| [76704] Microsoft Windows Knowledge Base Article 2691442 update is not installed
10780| [76702] Microsoft Windows Knowledge Base Article 2655992 update is not installed
10781| [75963] Microsoft Windows Knowledge Base Article 2699988 update is not installed
10782| [75939] Microsoft Windows Knowledge Base Article 2685939 update is not installed
10783| [75928] Microsoft Windows Knowledge Base Article 2711167 update is not installed
10784| [75136] Microsoft Windows Knowledge Base Article 2693777 update is not installed
10785| [75132] Microsoft Windows Knowledge Base Article 2690533 update is not installed
10786| [75130] Microsoft Windows Knowledge Base Article 2688338 update is not installed
10787| [75127] Microsoft Windows Knowledge Base Article 2681578 update is not installed
10788| [75123] Microsoft Windows Knowledge Base Article 2680352 update is not installed
10789| [75116] Microsoft Windows Knowledge Base Article 2597981 update is not installed
10790| [74556] Microsoft Windows Knowledge Base Article 2639185 update is not installed
10791| [74384] Microsoft Windows Knowledge Base Article 2675157 update is not installed
10792| [74378] Microsoft Windows Knowledge Base Article 2671605 update is not installed
10793| [74373] Microsoft Windows Knowledge Base Article 2664258 update is not installed
10794| [74369] Microsoft Windows Knowledge Base Article 2663860 update is not installed
10795| [73543] Microsoft Windows Knowledge Base Article 2671387 update is not installed
10796| [73540] Microsoft Windows Knowledge Base Article 2665364 update is not installed
10797| [73538] Microsoft Windows Knowledge Base Article 2651019 update is not installed
10798| [73536] Microsoft Windows Knowledge Base Article 2651018 update is not installed
10799| [73533] Microsoft Windows Knowledge Base Article 2647170 update is not installed
10800| [73530] Microsoft Windows Knowledge Base Article 2641653 update is not installed
10801| [72887] Microsoft Windows Knowledge Base Article 2663841 update is not installed
10802| [72873] Microsoft Windows Knowledge Base Article 2663830 update is not installed
10803| [72867] Microsoft Windows Knowledge Base Article 2663510 update is not installed
10804| [72857] Microsoft Windows Knowledge Base Article 2661637 update is not installed
10805| [72855] Microsoft Windows Knowledge Base Article 2660465 update is not installed
10806| [72853] Microsoft Windows Knowledge Base Article 2653956 update is not installed
10807| [72851] Microsoft Windows Knowledge Base Article 2654428 update is not installed
10808| [72849] Microsoft Windows Knowledge Base Article 2651026 update is not installed
10809| [72846] Microsoft Windows Knowledge Base Article 2647516 update is not installed
10810| [72841] Microsoft Windows Knowledge Base Article 2645640 update is not installed
10811| [72838] Microsoft Windows Knowledge Base Article 2643719 update is not installed
10812| [72029] Microsoft Windows Knowledge Base Article 2638420 update is not installed
10813| [72003] Microsoft Windows Knowledge Base Article 2646524 update is not installed
10814| [71998] Microsoft Windows Knowledge Base Article 2644615 update is not installed
10815| [71995] Microsoft Windows Knowledge Base Article 2643584 update is not installed
10816| [71994] Microsoft Windows Knowledge Base Article 2636391 update is not installed
10817| [71565] Microsoft Windows Knowledge Base Article 2648048 update is not installed
10818| [71562] Microsoft Windows Knowledge Base Article 2640241 update is not installed
10819| [71560] Microsoft Windows Knowledge Base Article 2640045 update is not installed
10820| [71558] Microsoft Windows Knowledge Base Article 2639417 update is not installed
10821| [71557] Microsoft Windows Knowledge Base Article 2639142 update is not installed
10822| [71554] Microsoft Windows Knowledge Base Article 2633171 update is not installed
10823| [71552] Microsoft Windows Knowledge Base Article 2624667 update is not installed
10824| [71550] Microsoft Windows Knowledge Base Article 2620712 update is not installed
10825| [71548] Microsoft Windows Knowledge Base Article 2618451 update is not installed
10826| [71546] Microsoft Windows Knowledge Base Article 2618444 update is not installed
10827| [71538] Microsoft Windows Knowledge Base Article 2590602 update is not installed
10828| [70951] Microsoft Windows Knowledge Base Article 2630837 update is not installed
10829| [70949] Microsoft Windows Knowledge Base Article 2620704 update is not installed
10830| [70947] Microsoft Windows Knowledge Base Article 2617657 update is not installed
10831| [70943] Microsoft Windows Knowledge Base Article 2588516 update is not installed
10832| [70152] Microsoft Windows Knowledge Base Article 2623699 update is not installed
10833| [70140] Microsoft Windows Knowledge Base Article 2652016 update is not installed
10834| [70130] Microsoft Windows Knowledge Base Article 2586448 update is not installed
10835| [70115] Microsoft Windows Knowledge Base Article 2567053 update is not installed
10836| [69501] Microsoft Windows Knowledge Base Article 2587634 update is not installed
10837| [69498] Microsoft Windows Knowledge Base Article 2587505 update is not installed
10838| [69492] Microsoft Windows Knowledge Base Article 2571621 update is not installed
10839| [69490] Microsoft Windows Knowledge Base Article 2570947 update is not installed
10840| [68840] Microsoft Windows Knowledge Base Article 2451858 update is not installed
10841| [68833] Microsoft Windows Knowledge Base Article 2567943 update is not installed
10842| [68831] Microsoft Windows Knowledge Base Article 2570222 update is not installed
10843| [68829] Microsoft Windows Knowledge Base Article 2567951 update is not installed
10844| [68827] Microsoft Windows Knowledge Base Article 2578230 update is not installed
10845| [68825] Microsoft Windows Knowledge Base Article 2546250 update is not installed
10846| [68823] Microsoft Windows Knowledge Base Article 2559049 update is not installed
10847| [68816] Microsoft Windows Knowledge Base Article 2556532 update is not installed
10848| [68814] Microsoft Windows Knowledge Base Article 2560656 update is not installed
10849| [68812] Microsoft Windows Knowledge Base Article 2560978 update is not installed
10850| [68809] Microsoft Windows Knowledge Base Article 2562485 update is not installed
10851| [68806] Microsoft Windows Knowledge Base Article 2566454 update is not installed
10852| [68804] Microsoft Windows Knowledge Base Article 2563894 update is not installed
10853| [68801] Microsoft Windows Knowledge Base Article 2567680 update is not installed
10854| [68315] Microsoft Windows Knowledge Base Article 2555917 update is not installed
10855| [68299] Microsoft Windows Knowledge Base Article 2566220 update is not installed
10856| [68283] Microsoft Windows Knowledge Base Article 2560847 update is not installed
10857| [67955] Microsoft Windows Knowledge Base Article 2530548 update is not installed
10858| [67943] Microsoft Windows Knowledge Base Article 2544521 update is not installed
10859| [67762] Microsoft Windows Knowledge Base Article 2543893 update is not installed
10860| [67759] Microsoft Windows Knowledge Base Article 2544893 update is not installed
10861| [67757] Microsoft Windows Knowledge Base Article 2476490 update is not installed
10862| [67753] Microsoft Windows Knowledge Base Article 2514842 update is not installed
10863| [67751] Microsoft Windows Knowledge Base Article 2518295 update is not installed
10864| [67737] Microsoft Windows Knowledge Base Article 2520426 update is not installed
10865| [67733] Microsoft Windows Knowledge Base Article 2525694 update is not installed
10866| [67731] Microsoft Windows Knowledge Base Article 2525835 update is not installed
10867| [67728] Microsoft Windows Knowledge Base Article 2535512 update is not installed
10868| [67725] Microsoft Windows Knowledge Base Article 2536275 update is not installed
10869| [67722] Microsoft Windows Knowledge Base Article 2536276 update is not installed
10870| [67718] Microsoft Windows Knowledge Base Article 2537146 update is not installed
10871| [67709] Microsoft Windows Knowledge Base Article 2538814 update is not installed
10872| [67302] Microsoft Windows Knowledge Base Article 2545814 update is not installed
10873| [67101] Microsoft Windows Knowledge Base Article 2524426 update is not installed
10874| [66446] Microsoft Windows Knowledge Base Article 2514666 update is not installed
10875| [66444] Microsoft Windows Knowledge Base Article 2511455 update is not installed
10876| [66436] Microsoft Windows Knowledge Base Article 2497640 update is not installed
10877| [66432] Microsoft Windows Knowledge Base Article 2527308 update is not installed
10878| [66428] Microsoft Windows Knowledge Base Article 2489979 update is not installed
10879| [66423] Microsoft Windows kernel-mode driver (win32k.sys) variant 29 privilege escalation
10880| [66422] Microsoft Windows kernel-mode driver (win32k.sys) variant 28 privilege escalation
10881| [66421] Microsoft Windows kernel-mode driver (win32k.sys) variant 27 privilege escalation
10882| [66420] Microsoft Windows kernel-mode driver (win32k.sys) variant 26 privilege escalation
10883| [66419] Microsoft Windows kernel-mode driver (win32k.sys) variant 25 privilege escalation
10884| [66418] Microsoft Windows kernel-mode driver (win32k.sys) variant 24 privilege escalation
10885| [66417] Microsoft Windows kernel-mode driver (win32k.sys) variant 23 privilege escalation
10886| [66416] Microsoft Windows kernel-mode driver (win32k.sys) variant 22 privilege escalation
10887| [66415] Microsoft Windows kernel-mode driver (win32k.sys) variant 21 privilege escalation
10888| [66414] Microsoft Windows kernel-mode driver (win32k.sys) variant 20 privilege escalation
10889| [66396] Microsoft Windows kernel-mode driver (win32k.sys) variant 2 privilege escalation
10890| [66394] Microsoft Windows Knowledge Base Article 2485663 update is not installed
10891| [65588] Microsoft Windows Knowledge Base Article 2489279 update is not installed
10892| [65581] Microsoft Windows Knowledge Base Article 2510030 update is not installed
10893| [65580] Microsoft Windows Knowledge Base Article 2489283 update is not installed
10894| [65575] Microsoft Windows Knowledge Base Article 2489293 update is not installed
10895| [65573] Microsoft Windows Knowledge Base Article 2494047 update is not installed
10896| [64973] Microsoft Windows Knowledge Base Article 2478960 update is not installed
10897| [64971] Microsoft Windows Knowledge Base Article 2479628 update is not installed
10898| [64927] Microsoft Windows Knowledge Base Article 2393802 update is not installed
10899| [64925] Microsoft Windows Knowledge Base Article 2451879 update is not installed
10900| [64920] Microsoft Windows Knowledge Base Article 2475792 update is not installed
10901| [64918] Microsoft Windows Knowledge Base Article 2476687 update is not installed
10902| [64916] Microsoft Windows Knowledge Base Article 2478953 update is not installed
10903| [64914] Microsoft Windows Knowledge Base Article 2482017 update is not installed
10904| [64910] Microsoft Windows Knowledge Base Article 2483185 update is not installed
10905| [64909] Microsoft Windows Knowledge Base Article 2484015 update is not installed
10906| [64907] Microsoft Windows Knowledge Base Article 2485376 update is not installed
10907| [64905] Microsoft Windows Knowledge Base Article 2489256 update is not installed
10908| [64902] Microsoft Windows Knowledge Base Article 2496930 update is not installed
10909| [64342] Microsoft Windows Knowledge Base Article 2451910 update is not installed
10910| [64339] Microsoft Windows Knowledge Base Article 2478935 update is not installed
10911| [63584] Microsoft Windows Knowledge Base Article 2424434 update is not installed
10912| [63582] Microsoft Windows Knowledge Base Article 2423089 update is not installed
10913| [63580] Microsoft Windows Knowledge Base Article 2436673 update is not installed
10914| [63571] Microsoft Windows Knowledge Base Article 2440591 update is not installed
10915| [63569] Microsoft Windows Knowledge Base Article 2385678 update is not installed
10916| [63566] Microsoft Windows Knowledge Base Article 2442962 update is not installed
10917| [63564] Microsoft Windows Knowledge Base Article 2345316 update is not installed
10918| [63562] Microsoft Windows Knowledge Base Article 2296199 update is not installed
10919| [63558] Microsoft Windows Knowledge Base Article 2416400 update is not installed
10920| [63550] Microsoft Windows Knowledge Base Article 2447961 update is not installed
10921| [63548] Microsoft Windows Knowledge Base Article 2443105 update is not installed
10922| [63546] Microsoft Windows Knowledge Base Article 2455005 update is not installed
10923| [63544] Microsoft Windows Knowledge Base Article 2292970 update is not installed
10924| [62805] Microsoft Windows Knowledge Base Article 2316074 update is not installed
10925| [62793] Microsoft Windows Knowledge Base Article 2293386 update is not installed
10926| [62789] Microsoft Windows Knowledge Base Article 2423930 update is not installed
10927| [62170] Microsoft Windows Knowledge Base Article 2296011 update is not installed
10928| [62166] Microsoft Windows Knowledge Base Article 2294255 update is not installed
10929| [62163] Microsoft Windows Knowledge Base Article 2281679 update is not installed
10930| [62154] Microsoft Windows Knowledge Base Article 2279986 update is not installed
10931| [62147] Microsoft Windows Knowledge Base Article 2160841 update is not installed
10932| [62134] Microsoft Windows Knowledge Base Article 2412048 update is not installed
10933| [62129] Microsoft Windows Knowledge Base Article 2387149 update is not installed
10934| [62126] Microsoft Windows Knowledge Base Article 2378111 update is not installed
10935| [62123] Microsoft Windows Knowledge Base Article 2360937 update is not installed
10936| [62118] Microsoft Windows Knowledge Base Article 2293211 update is not installed
10937| [62104] Microsoft Windows Knowledge Base Article 2360131 update is not installed
10938| [62098] Microsoft Windows Knowledge Base Article 2293194 update is not installed
10939| [62069] Microsoft Windows Knowledge Base Article 2418042 update is not installed
10940| [61519] Microsoft Windows Knowledge Base Article 2121546 update is not installed
10941| [61517] Microsoft Windows Knowledge Base Article 2259922 update is not installed
10942| [61514] Microsoft Windows Knowledge Base Article 2267960 update is not installed
10943| [61510] Microsoft Windows Knowledge Base Article 2315011 update is not installed
10944| [61507] Microsoft Windows Knowledge Base Article 2320113 update is not installed
10945| [61504] Microsoft Windows Knowledge Base Article 2347290 update is not installed
10946| [60736] Microsoft Windows Knowledge Base Article 2265906 update is not installed
10947| [60734] Microsoft Windows Knowledge Base Article 2269638 update is not installed
10948| [60728] Microsoft Windows Knowledge Base Article 2269707 update is not installed
10949| [60724] Microsoft Windows Knowledge Base Article 2286198 update is not installed
10950| [60713] Microsoft Windows Knowledge Base Article 2183461 update is not installed
10951| [60698] Microsoft Windows Knowledge Base Article 2160329 update is not installed
10952| [60686] Microsoft Windows Knowledge Base Article 2115168 update is not installed
10953| [60684] Microsoft Windows Knowledge Base Article 2079403 update is not installed
10954| [60680] Microsoft Windows Knowledge Base Article 2264072 update is not installed
10955| [59901] Microsoft Windows Knowledge Base Article 2229593 update is not installed
10956| [59898] Microsoft Windows Knowledge Base Article 2229593 update is not installed
10957| [58913] Microsoft Windows Knowledge Base Article 2027452 update is not installed
10958| [58891] Microsoft Windows Knowledge Base Article 2028554 update is not installed
10959| [17004] Microsoft Windows XP Service Pack 2 is not installed on the system
10960| [9187] Microsoft Passport SDK 2.1 Component Configuration Document (CCD) permission
10961| [9146] Microsoft Passport SDK 2.1 events reporting disabled
10962| [9068] Microsoft Passport SDK 2.1 registry default permission exposure
10963| [9067] Microsoft Passport SDK 2.1 default test site exposure
10964| [9066] Microsoft Passport SDK 2.1 Adventure Works Sample Site exposure
10965| [9065] Microsoft Passport SDK 2.1 Adventure Works Sample Site global.asa file default permission exposure
10966| [9064] Microsoft Passport SDK 2.1 default time window exposure
10967| [1271] Microsoft IIS version 2 installed
10968| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
10969|
10970| Exploit-DB - https://www.exploit-db.com:
10971| [30756] Microsoft Forms 2.0 ActiveX Control 2.0 Memory Access Violation Denial of Service Vulnerabilities
10972| [30749] Microsoft Office 2003 Web Component Memory Access Violation Denial of Service Vulnerability
10973| [30636] Microsoft Windows 2000/2003 Recursive DNS Spoofing Vulnerability (2)
10974| [30635] Microsoft Windows 2000/2003 Recursive DNS Spoofing Vulnerability (1)
10975| [30281] Microsoft .Net Framework <= 2.0 - Multiple Null Byte Injection Vulnerabilities
10976| [29664] Microsoft Office Publisher 2007 - Remote Denial of Service (DoS) Vulnerability
10977| [29660] Microsoft Office 2003 - Denial of Service (DoS) Vulnerability
10978| [29630] Microsoft Windows 2003/XP ReadDirectoryChangesW Information Disclosure Vulnerability
10979| [29524] Microsoft Word 2000 - Malformed Function Code Execution Vulnerability
10980| [28420] Microsoft Windows 2000 Multiple COM Object Instantiation Code Execution Vulnerabilities
10981| [28357] Microsoft Windows Explorer 2000/2003/XP Drag and Drop Remote Code Execution Vulnerability
10982| [28227] Microsoft Windows 2000/XP Registry Access Local Denial of Service Vulnerability
10983| [28226] Microsoft PowerPoint 2003 PPT File Closure Memory Corruption
10984| [28225] Microsoft PowerPoint 2003 powerpnt.exe Unspecified Issue
10985| [28224] Microsoft PowerPoint 2003 mso.dll PPT Processing Unspecified Code Execution
10986| [28198] Microsoft Office 2000/2002 Property Code Execution Vulnerability
10987| [28189] Microsoft Excel 2000-2004 Style Handling and Repair Remote Code Execution Vulnerability
10988| [28087] Microsoft Office 2003 Embedded Shockwave Flash Object Security Bypass Weakness
10989| [28005] Microsoft Exchange Server 2000/2003 Outlook Web Access Script Injection Vulnerability
10990| [26690] Microsoft Windows 2000/2003/XP CreateRemoteThread Local Denial of Service Vulnerability
10991| [26517] Microsoft Office PowerPoint 2007 - Crash PoC
10992| [26341] Microsoft Windows 2000/2003/XP MSDTC TIP Denial of Service Vulnerability
10993| [26222] Microsoft Windows 2000/2003/XP Keyboard Event Privilege Escalation Weakness
10994| [25384] Microsoft Windows 2000/XP Internet Protocol Validation Remote Code Execution Vulnerability (2)
10995| [25383] Microsoft Windows 2000/XP Internet Protocol Validation Remote Code Execution Vulnerability (1)
10996| [25231] Microsoft Windows 2000/2003/XP Graphical Device Interface Library Denial of Service Vulnerability
10997| [25085] Microsoft Office XP 2000/2002 HTML Link Processing Remote Buffer Overflow Vulnerability
10998| [25084] Microsoft Outlook 2003 Web Access Login Form Remote URI Redirection Vulnerability
10999| [25050] Microsoft Windows 2000/2003/XP winhlp32 Phrase Heap Overflow Vulnerability
11000| [25049] Microsoft Windows 2000/2003/XP winhlp32 Phrase Integer Overflow Vulnerability
11001| [24686] Microsoft Outlook 2003 Security Policy Bypass Vulnerability
11002| [24277] Microsoft Windows 2000/NT 4 POSIX Subsystem Buffer Overflow Local Privilege Escalation Vulnerability
11003| [24114] Microsoft Outlook 2003Mail Client E-mail Address Verification Weakness
11004| [24101] Microsoft Outlook 2003 Predictable File Location Weakness
11005| [23989] Microsoft Windows 2000/NT 4 Local Descriptor Table Local Privilege Escalation Vulnerability
11006| [23796] Microsoft Outlook 2002 Mailto Parameter Quoting Zone Bypass Vulnerability
11007| [23019] Microsoft Windows 2000 Subnet Bandwidth Manager RSVP Server Authority Hijacking Vulnerability
11008| [22919] Microsoft ISA Server 2000 Cross-Site Scripting Vulnerabilities
11009| [22883] Microsoft Windows 2000 CreateFile API Named Pipe Privilege Escalation Vulnerability (2)
11010| [22882] Microsoft Windows 2000 CreateFile API Named Pipe Privilege Escalation Vulnerability (1)
11011| [22837] Microsoft Windows 2000/NT 4 Media Services NSIISlog.DLL Remote Buffer Overflow
11012| [22782] Microsoft Windows 2000 Active Directory Remote Stack Overflow Vulnerability
11013| [22591] Microsoft Office Excel 2007 - WriteAV Crash PoC
11014| [22555] Microsoft BizTalk Server 2000/2002 DTA RawCustomSearchField.asp SQL Injection
11015| [22554] Microsoft BizTalk Server 2000/2002 DTA rawdocdata.asp SQL Injection Vulnerability
11016| [22553] Microsoft BizTalk Server 2002 HTTP Receiver Buffer Overflow Vulnerability
11017| [22528] Microsoft Windows 2000 RegEdit.EXE Registry Key Value Buffer Overflow Vulnerability
11018| [22354] Microsoft Windows 2000 Help Facility .CNT File :Link Buffer Overflow Vulnerability
11019| [21920] Microsoft Content Management Server 2001 Cross-Site Scripting Vulnerability
11020| [21718] Microsoft SQL 2000/7.0 Agent Jobs Privilege Elevation Vulnerability
11021| [21693] Microsoft SQL Server 2000 User Authentication Remote Buffer Overflow Vulnerability
11022| [21652] Microsoft SQL Server 2000 Resolution Service Heap Overflow Vulnerability
11023| [21651] Microsoft SQL Server 2000 sp_MScopyscript SQL Injection Vulnerability
11024| [21650] Microsoft SQL Server 2000 Database Consistency Checkers Buffer Overflow Vulnerability
11025| [21549] Microsoft SQL Server 2000 Password Encrypt Procedure Buffer Overflow Vulnerability
11026| [21541] Microsoft SQL Server 2000 SQLXML Script Injection Vulnerability
11027| [21540] Microsoft SQL Server 2000 SQLXML Buffer Overflow Vulnerability
11028| [21389] Microsoft Windows 2000 Lanman Denial of Service Vulnerability (2)
11029| [21388] Microsoft Windows 2000 Lanman Denial of Service Vulnerability (1)
11030| [21344] Microsoft Windows 2000 / NT 4.0 Process Handle Local Privilege Elevation Vulnerability
11031| [21258] Microsoft Windows 2000/NT 4 NTFS File Hiding Vulnerability
11032| [21246] Microsoft Windows 2000/NT 4 TCP Stack DoS Vulnerability (2)
11033| [21245] Microsoft Windows 2000/NT 4 TCP Stack DoS Vulnerability (1)
11034| [21172] Microsoft Windows 2000 Internet Key Exchange DoS Vulnerability (2)
11035| [21171] Microsoft Windows 2000 Internet Key Exchange DoS Vulnerability (1)
11036| [21131] Microsoft Windows 2000/XP GDI Denial of Service Vulnerability
11037| [21123] Microsoft Windows 2000/NT Terminal Server Service RDP DoS Vulnerability
11038| [21113] Microsoft Index Server 2.0 File Information and Path Disclosure Vulnerability
11039| [21099] Microsoft Windows 2000 RunAs Service Denial of Services Vulnerability
11040| [21069] Microsoft Windows 2000 RunAs Service Named Pipe Hijacking Vulnerability
11041| [20907] Microsoft Windows 2000 Telnet Username DoS Vulnerability
11042| [20802] Microsoft IIS 2.0/3.0 Long URL Denial of Service Vulnerability
11043| [20763] Microsoft ISA Server 2000 Web Proxy DoS Vulnerability
11044| [20571] Microsoft Outlook 2000 0/98 0/Express 5.5 Concealed Attachment Vulnerability
11045| [20481] Microsoft IIS 2.0/3.0 Appended Dot Script Source Disclosure Vulnerability
11046| [20399] Microsoft Indexing Services for Windows 2000 File Verification Vulnerability
11047| [20335] Microsoft Indexing Services for Windows 2000/NT 4.0 .htw Cross-Site Scripting Vulnerability
11048| [20305] Microsoft Site Server 2.0 with IIS 4.0 - File Upload Vulnerability
11049| [20265] Microsoft Windows NT 4.0 / 2000 Spoofed LPC Request Vulnerability
11050| [20257] Microsoft Windows NT 4.0 / 2000 Predictable LPC Message Identifier Multiple Vulnerabilities
11051| [20255] Microsoft Windows NT 4.0 / 2000 LPC Zone Memory Depletion DoS Vulnerability
11052| [20222] Microsoft Windows 2000 telnet.exe NTLM Authentication Vulnerability
11053| [20209] Microsoft Windows 2000 Still Image Service Privilege Escalation Vulnerability
11054| [20133] Microsoft Windows 2000 Named Pipes Predictability Vulnerability
11055| [20122] Microsoft Office SharePoint Server 2007 Remote Code Execution
11056| [20096] Microsoft IIS 2.0/3.0/4.0/5.0/5.1 Internal IP Address Disclosure Vulnerability
11057| [20048] Microsoft Windows 2000 Remote CPU-overload Vulnerability
11058| [20047] Microsoft Windows 2000 Telnet Server DoS Vulnerability
11059| [19830] Microsoft Index Server 2.0 '%20' ASP Source Disclosure Vulnerability
11060| [19742] microsoft iis 3.0/4.0,microsoft index server 2.0 - Directory Traversal
11061| [19734] Microsoft Virtual Machine 2000 Series/3000 Series getSystemResource Vulnerability
11062| [19731] microsoft index server 2.0/indexing services for windows 2000 - Directory Traversal
11063| [19728] Microsoft Systems Management Server 2.0 Default Permissions Vulnerability
11064| [19425] Microsoft Data Access Components (MDAC) <= 2.1,Microsoft IIS 3.0/4.0,Microsoft Index Server 2.0,Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (2)
11065| [19424] Microsoft Data Access Components (MDAC) <= 2.1,Microsoft IIS 3.0/4.0,Microsoft Index Server 2.0,Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (1)
11066| [19376] Microsoft IIS 2.0/3.0/4.0 ISAPI GetExtensionVersion() Vulnerability
11067| [19143] "Microsoft Windows ""April Fools 2001"" Vulnerability"
11068| [19118] Microsoft IIS 3.0/4.0,Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability
11069| [18334] Microsoft Office 2003 Home/Pro 0day
11070| [18087] MS11-021 Microsoft Office 2007 Excel .xlb Buffer Overflow
11071| [18078] Microsoft Excel 2003 11.8335.8333 Use After Free
11072| [18067] Microsoft Excel 2007 SP2 Buffer Overwrite Exploit
11073| [17305] "Microsoft Windows Vista/Server 2008 ""nsiproxy.sys"" Local Kernel DoS Exploit"
11074| [14971] MOAUB #11 - Microsoft Office Word 2007 sprmCMajority Buffer Overflow
11075| [14782] Microsoft Office PowerPoint 2007 DLL Hijacking Exploit (rpawinet.dll)
11076| [14746] Microsoft Office Groove 2007 DLL Hijacking Exploit (mso.dll)
11077| [14744] Microsoft Visio 2003 DLL Hijacking Exploit (mfc71enu.dll)
11078| [12450] Microsoft SharePoint Server 2007 XSS Vulnerability
11079| [10068] Microsoft Windows 2000-2008 Embedded OpenType Font Engine Remote Code Execution
11080| [4121] Microsoft Excel 2000/2003 Sheet Name Vulnerability PoC
11081| [3973] Microsoft Office 2000 (OUACTRL.OCX 1.0.1.9) - Remote DoS Exploit
11082| [3690] microsoft office word 2007 - Multiple Vulnerabilities
11083| [3260] Microsoft Word 2000 Unspecified Code Execution Exploit (0day)
11084| [2523] Microsoft Office 2003 PPT Local Buffer Overflow PoC
11085| [2091] Microsoft PowerPoint 2003 SP2 Local Code Execution Exploit (french)
11086| [2001] Microsoft Word 2000/2003 Unchecked Boundary Condition Vulnerability
11087| [1999] Microsoft Word 2000/2003 Hlink Local Buffer Overflow Exploit PoC
11088| [1988] Microsoft Excel 2003 Hlink Local Buffer Overflow Exploit (italian)
11089| [1986] Microsoft Excel 2000/2003 Hlink Local Buffer Overflow Exploit (french)
11090| [1958] Microsoft Excel 2003 Hlink Stack/SEH Buffer Overflow Exploit
11091| [28238] Microsoft SharePoint 2013 (Cloud) - Persistent Exception Handling Vulnerability MS13-067
11092| [23034] Microsoft URLScan 2.5/ RSA Security SecurID 5.0 Configuration Enumeration Weakness
11093| [22850] Microsoft Office OneNote 2010 Crash PoC
11094| [22679] Microsoft Visio 2010 Crash PoC
11095| [22655] Microsoft Publisher 2013 Crash PoC
11096| [22621] Microsoft Netmeeting 2.1/3.0.1 4.4.3385 CALLTO URL Buffer Overflow Vulnerability
11097| [22330] Microsoft Office Excel 2010 Crash PoC
11098| [22310] Microsoft Office Publisher 2010 Crash PoC
11099| [22237] Microsoft Office Picture Manager 2010 Crash PoC
11100| [22215] Microsoft Office Word 2010 Crash PoC
11101| [19451] Microsoft Windows 98 a/98 b/98SE,Solaris 2.6 IRDP Vulnerability
11102| [19440] Microsoft Windows NT 4.0/SP 1/SP 2/Sp 3/SP 4/SP 5 Malformed Dialer Entry Vulnerability
11103| [19372] Microsoft Windows NT 4.0/SP 1/SP 2/SP 3/SP 4/SP 5 Null Session Admin Name Vulnerability
11104| [17164] Microsoft Reader <= 2.1.1.3143 NULL Byte Write
11105| [17163] Microsoft Reader <= 2.1.1.3143 Array Overflow
11106| [17162] Microsoft Reader <= 2.1.1.3143 Integer Overflow
11107| [17161] Microsoft Reader <= 2.1.1.3143 Heap Overflow
11108| [17160] Microsoft Reader <= 2.1.1.3143 Integer Overflow
11109| [14731] Microsoft Windows Movie Maker <= 2.6.4038.0 DLL Hijacking Exploit (hhctrl.ocx)
11110| [14723] Microsoft Power Point 2010 DLL Hijacking Exploit (pptimpconv.dll)
11111|
11112| OpenVAS (Nessus) - http://www.openvas.org:
11113| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
11114| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
11115| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
11116| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
11117| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
11118| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
11119| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
11120| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
11121| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
11122| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
11123| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
11124| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
11125| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
11126|
11127| SecurityTracker - https://www.securitytracker.com:
11128| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
11129| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
11130| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
11131| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
11132| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
11133| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
11134| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
11135| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
11136| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
11137| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
11138| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
11139| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
11140| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
11141| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
11142| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
11143| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
11144| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
11145| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
11146| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
11147| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
11148| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
11149| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
11150| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
11151| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
11152| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
11153| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
11154| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
11155| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
11156| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
11157| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
11158| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
11159| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
11160| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
11161| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
11162| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
11163| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
11164| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
11165| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
11166| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
11167| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
11168| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
11169| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
11170| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
11171| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
11172| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
11173| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
11174| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
11175| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
11176| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
11177| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
11178| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
11179| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
11180| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
11181| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
11182| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
11183| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
11184| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
11185| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
11186| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
11187|
11188| OSVDB - http://www.osvdb.org:
11189| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
11190| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
11191| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
11192| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
11193| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
11194| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
11195| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
11196| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
11197| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
11198| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
11199| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
11200| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
11201| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
11202| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
11203| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
11204| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
11205| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
11206| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
11207| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
11208| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
11209| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
11210| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
11211| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
11212| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
11213| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
11214| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
11215| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
11216| [28539] Microsoft Word 2000 Unspecified Code Execution
11217| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
11218| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
11219| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
11220| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
11221| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
11222| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
11223| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
11224| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
11225| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
11226| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
11227| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
11228| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
11229| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
11230| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
11231| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
11232| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
11233| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
11234| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
11235| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
11236| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
11237| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
11238| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
11239| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
11240| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
11241| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
11242| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
11243| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
11244| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
11245| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
11246| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
11247| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
11248| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
11249| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
11250| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
11251| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
11252| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
11253| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
11254| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
11255| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
11256| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
11257| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
11258| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
11259| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
11260| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
11261| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
11262| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
11263| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
11264| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
11265| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
11266| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
11267| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
11268| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
11269| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
11270| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
11271| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
11272| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
11273| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
11274| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
11275| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
11276| [8243] Microsoft SMS Port 2702 DoS
11277| [7202] Microsoft PowerPoint 2000 File Loader Overflow
11278| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
11279| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
11280| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
11281| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
11282| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
11283| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
11284| [6965] Microsoft ISA Server 2000 SSL Packet DoS
11285| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
11286| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
11287| [5179] Microsoft Windows 2000 microsoft-ds DoS
11288| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
11289| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
11290| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
11291| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
11292| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
11293| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
11294| [4168] Microsoft Outlook 2002 mailto URI Script Injection
11295| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
11296| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
11297| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
11298| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
11299| [2244] Microsoft Windows 2000 ShellExecute() API Let
11300| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
11301| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
11302| [1764] Microsoft Windows 2000 Domain Controller DoS
11303| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
11304| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
11305| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
11306| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
11307| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
11308| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
11309| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
11310| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
11311| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
11312| [1399] Microsoft Windows 2000 Windows Station Access
11313| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
11314| [1297] Microsoft Windows 2000 Active Directory Object Attribute
11315| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
11316| [773] Microsoft Windows 2000 Group Policy File Lock DoS
11317| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
11318| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
11319| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
11320| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
11321| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
11322| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
11323|_
11324Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
11325Device type: general purpose
11326Running (JUST GUESSING): Microsoft Windows 2016 (89%), FreeBSD 6.X (85%)
11327OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:freebsd:freebsd:6.2
11328Aggressive OS guesses: Microsoft Windows Server 2016 (89%), FreeBSD 6.2-RELEASE (85%)
11329No exact OS matches for host (test conditions non-ideal).
11330Uptime guess: 3.027 days (since Wed Nov 27 11:46:41 2019)
11331Network Distance: 18 hops
11332TCP Sequence Prediction: Difficulty=257 (Good luck!)
11333IP ID Sequence Generation: Randomized
11334Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
11335
11336TRACEROUTE (using port 443/tcp)
11337HOP RTT ADDRESS
113381 43.10 ms 10.244.204.1
113392 61.67 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
113403 43.18 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
113414 43.16 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
113425 43.19 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
113436 61.69 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
113447 61.67 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
113458 61.66 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
113469 61.72 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
1134710 26.34 ms 87.128.239.249
1134811 136.44 ms 217.239.46.2
1134912 136.93 ms 217.239.46.2
1135013 195.08 ms 80.157.206.134
1135114 195.11 ms 06-incesu-xrs-t2-1---305-vie-col-2.statik.turktelekom.com.tr (212.156.140.221)
1135215 195.08 ms 06-balgat-t2-2---06-incesu-xrs-t2-1.statik.turktelekom.com.tr (81.212.199.40)
1135316 227.93 ms 06-balgat-t2-1---06-ulus-xrs-t2-1.statik.turktelekom.com.tr (81.212.199.42)
1135417 227.90 ms 06-balgat-t3-1---06-balgat-t2-1.statik.turktelekom.com.tr (195.175.169.176)
1135518 227.79 ms 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
11356
11357NSE: Script Post-scanning.
11358Initiating NSE at 12:26
11359Completed NSE at 12:26, 0.00s elapsed
11360Initiating NSE at 12:26
11361Completed NSE at 12:26, 0.00s elapsed
11362#######################################################################################################################################
11363Version: 1.11.13-static
11364OpenSSL 1.0.2-chacha (1.0.2g-dev)
11365
11366Connected to 95.0.51.12
11367
11368Testing SSL server www.trade.gov.tr on port 443 using SNI name www.trade.gov.tr
11369
11370 TLS Fallback SCSV:
11371Server does not support TLS Fallback SCSV
11372
11373 TLS renegotiation:
11374Secure session renegotiation supported
11375
11376 TLS Compression:
11377Compression disabled
11378
11379 Heartbleed:
11380TLS 1.2 not vulnerable to heartbleed
11381TLS 1.1 not vulnerable to heartbleed
11382TLS 1.0 not vulnerable to heartbleed
11383
11384 Supported Server Cipher(s):
11385Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
11386Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
11387Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
11388Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
11389Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
11390Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
11391Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
11392Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
11393Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
11394Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
11395Accepted TLSv1.2 256 bits AES256-GCM-SHA384
11396Accepted TLSv1.2 128 bits AES128-GCM-SHA256
11397Accepted TLSv1.2 256 bits AES256-SHA256
11398Accepted TLSv1.2 128 bits AES128-SHA256
11399Accepted TLSv1.2 256 bits AES256-SHA
11400Accepted TLSv1.2 128 bits AES128-SHA
11401Accepted TLSv1.2 112 bits DES-CBC3-SHA
11402Accepted TLSv1.2 128 bits RC4-SHA
11403Accepted TLSv1.2 128 bits RC4-MD5
11404Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
11405Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
11406Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
11407Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
11408Accepted TLSv1.1 256 bits AES256-SHA
11409Accepted TLSv1.1 128 bits AES128-SHA
11410Accepted TLSv1.1 112 bits DES-CBC3-SHA
11411Accepted TLSv1.1 128 bits RC4-SHA
11412Accepted TLSv1.1 128 bits RC4-MD5
11413Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
11414Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
11415Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
11416Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
11417Accepted TLSv1.0 256 bits AES256-SHA
11418Accepted TLSv1.0 128 bits AES128-SHA
11419Accepted TLSv1.0 112 bits DES-CBC3-SHA
11420Accepted TLSv1.0 128 bits RC4-SHA
11421Accepted TLSv1.0 128 bits RC4-MD5
11422
11423 SSL Certificate:
11424Signature Algorithm: sha256WithRSAEncryption
11425RSA Key Strength: 2048
11426
11427Subject: *.trade.gov.tr
11428Altnames: DNS:*.trade.gov.tr, DNS:trade.gov.tr
11429Issuer: AlphaSSL CA - SHA256 - G2
11430
11431Not valid before: Jul 19 15:39:48 2018 GMT
11432Not valid after: Jul 19 15:39:48 2020 GMT
11433#######################################################################################################################################
11434------------------------------------------------------------------------------------------------------------------------
11435
11436[ ! ] Starting SCANNER INURLBR 2.1 at [30-11-2019 12:27:05]
11437[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
11438It is the end user's responsibility to obey all applicable local, state and federal laws.
11439Developers assume no liability and are not responsible for any misuse or damage caused by this program
11440
11441[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
11442[ INFO ][ DORK ]::[ site:www.trade.gov.tr ]
11443[ INFO ][ SEARCHING ]:: {
11444[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.vi ]
11445
11446[ INFO ][ SEARCHING ]::
11447-[:::]
11448[ INFO ][ ENGINE ]::[ GOOGLE API ]
11449
11450[ INFO ][ SEARCHING ]::
11451-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
11452[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.lb ID: 005911257635119896548:iiolgmwf2se ]
11453
11454[ INFO ][ SEARCHING ]::
11455-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
11456
11457[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
11458
11459
11460 _[ - ]::--------------------------------------------------------------------------------------------------------------
11461|_[ + ] [ 0 / 100 ]-[12:27:18] [ - ]
11462|_[ + ] Target:: [ https://www.trade.gov.tr/ ]
11463|_[ + ] Exploit::
11464|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11465|_[ + ] More details:: / - / , ISP:
11466|_[ + ] Found:: UNIDENTIFIED
11467
11468 _[ - ]::--------------------------------------------------------------------------------------------------------------
11469|_[ + ] [ 1 / 100 ]-[12:27:20] [ - ]
11470|_[ + ] Target:: [ https://www.trade.gov.tr/news ]
11471|_[ + ] Exploit::
11472|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11473|_[ + ] More details:: / - / , ISP:
11474|_[ + ] Found:: UNIDENTIFIED
11475
11476 _[ - ]::--------------------------------------------------------------------------------------------------------------
11477|_[ + ] [ 2 / 100 ]-[12:27:21] [ - ]
11478|_[ + ] Target:: [ https://www.trade.gov.tr/investment ]
11479|_[ + ] Exploit::
11480|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11481|_[ + ] More details:: / - / , ISP:
11482|_[ + ] Found:: UNIDENTIFIED
11483
11484 _[ - ]::--------------------------------------------------------------------------------------------------------------
11485|_[ + ] [ 3 / 100 ]-[12:27:22] [ - ]
11486|_[ + ] Target:: [ https://www.trade.gov.tr/statistics ]
11487|_[ + ] Exploit::
11488|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11489|_[ + ] More details:: / - / , ISP:
11490|_[ + ] Found:: UNIDENTIFIED
11491
11492 _[ - ]::--------------------------------------------------------------------------------------------------------------
11493|_[ + ] [ 4 / 100 ]-[12:27:23] [ - ]
11494|_[ + ] Target:: [ https://www.trade.gov.tr/announcements ]
11495|_[ + ] Exploit::
11496|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11497|_[ + ] More details:: / - / , ISP:
11498|_[ + ] Found:: UNIDENTIFIED
11499
11500 _[ - ]::--------------------------------------------------------------------------------------------------------------
11501|_[ + ] [ 5 / 100 ]-[12:27:25] [ - ]
11502|_[ + ] Target:: [ https://www.trade.gov.tr/fdi ]
11503|_[ + ] Exploit::
11504|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11505|_[ + ] More details:: / - / , ISP:
11506|_[ + ] Found:: UNIDENTIFIED
11507
11508 _[ - ]::--------------------------------------------------------------------------------------------------------------
11509|_[ + ] [ 6 / 100 ]-[12:27:26] [ - ]
11510|_[ + ] Target:: [ https://www.trade.gov.tr/BakanaUlasin ]
11511|_[ + ] Exploit::
11512|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11513|_[ + ] More details:: / - / , ISP:
11514|_[ + ] Found:: UNIDENTIFIED
11515
11516 _[ - ]::--------------------------------------------------------------------------------------------------------------
11517|_[ + ] [ 7 / 100 ]-[12:27:27] [ - ]
11518|_[ + ] Target:: [ https://www.trade.gov.tr/yoikk ]
11519|_[ + ] Exploit::
11520|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11521|_[ + ] More details:: / - / , ISP:
11522|_[ + ] Found:: UNIDENTIFIED
11523
11524 _[ - ]::--------------------------------------------------------------------------------------------------------------
11525|_[ + ] [ 8 / 100 ]-[12:27:29] [ - ]
11526|_[ + ] Target:: [ https://www.trade.gov.tr/legislation ]
11527|_[ + ] Exploit::
11528|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11529|_[ + ] More details:: / - / , ISP:
11530|_[ + ] Found:: UNIDENTIFIED
11531
11532 _[ - ]::--------------------------------------------------------------------------------------------------------------
11533|_[ + ] [ 9 / 100 ]-[12:27:30] [ - ]
11534|_[ + ] Target:: [ https://www.trade.gov.tr/contact ]
11535|_[ + ] Exploit::
11536|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11537|_[ + ] More details:: / - / , ISP:
11538|_[ + ] Found:: UNIDENTIFIED
11539
11540 _[ - ]::--------------------------------------------------------------------------------------------------------------
11541|_[ + ] [ 10 / 100 ]-[12:27:31] [ - ]
11542|_[ + ] Target:: [ https://www.trade.gov.tr/turquality ]
11543|_[ + ] Exploit::
11544|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11545|_[ + ] More details:: / - / , ISP:
11546|_[ + ] Found:: UNIDENTIFIED
11547
11548 _[ - ]::--------------------------------------------------------------------------------------------------------------
11549|_[ + ] [ 11 / 100 ]-[12:27:33] [ - ]
11550|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes ]
11551|_[ + ] Exploit::
11552|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11553|_[ + ] More details:: / - / , ISP:
11554|_[ + ] Found:: UNIDENTIFIED
11555
11556 _[ - ]::--------------------------------------------------------------------------------------------------------------
11557|_[ + ] [ 12 / 100 ]-[12:27:34] [ - ]
11558|_[ + ] Target:: [ https://www.trade.gov.tr/investment/faq ]
11559|_[ + ] Exploit::
11560|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11561|_[ + ] More details:: / - / , ISP:
11562|_[ + ] Found:: UNIDENTIFIED
11563
11564 _[ - ]::--------------------------------------------------------------------------------------------------------------
11565|_[ + ] [ 13 / 100 ]-[12:27:35] [ - ]
11566|_[ + ] Target:: [ https://www.trade.gov.tr/investment/eligibility ]
11567|_[ + ] Exploit::
11568|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11569|_[ + ] More details:: / - / , ISP:
11570|_[ + ] Found:: UNIDENTIFIED
11571
11572 _[ - ]::--------------------------------------------------------------------------------------------------------------
11573|_[ + ] [ 14 / 100 ]-[12:27:36] [ - ]
11574|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/export ]
11575|_[ + ] Exploit::
11576|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11577|_[ + ] More details:: / - / , ISP:
11578|_[ + ] Found:: UNIDENTIFIED
11579
11580 _[ - ]::--------------------------------------------------------------------------------------------------------------
11581|_[ + ] [ 15 / 100 ]-[12:27:38] [ - ]
11582|_[ + ] Target:: [ https://www.trade.gov.tr/economic-outlook ]
11583|_[ + ] Exploit::
11584|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11585|_[ + ] More details:: / - / , ISP:
11586|_[ + ] Found:: UNIDENTIFIED
11587
11588 _[ - ]::--------------------------------------------------------------------------------------------------------------
11589|_[ + ] [ 16 / 100 ]-[12:27:39] [ - ]
11590|_[ + ] Target:: [ https://www.trade.gov.tr/sectoral-reports ]
11591|_[ + ] Exploit::
11592|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11593|_[ + ] More details:: / - / , ISP:
11594|_[ + ] Found:: UNIDENTIFIED
11595
11596 _[ - ]::--------------------------------------------------------------------------------------------------------------
11597|_[ + ] [ 17 / 100 ]-[12:27:40] [ - ]
11598|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/law ]
11599|_[ + ] Exploit::
11600|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11601|_[ + ] More details:: / - / , ISP:
11602|_[ + ] Found:: UNIDENTIFIED
11603
11604 _[ - ]::--------------------------------------------------------------------------------------------------------------
11605|_[ + ] [ 18 / 100 ]-[12:27:41] [ - ]
11606|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones ]
11607|_[ + ] Exploit::
11608|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11609|_[ + ] More details:: / - / , ISP:
11610|_[ + ] Found:: UNIDENTIFIED
11611
11612 _[ - ]::--------------------------------------------------------------------------------------------------------------
11613|_[ + ] [ 19 / 100 ]-[12:27:42] [ - ]
11614|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistics ]
11615|_[ + ] Exploit::
11616|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11617|_[ + ] More details:: / - / , ISP:
11618|_[ + ] Found:: UNIDENTIFIED
11619
11620 _[ - ]::--------------------------------------------------------------------------------------------------------------
11621|_[ + ] [ 20 / 100 ]-[12:27:44] [ - ]
11622|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import ]
11623|_[ + ] Exploit::
11624|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11625|_[ + ] More details:: / - / , ISP:
11626|_[ + ] Found:: UNIDENTIFIED
11627
11628 _[ - ]::--------------------------------------------------------------------------------------------------------------
11629|_[ + ] [ 21 / 100 ]-[12:27:50] [ - ]
11630|_[ + ] Target:: [ https://www.trade.gov.tr/commercial-representatives ]
11631|_[ + ] Exploit::
11632|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11633|_[ + ] More details:: / - / , ISP:
11634|_[ + ] Found:: UNIDENTIFIED
11635
11636 _[ - ]::--------------------------------------------------------------------------------------------------------------
11637|_[ + ] [ 22 / 100 ]-[12:27:51] [ - ]
11638|_[ + ] Target:: [ https://www.trade.gov.tr/contact/contact ]
11639|_[ + ] Exploit::
11640|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11641|_[ + ] More details:: / - / , ISP:
11642|_[ + ] Found:: UNIDENTIFIED
11643
11644 _[ - ]::--------------------------------------------------------------------------------------------------------------
11645|_[ + ] [ 23 / 100 ]-[12:27:52] [ - ]
11646|_[ + ] Target:: [ https://www.trade.gov.tr/investment/contact ]
11647|_[ + ] Exploit::
11648|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11649|_[ + ] More details:: / - / , ISP:
11650|_[ + ] Found:: UNIDENTIFIED
11651
11652 _[ - ]::--------------------------------------------------------------------------------------------------------------
11653|_[ + ] [ 24 / 100 ]-[12:27:54] [ - ]
11654|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry ]
11655|_[ + ] Exploit::
11656|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11657|_[ + ] More details:: / - / , ISP:
11658|_[ + ] Found:: UNIDENTIFIED
11659
11660 _[ - ]::--------------------------------------------------------------------------------------------------------------
11661|_[ + ] [ 25 / 100 ]-[12:27:59] [ - ]
11662|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations ]
11663|_[ + ] Exploit::
11664|_[ + ] Information Server:: , , IP:95.0.51.12:443
11665|_[ + ] More details:: / - / , ISP:
11666|_[ + ] Found:: UNIDENTIFIED
11667
11668 _[ - ]::--------------------------------------------------------------------------------------------------------------
11669|_[ + ] [ 26 / 100 ]-[12:28:00] [ - ]
11670|_[ + ] Target:: [ https://www.trade.gov.tr/investment/links ]
11671|_[ + ] Exploit::
11672|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11673|_[ + ] More details:: / - / , ISP:
11674|_[ + ] Found:: UNIDENTIFIED
11675
11676 _[ - ]::--------------------------------------------------------------------------------------------------------------
11677|_[ + ] [ 27 / 100 ]-[12:28:03] [ - ]
11678|_[ + ] Target:: [ https://www.trade.gov.tr/investment/procedures ]
11679|_[ + ] Exploit::
11680|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11681|_[ + ] More details:: / - / , ISP:
11682|_[ + ] Found:: UNIDENTIFIED
11683
11684 _[ - ]::--------------------------------------------------------------------------------------------------------------
11685|_[ + ] [ 28 / 100 ]-[12:28:04] [ - ]
11686|_[ + ] Target:: [ https://www.trade.gov.tr/legislationfree-zones ]
11687|_[ + ] Exploit::
11688|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11689|_[ + ] More details:: / - / , ISP:
11690|_[ + ] Found:: UNIDENTIFIED
11691
11692 _[ - ]::--------------------------------------------------------------------------------------------------------------
11693|_[ + ] [ 29 / 100 ]-[12:28:05] [ - ]
11694|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/statistics ]
11695|_[ + ] Exploit::
11696|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11697|_[ + ] More details:: / - / , ISP:
11698|_[ + ] Found:: UNIDENTIFIED
11699
11700 _[ - ]::--------------------------------------------------------------------------------------------------------------
11701|_[ + ] [ 30 / 100 ]-[12:28:07] [ - ]
11702|_[ + ] Target:: [ https://www.trade.gov.tr/investment/application-process ]
11703|_[ + ] Exploit::
11704|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11705|_[ + ] More details:: / - / , ISP:
11706|_[ + ] Found:: UNIDENTIFIED
11707
11708 _[ - ]::--------------------------------------------------------------------------------------------------------------
11709|_[ + ] [ 31 / 100 ]-[12:28:09] [ - ]
11710|_[ + ] Target:: [ https://www.trade.gov.tr/investment/incentive-instruments ]
11711|_[ + ] Exploit::
11712|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11713|_[ + ] More details:: / - / , ISP:
11714|_[ + ] Found:: UNIDENTIFIED
11715
11716 _[ - ]::--------------------------------------------------------------------------------------------------------------
11717|_[ + ] [ 32 / 100 ]-[12:28:10] [ - ]
11718|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements ]
11719|_[ + ] Exploit::
11720|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11721|_[ + ] More details:: / - / , ISP:
11722|_[ + ] Found:: UNIDENTIFIED
11723
11724 _[ - ]::--------------------------------------------------------------------------------------------------------------
11725|_[ + ] [ 33 / 100 ]-[12:28:11] [ - ]
11726|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-incentives ]
11727|_[ + ] Exploit::
11728|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11729|_[ + ] More details:: / - / , ISP:
11730|_[ + ] Found:: UNIDENTIFIED
11731
11732 _[ - ]::--------------------------------------------------------------------------------------------------------------
11733|_[ + ] [ 34 / 100 ]-[12:28:12] [ - ]
11734|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey ]
11735|_[ + ] Exploit::
11736|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11737|_[ + ] More details:: / - / , ISP:
11738|_[ + ] Found:: UNIDENTIFIED
11739
11740 _[ - ]::--------------------------------------------------------------------------------------------------------------
11741|_[ + ] [ 35 / 100 ]-[12:28:14] [ - ]
11742|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content ]
11743|_[ + ] Exploit::
11744|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11745|_[ + ] More details:: / - / , ISP:
11746|_[ + ] Found:: UNIDENTIFIED
11747
11748 _[ - ]::--------------------------------------------------------------------------------------------------------------
11749|_[ + ] [ 36 / 100 ]-[12:28:15] [ - ]
11750|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu ]
11751|_[ + ] Exploit::
11752|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11753|_[ + ] More details:: / - / , ISP:
11754|_[ + ] Found:: UNIDENTIFIED
11755
11756 _[ - ]::--------------------------------------------------------------------------------------------------------------
11757|_[ + ] [ 37 / 100 ]-[12:28:16] [ - ]
11758|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services ]
11759|_[ + ] Exploit::
11760|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11761|_[ + ] More details:: / - / , ISP:
11762|_[ + ] Found:: UNIDENTIFIED
11763
11764 _[ - ]::--------------------------------------------------------------------------------------------------------------
11765|_[ + ] [ 38 / 100 ]-[12:28:18] [ - ]
11766|_[ + ] Target:: [ https://www.trade.gov.tr/buy-turkish-products ]
11767|_[ + ] Exploit::
11768|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11769|_[ + ] More details:: / - / , ISP:
11770|_[ + ] Found:: UNIDENTIFIED
11771
11772 _[ - ]::--------------------------------------------------------------------------------------------------------------
11773|_[ + ] [ 39 / 100 ]-[12:28:19] [ - ]
11774|_[ + ] Target:: [ https://www.trade.gov.tr/fdi/statistic-content ]
11775|_[ + ] Exploit::
11776|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11777|_[ + ] More details:: / - / , ISP:
11778|_[ + ] Found:: UNIDENTIFIED
11779
11780 _[ - ]::--------------------------------------------------------------------------------------------------------------
11781|_[ + ] [ 40 / 100 ]-[12:28:20] [ - ]
11782|_[ + ] Target:: [ https://www.trade.gov.tr/2023-export-strategy ]
11783|_[ + ] Exploit::
11784|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11785|_[ + ] More details:: / - / , ISP:
11786|_[ + ] Found:: UNIDENTIFIED
11787
11788 _[ - ]::--------------------------------------------------------------------------------------------------------------
11789|_[ + ] [ 41 / 100 ]-[12:28:21] [ - ]
11790|_[ + ] Target:: [ https://www.trade.gov.tr/legislationforeign-direct-investment ]
11791|_[ + ] Exploit::
11792|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11793|_[ + ] More details:: / - / , ISP:
11794|_[ + ] Found:: UNIDENTIFIED
11795
11796 _[ - ]::--------------------------------------------------------------------------------------------------------------
11797|_[ + ] [ 42 / 100 ]-[12:28:23] [ - ]
11798|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/strategic-investments ]
11799|_[ + ] Exploit::
11800|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11801|_[ + ] More details:: / - / , ISP:
11802|_[ + ] Found:: UNIDENTIFIED
11803
11804 _[ - ]::--------------------------------------------------------------------------------------------------------------
11805|_[ + ] [ 43 / 100 ]-[12:28:24] [ - ]
11806|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/general-investments ]
11807|_[ + ] Exploit::
11808|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11809|_[ + ] More details:: / - / , ISP:
11810|_[ + ] Found:: UNIDENTIFIED
11811
11812 _[ - ]::--------------------------------------------------------------------------------------------------------------
11813|_[ + ] [ 44 / 100 ]-[12:28:26] [ - ]
11814|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/morocco ]
11815|_[ + ] Exploit::
11816|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11817|_[ + ] More details:: / - / , ISP:
11818|_[ + ] Found:: UNIDENTIFIED
11819
11820 _[ - ]::--------------------------------------------------------------------------------------------------------------
11821|_[ + ] [ 45 / 100 ]-[12:28:31] [ - ]
11822|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/priority-investments ]
11823|_[ + ] Exploit::
11824|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11825|_[ + ] More details:: / - / , ISP:
11826|_[ + ] Found:: UNIDENTIFIED
11827
11828 _[ - ]::--------------------------------------------------------------------------------------------------------------
11829|_[ + ] [ 46 / 100 ]-[12:28:33] [ - ]
11830|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/regional-investments ]
11831|_[ + ] Exploit::
11832|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11833|_[ + ] More details:: / - / , ISP:
11834|_[ + ] Found:: UNIDENTIFIED
11835
11836 _[ - ]::--------------------------------------------------------------------------------------------------------------
11837|_[ + ] [ 47 / 100 ]-[12:28:34] [ - ]
11838|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/lebanon ]
11839|_[ + ] Exploit::
11840|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11841|_[ + ] More details:: / - / , ISP:
11842|_[ + ] Found:: UNIDENTIFIED
11843
11844 _[ - ]::--------------------------------------------------------------------------------------------------------------
11845|_[ + ] [ 48 / 100 ]-[12:28:35] [ - ]
11846|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/tunisia ]
11847|_[ + ] Exploit::
11848|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11849|_[ + ] More details:: / - / , ISP:
11850|_[ + ] Found:: UNIDENTIFIED
11851
11852 _[ - ]::--------------------------------------------------------------------------------------------------------------
11853|_[ + ] [ 49 / 100 ]-[12:28:36] [ - ]
11854|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/syria ]
11855|_[ + ] Exploit::
11856|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11857|_[ + ] More details:: / - / , ISP:
11858|_[ + ] Found:: UNIDENTIFIED
11859
11860 _[ - ]::--------------------------------------------------------------------------------------------------------------
11861|_[ + ] [ 50 / 100 ]-[12:28:38] [ - ]
11862|_[ + ] Target:: [ https://www.trade.gov.tr/free-zones/general-outlook ]
11863|_[ + ] Exploit::
11864|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11865|_[ + ] More details:: / - / , ISP:
11866|_[ + ] Found:: UNIDENTIFIED
11867
11868 _[ - ]::--------------------------------------------------------------------------------------------------------------
11869|_[ + ] [ 51 / 100 ]-[12:28:39] [ - ]
11870|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/malaysia ]
11871|_[ + ] Exploit::
11872|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11873|_[ + ] More details:: / - / , ISP:
11874|_[ + ] Found:: UNIDENTIFIED
11875
11876 _[ - ]::--------------------------------------------------------------------------------------------------------------
11877|_[ + ] [ 52 / 100 ]-[12:28:41] [ - ]
11878|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/moldova ]
11879|_[ + ] Exploit::
11880|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11881|_[ + ] More details:: / - / , ISP:
11882|_[ + ] Found:: UNIDENTIFIED
11883
11884 _[ - ]::--------------------------------------------------------------------------------------------------------------
11885|_[ + ] [ 53 / 100 ]-[12:28:42] [ - ]
11886|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/chile ]
11887|_[ + ] Exploit::
11888|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11889|_[ + ] More details:: / - / , ISP:
11890|_[ + ] Found:: UNIDENTIFIED
11891
11892 _[ - ]::--------------------------------------------------------------------------------------------------------------
11893|_[ + ] [ 54 / 100 ]-[12:28:43] [ - ]
11894|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/georgia ]
11895|_[ + ] Exploit::
11896|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11897|_[ + ] More details:: / - / , ISP:
11898|_[ + ] Found:: UNIDENTIFIED
11899
11900 _[ - ]::--------------------------------------------------------------------------------------------------------------
11901|_[ + ] [ 55 / 100 ]-[12:28:44] [ - ]
11902|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/serbia ]
11903|_[ + ] Exploit::
11904|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11905|_[ + ] More details:: / - / , ISP:
11906|_[ + ] Found:: UNIDENTIFIED
11907
11908 _[ - ]::--------------------------------------------------------------------------------------------------------------
11909|_[ + ] [ 56 / 100 ]-[12:28:46] [ - ]
11910|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/mauritius ]
11911|_[ + ] Exploit::
11912|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11913|_[ + ] More details:: / - / , ISP:
11914|_[ + ] Found:: UNIDENTIFIED
11915
11916 _[ - ]::--------------------------------------------------------------------------------------------------------------
11917|_[ + ] [ 57 / 100 ]-[12:28:47] [ - ]
11918|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/palestine ]
11919|_[ + ] Exploit::
11920|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11921|_[ + ] More details:: / - / , ISP:
11922|_[ + ] Found:: UNIDENTIFIED
11923
11924 _[ - ]::--------------------------------------------------------------------------------------------------------------
11925|_[ + ] [ 58 / 100 ]-[12:28:48] [ - ]
11926|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/albania ]
11927|_[ + ] Exploit::
11928|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11929|_[ + ] More details:: / - / , ISP:
11930|_[ + ] Found:: UNIDENTIFIED
11931
11932 _[ - ]::--------------------------------------------------------------------------------------------------------------
11933|_[ + ] [ 59 / 100 ]-[12:28:49] [ - ]
11934|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/efta ]
11935|_[ + ] Exploit::
11936|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11937|_[ + ] More details:: / - / , ISP:
11938|_[ + ] Found:: UNIDENTIFIED
11939
11940 _[ - ]::--------------------------------------------------------------------------------------------------------------
11941|_[ + ] [ 60 / 100 ]-[12:28:51] [ - ]
11942|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/singapore ]
11943|_[ + ] Exploit::
11944|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11945|_[ + ] More details:: / - / , ISP:
11946|_[ + ] Found:: UNIDENTIFIED
11947
11948 _[ - ]::--------------------------------------------------------------------------------------------------------------
11949|_[ + ] [ 61 / 100 ]-[12:28:54] [ - ]
11950|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/israel ]
11951|_[ + ] Exploit::
11952|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11953|_[ + ] More details:: / - / , ISP:
11954|_[ + ] Found:: UNIDENTIFIED
11955
11956 _[ - ]::--------------------------------------------------------------------------------------------------------------
11957|_[ + ] [ 62 / 100 ]-[12:28:55] [ - ]
11958|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/macedonia ]
11959|_[ + ] Exploit::
11960|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11961|_[ + ] More details:: / - / , ISP:
11962|_[ + ] Found:: UNIDENTIFIED
11963
11964 _[ - ]::--------------------------------------------------------------------------------------------------------------
11965|_[ + ] [ 63 / 100 ]-[12:28:56] [ - ]
11966|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/sezai-ucarmak ]
11967|_[ + ] Exploit::
11968|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11969|_[ + ] More details:: / - / , ISP:
11970|_[ + ] Found:: UNIDENTIFIED
11971
11972 _[ - ]::--------------------------------------------------------------------------------------------------------------
11973|_[ + ] [ 64 / 100 ]-[12:28:58] [ - ]
11974|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/egypt ]
11975|_[ + ] Exploit::
11976|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11977|_[ + ] More details:: / - / , ISP:
11978|_[ + ] Found:: UNIDENTIFIED
11979
11980 _[ - ]::--------------------------------------------------------------------------------------------------------------
11981|_[ + ] [ 65 / 100 ]-[12:29:03] [ - ]
11982|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/bilateral-investment-treaties ]
11983|_[ + ] Exploit::
11984|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11985|_[ + ] More details:: / - / , ISP:
11986|_[ + ] Found:: UNIDENTIFIED
11987
11988 _[ - ]::--------------------------------------------------------------------------------------------------------------
11989|_[ + ] [ 66 / 100 ]-[12:29:04] [ - ]
11990|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey/2018 ]
11991|_[ + ] Exploit::
11992|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
11993|_[ + ] More details:: / - / , ISP:
11994|_[ + ] Found:: UNIDENTIFIED
11995
11996 _[ - ]::--------------------------------------------------------------------------------------------------------------
11997|_[ + ] [ 67 / 100 ]-[12:29:06] [ - ]
11998|_[ + ] Target:: [ https://www.trade.gov.tr/statistics/focus-business-turkey ]
11999|_[ + ] Exploit::
12000|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12001|_[ + ] More details:: / - / , ISP:
12002|_[ + ] Found:: UNIDENTIFIED
12003
12004 _[ - ]::--------------------------------------------------------------------------------------------------------------
12005|_[ + ] [ 68 / 100 ]-[12:29:07] [ - ]
12006|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/montenegro ]
12007|_[ + ] Exploit::
12008|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12009|_[ + ] More details:: / - / , ISP:
12010|_[ + ] Found:: UNIDENTIFIED
12011
12012 _[ - ]::--------------------------------------------------------------------------------------------------------------
12013|_[ + ] [ 69 / 100 ]-[12:29:10] [ - ]
12014|_[ + ] Target:: [ https://www.trade.gov.tr/focus-business-turkey/2017 ]
12015|_[ + ] Exploit::
12016|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12017|_[ + ] More details:: / - / , ISP:
12018|_[ + ] Found:: UNIDENTIFIED
12019
12020 _[ - ]::--------------------------------------------------------------------------------------------------------------
12021|_[ + ] [ 70 / 100 ]-[12:29:11] [ - ]
12022|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/documents ]
12023|_[ + ] Exploit::
12024|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12025|_[ + ] More details:: / - / , ISP:
12026|_[ + ] Found:: UNIDENTIFIED
12027
12028 _[ - ]::--------------------------------------------------------------------------------------------------------------
12029|_[ + ] [ 71 / 100 ]-[12:29:13] [ - ]
12030|_[ + ] Target:: [ https://www.trade.gov.tr/establishing-company-in-turkey ]
12031|_[ + ] Exploit::
12032|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12033|_[ + ] More details:: / - / , ISP:
12034|_[ + ] Found:: UNIDENTIFIED
12035
12036 _[ - ]::--------------------------------------------------------------------------------------------------------------
12037|_[ + ] [ 72 / 100 ]-[12:29:14] [ - ]
12038|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/organizational-structure ]
12039|_[ + ] Exploit::
12040|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12041|_[ + ] More details:: / - / , ISP:
12042|_[ + ] Found:: UNIDENTIFIED
12043
12044 _[ - ]::--------------------------------------------------------------------------------------------------------------
12045|_[ + ] [ 73 / 100 ]-[12:29:17] [ - ]
12046|_[ + ] Target:: [ https://www.trade.gov.tr/investment/schemes/large-scale-investments ]
12047|_[ + ] Exploit::
12048|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12049|_[ + ] More details:: / - / , ISP:
12050|_[ + ] Found:: UNIDENTIFIED
12051
12052 _[ - ]::--------------------------------------------------------------------------------------------------------------
12053|_[ + ] [ 74 / 100 ]-[12:29:19] [ - ]
12054|_[ + ] Target:: [ https://www.trade.gov.tr/news/fed-cuts-interest-rates ]
12055|_[ + ] Exploit::
12056|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12057|_[ + ] More details:: / - / , ISP:
12058|_[ + ] Found:: UNIDENTIFIED
12059
12060 _[ - ]::--------------------------------------------------------------------------------------------------------------
12061|_[ + ] [ 75 / 100 ]-[12:29:20] [ - ]
12062|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/faroe-islands ]
12063|_[ + ] Exploit::
12064|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12065|_[ + ] More details:: / - / , ISP:
12066|_[ + ] Found:: UNIDENTIFIED
12067
12068 _[ - ]::--------------------------------------------------------------------------------------------------------------
12069|_[ + ] [ 76 / 100 ]-[12:29:21] [ - ]
12070|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tax-deduction ]
12071|_[ + ] Exploit::
12072|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12073|_[ + ] More details:: / - / , ISP:
12074|_[ + ] Found:: UNIDENTIFIED
12075
12076 _[ - ]::--------------------------------------------------------------------------------------------------------------
12077|_[ + ] [ 77 / 100 ]-[12:29:22] [ - ]
12078|_[ + ] Target:: [ https://www.trade.gov.tr/news/ecbs-monetary-policy-decision ]
12079|_[ + ] Exploit::
12080|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12081|_[ + ] More details:: / - / , ISP:
12082|_[ + ] Found:: UNIDENTIFIED
12083
12084 _[ - ]::--------------------------------------------------------------------------------------------------------------
12085|_[ + ] [ 78 / 100 ]-[12:29:23] [ - ]
12086|_[ + ] Target:: [ https://www.trade.gov.tr/news/unemployment-at-8-1 ]
12087|_[ + ] Exploit::
12088|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12089|_[ + ] More details:: / - / , ISP:
12090|_[ + ] Found:: UNIDENTIFIED
12091
12092 _[ - ]::--------------------------------------------------------------------------------------------------------------
12093|_[ + ] [ 79 / 100 ]-[12:29:28] [ - ]
12094|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/vat-refund ]
12095|_[ + ] Exploit::
12096|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12097|_[ + ] More details:: / - / , ISP:
12098|_[ + ] Found:: UNIDENTIFIED
12099
12100 _[ - ]::--------------------------------------------------------------------------------------------------------------
12101|_[ + ] [ 80 / 100 ]-[12:29:29] [ - ]
12102|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/minister-of-trade ]
12103|_[ + ] Exploit::
12104|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12105|_[ + ] More details:: / - / , ISP:
12106|_[ + ] Found:: UNIDENTIFIED
12107
12108 _[ - ]::--------------------------------------------------------------------------------------------------------------
12109|_[ + ] [ 81 / 100 ]-[12:29:32] [ - ]
12110|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/riza-tuna-turagay ]
12111|_[ + ] Exploit::
12112|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12113|_[ + ] More details:: / - / , ISP:
12114|_[ + ] Found:: UNIDENTIFIED
12115
12116 _[ - ]::--------------------------------------------------------------------------------------------------------------
12117|_[ + ] [ 82 / 100 ]-[12:29:37] [ - ]
12118|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/land-allocation ]
12119|_[ + ] Exploit::
12120|_[ + ] Information Server:: , , IP:95.0.51.12:443
12121|_[ + ] More details:: / - / , ISP:
12122|_[ + ] Found:: UNIDENTIFIED
12123
12124 _[ - ]::--------------------------------------------------------------------------------------------------------------
12125|_[ + ] [ 83 / 100 ]-[12:29:38] [ - ]
12126|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/import/trade-defence-policy ]
12127|_[ + ] Exploit::
12128|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12129|_[ + ] More details:: / - / , ISP:
12130|_[ + ] Found:: UNIDENTIFIED
12131
12132 _[ - ]::--------------------------------------------------------------------------------------------------------------
12133|_[ + ] [ 84 / 100 ]-[12:29:39] [ - ]
12134|_[ + ] Target:: [ https://www.trade.gov.tr/about-ministry/gonca-yilmaz-batur ]
12135|_[ + ] Exploit::
12136|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12137|_[ + ] More details:: / - / , ISP:
12138|_[ + ] Found:: UNIDENTIFIED
12139
12140 _[ - ]::--------------------------------------------------------------------------------------------------------------
12141|_[ + ] [ 85 / 100 ]-[12:29:40] [ - ]
12142|_[ + ] Target:: [ https://www.trade.gov.tr/trade-fairs-and-buyers-mission ]
12143|_[ + ] Exploit::
12144|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12145|_[ + ] More details:: / - / , ISP:
12146|_[ + ] Found:: UNIDENTIFIED
12147
12148 _[ - ]::--------------------------------------------------------------------------------------------------------------
12149|_[ + ] [ 86 / 100 ]-[12:29:44] [ - ]
12150|_[ + ] Target:: [ https://www.trade.gov.tr/multinational-relations/wto-and-multilaretal ]
12151|_[ + ] Exploit::
12152|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12153|_[ + ] More details:: / - / , ISP:
12154|_[ + ] Found:: UNIDENTIFIED
12155
12156 _[ - ]::--------------------------------------------------------------------------------------------------------------
12157|_[ + ] [ 87 / 100 ]-[12:29:45] [ - ]
12158|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/tesvik-haritasi ]
12159|_[ + ] Exploit::
12160|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12161|_[ + ] More details:: / - / , ISP:
12162|_[ + ] Found:: UNIDENTIFIED
12163
12164 _[ - ]::--------------------------------------------------------------------------------------------------------------
12165|_[ + ] [ 88 / 100 ]-[12:29:46] [ - ]
12166|_[ + ] Target:: [ https://www.trade.gov.tr/turkish-contracting-services/turkish-contracting-services ]
12167|_[ + ] Exploit::
12168|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12169|_[ + ] More details:: / - / , ISP:
12170|_[ + ] Found:: UNIDENTIFIED
12171
12172 _[ - ]::--------------------------------------------------------------------------------------------------------------
12173|_[ + ] [ 89 / 100 ]-[12:29:47] [ - ]
12174|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/interest-rate-support ]
12175|_[ + ] Exploit::
12176|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12177|_[ + ] More details:: / - / , ISP:
12178|_[ + ] Found:: UNIDENTIFIED
12179
12180 _[ - ]::--------------------------------------------------------------------------------------------------------------
12181|_[ + ] [ 90 / 100 ]-[12:29:51] [ - ]
12182|_[ + ] Target:: [ https://www.trade.gov.tr/news/chinas-economy-worsens-in-july ]
12183|_[ + ] Exploit::
12184|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12185|_[ + ] More details:: / - / , ISP:
12186|_[ + ] Found:: UNIDENTIFIED
12187
12188 _[ - ]::--------------------------------------------------------------------------------------------------------------
12189|_[ + ] [ 91 / 100 ]-[12:29:52] [ - ]
12190|_[ + ] Target:: [ https://www.trade.gov.tr/free-trade-agreements/republic-of-korea ]
12191|_[ + ] Exploit::
12192|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12193|_[ + ] More details:: / - / , ISP:
12194|_[ + ] Found:: UNIDENTIFIED
12195
12196 _[ - ]::--------------------------------------------------------------------------------------------------------------
12197|_[ + ] [ 92 / 100 ]-[12:29:54] [ - ]
12198|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-falls ]
12199|_[ + ] Exploit::
12200|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12201|_[ + ] More details:: / - / , ISP:
12202|_[ + ] Found:: UNIDENTIFIED
12203
12204 _[ - ]::--------------------------------------------------------------------------------------------------------------
12205|_[ + ] [ 93 / 100 ]-[12:29:56] [ - ]
12206|_[ + ] Target:: [ https://www.trade.gov.tr/news/weekly-jobless-claims-unexpectedly-fall ]
12207|_[ + ] Exploit::
12208|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12209|_[ + ] More details:: / - / , ISP:
12210|_[ + ] Found:: UNIDENTIFIED
12211
12212 _[ - ]::--------------------------------------------------------------------------------------------------------------
12213|_[ + ] [ 94 / 100 ]-[12:29:57] [ - ]
12214|_[ + ] Target:: [ https://www.trade.gov.tr/investment/investment-content/customs-duty-exemption ]
12215|_[ + ] Exploit::
12216|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12217|_[ + ] More details:: / - / , ISP:
12218|_[ + ] Found:: UNIDENTIFIED
12219
12220 _[ - ]::--------------------------------------------------------------------------------------------------------------
12221|_[ + ] [ 95 / 100 ]-[12:29:58] [ - ]
12222|_[ + ] Target:: [ https://www.trade.gov.tr/legislation/product-safety-and-technical-regulation ]
12223|_[ + ] Exploit::
12224|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12225|_[ + ] More details:: / - / , ISP:
12226|_[ + ] Found:: UNIDENTIFIED
12227
12228 _[ - ]::--------------------------------------------------------------------------------------------------------------
12229|_[ + ] [ 96 / 100 ]-[12:30:00] [ - ]
12230|_[ + ] Target:: [ https://www.trade.gov.tr/turkey-and-eu/turkey-and-the-eu ]
12231|_[ + ] Exploit::
12232|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12233|_[ + ] More details:: / - / , ISP:
12234|_[ + ] Found:: UNIDENTIFIED
12235
12236 _[ - ]::--------------------------------------------------------------------------------------------------------------
12237|_[ + ] [ 97 / 100 ]-[12:30:01] [ - ]
12238|_[ + ] Target:: [ https://www.trade.gov.tr/news/opec-oil-production-narrowed-in-december ]
12239|_[ + ] Exploit::
12240|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12241|_[ + ] More details:: / - / , ISP:
12242|_[ + ] Found:: UNIDENTIFIED
12243
12244 _[ - ]::--------------------------------------------------------------------------------------------------------------
12245|_[ + ] [ 98 / 100 ]-[12:30:02] [ - ]
12246|_[ + ] Target:: [ https://www.trade.gov.tr/news/ifo-business-climate-index-edges-downwards ]
12247|_[ + ] Exploit::
12248|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12249|_[ + ] More details:: / - / , ISP:
12250|_[ + ] Found:: UNIDENTIFIED
12251
12252 _[ - ]::--------------------------------------------------------------------------------------------------------------
12253|_[ + ] [ 99 / 100 ]-[12:30:03] [ - ]
12254|_[ + ] Target:: [ https://www.trade.gov.tr/news/boj-to-retain-ultra-low-rates ]
12255|_[ + ] Exploit::
12256|_[ + ] Information Server:: HTTP/2 200 , , IP:95.0.51.12:443
12257|_[ + ] More details:: / - / , ISP:
12258|_[ + ] Found:: UNIDENTIFIED
12259
12260[ INFO ] [ Shutting down ]
12261[ INFO ] [ End of process INURLBR at [30-11-2019 12:30:03]
12262[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
12263[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.trade.gov.tr/output/inurlbr-www.trade.gov.tr ]
12264|_________________________________________________________________________________________
12265
12266\_________________________________________________________________________________________/
12267
12268######################################################################################################################################
12269WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
12270Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 09:36 EST
12271Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
12272Host is up (0.20s latency).
12273Not shown: 490 filtered ports, 4 closed ports
12274Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
12275PORT STATE SERVICE
1227680/tcp open http
12277443/tcp open https
12278
12279Nmap done: 1 IP address (1 host up) scanned in 11.03 seconds
12280#######################################################################################################################################
12281Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 09:36 EST
12282Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
12283Host is up (0.13s latency).
12284Not shown: 2 filtered ports
12285PORT STATE SERVICE
1228653/udp open|filtered domain
1228767/udp open|filtered dhcps
1228868/udp open|filtered dhcpc
1228969/udp open|filtered tftp
1229088/udp open|filtered kerberos-sec
12291123/udp open|filtered ntp
12292139/udp open|filtered netbios-ssn
12293161/udp open|filtered snmp
12294162/udp open|filtered snmptrap
12295389/udp open|filtered ldap
12296500/udp open|filtered isakmp
12297520/udp open|filtered route
122982049/udp open|filtered nfs
12299
12300Nmap done: 1 IP address (1 host up) scanned in 3.25 seconds
12301######################################################################################################################################
12302HTTP/1.1 302 Found
12303Cache-Control: private
12304Content-Length: 142
12305Content-Type: text/html; charset=utf-8
12306Location: /500.html?aspxerrorpath=/
12307Server: Microsoft-IIS/10.0
12308X-AspNetMvc-Version: 5.2
12309X-AspNet-Version: 4.0.30319
12310X-Powered-By: ASP.NET
12311Access-Control-Allow-Origin: *
12312Date: Sat, 30 Nov 2019 14:36:27 GMT
12313
12314Allow: OPTIONS, TRACE, GET, HEAD, POST
12315#######################################################################################################################################
12316Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-30 09:36 EST
12317NSE: Loaded 163 scripts for scanning.
12318NSE: Script Pre-scanning.
12319Initiating NSE at 09:36
12320Completed NSE at 09:36, 0.00s elapsed
12321Initiating NSE at 09:36
12322Completed NSE at 09:36, 0.00s elapsed
12323Initiating Parallel DNS resolution of 1 host. at 09:36
12324Completed Parallel DNS resolution of 1 host. at 09:36, 0.02s elapsed
12325Initiating SYN Stealth Scan at 09:36
12326Scanning 95.0.51.12.static.ttnet.com.tr (95.0.51.12) [1 port]
12327Discovered open port 80/tcp on 95.0.51.12
12328Completed SYN Stealth Scan at 09:36, 0.27s elapsed (1 total ports)
12329Initiating Service scan at 09:36
12330Scanning 1 service on 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
12331Completed Service scan at 09:36, 6.45s elapsed (1 service on 1 host)
12332Initiating OS detection (try #1) against 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
12333Retrying OS detection (try #2) against 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
12334Initiating Traceroute at 09:36
12335Completed Traceroute at 09:37, 3.18s elapsed
12336Initiating Parallel DNS resolution of 14 hosts. at 09:37
12337Completed Parallel DNS resolution of 14 hosts. at 09:37, 0.38s elapsed
12338NSE: Script scanning 95.0.51.12.
12339Initiating NSE at 09:37
12340NSE: [http-wordpress-enum 95.0.51.12:80] got no answers from pipelined queries
12341Completed NSE at 09:40, 196.46s elapsed
12342Initiating NSE at 09:40
12343Completed NSE at 09:40, 1.47s elapsed
12344Nmap scan report for 95.0.51.12.static.ttnet.com.tr (95.0.51.12)
12345Host is up (0.23s latency).
12346
12347PORT STATE SERVICE VERSION
1234880/tcp open http Microsoft IIS httpd 10.0
12349|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
12350| http-brute:
12351|_ Path "/" does not require authentication
12352|_http-chrono: Request times for /; avg: 1806.19ms; min: 775.62ms; max: 5788.73ms
12353|_http-csrf: Couldn't find any CSRF vulnerabilities.
12354|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
12355|_http-dombased-xss: Couldn't find any DOM based XSS.
12356|_http-errors: ERROR: Script execution failed (use -d to debug)
12357|_http-feed: Couldn't find any feeds.
12358|_http-fetch: Please enter the complete path of the directory to save data in.
12359| http-internal-ip-disclosure:
12360|_ Internal IP Leaked: 172.30.1.208
12361|_http-jsonp-detection: Couldn't find any JSONP endpoints.
12362|_http-mobileversion-checker: No mobile version detected.
12363|_http-security-headers:
12364|_http-server-header: Microsoft-IIS/10.0
12365| http-sitemap-generator:
12366| Directory structure:
12367| Longest directory structure:
12368| Depth: 0
12369| Dir: /
12370| Total files found (by extension):
12371|_
12372|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
12373|_http-traceroute: ERROR: Script execution failed (use -d to debug)
12374| http-vhosts:
12375|_127 names had status ERROR
12376|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
12377|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
12378|_http-xssed: No previously reported XSS vuln.
12379| vulscan: VulDB - https://vuldb.com:
12380| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
12381| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
12382| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
12383| [139953] Microsoft Internet Explorer 10/11 memory corruption
12384| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
12385| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
12386| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
12387| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
12388| [136279] Microsoft Internet Explorer 10/11 memory corruption
12389| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
12390| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12391| [134682] Microsoft Internet Explorer 10/11 memory corruption
12392| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12393| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12394| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
12395| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
12396| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12397| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12398| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12399| [131678] Microsoft Internet Explorer 10/11 memory corruption
12400| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
12401| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
12402| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
12403| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
12404| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
12405| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
12406| [131618] Microsoft Internet Explorer 10/11 memory corruption
12407| [130827] Microsoft Internet Explorer 10/11 information disclosure
12408| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
12409| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
12410| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
12411| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
12412| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
12413| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
12414| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
12415| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
12416| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
12417| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
12418| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12419| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
12420| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
12421| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
12422| [122846] Microsoft Internet Explorer 10/11 memory corruption
12423| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
12424| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12425| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
12426| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
12427| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
12428| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
12429| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
12430| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
12431| [115997] Microsoft Internet Explorer 10/11 memory corruption
12432| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
12433| [114567] Microsoft Internet Explorer 10/11 information disclosure
12434| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
12435| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
12436| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
12437| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
12438| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
12439| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
12440| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
12441| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
12442| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
12443| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
12444| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
12445| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
12446| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
12447| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
12448| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
12449| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12450| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12451| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
12452| [109365] Microsoft Internet Explorer 10/11 memory corruption
12453| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
12454| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
12455| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
12456| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
12457| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
12458| [102461] Microsoft Internet Explorer 10/11 memory corruption
12459| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
12460| [101007] Microsoft Internet Explorer 10/11 memory corruption
12461| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
12462| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
12463| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
12464| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
12465| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
12466| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
12467| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
12468| [97967] Microsoft Internet Explorer 10/11 memory corruption
12469| [97965] Microsoft Internet Explorer 10/11 memory corruption
12470| [94436] Microsoft Windows 10 Graphics memory corruption
12471| [94421] Microsoft Internet Explorer 10/11 information disclosure
12472| [94418] Microsoft Internet Explorer 10/11 privilege escalation
12473| [93427] Microsoft Internet Explorer 10/11 memory corruption
12474| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
12475| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
12476| [92561] Microsoft Internet Explorer 10/11 privilege escalation
12477| [92560] Microsoft Internet Explorer 10/11 privilege escalation
12478| [92557] Microsoft Internet Explorer 10/11 memory corruption
12479| [91560] Microsoft Windows 10 Object denial of service
12480| [91517] Microsoft Internet Explorer 10/11 memory corruption
12481| [91516] Microsoft Internet Explorer 10/11 privilege escalation
12482| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
12483| [90683] Microsoft Internet Explorer 10/11 information disclosure
12484| [89020] Microsoft Internet Explorer 10/11 information disclosure
12485| [89010] Microsoft Internet Explorer 10/11 memory corruption
12486| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
12487| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
12488| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
12489| [87139] Microsoft Internet Explorer 10/11 information disclosure
12490| [82246] Microsoft Internet Explorer 10/11 memory corruption
12491| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
12492| [81271] Microsoft Windows 10 PDF Library memory corruption
12493| [81249] Microsoft Internet Explorer 10/11 memory corruption
12494| [81243] Microsoft Internet Explorer 10 memory corruption
12495| [80845] Microsoft Internet Explorer 10 memory corruption
12496| [80843] Microsoft Internet Explorer 10 memory corruption
12497| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
12498| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
12499| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
12500| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
12501| [79515] Microsoft Windows 10 Kernel memory corruption
12502| [79473] Microsoft Internet Explorer 10 memory corruption
12503| [79466] Microsoft Internet Explorer 10/11 memory corruption
12504| [79463] Microsoft Internet Explorer 10 memory corruption
12505| [79158] Microsoft Internet Explorer 10/11 memory corruption
12506| [79157] Microsoft Internet Explorer 10/11 memory corruption
12507| [79139] Microsoft Internet Explorer 10/11 memory corruption
12508| [78383] Microsoft Internet Explorer 10/11 privilege escalation
12509| [78382] Microsoft Internet Explorer 10 memory corruption
12510| [77643] Microsoft Internet Explorer 10/11 memory corruption
12511| [77597] Microsoft Internet Explorer 10/11 File denial of service
12512| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
12513| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
12514| [77005] Microsoft Internet Explorer 10/11 memory corruption
12515| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
12516| [76488] Microsoft Internet Explorer 10/11 File information disclosure
12517| [76487] Microsoft Internet Explorer 10/11 memory corruption
12518| [76475] Microsoft Internet Explorer 10/11 memory corruption
12519| [76436] Microsoft Internet Explorer 10/11 memory corruption
12520| [75781] Microsoft Internet Explorer 10/11 memory corruption
12521| [75777] Microsoft Internet Explorer 10 memory corruption
12522| [75767] Microsoft Internet Explorer 10/11 privilege escalation
12523| [75766] Microsoft Internet Explorer 10/11 memory corruption
12524| [75765] Microsoft Internet Explorer 10/11 memory corruption
12525| [75762] Microsoft Internet Explorer 10/11 memory corruption
12526| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
12527| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
12528| [75324] Microsoft Internet Explorer 10/11 memory corruption
12529| [74857] Microsoft Internet Explorer 10/11 memory corruption
12530| [73944] Microsoft Internet Explorer 10/11 memory corruption
12531| [73942] Microsoft Internet Explorer 10 memory corruption
12532| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
12533| [69144] Microsoft Internet Explorer 10/11 memory corruption
12534| [69141] Microsoft Internet Explorer 10/11 privilege escalation
12535| [69138] Microsoft Internet Explorer 10/11 memory corruption
12536| [69126] Microsoft Internet Explorer 10/11 memory corruption
12537| [69122] Microsoft Internet Explorer 10/11 memory corruption
12538| [69117] Microsoft Internet Explorer 10/11 memory corruption
12539| [69115] Microsoft Internet Explorer 10 memory corruption
12540| [69114] Microsoft Internet Explorer 10 memory corruption
12541| [68398] Microsoft Internet Explorer 10 memory corruption
12542| [68180] Microsoft Internet Explorer 10/11 privilege escalation
12543| [68179] Microsoft Internet Explorer 10/11 privilege escalation
12544| [68168] Microsoft Internet Explorer 10/11 memory corruption
12545| [67810] Microsoft Internet Explorer 10/11 memory corruption
12546| [67504] Microsoft Internet Explorer 10/11 memory corruption
12547| [67495] Microsoft Internet Explorer 10 memory corruption
12548| [67493] Microsoft Internet Explorer 10/11 memory corruption
12549| [67491] Microsoft Internet Explorer 10/11 memory corruption
12550| [67486] Microsoft Internet Explorer 10 memory corruption
12551| [67482] Microsoft Internet Explorer 10/11 memory corruption
12552| [67352] Microsoft Internet Explorer 10/11 memory corruption
12553| [67347] Microsoft Internet Explorer 10/11 memory corruption
12554| [67344] Microsoft Internet Explorer 10/11 memory corruption
12555| [67341] Microsoft Internet Explorer 10/11 memory corruption
12556| [67334] Microsoft Internet Explorer 10 memory corruption
12557| [67330] Microsoft Internet Explorer 10/11 memory corruption
12558| [67329] Microsoft Internet Explorer 10/11 memory corruption
12559| [67004] Microsoft Internet Explorer 10/11 memory corruption
12560| [13537] Microsoft Internet Explorer 10/11 memory corruption
12561| [13535] Microsoft Internet Explorer 10/11 memory corruption
12562| [13530] Microsoft Internet Explorer 10/11 memory corruption
12563| [13529] Microsoft Internet Explorer 10/11 memory corruption
12564| [13523] Microsoft Internet Explorer 10/11 memory corruption
12565| [13516] Microsoft Internet Explorer 10/11 memory corruption
12566| [13513] Microsoft Internet Explorer 10/11 memory corruption
12567| [13510] Microsoft Internet Explorer 10/11 memory corruption
12568| [13507] Microsoft Internet Explorer 10 memory corruption
12569| [13506] Microsoft Internet Explorer 10 memory corruption
12570| [13498] Microsoft Internet Explorer 10/11 memory corruption
12571| [13495] Microsoft Internet Explorer 10/11 information disclosure
12572| [13491] Microsoft Internet Explorer 10/11 memory corruption
12573| [12546] Microsoft Internet Explorer 10/11 memory corruption
12574| [12544] Microsoft Internet Explorer 10/11 memory corruption
12575| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
12576| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
12577| [11433] Microsoft Internet Explorer 10 memory corruption
12578| [10625] Microsoft Internet Explorer 10 memory corruption
12579| [10624] Microsoft Internet Explorer 10 memory corruption
12580| [10621] Microsoft Internet Explorer 10 memory corruption
12581| [10620] Microsoft Internet Explorer 10 memory corruption
12582| [10219] Microsoft Internet Explorer 10 memory corruption
12583| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
12584| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
12585| [9411] Microsoft Internet Explorer 10 memory corruption
12586| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
12587| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
12588| [9090] Microsoft Internet Explorer 10 memory corruption
12589| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
12590| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
12591| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
12592| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
12593| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
12594| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
12595| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
12596|
12597| MITRE CVE - https://cve.mitre.org:
12598| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
12599| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
12600| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
12601| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
12602| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
12603| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
12604| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
12605| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
12606| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
12607| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
12608| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
12609| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
12610| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
12611| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
12612| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
12613| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
12614| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
12615| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
12616| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
12617| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
12618| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
12619| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
12620| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
12621| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
12622| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
12623| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
12624| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
12625| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
12626| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
12627| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
12628| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
12629| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
12630| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
12631| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
12632| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
12633| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
12634| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
12635| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
12636| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
12637| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
12638| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
12639| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
12640| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
12641| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
12642| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
12643| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
12644| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
12645| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
12646| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
12647| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
12648| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
12649| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
12650| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
12651| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
12652| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
12653| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
12654| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
12655| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
12656| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
12657| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
12658| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
12659| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
12660| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
12661| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
12662| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
12663| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
12664| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
12665| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
12666| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
12667| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
12668| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
12669| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
12670| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
12671| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
12672| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
12673| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
12674| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
12675| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
12676| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
12677| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
12678| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
12679| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
12680| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
12681| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
12682| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
12683| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
12684| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
12685| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
12686| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
12687| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
12688| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
12689| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
12690| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
12691| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
12692| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
12693| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
12694| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
12695| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
12696| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
12697| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
12698| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
12699| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
12700| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
12701| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
12702|
12703| SecurityFocus - https://www.securityfocus.com/bid/:
12704| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
12705|
12706| IBM X-Force - https://exchange.xforce.ibmcloud.com:
12707| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
12708| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
12709|
12710| Exploit-DB - https://www.exploit-db.com:
12711| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
12712| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
12713|
12714| OpenVAS (Nessus) - http://www.openvas.org:
12715| [855384] Solaris Update for snmp/mibiisa 108870-36
12716| [855273] Solaris Update for snmp/mibiisa 108869-36
12717| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
12718|
12719| SecurityTracker - https://www.securitytracker.com:
12720| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
12721|
12722| OSVDB - http://www.osvdb.org:
12723| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
12724| [87262] Microsoft IIS FTP Command Injection Information Disclosure
12725| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
12726| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
12727| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
12728| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
12729| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
12730| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
12731| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
12732| [71856] Microsoft IIS Status Header Handling Remote Overflow
12733| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
12734| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
12735| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
12736| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
12737| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
12738| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
12739| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
12740| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
12741| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
12742| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
12743| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
12744| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
12745| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
12746| [59892] Microsoft IIS Malformed Host Header Remote DoS
12747| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
12748| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
12749| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
12750| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
12751| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
12752| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
12753| [55269] Microsoft IIS Traversal GET Request Remote DoS
12754| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
12755| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
12756| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
12757| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
12758| [52238] Microsoft IIS IDC Extension XSS
12759| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
12760| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
12761| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
12762| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
12763| [43451] Microsoft IIS HTTP Request Smuggling
12764| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
12765| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
12766| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
12767| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
12768| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
12769| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
12770| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
12771| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
12772| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
12773| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
12774| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
12775| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
12776| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
12777| [27152] Microsoft Windows IIS ASP Page Processing Overflow
12778| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
12779| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
12780| [21805] Microsoft IIS Crafted URL Remote DoS
12781| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
12782| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
12783| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
12784| [17124] Microsoft IIS Malformed WebDAV Request DoS
12785| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
12786| [17122] Microsoft IIS Permission Weakness .COM File Upload
12787| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
12788| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
12789| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
12790| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
12791| [13760] Microsoft IIS Malformed URL Request DoS
12792| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
12793| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
12794| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
12795| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
12796| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
12797| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
12798| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
12799| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
12800| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
12801| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
12802| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
12803| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
12804| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
12805| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
12806| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
12807| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
12808| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
12809| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
12810| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
12811| [11257] Microsoft IIS Malformed GET Request DoS
12812| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
12813| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
12814| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
12815| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
12816| [9200] Microsoft IIS Unspecified XSS Variant
12817| [9199] Microsoft IIS shtml.dll XSS
12818| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
12819| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
12820| [7737] Microsoft IIS ASP Redirection Function XSS
12821| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
12822| [5851] Microsoft IIS Single Dot Source Code Disclosure
12823| [5736] Microsoft IIS Relative Path System Privilege Escalation
12824| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
12825| [5633] Microsoft IIS Invalid WebDAV Request DoS
12826| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
12827| [5584] Microsoft IIS URL Redirection Malformed Length DoS
12828| [5566] Microsoft IIS Form_VBScript.asp XSS
12829| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
12830| [4864] Microsoft IIS TRACK Logging Failure
12831| [4863] Microsoft IIS Active Server Page Header DoS
12832| [4791] Microsoft IIS Response Object DoS
12833| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
12834| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
12835| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
12836| [3500] Microsoft IIS fpcount.exe Remote Overflow
12837| [3341] Microsoft IIS Redirect Response XSS
12838| [3339] Microsoft IIS HTTP Error Page XSS
12839| [3338] Microsoft IIS Help File XSS
12840| [3328] Microsoft IIS FTP Status Request DoS
12841| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
12842| [3325] Microsoft IIS HTR ISAPI Overflow
12843| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
12844| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
12845| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
12846| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
12847| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
12848| [3231] Microsoft IIS Log Bypass
12849| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
12850| [1931] Microsoft IIS MIME Content-Type Header DoS
12851| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
12852| [1826] Microsoft IIS Domain Guest Account Disclosure
12853| [1824] Microsoft IIS FTP DoS
12854| [1804] Microsoft IIS Long Request Parsing Remote DoS
12855| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
12856| [1750] Microsoft IIS File Fragment Disclosure
12857| [1543] Microsoft NT/IIS Invalid URL Request DoS
12858| [1504] Microsoft IIS File Permission Canonicalization Bypass
12859| [1465] Microsoft IIS .htr Missing Variable DoS
12860| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
12861| [1322] Microsoft IIS Malformed .htr Request DoS
12862| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
12863| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
12864| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
12865| [1170] Microsoft IIS Escape Character URL Access Bypass
12866| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
12867| [1082] Microsoft IIS Domain Resolution Access Bypass
12868| [1041] Microsoft IIS Malformed HTTP Request Header DoS
12869| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
12870| [930] Microsoft IIS Shared ASP Cache Information Disclosure
12871| [929] Microsoft IIS FTP Server NLST Command Overflow
12872| [928] Microsoft IIS Long Request Log Evasion
12873| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
12874| [814] Microsoft IIS global.asa Remote Information Disclosure
12875| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
12876| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
12877| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
12878| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
12879| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
12880| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
12881| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
12882| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
12883| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
12884| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
12885| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
12886| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
12887| [473] Microsoft IIS Multiple .cnf File Information Disclosure
12888| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
12889| [470] Microsoft IIS Form_JScript.asp XSS
12890| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
12891| [436] Microsoft IIS Unicode Remote Command Execution
12892| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
12893| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
12894| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
12895| [308] Microsoft IIS Malformed File Extension URL DoS
12896| [285] Microsoft IIS repost.asp File Upload
12897| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
12898| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
12899| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
12900| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
12901| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
12902| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
12903| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
12904| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
12905| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
12906| [98] Microsoft IIS perl.exe HTTP Path Disclosure
12907| [97] Microsoft IIS ISM.DLL HTR Request Overflow
12908| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
12909| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
12910| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
12911| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
12912| [2] Microsoft IIS ExAir search.asp Direct Request DoS
12913| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
12914| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
12915| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
12916| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
12917| [96192] Microsoft IE EUC-JP Character Encoding XSS
12918| [96191] Microsoft IE Process Integrity Level Assignment Bypass
12919| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
12920| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
12921| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
12922| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
12923| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
12924| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
12925| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
12926| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
12927| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
12928| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
12929| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
12930| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
12931| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
12932| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
12933| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
12934| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
12935| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
12936| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
12937| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
12938| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
12939| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
12940| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
12941| [94984] Microsoft IE Shift JIS Character Encoding XSS
12942| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
12943| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
12944| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
12945| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
12946| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
12947| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
12948| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
12949| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
12950| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
12951| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
12952| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
12953| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
12954| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
12955| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
12956| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
12957| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
12958| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
12959| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
12960| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
12961| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
12962| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
12963| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
12964| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
12965| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
12966| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
12967| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
12968| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
12969| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
12970| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
12971| [94507] Microsoft IE Infinite Loop DoS
12972| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
12973| [94127] Microsoft Office PNG File Handling Buffer Overflow
12974| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
12975| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
12976| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
12977| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
12978| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
12979| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
12980| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
12981| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
12982| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
12983| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
12984| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
12985| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
12986| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
12987| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
12988| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
12989| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
12990| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
12991| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
12992| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
12993| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
12994| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
12995| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
12996| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
12997| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
12998| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
12999| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
13000| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
13001| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
13002| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
13003| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
13004| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
13005| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
13006| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
13007| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
13008| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
13009| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
13010| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
13011| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
13012| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
13013| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
13014| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
13015| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
13016| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
13017| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
13018| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
13019| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
13020| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
13021| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
13022| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
13023| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
13024| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
13025| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
13026| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
13027| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
13028| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
13029| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
13030| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
13031| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
13032| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
13033| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
13034| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
13035| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
13036| [92257] Microsoft IE CSS Import Handling Remote DoS
13037| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
13038| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
13039| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
13040| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
13041| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
13042| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
13043| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
13044| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
13045| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
13046| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
13047| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
13048| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
13049| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
13050| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
13051| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
13052| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
13053| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
13054| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
13055| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
13056| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
13057| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
13058| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
13059| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
13060| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
13061| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
13062| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
13063| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
13064| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
13065| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
13066| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
13067| [91150] Microsoft SharePoint Unspecified XSS
13068| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
13069| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
13070| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
13071| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
13072| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
13073| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
13074| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
13075| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
13076| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
13077| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
13078| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
13079| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
13080| [90933] Microsoft IE Arbitrary HTM File Execution
13081| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
13082| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
13083| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
13084| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
13085| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
13086| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
13087| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
13088| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
13089| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
13090| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
13091| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
13092| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
13093| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
13094| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
13095| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
13096| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
13097| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
13098| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
13099| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
13100| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
13101| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
13102| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
13103| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
13104| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
13105| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
13106| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
13107| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
13108| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
13109| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
13110| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
13111| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
13112| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
13113| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
13114| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
13115| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
13116| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
13117| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
13118| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
13119| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
13120| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
13121| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
13122| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
13123| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
13124| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
13125| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
13126| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
13127| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
13128| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
13129| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
13130| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
13131| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
13132| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
13133| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
13134| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
13135| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
13136| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
13137| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
13138| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
13139| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
13140| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
13141| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
13142| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
13143| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
13144| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
13145| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
13146| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
13147| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
13148| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
13149| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
13150| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
13151| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
13152| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
13153| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
13154| [88837] Microsoft Office Excel Memory Corruption DoS
13155| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
13156| [88811] Microsoft Visio VSD File Parsing Memory Corruption
13157| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
13158| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
13159| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
13160| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
13161| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
13162| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
13163| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
13164| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
13165| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
13166| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
13167| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
13168| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
13169| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
13170| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
13171| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
13172| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
13173| [87819] Microsoft Office OneNote File Handling Memory Corruption
13174| [87273] Microsoft Office Excel XLS File Handling Overflow
13175| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
13176| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
13177| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
13178| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
13179| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
13180| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
13181| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
13182| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
13183| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
13184| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
13185| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
13186| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
13187| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
13188| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
13189| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
13190| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
13191| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
13192| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
13193| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
13194| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
13195| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
13196| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
13197| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
13198| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
13199| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
13200| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
13201| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
13202| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
13203| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
13204| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
13205| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
13206| [86732] Microsoft Office DOC File Handling Stack Overflow
13207| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
13208| [86622] Microsoft SQL Server Local Authentication Bypass
13209| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
13210| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
13211| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
13212| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
13213| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
13214| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
13215| [86057] Microsoft SQL Server Report Manager Unspecified XSS
13216| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
13217| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
13218| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
13219| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
13220| [85833] Microsoft Outlook Concealed Attachment Weakness
13221| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
13222| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
13223| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
13224| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
13225| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
13226| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
13227| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
13228| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
13229| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
13230| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
13231| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
13232| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
13233| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
13234| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
13235| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
13236| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
13237| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
13238| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
13239| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
13240| [84606] Microsoft Visio DXF File Handling Overflow
13241| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
13242| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
13243| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
13244| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
13245| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
13246| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
13247| [84599] Microsoft Windows Print Spooler Service Remote Format String
13248| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
13249| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
13250| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
13251| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
13252| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
13253| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
13254| [84553] Microsoft Help &
13255| [83860] Microsoft IE XML Data Handling Arbitrary File Access
13256| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
13257| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
13258| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
13259| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
13260| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
13261| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
13262| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
13263| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
13264| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
13265| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
13266| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
13267| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
13268| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
13269| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
13270| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
13271| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
13272| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
13273| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
13274| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
13275| [83647] Microsoft SharePoint Username Unspecified XSS
13276| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
13277| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
13278| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
13279| [83439] Microsoft IE Long Unicode String Handling DoS
13280| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
13281| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
13282| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
13283| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
13284| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
13285| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
13286| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
13287| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
13288| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
13289| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
13290| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
13291| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
13292| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
13293| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
13294| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
13295| [82862] Microsoft IE EUC-JP Character Encoding XSS
13296| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
13297| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
13298| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
13299| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
13300| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
13301| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
13302| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
13303| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
13304| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
13305| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
13306| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
13307| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
13308| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
13309| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
13310| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
13311| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
13312| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
13313| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
13314| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
13315| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
13316| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
13317| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
13318| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
13319| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
13320| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
13321| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
13322| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
13323| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
13324| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
13325| [81732] Microsoft Office RTF Data Handling Memory Corruption
13326| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
13327| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
13328| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
13329| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
13330| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
13331| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
13332| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
13333| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
13334| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
13335| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
13336| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
13337| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
13338| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
13339| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
13340| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
13341| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
13342| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
13343| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
13344| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
13345| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
13346| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
13347| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
13348| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
13349| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
13350| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
13351| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
13352| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
13353| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
13354| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
13355| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
13356| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
13357| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
13358| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
13359| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
13360| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
13361| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
13362| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
13363| [80173] Microsoft IE Unspecified Overflow
13364| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
13365| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
13366| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
13367| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
13368| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
13369| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
13370| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
13371| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
13372| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
13373| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
13374| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
13375| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
13376| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
13377| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
13378| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
13379| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
13380| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
13381| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
13382| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
13383| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
13384| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
13385| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
13386| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
13387| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
13388| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
13389| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
13390| [79192] Microsoft IE Javascript Dialog Origin Spoofing
13391| [79186] Microsoft IE onunload Location Field Overwrite
13392| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
13393| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
13394| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
13395| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
13396| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
13397| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
13398| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
13399| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
13400| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
13401| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
13402| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
13403| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
13404| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
13405| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
13406| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
13407| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
13408| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
13409| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
13410| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
13411| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
13412| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
13413| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
13414| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
13415| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
13416| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
13417| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
13418| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
13419| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
13420| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
13421| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
13422| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
13423| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
13424| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
13425| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
13426| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
13427| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
13428| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
13429| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
13430| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
13431| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
13432| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
13433| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
13434| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
13435| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
13436| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
13437| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
13438| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
13439| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
13440| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
13441| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
13442| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
13443| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
13444| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
13445| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
13446| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
13447| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
13448| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
13449| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
13450| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
13451| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
13452| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
13453| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
13454| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
13455| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
13456| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
13457| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
13458| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
13459| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
13460| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
13461| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
13462| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
13463| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
13464| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
13465| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
13466| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
13467| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
13468| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
13469| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
13470| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
13471| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
13472| [75393] Microsoft SharePoint Unspecified URI XSS
13473| [75391] Microsoft SharePoint Contact Details XSS
13474| [75390] Microsoft SharePoint EditForm.aspx XSS
13475| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
13476| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
13477| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
13478| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
13479| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
13480| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
13481| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
13482| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
13483| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
13484| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
13485| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
13486| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
13487| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
13488| [75250] Microsoft IE Unspecified Remote Code Execution
13489| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
13490| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
13491| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
13492| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
13493| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
13494| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
13495| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
13496| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
13497| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
13498| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
13499| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
13500| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
13501| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
13502| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
13503| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
13504| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
13505| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
13506| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
13507| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
13508| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
13509| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
13510| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
13511| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
13512| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
13513| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
13514| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
13515| [74396] Microsoft Report Viewer Control Unspecified XSS
13516| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
13517| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
13518| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
13519| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
13520| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
13521| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
13522| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
13523| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
13524| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
13525| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
13526| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
13527| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
13528| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
13529| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
13530| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
13531| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
13532| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
13533| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
13534| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
13535| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
13536| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
13537| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
13538| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
13539| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
13540| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
13541| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
13542| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
13543| [73602] Microsoft Windows nsiproxy.sys Local DoS
13544| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
13545| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
13546| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
13547| [72960] Microsoft SMB Client Response Handling Remote Code Execution
13548| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
13549| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
13550| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
13551| [72953] Microsoft IE MIME Sniffing Information Disclosure
13552| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
13553| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
13554| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
13555| [72949] Microsoft IE Drag and Drop Information Disclosure
13556| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
13557| [72947] Microsoft IE Time Element Memory Corruption
13558| [72946] Microsoft IE Drag and Drop Memory Corruption
13559| [72944] Microsoft IE SafeHTML Function XSS
13560| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
13561| [72942] Microsoft IE Link Properties Handling Memory Corruption
13562| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
13563| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
13564| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
13565| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
13566| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
13567| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
13568| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
13569| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
13570| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
13571| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
13572| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
13573| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
13574| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
13575| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
13576| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
13577| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
13578| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
13579| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
13580| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
13581| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
13582| [72696] Microsoft Reader AOLL Chunk Array Overflow
13583| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
13584| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
13585| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
13586| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
13587| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
13588| [72680] Microsoft IE UTF-7 Local Redirection XSS
13589| [72679] Microsoft IE Tags javascript:[jscodz] XSS
13590| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
13591| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
13592| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
13593| [72672] Microsoft Windows AppFix systest.sdb Local DoS
13594| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
13595| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
13596| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
13597| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
13598| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
13599| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
13600| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
13601| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
13602| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
13603| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
13604| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
13605| [71777] Microsoft IE Frame Tag Handling Information Disclosure
13606| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
13607| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
13608| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
13609| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
13610| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
13611| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
13612| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
13613| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
13614| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
13615| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
13616| [71765] Microsoft Office Excel File Validation Record Handling Overflow
13617| [71761] Microsoft Office Excel File Handling Memory Corruption
13618| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
13619| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
13620| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
13621| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
13622| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
13623| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
13624| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
13625| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
13626| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
13627| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
13628| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
13629| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
13630| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
13631| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
13632| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
13633| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
13634| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
13635| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
13636| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
13637| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
13638| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
13639| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
13640| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
13641| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
13642| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
13643| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
13644| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
13645| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
13646| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
13647| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
13648| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
13649| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
13650| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
13651| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
13652| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
13653| [71724] Microsoft IE Layouts Handling Memory Corruption
13654| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
13655| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
13656| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
13657| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
13658| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
13659| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
13660| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
13661| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
13662| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
13663| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
13664| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
13665| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
13666| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
13667| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
13668| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
13669| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
13670| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
13671| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
13672| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
13673| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
13674| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
13675| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
13676| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
13677| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
13678| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
13679| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
13680| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
13681| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
13682| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
13683| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
13684| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
13685| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
13686| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
13687| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
13688| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
13689| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
13690| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
13691| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
13692| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
13693| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
13694| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
13695| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
13696| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
13697| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
13698| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
13699| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
13700| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
13701| [69828] Microsoft IE Recursive Select Element Remote Code Execution
13702| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
13703| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
13704| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
13705| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
13706| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
13707| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
13708| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
13709| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
13710| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
13711| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
13712| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
13713| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
13714| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
13715| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
13716| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
13717| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
13718| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
13719| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
13720| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
13721| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
13722| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
13723| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
13724| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
13725| [69804] Microsoft Office PICT Image Converter Overflow
13726| [69803] Microsoft Office CGM Image Converter Overflow
13727| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
13728| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
13729| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
13730| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
13731| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
13732| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
13733| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
13734| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
13735| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
13736| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
13737| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
13738| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
13739| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
13740| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
13741| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
13742| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
13743| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
13744| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
13745| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
13746| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
13747| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
13748| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
13749| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
13750| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
13751| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
13752| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
13753| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
13754| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
13755| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
13756| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
13757| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
13758| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
13759| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
13760| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
13761| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
13762| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
13763| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
13764| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
13765| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
13766| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
13767| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
13768| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
13769| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
13770| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
13771| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
13772| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
13773| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
13774| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
13775| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
13776| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
13777| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
13778| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
13779| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
13780| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
13781| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
13782| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
13783| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
13784| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
13785| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
13786| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
13787| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
13788| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
13789| [68548] Microsoft IE / SharePoint Unspecified XSS
13790| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
13791| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
13792| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
13793| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
13794| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
13795| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
13796| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
13797| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
13798| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
13799| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
13800| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
13801| [68438] Microsoft XSS Filter Library Bypass
13802| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
13803| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
13804| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
13805| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
13806| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
13807| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
13808| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
13809| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
13810| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
13811| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
13812| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
13813| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
13814| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
13815| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
13816| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
13817| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
13818| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
13819| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
13820| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
13821| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
13822| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
13823| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
13824| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
13825| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
13826| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
13827| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
13828| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
13829| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
13830| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
13831| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
13832| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
13833| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
13834| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
13835| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
13836| [67463] Microsoft IE location.replace Address Bar Spoofing
13837| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
13838| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
13839| [67258] Microsoft ClickOnce MITM Weakness
13840| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
13841| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
13842| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
13843| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
13844| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
13845| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
13846| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
13847| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
13848| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
13849| [67000] Microsoft IE boundElements Property Handling Memory Corruption
13850| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
13851| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
13852| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
13853| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
13854| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
13855| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
13856| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
13857| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
13858| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
13859| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
13860| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
13861| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
13862| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
13863| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
13864| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
13865| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
13866| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
13867| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
13868| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
13869| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
13870| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
13871| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
13872| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
13873| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
13874| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
13875| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
13876| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
13877| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
13878| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
13879| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
13880| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
13881| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
13882| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
13883| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
13884| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
13885| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
13886| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
13887| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
13888| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
13889| [65502] Microsoft IE Unspecified DoS
13890| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
13891| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
13892| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
13893| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
13894| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
13895| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
13896| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
13897| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
13898| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
13899| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
13900| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
13901| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
13902| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
13903| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
13904| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
13905| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
13906| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
13907| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
13908| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
13909| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
13910| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
13911| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
13912| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
13913| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
13914| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
13915| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
13916| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
13917| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
13918| [65213] Microsoft IE HTML Element Handling Memory Corruption
13919| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
13920| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
13921| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
13922| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
13923| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
13924| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
13925| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
13926| [64952] Microsoft IE img Tag Hijacking Weakness
13927| [64944] Microsoft Dynamics GP Default System Password
13928| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
13929| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
13930| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
13931| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
13932| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
13933| [64828] Microsoft IE history go ActiveX Overflow DoS
13934| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
13935| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
13936| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
13937| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
13938| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
13939| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
13940| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
13941| [64533] Microsoft IE document.createElement NULL Dereference DoS
13942| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
13943| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
13944| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
13945| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
13946| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
13947| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
13948| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
13949| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
13950| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
13951| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
13952| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
13953| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
13954| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
13955| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
13956| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
13957| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
13958| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
13959| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
13960| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
13961| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
13962| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
13963| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
13964| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
13965| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
13966| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
13967| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
13968| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
13969| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
13970| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
13971| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
13972| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
13973| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
13974| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
13975| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
13976| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
13977| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
13978| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
13979| [63334] Microsoft IE Post Encoding Information Disclosure
13980| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
13981| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
13982| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
13983| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
13984| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
13985| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
13986| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
13987| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
13988| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
13989| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
13990| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
13991| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
13992| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
13993| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
13994| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
13995| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
13996| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
13997| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
13998| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
13999| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
14000| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
14001| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
14002| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
14003| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
14004| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
14005| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
14006| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
14007| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
14008| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
14009| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
14010| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
14011| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
14012| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
14013| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
14014| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
14015| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
14016| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
14017| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
14018| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
14019| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
14020| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
14021| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
14022| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
14023| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
14024| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
14025| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
14026| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
14027| [62239] Microsoft Office Powerpoint File Path Handling Overflow
14028| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
14029| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
14030| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
14031| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
14032| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
14033| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
14034| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
14035| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
14036| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
14037| [61911] Microsoft IE Table Layout Reuse Memory Corruption
14038| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
14039| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
14040| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
14041| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
14042| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
14043| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
14044| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
14045| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
14046| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
14047| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
14048| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
14049| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
14050| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
14051| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
14052| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
14053| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
14054| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
14055| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
14056| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
14057| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
14058| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
14059| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
14060| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
14061| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
14062| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
14063| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
14064| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
14065| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
14066| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
14067| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
14068| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
14069| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
14070| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
14071| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
14072| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
14073| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
14074| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
14075| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
14076| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
14077| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
14078| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
14079| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
14080| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
14081| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
14082| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
14083| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
14084| [59957] Microsoft Windows SMB Response Handling Remote DoS
14085| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
14086| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
14087| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
14088| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
14089| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
14090| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
14091| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
14092| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
14093| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
14094| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
14095| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
14096| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
14097| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
14098| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
14099| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
14100| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
14101| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
14102| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
14103| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
14104| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
14105| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
14106| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
14107| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
14108| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
14109| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
14110| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
14111| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
14112| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
14113| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
14114| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
14115| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
14116| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
14117| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
14118| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
14119| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
14120| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
14121| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
14122| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
14123| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
14124| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
14125| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
14126| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
14127| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
14128| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
14129| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
14130| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
14131| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
14132| [59263] Microsoft IE IMG Tag width Handling DoS
14133| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
14134| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
14135| [59258] Microsoft Exchange ACL Modification Update Weakness
14136| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
14137| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
14138| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
14139| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
14140| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
14141| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
14142| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
14143| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
14144| [58870] Microsoft Office BMP Image Color Processing Overflow
14145| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
14146| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
14147| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
14148| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
14149| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
14150| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
14151| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
14152| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
14153| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
14154| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
14155| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
14156| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
14157| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
14158| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
14159| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
14160| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
14161| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
14162| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
14163| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
14164| [58843] Microsoft Windows Media Player ASF Handling Overflow
14165| [58817] Microsoft IE Nested marquee Tag Handling DoS
14166| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
14167| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
14168| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
14169| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
14170| [58399] Microsoft IE window.print Function Loop Remote DoS
14171| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
14172| [58350] Microsoft Patterns &
14173| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
14174| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
14175| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
14176| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
14177| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
14178| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
14179| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
14180| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
14181| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
14182| [57742] Microsoft SQL Cleartext User Passwords Disclosure
14183| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
14184| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
14185| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
14186| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
14187| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
14188| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
14189| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
14190| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
14191| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
14192| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
14193| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
14194| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
14195| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
14196| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
14197| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
14198| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
14199| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
14200| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
14201| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
14202| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
14203| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
14204| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
14205| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
14206| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
14207| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
14208| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
14209| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
14210| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
14211| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
14212| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
14213| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
14214| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
14215| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
14216| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
14217| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
14218| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
14219| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
14220| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
14221| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
14222| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
14223| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
14224| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
14225| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
14226| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
14227| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
14228| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
14229| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
14230| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
14231| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
14232| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
14233| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
14234| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
14235| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
14236| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
14237| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
14238| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
14239| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
14240| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
14241| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
14242| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
14243| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
14244| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
14245| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
14246| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
14247| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
14248| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
14249| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
14250| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
14251| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
14252| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
14253| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
14254| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
14255| [54955] Microsoft Office Excel Malformed Records Handling Overflow
14256| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
14257| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
14258| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
14259| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
14260| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
14261| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
14262| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
14263| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
14264| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
14265| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
14266| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
14267| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
14268| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
14269| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
14270| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
14271| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
14272| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
14273| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
14274| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
14275| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
14276| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
14277| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
14278| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
14279| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
14280| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
14281| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
14282| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
14283| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
14284| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
14285| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
14286| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
14287| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
14288| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
14289| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
14290| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
14291| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
14292| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
14293| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
14294| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
14295| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
14296| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
14297| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
14298| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
14299| [54183] Microsoft IE Unprintable Character Document Handling DoS
14300| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
14301| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
14302| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
14303| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
14304| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
14305| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
14306| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
14307| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
14308| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
14309| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
14310| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
14311| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
14312| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
14313| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
14314| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
14315| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
14316| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
14317| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
14318| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
14319| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
14320| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
14321| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
14322| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
14323| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
14324| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
14325| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
14326| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
14327| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
14328| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
14329| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
14330| [52694] Microsoft Windows Media Player Malformed GET Request DoS
14331| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
14332| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
14333| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
14334| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
14335| [52689] Microsoft Word Document Handling HTML Object Tag DoS
14336| [52688] Microsoft Word Document Handling HTML Object Tag XSS
14337| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
14338| [52685] Microsoft Windows FTP Client Multiple Command Overflows
14339| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
14340| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
14341| [52682] Microsoft Windows Explorer ZIP Handler DoS
14342| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
14343| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
14344| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
14345| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
14346| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
14347| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
14348| [52666] Microsoft IE Malformed file:// URI Handling DoS
14349| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
14350| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
14351| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
14352| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
14353| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
14354| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
14355| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
14356| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
14357| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
14358| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
14359| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
14360| [52517] Microsoft Windows DNS Server Query Validation Spoofing
14361| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
14362| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
14363| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
14364| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
14365| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
14366| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
14367| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
14368| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
14369| [51433] Microsoft Windows Crafted CHM File Handling Overflow
14370| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
14371| [51277] Microsoft Excel HTML Tag Interpretation XSS
14372| [51259] Microsoft IE onload=screen["
14373| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
14374| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
14375| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
14376| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
14377| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
14378| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
14379| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
14380| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
14381| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
14382| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
14383| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
14384| [50598] Microsoft Office Word Table Property Handling Overflow
14385| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
14386| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
14387| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
14388| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
14389| [50592] Microsoft Office Word Malformed Value Memory Corruption
14390| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
14391| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
14392| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
14393| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
14394| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
14395| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
14396| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
14397| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
14398| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
14399| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
14400| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
14401| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
14402| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
14403| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
14404| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
14405| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
14406| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
14407| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
14408| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
14409| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
14410| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
14411| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
14412| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
14413| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
14414| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
14415| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
14416| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
14417| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
14418| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
14419| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
14420| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
14421| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
14422| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
14423| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
14424| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
14425| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
14426| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
14427| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
14428| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
14429| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
14430| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
14431| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
14432| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
14433| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
14434| [49385] Microsoft ASP.NET Request Validation <
14435| [49384] Microsoft ASP.NET Request Validation <
14436| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
14437| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
14438| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
14439| [49118] Microsoft IE HTML Object Handling Memory Corruption
14440| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
14441| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
14442| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
14443| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
14444| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
14445| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
14446| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
14447| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
14448| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
14449| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
14450| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
14451| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
14452| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
14453| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
14454| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
14455| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
14456| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
14457| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
14458| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
14459| [48837] Microsoft Windows Vista Page Fault Handling DoS
14460| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
14461| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
14462| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
14463| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
14464| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
14465| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
14466| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
14467| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
14468| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
14469| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
14470| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
14471| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
14472| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
14473| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
14474| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
14475| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
14476| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
14477| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
14478| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
14479| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
14480| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
14481| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
14482| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
14483| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
14484| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
14485| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
14486| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
14487| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
14488| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
14489| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
14490| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
14491| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
14492| [47410] Microsoft Office Excel connections.xml Password String Persistence
14493| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
14494| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
14495| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
14496| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
14497| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
14498| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
14499| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
14500| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
14501| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
14502| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
14503| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
14504| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
14505| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
14506| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
14507| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
14508| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
14509| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
14510| [46935] Microsoft IE Pop Up Blocker Multiple Issues
14511| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
14512| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
14513| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
14514| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
14515| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
14516| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
14517| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
14518| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
14519| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
14520| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
14521| [46772] Microsoft SQL Server Convert Function Overflow
14522| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
14523| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
14524| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
14525| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
14526| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
14527| [46630] Microsoft IE location Window Object Handling XSS
14528| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
14529| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
14530| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
14531| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
14532| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
14533| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
14534| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
14535| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
14536| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
14537| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
14538| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
14539| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
14540| [45826] Microsoft IE Local Zone Saved File URI XSS
14541| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
14542| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
14543| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
14544| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
14545| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
14546| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
14547| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
14548| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
14549| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
14550| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
14551| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
14552| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
14553| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
14554| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
14555| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
14556| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
14557| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
14558| [45262] Microsoft ISA Server Host Header Log File Content Injection
14559| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
14560| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
14561| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
14562| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
14563| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
14564| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
14565| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
14566| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
14567| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
14568| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
14569| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
14570| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
14571| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
14572| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
14573| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
14574| [44979] Microsoft SQL Server Blank sa Password Set Weakness
14575| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
14576| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
14577| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
14578| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
14579| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
14580| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
14581| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
14582| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
14583| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
14584| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
14585| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
14586| [44303] Microsoft IE body Tag Infinite Loop DoS
14587| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
14588| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
14589| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
14590| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
14591| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
14592| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
14593| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
14594| [44205] Microsoft IE Data Stream Handling Memory Corruption
14595| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
14596| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
14597| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
14598| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
14599| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
14600| [44150] Microsoft Access Crafted MDB File Handling Overflow
14601| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
14602| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
14603| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
14604| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
14605| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
14606| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
14607| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
14608| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
14609| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
14610| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
14611| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
14612| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
14613| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
14614| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
14615| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
14616| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
14617| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
14618| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
14619| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
14620| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
14621| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
14622| [42724] Microsoft Excel Style Record Handling Memory Corruption
14623| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
14624| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
14625| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
14626| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
14627| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
14628| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
14629| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
14630| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
14631| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
14632| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
14633| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
14634| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
14635| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
14636| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
14637| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
14638| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
14639| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
14640| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
14641| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
14642| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
14643| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
14644| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
14645| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
14646| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
14647| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
14648| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
14649| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
14650| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
14651| [41155] Microsoft Windows Hardware-enforced DEP Bypass
14652| [41154] Microsoft Windows XP EFS Cleartext Password Storage
14653| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
14654| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
14655| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
14656| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
14657| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
14658| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
14659| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
14660| [41060] Microsoft .NET Unspecified XSS Filter Bypass
14661| [41059] Microsoft Windows ARP Saturation Remote DoS
14662| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
14663| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
14664| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
14665| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
14666| [41041] Microsoft IE Mouse Click self.resizeTo DoS
14667| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
14668| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
14669| [41035] Microsoft IE onload Localhost DoS
14670| [41026] Microsoft IE GET Request Overflow
14671| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
14672| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
14673| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
14674| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
14675| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
14676| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
14677| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
14678| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
14679| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
14680| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
14681| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
14682| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
14683| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
14684| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
14685| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
14686| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
14687| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
14688| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
14689| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
14690| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
14691| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
14692| [39121] Microsoft IE DHTML Object Memory Corruption
14693| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
14694| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
14695| [39118] Microsoft IE Object setExpression Function Memory Corruption
14696| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
14697| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
14698| [38955] Microsoft IE history.length Variable History Disclosure
14699| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
14700| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
14701| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
14702| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
14703| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
14704| [38495] Microsoft IE Outlook Express Address Book Activex DoS
14705| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
14706| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
14707| [38488] Microsoft ISA Server File Extension Filter Bypass
14708| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
14709| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
14710| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
14711| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
14712| [38212] Microsoft IE document.open() Function Address Bar Spoofing
14713| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
14714| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
14715| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
14716| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
14717| [37637] Microsoft Windows Crafted HLP File Overflow
14718| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
14719| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
14720| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
14721| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
14722| [37632] Microsoft Word Unspecified Memory Corruption
14723| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
14724| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
14725| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
14726| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
14727| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
14728| [37626] Microsoft IE Unspecified Address Bar Spoofing
14729| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
14730| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
14731| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
14732| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
14733| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
14734| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
14735| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
14736| [36936] Microsoft Visual Basic VBP File Handling Overflow
14737| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
14738| [36934] Microsoft Agent URL Handling Remote Code Execution
14739| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
14740| [36400] Microsoft IE HTML FTP Credential Disclosure
14741| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
14742| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
14743| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
14744| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
14745| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
14746| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
14747| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
14748| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
14749| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
14750| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
14751| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
14752| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
14753| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
14754| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
14755| [36385] Microsoft Windows Media Player Skin File Handling Overflow
14756| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
14757| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
14758| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
14759| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
14760| [36147] Microsoft IE Zone Domain Specification DoS
14761| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
14762| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
14763| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
14764| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
14765| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
14766| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
14767| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
14768| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
14769| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
14770| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
14771| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
14772| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
14773| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
14774| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
14775| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
14776| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
14777| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
14778| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
14779| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
14780| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
14781| [35637] Microsoft Windows Unspecified Remote Code Execution
14782| [35568] Microsoft IE Script Variable Length DoS
14783| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
14784| [35352] Microsoft IE navcancl.htm res: URI Phishing
14785| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
14786| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
14787| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
14788| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
14789| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
14790| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
14791| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
14792| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
14793| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
14794| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
14795| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
14796| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
14797| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
14798| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
14799| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
14800| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
14801| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
14802| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
14803| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
14804| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
14805| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
14806| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
14807| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
14808| [34401] Microsoft IE Property Method Handling Memory Corruption
14809| [34400] Microsoft IE Uninitialized Object Memory Corruption
14810| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
14811| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
14812| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
14813| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
14814| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
14815| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
14816| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
14817| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
14818| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
14819| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
14820| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
14821| [34387] Microsoft Word Data Array Handling Remote Code Execution
14822| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
14823| [34385] Microsoft Word Macro Content Arbitrary Code Execution
14824| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
14825| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
14826| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
14827| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
14828| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
14829| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
14830| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
14831| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
14832| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
14833| [34077] Microsoft IE navcancl.htm res: URI XSS
14834| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
14835| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
14836| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
14837| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
14838| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
14839| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
14840| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
14841| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
14842| [33667] Microsoft Windows Vista Persistent Established Teredo Address
14843| [33666] Microsoft Windows Vista Teredo nonce Spoofing
14844| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
14845| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
14846| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
14847| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
14848| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
14849| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
14850| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
14851| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
14852| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
14853| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
14854| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
14855| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
14856| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
14857| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
14858| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
14859| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
14860| [33271] Microsoft Word Crafted Frame CSRF
14861| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
14862| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
14863| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
14864| [32630] Microsoft IE Key Press Event Focus Redirection
14865| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
14866| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
14867| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
14868| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
14869| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
14870| [32624] Microsoft IE mhtml Overflow DoS
14871| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
14872| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
14873| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
14874| [32087] Microsoft IE onunload Event Address Bar Spoofing
14875| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
14876| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
14877| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
14878| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
14879| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
14880| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
14881| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
14882| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
14883| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
14884| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
14885| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
14886| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
14887| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
14888| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
14889| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
14890| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
14891| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
14892| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
14893| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
14894| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
14895| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
14896| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
14897| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
14898| [31645] Microsoft Windows DNS Recursive Query DoS
14899| [31333] Microsoft IE Image File Embedded Content XSS
14900| [31332] Microsoft IE Scrollbar CSS Property DoS
14901| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
14902| [31330] Microsoft IE File:// URI src Tag IFrame DoS
14903| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
14904| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
14905| [31326] Microsoft IE HTML Table Tag style Attribute DoS
14906| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
14907| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
14908| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
14909| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
14910| [31321] Microsoft IE Javascript self.location Refresh DoS
14911| [31258] Microsoft Excel Palette Record Handling Overflow
14912| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
14913| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
14914| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
14915| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
14916| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
14917| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
14918| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
14919| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
14920| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
14921| [30997] Microsoft Windows .manifest File Handling Local DoS
14922| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
14923| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
14924| [30826] Microsoft Visual Basic Click Event Procedure Overflow
14925| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
14926| [30824] Microsoft Word Malformed String Memory Corruption
14927| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
14928| [30822] Microsoft IE A Tag Long Title Attribute DoS
14929| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
14930| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
14931| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
14932| [30818] Microsoft Windows Media Player ASF Parsing Overflow
14933| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
14934| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
14935| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
14936| [30814] Microsoft IE DHTML Script Function Memory Corruption
14937| [30813] Microsoft IE Script Error Handling Memory Corruption
14938| [30811] Microsoft Windows SNMP Service Remote Overflow
14939| [30405] Microsoft Windows Active Directory Unspecified DoS
14940| [30402] Microsoft w3wp Crafted COM Component Request DoS
14941| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
14942| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
14943| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
14944| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
14945| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
14946| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
14947| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
14948| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
14949| [30087] Microsoft IE Empty APPLET Tag DoS
14950| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
14951| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
14952| [29720] Microsoft PowerPoint Unspecified Code Execution
14953| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
14954| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
14955| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
14956| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
14957| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
14958| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
14959| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
14960| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
14961| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
14962| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
14963| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
14964| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
14965| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
14966| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
14967| [29440] Microsoft Word memmove Integer Overflow
14968| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
14969| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
14970| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
14971| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
14972| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
14973| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
14974| [29426] Microsoft XML Core Services XSLT Processing Overflow
14975| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
14976| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
14977| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
14978| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
14979| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
14980| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
14981| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
14982| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
14983| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
14984| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
14985| [29129] Microsoft IE wininet.dll Content-Type DoS
14986| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
14987| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
14988| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
14989| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
14990| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
14991| [28730] Microsoft Publisher PUB File Font Parsing Overflow
14992| [28729] Microsoft Windows Indexing Service Unspecified XSS
14993| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
14994| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
14995| [28723] Microsoft Works Malformed Works Spreadsheet DoS
14996| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
14997| [28614] Microsoft IE input/div Tag width Conflict DoS
14998| [28539] Microsoft Word 2000 Unspecified Code Execution
14999| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
15000| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
15001| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
15002| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
15003| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
15004| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
15005| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
15006| [28381] Microsoft IE ActiveX SaveFile Handling DoS
15007| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
15008| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
15009| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
15010| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
15011| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
15012| [27854] Microsoft IE Chained CSS Imports Memory Corruption
15013| [27853] Microsoft IE HTML Rendering Memory Corruption
15014| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
15015| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
15016| [27850] Microsoft IE Cross Site Window Location Information Disclosure
15017| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
15018| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
15019| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
15020| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
15021| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
15022| [27844] Microsoft Windows DNS Client Service Record Response Overflow
15023| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
15024| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
15025| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
15026| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
15027| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
15028| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
15029| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
15030| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
15031| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
15032| [27373] Microsoft IE Native Function Iteration NULL Dereference
15033| [27372] Microso
15034#######################################################################################################################################
15035 Anonymous JTSEC #OpTurkey Full Recon #14