· 6 years ago · Oct 05, 2019, 05:45 PM
1#######################################################################################################################################
2======================================================================================================================================
3Hostname worldranch.co.jp ISP NTT Communications Corporation
4Continent Asia Flag
5JP
6Country Japan Country Code JP
7Region Unknown Local time 05 Oct 2019 11:27 JST
8City Unknown Postal Code Unknown
9IP Address 60.43.151.164 Latitude 35.69
10 Longitude 139.69
11======================================================================================================================================
12#######################################################################################################################################
13> worldranch.co.jp
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: worldranch.co.jp
19Address: 60.43.151.164
20>
21#######################################################################################################################################
22[ JPRS database provides information on network administration. Its use is ]
23[ restricted to network administration purposes. For further information, ]
24[ use 'whois -h whois.jprs.jp help'. To suppress Japanese output, add'/e' ]
25[ at the end of command, e.g. 'whois -h whois.jprs.jp xxx/e'. ]
26
27Domain Information:
28a. [Domain Name] WORLDRANCH.CO.JP
29g. [Organization] WARUDO BOKUJYO CO., LTD.
30l. [Organization Type] Corporation
31m. [Administrative Contact] KA1063JP
32n. [Technical Contact] TO18649JP
33p. [Name Server] ns-231.dns.jp-e1.cloudn-service.com
34p. [Name Server] ns-232.dns.jp-w1.cloudn-service.com
35p. [Name Server] ns-233.dns.us-e1.cloudn-service.com
36s. [Signing Key]
37[State] Connected (2020/09/30)
38[Registered Date] 1999/09/28
39[Connected Date] 1999/10/01
40[Last Update] 2019/10/01 01:05:50 (JST)
41#######################################################################################################################################
42[+] Target : worldranch.co.jp
43
44[+] IP Address : 60.43.151.164
45
46[+] Headers :
47
48[+] Date : Sat, 05 Oct 2019 15:52:30 GMT
49[+] Server : Apache/2.2.15 (CentOS)
50[+] Last-Modified : Sat, 05 Oct 2019 02:45:26 GMT
51[+] ETag : "2823b2-78bf-59420cf9bb0d0"
52[+] Accept-Ranges : bytes
53[+] Content-Length : 30911
54[+] Keep-Alive : timeout=15, max=100
55[+] Connection : Keep-Alive
56[+] Content-Type : text/html
57
58[+] SSL Certificate Information :
59
60[-] SSL is not Present on Target URL...Skipping...
61
62[+] Whois Lookup :
63
64[+] NIR : {'query': '60.43.151.164', 'raw': None, 'nets': []}
65[+] ASN Registry : apnic
66[+] ASN : 4713
67[+] ASN CIDR : 60.32.0.0/12
68[+] ASN Country Code : JP
69[+] ASN Date : 2004-04-02
70[+] ASN Description : OCN NTT Communications Corporation, JP
71[+] cidr : 60.32.0.0/12
72[+] name : OCN
73[+] handle : JNIC1-AP
74[+] range : 60.32.0.0 - 60.47.255.255
75[+] description : NTT Communications Corporation
76OTEMACHI PLACE WEST TOWER 2-3-1 Otemachi Chiyoda-ku,Tokyo 100-8019 Japan
77[+] country : JP
78[+] state : None
79[+] city : None
80[+] address : Urbannet-Kanda Bldg 4F, 3-6-2 Uchi-Kanda
81Chiyoda-ku, Tokyo 101-0047, Japan
82[+] postal_code : None
83[+] emails : ['abuse@ocn.ad.jp', 'hostmaster@nic.ad.jp']
84[+] created : None
85[+] updated : None
86
87[+] Crawling Target...
88
89[+] Looking for robots.txt........[ Found ]
90[+] Extracting robots Links.......[ 0 ]
91[+] Looking for sitemap.xml.......[ Found ]
92[+] Extracting sitemap Links......[ 591 ]
93[+] Extracting CSS Links..........[ 2 ]
94[+] Extracting Javascript Links...[ 11 ]
95[+] Extracting Internal Links.....[ 12 ]
96[+] Extracting External Links.....[ 9 ]
97[+] Extracting Images.............[ 99 ]
98
99[+] Total Links Extracted : 714
100
101[+] Dumping Links in /opt/FinalRecon/dumps/worldranch.co.jp.dump
102[+] Completed!
103#######################################################################################################################################
104[+] Starting At 2019-10-05 11:52:46.248375
105[+] Collecting Information On: http://worldranch.co.jp/
106[#] Status: 200
107--------------------------------------------------
108[#] Web Server Detected: Apache/2.2.15 (CentOS)
109[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
110- Date: Sat, 05 Oct 2019 15:52:44 GMT
111- Server: Apache/2.2.15 (CentOS)
112- Last-Modified: Sat, 05 Oct 2019 02:45:26 GMT
113- ETag: "2823b2-78bf-59420cf9bb0d0"
114- Accept-Ranges: bytes
115- Content-Length: 30911
116- Keep-Alive: timeout=15, max=100
117- Connection: Keep-Alive
118- Content-Type: text/html
119--------------------------------------------------
120[#] Finding Location..!
121[#] as: AS4713 NTT Communications Corporation
122[#] city: Chiyoda
123[#] country: Japan
124[#] countryCode: JP
125[#] isp: NTT Communications Corporation
126[#] lat: 35.6906
127[#] lon: 139.77
128[#] org: NTT Communications Corporation
129[#] query: 60.43.151.164
130[#] region: 13
131[#] regionName: Tokyo
132[#] status: success
133[#] timezone: Asia/Tokyo
134[#] zip: 100-0001
135--------------------------------------------------
136[x] Didn't Detect WAF Presence on: http://worldranch.co.jp/
137--------------------------------------------------
138[#] Starting Reverse DNS
139[-] Failed ! Fail
140--------------------------------------------------
141[!] Scanning Open Port
142[#] 21/tcp open ftp
143[#] 80/tcp open http
144[#] 110/tcp open pop3
145[#] 143/tcp open imap
146[#] 443/tcp open https
147[#] 587/tcp open submission
148[#] 993/tcp open imaps
149[#] 995/tcp open pop3s
150[#] 2100/tcp open amiganetfs
151[#] 8400/tcp open cvd
152[#] 8402/tcp open abarsd
153--------------------------------------------------
154[+] Collecting Information Disclosure!
155[#] Detecting sitemap.xml file
156[!] sitemap.xml File Found: http://worldranch.co.jp//sitemap.xml
157[#] Detecting robots.txt file
158[!] robots.txt File Found: http://worldranch.co.jp//robots.txt
159[#] Detecting GNU Mailman
160[-] GNU Mailman App Not Detected!?
161--------------------------------------------------
162[+] Crawling Url Parameter On: http://worldranch.co.jp/
163--------------------------------------------------
164[#] Searching Html Form !
165[-] No Html Form Found!?
166--------------------------------------------------
167[!] Found 2 dom parameter
168[#] http://www.worldranch.co.jp/petsale/index.html#sec1
169[#] http://worldranch.co.jp//#top
170--------------------------------------------------
171[-] No internal Dynamic Parameter Found!?
172--------------------------------------------------
173[-] No external Dynamic Paramter Found!?
174--------------------------------------------------
175[!] 118 Internal links Discovered
176[+] http://worldranch.co.jp//images/favicon-16x16.png
177[+] http://www.worldranch.co.jp/
178[+] http://worldranch.co.jp//css/style.css
179[+] http://worldranch.co.jp//css/ps_auto_sitemap_index.css
180[+] http://worldranch.co.jp//../coupon/coupon.html
181[+] http://worldranch.co.jp//images/weekendsale_20191004-1006.jpg
182[+] http://www.worldranch.co.jp
183[+] http://worldranch.co.jp//index.html
184[+] http://worldranch.co.jp//contents/schedule.html
185[+] http://worldranch.co.jp//contents/price.html
186[+] http://worldranch.co.jp//contents/mediainfo.html
187[+] http://worldranch.co.jp//contents/sitemap.html
188[+] http://worldranch.co.jp//contents/faq.html
189[+] http://worldranch.co.jp//contents/contact.html
190[+] http://worldranch.co.jp//contents/about.html
191[+] http://worldranch.co.jp//contents/guide.html
192[+] http://worldranch.co.jp//contents/access.html
193[+] http://worldranch.co.jp//index.html
194[+] http://worldranch.co.jp//contents/2019_autumn_festival.html
195[+] http://worldranch.co.jp//contents/enjoy.html
196[+] http://worldranch.co.jp//contents/experience.html
197[+] http://worldranch.co.jp//contents/animals.html
198[+] http://worldranch.co.jp//contents/eat.html
199[+] http://worldranch.co.jp//contents/shopping.html
200[+] http://www.worldranch.co.jp/dog_corner/satooya.html
201[+] http://www.worldranch.co.jp/petsale/
202[+] http://worldranch.co.jp//contents/recruit.html
203[+] http://worldranch.co.jp//contents/bbq.html
204[+] http://worldranch.co.jp//contents/dantai.html
205[+] http://www.worldranch.co.jp/petsale/furanki.html
206[+] http://worldranch.co.jp//contents/guide.html
207[+] http://worldranch.co.jp//contents/wan-nyan-day.html
208[+] http://worldranch.co.jp//contents/garden-wedding.html
209[+] http://worldranch.co.jp//contents/pasture.html
210[+] http://worldranch.co.jp//contents/pelchelon.html
211[+] http://worldranch.co.jp//contents/small-animals.html
212[+] http://worldranch.co.jp//contents/dog-rental.html
213[+] http://worldranch.co.jp//../contents/pickup-eggs.html
214[+] http://worldranch.co.jp//contents/cat-house.html
215[+] http://worldranch.co.jp//contents/dolphin-touch.html
216[+] http://worldranch.co.jp//contents/goat-walk.html
217[+] http://worldranch.co.jp//contents/rabbit-walk.html
218[+] http://worldranch.co.jp//contents/dog-corner.html
219[+] http://worldranch.co.jp//contents/horse-walk.html
220[+] http://worldranch.co.jp//contents/bird_of_prey.html
221[+] http://worldranch.co.jp//contents/bird_house.html
222[+] http://worldranch.co.jp//contents/experience.html
223[+] http://worldranch.co.jp//contents/animals.html
224[+] http://www.worldranch.co.jp/dog_corner/
225[+] http://worldranch.co.jp//contents/food-court.html
226[+] http://worldranch.co.jp//contents/bbq-garden.html
227[+] http://worldranch.co.jp//contents/sushi.html
228[+] http://www.worldranch.co.jp/stay/
229[+] http://worldranch.co.jp//contents/shopping.html
230[+] http://worldranch.co.jp//contents/character.html
231[+] http://www.worldranch.co.jp/construction/
232[+] http://worldranch.co.jp//contents/2019_autumn_festival.html
233[+] http://worldranch.co.jp//contents/2019_autumn_festival.html
234[+] http://worldranch.co.jp//contents/halloween_2019.html
235[+] http://worldranch.co.jp//contents/halloween_2019.html
236[+] http://worldranch.co.jp//contents/rabbit-walk.html
237[+] http://worldranch.co.jp//contents/rabbit-walk.html
238[+] http://worldranch.co.jp//contents/capybara_touch.html
239[+] http://worldranch.co.jp//contents/capybara_touch.html
240[+] http://worldranch.co.jp//contents/nighter2019.html
241[+] http://worldranch.co.jp//contents/nighter2019.html
242[+] http://worldranch.co.jp//contents/observatory.html
243[+] http://worldranch.co.jp//contents/observatory.html
244[+] http://worldranch.co.jp//contents/capybara-baby2.html
245[+] http://worldranch.co.jp//contents/capybara-baby2.html
246[+] http://worldranch.co.jp//contents/jingisukan.html
247[+] http://worldranch.co.jp//contents/jingisukan.html
248[+] http://worldranch.co.jp//contents/pelchelon.html
249[+] http://worldranch.co.jp//contents/pelchelon.html
250[+] http://worldranch.co.jp//contents/dog_stay.html
251[+] http://worldranch.co.jp//contents/dog_stay.html
252[+] http://worldranch.co.jp//contents/news.html
253[+] http://www.worldranch.co.jp/eco-weeding/
254[+] http://www.worldranch.co.jp/petsale/
255[+] http://www.worldranch.co.jp/cat_house/
256[+] http://www.worldranch.co.jp/dog_corner/
257[+] http://worldranch.co.jp//contents/pony-square.html
258[+] http://www.worldranch.co.jp/hikitori/
259[+] http://worldranch.co.jp//contents/baby.html
260[+] http://worldranch.co.jp//contents/ecofeed.html
261[+] http://worldranch.co.jp//contents/taihi.html
262[+] http://worldranch.co.jp//contents/wood_chips.html
263[+] http://worldranch.co.jp//contents/horse-rental.html
264[+] http://www.worldranch.co.jp/WRHC/
265[+] http://worldranch.co.jp//contents/kensyu.html
266[+] http://www.worldranch.co.jp/zoo/
267[+] http://www.worldranch.co.jp/stay/
268[+] http://www.worldranch.co.jp/dog_corner/
269[+] http://www.worldranch.co.jp/petsale/
270[+] http://www.worldranch.co.jp/zoo/
271[+] http://www.worldranch.co.jp/WRHC/
272[+] http://www.worldranch.co.jp/hikitori/
273[+] http://www.worldranch.co.jp/eco-weeding/
274[+] http://worldranch.co.jp//contents/enjoy.html
275[+] http://worldranch.co.jp//contents/experience.html
276[+] http://worldranch.co.jp//contents/animals.html
277[+] http://worldranch.co.jp//contents/eat.html
278[+] http://worldranch.co.jp//contents/shopping.html
279[+] http://worldranch.co.jp//contents/about.html
280[+] http://worldranch.co.jp//contents/guide.html
281[+] http://worldranch.co.jp//contents/access.html
282[+] http://worldranch.co.jp//contents/schedule.html
283[+] http://worldranch.co.jp//contents/price.html
284[+] http://worldranch.co.jp//contents/recruit.html
285[+] http://worldranch.co.jp//contents/mediainfo.html
286[+] http://worldranch.co.jp//contents/sitemap.html
287[+] http://worldranch.co.jp//contents/contact.html
288[+] http://worldranch.co.jp//contents/privacy.html
289[+] http://www.worldranch.co.jp/dog_corner/
290[+] http://www.worldranch.co.jp/petsale/
291[+] http://www.worldranch.co.jp/WRHC/
292[+] http://www.worldranch.co.jp/stay/
293[+] http://www.worldranch.co.jp/hikitori/
294--------------------------------------------------
295[!] 13 External links Discovered
296[#] http://gmpg.org/xfn/11
297[#] http://accountpage.line.me/iqq2531p
298[#] https://www.instagram.com/dolphin_whale_/
299[#] https://www.facebook.com/worldranch
300[#] https://www.facebook.com/worldranch.japan/
301[#] https://twitter.com/worldranch
302[#] http://worldranch.blog97.fc2.com/
303[#] https://www.tripadvisor.jp/
304[#] http://worldpetreien.jp/
305[#] http://www.wcgc.co.jp/
306[#] http://ichinoyu.jp/
307[#] http://worldpetreien.jp/
308[#] http://www.wcgc.co.jp/
309--------------------------------------------------
310[#] Mapping Subdomain..
311[!] Found 1 Subdomain
312- worldranch.co.jp
313--------------------------------------------------
314[!] Done At 2019-10-05 11:53:05.762418
315#######################################################################################################################################
316[i] Scanning Site: http://worldranch.co.jp
317
318
319
320B A S I C I N F O
321====================
322
323
324[+] Site Title: ワールド牧場|大阪府南部のふれあい観光牧場
325[+] IP address: 60.43.151.164
326[+] Web Server: Apache/2.2.15 (CentOS)
327[+] CMS: Could Not Detect
328[+] Cloudflare: Not Detected
329[+] Robots File: Found
330
331-------------[ contents ]----------------
332User-Agent : *
333Sitemap : http://www.worldranch.co.jp/sitemap.xml
334
335-----------[end of contents]-------------
336
337
338
339W H O I S L O O K U P
340========================
341
342 [ JPRS database provides information on network administration. Its use is ]
343[ restricted to network administration purposes. For further information, ]
344[ use 'whois -h whois.jprs.jp help'. To suppress Japanese output, add'/e' ]
345[ at the end of command, e.g. 'whois -h whois.jprs.jp xxx/e'. ]
346
347Domain Information:
348a. [Domain Name] WORLDRANCH.CO.JP
349g. [Organization] WARUDO BOKUJYO CO., LTD.
350l. [Organization Type] Corporation
351m. [Administrative Contact] KA1063JP
352n. [Technical Contact] TO18649JP
353p. [Name Server] ns-231.dns.jp-e1.cloudn-service.com
354p. [Name Server] ns-232.dns.jp-w1.cloudn-service.com
355p. [Name Server] ns-233.dns.us-e1.cloudn-service.com
356s. [Signing Key]
357[State] Connected (2020/09/30)
358[Registered Date] 1999/09/28
359[Connected Date] 1999/10/01
360[Last Update] 2019/10/01 01:05:50 (JST)
361
362
363
364
365
366G E O I P L O O K U P
367=========================
368
369[i] IP Address: 60.43.151.164
370[i] Country: Japan
371[i] State:
372[i] City:
373[i] Latitude: 35.69
374[i] Longitude: 139.69
375
376
377
378
379H T T P H E A D E R S
380=======================
381
382
383[i] HTTP/1.1 200 OK
384[i] Date: Sat, 05 Oct 2019 15:52:46 GMT
385[i] Server: Apache/2.2.15 (CentOS)
386[i] Last-Modified: Sat, 05 Oct 2019 02:45:26 GMT
387[i] ETag: "2823b2-78bf-59420cf9bb0d0"
388[i] Accept-Ranges: bytes
389[i] Content-Length: 30911
390[i] Connection: close
391[i] Content-Type: text/html
392
393
394
395
396D N S L O O K U P
397===================
398
399worldranch.co.jp. 3599 IN A 60.43.151.164
400worldranch.co.jp. 3599 IN MX 10 mwpremgw2.ocn.ad.jp.
401worldranch.co.jp. 3599 IN MX 10 mwpremgw1.ocn.ad.jp.
402worldranch.co.jp. 59 IN SOA ns-231.dns.jp-e1.cloudn-service.com. root.cloudn2.net. 1 7200 900 1209600 86400
403worldranch.co.jp. 59 IN NS ns-231.dns.jp-e1.cloudn-service.com.
404worldranch.co.jp. 59 IN NS ns-233.dns.us-e1.cloudn-service.com.
405worldranch.co.jp. 59 IN NS ns-232.dns.jp-w1.cloudn-service.com.
406worldranch.co.jp. 3599 IN TXT "v=spf1 +a include:_spf.mwprem.net ~all"
407
408
409
410
411S U B N E T C A L C U L A T I O N
412====================================
413
414Address = 60.43.151.164
415Network = 60.43.151.164 / 32
416Netmask = 255.255.255.255
417Broadcast = not needed on Point-to-Point links
418Wildcard Mask = 0.0.0.0
419Hosts Bits = 0
420Max. Hosts = 1 (2^0 - 0)
421Host Range = { 60.43.151.164 - 60.43.151.164 }
422
423
424
425N M A P P O R T S C A N
426============================
427
428Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-05 15:52 UTC
429Nmap scan report for worldranch.co.jp (60.43.151.164)
430Host is up (0.15s latency).
431rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
432
433PORT STATE SERVICE
43421/tcp open ftp
43522/tcp filtered ssh
43623/tcp filtered telnet
43780/tcp open http
438110/tcp open pop3
439143/tcp open imap
440443/tcp open https
4413389/tcp closed ms-wbt-server
442
443Nmap done: 1 IP address (1 host up) scanned in 2.21 seconds
444
445#######################################################################################################################################
446Enter Address Website = worldranch.co.jp
447
448
449
450Reversing IP With HackTarget 'worldranch.co.jp'
451--------------------------------------------------
452
453[+] c15t2a7n.mwprem.net
454[+] ichinoyu.jp
455[+] mr-world.jp
456[+] norenichi.jp
457[+] wcgc.co.jp
458[+] worldpetreien.jp
459[+] worldranch.co.jp
460
461
462
463Reverse IP With YouGetSignal 'worldranch.co.jp'
464--------------------------------------------------
465
466[*] IP: 60.43.151.164
467[*] Domain: worldranch.co.jp
468[*] Total Domains: 1
469
470[+] worldranch.co.jp
471
472
473
474Geo IP Lookup 'worldranch.co.jp'
475-----------------------------------
476
477[+] IP Address: 60.43.151.164
478[+] Country: Japan
479[+] State:
480[+] City:
481[+] Latitude: 35.69
482[+] Longitude: 139.69
483
484
485
486Whois 'worldranch.co.jp'
487---------------------------
488
489[+] [ JPRS database provides information on network administration. Its use is ]
490[+] [ restricted to network administration purposes. For further information, ]
491[+] [ use 'whois -h whois.jprs.jp help'. To suppress Japanese output, add'/e' ]
492[+] [ at the end of command, e.g. 'whois -h whois.jprs.jp xxx/e'. ]
493[+] Domain Information:
494[+] a. [Domain Name] WORLDRANCH.CO.JP
495[+] g. [Organization] WARUDO BOKUJYO CO., LTD.
496[+] l. [Organization Type] Corporation
497[+] m. [Administrative Contact] KA1063JP
498[+] n. [Technical Contact] TO18649JP
499[+] p. [Name Server] ns-231.dns.jp-e1.cloudn-service.com
500[+] p. [Name Server] ns-232.dns.jp-w1.cloudn-service.com
501[+] p. [Name Server] ns-233.dns.us-e1.cloudn-service.com
502[+] s. [Signing Key]
503[+] [State] Connected (2020/09/30)
504[+] [Registered Date] 1999/09/28
505[+] [Connected Date] 1999/10/01
506[+] [Last Update] 2019/10/01 01:05:50 (JST)
507
508
509
510Bypass Cloudflare 'worldranch.co.jp'
511---------------------------------------
512
513[!] CloudFlare Bypass 60.43.151.164 | ftp.worldranch.co.jp
514[!] CloudFlare Bypass 127.0.0.1 | localhost.worldranch.co.jp
515[!] CloudFlare Bypass 60.43.151.164 | mail.worldranch.co.jp
516[!] CloudFlare Bypass 60.43.151.164 | www.worldranch.co.jp
517[!] CloudFlare Bypass 60.43.151.164 | smtp.worldranch.co.jp
518
519
520
521DNS Lookup 'worldranch.co.jp'
522--------------------------------
523
524[+] worldranch.co.jp. 3571 IN A 60.43.151.164
525[+] worldranch.co.jp. 3571 IN MX 10 mwpremgw2.ocn.ad.jp.
526[+] worldranch.co.jp. 3571 IN MX 10 mwpremgw1.ocn.ad.jp.
527[+] worldranch.co.jp. 31 IN SOA ns-231.dns.jp-e1.cloudn-service.com. root.cloudn2.net. 1 7200 900 1209600 86400
528[+] worldranch.co.jp. 31 IN NS ns-231.dns.jp-e1.cloudn-service.com.
529[+] worldranch.co.jp. 31 IN NS ns-233.dns.us-e1.cloudn-service.com.
530[+] worldranch.co.jp. 31 IN NS ns-232.dns.jp-w1.cloudn-service.com.
531[+] worldranch.co.jp. 3571 IN TXT "v=spf1 +a include:_spf.mwprem.net ~all"
532
533
534
535Find Shared DNS 'worldranch.co.jp'
536-------------------------------------
537
538[+] No DNS server records found for worldranch.co.jp
539
540
541
542Show HTTP Header 'worldranch.co.jp'
543--------------------------------------
544
545[+] HTTP/1.1 200 OK
546[+] Date: Sat, 05 Oct 2019 15:53:16 GMT
547[+] Server: Apache/2.2.15 (CentOS)
548[+] Last-Modified: Sat, 05 Oct 2019 02:45:26 GMT
549[+] ETag: "2823b2-78bf-59420cf9bb0d0"
550[+] Accept-Ranges: bytes
551[+] Content-Length: 30911
552[+] Content-Type: text/html
553[+]
554
555
556
557Port Scan 'worldranch.co.jp'
558-------------------------------
559
560Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-05 15:53 UTC
561Nmap scan report for worldranch.co.jp (60.43.151.164)
562Host is up (0.15s latency).
563rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
564
565PORT STATE SERVICE
56621/tcp open ftp
56722/tcp filtered ssh
56823/tcp filtered telnet
56980/tcp open http
570110/tcp open pop3
571143/tcp open imap
572443/tcp open https
5733389/tcp closed ms-wbt-server
574
575Nmap done: 1 IP address (1 host up) scanned in 1.82 seconds
576
577
578Robot.txt 'worldranch.co.jp'
579-------------------------------
580
581User-Agent : *
582Sitemap : http://www.worldranch.co.jp/sitemap.xml
583
584
585
586
587Traceroute 'worldranch.co.jp'
588--------------------------------
589
590Start: 2019-10-05T15:53:24+0000
591HOST: web01 Loss% Snt Last Avg Best Wrst StDev
592 1.|-- 45.79.12.201 0.0% 3 1.0 0.9 0.8 1.0 0.1
593 2.|-- 45.79.12.0 0.0% 3 0.7 0.6 0.5 0.7 0.1
594 3.|-- 45.79.12.9 0.0% 3 0.5 2.5 0.5 6.5 3.4
595 4.|-- 199.245.16.65 0.0% 3 1.7 1.7 1.5 1.8 0.1
596 5.|-- ae-0.r23.dllstx09.us.bb.gin.ntt.net 0.0% 3 1.4 1.9 1.4 2.4 0.5
597 6.|-- ae-8.r23.snjsca04.us.bb.gin.ntt.net 0.0% 3 37.6 37.7 37.6 37.8 0.1
598 7.|-- ae-21.r30.tokyjp05.jp.bb.gin.ntt.net 0.0% 3 140.8 140.9 140.8 141.2 0.2
599 8.|-- ae-2.r03.tokyjp05.jp.bb.gin.ntt.net 0.0% 3 141.9 142.1 141.9 142.4 0.2
600 9.|-- ae-3.ocn.tokyjp05.jp.bb.gin.ntt.net 0.0% 3 142.4 142.9 142.4 143.8 0.8
601 10.|-- 122.1.245.130 0.0% 3 137.3 137.3 137.3 137.3 0.0
602 11.|-- 114.147.63.126 0.0% 3 142.2 142.3 142.2 142.3 0.0
603 12.|-- 122.28.179.202 0.0% 3 140.9 156.7 140.9 188.4 27.4
604 13.|-- 180.8.125.226 0.0% 3 144.8 144.2 143.8 144.8 0.5
605 14.|-- 153.146.149.89 0.0% 3 146.3 148.4 146.3 152.4 3.4
606 15.|-- c15t2a7n.mwprem.net 0.0% 3 146.0 145.9 145.9 146.0 0.0
607#######################################################################################################################################
608INFO] ------TARGET info------
609[*] TARGET: http://worldranch.co.jp/
610[*] TARGET IP: 60.43.151.164
611[INFO] NO load balancer detected for worldranch.co.jp...
612[*] DNS servers: ns-231.dns.jp-e1.cloudn-service.com.
613[*] TARGET server: Apache/2.2.15 (CentOS)
614[*] CC: JP
615[*] Country: Japan
616[*] RegionCode: 13
617[*] RegionName: Tokyo
618[*] City: Chiyoda
619[*] ASN: AS4713
620[*] BGP_PREFIX: 60.32.0.0/12
621[*] ISP: OCN NTT Communications Corporation, JP
622[INFO] DNS enumeration:
623[*] ftp.worldranch.co.jp worldranch.co.jp. 60.43.151.164
624[*] mail.worldranch.co.jp worldranch.co.jp. 60.43.151.164
625[*] news.worldranch.co.jp worldranch.co.jp. 60.43.151.164
626[INFO] Possible abuse mails are:
627[*] abuse@ocn.ad.jp
628[*] abuse@worldranch.co.jp
629[INFO] NO PAC (Proxy Auto Configuration) file FOUND
630[ALERT] robots.txt file FOUND in http://worldranch.co.jp/robots.txt
631[INFO] Checking for HTTP status codes recursively from http://worldranch.co.jp/robots.txt
632[INFO] Status code Folders
633[INFO] Starting FUZZing in http://worldranch.co.jp/FUzZzZzZzZz...
634[INFO] Status code Folders
635[ALERT] Look in the source code. It may contain passwords
636[INFO] Links found from http://worldranch.co.jp/ http://60.43.151.164/:
637[*] http://accountpage.line.me/iqq2531p
638[*] http://ichinoyu.jp/
639[*] https://twitter.com/worldranch
640[*] https://www.facebook.com/worldranch
641[*] https://www.facebook.com/worldranch.japan/
642[*] https://www.instagram.com/dolphin_whale_/
643[*] https://www.tripadvisor.jp/
644[*] http://worldpetreien.jp/
645[*] http://worldranch.co.jp/contents/2019_autumn_festival.html
646[*] http://worldranch.co.jp/contents/about.html
647[*] http://worldranch.co.jp/contents/access.html
648[*] http://worldranch.co.jp/contents/animals.html
649[*] http://worldranch.co.jp/contents/bbq-garden.html
650[*] http://worldranch.co.jp/contents/bbq.html
651[*] http://worldranch.co.jp/contents/bird_house.html
652[*] http://worldranch.co.jp/contents/bird_of_prey.html
653[*] http://worldranch.co.jp/contents/capybara-baby2.html
654[*] http://worldranch.co.jp/contents/capybara_touch.html
655[*] http://worldranch.co.jp/contents/cat-house.html
656[*] http://worldranch.co.jp/contents/character.html
657[*] http://worldranch.co.jp/contents/contact.html
658[*] http://worldranch.co.jp/contents/dantai.html
659[*] http://worldranch.co.jp/contents/dog-corner.html
660[*] http://worldranch.co.jp/contents/dog-rental.html
661[*] http://worldranch.co.jp/contents/dog_stay.html
662[*] http://worldranch.co.jp/contents/dolphin-touch.html
663[*] http://worldranch.co.jp/contents/eat.html
664[*] http://worldranch.co.jp/contents/ecofeed.html
665[*] http://worldranch.co.jp/contents/enjoy.html
666[*] http://worldranch.co.jp/contents/experience.html
667[*] http://worldranch.co.jp/contents/faq.html
668[*] http://worldranch.co.jp/contents/food-court.html
669[*] http://worldranch.co.jp/contents/garden-wedding.html
670[*] http://worldranch.co.jp/contents/goat-walk.html
671[*] http://worldranch.co.jp/contents/guide.html
672[*] http://worldranch.co.jp/contents/halloween_2019.html
673[*] http://worldranch.co.jp/contents/horse-walk.html
674[*] http://worldranch.co.jp/contents/jingisukan.html
675[*] http://worldranch.co.jp/contents/kensyu.html
676[*] http://worldranch.co.jp/contents/mediainfo.html
677[*] http://worldranch.co.jp/contents/news.html
678[*] http://worldranch.co.jp/contents/nighter2019.html
679[*] http://worldranch.co.jp/contents/observatory.html
680[*] http://worldranch.co.jp/contents/pasture.html
681[*] http://worldranch.co.jp/contents/pelchelon.html
682[*] http://worldranch.co.jp/contents/pony-square.html
683[*] http://worldranch.co.jp/contents/price.html
684[*] http://worldranch.co.jp/contents/privacy.html
685[*] http://worldranch.co.jp/contents/rabbit-walk.html
686[*] http://worldranch.co.jp/contents/recruit.html
687[*] http://worldranch.co.jp/contents/schedule.html
688[*] http://worldranch.co.jp/contents/shopping.html
689[*] http://worldranch.co.jp/contents/sitemap.html
690[*] http://worldranch.co.jp/contents/small-animals.html
691[*] http://worldranch.co.jp/contents/sushi.html
692[*] http://worldranch.co.jp/contents/taihi.html
693[*] http://worldranch.co.jp/contents/wan-nyan-day.html
694[*] http://worldranch.co.jp/contents/wood_chips.html
695[*] http://worldranch.co.jp/images/weekendsale_20191004-1006.jpg
696[*] http://worldranch.co.jp/index.html
697[*] http://worldranch.co.jp/#Map
698[*] http://worldranch.co.jp/#top
699[*] http://www.wcgc.co.jp/
700[*] http://www.worldranch.co.jp/
701[*] http://www.worldranch.co.jp/cat_house/
702[*] http://www.worldranch.co.jp/construction/
703[*] http://www.worldranch.co.jp/dog_corner/
704[*] http://www.worldranch.co.jp/dog_corner/satooya.html
705[*] http://www.worldranch.co.jp/eco-weeding/
706[*] http://www.worldranch.co.jp/hikitori/
707[*] http://www.worldranch.co.jp/petsale/
708[*] http://www.worldranch.co.jp/petsale/index.html#sec1
709[*] http://www.worldranch.co.jp/stay/
710[*] http://www.worldranch.co.jp/WRHC/
711[*] http://www.worldranch.co.jp/zoo/
712[INFO] GOOGLE has 76,900 results (0.30 seconds) about http://worldranch.co.jp/
713[INFO] BING shows 60.43.151.164 is shared with 44 hosts/vhosts
714[INFO] Shodan detected the following opened ports on 60.43.151.164:
715[*] 1
716[*] 110
717[*] 143
718[*] 21
719[*] 25
720[*] 4
721[*] 443
722[*] 587
723[*] 80
724[*] 8403
725[*] 993
726[*] 995
727[INFO] ------VirusTotal SECTION------
728[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
729[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
730[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
731[INFO] ------Alexa Rank SECTION------
732[INFO] Percent of Visitors Rank in Country:
733[INFO] Percent of Search Traffic:
734[INFO] Percent of Unique Visits:
735[INFO] Total Sites Linking In:
736[*] Total Sites
737[INFO] Useful links related to worldranch.co.jp - 60.43.151.164:
738[*] https://www.virustotal.com/pt/ip-address/60.43.151.164/information/
739[*] https://www.hybrid-analysis.com/search?host=60.43.151.164
740[*] https://www.shodan.io/host/60.43.151.164
741[*] https://www.senderbase.org/lookup/?search_string=60.43.151.164
742[*] https://www.alienvault.com/open-threat-exchange/ip/60.43.151.164
743[*] http://pastebin.com/search?q=60.43.151.164
744[*] http://urlquery.net/search.php?q=60.43.151.164
745[*] http://www.alexa.com/siteinfo/worldranch.co.jp
746[*] http://www.google.com/safebrowsing/diagnostic?site=worldranch.co.jp
747[*] https://censys.io/ipv4/60.43.151.164
748[*] https://www.abuseipdb.com/check/60.43.151.164
749[*] https://urlscan.io/search/#60.43.151.164
750[*] https://github.com/search?q=60.43.151.164&type=Code
751[INFO] Useful links related to AS4713 - 60.32.0.0/12:
752[*] http://www.google.com/safebrowsing/diagnostic?site=AS:4713
753[*] https://www.senderbase.org/lookup/?search_string=60.32.0.0/12
754[*] http://bgp.he.net/AS4713
755[*] https://stat.ripe.net/AS4713
756[INFO] Date: 05/10/19 | Time: 12:09:08
757[INFO] Total time: 1 minute(s) and 0 second(s)
758#######################################################################################################################################
759[*] Load target domain: worldranch.co.jp
760 - starting scanning @ 2019-10-05 12:08:05
761
762[+] Running & Checking source to be used
763---------------------------------------------
764
765 ⍥ Shodan [ ✕ ]
766 ⍥ Webarchive [ ✔ ]
767 ⍥ Dnsdumpster [ ✔ ]
768 ⍥ Certspotter [ ✔ ]
769 ⍥ Certsh [ ✔ ]
770 ⍥ Bufferover [ ✔ ]
771 ⍥ Threatminer [ ✔ ]
772 ⍥ Censys [ ✕ ]
773 ⍥ Securitytrails [ ✕ ]
774 ⍥ Entrust [ ✔ ]
775 ⍥ Riddler [ ✔ ]
776 ⍥ Threatcrowd [ ✔ ]
777 ⍥ Hackertarget [ ✔ ]
778 ⍥ Binaryedge [ ✕ ]
779 ⍥ Virustotal [ ✕ ]
780 ⍥ Findsubdomain [ ✔ ]
781
782[+] Get & Count subdomain total From source
783---------------------------------------------
784
785 ⍥ Hackertarget: Total Subdomain (1)
786 ⍥ Findsubdomain: Total Subdomain (1)
787 ⍥ Certspotter: Total Subdomain (0)
788 ⍥ Threatminer: Total Subdomain (0)
789 ⍥ Certsh: Total Subdomain (0)
790 ⍥ BufferOver: Total Subdomain (1)
791 ⍥ Entrust: Total Subdomain (0)
792 ⍥ Threatcrowd: Total Subdomain (1)
793 ⍥ Dnsdumpster: Total Subdomain (6)
794 ⍥ Riddler: Total Subdomain (2)
795 ⍥ Webarchive: Total Subdomain (1)
796
797[+] Parsing & Sorting list Domain
798---------------------------------------------
799
800 ⍥ Total [2]
801
802 - worldranch.co.jp
803 - www.worldranch.co.jp
804
805 ⍥ Total [2]
806
807[+] Probe subdomain for working on http/https
808---------------------------------------------
809
810 - http://worldranch.co.jp
811 - http://www.worldranch.co.jp
812 - https://www.worldranch.co.jp
813 - https://worldranch.co.jp
814
815 ⍥ Total [4]
816
817
818[+] Check Live Host: Ping Sweep - ICMP PING
819---------------------------------------------
820
821 ⍥ [LIVE] worldranch.co.jp
822 ⍥ [LIVE] www.worldranch.co.jp
823
824[+] Check Resolving: Subdomains & Domains
825---------------------------------------------
826
827 ⍥ Resolving domains to: 60.43.151.164
828 ⍥ Resolving domains to: 60.43.151.164
829
830[+] Subdomain TakeOver - Check Possible Vulns
831---------------------------------------------
832
833 ⍥ [FAILS] En: Unknown http://worldranch.co.jp
834 ⍥ [FAILS] En: Unknown http://www.worldranch.co.jp
835 ⍥ [FAILS] En: Unknown https://www.worldranch.co.jp
836 ⍥ [FAILS] En: Unknown https://worldranch.co.jp
837
838[+] Checks status code on port 80 and 443
839---------------------------------------------
840
841 ⍥ [200] http://worldranch.co.jp
842 ⍥ [200] http://www.worldranch.co.jp
843 ⍥ [000] https://www.worldranch.co.jp
844 ⍥ [000] https://worldranch.co.jp
845
846[+] Web Screenshots: from domain list
847---------------------------------------------
848
849 https://www.worldranch.co.jp:443
850 https://worldranch.co.jp:443
851
852[+] Generate Reports: Make report into HTML
853---------------------------------------------
854
855 ⍥ Make template for reports
856 - output/10-05-2019/worldranch.co.jp/reports
857
858 ⍥ Successful Created ..
859
860[+] Sud⍥my has been sucessfully completed
861---------------------------------------------
862
863 ⍥ Location output:
864 - output/10-05-2019/worldranch.co.jp
865 - output/10-05-2019/worldranch.co.jp/report
866 - output/10-05-2019/worldranch.co.jp/screenshots
867
868#######################################################################################################################################
869Trying "worldranch.co.jp"
870;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21446
871;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 3, ADDITIONAL: 0
872
873;; QUESTION SECTION:
874;worldranch.co.jp. IN ANY
875
876;; ANSWER SECTION:
877worldranch.co.jp. 3600 IN TXT "v=spf1 +a include:_spf.mwprem.net ~all"
878worldranch.co.jp. 60 IN SOA ns-231.dns.jp-e1.cloudn-service.com. root.cloudn2.net. 1 7200 900 1209600 86400
879worldranch.co.jp. 3600 IN MX 10 mwpremgw1.ocn.ad.jp.
880worldranch.co.jp. 3600 IN MX 10 mwpremgw2.ocn.ad.jp.
881worldranch.co.jp. 3600 IN A 60.43.151.164
882worldranch.co.jp. 60 IN NS ns-233.dns.us-e1.cloudn-service.com.
883worldranch.co.jp. 60 IN NS ns-232.dns.jp-w1.cloudn-service.com.
884worldranch.co.jp. 60 IN NS ns-231.dns.jp-e1.cloudn-service.com.
885
886;; AUTHORITY SECTION:
887worldranch.co.jp. 60 IN NS ns-231.dns.jp-e1.cloudn-service.com.
888worldranch.co.jp. 60 IN NS ns-232.dns.jp-w1.cloudn-service.com.
889worldranch.co.jp. 60 IN NS ns-233.dns.us-e1.cloudn-service.com.
890
891Received 365 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 251 ms
892#######################################################################################################################################
893[*] Performing General Enumeration of Domain: worldranch.co.jp
894[-] DNSSEC is not configured for worldranch.co.jp
895[*] SOA ns-231.dns.jp-e1.cloudn-service.com 153.128.30.218
896[*] NS ns-232.dns.jp-w1.cloudn-service.com 153.149.98.174
897[*] Bind Version for 153.149.98.174 UNKNOWN
898[*] NS ns-233.dns.us-e1.cloudn-service.com 153.149.153.165
899[*] Bind Version for 153.149.153.165 UNKNOWN
900[*] NS ns-231.dns.jp-e1.cloudn-service.com 153.128.30.218
901[*] Bind Version for 153.128.30.218 UNKNOWN
902[*] MX mwpremgw2.ocn.ad.jp 153.149.229.89
903[*] MX mwpremgw2.ocn.ad.jp 153.149.229.72
904[*] MX mwpremgw2.ocn.ad.jp 153.149.229.87
905[*] MX mwpremgw2.ocn.ad.jp 153.149.229.75
906[*] MX mwpremgw2.ocn.ad.jp 153.149.229.77
907[*] MX mwpremgw2.ocn.ad.jp 153.149.229.84
908[*] MX mwpremgw2.ocn.ad.jp 153.149.229.88
909[*] MX mwpremgw2.ocn.ad.jp 153.149.229.74
910[*] MX mwpremgw2.ocn.ad.jp 153.149.229.86
911[*] MX mwpremgw2.ocn.ad.jp 153.149.229.73
912[*] MX mwpremgw2.ocn.ad.jp 153.149.229.85
913[*] MX mwpremgw2.ocn.ad.jp 153.149.229.76
914[*] MX mwpremgw1.ocn.ad.jp 153.149.229.87
915[*] MX mwpremgw1.ocn.ad.jp 153.149.229.88
916[*] MX mwpremgw1.ocn.ad.jp 153.149.229.77
917[*] MX mwpremgw1.ocn.ad.jp 153.149.229.76
918[*] MX mwpremgw1.ocn.ad.jp 153.149.229.89
919[*] MX mwpremgw1.ocn.ad.jp 153.149.229.73
920[*] MX mwpremgw1.ocn.ad.jp 153.149.229.85
921[*] MX mwpremgw1.ocn.ad.jp 153.149.229.72
922[*] MX mwpremgw1.ocn.ad.jp 153.149.229.84
923[*] MX mwpremgw1.ocn.ad.jp 153.149.229.86
924[*] MX mwpremgw1.ocn.ad.jp 153.149.229.74
925[*] MX mwpremgw1.ocn.ad.jp 153.149.229.75
926[*] A worldranch.co.jp 60.43.151.164
927[*] TXT worldranch.co.jp v=spf1 +a include:_spf.mwprem.net ~all
928[*] Enumerating SRV Records
929[-] No SRV Records Found for worldranch.co.jp
930[+] 0 Records Found
931#######################################################################################################################################
932
933
934 AVAILABLE PLUGINS
935 -----------------
936
937 RobotPlugin
938 OpenSslCipherSuitesPlugin
939 HttpHeadersPlugin
940 CompressionPlugin
941 FallbackScsvPlugin
942 SessionRenegotiationPlugin
943 OpenSslCcsInjectionPlugin
944 SessionResumptionPlugin
945 EarlyDataPlugin
946 HeartbleedPlugin
947 CertificateInfoPlugin
948
949
950
951 CHECKING HOST(S) AVAILABILITY
952 -----------------------------
953
954 60.43.151.164:443 => 60.43.151.164
955
956
957
958
959 SCAN RESULTS FOR 60.43.151.164:443 - 60.43.151.164
960 --------------------------------------------------
961
962 * TLSV1_1 Cipher Suites:
963 Forward Secrecy OK - Supported
964 RC4 OK - Not Supported
965
966 Preferred:
967 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
968 Accepted:
969 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
970 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
971 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
972 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
973 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
974 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
975 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
976 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
977 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
978 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
979
980 * TLSV1 Cipher Suites:
981 Forward Secrecy OK - Supported
982 RC4 OK - Not Supported
983
984 Preferred:
985 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
986 Accepted:
987 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
988 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
989 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
990 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
991 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
992 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
993 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
994 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
995 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
996 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
997
998 * Downgrade Attacks:
999 TLS_FALLBACK_SCSV: OK - Supported
1000
1001 * Deflate Compression:
1002 OK - Compression disabled
1003
1004 * TLS 1.2 Session Resumption Support:
1005 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
1006 With TLS Tickets: OK - Supported
1007
1008 * TLSV1_2 Cipher Suites:
1009 Forward Secrecy OK - Supported
1010 RC4 OK - Not Supported
1011
1012 Preferred:
1013 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
1014 Accepted:
1015 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
1016 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
1017 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
1018 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
1019 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
1020 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
1021 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
1022 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
1023 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
1024 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
1025 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
1026 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
1027 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
1028 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
1029 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
1030 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
1031 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
1032 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
1033 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
1034
1035 * Certificate Information:
1036 Content
1037 SHA1 Fingerprint: 171e06803eaed675200a2cb140b05538fcca5b4b
1038 Common Name: *.mwprem.net
1039 Issuer: JPRS Domain Validation Authority - G2
1040 Serial Number: 1627312325976118378
1041 Not Before: 2019-03-11 00:50:20
1042 Not After: 2021-03-31 14:59:59
1043 Signature Algorithm: sha256
1044 Public Key Algorithm: RSA
1045 Key Size: 2048
1046 Exponent: 65537 (0x10001)
1047 DNS Subject Alternative Names: ['*.mwprem.net', 'mwprem.net']
1048
1049 Trust
1050 Hostname Validation: FAILED - Certificate does NOT match 60.43.151.164
1051 Android CA Store (9.0.0_r9): OK - Certificate is trusted
1052 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
1053 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
1054 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
1055 Windows CA Store (2019-05-27): OK - Certificate is trusted
1056 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
1057 Received Chain: *.mwprem.net --> JPRS Domain Validation Authority - G2
1058 Verified Chain: *.mwprem.net --> JPRS Domain Validation Authority - G2 --> countryName=JP, organizationName=SECOM Trust Systems CO.,LTD., organizationalUnitName=Security Communication RootCA2
1059 Received Chain Contains Anchor: OK - Anchor certificate not sent
1060 Received Chain Order: OK - Order is valid
1061 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
1062
1063 Extensions
1064 OCSP Must-Staple: NOT SUPPORTED - Extension not found
1065 Certificate Transparency: OK - 3 SCTs included
1066
1067 OCSP Stapling
1068 NOT SUPPORTED - Server did not send back an OCSP response
1069
1070 * OpenSSL CCS Injection:
1071 OK - Not vulnerable to OpenSSL CCS injection
1072
1073 * SSLV2 Cipher Suites:
1074 Server rejected all cipher suites.
1075
1076 * Session Renegotiation:
1077 Client-initiated Renegotiation: OK - Rejected
1078 Secure Renegotiation: OK - Supported
1079
1080 * OpenSSL Heartbleed:
1081 OK - Not vulnerable to Heartbleed
1082
1083 * SSLV3 Cipher Suites:
1084 Server rejected all cipher suites.
1085
1086 * TLSV1_3 Cipher Suites:
1087 Server rejected all cipher suites.
1088
1089 * ROBOT Attack:
1090 OK - Not vulnerable
1091
1092
1093 SCAN COMPLETED IN 23.44 S
1094 -------------------------
1095#######################################################################################################################################
1096Domains still to check: 1
1097 Checking if the hostname worldranch.co.jp. given is in fact a domain...
1098
1099Analyzing domain: worldranch.co.jp.
1100 Checking NameServers using system default resolver...
1101 IP: 153.149.98.174 (Japan)
1102 HostName: ns-232.dns.jp-w1.cloudn-service.com Type: NS
1103 HostName: 153-149-98-174.compute.jp-w1.cloudn-service.com Type: PTR
1104 IP: 153.149.153.165 (Japan)
1105 HostName: ns-233.dns.us-e1.cloudn-service.com Type: NS
1106 HostName: 153-149-153-165.compute.jp-e1.cloudn-service.com Type: PTR
1107 IP: 153.128.30.218 (Japan)
1108 HostName: ns-231.dns.jp-e1.cloudn-service.com Type: NS
1109 HostName: 153-128-30-218.compute.jp-e1.cloudn-service.com Type: PTR
1110
1111 Checking MailServers using system default resolver...
1112 IP: 153.149.229.89 (Japan)
1113 HostName: mwpremgw2.ocn.ad.jp Type: MX
1114 HostName: ofmgw0253.ocn.ad.jp Type: PTR
1115 IP: 153.149.229.72 (Japan)
1116 HostName: mwpremgw2.ocn.ad.jp Type: MX
1117 HostName: ofmgw023.ocn.ad.jp Type: PTR
1118 IP: 153.149.229.87 (Japan)
1119 HostName: mwpremgw2.ocn.ad.jp Type: MX
1120 HostName: ofmgw0243.ocn.ad.jp Type: PTR
1121 IP: 153.149.229.75 (Japan)
1122 HostName: mwpremgw2.ocn.ad.jp Type: MX
1123 HostName: ofmgw0241.ocn.ad.jp Type: PTR
1124 IP: 153.149.229.77 (Japan)
1125 HostName: mwpremgw2.ocn.ad.jp Type: MX
1126 HostName: ofmgw0251.ocn.ad.jp Type: PTR
1127 IP: 153.149.229.84 (Japan)
1128 HostName: mwpremgw2.ocn.ad.jp Type: MX
1129 HostName: ofmgw0232.ocn.ad.jp Type: PTR
1130 IP: 153.149.229.88 (Japan)
1131 HostName: mwpremgw2.ocn.ad.jp Type: MX
1132 HostName: ofmgw0252.ocn.ad.jp Type: PTR
1133 IP: 153.149.229.74 (Japan)
1134 HostName: mwpremgw2.ocn.ad.jp Type: MX
1135 HostName: ofmgw024.ocn.ad.jp Type: PTR
1136 IP: 153.149.229.86 (Japan)
1137 HostName: mwpremgw2.ocn.ad.jp Type: MX
1138 HostName: ofmgw0242.ocn.ad.jp Type: PTR
1139 IP: 153.149.229.73 (Japan)
1140 HostName: mwpremgw2.ocn.ad.jp Type: MX
1141 HostName: ofmgw0231.ocn.ad.jp Type: PTR
1142 IP: 153.149.229.85 (Japan)
1143 HostName: mwpremgw2.ocn.ad.jp Type: MX
1144 HostName: ofmgw0233.ocn.ad.jp Type: PTR
1145 IP: 153.149.229.76 (Japan)
1146 HostName: mwpremgw2.ocn.ad.jp Type: MX
1147 HostName: ofmgw025.ocn.ad.jp Type: PTR
1148 IP: 153.149.229.87 (Japan)
1149 HostName: mwpremgw2.ocn.ad.jp Type: MX
1150 HostName: ofmgw0243.ocn.ad.jp Type: PTR
1151 HostName: mwpremgw1.ocn.ad.jp Type: MX
1152 IP: 153.149.229.88 (Japan)
1153 HostName: mwpremgw2.ocn.ad.jp Type: MX
1154 HostName: ofmgw0252.ocn.ad.jp Type: PTR
1155 HostName: mwpremgw1.ocn.ad.jp Type: MX
1156 IP: 153.149.229.77 (Japan)
1157 HostName: mwpremgw2.ocn.ad.jp Type: MX
1158 HostName: ofmgw0251.ocn.ad.jp Type: PTR
1159 HostName: mwpremgw1.ocn.ad.jp Type: MX
1160 IP: 153.149.229.76 (Japan)
1161 HostName: mwpremgw2.ocn.ad.jp Type: MX
1162 HostName: ofmgw025.ocn.ad.jp Type: PTR
1163 HostName: mwpremgw1.ocn.ad.jp Type: MX
1164 IP: 153.149.229.89 (Japan)
1165 HostName: mwpremgw2.ocn.ad.jp Type: MX
1166 HostName: ofmgw0253.ocn.ad.jp Type: PTR
1167 HostName: mwpremgw1.ocn.ad.jp Type: MX
1168 IP: 153.149.229.73 (Japan)
1169 HostName: mwpremgw2.ocn.ad.jp Type: MX
1170 HostName: ofmgw0231.ocn.ad.jp Type: PTR
1171 HostName: mwpremgw1.ocn.ad.jp Type: MX
1172 IP: 153.149.229.85 (Japan)
1173 HostName: mwpremgw2.ocn.ad.jp Type: MX
1174 HostName: ofmgw0233.ocn.ad.jp Type: PTR
1175 HostName: mwpremgw1.ocn.ad.jp Type: MX
1176 IP: 153.149.229.72 (Japan)
1177 HostName: mwpremgw2.ocn.ad.jp Type: MX
1178 HostName: ofmgw023.ocn.ad.jp Type: PTR
1179 HostName: mwpremgw1.ocn.ad.jp Type: MX
1180 IP: 153.149.229.84 (Japan)
1181 HostName: mwpremgw2.ocn.ad.jp Type: MX
1182 HostName: ofmgw0232.ocn.ad.jp Type: PTR
1183 HostName: mwpremgw1.ocn.ad.jp Type: MX
1184 IP: 153.149.229.86 (Japan)
1185 HostName: mwpremgw2.ocn.ad.jp Type: MX
1186 HostName: ofmgw0242.ocn.ad.jp Type: PTR
1187 HostName: mwpremgw1.ocn.ad.jp Type: MX
1188 IP: 153.149.229.74 (Japan)
1189 HostName: mwpremgw2.ocn.ad.jp Type: MX
1190 HostName: ofmgw024.ocn.ad.jp Type: PTR
1191 HostName: mwpremgw1.ocn.ad.jp Type: MX
1192 IP: 153.149.229.75 (Japan)
1193 HostName: mwpremgw2.ocn.ad.jp Type: MX
1194 HostName: ofmgw0241.ocn.ad.jp Type: PTR
1195 HostName: mwpremgw1.ocn.ad.jp Type: MX
1196
1197 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1198 No zone transfer found on nameserver 153.128.30.218
1199 No zone transfer found on nameserver 153.149.153.165
1200 No zone transfer found on nameserver 153.149.98.174
1201
1202 Checking SPF record...
1203
1204 Checking SPF record...
1205 New IP found: 118.23.109.200
1206 New IP found: 118.23.109.214
1207 New IP found: 118.23.108.200
1208 New IP found: 118.23.108.203
1209
1210 Checking SPF record...
1211 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 210.153.89.32/28, but only the network IP
1212 New IP found: 210.153.89.32
1213 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 210.136.55.0/26, but only the network IP
1214 New IP found: 210.136.55.0
1215 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 210.136.55.192/26, but only the network IP
1216 New IP found: 210.136.55.192
1217 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 210.136.104.64/26, but only the network IP
1218 New IP found: 210.136.104.64
1219 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 210.136.104.0/28, but only the network IP
1220 New IP found: 210.136.104.0
1221 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 219.101.46.208/28, but only the network IP
1222 New IP found: 219.101.46.208
1223 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 203.82.149.128/26, but only the network IP
1224 New IP found: 203.82.149.128
1225
1226 Checking SPF record...
1227 No SPF record
1228
1229 Checking 192 most common hostnames using system default resolver...
1230 IP: 60.43.151.164 (Japan)
1231 HostName: www.worldranch.co.jp. Type: A
1232 IP: 60.43.151.164 (Japan)
1233 HostName: www.worldranch.co.jp. Type: A
1234 HostName: ftp.worldranch.co.jp. Type: A
1235 HostName: c15t2a7n.mwprem.net Type: PTR
1236 IP: 60.43.151.164 (Japan)
1237 HostName: www.worldranch.co.jp. Type: A
1238 HostName: ftp.worldranch.co.jp. Type: A
1239 HostName: c15t2a7n.mwprem.net Type: PTR
1240 HostName: mail.worldranch.co.jp. Type: A
1241 IP: 60.43.151.164 (Japan)
1242 HostName: www.worldranch.co.jp. Type: A
1243 HostName: ftp.worldranch.co.jp. Type: A
1244 HostName: c15t2a7n.mwprem.net Type: PTR
1245 HostName: mail.worldranch.co.jp. Type: A
1246 HostName: smtp.worldranch.co.jp. Type: A
1247 IP: 60.43.151.164 (Japan)
1248 HostName: www.worldranch.co.jp. Type: A
1249 HostName: ftp.worldranch.co.jp. Type: A
1250 HostName: c15t2a7n.mwprem.net Type: PTR
1251 HostName: mail.worldranch.co.jp. Type: A
1252 HostName: smtp.worldranch.co.jp. Type: A
1253 HostName: pop.worldranch.co.jp. Type: A
1254 IP: 60.43.151.164 (Japan)
1255 HostName: www.worldranch.co.jp. Type: A
1256 HostName: ftp.worldranch.co.jp. Type: A
1257 HostName: c15t2a7n.mwprem.net Type: PTR
1258 HostName: mail.worldranch.co.jp. Type: A
1259 HostName: smtp.worldranch.co.jp. Type: A
1260 HostName: pop.worldranch.co.jp. Type: A
1261 HostName: imap.worldranch.co.jp. Type: A
1262
1263 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1264 Checking netblock 153.149.229.0
1265 Checking netblock 210.153.89.0
1266 Checking netblock 203.82.149.0
1267 Checking netblock 153.128.30.0
1268 Checking netblock 118.23.109.0
1269 Checking netblock 118.23.108.0
1270 Checking netblock 210.136.55.0
1271 Checking netblock 210.136.104.0
1272 Checking netblock 60.43.151.0
1273 Checking netblock 153.149.153.0
1274 Checking netblock 153.149.98.0
1275 Checking netblock 219.101.46.0
1276
1277 Searching for worldranch.co.jp. emails in Google
1278 totsukawa@worldranch.co.jp&
1279 info@worldranch.co.jp
1280 p_reien@worldranch.co.jp.
1281 info@worldranch.co.jp)
1282
1283 Checking 27 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1284 Host 153.149.229.75 is up (reset ttl 64)
1285 Host 153.149.229.74 is up (reset ttl 64)
1286 Host 153.149.229.77 is up (reset ttl 64)
1287 Host 153.149.229.76 is up (reset ttl 64)
1288 Host 153.149.229.73 is up (reset ttl 64)
1289 Host 153.149.229.72 is up (reset ttl 64)
1290 Host 210.153.89.32 is up (reset ttl 64)
1291 Host 203.82.149.128 is up (reset ttl 64)
1292 Host 153.128.30.218 is up (reset ttl 64)
1293 Host 153.149.229.84 is up (reset ttl 64)
1294 Host 153.149.229.85 is up (reset ttl 64)
1295 Host 153.149.229.86 is up (reset ttl 64)
1296 Host 153.149.229.87 is up (reset ttl 64)
1297 Host 153.149.229.88 is up (reset ttl 64)
1298 Host 153.149.229.89 is up (reset ttl 64)
1299 Host 118.23.109.214 is up (reset ttl 64)
1300 Host 118.23.108.200 is up (reset ttl 64)
1301 Host 118.23.108.203 is up (reset ttl 64)
1302 Host 210.136.55.0 is up (reset ttl 64)
1303 Host 210.136.104.0 is up (reset ttl 64)
1304 Host 60.43.151.164 is up (reset ttl 64)
1305 Host 153.149.153.165 is up (reset ttl 64)
1306 Host 153.149.98.174 is up (reset ttl 64)
1307 Host 219.101.46.208 is up (reset ttl 64)
1308 Host 210.136.104.64 is up (reset ttl 64)
1309 Host 210.136.55.192 is up (reset ttl 64)
1310 Host 118.23.109.200 is up (reset ttl 64)
1311
1312 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1313 Scanning ip 153.149.229.75 (mwpremgw1.ocn.ad.jp):
1314 Scanning ip 153.149.229.74 (mwpremgw1.ocn.ad.jp):
1315 Scanning ip 153.149.229.77 (mwpremgw1.ocn.ad.jp):
1316 Scanning ip 153.149.229.76 (mwpremgw1.ocn.ad.jp):
1317 Scanning ip 153.149.229.73 (mwpremgw1.ocn.ad.jp):
1318 Scanning ip 153.149.229.72 (mwpremgw1.ocn.ad.jp):
1319 Scanning ip 210.153.89.32 ():
1320 Scanning ip 203.82.149.128 ():
1321 Scanning ip 153.128.30.218 (153-128-30-218.compute.jp-e1.cloudn-service.com (PTR)):
1322 53/tcp open domain syn-ack ttl 41 (unknown banner: UNKNOWN)
1323 | dns-nsid:
1324 |_ bind.version: UNKNOWN
1325 | fingerprint-strings:
1326 | DNSVersionBindReqTCP:
1327 | version
1328 | bind
1329 |_ UNKNOWN
1330 Scanning ip 153.149.229.84 (mwpremgw1.ocn.ad.jp):
1331 Scanning ip 153.149.229.85 (mwpremgw1.ocn.ad.jp):
1332 Scanning ip 153.149.229.86 (mwpremgw1.ocn.ad.jp):
1333 Scanning ip 153.149.229.87 (mwpremgw1.ocn.ad.jp):
1334 Scanning ip 153.149.229.88 (mwpremgw1.ocn.ad.jp):
1335 Scanning ip 153.149.229.89 (mwpremgw1.ocn.ad.jp):
1336 Scanning ip 118.23.109.214 ():
1337 Scanning ip 118.23.108.200 ():
1338 Scanning ip 118.23.108.203 ():
1339 Scanning ip 210.136.55.0 ():
1340 Scanning ip 210.136.104.0 ():
1341 Scanning ip 60.43.151.164 (imap.worldranch.co.jp.):
1342 21/tcp open ftp syn-ack ttl 41 vsftpd 2.2.2
1343 | ssl-cert: Subject: commonName=*.mwprem.net
1344 | Subject Alternative Name: DNS:*.mwprem.net, DNS:mwprem.net
1345 | Issuer: commonName=JPRS Domain Validation Authority - G2/organizationName=Japan Registry Services Co., Ltd./countryName=JP
1346 | Public Key type: rsa
1347 | Public Key bits: 2048
1348 | Signature Algorithm: sha256WithRSAEncryption
1349 | Not valid before: 2019-03-11T00:50:20
1350 | Not valid after: 2021-03-31T14:59:59
1351 | MD5: 8b77 5c57 08ea b51c e2d0 b593 124c 0840
1352 |_SHA-1: 171e 0680 3eae d675 200a 2cb1 40b0 5538 fcca 5b4b
1353 |_ssl-date: 2019-10-05T16:25:10+00:00; -2s from scanner time.
1354 80/tcp open http syn-ack ttl 41 Apache httpd 2.2.15 ((CentOS))
1355 | http-methods:
1356 | Supported Methods: GET HEAD POST OPTIONS TRACE
1357 |_ Potentially risky methods: TRACE
1358 |_http-server-header: Apache/2.2.15 (CentOS)
1359 |_http-title: New Server -- DOMAINNAME
1360 110/tcp open pop3 syn-ack ttl 41 Dovecot pop3d
1361 143/tcp open imap syn-ack ttl 40 Dovecot imapd
1362 443/tcp open ssl/https? syn-ack ttl 41
1363 |_ssl-date: 2019-10-05T16:25:06+00:00; -3s from scanner time.
1364 587/tcp open smtp syn-ack ttl 40 Postfix smtpd
1365 |_smtp-commands: c15t2a7n.mwprem.net, PIPELINING, SIZE 31457280, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
1366 |_ssl-date: 2019-10-05T16:25:12+00:00; -2s from scanner time.
1367 993/tcp open ssl/imaps? syn-ack ttl 40
1368 995/tcp open ssl/pop3s? syn-ack ttl 41
1369 Device type: general purpose|storage-misc|broadband router|router|WAP|media device
1370 Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Infomir embedded (87%), Ubiquiti embedded (87%)
1371 OS Info: Service Info: Host: c15t2a7n.mwprem.net; OS: Unix
1372 |_clock-skew: mean: -2s, deviation: 0s, median: -2s
1373 Scanning ip 153.149.153.165 (153-149-153-165.compute.jp-e1.cloudn-service.com (PTR)):
1374 Scanning ip 153.149.98.174 (153-149-98-174.compute.jp-w1.cloudn-service.com (PTR)):
1375 53/tcp open domain syn-ack ttl 42 (unknown banner: UNKNOWN)
1376 | dns-nsid:
1377 |_ bind.version: UNKNOWN
1378 | fingerprint-strings:
1379 | DNSVersionBindReqTCP:
1380 | version
1381 | bind
1382 |_ UNKNOWN
1383 Scanning ip 219.101.46.208 ():
1384 Scanning ip 210.136.104.64 ():
1385 Scanning ip 210.136.55.192 ():
1386 Scanning ip 118.23.109.200 ():
1387 WebCrawling domain's web servers... up to 50 max links.
1388
1389 + URL to crawl: http://mail.worldranch.co.jp.
1390 + Date: 2019-10-05
1391
1392 + Crawling URL: http://mail.worldranch.co.jp.:
1393 + Links:
1394 + Crawling http://mail.worldranch.co.jp.
1395 + Searching for directories...
1396 + Searching open folders...
1397
1398
1399 + URL to crawl: http://smtp.worldranch.co.jp.
1400 + Date: 2019-10-05
1401
1402 + Crawling URL: http://smtp.worldranch.co.jp.:
1403 + Links:
1404 + Crawling http://smtp.worldranch.co.jp.
1405 + Searching for directories...
1406 + Searching open folders...
1407
1408
1409 + URL to crawl: http://ftp.worldranch.co.jp.
1410 + Date: 2019-10-05
1411
1412 + Crawling URL: http://ftp.worldranch.co.jp.:
1413 + Links:
1414 + Crawling http://ftp.worldranch.co.jp.
1415 + Searching for directories...
1416 + Searching open folders...
1417
1418
1419 + URL to crawl: http://imap.worldranch.co.jp.
1420 + Date: 2019-10-05
1421
1422 + Crawling URL: http://imap.worldranch.co.jp.:
1423 + Links:
1424 + Crawling http://imap.worldranch.co.jp.
1425 + Searching for directories...
1426 + Searching open folders...
1427
1428
1429 + URL to crawl: http://www.worldranch.co.jp.
1430 + Date: 2019-10-05
1431
1432 + Crawling URL: http://www.worldranch.co.jp.:
1433 + Links:
1434 + Crawling http://www.worldranch.co.jp.
1435 + Crawling http://www.worldranch.co.jp./coupon/coupon.html
1436 + Crawling http://www.worldranch.co.jp./translate.google.com/translate_a/element.js?cb=googleTranslateElementInit (404 Not Found)
1437 + Crawling http://www.worldranch.co.jp./index.html
1438 + Crawling http://www.worldranch.co.jp./contents/schedule.html
1439 + Crawling http://www.worldranch.co.jp./contents/price.html
1440 + Crawling http://www.worldranch.co.jp./contents/mediainfo.html
1441 + Crawling http://www.worldranch.co.jp./contents/sitemap.html
1442 + Crawling http://www.worldranch.co.jp./contents/faq.html
1443 + Crawling http://www.worldranch.co.jp./contents/contact.html
1444 + Crawling http://www.worldranch.co.jp./contents/about.html
1445 + Crawling http://www.worldranch.co.jp./contents/guide.html
1446 + Crawling http://www.worldranch.co.jp./contents/access.html
1447 + Crawling http://www.worldranch.co.jp./contents/2019_autumn_festival.html
1448 + Crawling http://www.worldranch.co.jp./contents/enjoy.html
1449 + Crawling http://www.worldranch.co.jp./contents/experience.html
1450 + Crawling http://www.worldranch.co.jp./contents/animals.html
1451 + Crawling http://www.worldranch.co.jp./contents/eat.html
1452 + Crawling http://www.worldranch.co.jp./contents/shopping.html
1453 + Crawling http://www.worldranch.co.jp./contents/recruit.html
1454 + Crawling http://www.worldranch.co.jp./contents/bbq.html
1455 + Crawling http://www.worldranch.co.jp./contents/dantai.html
1456 + Crawling http://www.worldranch.co.jp./contents/wan-nyan-day.html
1457 + Crawling http://www.worldranch.co.jp./contents/garden-wedding.html
1458 + Crawling http://www.worldranch.co.jp./contents/pasture.html
1459 + Crawling http://www.worldranch.co.jp./contents/pelchelon.html
1460 + Crawling http://www.worldranch.co.jp./contents/small-animals.html
1461 + Crawling http://www.worldranch.co.jp./contents/dog-rental.html
1462 + Crawling http://www.worldranch.co.jp./contents/pickup-eggs.html
1463 + Crawling http://www.worldranch.co.jp./contents/cat-house.html
1464 + Crawling http://www.worldranch.co.jp./contents/dolphin-touch.html
1465 + Crawling http://www.worldranch.co.jp./contents/goat-walk.html
1466 + Crawling http://www.worldranch.co.jp./contents/rabbit-walk.html
1467 + Crawling http://www.worldranch.co.jp./contents/dog-corner.html
1468 + Crawling http://www.worldranch.co.jp./contents/horse-walk.html
1469 + Crawling http://www.worldranch.co.jp./contents/bird_of_prey.html
1470 + Crawling http://www.worldranch.co.jp./contents/bird_house.html
1471 + Crawling http://www.worldranch.co.jp./contents/food-court.html
1472 + Crawling http://www.worldranch.co.jp./contents/bbq-garden.html
1473 + Crawling http://www.worldranch.co.jp./contents/sushi.html
1474 + Crawling http://www.worldranch.co.jp./contents/character.html
1475 + Crawling http://www.worldranch.co.jp./contents/halloween_2019.html
1476 + Crawling http://www.worldranch.co.jp./contents/capybara_touch.html
1477 + Crawling http://www.worldranch.co.jp./contents/nighter2019.html
1478 + Crawling http://www.worldranch.co.jp./contents/observatory.html
1479 + Crawling http://www.worldranch.co.jp./contents/capybara-baby2.html
1480 + Crawling http://www.worldranch.co.jp./contents/jingisukan.html
1481 + Crawling http://www.worldranch.co.jp./contents/dog_stay.html
1482 + Crawling http://www.worldranch.co.jp./contents/news.html
1483 + Crawling http://www.worldranch.co.jp./contents/pony-square.html
1484 + Searching for directories...
1485 - Found: http://www.worldranch.co.jp./coupon/
1486 - Found: http://www.worldranch.co.jp./translate.google.com/
1487 - Found: http://www.worldranch.co.jp./translate.google.com/translate_a/
1488 - Found: http://www.worldranch.co.jp./contents/
1489 - Found: http://www.worldranch.co.jp./images/
1490 - Found: http://www.worldranch.co.jp./css/
1491 - Found: http://www.worldranch.co.jp./js/
1492 - Found: http://www.worldranch.co.jp./dog/
1493 - Found: http://www.worldranch.co.jp./dog/ph_doglist_img/
1494 + Searching open folders...
1495 - http://www.worldranch.co.jp./coupon/ (403 Forbidden)
1496 - http://www.worldranch.co.jp./translate.google.com/ (404 Not Found)
1497 - http://www.worldranch.co.jp./translate.google.com/translate_a/ (404 Not Found)
1498 - http://www.worldranch.co.jp./contents/ (403 Forbidden)
1499 - http://www.worldranch.co.jp./images/ (403 Forbidden)
1500 - http://www.worldranch.co.jp./css/ (403 Forbidden)
1501 - http://www.worldranch.co.jp./js/ (403 Forbidden)
1502 - http://www.worldranch.co.jp./dog/ (404 Not Found)
1503 - http://www.worldranch.co.jp./dog/ph_doglist_img/ (404 Not Found)
1504 + Crawl finished successfully.
1505----------------------------------------------------------------------
1506Summary of http://http://www.worldranch.co.jp.
1507----------------------------------------------------------------------
1508+ Links crawled:
1509 - http://www.worldranch.co.jp.
1510 - http://www.worldranch.co.jp./contents/2019_autumn_festival.html
1511 - http://www.worldranch.co.jp./contents/about.html
1512 - http://www.worldranch.co.jp./contents/access.html
1513 - http://www.worldranch.co.jp./contents/animals.html
1514 - http://www.worldranch.co.jp./contents/bbq-garden.html
1515 - http://www.worldranch.co.jp./contents/bbq.html
1516 - http://www.worldranch.co.jp./contents/bird_house.html
1517 - http://www.worldranch.co.jp./contents/bird_of_prey.html
1518 - http://www.worldranch.co.jp./contents/capybara-baby2.html
1519 - http://www.worldranch.co.jp./contents/capybara_touch.html
1520 - http://www.worldranch.co.jp./contents/cat-house.html
1521 - http://www.worldranch.co.jp./contents/character.html
1522 - http://www.worldranch.co.jp./contents/contact.html
1523 - http://www.worldranch.co.jp./contents/dantai.html
1524 - http://www.worldranch.co.jp./contents/dog-corner.html
1525 - http://www.worldranch.co.jp./contents/dog-rental.html
1526 - http://www.worldranch.co.jp./contents/dog_stay.html
1527 - http://www.worldranch.co.jp./contents/dolphin-touch.html
1528 - http://www.worldranch.co.jp./contents/eat.html
1529 - http://www.worldranch.co.jp./contents/enjoy.html
1530 - http://www.worldranch.co.jp./contents/experience.html
1531 - http://www.worldranch.co.jp./contents/faq.html
1532 - http://www.worldranch.co.jp./contents/food-court.html
1533 - http://www.worldranch.co.jp./contents/garden-wedding.html
1534 - http://www.worldranch.co.jp./contents/goat-walk.html
1535 - http://www.worldranch.co.jp./contents/guide.html
1536 - http://www.worldranch.co.jp./contents/halloween_2019.html
1537 - http://www.worldranch.co.jp./contents/horse-walk.html
1538 - http://www.worldranch.co.jp./contents/jingisukan.html
1539 - http://www.worldranch.co.jp./contents/mediainfo.html
1540 - http://www.worldranch.co.jp./contents/news.html
1541 - http://www.worldranch.co.jp./contents/nighter2019.html
1542 - http://www.worldranch.co.jp./contents/observatory.html
1543 - http://www.worldranch.co.jp./contents/pasture.html
1544 - http://www.worldranch.co.jp./contents/pelchelon.html
1545 - http://www.worldranch.co.jp./contents/pickup-eggs.html
1546 - http://www.worldranch.co.jp./contents/pony-square.html
1547 - http://www.worldranch.co.jp./contents/price.html
1548 - http://www.worldranch.co.jp./contents/rabbit-walk.html
1549 - http://www.worldranch.co.jp./contents/recruit.html
1550 - http://www.worldranch.co.jp./contents/schedule.html
1551 - http://www.worldranch.co.jp./contents/shopping.html
1552 - http://www.worldranch.co.jp./contents/sitemap.html
1553 - http://www.worldranch.co.jp./contents/small-animals.html
1554 - http://www.worldranch.co.jp./contents/sushi.html
1555 - http://www.worldranch.co.jp./contents/wan-nyan-day.html
1556 - http://www.worldranch.co.jp./coupon/coupon.html
1557 - http://www.worldranch.co.jp./index.html
1558 - http://www.worldranch.co.jp./translate.google.com/translate_a/element.js?cb=googleTranslateElementInit (404 Not Found)
1559 Total links crawled: 50
1560
1561+ Links to files found:
1562 - http://www.worldranch.co.jp./coupon/br_discount.jpg
1563 - http://www.worldranch.co.jp./coupon/img_discount.gif
1564 - http://www.worldranch.co.jp./css/ps_auto_sitemap_index.css
1565 - http://www.worldranch.co.jp./css/style.css
1566 - http://www.worldranch.co.jp./dog/ph_doglist_img/spacer.gif
1567 - http://www.worldranch.co.jp./images/20161230sheep4.jpg
1568 - http://www.worldranch.co.jp./images/2017calendar.jpg
1569 - http://www.worldranch.co.jp./images/2018_autumn_festival_thum.jpg
1570 - http://www.worldranch.co.jp./images/2018calendar_01.jpg
1571 - http://www.worldranch.co.jp./images/2019_autumn_festival_01.jpg
1572 - http://www.worldranch.co.jp./images/2019_autumn_festival_01.pdf
1573 - http://www.worldranch.co.jp./images/2019_autumn_festival_02.jpg
1574 - http://www.worldranch.co.jp./images/2019_autumn_festival_02.pdf
1575 - http://www.worldranch.co.jp./images/2019_autumn_festival_thum.jpg
1576 - http://www.worldranch.co.jp./images/2019_boar_shot_01.jpg
1577 - http://www.worldranch.co.jp./images/2019_boar_shot_04.jpg
1578 - http://www.worldranch.co.jp./images/BBQmenu3.jpg
1579 - http://www.worldranch.co.jp./images/BBQmenu_s3.jpg
1580 - http://www.worldranch.co.jp./images/DSC00548.jpg
1581 - http://www.worldranch.co.jp./images/DSC03634.jpg
1582 - http://www.worldranch.co.jp./images/DSCF6093.jpg
1583 - http://www.worldranch.co.jp./images/DSC_0024-180x135.jpg
1584 - http://www.worldranch.co.jp./images/IMG_0881.jpg
1585 - http://www.worldranch.co.jp./images/IMG_1730.jpg
1586 - http://www.worldranch.co.jp./images/IMG_17561.jpg
1587 - http://www.worldranch.co.jp./images/IMG_1859-200x150.jpg
1588 - http://www.worldranch.co.jp./images/IMG_1859.jpg
1589 - http://www.worldranch.co.jp./images/IMG_2069.jpg
1590 - http://www.worldranch.co.jp./images/IMG_2164-200x150.jpg
1591 - http://www.worldranch.co.jp./images/K5__7119.jpg
1592 - http://www.worldranch.co.jp./images/K5__7121.jpg
1593 - http://www.worldranch.co.jp./images/K5__7278.jpg
1594 - http://www.worldranch.co.jp./images/K5__7369.jpg
1595 - http://www.worldranch.co.jp./images/KS1_3567-200x150.jpg
1596 - http://www.worldranch.co.jp./images/KS1_3567.jpg
1597 - http://www.worldranch.co.jp./images/KS1_4246.jpg
1598 - http://www.worldranch.co.jp./images/KS1_4250.jpg
1599 - http://www.worldranch.co.jp./images/Laced01.jpg
1600 - http://www.worldranch.co.jp./images/M1590091.jpg
1601 - http://www.worldranch.co.jp./images/M1830002.jpg
1602 - http://www.worldranch.co.jp./images/M2130039.jpg
1603 - http://www.worldranch.co.jp./images/M2130042.jpg
1604 - http://www.worldranch.co.jp./images/M2130043.jpg
1605 - http://www.worldranch.co.jp./images/M2430054.jpg
1606 - http://www.worldranch.co.jp./images/M2950053.jpg
1607 - http://www.worldranch.co.jp./images/M2950088.jpg
1608 - http://www.worldranch.co.jp./images/M2950093.jpg
1609 - http://www.worldranch.co.jp./images/M2950094.jpg
1610 - http://www.worldranch.co.jp./images/M2950096.jpg
1611 - http://www.worldranch.co.jp./images/M2950101.jpg
1612 - http://www.worldranch.co.jp./images/M2950116.jpg
1613 - http://www.worldranch.co.jp./images/M3010005.jpg
1614 - http://www.worldranch.co.jp./images/M3010006.jpg
1615 - http://www.worldranch.co.jp./images/M3010007.jpg
1616 - http://www.worldranch.co.jp./images/M3030021.jpg
1617 - http://www.worldranch.co.jp./images/M3820107.jpg
1618 - http://www.worldranch.co.jp./images/M4300017.jpg
1619 - http://www.worldranch.co.jp./images/TS_20180317_hd.jpg
1620 - http://www.worldranch.co.jp./images/TS_20180326_wd.jpg
1621 - http://www.worldranch.co.jp./images/about_1.jpg
1622 - http://www.worldranch.co.jp./images/about_2.jpg
1623 - http://www.worldranch.co.jp./images/about_3.jpg
1624 - http://www.worldranch.co.jp./images/about_4.jpg
1625 - http://www.worldranch.co.jp./images/about_6.jpg
1626 - http://www.worldranch.co.jp./images/about_7.jpg
1627 - http://www.worldranch.co.jp./images/alipay_logo.png
1628 - http://www.worldranch.co.jp./images/ani-inosisi2.gif
1629 - http://www.worldranch.co.jp./images/athletic1-1000x750.jpg
1630 - http://www.worldranch.co.jp./images/baby.jpg
1631 - http://www.worldranch.co.jp./images/babyrush_20190224_01.jpg
1632 - http://www.worldranch.co.jp./images/banner_blog.jpg
1633 - http://www.worldranch.co.jp./images/banner_facebook.jpg
1634 - http://www.worldranch.co.jp./images/banner_facebook2.jpg
1635 - http://www.worldranch.co.jp./images/banner_hikitori.jpg
1636 - http://www.worldranch.co.jp./images/banner_jyouba.jpg
1637 - http://www.worldranch.co.jp./images/banner_kensyuu.jpg
1638 - http://www.worldranch.co.jp./images/banner_movezoo.jpg
1639 - http://www.worldranch.co.jp./images/banner_pet.jpg
1640 - http://www.worldranch.co.jp./images/banner_reien.jpg
1641 - http://www.worldranch.co.jp./images/banner_twitter.jpg
1642 - http://www.worldranch.co.jp./images/batterycar.jpg
1643 - http://www.worldranch.co.jp./images/bbq1.jpg
1644 - http://www.worldranch.co.jp./images/bbq11.jpg
1645 - http://www.worldranch.co.jp./images/bbq21.jpg
1646 - http://www.worldranch.co.jp./images/bbq3.jpg
1647 - http://www.worldranch.co.jp./images/bbq4.jpg
1648 - http://www.worldranch.co.jp./images/bbq_01.jpg
1649 - http://www.worldranch.co.jp./images/bbq_021.jpg
1650 - http://www.worldranch.co.jp./images/bbq_03.jpg
1651 - http://www.worldranch.co.jp./images/bbq_b.jpg
1652 - http://www.worldranch.co.jp./images/bird_of_prey_01.jpg
1653 - http://www.worldranch.co.jp./images/bird_of_prey_02.jpg
1654 - http://www.worldranch.co.jp./images/bird_of_prey_03.jpg
1655 - http://www.worldranch.co.jp./images/birdhouse_01.jpg
1656 - http://www.worldranch.co.jp./images/birdhouse_02.jpg
1657 - http://www.worldranch.co.jp./images/birdhouse_03.jpg
1658 - http://www.worldranch.co.jp./images/birdhouse_04.jpg
1659 - http://www.worldranch.co.jp./images/birdhouse_05.jpg
1660 - http://www.worldranch.co.jp./images/bran_01.jpg
1661 - http://www.worldranch.co.jp./images/bran_02.jpg
1662 - http://www.worldranch.co.jp./images/bran_03.jpg
1663 - http://www.worldranch.co.jp./images/bran_04.jpg
1664 - http://www.worldranch.co.jp./images/capybara01.jpg
1665 - http://www.worldranch.co.jp./images/capybara_touch01.jpg
1666 - http://www.worldranch.co.jp./images/capybara_touch02.jpg
1667 - http://www.worldranch.co.jp./images/capybara_touch03.jpg
1668 - http://www.worldranch.co.jp./images/capybara_touch04.jpg
1669 - http://www.worldranch.co.jp./images/cat_house.jpg
1670 - http://www.worldranch.co.jp./images/cat_room01.jpg
1671 - http://www.worldranch.co.jp./images/cat_room02.jpg
1672 - http://www.worldranch.co.jp./images/cat_room03.jpg
1673 - http://www.worldranch.co.jp./images/cat_room04.jpg
1674 - http://www.worldranch.co.jp./images/cat_room05.jpg
1675 - http://www.worldranch.co.jp./images/cat_tach.jpg
1676 - http://www.worldranch.co.jp./images/cats_sale_001.jpg
1677 - http://www.worldranch.co.jp./images/chabo.jpg
1678 - http://www.worldranch.co.jp./images/characters_banner.jpg
1679 - http://www.worldranch.co.jp./images/colormouse.jpg
1680 - http://www.worldranch.co.jp./images/construction.jpg
1681 - http://www.worldranch.co.jp./images/continental_01.jpg
1682 - http://www.worldranch.co.jp./images/coupon_summer.png
1683 - http://www.worldranch.co.jp./images/cow.gif
1684 - http://www.worldranch.co.jp./images/cow01.jpg
1685 - http://www.worldranch.co.jp./images/dantai.jpg
1686 - http://www.worldranch.co.jp./images/dantai_01.jpg
1687 - http://www.worldranch.co.jp./images/dantai_02.jpg
1688 - http://www.worldranch.co.jp./images/dantai_03.jpg
1689 - http://www.worldranch.co.jp./images/dantai_04.jpg
1690 - http://www.worldranch.co.jp./images/dantai_05.jpg
1691 - http://www.worldranch.co.jp./images/dog_corner.jpg
1692 - http://www.worldranch.co.jp./images/dog_run_210.gif
1693 - http://www.worldranch.co.jp./images/dog_stay01.jpg
1694 - http://www.worldranch.co.jp./images/dog_stay02.jpg
1695 - http://www.worldranch.co.jp./images/dog_stay_price.jpg
1696 - http://www.worldranch.co.jp./images/dog_stay_thumb.jpg
1697 - http://www.worldranch.co.jp./images/dog_stay_wcp_thumb.jpg
1698 - http://www.worldranch.co.jp./images/dogcorner_bnr.jpg
1699 - http://www.worldranch.co.jp./images/dogrun01.jpg
1700 - http://www.worldranch.co.jp./images/dolphin-01.jpg
1701 - http://www.worldranch.co.jp./images/dolphin-touch-00.jpg
1702 - http://www.worldranch.co.jp./images/dolphin-touch-01.jpg
1703 - http://www.worldranch.co.jp./images/dolphin-touch-03.jpg
1704 - http://www.worldranch.co.jp./images/dolphin-touch-04.jpg
1705 - http://www.worldranch.co.jp./images/dolphin-touch-05.jpg
1706 - http://www.worldranch.co.jp./images/dolphin-touch-06.jpg
1707 - http://www.worldranch.co.jp./images/dolphin-wedding01.jpg
1708 - http://www.worldranch.co.jp./images/dolphin_2.jpg
1709 - http://www.worldranch.co.jp./images/dolphinswim-01.jpg
1710 - http://www.worldranch.co.jp./images/dolphinswim-04.jpg
1711 - http://www.worldranch.co.jp./images/dr_fish1.jpg
1712 - http://www.worldranch.co.jp./images/eco-weeding.jpg
1713 - http://www.worldranch.co.jp./images/eco_banner.jpg
1714 - http://www.worldranch.co.jp./images/ecofeed1.jpg
1715 - http://www.worldranch.co.jp./images/egg_01-200x150.jpg
1716 - http://www.worldranch.co.jp./images/egg_01.jpg
1717 - http://www.worldranch.co.jp./images/egg_02.jpg
1718 - http://www.worldranch.co.jp./images/egg_03.jpg
1719 - http://www.worldranch.co.jp./images/egg_04.jpg
1720 - http://www.worldranch.co.jp./images/egg_05.jpg
1721 - http://www.worldranch.co.jp./images/eggtart01.jpg
1722 - http://www.worldranch.co.jp./images/eigyou.gif
1723 - http://www.worldranch.co.jp./images/esayari1.jpg
1724 - http://www.worldranch.co.jp./images/eurasia01.jpg
1725 - http://www.worldranch.co.jp./images/favicon-16x16.png
1726 - http://www.worldranch.co.jp./images/ferret01.jpg
1727 - http://www.worldranch.co.jp./images/ferret02.jpg
1728 - http://www.worldranch.co.jp./images/fish01.jpg
1729 - http://www.worldranch.co.jp./images/foodcoat.jpg
1730 - http://www.worldranch.co.jp./images/foodcoat_menu_20180315.jpg
1731 - http://www.worldranch.co.jp./images/furamingo.jpg
1732 - http://www.worldranch.co.jp./images/furanki_bnr.jpg
1733 - http://www.worldranch.co.jp./images/gardenweding_02.jpg
1734 - http://www.worldranch.co.jp./images/gardenweding_03.jpg
1735 - http://www.worldranch.co.jp./images/gardenweding_04.jpg
1736 - http://www.worldranch.co.jp./images/gardenweding_05.jpg
1737 - http://www.worldranch.co.jp./images/gardenweding_06.jpg
1738 - http://www.worldranch.co.jp./images/gardenweding_07.jpg
1739 - http://www.worldranch.co.jp./images/gardenweding_08.jpg
1740 - http://www.worldranch.co.jp./images/gardenweding_09.jpg
1741 - http://www.worldranch.co.jp./images/gardenweding_10.jpg
1742 - http://www.worldranch.co.jp./images/geep-01.jpg
1743 - http://www.worldranch.co.jp./images/goat-baby01.jpg
1744 - http://www.worldranch.co.jp./images/goat01.jpg
1745 - http://www.worldranch.co.jp./images/goldfish_competition_01.jpg
1746 - http://www.worldranch.co.jp./images/group_bar.png
1747 - http://www.worldranch.co.jp./images/guineapig01.jpg
1748 - http://www.worldranch.co.jp./images/guineapig09.jpg
1749 - http://www.worldranch.co.jp./images/halloween_01.jpg
1750 - http://www.worldranch.co.jp./images/halloween_05.jpg
1751 - http://www.worldranch.co.jp./images/halloween_06.jpg
1752 - http://www.worldranch.co.jp./images/halloween_07.jpg
1753 - http://www.worldranch.co.jp./images/hamster01.jpg
1754 - http://www.worldranch.co.jp./images/harinezumi.jpg
1755 - http://www.worldranch.co.jp./images/harris_hawk01.jpg
1756 - http://www.worldranch.co.jp./images/head011_03.png
1757 - http://www.worldranch.co.jp./images/heading_4.png
1758 - http://www.worldranch.co.jp./images/heading_s_1.png
1759 - http://www.worldranch.co.jp./images/heading_s_10.png
1760 - http://www.worldranch.co.jp./images/heading_s_11.jpg
1761 - http://www.worldranch.co.jp./images/heading_s_14.png
1762 - http://www.worldranch.co.jp./images/heading_s_2.png
1763 - http://www.worldranch.co.jp./images/heading_s_22.png
1764 - http://www.worldranch.co.jp./images/heading_s_3.png
1765 - http://www.worldranch.co.jp./images/heading_s_4.png
1766 - http://www.worldranch.co.jp./images/heading_s_5.png
1767 - http://www.worldranch.co.jp./images/heading_s_6.png
1768 - http://www.worldranch.co.jp./images/heading_s_7.png
1769 - http://www.worldranch.co.jp./images/heading_s_8.png
1770 - http://www.worldranch.co.jp./images/heading_s_9.png
1771 - http://www.worldranch.co.jp./images/hikitori.jpg
1772 - http://www.worldranch.co.jp./images/hikiuma1.jpg
1773 - http://www.worldranch.co.jp./images/hikiuma2.jpg
1774 - http://www.worldranch.co.jp./images/hikiuma3.jpg
1775 - http://www.worldranch.co.jp./images/hikiuma4.jpg
1776 - http://www.worldranch.co.jp./images/hiyoko.jpg
1777 - http://www.worldranch.co.jp./images/horse_187_1.jpg
1778 - http://www.worldranch.co.jp./images/horse_anime2.gif
1779 - http://www.worldranch.co.jp./images/horse_banner.jpg
1780 - http://www.worldranch.co.jp./images/houbokujyo1.jpg
1781 - http://www.worldranch.co.jp./images/houbokujyo2.jpg
1782 - http://www.worldranch.co.jp./images/houbokujyo3.jpg
1783 - http://www.worldranch.co.jp./images/houbokujyo4.jpg
1784 - http://www.worldranch.co.jp./images/ichinoyu.jpg
1785 - http://www.worldranch.co.jp./images/ico_paypay.png
1786 - http://www.worldranch.co.jp./images/img_eat.jpg
1787 - http://www.worldranch.co.jp./images/img_event.jpg
1788 - http://www.worldranch.co.jp./images/img_leisure.jpg
1789 - http://www.worldranch.co.jp./images/img_map_02.jpg
1790 - http://www.worldranch.co.jp./images/img_shopping.jpg
1791 - http://www.worldranch.co.jp./images/img_top_201910.jpg
1792 - http://www.worldranch.co.jp./images/img_touching.jpg
1793 - http://www.worldranch.co.jp./images/inobuta_20181023_01.jpg
1794 - http://www.worldranch.co.jp./images/insta_worldranch.png
1795 - http://www.worldranch.co.jp./images/irishwolfhound_01.jpg
1796 - http://www.worldranch.co.jp./images/jingisukan.jpg
1797 - http://www.worldranch.co.jp./images/kabuto01.jpg
1798 - http://www.worldranch.co.jp./images/kamo_anime.gif
1799 - http://www.worldranch.co.jp./images/kapibara_baby_20190620_1.jpg
1800 - http://www.worldranch.co.jp./images/kapibara_baby_20190620_2.jpg
1801 - http://www.worldranch.co.jp./images/kapibara_baby_20190620_3.jpg
1802 - http://www.worldranch.co.jp./images/kapibara_baby_20190620_4.jpg
1803 - http://www.worldranch.co.jp./images/kapibara_baby_20190620_5.jpg
1804 - http://www.worldranch.co.jp./images/kedumerikugame.jpg
1805 - http://www.worldranch.co.jp./images/kingyosukui.jpg
1806 - http://www.worldranch.co.jp./images/koituri1.jpg
1807 - http://www.worldranch.co.jp./images/kousinomirukuyaritaiken-180x135.jpg
1808 - http://www.worldranch.co.jp./images/kousinomirukuyaritaiken.jpg
1809 - http://www.worldranch.co.jp./images/left_navi_1.png
1810 - http://www.worldranch.co.jp./images/left_navi_2_1.png
1811 - http://www.worldranch.co.jp./images/left_navi_2_1_18.png
1812 - http://www.worldranch.co.jp./images/left_navi_2_1_3.png
1813 - http://www.worldranch.co.jp./images/left_navi_2_1_6.png
1814 - http://www.worldranch.co.jp./images/left_navi_2_1_9.png
1815 - http://www.worldranch.co.jp./images/left_navi_2_2.png
1816 - http://www.worldranch.co.jp./images/left_navi_2_2_1.png
1817 - http://www.worldranch.co.jp./images/left_navi_2_2_10.png
1818 - http://www.worldranch.co.jp./images/left_navi_2_2_14.png
1819 - http://www.worldranch.co.jp./images/left_navi_2_2_15.png
1820 - http://www.worldranch.co.jp./images/left_navi_2_2_16.png
1821 - http://www.worldranch.co.jp./images/left_navi_2_2_17.png
1822 - http://www.worldranch.co.jp./images/left_navi_2_2_2.png
1823 - http://www.worldranch.co.jp./images/left_navi_2_2_3.png
1824 - http://www.worldranch.co.jp./images/left_navi_2_2_4.png
1825 - http://www.worldranch.co.jp./images/left_navi_2_2_5.png
1826 - http://www.worldranch.co.jp./images/left_navi_2_2_7.png
1827 - http://www.worldranch.co.jp./images/left_navi_2_2_8.png
1828 - http://www.worldranch.co.jp./images/left_navi_2_3.png
1829 - http://www.worldranch.co.jp./images/left_navi_2_3_1.png
1830 - http://www.worldranch.co.jp./images/left_navi_2_3_2.png
1831 - http://www.worldranch.co.jp./images/left_navi_2_4.png
1832 - http://www.worldranch.co.jp./images/left_navi_2_4_2.png
1833 - http://www.worldranch.co.jp./images/left_navi_2_4_3.png
1834 - http://www.worldranch.co.jp./images/left_navi_2_4_4.png
1835 - http://www.worldranch.co.jp./images/left_navi_2_4_5.png
1836 - http://www.worldranch.co.jp./images/left_navi_2_5.png
1837 - http://www.worldranch.co.jp./images/left_navi_2_5_1.png
1838 - http://www.worldranch.co.jp./images/line_worldranch.jpg
1839 - http://www.worldranch.co.jp./images/little-owl_01.jpg
1840 - http://www.worldranch.co.jp./images/logo.png
1841 - http://www.worldranch.co.jp./images/mainimg_24.jpg
1842 - http://www.worldranch.co.jp./images/mainimg_29.jpg
1843 - http://www.worldranch.co.jp./images/mainimg_31.jpg
1844 - http://www.worldranch.co.jp./images/mainimg_32.jpg
1845 - http://www.worldranch.co.jp./images/mainimg_33.jpg
1846 - http://www.worldranch.co.jp./images/manchikan-1.jpg
1847 - http://www.worldranch.co.jp./images/mara01.jpg
1848 - http://www.worldranch.co.jp./images/mini_aquarium_01.jpg
1849 - http://www.worldranch.co.jp./images/miniaturehorse20170804_02.jpg
1850 - http://www.worldranch.co.jp./images/miniaturehorse20171231_01.jpg
1851 - http://www.worldranch.co.jp./images/miniaturehorse_20190204_01.jpg
1852 - http://www.worldranch.co.jp./images/minibuta04.jpg
1853 - http://www.worldranch.co.jp./images/minibuta1.jpg
1854 - http://www.worldranch.co.jp./images/minipig_01.jpg
1855 - http://www.worldranch.co.jp./images/minipool_01.jpg
1856 - http://www.worldranch.co.jp./images/movezoo.jpg
1857 - http://www.worldranch.co.jp./images/navi_6.png
1858 - http://www.worldranch.co.jp./images/navi_7.png
1859 - http://www.worldranch.co.jp./images/navi_8.png
1860 - http://www.worldranch.co.jp./images/nengajyo02.jpg
1861 - http://www.worldranch.co.jp./images/nengajyo_2018_04.jpg
1862 - http://www.worldranch.co.jp./images/nighter01.jpg
1863 - http://www.worldranch.co.jp./images/nighter02.jpg
1864 - http://www.worldranch.co.jp./images/nighter03.jpg
1865 - http://www.worldranch.co.jp./images/nighter04.jpg
1866 - http://www.worldranch.co.jp./images/nighter05.jpg
1867 - http://www.worldranch.co.jp./images/nighter06.jpg
1868 - http://www.worldranch.co.jp./images/nubian01.jpg
1869 - http://www.worldranch.co.jp./images/observatory_01.jpg
1870 - http://www.worldranch.co.jp./images/observatory_02.jpg
1871 - http://www.worldranch.co.jp./images/observatory_03.jpg
1872 - http://www.worldranch.co.jp./images/old_newspaper.jpg
1873 - http://www.worldranch.co.jp./images/owl_01.jpg
1874 - http://www.worldranch.co.jp./images/owl_baby_01.jpg
1875 - http://www.worldranch.co.jp./images/passport.pdf
1876 - http://www.worldranch.co.jp./images/pet_sale.jpg
1877 - http://www.worldranch.co.jp./images/ph_cha_bird.jpg
1878 - http://www.worldranch.co.jp./images/ph_cha_cow.jpg
1879 - http://www.worldranch.co.jp./images/ph_cha_dog.jpg
1880 - http://www.worldranch.co.jp./images/ph_cha_horse.jpg
1881 - http://www.worldranch.co.jp./images/ph_cha_pig.jpg
1882 - http://www.worldranch.co.jp./images/ph_cha_rabbit.jpg
1883 - http://www.worldranch.co.jp./images/ph_chara_top.gif
1884 - http://www.worldranch.co.jp./images/pig01.jpg
1885 - http://www.worldranch.co.jp./images/plhanabi03.png
1886 - http://www.worldranch.co.jp./images/pony_bar.png
1887 - http://www.worldranch.co.jp./images/pony_plaza.jpg
1888 - http://www.worldranch.co.jp./images/ponycart_01.jpg
1889 - http://www.worldranch.co.jp./images/ponycart_02.jpg
1890 - http://www.worldranch.co.jp./images/potpourri_asahi20170912.pdf
1891 - http://www.worldranch.co.jp./images/puppy_interaction_01.jpg
1892 - http://www.worldranch.co.jp./images/rabbit01.jpg
1893 - http://www.worldranch.co.jp./images/rabbit08.jpg
1894 - http://www.worldranch.co.jp./images/rabbit_walk01.jpg
1895 - http://www.worldranch.co.jp./images/rabbit_walk02.jpg
1896 - http://www.worldranch.co.jp./images/rabbit_walk03.jpg
1897 - http://www.worldranch.co.jp./images/radiocontrol_01.jpg
1898 - http://www.worldranch.co.jp./images/ranchmap.jpg
1899 - http://www.worldranch.co.jp./images/rody_001.jpg
1900 - http://www.worldranch.co.jp./images/satooya_bird.jpg
1901 - http://www.worldranch.co.jp./images/sheep01.jpg
1902 - http://www.worldranch.co.jp./images/shimurazoo_01.jpg
1903 - http://www.worldranch.co.jp./images/small-animals01.jpg
1904 - http://www.worldranch.co.jp./images/small-dog_01.jpg
1905 - http://www.worldranch.co.jp./images/staff.jpg
1906 - http://www.worldranch.co.jp./images/staff_200.jpg
1907 - http://www.worldranch.co.jp./images/store1.jpg
1908 - http://www.worldranch.co.jp./images/store2.jpg
1909 - http://www.worldranch.co.jp./images/sukiny.jpg
1910 - http://www.worldranch.co.jp./images/sushi1.jpg
1911 - http://www.worldranch.co.jp./images/sushi2.jpg
1912 - http://www.worldranch.co.jp./images/tablet_img01.png
1913 - http://www.worldranch.co.jp./images/taihi_bnr.jpg
1914 - http://www.worldranch.co.jp./images/tess-1389656.jpg
1915 - http://www.worldranch.co.jp./images/top_up.png
1916 - http://www.worldranch.co.jp./images/uma-rental.jpg
1917 - http://www.worldranch.co.jp./images/uma_anime.gif
1918 - http://www.worldranch.co.jp./images/uzura1-200x150.jpg
1919 - http://www.worldranch.co.jp./images/uzura1.jpg
1920 - http://www.worldranch.co.jp./images/village.jpg
1921 - http://www.worldranch.co.jp./images/water_festival.jpg
1922 - http://www.worldranch.co.jp./images/waterfield-01.jpg
1923 - http://www.worldranch.co.jp./images/wcgc.jpg
1924 - http://www.worldranch.co.jp./images/wedding01-1.jpg
1925 - http://www.worldranch.co.jp./images/wedding02.jpg
1926 - http://www.worldranch.co.jp./images/wedding03.jpg
1927 - http://www.worldranch.co.jp./images/wedding04.jpg
1928 - http://www.worldranch.co.jp./images/weekendsale.jpg
1929 - http://www.worldranch.co.jp./images/weekendsale_20191004-1006.jpg
1930 - http://www.worldranch.co.jp./images/wood_chips.jpg
1931 - http://www.worldranch.co.jp./js/java.js
1932 - http://www.worldranch.co.jp./js/jquery-migrate.min.js
1933 - http://www.worldranch.co.jp./js/jquery.form.min.js
1934 - http://www.worldranch.co.jp./js/jquery.js
1935 - http://www.worldranch.co.jp./js/scripts.js
1936 - http://www.worldranch.co.jp./js/slidemenu.js
1937 Total links to files: 375
1938
1939+ Externals links found:
1940 - http://accountpage.line.me/iqq2531p
1941 - http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js
1942 - http://ajax.googleapis.com/ajax/libs/jquery/1.4.3/jquery.min.js
1943 - http://asahi.co.jp/call/
1944 - http://asahi.co.jp/nazeshiko/
1945 - http://asahi.co.jp/ohaasa/
1946 - http://blog.fmosaka.net/mashup/
1947 - http://code.jquery.com/jquery-1.9.1.min.js
1948 - http://eonet.jp/eohikari-ch/eo-newsk/index_2_1.html
1949 - http://funky802.com/saiam/
1950 - http://funky802.com/superfine/
1951 - http://funky802.com/sysimg/diary/diary/dry_img_55238.jpg
1952 - http://gmpg.org/xfn/11
1953 - http://gyao.yahoo.co.jp/player/00778/v12113/v1000000000000000727/
1954 - http://gyao.yahoo.co.jp/player/00778/v12113/v1000000000000000729/
1955 - http://gyao.yahoo.co.jp/player/00778/v12113/v1000000000000000731/
1956 - http://gyao.yahoo.co.jp/player/00778/v12113/v1000000000000000734/
1957 - http://gyao.yahoo.co.jp/player/00778/v12113/v1000000000000000825/
1958 - http://gyao.yahoo.co.jp/player/00778/v12113/v1000000000000000829/
1959 - http://ichinoyu.jp/
1960 - http://jocr.jp/ohsama/
1961 - http://videotopics.yahoo.co.jp/videolist/official/animal_pet/p70a1dc87ec52f4c2a5d05c78e593fd91
1962 - http://webnews.asahi.co.jp/cast/
1963 - http://worldpetreien.jp/
1964 - http://worldranch.blog97.fc2.com/
1965 - http://www.asahi.co.jp/knight-scoop/
1966 - http://www.atpress.ne.jp/view/44915
1967 - http://www.atpress.ne.jp/view/53683
1968 - http://www.atpress.ne.jp/view/54769
1969 - http://www.buffaloes.co.jp/expansion/entertainment/orixbiyori/
1970 - http://www.fujitv.co.jp/meza/index.html
1971 - http://www.fujitv.co.jp/minnanonews_weekend/
1972 - http://www.fujitv.co.jp/viking/
1973 - http://www.kbc.co.jp/tv/asadesu/
1974 - http://www.kongoujidousha.com/
1975 - http://www.kongoujidousha.com/bus_map_j.html
1976 - http://www.kongoujidousha.com/bus_price.html
1977 - http://www.ktv.jp/anchor/index.html
1978 - http://www.ktv.jp/janiben/index.html
1979 - http://www.ktv.jp/wonder/
1980 - http://www.mbs.jp/888/
1981 - http://www.mbs.jp/puipui/
1982 - http://www.mbs.jp/songtown/
1983 - http://www.mbs.jp/voice/
1984 - http://www.nhk.or.jp/ahosuki/
1985 - http://www.nhk.or.jp/hot-kansai/
1986 - http://www.nhk.or.jp/massan/
1987 - http://www.nhk.or.jp/osaka/ohayou/
1988 - http://www.nisukekikaku.com/
1989 - http://www.nisukekikaku.com/images/performers/kikuchiyo&
1990 - http://www.ntv.co.jp/zip/
1991 - http://www.tbs.co.jp/n-st/
1992 - http://www.tsutenkaku.co.jp/
1993 - http://www.tsutenkaku.co.jp/info/index.html
1994 - http://www.tv-asahi.co.jp/super-j/
1995 - http://www.tv-osaka.co.jp/ip4/yu-kan7ch/
1996 - http://www.wcgc.co.jp/
1997 - http://www.worldranch.co.jp
1998 - http://www.worldranch.co.jp/
1999 - http://www.worldranch.co.jp/5123/
2000 - http://www.worldranch.co.jp/WRHC/
2001 - http://www.worldranch.co.jp/WRHC/img/basya.gif
2002 - http://www.worldranch.co.jp/WRHC/img/horse/horse_184.jpg
2003 - http://www.worldranch.co.jp/WRHC/img/horse/horse_205.jpg
2004 - http://www.worldranch.co.jp/WRHC/img/horse/horse_207.jpg
2005 - http://www.worldranch.co.jp/WRHC/img/horse/horse_224.jpg
2006 - http://www.worldranch.co.jp/WRHC/img/horse/horse_238.jpg
2007 - http://www.worldranch.co.jp/WRHC/img/horse/horse_239.jpg
2008 - http://www.worldranch.co.jp/WRHC/img/horse/horse_242.jpg
2009 - http://www.worldranch.co.jp/WRHC/img/horse/horse_243.jpg
2010 - http://www.worldranch.co.jp/WRHC/img/horse/horse_245.jpg
2011 - http://www.worldranch.co.jp/WRHC/img/horse/horse_246.jpg
2012 - http://www.worldranch.co.jp/WRHC/img/horse/horse_247.jpg
2013 - http://www.worldranch.co.jp/WRHC/img/horse/horse_249.jpg
2014 - http://www.worldranch.co.jp/WRHC/img/horse/horse_252.jpg
2015 - http://www.worldranch.co.jp/WRHC/img/horse/horse_254.jpg
2016 - http://www.worldranch.co.jp/WRHC/img/horse/horse_255.jpg
2017 - http://www.worldranch.co.jp/WRHC/img/horse/horse_258.jpg
2018 - http://www.worldranch.co.jp/WRHC/img/horse/horse_260.jpg
2019 - http://www.worldranch.co.jp/WRHC/img/horse/horse_261.jpg
2020 - http://www.worldranch.co.jp/WRHC/img/horse/horse_262.jpg
2021 - http://www.worldranch.co.jp/WRHC/img/horse/horse_264.jpg
2022 - http://www.worldranch.co.jp/WRHC/img/horse/horse_266.jpg
2023 - http://www.worldranch.co.jp/WRHC/img/horse/horse_273.jpg
2024 - http://www.worldranch.co.jp/WRHC/img/horse/horse_274.jpg
2025 - http://www.worldranch.co.jp/WRHC/img/horse/horse_275.jpg
2026 - http://www.worldranch.co.jp/WRHC/img/horse/horse_276.jpg
2027 - http://www.worldranch.co.jp/WRHC/img/horse/horse_277.jpg
2028 - http://www.worldranch.co.jp/WRHC/img/jyouba.gif
2029 - http://www.worldranch.co.jp/WRHC/img/jyutai.gif
2030 - http://www.worldranch.co.jp/WRHC/img/pony_cart.png
2031 - http://www.worldranch.co.jp/WRHC/info.html
2032 - http://www.worldranch.co.jp/WRHC/pony_cart.html
2033 - http://www.worldranch.co.jp/cat_house/
2034 - http://www.worldranch.co.jp/construction/
2035 - http://www.worldranch.co.jp/dog_corner/
2036 - http://www.worldranch.co.jp/dog_corner/images/roy_01.jpg
2037 - http://www.worldranch.co.jp/dog_corner/satooya.html
2038 - http://www.worldranch.co.jp/eco-weeding/
2039 - http://www.worldranch.co.jp/hikitori/
2040 - http://www.worldranch.co.jp/petsale/
2041 - http://www.worldranch.co.jp/petsale/furanki.html
2042 - http://www.worldranch.co.jp/petsale/images/smallanimal_003_l3.jpg
2043 - http://www.worldranch.co.jp/petsale/index.html
2044 - http://www.worldranch.co.jp/petsale/pet_0059.html
2045 - http://www.worldranch.co.jp/stay/
2046 - http://www.worldranch.co.jp/zoo/
2047 - http://www.youtube.com/watch?v=4lzwN7aHQE0
2048 - http://www.youtube.com/watch?v=9Y2SXFx5KmU
2049 - http://www.ytv.co.jp/cematin/
2050 - http://www.ytv.co.jp/gecchu/
2051 - http://www.ytv.co.jp/kamaten/
2052 - http://www.ytv.co.jp/peachcafe/
2053 - http://www.ytv.co.jp/ten/
2054 - http://www3.nhk.or.jp/d-station/program/kizuna/
2055 - http://www4.nhk.or.jp/P2849/
2056 - http://www4.nhk.or.jp/utacon/
2057 - http://youtu.be/hcE2Bgdh-8k
2058 - https://maps.google.co.jp/maps?hl=ja&safe=off&ie=UTF8&q=%E3%83%AF%E3%83%BC%E3%83%AB%E3%83%89%E7%89%A7%E5%A0%B4&fb=1&gl=jp&hq=%E3%83%AF%E3%83%BC%E3%83%AB%E3%83%89%E7%89%A7%E5%A0%B4&hnear=%E3%83%AF%E3%83%BC%E3%83%AB%E3%83%89%E7%89%A7%E5%A0%B4&cid=0,0,8579273369443728907&ll=34.477997,135.641299&spn=0.006295,0.006295&t=m&iwloc=A&brcurrent=3,0x60012bb6c4440d0f:0x53cf29ae98be5237,0&output=embed
2059 - https://maps.google.co.jp/maps?hl=ja&safe=off&ie=UTF8&q=%E3%83%AF%E3%83%BC%E3%83%AB%E3%83%89%E7%89%A7%E5%A0%B4&fb=1&gl=jp&hq=%E3%83%AF%E3%83%BC%E3%83%AB%E3%83%89%E7%89%A7%E5%A0%B4&hnear=%E3%83%AF%E3%83%BC%E3%83%AB%E3%83%89%E7%89%A7%E5%A0%B4&cid=0,0,8579273369443728907&ll=34.477997,135.641299&spn=0.006295,0.006295&t=m&iwloc=A&brcurrent=3,0x60012bb6c4440d0f:0x53cf29ae98be5237,0&source=embed
2060 - https://twitter.com/worldranch
2061 - https://www.asahi.co.jp/ohaasa/
2062 - https://www.facebook.com/worldranch
2063 - https://www.facebook.com/worldranch.japan/
2064 - https://www.instagram.com/dolphin_whale_/
2065 - https://www.jscache.com/wejs?wtype=rated&uniq=935&locationId=7371384&lang=ja&display_version=2
2066 - https://www.ktv.jp/niji/
2067 - https://www.ktv.jp/runner/
2068 - https://www.myrepi.com/tag/myrepi-febreze-route931-osaka
2069 - https://www.tripadvisor.jp/
2070 - https://www.tripadvisor.jp/img/cdsi/img2/badges/ollie-11424-2.gif
2071 - https://www.youtube.com/embed/BGo27abTp8c
2072 - https://www.youtube.com/watch?v=Og7RT_UXMoE&t=11s
2073 - https://www.youtube.com/watch?v=cCuDfhpqR-8
2074 - https://www.youtube.com/watch?v=eJ0OIF9h09w&
2075 - https://www.youtube.com/watch?v=vfMGuH19tDY
2076 Total external links: 136
2077
2078+ Email addresses found:
2079 Total email address found: 0
2080
2081+ Directories found:
2082 - http://www.worldranch.co.jp./contents/ (403 Forbidden)
2083 - http://www.worldranch.co.jp./coupon/ (403 Forbidden)
2084 - http://www.worldranch.co.jp./css/ (403 Forbidden)
2085 - http://www.worldranch.co.jp./dog/ (404 Not Found)
2086 - http://www.worldranch.co.jp./dog/ph_doglist_img/ (404 Not Found)
2087 - http://www.worldranch.co.jp./images/ (403 Forbidden)
2088 - http://www.worldranch.co.jp./js/ (403 Forbidden)
2089 - http://www.worldranch.co.jp./translate.google.com/ (404 Not Found)
2090 - http://www.worldranch.co.jp./translate.google.com/translate_a/ (404 Not Found)
2091 Total directories: 9
2092
2093+ Directory indexing found:
2094 Total directories with indexing: 0
2095
2096----------------------------------------------------------------------
2097
2098
2099 + URL to crawl: http://pop.worldranch.co.jp.
2100 + Date: 2019-10-05
2101
2102 + Crawling URL: http://pop.worldranch.co.jp.:
2103 + Links:
2104 + Crawling http://pop.worldranch.co.jp.
2105 + Searching for directories...
2106 + Searching open folders...
2107
2108--Finished--
2109Summary information for domain worldranch.co.jp.
2110-----------------------------------------
2111 Domain Specific Information:
2112 Email: totsukawa@worldranch.co.jp&
2113 Email: info@worldranch.co.jp
2114 Email: p_reien@worldranch.co.jp.
2115 Email: info@worldranch.co.jp)
2116
2117 Domain Ips Information:
2118 IP: 153.149.229.75
2119 HostName: mwpremgw2.ocn.ad.jp Type: MX
2120 HostName: ofmgw0241.ocn.ad.jp Type: PTR
2121 HostName: mwpremgw1.ocn.ad.jp Type: MX
2122 Country: Japan
2123 Is Active: True (reset ttl 64)
2124 IP: 153.149.229.74
2125 HostName: mwpremgw2.ocn.ad.jp Type: MX
2126 HostName: ofmgw024.ocn.ad.jp Type: PTR
2127 HostName: mwpremgw1.ocn.ad.jp Type: MX
2128 Country: Japan
2129 Is Active: True (reset ttl 64)
2130 IP: 153.149.229.77
2131 HostName: mwpremgw2.ocn.ad.jp Type: MX
2132 HostName: ofmgw0251.ocn.ad.jp Type: PTR
2133 HostName: mwpremgw1.ocn.ad.jp Type: MX
2134 Country: Japan
2135 Is Active: True (reset ttl 64)
2136 IP: 153.149.229.76
2137 HostName: mwpremgw2.ocn.ad.jp Type: MX
2138 HostName: ofmgw025.ocn.ad.jp Type: PTR
2139 HostName: mwpremgw1.ocn.ad.jp Type: MX
2140 Country: Japan
2141 Is Active: True (reset ttl 64)
2142 IP: 153.149.229.73
2143 HostName: mwpremgw2.ocn.ad.jp Type: MX
2144 HostName: ofmgw0231.ocn.ad.jp Type: PTR
2145 HostName: mwpremgw1.ocn.ad.jp Type: MX
2146 Country: Japan
2147 Is Active: True (reset ttl 64)
2148 IP: 153.149.229.72
2149 HostName: mwpremgw2.ocn.ad.jp Type: MX
2150 HostName: ofmgw023.ocn.ad.jp Type: PTR
2151 HostName: mwpremgw1.ocn.ad.jp Type: MX
2152 Country: Japan
2153 Is Active: True (reset ttl 64)
2154 IP: 210.153.89.32
2155 Type: SPF
2156 Is Active: True (reset ttl 64)
2157 IP: 203.82.149.128
2158 Type: SPF
2159 Is Active: True (reset ttl 64)
2160 IP: 153.128.30.218
2161 HostName: ns-231.dns.jp-e1.cloudn-service.com Type: NS
2162 HostName: 153-128-30-218.compute.jp-e1.cloudn-service.com Type: PTR
2163 Country: Japan
2164 Is Active: True (reset ttl 64)
2165 Port: 53/tcp open domain syn-ack ttl 41 (unknown banner: UNKNOWN)
2166 Script Info: | dns-nsid:
2167 Script Info: |_ bind.version: UNKNOWN
2168 Script Info: | fingerprint-strings:
2169 Script Info: | DNSVersionBindReqTCP:
2170 Script Info: | version
2171 Script Info: | bind
2172 Script Info: |_ UNKNOWN
2173 IP: 153.149.229.84
2174 HostName: mwpremgw2.ocn.ad.jp Type: MX
2175 HostName: ofmgw0232.ocn.ad.jp Type: PTR
2176 HostName: mwpremgw1.ocn.ad.jp Type: MX
2177 Country: Japan
2178 Is Active: True (reset ttl 64)
2179 IP: 153.149.229.85
2180 HostName: mwpremgw2.ocn.ad.jp Type: MX
2181 HostName: ofmgw0233.ocn.ad.jp Type: PTR
2182 HostName: mwpremgw1.ocn.ad.jp Type: MX
2183 Country: Japan
2184 Is Active: True (reset ttl 64)
2185 IP: 153.149.229.86
2186 HostName: mwpremgw2.ocn.ad.jp Type: MX
2187 HostName: ofmgw0242.ocn.ad.jp Type: PTR
2188 HostName: mwpremgw1.ocn.ad.jp Type: MX
2189 Country: Japan
2190 Is Active: True (reset ttl 64)
2191 IP: 153.149.229.87
2192 HostName: mwpremgw2.ocn.ad.jp Type: MX
2193 HostName: ofmgw0243.ocn.ad.jp Type: PTR
2194 HostName: mwpremgw1.ocn.ad.jp Type: MX
2195 Country: Japan
2196 Is Active: True (reset ttl 64)
2197 IP: 153.149.229.88
2198 HostName: mwpremgw2.ocn.ad.jp Type: MX
2199 HostName: ofmgw0252.ocn.ad.jp Type: PTR
2200 HostName: mwpremgw1.ocn.ad.jp Type: MX
2201 Country: Japan
2202 Is Active: True (reset ttl 64)
2203 IP: 153.149.229.89
2204 HostName: mwpremgw2.ocn.ad.jp Type: MX
2205 HostName: ofmgw0253.ocn.ad.jp Type: PTR
2206 HostName: mwpremgw1.ocn.ad.jp Type: MX
2207 Country: Japan
2208 Is Active: True (reset ttl 64)
2209 IP: 118.23.109.214
2210 Type: SPF
2211 Is Active: True (reset ttl 64)
2212 IP: 118.23.108.200
2213 Type: SPF
2214 Is Active: True (reset ttl 64)
2215 IP: 118.23.108.203
2216 Type: SPF
2217 Is Active: True (reset ttl 64)
2218 IP: 210.136.55.0
2219 Type: SPF
2220 Is Active: True (reset ttl 64)
2221 IP: 210.136.104.0
2222 Type: SPF
2223 Is Active: True (reset ttl 64)
2224 IP: 60.43.151.164
2225 HostName: www.worldranch.co.jp. Type: A
2226 HostName: ftp.worldranch.co.jp. Type: A
2227 HostName: c15t2a7n.mwprem.net Type: PTR
2228 HostName: mail.worldranch.co.jp. Type: A
2229 HostName: smtp.worldranch.co.jp. Type: A
2230 HostName: pop.worldranch.co.jp. Type: A
2231 HostName: imap.worldranch.co.jp. Type: A
2232 Country: Japan
2233 Is Active: True (reset ttl 64)
2234 Port: 21/tcp open ftp syn-ack ttl 41 vsftpd 2.2.2
2235 Script Info: | ssl-cert: Subject: commonName=*.mwprem.net
2236 Script Info: | Subject Alternative Name: DNS:*.mwprem.net, DNS:mwprem.net
2237 Script Info: | Issuer: commonName=JPRS Domain Validation Authority - G2/organizationName=Japan Registry Services Co., Ltd./countryName=JP
2238 Script Info: | Public Key type: rsa
2239 Script Info: | Public Key bits: 2048
2240 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2241 Script Info: | Not valid before: 2019-03-11T00:50:20
2242 Script Info: | Not valid after: 2021-03-31T14:59:59
2243 Script Info: | MD5: 8b77 5c57 08ea b51c e2d0 b593 124c 0840
2244 Script Info: |_SHA-1: 171e 0680 3eae d675 200a 2cb1 40b0 5538 fcca 5b4b
2245 Script Info: |_ssl-date: 2019-10-05T16:25:10+00:00; -2s from scanner time.
2246 Port: 80/tcp open http syn-ack ttl 41 Apache httpd 2.2.15 ((CentOS))
2247 Script Info: | http-methods:
2248 Script Info: | Supported Methods: GET HEAD POST OPTIONS TRACE
2249 Script Info: |_ Potentially risky methods: TRACE
2250 Script Info: |_http-server-header: Apache/2.2.15 (CentOS)
2251 Script Info: |_http-title: New Server -- DOMAINNAME
2252 Port: 110/tcp open pop3 syn-ack ttl 41 Dovecot pop3d
2253 Port: 143/tcp open imap syn-ack ttl 40 Dovecot imapd
2254 Port: 443/tcp open ssl/https? syn-ack ttl 41
2255 Script Info: |_ssl-date: 2019-10-05T16:25:06+00:00; -3s from scanner time.
2256 Port: 587/tcp open smtp syn-ack ttl 40 Postfix smtpd
2257 Script Info: |_smtp-commands: c15t2a7n.mwprem.net, PIPELINING, SIZE 31457280, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
2258 Script Info: |_ssl-date: 2019-10-05T16:25:12+00:00; -2s from scanner time.
2259 Port: 993/tcp open ssl/imaps? syn-ack ttl 40
2260 Port: 995/tcp open ssl/pop3s? syn-ack ttl 41
2261 Script Info: Device type: general purpose|storage-misc|broadband router|router|WAP|media device
2262 Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Infomir embedded (87%), Ubiquiti embedded (87%)
2263 Os Info: Host: c15t2a7n.mwprem.net; OS: Unix
2264 Script Info: |_clock-skew: mean: -2s, deviation: 0s, median: -2s
2265 IP: 153.149.153.165
2266 HostName: ns-233.dns.us-e1.cloudn-service.com Type: NS
2267 HostName: 153-149-153-165.compute.jp-e1.cloudn-service.com Type: PTR
2268 Country: Japan
2269 Is Active: True (reset ttl 64)
2270 IP: 153.149.98.174
2271 HostName: ns-232.dns.jp-w1.cloudn-service.com Type: NS
2272 HostName: 153-149-98-174.compute.jp-w1.cloudn-service.com Type: PTR
2273 Country: Japan
2274 Is Active: True (reset ttl 64)
2275 Port: 53/tcp open domain syn-ack ttl 42 (unknown banner: UNKNOWN)
2276 Script Info: | dns-nsid:
2277 Script Info: |_ bind.version: UNKNOWN
2278 Script Info: | fingerprint-strings:
2279 Script Info: | DNSVersionBindReqTCP:
2280 Script Info: | version
2281 Script Info: | bind
2282 Script Info: |_ UNKNOWN
2283 IP: 219.101.46.208
2284 Type: SPF
2285 Is Active: True (reset ttl 64)
2286 IP: 210.136.104.64
2287 Type: SPF
2288 Is Active: True (reset ttl 64)
2289 IP: 210.136.55.192
2290 Type: SPF
2291 Is Active: True (reset ttl 64)
2292 IP: 118.23.109.200
2293 Type: SPF
2294 Is Active: True (reset ttl 64)
2295#######################################################################################################################################
2296dnsenum VERSION:1.2.4
2297
2298----- worldranch.co.jp -----
2299
2300
2301Host's addresses:
2302__________________
2303
2304worldranch.co.jp. 985 IN A 60.43.151.164
2305
2306
2307Name Servers:
2308______________
2309
2310ns-233.dns.us-e1.cloudn-service.com. 57102 IN A 153.149.153.165
2311ns-232.dns.jp-w1.cloudn-service.com. 57102 IN A 153.149.98.174
2312ns-231.dns.jp-e1.cloudn-service.com. 57102 IN A 153.128.30.218
2313
2314
2315Mail (MX) Servers:
2316___________________
2317
2318mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.73
2319mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.87
2320mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.77
2321mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.72
2322mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.75
2323mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.74
2324mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.89
2325mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.85
2326mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.86
2327mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.88
2328mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.84
2329mwpremgw2.ocn.ad.jp. 300 IN A 153.149.229.76
2330mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.89
2331mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.84
2332mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.88
2333mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.87
2334mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.77
2335mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.85
2336mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.75
2337mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.86
2338mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.73
2339mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.76
2340mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.74
2341mwpremgw1.ocn.ad.jp. 300 IN A 153.149.229.72
2342
2343
2344Trying Zone Transfers and getting Bind Versions:
2345_________________________________________________
2346
2347
2348Trying Zone Transfer for worldranch.co.jp on ns-233.dns.us-e1.cloudn-service.com ...
2349
2350Trying Zone Transfer for worldranch.co.jp on ns-232.dns.jp-w1.cloudn-service.com ...
2351
2352Trying Zone Transfer for worldranch.co.jp on ns-231.dns.jp-e1.cloudn-service.com ...
2353
2354brute force file not specified, bay.
2355#######################################################################################################################################
2356[3/100] http://www.worldranch.co.jp/construction/img/20150401.pdf
2357 [x] Error in the parsing process
2358[4/100] http://www.worldranch.co.jp/images/20190809_orikomi.pdf
2359[5/100] http://www.worldranch.co.jp/construction/trader_160308.pdf
2360 [x] Error in PDF metadata Creator
2361[6/100] http://www.worldranch.co.jp/images/potpourri_asahi20170912.pdf
2362 [x] Error in PDF metadata Software
2363 [x] Error in PDF metadata Creator
2364[7/100] http://www.worldranch.co.jp/images/passport.pdf
2365[8/100] http://www.worldranch.co.jp/construction/trader_180412.pdf
2366 [x] Error in PDF metadata Creator
2367[9/100] http://www.worldranch.co.jp/construction/trader_171122.pdf
2368 [x] Error in PDF metadata Creator
2369[10/100] http://www.worldranch.co.jp/images/2019_autumn_festival_02.pdf
2370[11/100] http://www.worldranch.co.jp/construction/kaitou_151224.pdf
2371[12/100] http://www.worldranch.co.jp/images/2018_autumn_festival_02.pdf
2372[13/100] http://www.worldranch.co.jp/construction/shinsei.pdf
2373[14/100] http://www.worldranch.co.jp/images/2018_autumn_festival_01.pdf
2374[15/100] http://www.worldranch.co.jp/images/2018_spring_festival_02.pdf
2375[16/100] http://www.worldranch.co.jp/images/2018_spring_festival_01.pdf
2376[17/100] http://www.worldranch.co.jp/construction/houkoku_180519.pdf
2377 [x] Error in PDF metadata Creator
2378[18/100] http://www.worldranch.co.jp/images/ranchmap.pdf
2379[19/100] http://www.worldranch.co.jp/images/2019_autumn_festival_01.pdf
2380[20/100] http://www.worldranch.co.jp/hikitori/seiyakusho.pdf
2381[21/100] http://www.worldranch.co.jp/images/photocontest_20180401.pdf
2382[22/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20170616.pdf
2383 [x] Error in PDF metadata Software
2384 [x] Error in PDF metadata Creator
2385[23/100] http://www.worldranch.co.jp/construction/water_quality/soil_20180913.pdf
2386 [x] Error in PDF metadata Software
2387 [x] Error in PDF metadata Creator
2388[24/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20170913.pdf
2389 [x] Error in PDF metadata Software
2390 [x] Error in PDF metadata Creator
2391[25/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20180913.pdf
2392 [x] Error in PDF metadata Software
2393 [x] Error in PDF metadata Creator
2394[26/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20180614.pdf
2395 [x] Error in PDF metadata Software
2396 [x] Error in PDF metadata Creator
2397[27/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20190403.pdf
2398 [x] Error in PDF metadata Software
2399 [x] Error in PDF metadata Creator
2400[28/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20180314.pdf
2401 [x] Error in PDF metadata Software
2402 [x] Error in PDF metadata Creator
2403[29/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20171218.pdf
2404 [x] Error in PDF metadata Software
2405 [x] Error in PDF metadata Creator
2406[30/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20190109.pdf
2407 [x] Error in PDF metadata Software
2408 [x] Error in PDF metadata Creator
2409[31/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20170315.pdf
2410 [x] Error in PDF metadata Software
2411 [x] Error in PDF metadata Creator
2412[32/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20190625.pdf
2413 [x] Error in PDF metadata Software
2414 [x] Error in PDF metadata Creator
2415[33/100] http://www.worldranch.co.jp/construction/water_quality/water_quality_20161215.pdf
2416 [x] Error in PDF metadata Software
2417 [x] Error in PDF metadata Creator
2418[34/100] http://www.worldranch.co.jp/construction/water_quality/map2.pdf
2419 [x] Error in PDF metadata Software
2420 [x] Error in PDF metadata Creator
2421[35/100] http://www.worldranch.co.jp/construction/water_quality/soil_20190109.pdf
2422 [x] Error in PDF metadata Software
2423 [x] Error in PDF metadata Creator
2424[36/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_91_pedigree.pdf
2425 [x] Error in PDF metadata Software
2426 [x] Error in PDF metadata Creator
2427[37/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_234_pedigree.pdf
2428 [x] Error in PDF metadata Creator
2429[38/100] http://www.worldranch.co.jp/WRHC/img/horse/chic_sire.pdf
2430 [x] Error in PDF metadata Software
2431 [x] Error in PDF metadata Creator
2432[39/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_237_pedigree.pdf
2433 [x] Error in PDF metadata Creator
2434[40/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_180_pedigree.pdf
2435 [x] Error in PDF metadata Software
2436 [x] Error in PDF metadata Creator
2437[41/100] http://www.worldranch.co.jp/WRHC/img/horse/watawooster_sire.pdf
2438 [x] Error in PDF metadata Software
2439 [x] Error in PDF metadata Creator
2440[42/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_201_pedigree.pdf
2441 [x] Error in PDF metadata Software
2442 [x] Error in PDF metadata Creator
2443[43/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_235_pedigree.pdf
2444 [x] Error in PDF metadata Creator
2445[44/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_195_pedigree.pdf
2446 [x] Error in PDF metadata Software
2447 [x] Error in PDF metadata Creator
2448[45/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_248_pedigree.pdf
2449 [x] Error in PDF metadata Creator
2450[46/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_196_pedigree.pdf
2451 [x] Error in the parsing process
2452[47/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_186_sire.pdf
2453 [x] Error in PDF metadata Software
2454 [x] Error in PDF metadata Creator
2455[48/100] http://www.worldranch.co.jp/WRHC/img/horse/kicks_sire.pdf
2456 [x] Error in PDF metadata Software
2457 [x] Error in PDF metadata Creator
2458[49/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_114_sire.pdf
2459 [x] Error in PDF metadata Software
2460 [x] Error in PDF metadata Creator
2461[50/100] http://www.worldranch.co.jp/WRHC/img/horse/horse_113_sire.pdf
2462 [x] Error in PDF metadata Software
2463 [x] Error in PDF metadata Creator
2464---------------------------------------------------------------------------------------------------
2465
2466[+] List of users found:
2467--------------------------
2468natsuka
2469hazuo
2470CAPS701
2471koji natsuka
2472���*y^��l�D�S(h*)0w�]�
2473
2474[+] List of software found:
2475-----------------------------
2476Adobe PDF library 15.00
2477Adobe Illustrator CC 2015 (Macintosh)
2478IkinariPDF Driver 1.0.2.0
2479Adobe Illustrator CC 23.0 (Windows)
2480Microsoft: Print To PDF
2481Acrobat Elements 8.0.0 (Windows)
2482PScript5.dll Version 5.2.2
2483Adobe Illustrator CC 2015 (Windows)
2484KONICA MINOLTA bizhub C220
2485KMBT_C220
2486Acrobat Distiller 9.0.0 (Windows)
2487Adobe PDF Library 19.10.131
2488��Word u( Acrobat PDFMaker 19
2489Microsoft� Excel� 2010
2490ilovepdf.com
2491#######################################################################################################################################
2492!===============================================
2493-=Subfinder v1.1.3 github.com/subfinder/subfinder
2494===============================================
2495
2496
2497Running Source: Ask
2498Running Source: Archive.is
2499Running Source: Baidu
2500Running Source: Bing
2501Running Source: CertDB
2502Running Source: CertificateTransparency
2503Running Source: Certspotter
2504Running Source: Commoncrawl
2505Running Source: Crt.sh
2506Running Source: Dnsdb
2507Running Source: DNSDumpster
2508Running Source: DNSTable
2509Running Source: Dogpile
2510Running Source: Exalead
2511Running Source: Findsubdomains
2512Running Source: Googleter
2513Running Source: Hackertarget
2514Running Source: Ipv4Info
2515Running Source: PTRArchive
2516Running Source: Sitedossier
2517Running Source: Threatcrowd
2518Running Source: ThreatMiner
2519Running Source: WaybackArchive
2520Running Source: Yahoo
2521
2522Running enumeration on worldranch.co.jp
2523
2524dnsdb: Unexpected return status 404
2525
2526waybackarchive: parse http://web.archive.org/cdx/search/cdx?url=*.worldranch.co.jp/*&output=json&fl=original&collapse=urlkey&page=: net/url: invalid control character in URL
2527
2528
2529Starting Bruteforcing of worldranch.co.jp with 9985 words
2530
2531Total 10 Unique subdomains found for worldranch.co.jp
2532
2533.worldranch.co.jp
2534ftp.worldranch.co.jp
2535imap.worldranch.co.jp
2536localhost.worldranch.co.jp
2537mail.worldranch.co.jp
2538news.worldranch.co.jp
2539pop.worldranch.co.jp
2540smtp.worldranch.co.jp
2541www.worldranch.co.jp
2542www.worldranch.co.jp
2543#######################################################################################################################################
2544[*] Processing domain worldranch.co.jp
2545[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
2546[+] Getting nameservers
2547153.149.98.174 - ns-232.dns.jp-w1.cloudn-service.com
2548153.149.153.165 - ns-233.dns.us-e1.cloudn-service.com
2549153.128.30.218 - ns-231.dns.jp-e1.cloudn-service.com
2550[-] Zone transfer failed
2551
2552[+] TXT records found
2553"v=spf1 +a include:_spf.mwprem.net ~all"
2554
2555[+] MX records found, added to target list
255610 mwpremgw2.ocn.ad.jp.
255710 mwpremgw1.ocn.ad.jp.
2558
2559[*] Scanning worldranch.co.jp for A records
256060.43.151.164 - worldranch.co.jp
256160.43.151.164 - ftp.worldranch.co.jp
256260.43.151.164 - imap.worldranch.co.jp
2563127.0.0.1 - localhost.worldranch.co.jp
256460.43.151.164 - mail.worldranch.co.jp
256560.43.151.164 - news.worldranch.co.jp
256660.43.151.164 - pop.worldranch.co.jp
256760.43.151.164 - smtp.worldranch.co.jp
256860.43.151.164 - www.worldranch.co.jp
2569#######################################################################################################################################
2570Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:45 EDT
2571Nmap scan report for worldranch.co.jp (60.43.151.164)
2572Host is up (0.27s latency).
2573rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
2574Not shown: 406 closed ports, 67 filtered ports
2575Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2576PORT STATE SERVICE
257721/tcp open ftp
257880/tcp open http
2579110/tcp open pop3
2580143/tcp open imap
2581443/tcp open https
2582587/tcp open submission
2583993/tcp open imaps
2584995/tcp open pop3s
25852100/tcp open amiganetfs
25868400/tcp open cvd
2587
2588Nmap done: 1 IP address (1 host up) scanned in 4.19 seconds
2589#######################################################################################################################################
2590Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:45 EDT
2591Nmap scan report for worldranch.co.jp (60.43.151.164)
2592Host is up (0.11s latency).
2593rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
2594Not shown: 2 filtered ports
2595PORT STATE SERVICE
259653/udp open|filtered domain
259767/udp open|filtered dhcps
259868/udp open|filtered dhcpc
259969/udp open|filtered tftp
260088/udp open|filtered kerberos-sec
2601123/udp open|filtered ntp
2602139/udp open|filtered netbios-ssn
2603161/udp open|filtered snmp
2604162/udp open|filtered snmptrap
2605389/udp open|filtered ldap
2606500/udp open|filtered isakmp
2607520/udp open|filtered route
26082049/udp open|filtered nfs
2609
2610Nmap done: 1 IP address (1 host up) scanned in 3.11 seconds
2611#######################################################################################################################################
2612Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:45 EDT
2613NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
2614NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
2615NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
2616Nmap scan report for worldranch.co.jp (60.43.151.164)
2617Host is up (0.24s latency).
2618rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
2619
2620PORT STATE SERVICE VERSION
262121/tcp open ftp vsftpd 2.2.2
2622| ftp-brute:
2623| Accounts: No valid accounts found
2624|_ Statistics: Performed 4523 guesses in 444 seconds, average tps: 10.0
2625| vulscan: VulDB - https://vuldb.com:
2626| [43110] vsftpd up to 2.0.4 Memory Leak denial of service
2627|
2628| MITRE CVE - https://cve.mitre.org:
2629| [CVE-2011-2189] net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
2630| [CVE-2011-0762] The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
2631| [CVE-2009-5029] Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
2632| [CVE-2008-4969] ltp-network-test 20060918 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/vsftpd.conf, (b) /tmp/udp/2/*, (c) /tmp/tcp/2/*, (d) /tmp/udp/3/*, (e) /tmp/tcp/3/*, (f) /tmp/nfs_fsstress.udp.2.log, (g) /tmp/nfs_fsstress.udp.3.log, (h) /tmp/nfs_fsstress.tcp.2.log, (i) /tmp/nfs_fsstress.tcp.3.log, and (j) /tmp/nfs_fsstress.sardata temporary files, related to the (1) ftp_setup_vsftp_conf and (2) nfs_fsstress.sh scripts.
2633| [CVE-2008-2375] Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
2634| [CVE-2007-5962] Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
2635| [CVE-2007-4322] BlockHosts before 2.0.4 does not properly parse (1) sshd and (2) vsftpd log files, which allows remote attackers to add arbitrary deny entries to the /etc/hosts.allow file and cause a denial of service by adding arbitrary IP addresses to a daemon log file, as demonstrated by connecting through ssh with a client protocol version identification containing an IP address string, or connecting through ftp with a username containing an IP address string, different vectors than CVE-2007-2765.
2636|
2637| SecurityFocus - https://www.securityfocus.com/bid/:
2638| [82285] Vsftpd CVE-2004-0042 Remote Security Vulnerability
2639| [72451] vsftpd CVE-2015-1419 Security Bypass Vulnerability
2640| [51013] vsftpd '__tzfile_read()' Function Heap Based Buffer Overflow Vulnerability
2641| [48539] vsftpd Compromised Source Packages Backdoor Vulnerability
2642| [46617] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
2643| [41443] Vsftpd Webmin Module Multiple Unspecified Vulnerabilities
2644| [30364] vsftpd FTP Server Pluggable Authentication Module (PAM) Remote Denial of Service Vulnerability
2645| [29322] vsftpd FTP Server 'deny_file' Option Remote Denial of Service Vulnerability
2646| [10394] Vsftpd Listener Denial of Service Vulnerability
2647| [7253] Red Hat Linux 9 vsftpd Compiling Error Weakness
2648|
2649| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2650| [68366] vsftpd package backdoor
2651| [65873] vsftpd vsf_filename_passes_filter denial of service
2652| [55148] VSFTPD-WEBMIN-MODULE unknown unspecified
2653| [43685] vsftpd authentication attempts denial of service
2654| [42593] vsftpd deny_file denial of service
2655| [16222] vsftpd connection denial of service
2656| [14844] vsftpd message allows attacker to obtain username
2657| [11729] Red Hat Linux vsftpd FTP daemon tcp_wrapper could allow an attacker to gain access to server
2658|
2659| Exploit-DB - https://www.exploit-db.com:
2660| [17491] VSFTPD 2.3.4 - Backdoor Command Execution
2661| [16270] vsftpd 2.3.2 - Denial of Service Vulnerability
2662| [5814] vsftpd 2.0.5 (CWD) Remote Memory Consumption Exploit (post auth)
2663|
2664| OpenVAS (Nessus) - http://www.openvas.org:
2665| [70770] Gentoo Security Advisory GLSA 201110-07 (vsftpd)
2666| [70399] Debian Security Advisory DSA 2305-1 (vsftpd)
2667|
2668| SecurityTracker - https://www.securitytracker.com:
2669| [1025186] vsftpd vsf_filename_passes_filter() Bug Lets Remote Authenticated Users Deny Service
2670| [1020546] vsftpd Memory Leak When Invalid Authentication Attempts Occur Lets Remote Authenticated Users Deny Service
2671| [1020079] vsftpd Memory Leak in 'deny_file' Option Lets Remote Authenticated Users Deny Service
2672| [1008628] vsftpd Discloses Whether Usernames are Valid or Not
2673|
2674| OSVDB - http://www.osvdb.org:
2675| [73573] vsftpd on vsftpd.beasts.org Trojaned Distribution
2676| [73340] vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
2677| [61362] Vsftpd Webmin Module Unspecified Issues
2678| [46930] Red Hat Linux vsftpd w/ PAM Memory Exhaustion Remote DoS
2679| [45626] vsftpd deny_file Option Crafted FTP Data Remote Memory Exhaustion DoS
2680| [36515] BlockHosts sshd/vsftpd hosts.allow Arbitrary Deny Entry Manipulation
2681| [28610] vsftpd SIGURG Handler Unspecified Issue
2682| [28609] vsftpd tunable_chroot_local_user Filesystem Root Access
2683| [6861] vsftpd Login Error Message Username Enumeration
2684| [6306] vsftpd Connection Handling DoS
2685| [4564] vsftpd on Red Hat Linux Restricted Access Failure
2686|_
2687Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2688Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 - 3.1 (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 3.5 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.39 (91%)
2689No exact OS matches for host (test conditions non-ideal).
2690Network Distance: 24 hops
2691Service Info: OS: Unix
2692
2693TRACEROUTE (using port 21/tcp)
2694HOP RTT ADDRESS
26951 38.26 ms 10.251.204.1
26962 56.52 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
26973 92.68 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
26984 56.49 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
26995 56.56 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
27006 56.68 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
27017 56.71 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
27028 56.68 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
27039 56.67 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
270410 56.68 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
270511 52.09 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
270612 49.30 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
270713 263.15 ms ae-4.r01.nycmny17.us.bb.gin.ntt.net (129.250.4.174)
270814 49.29 ms ae-7.r24.nycmny01.us.bb.gin.ntt.net (129.250.3.48)
270915 103.32 ms ae-4.r22.sttlwa01.us.bb.gin.ntt.net (129.250.4.13)
271016 322.00 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
271117 263.17 ms ae-2.r03.tokyjp05.jp.bb.gin.ntt.net (129.250.3.33)
271218 281.83 ms ae-1.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.22)
271319 244.81 ms 122.1.245.130
271420 241.35 ms 114.147.63.126
271521 258.43 ms 122.28.179.202
271622 271.25 ms 180.8.125.226
271723 271.13 ms 153.146.149.89
271824 265.89 ms c15t2a7n.mwprem.net (60.43.151.164)
2719#######################################################################################################################################
2720Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:53 EDT
2721NSE: Loaded 164 scripts for scanning.
2722NSE: Script Pre-scanning.
2723Initiating NSE at 12:53
2724Completed NSE at 12:53, 0.00s elapsed
2725Initiating NSE at 12:53
2726Completed NSE at 12:53, 0.00s elapsed
2727Initiating Parallel DNS resolution of 1 host. at 12:53
2728Completed Parallel DNS resolution of 1 host. at 12:53, 0.07s elapsed
2729Initiating SYN Stealth Scan at 12:53
2730Scanning worldranch.co.jp (60.43.151.164) [1 port]
2731Discovered open port 80/tcp on 60.43.151.164
2732Completed SYN Stealth Scan at 12:53, 0.57s elapsed (1 total ports)
2733Initiating Service scan at 12:53
2734Scanning 1 service on worldranch.co.jp (60.43.151.164)
2735Completed Service scan at 12:53, 6.56s elapsed (1 service on 1 host)
2736Initiating OS detection (try #1) against worldranch.co.jp (60.43.151.164)
2737Retrying OS detection (try #2) against worldranch.co.jp (60.43.151.164)
2738Initiating Traceroute at 12:54
2739Completed Traceroute at 12:54, 0.52s elapsed
2740Initiating Parallel DNS resolution of 24 hosts. at 12:54
2741Completed Parallel DNS resolution of 24 hosts. at 12:54, 0.42s elapsed
2742NSE: Script scanning 60.43.151.164.
2743Initiating NSE at 12:54
2744Completed NSE at 12:56, 129.50s elapsed
2745Initiating NSE at 12:56
2746Completed NSE at 12:56, 1.18s elapsed
2747Nmap scan report for worldranch.co.jp (60.43.151.164)
2748Host is up (0.25s latency).
2749rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
2750
2751PORT STATE SERVICE VERSION
275280/tcp open http Apache httpd 2.2.15 ((CentOS))
2753| http-brute:
2754|_ Path "/" does not require authentication
2755|_http-chrono: Request times for /; avg: 1241.81ms; min: 937.08ms; max: 1638.61ms
2756| http-csrf:
2757| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=worldranch.co.jp
2758| Found the following possible CSRF vulnerabilities:
2759|
2760| Path: http://worldranch.co.jp:80/contents/pony-square.html
2761| Form id:
2762| Form action: mail-pony.php
2763|
2764| Path: http://worldranch.co.jp:80/contents/bbq.html
2765| Form id: data1
2766|_ Form action: mail-bbq.php
2767|_http-date: Sat, 05 Oct 2019 16:54:07 GMT; -3s from local time.
2768|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2769|_http-dombased-xss: Couldn't find any DOM based XSS.
2770|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2771| http-errors:
2772| Spidering limited to: maxpagecount=40; withinhost=worldranch.co.jp
2773| Found the following error pages:
2774|
2775| Error Code: 404
2776|_ http://worldranch.co.jp:80/contents/baby.html
2777|_http-exif-spider: ERROR: Script execution failed (use -d to debug)
2778|_http-feed: Couldn't find any feeds.
2779|_http-fetch: Please enter the complete path of the directory to save data in.
2780| http-headers:
2781| Date: Sat, 05 Oct 2019 16:54:07 GMT
2782| Server: Apache/2.2.15 (CentOS)
2783| Last-Modified: Sat, 05 Oct 2019 02:45:26 GMT
2784| ETag: "2823b2-78bf-59420cf9bb0d0"
2785| Accept-Ranges: bytes
2786| Content-Length: 30911
2787| Connection: close
2788| Content-Type: text/html
2789|
2790|_ (Request type: HEAD)
2791|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2792| http-methods:
2793| Supported Methods: GET HEAD POST OPTIONS TRACE
2794|_ Potentially risky methods: TRACE
2795|_http-mobileversion-checker: No mobile version detected.
2796| http-php-version: Logo query returned unknown hash 20f7507070d85d607245bd2869e0bb97
2797|_Credits query returned unknown hash 20f7507070d85d607245bd2869e0bb97
2798|_http-security-headers:
2799|_http-server-header: Apache/2.2.15 (CentOS)
2800| http-sitemap-generator:
2801| Directory structure:
2802| /
2803| Other: 1
2804| /construction/
2805| Other: 1
2806| /contents/
2807| html: 3
2808| /dog_corner/images/
2809| jpg: 1
2810| /eco-weeding/
2811| Other: 1
2812| /images/
2813| jpg: 6; png: 4
2814| /js/
2815| js: 2
2816| /petsale/images/
2817| jpg: 1
2818| Longest directory structure:
2819| Depth: 2
2820| Dir: /petsale/images/
2821| Total files found (by extension):
2822|_ Other: 3; html: 3; jpg: 8; js: 2; png: 4
2823|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2824|_http-title: \xE3\x83\xAF\xE3\x83\xBC\xE3\x83\xAB\xE3\x83\x89\xE7\x89\xA7\xE5\xA0\xB4\xEF\xBD\x9C\xE5\xA4\xA7\xE9\x98\xAA\xE5\xBA\x9C\xE5\x8D\x97\xE9\x83\xA8\xE3\x81\xAE\xE3\x81\xB5\xE3\x82\x8C\xE3\x81\x82\xE3\x81\x84\xE8\xA6\xB3\xE5\x85\x89\xE7\x89\xA7\xE5\xA0\xB4
2825| http-trace: TRACE is enabled
2826| Headers:
2827| Date: Sat, 05 Oct 2019 16:54:09 GMT
2828| Server: Apache/2.2.15 (CentOS)
2829| Connection: close
2830| Transfer-Encoding: chunked
2831|_Content-Type: message/http
2832| http-vhosts:
2833|_127 names had status 200
2834|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2835|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2836|_http-xssed: No previously reported XSS vuln.
2837| vulners:
2838| cpe:/a:apache:http_server:2.2.15:
2839| CVE-2011-3192 7.8 https://vulners.com/cve/CVE-2011-3192
2840| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
2841| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
2842| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
2843| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
2844| CVE-2013-2249 7.5 https://vulners.com/cve/CVE-2013-2249
2845| CVE-2012-0883 6.9 https://vulners.com/cve/CVE-2012-0883
2846| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
2847| CVE-2017-12171 6.4 https://vulners.com/cve/CVE-2017-12171
2848| CVE-2013-1862 5.1 https://vulners.com/cve/CVE-2013-1862
2849| CVE-2014-0231 5.0 https://vulners.com/cve/CVE-2014-0231
2850| CVE-2014-0098 5.0 https://vulners.com/cve/CVE-2014-0098
2851| CVE-2013-6438 5.0 https://vulners.com/cve/CVE-2013-6438
2852| CVE-2012-4557 5.0 https://vulners.com/cve/CVE-2012-4557
2853| CVE-2011-3368 5.0 https://vulners.com/cve/CVE-2011-3368
2854| CVE-2010-2068 5.0 https://vulners.com/cve/CVE-2010-2068
2855| CVE-2010-1452 5.0 https://vulners.com/cve/CVE-2010-1452
2856| CVE-2012-0031 4.6 https://vulners.com/cve/CVE-2012-0031
2857| CVE-2011-3607 4.4 https://vulners.com/cve/CVE-2011-3607
2858| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
2859| CVE-2013-1896 4.3 https://vulners.com/cve/CVE-2013-1896
2860| CVE-2012-4558 4.3 https://vulners.com/cve/CVE-2012-4558
2861| CVE-2012-3499 4.3 https://vulners.com/cve/CVE-2012-3499
2862| CVE-2012-0053 4.3 https://vulners.com/cve/CVE-2012-0053
2863| CVE-2011-4317 4.3 https://vulners.com/cve/CVE-2011-4317
2864| CVE-2011-3639 4.3 https://vulners.com/cve/CVE-2011-3639
2865| CVE-2011-3348 4.3 https://vulners.com/cve/CVE-2011-3348
2866| CVE-2011-0419 4.3 https://vulners.com/cve/CVE-2011-0419
2867| CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
2868| CVE-2012-2687 2.6 https://vulners.com/cve/CVE-2012-2687
2869|_ CVE-2011-4415 1.2 https://vulners.com/cve/CVE-2011-4415
2870| vulscan: VulDB - https://vuldb.com:
2871| [75668] Apache Sling API/Sling Servlets Post up to 2.2.1 HtmlResponse cross site scripting
2872| [65386] Apache Solr up to 2.2.1 on TYPO3 cross site scripting
2873| [65385] Apache Solr up to 2.2.1 on TYPO3 unknown vulnerability
2874| [64466] Apache OpenJPA up to 2.2.1 Serialization memory corruption
2875| [63089] Apache HTTP Server up to 2.2.13 mod_proxy_ajp denial of service
2876| [59850] Apache Geronimo up to 2.2.1 denial of service
2877| [57435] Apache Struts up to 2.2.1.1 FileHandler.java cross site scripting
2878| [57425] Apache Struts up to 2.2.1.1 cross site scripting
2879| [54166] Apache HTTP Server up to 2.2.12 mod_cache Crash denial of service
2880| [49856] Apache HTTP Server 2.2.13 mod_proxy_ftp ap_proxy_ftp_handler denial of service
2881| [3130] Apache OpenOffice 2.2.1 RTF Document Heap-based memory corruption
2882| [135663] Apache Camel up to 2.23.x JSON-lib Library XML Data XML External Entity
2883| [134290] Apache UIMA DUCC up to 2.2.2 cross site scripting
2884| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
2885| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
2886| [124152] Apache Camel Mail up to 2.22.0 Path directory traversal
2887| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
2888| [122456] Apache Camel up to 2.20.3/2.21.0 XSD Validator XML External Entity
2889| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
2890| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
2891| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
2892| [102697] Apache HTTP Server 2.2.24/2.2.32 HTTP Strict Parsing ap_find_token Request Header memory corruption
2893| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
2894| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
2895| [100162] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Commons Collections privilege escalation
2896| [100160] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Trinidad unknown vulnerability
2897| [87540] Apache Ambari up to 2.2.0 File Browser View information disclosure
2898| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
2899| [65313] Apache Sling 2.2.0/2.3.0 AbstractCreateOperation.java deepGetOrCreateNode denial of service
2900| [9891] Apache HTTP Server 2.2.22 suEXEC Feature .htaccess information disclosure
2901| [64485] Apache Struts up to 2.2.3.0 privilege escalation
2902| [64457] Apache Struts up to 2.2.3.0 cross site scripting
2903| [63646] Apache HTTP Server up to 2.2.23/2.4.3 mod_proxy_balancer.c balancer_handler cross site scripting
2904| [60352] Apache Struts up to 2.2.3 memory corruption
2905| [4583] Apache HTTP Server up to 2.2.21 Threaded MPM denial of service
2906| [4582] Apache HTTP Server up to 2.2.21 protocol.c information disclosure
2907| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
2908| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
2909| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
2910| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
2911| [4352] Apache HTTP Server 2.2.x APR apr_fnmatch denial of service
2912| [54394] Apache CXF up to 2.2.8 Memory Consumption denial of service
2913| [40502] Apache HTTP Server up to 2.2.5 mod_proxy_balancer memory corruption
2914| [40501] Apache HTTP Server 2.2.6 mod_proxy_balancer cross site request forgery
2915| [40398] Apache HTTP Server up to 2.2 mod_proxy_balancer cross site scripting
2916| [40397] Apache HTTP Server up to 2.2 mod_proxy_balancer balancer_handler denial of service
2917| [40221] Apache HTTP Server 2.2.6 information disclosure
2918|
2919| MITRE CVE - https://cve.mitre.org:
2920| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
2921| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
2922| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
2923| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
2924| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
2925| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
2926| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
2927| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
2928| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
2929| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
2930| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
2931| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
2932| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
2933| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
2934| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
2935| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
2936| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
2937| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
2938| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
2939| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
2940| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
2941| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
2942| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
2943|
2944| SecurityFocus - https://www.securityfocus.com/bid/:
2945| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
2946| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
2947|
2948| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2949| [75211] Debian GNU/Linux apache 2 cross-site scripting
2950|
2951| Exploit-DB - https://www.exploit-db.com:
2952| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
2953| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
2954| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
2955| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
2956| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
2957| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
2958| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
2959| [17691] Apache Struts < 2.2.0 - Remote Command Execution
2960| [15319] Apache 2.2 (Windows) Local Denial of Service
2961| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
2962|
2963| OpenVAS (Nessus) - http://www.openvas.org:
2964| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
2965|
2966| SecurityTracker - https://www.securitytracker.com:
2967| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
2968| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
2969| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
2970| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
2971| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
2972|
2973| OSVDB - http://www.osvdb.org:
2974| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
2975|_
2976Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2977Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 - 3.1 (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 3.11 (92%), Linux 3.5 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%)
2978No exact OS matches for host (test conditions non-ideal).
2979Uptime guess: 26.338 days (since Mon Sep 9 04:49:51 2019)
2980Network Distance: 24 hops
2981TCP Sequence Prediction: Difficulty=261 (Good luck!)
2982IP ID Sequence Generation: All zeros
2983
2984TRACEROUTE (using port 80/tcp)
2985HOP RTT ADDRESS
29861 99.66 ms 10.251.204.1
29872 99.76 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
29883 99.79 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
29894 99.75 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
29905 99.73 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
29916 99.90 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
29927 112.80 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
29938 99.89 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
29949 99.88 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
299510 100.00 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
299611 69.61 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
299712 69.48 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
299813 270.60 ms ae-4.r01.nycmny17.us.bb.gin.ntt.net (129.250.4.174)
299914 69.50 ms ae-2.r24.nycmny01.us.bb.gin.ntt.net (129.250.4.40)
300015 115.24 ms ae-4.r22.sttlwa01.us.bb.gin.ntt.net (129.250.4.13)
300116 270.65 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
300217 270.61 ms ae-2.r02.tokyjp05.jp.bb.gin.ntt.net (129.250.3.22)
300318 270.57 ms ae-2.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.26)
300419 270.57 ms 60.37.54.202
300520 349.36 ms 114.147.63.122
300621 298.54 ms 122.28.179.202
300722 298.57 ms 180.8.125.226
300823 298.53 ms 153.146.149.89
300924 285.36 ms c15t2a7n.mwprem.net (60.43.151.164)
3010
3011NSE: Script Post-scanning.
3012Initiating NSE at 12:56
3013Completed NSE at 12:56, 0.00s elapsed
3014Initiating NSE at 12:56
3015Completed NSE at 12:56, 0.00s elapsed
3016Read data files from: /usr/bin/../share/nmap
3017#######################################################################################################################################
3018http://worldranch.co.jp [200 OK] Apache[2.2,2.2.15], Country[JAPAN][JP], Google-API[ajax/libs/jquery/1.4.2/jquery.min.js,ajax/libs/jquery/1.4.3/jquery.min.js], Google-Analytics[Universal][UA-40242039-3], HTML5, HTTPServer[CentOS][Apache/2.2.15 (CentOS)], IP[60.43.151.164], JQuery[1.9.1], Script[rated&uniq=935&locationId=7371384&lang=ja&display_version=2,text/javascript], Title[ワールド牧場|大阪府南部のふれあい観光牧場]
3019#######################################################################################################################################
3020
3021wig - WebApp Information Gatherer
3022
3023
3024Scanning http://worldranch.co.jp...
3025_________________ SITE INFO __________________
3026IP Title
302760.43.151.164 ワールド牧場|大阪府南部のふれあい観光牧場
3028
3029__________________ VERSION ___________________
3030Name Versions Type
3031phpMyAdmin 4.0.10.19 CMS
3032Apache 2.2.15 Platform
3033PHP 5.3.3 Platform
3034CentOS 6.6 | 6.8 OS
3035
3036______________________________________________
3037Time: 60.4 sec Urls: 546 Fingerprints: 40401
3038#######################################################################################################################################
3039HTTP/1.1 200 OK
3040Date: Sat, 05 Oct 2019 16:57:22 GMT
3041Server: Apache/2.2.15 (CentOS)
3042Last-Modified: Sat, 05 Oct 2019 02:45:26 GMT
3043ETag: "2823b2-78bf-59420cf9bb0d0"
3044Accept-Ranges: bytes
3045Content-Length: 30911
3046Content-Type: text/html
3047
3048HTTP/1.1 200 OK
3049Date: Sat, 05 Oct 2019 16:57:23 GMT
3050Server: Apache/2.2.15 (CentOS)
3051Last-Modified: Sat, 05 Oct 2019 02:45:26 GMT
3052ETag: "2823b2-78bf-59420cf9bb0d0"
3053Accept-Ranges: bytes
3054Content-Length: 30911
3055Content-Type: text/html
3056
3057Allow: GET,HEAD,POST,OPTIONS,TRACE
3058#######################################################################################################################################
3059------------------------------------------------------------------------------------------------------------------------
3060
3061[ ! ] Starting SCANNER INURLBR 2.1 at [05-10-2019 12:57:51]
3062[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
3063It is the end user's responsibility to obey all applicable local, state and federal laws.
3064Developers assume no liability and are not responsible for any misuse or damage caused by this program
3065
3066[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/worldranch.co.jp/output/inurlbr-worldranch.co.jp ]
3067[ INFO ][ DORK ]::[ site:worldranch.co.jp ]
3068[ INFO ][ SEARCHING ]:: {
3069[ INFO ][ ENGINE ]::[ GOOGLE - www.google.bs ]
3070
3071[ INFO ][ SEARCHING ]::
3072-[:::]
3073[ INFO ][ ENGINE ]::[ GOOGLE API ]
3074
3075[ INFO ][ SEARCHING ]::
3076-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3077[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.tr ID: 006748068166572874491:55ez0c3j3ey ]
3078
3079[ INFO ][ SEARCHING ]::
3080-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3081
3082[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
3083
3084
3085 _[ - ]::--------------------------------------------------------------------------------------------------------------
3086|_[ + ] [ 0 / 100 ]-[12:58:04] [ - ]
3087|_[ + ] Target:: [ http://www.worldranch.co.jp/ ]
3088|_[ + ] Exploit::
3089|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3090|_[ + ] More details:: / - / , ISP:
3091|_[ + ] Found:: UNIDENTIFIED
3092
3093 _[ - ]::--------------------------------------------------------------------------------------------------------------
3094|_[ + ] [ 1 / 100 ]-[12:58:04] [ - ]
3095|_[ + ] Target:: [ http://www.worldranch.co.jp/hikitori/ ]
3096|_[ + ] Exploit::
3097|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3098|_[ + ] More details:: / - / , ISP:
3099|_[ + ] Found:: UNIDENTIFIED
3100
3101 _[ - ]::--------------------------------------------------------------------------------------------------------------
3102|_[ + ] [ 2 / 100 ]-[12:58:06] [ - ]
3103|_[ + ] Target:: [ http://www.worldranch.co.jp/zoo/ ]
3104|_[ + ] Exploit::
3105|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3106|_[ + ] More details:: / - / , ISP:
3107|_[ + ] Found:: UNIDENTIFIED
3108
3109 _[ - ]::--------------------------------------------------------------------------------------------------------------
3110|_[ + ] [ 3 / 100 ]-[12:58:07] [ - ]
3111|_[ + ] Target:: [ http://www.worldranch.co.jp/cat_house/ ]
3112|_[ + ] Exploit::
3113|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3114|_[ + ] More details:: / - / , ISP:
3115|_[ + ] Found:: UNIDENTIFIED
3116
3117 _[ - ]::--------------------------------------------------------------------------------------------------------------
3118|_[ + ] [ 4 / 100 ]-[12:58:08] [ - ]
3119|_[ + ] Target:: [ http://www.worldranch.co.jp/totugawa/ ]
3120|_[ + ] Exploit::
3121|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3122|_[ + ] More details:: / - / , ISP:
3123|_[ + ] Found:: UNIDENTIFIED
3124
3125 _[ - ]::--------------------------------------------------------------------------------------------------------------
3126|_[ + ] [ 5 / 100 ]-[12:58:09] [ - ]
3127|_[ + ] Target:: [ http://www.worldranch.co.jp/construction/ ]
3128|_[ + ] Exploit::
3129|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3130|_[ + ] More details:: / - / , ISP:
3131|_[ + ] Found:: UNIDENTIFIED
3132
3133 _[ - ]::--------------------------------------------------------------------------------------------------------------
3134|_[ + ] [ 6 / 100 ]-[12:58:10] [ - ]
3135|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/ ]
3136|_[ + ] Exploit::
3137|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3138|_[ + ] More details:: / - / , ISP:
3139|_[ + ] Found:: UNIDENTIFIED
3140
3141 _[ - ]::--------------------------------------------------------------------------------------------------------------
3142|_[ + ] [ 7 / 100 ]-[12:58:10] [ - ]
3143|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/ ]
3144|_[ + ] Exploit::
3145|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3146|_[ + ] More details:: / - / , ISP:
3147|_[ + ] Found:: UNIDENTIFIED
3148
3149 _[ - ]::--------------------------------------------------------------------------------------------------------------
3150|_[ + ] [ 8 / 100 ]-[12:58:11] [ - ]
3151|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/ ]
3152|_[ + ] Exploit::
3153|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3154|_[ + ] More details:: / - / , ISP:
3155|_[ + ] Found:: UNIDENTIFIED
3156
3157 _[ - ]::--------------------------------------------------------------------------------------------------------------
3158|_[ + ] [ 9 / 100 ]-[12:58:12] [ - ]
3159|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/ ]
3160|_[ + ] Exploit::
3161|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3162|_[ + ] More details:: / - / , ISP:
3163|_[ + ] Found:: UNIDENTIFIED
3164
3165 _[ - ]::--------------------------------------------------------------------------------------------------------------
3166|_[ + ] [ 10 / 100 ]-[12:58:13] [ - ]
3167|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/guide.html ]
3168|_[ + ] Exploit::
3169|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3170|_[ + ] More details:: / - / , ISP:
3171|_[ + ] Found:: UNIDENTIFIED
3172
3173 _[ - ]::--------------------------------------------------------------------------------------------------------------
3174|_[ + ] [ 11 / 100 ]-[12:58:15] [ - ]
3175|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/mara.html ]
3176|_[ + ] Exploit::
3177|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3178|_[ + ] More details:: / - / , ISP:
3179|_[ + ] Found:: UNIDENTIFIED
3180
3181 _[ - ]::--------------------------------------------------------------------------------------------------------------
3182|_[ + ] [ 12 / 100 ]-[12:58:16] [ - ]
3183|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/owl.html ]
3184|_[ + ] Exploit::
3185|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3186|_[ + ] More details:: / - / , ISP:
3187|_[ + ] Found:: UNIDENTIFIED
3188
3189 _[ - ]::--------------------------------------------------------------------------------------------------------------
3190|_[ + ] [ 13 / 100 ]-[12:58:17] [ - ]
3191|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/bird_of_prey.html ]
3192|_[ + ] Exploit::
3193|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3194|_[ + ] More details:: / - / , ISP:
3195|_[ + ] Found:: UNIDENTIFIED
3196
3197 _[ - ]::--------------------------------------------------------------------------------------------------------------
3198|_[ + ] [ 14 / 100 ]-[12:58:18] [ - ]
3199|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/pony_q.html ]
3200|_[ + ] Exploit::
3201|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3202|_[ + ] More details:: / - / , ISP:
3203|_[ + ] Found:: UNIDENTIFIED
3204
3205 _[ - ]::--------------------------------------------------------------------------------------------------------------
3206|_[ + ] [ 15 / 100 ]-[12:58:19] [ - ]
3207|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/2018_autumn_festival.html ]
3208|_[ + ] Exploit::
3209|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3210|_[ + ] More details:: / - / , ISP:
3211|_[ + ] Found:: UNIDENTIFIED
3212
3213 _[ - ]::--------------------------------------------------------------------------------------------------------------
3214|_[ + ] [ 16 / 100 ]-[12:58:21] [ - ]
3215|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/goldfish_competition.html ]
3216|_[ + ] Exploit::
3217|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3218|_[ + ] More details:: / - / , ISP:
3219|_[ + ] Found:: UNIDENTIFIED
3220
3221 _[ - ]::--------------------------------------------------------------------------------------------------------------
3222|_[ + ] [ 17 / 100 ]-[12:58:22] [ - ]
3223|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/feedingexperience.html ]
3224|_[ + ] Exploit::
3225|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3226|_[ + ] More details:: / - / , ISP:
3227|_[ + ] Found:: UNIDENTIFIED
3228
3229 _[ - ]::--------------------------------------------------------------------------------------------------------------
3230|_[ + ] [ 18 / 100 ]-[12:58:22] [ - ]
3231|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/guide.html ]
3232|_[ + ] Exploit::
3233|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3234|_[ + ] More details:: / - / , ISP:
3235|_[ + ] Found:: UNIDENTIFIED
3236
3237 _[ - ]::--------------------------------------------------------------------------------------------------------------
3238|_[ + ] [ 19 / 100 ]-[12:58:23] [ - ]
3239|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/goat.html ]
3240|_[ + ] Exploit::
3241|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3242|_[ + ] More details:: / - / , ISP:
3243|_[ + ] Found:: UNIDENTIFIED
3244
3245 _[ - ]::--------------------------------------------------------------------------------------------------------------
3246|_[ + ] [ 20 / 100 ]-[12:58:25] [ - ]
3247|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/cow.html ]
3248|_[ + ] Exploit::
3249|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3250|_[ + ] More details:: / - / , ISP:
3251|_[ + ] Found:: UNIDENTIFIED
3252
3253 _[ - ]::--------------------------------------------------------------------------------------------------------------
3254|_[ + ] [ 21 / 100 ]-[12:58:26] [ - ]
3255|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/geep2.html ]
3256|_[ + ] Exploit::
3257|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3258|_[ + ] More details:: / - / , ISP:
3259|_[ + ] Found:: UNIDENTIFIED
3260
3261 _[ - ]::--------------------------------------------------------------------------------------------------------------
3262|_[ + ] [ 22 / 100 ]-[12:58:27] [ - ]
3263|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/ferret.html ]
3264|_[ + ] Exploit::
3265|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3266|_[ + ] More details:: / - / , ISP:
3267|_[ + ] Found:: UNIDENTIFIED
3268
3269 _[ - ]::--------------------------------------------------------------------------------------------------------------
3270|_[ + ] [ 23 / 100 ]-[12:58:28] [ - ]
3271|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/kensyu.html ]
3272|_[ + ] Exploit::
3273|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3274|_[ + ] More details:: / - / , ISP:
3275|_[ + ] Found:: UNIDENTIFIED
3276
3277 _[ - ]::--------------------------------------------------------------------------------------------------------------
3278|_[ + ] [ 24 / 100 ]-[12:58:29] [ - ]
3279|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/2019_autumn_festival.html ]
3280|_[ + ] Exploit::
3281|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3282|_[ + ] More details:: / - / , ISP:
3283|_[ + ] Found:: UNIDENTIFIED
3284
3285 _[ - ]::--------------------------------------------------------------------------------------------------------------
3286|_[ + ] [ 25 / 100 ]-[12:58:30] [ - ]
3287|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/access.html ]
3288|_[ + ] Exploit::
3289|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3290|_[ + ] More details:: / - / , ISP:
3291|_[ + ] Found:: UNIDENTIFIED
3292
3293 _[ - ]::--------------------------------------------------------------------------------------------------------------
3294|_[ + ] [ 26 / 100 ]-[12:58:31] [ - ]
3295|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/news.html ]
3296|_[ + ] Exploit::
3297|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3298|_[ + ] More details:: / - / , ISP:
3299|_[ + ] Found:: UNIDENTIFIED
3300
3301 _[ - ]::--------------------------------------------------------------------------------------------------------------
3302|_[ + ] [ 27 / 100 ]-[12:58:32] [ - ]
3303|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/enjoy.html ]
3304|_[ + ] Exploit::
3305|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3306|_[ + ] More details:: / - / , ISP:
3307|_[ + ] Found:: UNIDENTIFIED
3308
3309 _[ - ]::--------------------------------------------------------------------------------------------------------------
3310|_[ + ] [ 28 / 100 ]-[12:58:33] [ - ]
3311|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/wood_chips.html ]
3312|_[ + ] Exploit::
3313|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3314|_[ + ] More details:: / - / , ISP:
3315|_[ + ] Found:: UNIDENTIFIED
3316
3317 _[ - ]::--------------------------------------------------------------------------------------------------------------
3318|_[ + ] [ 29 / 100 ]-[12:58:35] [ - ]
3319|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/about.html ]
3320|_[ + ] Exploit::
3321|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3322|_[ + ] More details:: / - / , ISP:
3323|_[ + ] Found:: UNIDENTIFIED
3324
3325 _[ - ]::--------------------------------------------------------------------------------------------------------------
3326|_[ + ] [ 30 / 100 ]-[12:58:36] [ - ]
3327|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/sitemap.html ]
3328|_[ + ] Exploit::
3329|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3330|_[ + ] More details:: / - / , ISP:
3331|_[ + ] Found:: UNIDENTIFIED
3332
3333 _[ - ]::--------------------------------------------------------------------------------------------------------------
3334|_[ + ] [ 31 / 100 ]-[12:58:37] [ - ]
3335|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/nighter.html ]
3336|_[ + ] Exploit::
3337|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3338|_[ + ] More details:: / - / , ISP:
3339|_[ + ] Found:: UNIDENTIFIED
3340
3341 _[ - ]::--------------------------------------------------------------------------------------------------------------
3342|_[ + ] [ 32 / 100 ]-[12:58:38] [ - ]
3343|_[ + ] Target:: [ http://www.worldranch.co.jp/zoo/worldranch.html ]
3344|_[ + ] Exploit::
3345|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3346|_[ + ] More details:: / - / , ISP:
3347|_[ + ] Found:: UNIDENTIFIED
3348
3349 _[ - ]::--------------------------------------------------------------------------------------------------------------
3350|_[ + ] [ 33 / 100 ]-[12:58:39] [ - ]
3351|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/sale_horse.html ]
3352|_[ + ] Exploit::
3353|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3354|_[ + ] More details:: / - / , ISP:
3355|_[ + ] Found:: UNIDENTIFIED
3356
3357 _[ - ]::--------------------------------------------------------------------------------------------------------------
3358|_[ + ] [ 34 / 100 ]-[12:58:40] [ - ]
3359|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/sweetpotato.html ]
3360|_[ + ] Exploit::
3361|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3362|_[ + ] More details:: / - / , ISP:
3363|_[ + ] Found:: UNIDENTIFIED
3364
3365 _[ - ]::--------------------------------------------------------------------------------------------------------------
3366|_[ + ] [ 35 / 100 ]-[12:58:41] [ - ]
3367|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/shetland.html ]
3368|_[ + ] Exploit::
3369|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3370|_[ + ] More details:: / - / , ISP:
3371|_[ + ] Found:: UNIDENTIFIED
3372
3373 _[ - ]::--------------------------------------------------------------------------------------------------------------
3374|_[ + ] [ 36 / 100 ]-[12:58:42] [ - ]
3375|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/taihi.html ]
3376|_[ + ] Exploit::
3377|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3378|_[ + ] More details:: / - / , ISP:
3379|_[ + ] Found:: UNIDENTIFIED
3380
3381 _[ - ]::--------------------------------------------------------------------------------------------------------------
3382|_[ + ] [ 37 / 100 ]-[12:58:43] [ - ]
3383|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/rabbit.html ]
3384|_[ + ] Exploit::
3385|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3386|_[ + ] More details:: / - / , ISP:
3387|_[ + ] Found:: UNIDENTIFIED
3388
3389 _[ - ]::--------------------------------------------------------------------------------------------------------------
3390|_[ + ] [ 38 / 100 ]-[12:58:44] [ - ]
3391|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/sheep.html ]
3392|_[ + ] Exploit::
3393|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3394|_[ + ] More details:: / - / , ISP:
3395|_[ + ] Found:: UNIDENTIFIED
3396
3397 _[ - ]::--------------------------------------------------------------------------------------------------------------
3398|_[ + ] [ 39 / 100 ]-[12:58:45] [ - ]
3399|_[ + ] Target:: [ http://worldranch.co.jp/contents/halloween_2017.html ]
3400|_[ + ] Exploit::
3401|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3402|_[ + ] More details:: / - / , ISP:
3403|_[ + ] Found:: UNIDENTIFIED
3404
3405 _[ - ]::--------------------------------------------------------------------------------------------------------------
3406|_[ + ] [ 40 / 100 ]-[12:58:46] [ - ]
3407|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/pig.html ]
3408|_[ + ] Exploit::
3409|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3410|_[ + ] More details:: / - / , ISP:
3411|_[ + ] Found:: UNIDENTIFIED
3412
3413 _[ - ]::--------------------------------------------------------------------------------------------------------------
3414|_[ + ] [ 41 / 100 ]-[12:58:47] [ - ]
3415|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/hamster.html ]
3416|_[ + ] Exploit::
3417|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3418|_[ + ] More details:: / - / , ISP:
3419|_[ + ] Found:: UNIDENTIFIED
3420
3421 _[ - ]::--------------------------------------------------------------------------------------------------------------
3422|_[ + ] [ 42 / 100 ]-[12:58:48] [ - ]
3423|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/napolitanmastiff.html ]
3424|_[ + ] Exploit::
3425|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3426|_[ + ] More details:: / - / , ISP:
3427|_[ + ] Found:: UNIDENTIFIED
3428
3429 _[ - ]::--------------------------------------------------------------------------------------------------------------
3430|_[ + ] [ 43 / 100 ]-[12:58:50] [ - ]
3431|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/eat.html ]
3432|_[ + ] Exploit::
3433|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3434|_[ + ] More details:: / - / , ISP:
3435|_[ + ] Found:: UNIDENTIFIED
3436
3437 _[ - ]::--------------------------------------------------------------------------------------------------------------
3438|_[ + ] [ 44 / 100 ]-[12:58:50] [ - ]
3439|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/bin.html ]
3440|_[ + ] Exploit::
3441|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3442|_[ + ] More details:: / - / , ISP:
3443|_[ + ] Found:: UNIDENTIFIED
3444
3445 _[ - ]::--------------------------------------------------------------------------------------------------------------
3446|_[ + ] [ 45 / 100 ]-[12:58:52] [ - ]
3447|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/mediainfo.html ]
3448|_[ + ] Exploit::
3449|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3450|_[ + ] More details:: / - / , ISP:
3451|_[ + ] Found:: UNIDENTIFIED
3452
3453 _[ - ]::--------------------------------------------------------------------------------------------------------------
3454|_[ + ] [ 46 / 100 ]-[12:58:53] [ - ]
3455|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/colledale.html ]
3456|_[ + ] Exploit::
3457|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3458|_[ + ] More details:: / - / , ISP:
3459|_[ + ] Found:: UNIDENTIFIED
3460
3461 _[ - ]::--------------------------------------------------------------------------------------------------------------
3462|_[ + ] [ 47 / 100 ]-[12:58:54] [ - ]
3463|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/privacy.html ]
3464|_[ + ] Exploit::
3465|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3466|_[ + ] More details:: / - / , ISP:
3467|_[ + ] Found:: UNIDENTIFIED
3468
3469 _[ - ]::--------------------------------------------------------------------------------------------------------------
3470|_[ + ] [ 48 / 100 ]-[12:58:55] [ - ]
3471|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/experience.html ]
3472|_[ + ] Exploit::
3473|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3474|_[ + ] More details:: / - / , ISP:
3475|_[ + ] Found:: UNIDENTIFIED
3476
3477 _[ - ]::--------------------------------------------------------------------------------------------------------------
3478|_[ + ] [ 49 / 100 ]-[12:58:56] [ - ]
3479|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/minipool.html ]
3480|_[ + ] Exploit::
3481|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3482|_[ + ] More details:: / - / , ISP:
3483|_[ + ] Found:: UNIDENTIFIED
3484
3485 _[ - ]::--------------------------------------------------------------------------------------------------------------
3486|_[ + ] [ 50 / 100 ]-[12:58:57] [ - ]
3487|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/pony_breeding.html ]
3488|_[ + ] Exploit::
3489|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3490|_[ + ] More details:: / - / , ISP:
3491|_[ + ] Found:: UNIDENTIFIED
3492
3493 _[ - ]::--------------------------------------------------------------------------------------------------------------
3494|_[ + ] [ 51 / 100 ]-[12:58:58] [ - ]
3495|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/continental.html ]
3496|_[ + ] Exploit::
3497|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3498|_[ + ] More details:: / - / , ISP:
3499|_[ + ] Found:: UNIDENTIFIED
3500
3501 _[ - ]::--------------------------------------------------------------------------------------------------------------
3502|_[ + ] [ 52 / 100 ]-[12:58:59] [ - ]
3503|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/waterfield.html ]
3504|_[ + ] Exploit::
3505|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3506|_[ + ] More details:: / - / , ISP:
3507|_[ + ] Found:: UNIDENTIFIED
3508
3509 _[ - ]::--------------------------------------------------------------------------------------------------------------
3510|_[ + ] [ 53 / 100 ]-[12:59:00] [ - ]
3511|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/faq.html ]
3512|_[ + ] Exploit::
3513|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3514|_[ + ] More details:: / - / , ISP:
3515|_[ + ] Found:: UNIDENTIFIED
3516
3517 _[ - ]::--------------------------------------------------------------------------------------------------------------
3518|_[ + ] [ 54 / 100 ]-[12:59:01] [ - ]
3519|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/percheron.html ]
3520|_[ + ] Exploit::
3521|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3522|_[ + ] More details:: / - / , ISP:
3523|_[ + ] Found:: UNIDENTIFIED
3524
3525 _[ - ]::--------------------------------------------------------------------------------------------------------------
3526|_[ + ] [ 55 / 100 ]-[12:59:02] [ - ]
3527|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/lpony_q.html ]
3528|_[ + ] Exploit::
3529|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3530|_[ + ] More details:: / - / , ISP:
3531|_[ + ] Found:: UNIDENTIFIED
3532
3533 _[ - ]::--------------------------------------------------------------------------------------------------------------
3534|_[ + ] [ 56 / 100 ]-[12:59:04] [ - ]
3535|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/soldout.html ]
3536|_[ + ] Exploit::
3537|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3538|_[ + ] More details:: / - / , ISP:
3539|_[ + ] Found:: UNIDENTIFIED
3540
3541 _[ - ]::--------------------------------------------------------------------------------------------------------------
3542|_[ + ] [ 57 / 100 ]-[12:59:05] [ - ]
3543|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/price.html ]
3544|_[ + ] Exploit::
3545|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3546|_[ + ] More details:: / - / , ISP:
3547|_[ + ] Found:: UNIDENTIFIED
3548
3549 _[ - ]::--------------------------------------------------------------------------------------------------------------
3550|_[ + ] [ 58 / 100 ]-[12:59:06] [ - ]
3551|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/falabella.html ]
3552|_[ + ] Exploit::
3553|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3554|_[ + ] More details:: / - / , ISP:
3555|_[ + ] Found:: UNIDENTIFIED
3556
3557 _[ - ]::--------------------------------------------------------------------------------------------------------------
3558|_[ + ] [ 59 / 100 ]-[12:59:07] [ - ]
3559|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/water_festival.html ]
3560|_[ + ] Exploit::
3561|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3562|_[ + ] More details:: / - / , ISP:
3563|_[ + ] Found:: UNIDENTIFIED
3564
3565 _[ - ]::--------------------------------------------------------------------------------------------------------------
3566|_[ + ] [ 60 / 100 ]-[12:59:08] [ - ]
3567|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/dantai.html ]
3568|_[ + ] Exploit::
3569|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3570|_[ + ] More details:: / - / , ISP:
3571|_[ + ] Found:: UNIDENTIFIED
3572
3573 _[ - ]::--------------------------------------------------------------------------------------------------------------
3574|_[ + ] [ 61 / 100 ]-[12:59:09] [ - ]
3575|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/ecofeed.html ]
3576|_[ + ] Exploit::
3577|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3578|_[ + ] More details:: / - / , ISP:
3579|_[ + ] Found:: UNIDENTIFIED
3580
3581 _[ - ]::--------------------------------------------------------------------------------------------------------------
3582|_[ + ] [ 62 / 100 ]-[12:59:10] [ - ]
3583|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/recruit.html ]
3584|_[ + ] Exploit::
3585|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3586|_[ + ] More details:: / - / , ISP:
3587|_[ + ] Found:: UNIDENTIFIED
3588
3589 _[ - ]::--------------------------------------------------------------------------------------------------------------
3590|_[ + ] [ 63 / 100 ]-[12:59:11] [ - ]
3591|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/farabella.html ]
3592|_[ + ] Exploit::
3593|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3594|_[ + ] More details:: / - / , ISP:
3595|_[ + ] Found:: UNIDENTIFIED
3596
3597 _[ - ]::--------------------------------------------------------------------------------------------------------------
3598|_[ + ] [ 64 / 100 ]-[12:59:13] [ - ]
3599|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/sale.html ]
3600|_[ + ] Exploit::
3601|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3602|_[ + ] More details:: / - / , ISP:
3603|_[ + ] Found:: UNIDENTIFIED
3604
3605 _[ - ]::--------------------------------------------------------------------------------------------------------------
3606|_[ + ] [ 65 / 100 ]-[12:59:14] [ - ]
3607|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/smallanimals.html ]
3608|_[ + ] Exploit::
3609|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3610|_[ + ] More details:: / - / , ISP:
3611|_[ + ] Found:: UNIDENTIFIED
3612
3613 _[ - ]::--------------------------------------------------------------------------------------------------------------
3614|_[ + ] [ 66 / 100 ]-[12:59:14] [ - ]
3615|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/arab.html ]
3616|_[ + ] Exploit::
3617|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3618|_[ + ] More details:: / - / , ISP:
3619|_[ + ] Found:: UNIDENTIFIED
3620
3621 _[ - ]::--------------------------------------------------------------------------------------------------------------
3622|_[ + ] [ 67 / 100 ]-[12:59:15] [ - ]
3623|_[ + ] Target:: [ https://worldranch.co.jp/contents/freshly_egg.html ]
3624|_[ + ] Exploit::
3625|_[ + ] Information Server:: , , IP:60.43.151.164:443
3626|_[ + ] More details:: / - / , ISP:
3627|_[ + ] Found:: UNIDENTIFIED
3628
3629 _[ - ]::--------------------------------------------------------------------------------------------------------------
3630|_[ + ] [ 68 / 100 ]-[12:59:17] [ - ]
3631|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/harrishawk.html ]
3632|_[ + ] Exploit::
3633|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3634|_[ + ] More details:: / - / , ISP:
3635|_[ + ] Found:: UNIDENTIFIED
3636
3637 _[ - ]::--------------------------------------------------------------------------------------------------------------
3638|_[ + ] [ 69 / 100 ]-[12:59:17] [ - ]
3639|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/item_001.html ]
3640|_[ + ] Exploit::
3641|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3642|_[ + ] More details:: / - / , ISP:
3643|_[ + ] Found:: UNIDENTIFIED
3644
3645 _[ - ]::--------------------------------------------------------------------------------------------------------------
3646|_[ + ] [ 70 / 100 ]-[12:59:19] [ - ]
3647|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/nighter2018.html ]
3648|_[ + ] Exploit::
3649|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3650|_[ + ] More details:: / - / , ISP:
3651|_[ + ] Found:: UNIDENTIFIED
3652
3653 _[ - ]::--------------------------------------------------------------------------------------------------------------
3654|_[ + ] [ 71 / 100 ]-[12:59:20] [ - ]
3655|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/price.html ]
3656|_[ + ] Exploit::
3657|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3658|_[ + ] More details:: / - / , ISP:
3659|_[ + ] Found:: UNIDENTIFIED
3660
3661 _[ - ]::--------------------------------------------------------------------------------------------------------------
3662|_[ + ] [ 72 / 100 ]-[12:59:21] [ - ]
3663|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/quarterhorse.html ]
3664|_[ + ] Exploit::
3665|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3666|_[ + ] More details:: / - / , ISP:
3667|_[ + ] Found:: UNIDENTIFIED
3668
3669 _[ - ]::--------------------------------------------------------------------------------------------------------------
3670|_[ + ] [ 73 / 100 ]-[12:59:21] [ - ]
3671|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/item_004.html ]
3672|_[ + ] Exploit::
3673|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3674|_[ + ] More details:: / - / , ISP:
3675|_[ + ] Found:: UNIDENTIFIED
3676
3677 _[ - ]::--------------------------------------------------------------------------------------------------------------
3678|_[ + ] [ 74 / 100 ]-[12:59:23] [ - ]
3679|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/pony_shiiku.html ]
3680|_[ + ] Exploit::
3681|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3682|_[ + ] More details:: / - / , ISP:
3683|_[ + ] Found:: UNIDENTIFIED
3684
3685 _[ - ]::--------------------------------------------------------------------------------------------------------------
3686|_[ + ] [ 75 / 100 ]-[12:59:24] [ - ]
3687|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/athletic.html ]
3688|_[ + ] Exploit::
3689|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3690|_[ + ] More details:: / - / , ISP:
3691|_[ + ] Found:: UNIDENTIFIED
3692
3693 _[ - ]::--------------------------------------------------------------------------------------------------------------
3694|_[ + ] [ 76 / 100 ]-[12:59:25] [ - ]
3695|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/bird_house.html ]
3696|_[ + ] Exploit::
3697|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3698|_[ + ] More details:: / - / , ISP:
3699|_[ + ] Found:: UNIDENTIFIED
3700
3701 _[ - ]::--------------------------------------------------------------------------------------------------------------
3702|_[ + ] [ 77 / 100 ]-[12:59:26] [ - ]
3703|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/sanzo.html ]
3704|_[ + ] Exploit::
3705|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3706|_[ + ] More details:: / - / , ISP:
3707|_[ + ] Found:: UNIDENTIFIED
3708
3709 _[ - ]::--------------------------------------------------------------------------------------------------------------
3710|_[ + ] [ 78 / 100 ]-[12:59:27] [ - ]
3711|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/thoroughbred.html ]
3712|_[ + ] Exploit::
3713|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3714|_[ + ] More details:: / - / , ISP:
3715|_[ + ] Found:: UNIDENTIFIED
3716
3717 _[ - ]::--------------------------------------------------------------------------------------------------------------
3718|_[ + ] [ 79 / 100 ]-[12:59:28] [ - ]
3719|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/worldranch.html ]
3720|_[ + ] Exploit::
3721|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3722|_[ + ] More details:: / - / , ISP:
3723|_[ + ] Found:: UNIDENTIFIED
3724
3725 _[ - ]::--------------------------------------------------------------------------------------------------------------
3726|_[ + ] [ 80 / 100 ]-[12:59:29] [ - ]
3727|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/susugao.html ]
3728|_[ + ] Exploit::
3729|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3730|_[ + ] More details:: / - / , ISP:
3731|_[ + ] Found:: UNIDENTIFIED
3732
3733 _[ - ]::--------------------------------------------------------------------------------------------------------------
3734|_[ + ] [ 81 / 100 ]-[12:59:30] [ - ]
3735|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/eggtart.html ]
3736|_[ + ] Exploit::
3737|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3738|_[ + ] More details:: / - / , ISP:
3739|_[ + ] Found:: UNIDENTIFIED
3740
3741 _[ - ]::--------------------------------------------------------------------------------------------------------------
3742|_[ + ] [ 82 / 100 ]-[12:59:31] [ - ]
3743|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/schedule.html ]
3744|_[ + ] Exploit::
3745|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3746|_[ + ] More details:: / - / , ISP:
3747|_[ + ] Found:: UNIDENTIFIED
3748
3749 _[ - ]::--------------------------------------------------------------------------------------------------------------
3750|_[ + ] [ 83 / 100 ]-[12:59:32] [ - ]
3751|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/riku.html ]
3752|_[ + ] Exploit::
3753|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3754|_[ + ] More details:: / - / , ISP:
3755|_[ + ] Found:: UNIDENTIFIED
3756
3757 _[ - ]::--------------------------------------------------------------------------------------------------------------
3758|_[ + ] [ 84 / 100 ]-[12:59:33] [ - ]
3759|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/room.html ]
3760|_[ + ] Exploit::
3761|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3762|_[ + ] More details:: / - / , ISP:
3763|_[ + ] Found:: UNIDENTIFIED
3764
3765 _[ - ]::--------------------------------------------------------------------------------------------------------------
3766|_[ + ] [ 85 / 100 ]-[12:59:34] [ - ]
3767|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/contact.html ]
3768|_[ + ] Exploit::
3769|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3770|_[ + ] More details:: / - / , ISP:
3771|_[ + ] Found:: UNIDENTIFIED
3772
3773 _[ - ]::--------------------------------------------------------------------------------------------------------------
3774|_[ + ] [ 86 / 100 ]-[12:59:35] [ - ]
3775|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/rody.html ]
3776|_[ + ] Exploit::
3777|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3778|_[ + ] More details:: / - / , ISP:
3779|_[ + ] Found:: UNIDENTIFIED
3780
3781 _[ - ]::--------------------------------------------------------------------------------------------------------------
3782|_[ + ] [ 87 / 100 ]-[12:59:36] [ - ]
3783|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/nighter2019.html ]
3784|_[ + ] Exploit::
3785|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3786|_[ + ] More details:: / - / , ISP:
3787|_[ + ] Found:: UNIDENTIFIED
3788
3789 _[ - ]::--------------------------------------------------------------------------------------------------------------
3790|_[ + ] [ 88 / 100 ]-[12:59:37] [ - ]
3791|_[ + ] Target:: [ http://www.worldranch.co.jp/cat_house/cats_all.html ]
3792|_[ + ] Exploit::
3793|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3794|_[ + ] More details:: / - / , ISP:
3795|_[ + ] Found:: UNIDENTIFIED
3796
3797 _[ - ]::--------------------------------------------------------------------------------------------------------------
3798|_[ + ] [ 89 / 100 ]-[12:59:39] [ - ]
3799|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/charles.html ]
3800|_[ + ] Exploit::
3801|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3802|_[ + ] More details:: / - / , ISP:
3803|_[ + ] Found:: UNIDENTIFIED
3804
3805 _[ - ]::--------------------------------------------------------------------------------------------------------------
3806|_[ + ] [ 90 / 100 ]-[12:59:40] [ - ]
3807|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/onsen.html ]
3808|_[ + ] Exploit::
3809|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3810|_[ + ] More details:: / - / , ISP:
3811|_[ + ] Found:: UNIDENTIFIED
3812
3813 _[ - ]::--------------------------------------------------------------------------------------------------------------
3814|_[ + ] [ 91 / 100 ]-[12:59:41] [ - ]
3815|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/access.html ]
3816|_[ + ] Exploit::
3817|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3818|_[ + ] More details:: / - / , ISP:
3819|_[ + ] Found:: UNIDENTIFIED
3820
3821 _[ - ]::--------------------------------------------------------------------------------------------------------------
3822|_[ + ] [ 92 / 100 ]-[12:59:42] [ - ]
3823|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/item_003.html ]
3824|_[ + ] Exploit::
3825|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3826|_[ + ] More details:: / - / , ISP:
3827|_[ + ] Found:: UNIDENTIFIED
3828
3829 _[ - ]::--------------------------------------------------------------------------------------------------------------
3830|_[ + ] [ 93 / 100 ]-[12:59:42] [ - ]
3831|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/deliver.html ]
3832|_[ + ] Exploit::
3833|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3834|_[ + ] More details:: / - / , ISP:
3835|_[ + ] Found:: UNIDENTIFIED
3836
3837 _[ - ]::--------------------------------------------------------------------------------------------------------------
3838|_[ + ] [ 94 / 100 ]-[12:59:43] [ - ]
3839|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/winston.html ]
3840|_[ + ] Exploit::
3841|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3842|_[ + ] More details:: / - / , ISP:
3843|_[ + ] Found:: UNIDENTIFIED
3844
3845 _[ - ]::--------------------------------------------------------------------------------------------------------------
3846|_[ + ] [ 95 / 100 ]-[12:59:44] [ - ]
3847|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/privacy.html ]
3848|_[ + ] Exploit::
3849|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3850|_[ + ] More details:: / - / , ISP:
3851|_[ + ] Found:: UNIDENTIFIED
3852
3853 _[ - ]::--------------------------------------------------------------------------------------------------------------
3854|_[ + ] [ 96 / 100 ]-[12:59:45] [ - ]
3855|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/sale_miniaturehorse.html ]
3856|_[ + ] Exploit::
3857|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3858|_[ + ] More details:: / - / , ISP:
3859|_[ + ] Found:: UNIDENTIFIED
3860
3861 _[ - ]::--------------------------------------------------------------------------------------------------------------
3862|_[ + ] [ 97 / 100 ]-[12:59:46] [ - ]
3863|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/eurasiaeagleworm.html ]
3864|_[ + ] Exploit::
3865|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3866|_[ + ] More details:: / - / , ISP:
3867|_[ + ] Found:: UNIDENTIFIED
3868
3869 _[ - ]::--------------------------------------------------------------------------------------------------------------
3870|_[ + ] [ 98 / 100 ]-[12:59:47] [ - ]
3871|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/appaloosa.html ]
3872|_[ + ] Exploit::
3873|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3874|_[ + ] More details:: / - / , ISP:
3875|_[ + ] Found:: UNIDENTIFIED
3876
3877 _[ - ]::--------------------------------------------------------------------------------------------------------------
3878|_[ + ] [ 99 / 100 ]-[12:59:49] [ - ]
3879|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/contact.html ]
3880|_[ + ] Exploit::
3881|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
3882|_[ + ] More details:: / - / , ISP:
3883|_[ + ] Found:: UNIDENTIFIED
3884
3885[ INFO ] [ Shutting down ]
3886[ INFO ] [ End of process INURLBR at [05-10-2019 12:59:49]
3887[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3888[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/worldranch.co.jp/output/inurlbr-worldranch.co.jp ]
3889|_________________________________________________________________________________________
3890
3891\_________________________________________________________________________________________/
3892
3893#######################################################################################################################################
3894Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:59 EDT
3895Nmap scan report for worldranch.co.jp (60.43.151.164)
3896Host is up (0.21s latency).
3897rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
3898
3899PORT STATE SERVICE VERSION
3900110/tcp open pop3 Dovecot pop3d
3901| pop3-brute:
3902| Accounts: No valid accounts found
3903| Statistics: Performed 65 guesses in 68 seconds, average tps: 0.7
3904|_ ERROR: Failed to connect.
3905|_pop3-capabilities: UIDL CAPA PIPELINING TOP RESP-CODES USER STLS SASL(PLAIN LOGIN)
3906| vulscan: VulDB - https://vuldb.com:
3907| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
3908| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
3909| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
3910| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
3911| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
3912| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
3913| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
3914| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
3915| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
3916| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
3917| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
3918| [69835] Dovecot 2.2.0/2.2.1 denial of service
3919| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
3920| [65684] Dovecot up to 2.2.6 unknown vulnerability
3921| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
3922| [63692] Dovecot up to 2.0.15 spoofing
3923| [7062] Dovecot 2.1.10 mail-search.c denial of service
3924| [57517] Dovecot up to 2.0.12 Login directory traversal
3925| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
3926| [57515] Dovecot up to 2.0.12 Crash denial of service
3927| [54944] Dovecot up to 1.2.14 denial of service
3928| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
3929| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
3930| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
3931| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
3932| [53277] Dovecot up to 1.2.10 denial of service
3933| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
3934| [45256] Dovecot up to 1.1.5 directory traversal
3935| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
3936| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
3937| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
3938| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
3939| [40356] Dovecot 1.0.9 Cache unknown vulnerability
3940| [38222] Dovecot 1.0.2 directory traversal
3941| [36376] Dovecot up to 1.0.x directory traversal
3942| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
3943|
3944| MITRE CVE - https://cve.mitre.org:
3945| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
3946| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
3947| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
3948| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
3949| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
3950| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
3951| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
3952| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
3953| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
3954| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
3955| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
3956| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
3957| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
3958| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
3959| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
3960| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
3961| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
3962| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
3963| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
3964| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
3965| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
3966| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
3967| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
3968| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
3969| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
3970| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
3971| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
3972| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
3973| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
3974| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
3975| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
3976| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
3977| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
3978| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
3979| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
3980| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
3981| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
3982|
3983| SecurityFocus - https://www.securityfocus.com/bid/:
3984| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
3985| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
3986| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
3987| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
3988| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
3989| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
3990| [67306] Dovecot Denial of Service Vulnerability
3991| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
3992| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
3993| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
3994| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
3995| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
3996| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
3997| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
3998| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
3999| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
4000| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
4001| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
4002| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
4003| [39838] tpop3d Remote Denial of Service Vulnerability
4004| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
4005| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
4006| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
4007| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
4008| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
4009| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
4010| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
4011| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
4012| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
4013| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
4014| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
4015| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
4016| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
4017| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
4018| [17961] Dovecot Remote Information Disclosure Vulnerability
4019| [16672] Dovecot Double Free Denial of Service Vulnerability
4020| [8495] akpop3d User Name SQL Injection Vulnerability
4021| [8473] Vpop3d Remote Denial Of Service Vulnerability
4022| [3990] ZPop3D Bad Login Logging Failure Vulnerability
4023| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
4024|
4025| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4026| [86382] Dovecot POP3 Service denial of service
4027| [84396] Dovecot IMAP APPEND denial of service
4028| [80453] Dovecot mail-search.c denial of service
4029| [71354] Dovecot SSL Common Name (CN) weak security
4030| [67675] Dovecot script-login security bypass
4031| [67674] Dovecot script-login directory traversal
4032| [67589] Dovecot header name denial of service
4033| [63267] Apple Mac OS X Dovecot information disclosure
4034| [62340] Dovecot mailbox security bypass
4035| [62339] Dovecot IMAP or POP3 denial of service
4036| [62256] Dovecot mailbox security bypass
4037| [62255] Dovecot ACL entry security bypass
4038| [60639] Dovecot ACL plugin weak security
4039| [57267] Apple Mac OS X Dovecot Kerberos security bypass
4040| [56763] Dovecot header denial of service
4041| [54363] Dovecot base_dir privilege escalation
4042| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
4043| [46323] Dovecot dovecot.conf information disclosure
4044| [46227] Dovecot message parsing denial of service
4045| [45669] Dovecot ACL mailbox security bypass
4046| [45667] Dovecot ACL plugin rights security bypass
4047| [41085] Dovecot TAB characters authentication bypass
4048| [41009] Dovecot mail_extra_groups option unauthorized access
4049| [39342] Dovecot LDAP auth cache configuration security bypass
4050| [35767] Dovecot ACL plugin security bypass
4051| [34082] Dovecot mbox-storage.c directory traversal
4052| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
4053| [26578] Cyrus IMAP pop3d buffer overflow
4054| [26536] Dovecot IMAP LIST information disclosure
4055| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
4056| [24709] Dovecot APPEND command denial of service
4057| [13018] akpop3d authentication code SQL injection
4058| [7345] Slackware Linux imapd and ipop3d core dump
4059| [6269] imap, ipop2d and ipop3d buffer overflows
4060| [5923] Linuxconf vpop3d symbolic link
4061| [4918] IPOP3D, Buffer overflow attack
4062| [1560] IPOP3D, user login successful
4063| [1559] IPOP3D user login to remote host successful
4064| [1525] IPOP3D, user logout
4065| [1524] IPOP3D, user auto-logout
4066| [1523] IPOP3D, user login failure
4067| [1522] IPOP3D, brute force attack
4068| [1521] IPOP3D, user kiss of death logout
4069| [418] pop3d mktemp creates insecure temporary files
4070|
4071| Exploit-DB - https://www.exploit-db.com:
4072| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
4073| [23053] Vpop3d Remote Denial of Service Vulnerability
4074| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
4075| [11893] tPop3d 1.5.3 DoS
4076| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
4077| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
4078| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
4079| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
4080|
4081| OpenVAS (Nessus) - http://www.openvas.org:
4082| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
4083| [901025] Dovecot Version Detection
4084| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
4085| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
4086| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
4087| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
4088| [870607] RedHat Update for dovecot RHSA-2011:0600-01
4089| [870471] RedHat Update for dovecot RHSA-2011:1187-01
4090| [870153] RedHat Update for dovecot RHSA-2008:0297-02
4091| [863272] Fedora Update for dovecot FEDORA-2011-7612
4092| [863115] Fedora Update for dovecot FEDORA-2011-7258
4093| [861525] Fedora Update for dovecot FEDORA-2007-664
4094| [861394] Fedora Update for dovecot FEDORA-2007-493
4095| [861333] Fedora Update for dovecot FEDORA-2007-1485
4096| [860845] Fedora Update for dovecot FEDORA-2008-9202
4097| [860663] Fedora Update for dovecot FEDORA-2008-2475
4098| [860169] Fedora Update for dovecot FEDORA-2008-2464
4099| [860089] Fedora Update for dovecot FEDORA-2008-9232
4100| [840950] Ubuntu Update for dovecot USN-1295-1
4101| [840668] Ubuntu Update for dovecot USN-1143-1
4102| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
4103| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
4104| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
4105| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
4106| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
4107| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
4108| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
4109| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
4110| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
4111| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
4112| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
4113| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
4114| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
4115| [70259] FreeBSD Ports: dovecot
4116| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
4117| [66522] FreeBSD Ports: dovecot
4118| [65010] Ubuntu USN-838-1 (dovecot)
4119| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
4120| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
4121| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
4122| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
4123| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
4124| [62854] FreeBSD Ports: dovecot-managesieve
4125| [61916] FreeBSD Ports: dovecot
4126| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
4127| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
4128| [60528] FreeBSD Ports: dovecot
4129| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
4130| [60089] FreeBSD Ports: dovecot
4131| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
4132| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
4133|
4134| SecurityTracker - https://www.securitytracker.com:
4135| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
4136| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
4137| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
4138|
4139| OSVDB - http://www.osvdb.org:
4140| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
4141| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
4142| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
4143| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
4144| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
4145| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
4146| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
4147| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
4148| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
4149| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
4150| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
4151| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
4152| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
4153| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
4154| [66113] Dovecot Mail Root Directory Creation Permission Weakness
4155| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
4156| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
4157| [66110] Dovecot Multiple Unspecified Buffer Overflows
4158| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
4159| [64783] Dovecot E-mail Message Header Unspecified DoS
4160| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
4161| [62796] Dovecot mbox Format Email Header Handling DoS
4162| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
4163| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
4164| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
4165| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
4166| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
4167| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
4168| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
4169| [43137] Dovecot mail_extra_groups Symlink File Manipulation
4170| [42979] Dovecot passdbs Argument Injection Authentication Bypass
4171| [39876] Dovecot LDAP Auth Cache Security Bypass
4172| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
4173| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
4174| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
4175| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
4176| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
4177| [23281] Dovecot imap/pop3-login dovecot-auth DoS
4178| [23280] Dovecot Malformed APPEND Command DoS
4179| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
4180| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
4181| [5857] Linux pop3d Arbitrary Mail File Access
4182| [2471] akpop3d username SQL Injection
4183|_
4184Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4185Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 - 3.1 (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 3.5 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.39 (91%)
4186No exact OS matches for host (test conditions non-ideal).
4187Network Distance: 24 hops
4188
4189TRACEROUTE (using port 110/tcp)
4190HOP RTT ADDRESS
41911 196.33 ms 10.251.204.1
41922 196.41 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
41933 196.51 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
41944 196.42 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
41955 196.48 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
41966 196.65 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
41977 196.63 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
41988 196.70 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
41999 196.63 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
420010 196.72 ms if-ae-7-5.tcore1.nto-new-york.as6453.net (63.243.128.141)
420111 87.76 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
420212 68.43 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
420313 287.44 ms ae-4.r01.nycmny17.us.bb.gin.ntt.net (129.250.4.174)
420414 87.73 ms ae-7.r24.nycmny01.us.bb.gin.ntt.net (129.250.3.48)
420515 135.29 ms ae-4.r22.sttlwa01.us.bb.gin.ntt.net (129.250.4.13)
420616 287.46 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
420717 305.26 ms ae-2.r03.tokyjp05.jp.bb.gin.ntt.net (129.250.3.33)
420818 269.24 ms ae-0.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.18)
420919 287.45 ms 60.37.54.202
421020 305.25 ms 114.147.63.122
421121 252.65 ms 122.28.179.202
421222 320.17 ms 180.8.125.226
421323 259.46 ms 153.146.149.89
421424 289.92 ms c15t2a7n.mwprem.net (60.43.151.164)
4215#######################################################################################################################################
4216Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 13:01 EDT
4217NSE: Loaded 164 scripts for scanning.
4218NSE: Script Pre-scanning.
4219Initiating NSE at 13:01
4220Completed NSE at 13:01, 0.00s elapsed
4221Initiating NSE at 13:01
4222Completed NSE at 13:01, 0.00s elapsed
4223Initiating Parallel DNS resolution of 1 host. at 13:01
4224Completed Parallel DNS resolution of 1 host. at 13:01, 0.02s elapsed
4225Initiating SYN Stealth Scan at 13:01
4226Scanning worldranch.co.jp (60.43.151.164) [1 port]
4227Discovered open port 443/tcp on 60.43.151.164
4228Completed SYN Stealth Scan at 13:01, 0.29s elapsed (1 total ports)
4229Initiating Service scan at 13:01
4230Scanning 1 service on worldranch.co.jp (60.43.151.164)
4231Completed Service scan at 13:01, 14.53s elapsed (1 service on 1 host)
4232Initiating OS detection (try #1) against worldranch.co.jp (60.43.151.164)
4233Retrying OS detection (try #2) against worldranch.co.jp (60.43.151.164)
4234Initiating Traceroute at 13:01
4235Completed Traceroute at 13:01, 3.10s elapsed
4236Initiating Parallel DNS resolution of 23 hosts. at 13:01
4237Completed Parallel DNS resolution of 23 hosts. at 13:01, 0.45s elapsed
4238NSE: Script scanning 60.43.151.164.
4239Initiating NSE at 13:01
4240Completed NSE at 13:07, 354.26s elapsed
4241Initiating NSE at 13:07
4242Completed NSE at 13:07, 3.26s elapsed
4243Nmap scan report for worldranch.co.jp (60.43.151.164)
4244Host is up (0.24s latency).
4245rDNS record for 60.43.151.164: c15t2a7n.mwprem.net
4246
4247PORT STATE SERVICE VERSION
4248443/tcp open ssl/https?
4249|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
4250| http-brute:
4251|_ Path "/" does not require authentication
4252|_http-chrono: Request times for /; avg: 8778.50ms; min: 8689.67ms; max: 8921.66ms
4253|_http-csrf: Couldn't find any CSRF vulnerabilities.
4254|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
4255|_http-dombased-xss: Couldn't find any DOM based XSS.
4256|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
4257|_http-errors: ERROR: Script execution failed (use -d to debug)
4258|_http-feed: Couldn't find any feeds.
4259|_http-fetch: Please enter the complete path of the directory to save data in.
4260|_http-jsonp-detection: Couldn't find any JSONP endpoints.
4261|_http-mobileversion-checker: No mobile version detected.
4262| http-security-headers:
4263| Strict_Transport_Security:
4264|_ HSTS not configured in HTTPS Server
4265| http-sitemap-generator:
4266| Directory structure:
4267| Longest directory structure:
4268| Depth: 0
4269| Dir: /
4270| Total files found (by extension):
4271|_
4272|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
4273| http-vhosts:
4274|_127 names had status ERROR
4275|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
4276|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
4277|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
4278|_http-xssed: No previously reported XSS vuln.
4279Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4280Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 - 3.1 (93%), Linux 3.5 (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 3.11 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%)
4281No exact OS matches for host (test conditions non-ideal).
4282Uptime guess: 26.346 days (since Mon Sep 9 04:49:51 2019)
4283Network Distance: 24 hops
4284TCP Sequence Prediction: Difficulty=259 (Good luck!)
4285IP ID Sequence Generation: All zeros
4286
4287TRACEROUTE (using port 443/tcp)
4288HOP RTT ADDRESS
42891 69.34 ms 10.251.204.1
42902 104.96 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
42913 87.59 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
42924 87.57 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
42935 87.61 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
42946 87.71 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
42957 87.75 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
42968 87.75 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
42979 87.73 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
429810 42.08 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
429911 54.24 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
430012 73.04 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
430113 292.14 ms ae-6.r00.nycmny17.us.bb.gin.ntt.net (129.250.3.152)
430214 47.86 ms ae-2.r24.nycmny01.us.bb.gin.ntt.net (129.250.4.40)
430315 ...
430416 263.11 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
430517 292.21 ms ae-2.r03.tokyjp05.jp.bb.gin.ntt.net (129.250.3.33)
430618 292.05 ms ae-2.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.26)
430719 291.99 ms 60.37.54.202
430820 290.47 ms 114.147.63.122
430921 290.48 ms 122.28.179.202
431022 310.65 ms 180.8.125.226
431123 233.66 ms 153.146.149.89
431224 274.86 ms c15t2a7n.mwprem.net (60.43.151.164)
4313
4314NSE: Script Post-scanning.
4315Initiating NSE at 13:07
4316Completed NSE at 13:07, 0.00s elapsed
4317Initiating NSE at 13:07
4318Completed NSE at 13:07, 0.00s elapsed
4319#######################################################################################################################################
4320Version: 1.11.13-static
4321OpenSSL 1.0.2-chacha (1.0.2g-dev)
4322
4323Connected to 60.43.151.164
4324
4325Testing SSL server worldranch.co.jp on port 443 using SNI name worldranch.co.jp
4326
4327 TLS Fallback SCSV:
4328Server supports TLS Fallback SCSV
4329
4330 TLS renegotiation:
4331Secure session renegotiation supported
4332
4333 TLS Compression:
4334Compression disabled
4335
4336 Heartbleed:
4337TLS 1.2 not vulnerable to heartbleed
4338TLS 1.1 not vulnerable to heartbleed
4339TLS 1.0 not vulnerable to heartbleed
4340
4341 Supported Server Cipher(s):
4342Preferred TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 1024 bits
4343Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 1024 bits
4344Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
4345Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
4346Accepted TLSv1.2 256 bits AES256-GCM-SHA384
4347Accepted TLSv1.2 256 bits AES256-SHA256
4348Accepted TLSv1.2 256 bits AES256-SHA
4349Accepted TLSv1.2 256 bits CAMELLIA256-SHA
4350Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 1024 bits
4351Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 1024 bits
4352Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
4353Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
4354Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 1024 bits
4355Accepted TLSv1.2 128 bits AES128-GCM-SHA256
4356Accepted TLSv1.2 128 bits AES128-SHA256
4357Accepted TLSv1.2 128 bits AES128-SHA
4358Accepted TLSv1.2 128 bits CAMELLIA128-SHA
4359Accepted TLSv1.2 112 bits DES-CBC3-SHA
4360Preferred TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
4361Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
4362Accepted TLSv1.1 256 bits AES256-SHA
4363Accepted TLSv1.1 256 bits CAMELLIA256-SHA
4364Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
4365Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
4366Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 1024 bits
4367Accepted TLSv1.1 128 bits AES128-SHA
4368Accepted TLSv1.1 128 bits CAMELLIA128-SHA
4369Accepted TLSv1.1 112 bits DES-CBC3-SHA
4370Preferred TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
4371Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
4372Accepted TLSv1.0 256 bits AES256-SHA
4373Accepted TLSv1.0 256 bits CAMELLIA256-SHA
4374Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
4375Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
4376Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 1024 bits
4377Accepted TLSv1.0 128 bits AES128-SHA
4378Accepted TLSv1.0 128 bits CAMELLIA128-SHA
4379Accepted TLSv1.0 112 bits DES-CBC3-SHA
4380
4381 SSL Certificate:
4382Signature Algorithm: sha1WithRSAEncryption
4383RSA Key Strength: 2048
4384
4385Subject: worldranch.co.jp
4386Issuer: worldranch.co.jp
4387
4388Not valid before: Mar 9 09:01:30 2014 GMT
4389Not valid after: Mar 6 09:01:30 2024 GMT
4390#######################################################################################################################################
4391------------------------------------------------------------------------------------------------------------------------
4392
4393[ ! ] Starting SCANNER INURLBR 2.1 at [05-10-2019 13:08:59]
4394[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
4395It is the end user's responsibility to obey all applicable local, state and federal laws.
4396Developers assume no liability and are not responsible for any misuse or damage caused by this program
4397
4398[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/worldranch.co.jp/output/inurlbr-worldranch.co.jp ]
4399[ INFO ][ DORK ]::[ site:worldranch.co.jp ]
4400[ INFO ][ SEARCHING ]:: {
4401[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.ar ]
4402
4403[ INFO ][ SEARCHING ]::
4404-[:::]
4405[ INFO ][ ENGINE ]::[ GOOGLE API ]
4406
4407[ INFO ][ SEARCHING ]::
4408-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4409[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.ge ID: 002901626849897788481:cpnctza84gq ]
4410
4411[ INFO ][ SEARCHING ]::
4412-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4413
4414[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
4415
4416
4417 _[ - ]::--------------------------------------------------------------------------------------------------------------
4418|_[ + ] [ 0 / 100 ]-[13:09:12] [ - ]
4419|_[ + ] Target:: [ http://www.worldranch.co.jp/ ]
4420|_[ + ] Exploit::
4421|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4422|_[ + ] More details:: / - / , ISP:
4423|_[ + ] Found:: UNIDENTIFIED
4424
4425 _[ - ]::--------------------------------------------------------------------------------------------------------------
4426|_[ + ] [ 1 / 100 ]-[13:09:13] [ - ]
4427|_[ + ] Target:: [ http://www.worldranch.co.jp/hikitori/ ]
4428|_[ + ] Exploit::
4429|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4430|_[ + ] More details:: / - / , ISP:
4431|_[ + ] Found:: UNIDENTIFIED
4432
4433 _[ - ]::--------------------------------------------------------------------------------------------------------------
4434|_[ + ] [ 2 / 100 ]-[13:09:14] [ - ]
4435|_[ + ] Target:: [ http://www.worldranch.co.jp/zoo/ ]
4436|_[ + ] Exploit::
4437|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4438|_[ + ] More details:: / - / , ISP:
4439|_[ + ] Found:: UNIDENTIFIED
4440
4441 _[ - ]::--------------------------------------------------------------------------------------------------------------
4442|_[ + ] [ 3 / 100 ]-[13:09:15] [ - ]
4443|_[ + ] Target:: [ http://www.worldranch.co.jp/cat_house/ ]
4444|_[ + ] Exploit::
4445|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4446|_[ + ] More details:: / - / , ISP:
4447|_[ + ] Found:: UNIDENTIFIED
4448
4449 _[ - ]::--------------------------------------------------------------------------------------------------------------
4450|_[ + ] [ 4 / 100 ]-[13:09:16] [ - ]
4451|_[ + ] Target:: [ http://www.worldranch.co.jp/totugawa/ ]
4452|_[ + ] Exploit::
4453|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4454|_[ + ] More details:: / - / , ISP:
4455|_[ + ] Found:: UNIDENTIFIED
4456
4457 _[ - ]::--------------------------------------------------------------------------------------------------------------
4458|_[ + ] [ 5 / 100 ]-[13:09:17] [ - ]
4459|_[ + ] Target:: [ http://www.worldranch.co.jp/construction/ ]
4460|_[ + ] Exploit::
4461|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4462|_[ + ] More details:: / - / , ISP:
4463|_[ + ] Found:: UNIDENTIFIED
4464
4465 _[ - ]::--------------------------------------------------------------------------------------------------------------
4466|_[ + ] [ 6 / 100 ]-[13:09:18] [ - ]
4467|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/ ]
4468|_[ + ] Exploit::
4469|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4470|_[ + ] More details:: / - / , ISP:
4471|_[ + ] Found:: UNIDENTIFIED
4472
4473 _[ - ]::--------------------------------------------------------------------------------------------------------------
4474|_[ + ] [ 7 / 100 ]-[13:09:19] [ - ]
4475|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/ ]
4476|_[ + ] Exploit::
4477|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4478|_[ + ] More details:: / - / , ISP:
4479|_[ + ] Found:: UNIDENTIFIED
4480
4481 _[ - ]::--------------------------------------------------------------------------------------------------------------
4482|_[ + ] [ 8 / 100 ]-[13:09:20] [ - ]
4483|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/ ]
4484|_[ + ] Exploit::
4485|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4486|_[ + ] More details:: / - / , ISP:
4487|_[ + ] Found:: UNIDENTIFIED
4488
4489 _[ - ]::--------------------------------------------------------------------------------------------------------------
4490|_[ + ] [ 9 / 100 ]-[13:09:21] [ - ]
4491|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/ ]
4492|_[ + ] Exploit::
4493|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4494|_[ + ] More details:: / - / , ISP:
4495|_[ + ] Found:: UNIDENTIFIED
4496
4497 _[ - ]::--------------------------------------------------------------------------------------------------------------
4498|_[ + ] [ 10 / 100 ]-[13:09:22] [ - ]
4499|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/guide.html ]
4500|_[ + ] Exploit::
4501|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4502|_[ + ] More details:: / - / , ISP:
4503|_[ + ] Found:: UNIDENTIFIED
4504
4505 _[ - ]::--------------------------------------------------------------------------------------------------------------
4506|_[ + ] [ 11 / 100 ]-[13:09:23] [ - ]
4507|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/mara.html ]
4508|_[ + ] Exploit::
4509|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4510|_[ + ] More details:: / - / , ISP:
4511|_[ + ] Found:: UNIDENTIFIED
4512
4513 _[ - ]::--------------------------------------------------------------------------------------------------------------
4514|_[ + ] [ 12 / 100 ]-[13:09:25] [ - ]
4515|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/bird_of_prey.html ]
4516|_[ + ] Exploit::
4517|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4518|_[ + ] More details:: / - / , ISP:
4519|_[ + ] Found:: UNIDENTIFIED
4520
4521 _[ - ]::--------------------------------------------------------------------------------------------------------------
4522|_[ + ] [ 13 / 100 ]-[13:09:26] [ - ]
4523|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/owl.html ]
4524|_[ + ] Exploit::
4525|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4526|_[ + ] More details:: / - / , ISP:
4527|_[ + ] Found:: UNIDENTIFIED
4528
4529 _[ - ]::--------------------------------------------------------------------------------------------------------------
4530|_[ + ] [ 14 / 100 ]-[13:09:27] [ - ]
4531|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/pony_q.html ]
4532|_[ + ] Exploit::
4533|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4534|_[ + ] More details:: / - / , ISP:
4535|_[ + ] Found:: UNIDENTIFIED
4536
4537 _[ - ]::--------------------------------------------------------------------------------------------------------------
4538|_[ + ] [ 15 / 100 ]-[13:09:28] [ - ]
4539|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/2018_autumn_festival.html ]
4540|_[ + ] Exploit::
4541|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4542|_[ + ] More details:: / - / , ISP:
4543|_[ + ] Found:: UNIDENTIFIED
4544
4545 _[ - ]::--------------------------------------------------------------------------------------------------------------
4546|_[ + ] [ 16 / 100 ]-[13:09:29] [ - ]
4547|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/goldfish_competition.html ]
4548|_[ + ] Exploit::
4549|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4550|_[ + ] More details:: / - / , ISP:
4551|_[ + ] Found:: UNIDENTIFIED
4552
4553 _[ - ]::--------------------------------------------------------------------------------------------------------------
4554|_[ + ] [ 17 / 100 ]-[13:09:31] [ - ]
4555|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/feedingexperience.html ]
4556|_[ + ] Exploit::
4557|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4558|_[ + ] More details:: / - / , ISP:
4559|_[ + ] Found:: UNIDENTIFIED
4560
4561 _[ - ]::--------------------------------------------------------------------------------------------------------------
4562|_[ + ] [ 18 / 100 ]-[13:09:31] [ - ]
4563|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/guide.html ]
4564|_[ + ] Exploit::
4565|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4566|_[ + ] More details:: / - / , ISP:
4567|_[ + ] Found:: UNIDENTIFIED
4568
4569 _[ - ]::--------------------------------------------------------------------------------------------------------------
4570|_[ + ] [ 19 / 100 ]-[13:09:33] [ - ]
4571|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/goat.html ]
4572|_[ + ] Exploit::
4573|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4574|_[ + ] More details:: / - / , ISP:
4575|_[ + ] Found:: UNIDENTIFIED
4576
4577 _[ - ]::--------------------------------------------------------------------------------------------------------------
4578|_[ + ] [ 20 / 100 ]-[13:09:34] [ - ]
4579|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/cow.html ]
4580|_[ + ] Exploit::
4581|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4582|_[ + ] More details:: / - / , ISP:
4583|_[ + ] Found:: UNIDENTIFIED
4584
4585 _[ - ]::--------------------------------------------------------------------------------------------------------------
4586|_[ + ] [ 21 / 100 ]-[13:09:35] [ - ]
4587|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/geep2.html ]
4588|_[ + ] Exploit::
4589|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4590|_[ + ] More details:: / - / , ISP:
4591|_[ + ] Found:: UNIDENTIFIED
4592
4593 _[ - ]::--------------------------------------------------------------------------------------------------------------
4594|_[ + ] [ 22 / 100 ]-[13:09:36] [ - ]
4595|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/ferret.html ]
4596|_[ + ] Exploit::
4597|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4598|_[ + ] More details:: / - / , ISP:
4599|_[ + ] Found:: UNIDENTIFIED
4600
4601 _[ - ]::--------------------------------------------------------------------------------------------------------------
4602|_[ + ] [ 23 / 100 ]-[13:09:37] [ - ]
4603|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/kensyu.html ]
4604|_[ + ] Exploit::
4605|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4606|_[ + ] More details:: / - / , ISP:
4607|_[ + ] Found:: UNIDENTIFIED
4608
4609 _[ - ]::--------------------------------------------------------------------------------------------------------------
4610|_[ + ] [ 24 / 100 ]-[13:09:38] [ - ]
4611|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/2019_autumn_festival.html ]
4612|_[ + ] Exploit::
4613|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4614|_[ + ] More details:: / - / , ISP:
4615|_[ + ] Found:: UNIDENTIFIED
4616
4617 _[ - ]::--------------------------------------------------------------------------------------------------------------
4618|_[ + ] [ 25 / 100 ]-[13:09:39] [ - ]
4619|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/access.html ]
4620|_[ + ] Exploit::
4621|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4622|_[ + ] More details:: / - / , ISP:
4623|_[ + ] Found:: UNIDENTIFIED
4624
4625 _[ - ]::--------------------------------------------------------------------------------------------------------------
4626|_[ + ] [ 26 / 100 ]-[13:09:41] [ - ]
4627|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/news.html ]
4628|_[ + ] Exploit::
4629|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4630|_[ + ] More details:: / - / , ISP:
4631|_[ + ] Found:: UNIDENTIFIED
4632
4633 _[ - ]::--------------------------------------------------------------------------------------------------------------
4634|_[ + ] [ 27 / 100 ]-[13:09:42] [ - ]
4635|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/enjoy.html ]
4636|_[ + ] Exploit::
4637|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4638|_[ + ] More details:: / - / , ISP:
4639|_[ + ] Found:: UNIDENTIFIED
4640
4641 _[ - ]::--------------------------------------------------------------------------------------------------------------
4642|_[ + ] [ 28 / 100 ]-[13:09:43] [ - ]
4643|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/wood_chips.html ]
4644|_[ + ] Exploit::
4645|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4646|_[ + ] More details:: / - / , ISP:
4647|_[ + ] Found:: UNIDENTIFIED
4648
4649 _[ - ]::--------------------------------------------------------------------------------------------------------------
4650|_[ + ] [ 29 / 100 ]-[13:09:45] [ - ]
4651|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/about.html ]
4652|_[ + ] Exploit::
4653|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4654|_[ + ] More details:: / - / , ISP:
4655|_[ + ] Found:: UNIDENTIFIED
4656
4657 _[ - ]::--------------------------------------------------------------------------------------------------------------
4658|_[ + ] [ 30 / 100 ]-[13:09:46] [ - ]
4659|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/sitemap.html ]
4660|_[ + ] Exploit::
4661|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4662|_[ + ] More details:: / - / , ISP:
4663|_[ + ] Found:: UNIDENTIFIED
4664
4665 _[ - ]::--------------------------------------------------------------------------------------------------------------
4666|_[ + ] [ 31 / 100 ]-[13:09:47] [ - ]
4667|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/nighter.html ]
4668|_[ + ] Exploit::
4669|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4670|_[ + ] More details:: / - / , ISP:
4671|_[ + ] Found:: UNIDENTIFIED
4672
4673 _[ - ]::--------------------------------------------------------------------------------------------------------------
4674|_[ + ] [ 32 / 100 ]-[13:09:48] [ - ]
4675|_[ + ] Target:: [ http://www.worldranch.co.jp/zoo/worldranch.html ]
4676|_[ + ] Exploit::
4677|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4678|_[ + ] More details:: / - / , ISP:
4679|_[ + ] Found:: UNIDENTIFIED
4680
4681 _[ - ]::--------------------------------------------------------------------------------------------------------------
4682|_[ + ] [ 33 / 100 ]-[13:09:49] [ - ]
4683|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/sale_horse.html ]
4684|_[ + ] Exploit::
4685|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4686|_[ + ] More details:: / - / , ISP:
4687|_[ + ] Found:: UNIDENTIFIED
4688
4689 _[ - ]::--------------------------------------------------------------------------------------------------------------
4690|_[ + ] [ 34 / 100 ]-[13:09:50] [ - ]
4691|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/sweetpotato.html ]
4692|_[ + ] Exploit::
4693|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4694|_[ + ] More details:: / - / , ISP:
4695|_[ + ] Found:: UNIDENTIFIED
4696
4697 _[ - ]::--------------------------------------------------------------------------------------------------------------
4698|_[ + ] [ 35 / 100 ]-[13:09:51] [ - ]
4699|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/shetland.html ]
4700|_[ + ] Exploit::
4701|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4702|_[ + ] More details:: / - / , ISP:
4703|_[ + ] Found:: UNIDENTIFIED
4704
4705 _[ - ]::--------------------------------------------------------------------------------------------------------------
4706|_[ + ] [ 36 / 100 ]-[13:09:52] [ - ]
4707|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/taihi.html ]
4708|_[ + ] Exploit::
4709|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4710|_[ + ] More details:: / - / , ISP:
4711|_[ + ] Found:: UNIDENTIFIED
4712
4713 _[ - ]::--------------------------------------------------------------------------------------------------------------
4714|_[ + ] [ 37 / 100 ]-[13:09:53] [ - ]
4715|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/rabbit.html ]
4716|_[ + ] Exploit::
4717|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4718|_[ + ] More details:: / - / , ISP:
4719|_[ + ] Found:: UNIDENTIFIED
4720
4721 _[ - ]::--------------------------------------------------------------------------------------------------------------
4722|_[ + ] [ 38 / 100 ]-[13:09:55] [ - ]
4723|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/sheep.html ]
4724|_[ + ] Exploit::
4725|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4726|_[ + ] More details:: / - / , ISP:
4727|_[ + ] Found:: UNIDENTIFIED
4728
4729 _[ - ]::--------------------------------------------------------------------------------------------------------------
4730|_[ + ] [ 39 / 100 ]-[13:09:56] [ - ]
4731|_[ + ] Target:: [ http://worldranch.co.jp/contents/halloween_2017.html ]
4732|_[ + ] Exploit::
4733|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4734|_[ + ] More details:: / - / , ISP:
4735|_[ + ] Found:: UNIDENTIFIED
4736
4737 _[ - ]::--------------------------------------------------------------------------------------------------------------
4738|_[ + ] [ 40 / 100 ]-[13:09:57] [ - ]
4739|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/pig.html ]
4740|_[ + ] Exploit::
4741|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4742|_[ + ] More details:: / - / , ISP:
4743|_[ + ] Found:: UNIDENTIFIED
4744
4745 _[ - ]::--------------------------------------------------------------------------------------------------------------
4746|_[ + ] [ 41 / 100 ]-[13:09:58] [ - ]
4747|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/hamster.html ]
4748|_[ + ] Exploit::
4749|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4750|_[ + ] More details:: / - / , ISP:
4751|_[ + ] Found:: UNIDENTIFIED
4752
4753 _[ - ]::--------------------------------------------------------------------------------------------------------------
4754|_[ + ] [ 42 / 100 ]-[13:09:59] [ - ]
4755|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/napolitanmastiff.html ]
4756|_[ + ] Exploit::
4757|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4758|_[ + ] More details:: / - / , ISP:
4759|_[ + ] Found:: UNIDENTIFIED
4760
4761 _[ - ]::--------------------------------------------------------------------------------------------------------------
4762|_[ + ] [ 43 / 100 ]-[13:10:01] [ - ]
4763|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/eat.html ]
4764|_[ + ] Exploit::
4765|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4766|_[ + ] More details:: / - / , ISP:
4767|_[ + ] Found:: UNIDENTIFIED
4768
4769 _[ - ]::--------------------------------------------------------------------------------------------------------------
4770|_[ + ] [ 44 / 100 ]-[13:10:01] [ - ]
4771|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/bin.html ]
4772|_[ + ] Exploit::
4773|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4774|_[ + ] More details:: / - / , ISP:
4775|_[ + ] Found:: UNIDENTIFIED
4776
4777 _[ - ]::--------------------------------------------------------------------------------------------------------------
4778|_[ + ] [ 45 / 100 ]-[13:10:03] [ - ]
4779|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/mediainfo.html ]
4780|_[ + ] Exploit::
4781|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4782|_[ + ] More details:: / - / , ISP:
4783|_[ + ] Found:: UNIDENTIFIED
4784
4785 _[ - ]::--------------------------------------------------------------------------------------------------------------
4786|_[ + ] [ 46 / 100 ]-[13:10:04] [ - ]
4787|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/colledale.html ]
4788|_[ + ] Exploit::
4789|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4790|_[ + ] More details:: / - / , ISP:
4791|_[ + ] Found:: UNIDENTIFIED
4792
4793 _[ - ]::--------------------------------------------------------------------------------------------------------------
4794|_[ + ] [ 47 / 100 ]-[13:10:05] [ - ]
4795|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/privacy.html ]
4796|_[ + ] Exploit::
4797|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4798|_[ + ] More details:: / - / , ISP:
4799|_[ + ] Found:: UNIDENTIFIED
4800
4801 _[ - ]::--------------------------------------------------------------------------------------------------------------
4802|_[ + ] [ 48 / 100 ]-[13:10:07] [ - ]
4803|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/experience.html ]
4804|_[ + ] Exploit::
4805|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4806|_[ + ] More details:: / - / , ISP:
4807|_[ + ] Found:: UNIDENTIFIED
4808
4809 _[ - ]::--------------------------------------------------------------------------------------------------------------
4810|_[ + ] [ 49 / 100 ]-[13:10:08] [ - ]
4811|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/minipool.html ]
4812|_[ + ] Exploit::
4813|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4814|_[ + ] More details:: / - / , ISP:
4815|_[ + ] Found:: UNIDENTIFIED
4816
4817 _[ - ]::--------------------------------------------------------------------------------------------------------------
4818|_[ + ] [ 50 / 100 ]-[13:10:09] [ - ]
4819|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/pony_breeding.html ]
4820|_[ + ] Exploit::
4821|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4822|_[ + ] More details:: / - / , ISP:
4823|_[ + ] Found:: UNIDENTIFIED
4824
4825 _[ - ]::--------------------------------------------------------------------------------------------------------------
4826|_[ + ] [ 51 / 100 ]-[13:10:10] [ - ]
4827|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/continental.html ]
4828|_[ + ] Exploit::
4829|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4830|_[ + ] More details:: / - / , ISP:
4831|_[ + ] Found:: UNIDENTIFIED
4832
4833 _[ - ]::--------------------------------------------------------------------------------------------------------------
4834|_[ + ] [ 52 / 100 ]-[13:10:11] [ - ]
4835|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/waterfield.html ]
4836|_[ + ] Exploit::
4837|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4838|_[ + ] More details:: / - / , ISP:
4839|_[ + ] Found:: UNIDENTIFIED
4840
4841 _[ - ]::--------------------------------------------------------------------------------------------------------------
4842|_[ + ] [ 53 / 100 ]-[13:10:12] [ - ]
4843|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/faq.html ]
4844|_[ + ] Exploit::
4845|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4846|_[ + ] More details:: / - / , ISP:
4847|_[ + ] Found:: UNIDENTIFIED
4848
4849 _[ - ]::--------------------------------------------------------------------------------------------------------------
4850|_[ + ] [ 54 / 100 ]-[13:10:13] [ - ]
4851|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/percheron.html ]
4852|_[ + ] Exploit::
4853|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4854|_[ + ] More details:: / - / , ISP:
4855|_[ + ] Found:: UNIDENTIFIED
4856
4857 _[ - ]::--------------------------------------------------------------------------------------------------------------
4858|_[ + ] [ 55 / 100 ]-[13:10:14] [ - ]
4859|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/lpony_q.html ]
4860|_[ + ] Exploit::
4861|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4862|_[ + ] More details:: / - / , ISP:
4863|_[ + ] Found:: UNIDENTIFIED
4864
4865 _[ - ]::--------------------------------------------------------------------------------------------------------------
4866|_[ + ] [ 56 / 100 ]-[13:10:15] [ - ]
4867|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/soldout.html ]
4868|_[ + ] Exploit::
4869|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4870|_[ + ] More details:: / - / , ISP:
4871|_[ + ] Found:: UNIDENTIFIED
4872
4873 _[ - ]::--------------------------------------------------------------------------------------------------------------
4874|_[ + ] [ 57 / 100 ]-[13:10:17] [ - ]
4875|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/price.html ]
4876|_[ + ] Exploit::
4877|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4878|_[ + ] More details:: / - / , ISP:
4879|_[ + ] Found:: UNIDENTIFIED
4880
4881 _[ - ]::--------------------------------------------------------------------------------------------------------------
4882|_[ + ] [ 58 / 100 ]-[13:10:17] [ - ]
4883|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/falabella.html ]
4884|_[ + ] Exploit::
4885|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4886|_[ + ] More details:: / - / , ISP:
4887|_[ + ] Found:: UNIDENTIFIED
4888
4889 _[ - ]::--------------------------------------------------------------------------------------------------------------
4890|_[ + ] [ 59 / 100 ]-[13:10:19] [ - ]
4891|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/water_festival.html ]
4892|_[ + ] Exploit::
4893|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4894|_[ + ] More details:: / - / , ISP:
4895|_[ + ] Found:: UNIDENTIFIED
4896
4897 _[ - ]::--------------------------------------------------------------------------------------------------------------
4898|_[ + ] [ 60 / 100 ]-[13:10:20] [ - ]
4899|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/dantai.html ]
4900|_[ + ] Exploit::
4901|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4902|_[ + ] More details:: / - / , ISP:
4903|_[ + ] Found:: UNIDENTIFIED
4904
4905 _[ - ]::--------------------------------------------------------------------------------------------------------------
4906|_[ + ] [ 61 / 100 ]-[13:10:21] [ - ]
4907|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/ecofeed.html ]
4908|_[ + ] Exploit::
4909|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4910|_[ + ] More details:: / - / , ISP:
4911|_[ + ] Found:: UNIDENTIFIED
4912
4913 _[ - ]::--------------------------------------------------------------------------------------------------------------
4914|_[ + ] [ 62 / 100 ]-[13:10:22] [ - ]
4915|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/recruit.html ]
4916|_[ + ] Exploit::
4917|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4918|_[ + ] More details:: / - / , ISP:
4919|_[ + ] Found:: UNIDENTIFIED
4920
4921 _[ - ]::--------------------------------------------------------------------------------------------------------------
4922|_[ + ] [ 63 / 100 ]-[13:10:23] [ - ]
4923|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/farabella.html ]
4924|_[ + ] Exploit::
4925|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4926|_[ + ] More details:: / - / , ISP:
4927|_[ + ] Found:: UNIDENTIFIED
4928
4929 _[ - ]::--------------------------------------------------------------------------------------------------------------
4930|_[ + ] [ 64 / 100 ]-[13:10:25] [ - ]
4931|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/sale.html ]
4932|_[ + ] Exploit::
4933|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4934|_[ + ] More details:: / - / , ISP:
4935|_[ + ] Found:: UNIDENTIFIED
4936
4937 _[ - ]::--------------------------------------------------------------------------------------------------------------
4938|_[ + ] [ 65 / 100 ]-[13:10:26] [ - ]
4939|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/smallanimals.html ]
4940|_[ + ] Exploit::
4941|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4942|_[ + ] More details:: / - / , ISP:
4943|_[ + ] Found:: UNIDENTIFIED
4944
4945 _[ - ]::--------------------------------------------------------------------------------------------------------------
4946|_[ + ] [ 66 / 100 ]-[13:10:27] [ - ]
4947|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/arab.html ]
4948|_[ + ] Exploit::
4949|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4950|_[ + ] More details:: / - / , ISP:
4951|_[ + ] Found:: UNIDENTIFIED
4952
4953 _[ - ]::--------------------------------------------------------------------------------------------------------------
4954|_[ + ] [ 67 / 100 ]-[13:10:28] [ - ]
4955|_[ + ] Target:: [ https://worldranch.co.jp/contents/freshly_egg.html ]
4956|_[ + ] Exploit::
4957|_[ + ] Information Server:: , , IP:60.43.151.164:443
4958|_[ + ] More details:: / - / , ISP:
4959|_[ + ] Found:: UNIDENTIFIED
4960
4961 _[ - ]::--------------------------------------------------------------------------------------------------------------
4962|_[ + ] [ 68 / 100 ]-[13:10:29] [ - ]
4963|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/harrishawk.html ]
4964|_[ + ] Exploit::
4965|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4966|_[ + ] More details:: / - / , ISP:
4967|_[ + ] Found:: UNIDENTIFIED
4968
4969 _[ - ]::--------------------------------------------------------------------------------------------------------------
4970|_[ + ] [ 69 / 100 ]-[13:10:30] [ - ]
4971|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/item_001.html ]
4972|_[ + ] Exploit::
4973|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4974|_[ + ] More details:: / - / , ISP:
4975|_[ + ] Found:: UNIDENTIFIED
4976
4977 _[ - ]::--------------------------------------------------------------------------------------------------------------
4978|_[ + ] [ 70 / 100 ]-[13:10:31] [ - ]
4979|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/nighter2018.html ]
4980|_[ + ] Exploit::
4981|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4982|_[ + ] More details:: / - / , ISP:
4983|_[ + ] Found:: UNIDENTIFIED
4984
4985 _[ - ]::--------------------------------------------------------------------------------------------------------------
4986|_[ + ] [ 71 / 100 ]-[13:10:32] [ - ]
4987|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/price.html ]
4988|_[ + ] Exploit::
4989|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4990|_[ + ] More details:: / - / , ISP:
4991|_[ + ] Found:: UNIDENTIFIED
4992
4993 _[ - ]::--------------------------------------------------------------------------------------------------------------
4994|_[ + ] [ 72 / 100 ]-[13:10:33] [ - ]
4995|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/quarterhorse.html ]
4996|_[ + ] Exploit::
4997|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
4998|_[ + ] More details:: / - / , ISP:
4999|_[ + ] Found:: UNIDENTIFIED
5000
5001 _[ - ]::--------------------------------------------------------------------------------------------------------------
5002|_[ + ] [ 73 / 100 ]-[13:10:34] [ - ]
5003|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/item_004.html ]
5004|_[ + ] Exploit::
5005|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5006|_[ + ] More details:: / - / , ISP:
5007|_[ + ] Found:: UNIDENTIFIED
5008
5009 _[ - ]::--------------------------------------------------------------------------------------------------------------
5010|_[ + ] [ 74 / 100 ]-[13:10:35] [ - ]
5011|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/pony_shiiku.html ]
5012|_[ + ] Exploit::
5013|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5014|_[ + ] More details:: / - / , ISP:
5015|_[ + ] Found:: UNIDENTIFIED
5016
5017 _[ - ]::--------------------------------------------------------------------------------------------------------------
5018|_[ + ] [ 75 / 100 ]-[13:10:36] [ - ]
5019|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/athletic.html ]
5020|_[ + ] Exploit::
5021|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5022|_[ + ] More details:: / - / , ISP:
5023|_[ + ] Found:: UNIDENTIFIED
5024
5025 _[ - ]::--------------------------------------------------------------------------------------------------------------
5026|_[ + ] [ 76 / 100 ]-[13:10:37] [ - ]
5027|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/bird_house.html ]
5028|_[ + ] Exploit::
5029|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5030|_[ + ] More details:: / - / , ISP:
5031|_[ + ] Found:: UNIDENTIFIED
5032
5033 _[ - ]::--------------------------------------------------------------------------------------------------------------
5034|_[ + ] [ 77 / 100 ]-[13:10:38] [ - ]
5035|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/sanzo.html ]
5036|_[ + ] Exploit::
5037|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5038|_[ + ] More details:: / - / , ISP:
5039|_[ + ] Found:: UNIDENTIFIED
5040
5041 _[ - ]::--------------------------------------------------------------------------------------------------------------
5042|_[ + ] [ 78 / 100 ]-[13:10:39] [ - ]
5043|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/thoroughbred.html ]
5044|_[ + ] Exploit::
5045|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5046|_[ + ] More details:: / - / , ISP:
5047|_[ + ] Found:: UNIDENTIFIED
5048
5049 _[ - ]::--------------------------------------------------------------------------------------------------------------
5050|_[ + ] [ 79 / 100 ]-[13:10:40] [ - ]
5051|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/worldranch.html ]
5052|_[ + ] Exploit::
5053|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5054|_[ + ] More details:: / - / , ISP:
5055|_[ + ] Found:: UNIDENTIFIED
5056
5057 _[ - ]::--------------------------------------------------------------------------------------------------------------
5058|_[ + ] [ 80 / 100 ]-[13:10:41] [ - ]
5059|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/susugao.html ]
5060|_[ + ] Exploit::
5061|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5062|_[ + ] More details:: / - / , ISP:
5063|_[ + ] Found:: UNIDENTIFIED
5064
5065 _[ - ]::--------------------------------------------------------------------------------------------------------------
5066|_[ + ] [ 81 / 100 ]-[13:10:42] [ - ]
5067|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/eggtart.html ]
5068|_[ + ] Exploit::
5069|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5070|_[ + ] More details:: / - / , ISP:
5071|_[ + ] Found:: UNIDENTIFIED
5072
5073 _[ - ]::--------------------------------------------------------------------------------------------------------------
5074|_[ + ] [ 82 / 100 ]-[13:10:43] [ - ]
5075|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/schedule.html ]
5076|_[ + ] Exploit::
5077|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5078|_[ + ] More details:: / - / , ISP:
5079|_[ + ] Found:: UNIDENTIFIED
5080
5081 _[ - ]::--------------------------------------------------------------------------------------------------------------
5082|_[ + ] [ 83 / 100 ]-[13:10:44] [ - ]
5083|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/riku.html ]
5084|_[ + ] Exploit::
5085|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5086|_[ + ] More details:: / - / , ISP:
5087|_[ + ] Found:: UNIDENTIFIED
5088
5089 _[ - ]::--------------------------------------------------------------------------------------------------------------
5090|_[ + ] [ 84 / 100 ]-[13:10:45] [ - ]
5091|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/room.html ]
5092|_[ + ] Exploit::
5093|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5094|_[ + ] More details:: / - / , ISP:
5095|_[ + ] Found:: UNIDENTIFIED
5096
5097 _[ - ]::--------------------------------------------------------------------------------------------------------------
5098|_[ + ] [ 85 / 100 ]-[13:10:46] [ - ]
5099|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/contact.html ]
5100|_[ + ] Exploit::
5101|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5102|_[ + ] More details:: / - / , ISP:
5103|_[ + ] Found:: UNIDENTIFIED
5104
5105 _[ - ]::--------------------------------------------------------------------------------------------------------------
5106|_[ + ] [ 86 / 100 ]-[13:10:47] [ - ]
5107|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/rody.html ]
5108|_[ + ] Exploit::
5109|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5110|_[ + ] More details:: / - / , ISP:
5111|_[ + ] Found:: UNIDENTIFIED
5112
5113 _[ - ]::--------------------------------------------------------------------------------------------------------------
5114|_[ + ] [ 87 / 100 ]-[13:10:48] [ - ]
5115|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/nighter2019.html ]
5116|_[ + ] Exploit::
5117|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5118|_[ + ] More details:: / - / , ISP:
5119|_[ + ] Found:: UNIDENTIFIED
5120
5121 _[ - ]::--------------------------------------------------------------------------------------------------------------
5122|_[ + ] [ 88 / 100 ]-[13:10:49] [ - ]
5123|_[ + ] Target:: [ http://www.worldranch.co.jp/cat_house/cats_all.html ]
5124|_[ + ] Exploit::
5125|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5126|_[ + ] More details:: / - / , ISP:
5127|_[ + ] Found:: UNIDENTIFIED
5128
5129 _[ - ]::--------------------------------------------------------------------------------------------------------------
5130|_[ + ] [ 89 / 100 ]-[13:10:50] [ - ]
5131|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/charles.html ]
5132|_[ + ] Exploit::
5133|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5134|_[ + ] More details:: / - / , ISP:
5135|_[ + ] Found:: UNIDENTIFIED
5136
5137 _[ - ]::--------------------------------------------------------------------------------------------------------------
5138|_[ + ] [ 90 / 100 ]-[13:10:51] [ - ]
5139|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/onsen.html ]
5140|_[ + ] Exploit::
5141|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5142|_[ + ] More details:: / - / , ISP:
5143|_[ + ] Found:: UNIDENTIFIED
5144
5145 _[ - ]::--------------------------------------------------------------------------------------------------------------
5146|_[ + ] [ 91 / 100 ]-[13:10:52] [ - ]
5147|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/access.html ]
5148|_[ + ] Exploit::
5149|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5150|_[ + ] More details:: / - / , ISP:
5151|_[ + ] Found:: UNIDENTIFIED
5152
5153 _[ - ]::--------------------------------------------------------------------------------------------------------------
5154|_[ + ] [ 92 / 100 ]-[13:10:53] [ - ]
5155|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/item_003.html ]
5156|_[ + ] Exploit::
5157|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5158|_[ + ] More details:: / - / , ISP:
5159|_[ + ] Found:: UNIDENTIFIED
5160
5161 _[ - ]::--------------------------------------------------------------------------------------------------------------
5162|_[ + ] [ 93 / 100 ]-[13:10:54] [ - ]
5163|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/deliver.html ]
5164|_[ + ] Exploit::
5165|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5166|_[ + ] More details:: / - / , ISP:
5167|_[ + ] Found:: UNIDENTIFIED
5168
5169 _[ - ]::--------------------------------------------------------------------------------------------------------------
5170|_[ + ] [ 94 / 100 ]-[13:10:55] [ - ]
5171|_[ + ] Target:: [ http://www.worldranch.co.jp/dog_corner/winston.html ]
5172|_[ + ] Exploit::
5173|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5174|_[ + ] More details:: / - / , ISP:
5175|_[ + ] Found:: UNIDENTIFIED
5176
5177 _[ - ]::--------------------------------------------------------------------------------------------------------------
5178|_[ + ] [ 95 / 100 ]-[13:10:55] [ - ]
5179|_[ + ] Target:: [ http://www.worldranch.co.jp/stay/privacy.html ]
5180|_[ + ] Exploit::
5181|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5182|_[ + ] More details:: / - / , ISP:
5183|_[ + ] Found:: UNIDENTIFIED
5184
5185 _[ - ]::--------------------------------------------------------------------------------------------------------------
5186|_[ + ] [ 96 / 100 ]-[13:10:56] [ - ]
5187|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/sale_miniaturehorse.html ]
5188|_[ + ] Exploit::
5189|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5190|_[ + ] More details:: / - / , ISP:
5191|_[ + ] Found:: UNIDENTIFIED
5192
5193 _[ - ]::--------------------------------------------------------------------------------------------------------------
5194|_[ + ] [ 97 / 100 ]-[13:10:57] [ - ]
5195|_[ + ] Target:: [ http://www.worldranch.co.jp/contents/eurasiaeagleworm.html ]
5196|_[ + ] Exploit::
5197|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5198|_[ + ] More details:: / - / , ISP:
5199|_[ + ] Found:: UNIDENTIFIED
5200
5201 _[ - ]::--------------------------------------------------------------------------------------------------------------
5202|_[ + ] [ 98 / 100 ]-[13:10:58] [ - ]
5203|_[ + ] Target:: [ http://www.worldranch.co.jp/WRHC/appaloosa.html ]
5204|_[ + ] Exploit::
5205|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5206|_[ + ] More details:: / - / , ISP:
5207|_[ + ] Found:: UNIDENTIFIED
5208
5209 _[ - ]::--------------------------------------------------------------------------------------------------------------
5210|_[ + ] [ 99 / 100 ]-[13:11:00] [ - ]
5211|_[ + ] Target:: [ http://www.worldranch.co.jp/petsale/contact.html ]
5212|_[ + ] Exploit::
5213|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Apache/2.2.15 (CentOS) , IP:60.43.151.164:80
5214|_[ + ] More details:: / - / , ISP:
5215|_[ + ] Found:: UNIDENTIFIED
5216
5217[ INFO ] [ Shutting down ]
5218[ INFO ] [ End of process INURLBR at [05-10-2019 13:11:00]
5219[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
5220[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/worldranch.co.jp/output/inurlbr-worldranch.co.jp ]
5221|_________________________________________________________________________________________
5222
5223\_________________________________________________________________________________________/
5224#######################################################################################################################################
5225--------------------------------------------------------
5226<<<Yasuo discovered following vulnerable applications>>>
5227--------------------------------------------------------
5228+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
5229| App Name | URL to Application | Potential Exploit | Username | Password |
5230+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
5231| phpMyAdmin | http://60.43.151.164:80/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
5232+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
5233#######################################################################################################################################
5234Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:13 EDT
5235Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
5236Host is up (0.27s latency).
5237Not shown: 406 closed ports, 67 filtered ports
5238Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5239PORT STATE SERVICE
524021/tcp open ftp
524180/tcp open http
5242110/tcp open pop3
5243143/tcp open imap
5244443/tcp open https
5245587/tcp open submission
5246993/tcp open imaps
5247995/tcp open pop3s
52482100/tcp open amiganetfs
52498400/tcp open cvd
5250
5251Nmap done: 1 IP address (1 host up) scanned in 4.14 seconds
5252#######################################################################################################################################
5253Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:13 EDT
5254Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
5255Host is up (0.047s latency).
5256Not shown: 2 filtered ports
5257PORT STATE SERVICE
525853/udp open|filtered domain
525967/udp open|filtered dhcps
526068/udp open|filtered dhcpc
526169/udp open|filtered tftp
526288/udp open|filtered kerberos-sec
5263123/udp open|filtered ntp
5264139/udp open|filtered netbios-ssn
5265161/udp open|filtered snmp
5266162/udp open|filtered snmptrap
5267389/udp open|filtered ldap
5268500/udp open|filtered isakmp
5269520/udp open|filtered route
52702049/udp open|filtered nfs
5271
5272Nmap done: 1 IP address (1 host up) scanned in 2.00 seconds
5273#######################################################################################################################################
5274Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:13 EDT
5275NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
5276NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
5277NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
5278Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
5279Host is up (0.24s latency).
5280
5281PORT STATE SERVICE VERSION
528221/tcp open ftp vsftpd 2.2.2
5283| ftp-brute:
5284| Accounts: No valid accounts found
5285|_ Statistics: Performed 4509 guesses in 444 seconds, average tps: 9.9
5286| vulscan: VulDB - https://vuldb.com:
5287| [43110] vsftpd up to 2.0.4 Memory Leak denial of service
5288|
5289| MITRE CVE - https://cve.mitre.org:
5290| [CVE-2011-2189] net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
5291| [CVE-2011-0762] The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
5292| [CVE-2009-5029] Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
5293| [CVE-2008-4969] ltp-network-test 20060918 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/vsftpd.conf, (b) /tmp/udp/2/*, (c) /tmp/tcp/2/*, (d) /tmp/udp/3/*, (e) /tmp/tcp/3/*, (f) /tmp/nfs_fsstress.udp.2.log, (g) /tmp/nfs_fsstress.udp.3.log, (h) /tmp/nfs_fsstress.tcp.2.log, (i) /tmp/nfs_fsstress.tcp.3.log, and (j) /tmp/nfs_fsstress.sardata temporary files, related to the (1) ftp_setup_vsftp_conf and (2) nfs_fsstress.sh scripts.
5294| [CVE-2008-2375] Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
5295| [CVE-2007-5962] Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
5296| [CVE-2007-4322] BlockHosts before 2.0.4 does not properly parse (1) sshd and (2) vsftpd log files, which allows remote attackers to add arbitrary deny entries to the /etc/hosts.allow file and cause a denial of service by adding arbitrary IP addresses to a daemon log file, as demonstrated by connecting through ssh with a client protocol version identification containing an IP address string, or connecting through ftp with a username containing an IP address string, different vectors than CVE-2007-2765.
5297|
5298| SecurityFocus - https://www.securityfocus.com/bid/:
5299| [82285] Vsftpd CVE-2004-0042 Remote Security Vulnerability
5300| [72451] vsftpd CVE-2015-1419 Security Bypass Vulnerability
5301| [51013] vsftpd '__tzfile_read()' Function Heap Based Buffer Overflow Vulnerability
5302| [48539] vsftpd Compromised Source Packages Backdoor Vulnerability
5303| [46617] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
5304| [41443] Vsftpd Webmin Module Multiple Unspecified Vulnerabilities
5305| [30364] vsftpd FTP Server Pluggable Authentication Module (PAM) Remote Denial of Service Vulnerability
5306| [29322] vsftpd FTP Server 'deny_file' Option Remote Denial of Service Vulnerability
5307| [10394] Vsftpd Listener Denial of Service Vulnerability
5308| [7253] Red Hat Linux 9 vsftpd Compiling Error Weakness
5309|
5310| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5311| [68366] vsftpd package backdoor
5312| [65873] vsftpd vsf_filename_passes_filter denial of service
5313| [55148] VSFTPD-WEBMIN-MODULE unknown unspecified
5314| [43685] vsftpd authentication attempts denial of service
5315| [42593] vsftpd deny_file denial of service
5316| [16222] vsftpd connection denial of service
5317| [14844] vsftpd message allows attacker to obtain username
5318| [11729] Red Hat Linux vsftpd FTP daemon tcp_wrapper could allow an attacker to gain access to server
5319|
5320| Exploit-DB - https://www.exploit-db.com:
5321| [17491] VSFTPD 2.3.4 - Backdoor Command Execution
5322| [16270] vsftpd 2.3.2 - Denial of Service Vulnerability
5323| [5814] vsftpd 2.0.5 (CWD) Remote Memory Consumption Exploit (post auth)
5324|
5325| OpenVAS (Nessus) - http://www.openvas.org:
5326| [70770] Gentoo Security Advisory GLSA 201110-07 (vsftpd)
5327| [70399] Debian Security Advisory DSA 2305-1 (vsftpd)
5328|
5329| SecurityTracker - https://www.securitytracker.com:
5330| [1025186] vsftpd vsf_filename_passes_filter() Bug Lets Remote Authenticated Users Deny Service
5331| [1020546] vsftpd Memory Leak When Invalid Authentication Attempts Occur Lets Remote Authenticated Users Deny Service
5332| [1020079] vsftpd Memory Leak in 'deny_file' Option Lets Remote Authenticated Users Deny Service
5333| [1008628] vsftpd Discloses Whether Usernames are Valid or Not
5334|
5335| OSVDB - http://www.osvdb.org:
5336| [73573] vsftpd on vsftpd.beasts.org Trojaned Distribution
5337| [73340] vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
5338| [61362] Vsftpd Webmin Module Unspecified Issues
5339| [46930] Red Hat Linux vsftpd w/ PAM Memory Exhaustion Remote DoS
5340| [45626] vsftpd deny_file Option Crafted FTP Data Remote Memory Exhaustion DoS
5341| [36515] BlockHosts sshd/vsftpd hosts.allow Arbitrary Deny Entry Manipulation
5342| [28610] vsftpd SIGURG Handler Unspecified Issue
5343| [28609] vsftpd tunable_chroot_local_user Filesystem Root Access
5344| [6861] vsftpd Login Error Message Username Enumeration
5345| [6306] vsftpd Connection Handling DoS
5346| [4564] vsftpd on Red Hat Linux Restricted Access Failure
5347|_
5348Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5349Aggressive OS guesses: Linux 2.6.32 (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 2.6.32 - 3.1 (92%), Linux 3.5 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.39 (91%)
5350No exact OS matches for host (test conditions non-ideal).
5351Network Distance: 24 hops
5352Service Info: OS: Unix
5353
5354TRACEROUTE (using port 21/tcp)
5355HOP RTT ADDRESS
53561 64.92 ms 10.251.204.1
53572 81.01 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
53583 81.03 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
53594 80.98 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
53605 81.01 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
53616 81.07 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
53627 81.10 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
53638 81.10 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
53649 81.08 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
536510 47.22 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
536611 45.59 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
536712 40.26 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
536813 262.40 ms ae-4.r01.nycmny17.us.bb.gin.ntt.net (129.250.4.174)
536914 34.99 ms ae-2.r24.nycmny01.us.bb.gin.ntt.net (129.250.4.40)
537015 83.99 ms ae-4.r22.sttlwa01.us.bb.gin.ntt.net (129.250.4.13)
537116 252.16 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
537217 252.21 ms ae-2.r02.tokyjp05.jp.bb.gin.ntt.net (129.250.3.22)
537318 252.18 ms ae-0.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.18)
537419 252.20 ms 60.37.54.202
537520 229.53 ms 114.147.63.122
537621 242.07 ms 122.28.179.202
537722 258.51 ms 180.8.125.226
537823 274.04 ms 153.146.149.89
537924 281.48 ms c15t2a7n.mwprem.net (60.43.151.164)
5380#######################################################################################################################################
5381Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:22 EDT
5382NSE: Loaded 164 scripts for scanning.
5383NSE: Script Pre-scanning.
5384Initiating NSE at 12:22
5385Completed NSE at 12:22, 0.00s elapsed
5386Initiating NSE at 12:22
5387Completed NSE at 12:22, 0.00s elapsed
5388Initiating Parallel DNS resolution of 1 host. at 12:22
5389Completed Parallel DNS resolution of 1 host. at 12:22, 0.02s elapsed
5390Initiating SYN Stealth Scan at 12:22
5391Scanning c15t2a7n.mwprem.net (60.43.151.164) [1 port]
5392Discovered open port 80/tcp on 60.43.151.164
5393Completed SYN Stealth Scan at 12:22, 0.26s elapsed (1 total ports)
5394Initiating Service scan at 12:22
5395Scanning 1 service on c15t2a7n.mwprem.net (60.43.151.164)
5396Completed Service scan at 12:22, 6.50s elapsed (1 service on 1 host)
5397Initiating OS detection (try #1) against c15t2a7n.mwprem.net (60.43.151.164)
5398Retrying OS detection (try #2) against c15t2a7n.mwprem.net (60.43.151.164)
5399Initiating Traceroute at 12:22
5400Completed Traceroute at 12:22, 0.48s elapsed
5401Initiating Parallel DNS resolution of 24 hosts. at 12:22
5402Completed Parallel DNS resolution of 24 hosts. at 12:22, 0.86s elapsed
5403NSE: Script scanning 60.43.151.164.
5404Initiating NSE at 12:22
5405Completed NSE at 12:23, 57.19s elapsed
5406Initiating NSE at 12:23
5407Completed NSE at 12:23, 1.07s elapsed
5408Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
5409Host is up (0.25s latency).
5410
5411PORT STATE SERVICE VERSION
541280/tcp open http Apache httpd 2.2.15 ((CentOS))
5413| http-brute:
5414|_ Path "/" does not require authentication
5415|_http-chrono: Request times for /; avg: 704.65ms; min: 646.79ms; max: 747.84ms
5416|_http-csrf: Couldn't find any CSRF vulnerabilities.
5417|_http-date: Sat, 05 Oct 2019 16:22:28 GMT; -2s from local time.
5418|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
5419|_http-dombased-xss: Couldn't find any DOM based XSS.
5420|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
5421|_http-errors: Couldn't find any error pages.
5422|_http-exif-spider: ERROR: Script execution failed (use -d to debug)
5423|_http-feed: Couldn't find any feeds.
5424|_http-fetch: Please enter the complete path of the directory to save data in.
5425| http-headers:
5426| Date: Sat, 05 Oct 2019 16:22:27 GMT
5427| Server: Apache/2.2.15 (CentOS)
5428| Last-Modified: Sat, 01 Dec 2012 00:10:17 GMT
5429| ETag: "e143f-5c0-4cfbf5749cc40"
5430| Accept-Ranges: bytes
5431| Content-Length: 1472
5432| Connection: close
5433| Content-Type: text/html
5434|
5435|_ (Request type: HEAD)
5436|_http-jsonp-detection: Couldn't find any JSONP endpoints.
5437| http-methods:
5438| Supported Methods: GET HEAD POST OPTIONS TRACE
5439|_ Potentially risky methods: TRACE
5440|_http-mobileversion-checker: No mobile version detected.
5441| http-php-version: Logo query returned unknown hash ac73bb56dcb3032c4d3315e07e078323
5442|_Credits query returned unknown hash ac73bb56dcb3032c4d3315e07e078323
5443|_http-security-headers:
5444|_http-server-header: Apache/2.2.15 (CentOS)
5445| http-sitemap-generator:
5446| Directory structure:
5447| /
5448| Other: 1; jpg: 2
5449| Longest directory structure:
5450| Depth: 0
5451| Dir: /
5452| Total files found (by extension):
5453|_ Other: 1; jpg: 2
5454|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
5455|_http-title: New Server -- DOMAINNAME
5456| http-trace: TRACE is enabled
5457| Headers:
5458| Date: Sat, 05 Oct 2019 16:22:21 GMT
5459| Server: Apache/2.2.15 (CentOS)
5460| Connection: close
5461| Transfer-Encoding: chunked
5462|_Content-Type: message/http
5463| http-vhosts:
5464|_127 names had status 200
5465|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
5466|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
5467|_http-xssed: No previously reported XSS vuln.
5468| vulners:
5469| cpe:/a:apache:http_server:2.2.15:
5470| CVE-2011-3192 7.8 https://vulners.com/cve/CVE-2011-3192
5471| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
5472| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
5473| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
5474| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
5475| CVE-2013-2249 7.5 https://vulners.com/cve/CVE-2013-2249
5476| CVE-2012-0883 6.9 https://vulners.com/cve/CVE-2012-0883
5477| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
5478| CVE-2017-12171 6.4 https://vulners.com/cve/CVE-2017-12171
5479| CVE-2013-1862 5.1 https://vulners.com/cve/CVE-2013-1862
5480| CVE-2014-0231 5.0 https://vulners.com/cve/CVE-2014-0231
5481| CVE-2014-0098 5.0 https://vulners.com/cve/CVE-2014-0098
5482| CVE-2013-6438 5.0 https://vulners.com/cve/CVE-2013-6438
5483| CVE-2012-4557 5.0 https://vulners.com/cve/CVE-2012-4557
5484| CVE-2011-3368 5.0 https://vulners.com/cve/CVE-2011-3368
5485| CVE-2010-2068 5.0 https://vulners.com/cve/CVE-2010-2068
5486| CVE-2010-1452 5.0 https://vulners.com/cve/CVE-2010-1452
5487| CVE-2012-0031 4.6 https://vulners.com/cve/CVE-2012-0031
5488| CVE-2011-3607 4.4 https://vulners.com/cve/CVE-2011-3607
5489| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
5490| CVE-2013-1896 4.3 https://vulners.com/cve/CVE-2013-1896
5491| CVE-2012-4558 4.3 https://vulners.com/cve/CVE-2012-4558
5492| CVE-2012-3499 4.3 https://vulners.com/cve/CVE-2012-3499
5493| CVE-2012-0053 4.3 https://vulners.com/cve/CVE-2012-0053
5494| CVE-2011-4317 4.3 https://vulners.com/cve/CVE-2011-4317
5495| CVE-2011-3639 4.3 https://vulners.com/cve/CVE-2011-3639
5496| CVE-2011-3348 4.3 https://vulners.com/cve/CVE-2011-3348
5497| CVE-2011-0419 4.3 https://vulners.com/cve/CVE-2011-0419
5498| CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
5499| CVE-2012-2687 2.6 https://vulners.com/cve/CVE-2012-2687
5500|_ CVE-2011-4415 1.2 https://vulners.com/cve/CVE-2011-4415
5501| vulscan: VulDB - https://vuldb.com:
5502| [75668] Apache Sling API/Sling Servlets Post up to 2.2.1 HtmlResponse cross site scripting
5503| [65386] Apache Solr up to 2.2.1 on TYPO3 cross site scripting
5504| [65385] Apache Solr up to 2.2.1 on TYPO3 unknown vulnerability
5505| [64466] Apache OpenJPA up to 2.2.1 Serialization memory corruption
5506| [63089] Apache HTTP Server up to 2.2.13 mod_proxy_ajp denial of service
5507| [59850] Apache Geronimo up to 2.2.1 denial of service
5508| [57435] Apache Struts up to 2.2.1.1 FileHandler.java cross site scripting
5509| [57425] Apache Struts up to 2.2.1.1 cross site scripting
5510| [54166] Apache HTTP Server up to 2.2.12 mod_cache Crash denial of service
5511| [49856] Apache HTTP Server 2.2.13 mod_proxy_ftp ap_proxy_ftp_handler denial of service
5512| [3130] Apache OpenOffice 2.2.1 RTF Document Heap-based memory corruption
5513| [135663] Apache Camel up to 2.23.x JSON-lib Library XML Data XML External Entity
5514| [134290] Apache UIMA DUCC up to 2.2.2 cross site scripting
5515| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
5516| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
5517| [124152] Apache Camel Mail up to 2.22.0 Path directory traversal
5518| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
5519| [122456] Apache Camel up to 2.20.3/2.21.0 XSD Validator XML External Entity
5520| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
5521| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
5522| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
5523| [102697] Apache HTTP Server 2.2.24/2.2.32 HTTP Strict Parsing ap_find_token Request Header memory corruption
5524| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
5525| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
5526| [100162] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Commons Collections privilege escalation
5527| [100160] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Trinidad unknown vulnerability
5528| [87540] Apache Ambari up to 2.2.0 File Browser View information disclosure
5529| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
5530| [65313] Apache Sling 2.2.0/2.3.0 AbstractCreateOperation.java deepGetOrCreateNode denial of service
5531| [9891] Apache HTTP Server 2.2.22 suEXEC Feature .htaccess information disclosure
5532| [64485] Apache Struts up to 2.2.3.0 privilege escalation
5533| [64457] Apache Struts up to 2.2.3.0 cross site scripting
5534| [63646] Apache HTTP Server up to 2.2.23/2.4.3 mod_proxy_balancer.c balancer_handler cross site scripting
5535| [60352] Apache Struts up to 2.2.3 memory corruption
5536| [4583] Apache HTTP Server up to 2.2.21 Threaded MPM denial of service
5537| [4582] Apache HTTP Server up to 2.2.21 protocol.c information disclosure
5538| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
5539| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
5540| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
5541| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
5542| [4352] Apache HTTP Server 2.2.x APR apr_fnmatch denial of service
5543| [54394] Apache CXF up to 2.2.8 Memory Consumption denial of service
5544| [40502] Apache HTTP Server up to 2.2.5 mod_proxy_balancer memory corruption
5545| [40501] Apache HTTP Server 2.2.6 mod_proxy_balancer cross site request forgery
5546| [40398] Apache HTTP Server up to 2.2 mod_proxy_balancer cross site scripting
5547| [40397] Apache HTTP Server up to 2.2 mod_proxy_balancer balancer_handler denial of service
5548| [40221] Apache HTTP Server 2.2.6 information disclosure
5549|
5550| MITRE CVE - https://cve.mitre.org:
5551| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
5552| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
5553| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
5554| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
5555| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
5556| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
5557| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
5558| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
5559| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
5560| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
5561| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
5562| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
5563| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
5564| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
5565| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
5566| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
5567| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
5568| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
5569| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
5570| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
5571| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
5572| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
5573| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
5574|
5575| SecurityFocus - https://www.securityfocus.com/bid/:
5576| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
5577| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
5578|
5579| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5580| [75211] Debian GNU/Linux apache 2 cross-site scripting
5581|
5582| Exploit-DB - https://www.exploit-db.com:
5583| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
5584| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
5585| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
5586| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
5587| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
5588| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
5589| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
5590| [17691] Apache Struts < 2.2.0 - Remote Command Execution
5591| [15319] Apache 2.2 (Windows) Local Denial of Service
5592| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
5593|
5594| OpenVAS (Nessus) - http://www.openvas.org:
5595| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
5596|
5597| SecurityTracker - https://www.securitytracker.com:
5598| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
5599| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
5600| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
5601| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
5602| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
5603|
5604| OSVDB - http://www.osvdb.org:
5605| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
5606|_
5607Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5608Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 - 3.1 (93%), Linux 3.5 (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 3.11 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%)
5609No exact OS matches for host (test conditions non-ideal).
5610Uptime guess: 26.315 days (since Mon Sep 9 04:49:51 2019)
5611Network Distance: 24 hops
5612TCP Sequence Prediction: Difficulty=258 (Good luck!)
5613IP ID Sequence Generation: All zeros
5614
5615TRACEROUTE (using port 80/tcp)
5616HOP RTT ADDRESS
56171 48.64 ms 10.251.204.1
56182 67.29 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
56193 67.35 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
56204 67.34 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
56215 67.47 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
56226 67.44 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
56237 67.46 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
56248 67.40 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
56259 67.43 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
562610 27.80 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
562711 54.40 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
562812 52.47 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
562913 262.24 ms ae-6.r00.nycmny17.us.bb.gin.ntt.net (129.250.3.152)
563014 49.98 ms ae-7.r24.nycmny01.us.bb.gin.ntt.net (129.250.3.48)
563115 100.85 ms ae-4.r22.sttlwa01.us.bb.gin.ntt.net (129.250.4.13)
563216 262.12 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
563317 262.14 ms ae-2.r02.tokyjp05.jp.bb.gin.ntt.net (129.250.3.22)
563418 262.11 ms ae-1.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.22)
563519 242.67 ms 122.1.245.126
563620 262.03 ms 114.147.63.126
563721 261.59 ms 122.28.179.202
563822 259.26 ms 180.8.125.226
563923 311.29 ms 153.146.149.89
564024 302.97 ms c15t2a7n.mwprem.net (60.43.151.164)
5641
5642NSE: Script Post-scanning.
5643Initiating NSE at 12:23
5644Completed NSE at 12:23, 0.00s elapsed
5645Initiating NSE at 12:23
5646Completed NSE at 12:23, 0.00s elapsed
5647#######################################################################################################################################
5648
5649wig - WebApp Information Gatherer
5650
5651
5652Scanning http://60.43.151.164...
5653_________________ SITE INFO __________________
5654IP Title
565560.43.151.164 New Server -- DOMAINNAME
5656
5657__________________ VERSION ___________________
5658Name Versions Type
5659phpMyAdmin 4.0.10.19 CMS
5660Apache 2.2.15 Platform
5661PHP 5.3.3 Platform
5662CentOS 6.6 | 6.8 OS
5663
5664______________________________________________
5665Time: 31.7 sec Urls: 435 Fingerprints: 40401
5666#######################################################################################################################################
5667HTTP/1.1 200 OK
5668Date: Sat, 05 Oct 2019 16:23:57 GMT
5669Server: Apache/2.2.15 (CentOS)
5670Last-Modified: Sat, 01 Dec 2012 00:10:17 GMT
5671ETag: "e143f-5c0-4cfbf5749cc40"
5672Accept-Ranges: bytes
5673Content-Length: 1472
5674Content-Type: text/html
5675
5676HTTP/1.1 200 OK
5677Date: Sat, 05 Oct 2019 16:23:57 GMT
5678Server: Apache/2.2.15 (CentOS)
5679Last-Modified: Sat, 01 Dec 2012 00:10:17 GMT
5680ETag: "e143f-5c0-4cfbf5749cc40"
5681Accept-Ranges: bytes
5682Content-Length: 1472
5683Content-Type: text/html
5684
5685Allow: GET,HEAD,POST,OPTIONS,TRACE
5686#######################################################################################################################################
5687Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:24 EDT
5688Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
5689Host is up (0.21s latency).
5690
5691PORT STATE SERVICE VERSION
5692110/tcp open pop3 Dovecot pop3d
5693| pop3-brute:
5694| Accounts: No valid accounts found
5695| Statistics: Performed 65 guesses in 56 seconds, average tps: 1.1
5696|_ ERROR: Failed to connect.
5697|_pop3-capabilities: USER SASL(PLAIN LOGIN) STLS RESP-CODES PIPELINING UIDL TOP CAPA
5698| vulscan: VulDB - https://vuldb.com:
5699| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
5700| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
5701| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
5702| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
5703| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
5704| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
5705| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
5706| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
5707| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
5708| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
5709| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
5710| [69835] Dovecot 2.2.0/2.2.1 denial of service
5711| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
5712| [65684] Dovecot up to 2.2.6 unknown vulnerability
5713| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
5714| [63692] Dovecot up to 2.0.15 spoofing
5715| [7062] Dovecot 2.1.10 mail-search.c denial of service
5716| [57517] Dovecot up to 2.0.12 Login directory traversal
5717| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
5718| [57515] Dovecot up to 2.0.12 Crash denial of service
5719| [54944] Dovecot up to 1.2.14 denial of service
5720| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
5721| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
5722| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
5723| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
5724| [53277] Dovecot up to 1.2.10 denial of service
5725| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
5726| [45256] Dovecot up to 1.1.5 directory traversal
5727| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
5728| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
5729| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
5730| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
5731| [40356] Dovecot 1.0.9 Cache unknown vulnerability
5732| [38222] Dovecot 1.0.2 directory traversal
5733| [36376] Dovecot up to 1.0.x directory traversal
5734| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
5735|
5736| MITRE CVE - https://cve.mitre.org:
5737| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
5738| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
5739| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
5740| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
5741| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
5742| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
5743| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
5744| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
5745| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
5746| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
5747| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
5748| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
5749| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
5750| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
5751| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
5752| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
5753| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
5754| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
5755| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
5756| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
5757| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
5758| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
5759| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
5760| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
5761| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
5762| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
5763| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
5764| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
5765| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
5766| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
5767| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
5768| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
5769| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
5770| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
5771| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
5772| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
5773| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
5774|
5775| SecurityFocus - https://www.securityfocus.com/bid/:
5776| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
5777| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
5778| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
5779| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
5780| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
5781| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
5782| [67306] Dovecot Denial of Service Vulnerability
5783| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
5784| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
5785| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
5786| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
5787| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
5788| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
5789| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
5790| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
5791| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
5792| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
5793| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
5794| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
5795| [39838] tpop3d Remote Denial of Service Vulnerability
5796| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
5797| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
5798| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
5799| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
5800| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
5801| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
5802| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
5803| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
5804| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
5805| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
5806| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
5807| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
5808| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
5809| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
5810| [17961] Dovecot Remote Information Disclosure Vulnerability
5811| [16672] Dovecot Double Free Denial of Service Vulnerability
5812| [8495] akpop3d User Name SQL Injection Vulnerability
5813| [8473] Vpop3d Remote Denial Of Service Vulnerability
5814| [3990] ZPop3D Bad Login Logging Failure Vulnerability
5815| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
5816|
5817| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5818| [86382] Dovecot POP3 Service denial of service
5819| [84396] Dovecot IMAP APPEND denial of service
5820| [80453] Dovecot mail-search.c denial of service
5821| [71354] Dovecot SSL Common Name (CN) weak security
5822| [67675] Dovecot script-login security bypass
5823| [67674] Dovecot script-login directory traversal
5824| [67589] Dovecot header name denial of service
5825| [63267] Apple Mac OS X Dovecot information disclosure
5826| [62340] Dovecot mailbox security bypass
5827| [62339] Dovecot IMAP or POP3 denial of service
5828| [62256] Dovecot mailbox security bypass
5829| [62255] Dovecot ACL entry security bypass
5830| [60639] Dovecot ACL plugin weak security
5831| [57267] Apple Mac OS X Dovecot Kerberos security bypass
5832| [56763] Dovecot header denial of service
5833| [54363] Dovecot base_dir privilege escalation
5834| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
5835| [46323] Dovecot dovecot.conf information disclosure
5836| [46227] Dovecot message parsing denial of service
5837| [45669] Dovecot ACL mailbox security bypass
5838| [45667] Dovecot ACL plugin rights security bypass
5839| [41085] Dovecot TAB characters authentication bypass
5840| [41009] Dovecot mail_extra_groups option unauthorized access
5841| [39342] Dovecot LDAP auth cache configuration security bypass
5842| [35767] Dovecot ACL plugin security bypass
5843| [34082] Dovecot mbox-storage.c directory traversal
5844| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
5845| [26578] Cyrus IMAP pop3d buffer overflow
5846| [26536] Dovecot IMAP LIST information disclosure
5847| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
5848| [24709] Dovecot APPEND command denial of service
5849| [13018] akpop3d authentication code SQL injection
5850| [7345] Slackware Linux imapd and ipop3d core dump
5851| [6269] imap, ipop2d and ipop3d buffer overflows
5852| [5923] Linuxconf vpop3d symbolic link
5853| [4918] IPOP3D, Buffer overflow attack
5854| [1560] IPOP3D, user login successful
5855| [1559] IPOP3D user login to remote host successful
5856| [1525] IPOP3D, user logout
5857| [1524] IPOP3D, user auto-logout
5858| [1523] IPOP3D, user login failure
5859| [1522] IPOP3D, brute force attack
5860| [1521] IPOP3D, user kiss of death logout
5861| [418] pop3d mktemp creates insecure temporary files
5862|
5863| Exploit-DB - https://www.exploit-db.com:
5864| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
5865| [23053] Vpop3d Remote Denial of Service Vulnerability
5866| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
5867| [11893] tPop3d 1.5.3 DoS
5868| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
5869| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
5870| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
5871| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
5872|
5873| OpenVAS (Nessus) - http://www.openvas.org:
5874| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
5875| [901025] Dovecot Version Detection
5876| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
5877| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
5878| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
5879| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
5880| [870607] RedHat Update for dovecot RHSA-2011:0600-01
5881| [870471] RedHat Update for dovecot RHSA-2011:1187-01
5882| [870153] RedHat Update for dovecot RHSA-2008:0297-02
5883| [863272] Fedora Update for dovecot FEDORA-2011-7612
5884| [863115] Fedora Update for dovecot FEDORA-2011-7258
5885| [861525] Fedora Update for dovecot FEDORA-2007-664
5886| [861394] Fedora Update for dovecot FEDORA-2007-493
5887| [861333] Fedora Update for dovecot FEDORA-2007-1485
5888| [860845] Fedora Update for dovecot FEDORA-2008-9202
5889| [860663] Fedora Update for dovecot FEDORA-2008-2475
5890| [860169] Fedora Update for dovecot FEDORA-2008-2464
5891| [860089] Fedora Update for dovecot FEDORA-2008-9232
5892| [840950] Ubuntu Update for dovecot USN-1295-1
5893| [840668] Ubuntu Update for dovecot USN-1143-1
5894| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
5895| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
5896| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
5897| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
5898| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
5899| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
5900| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
5901| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
5902| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
5903| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
5904| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
5905| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
5906| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
5907| [70259] FreeBSD Ports: dovecot
5908| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
5909| [66522] FreeBSD Ports: dovecot
5910| [65010] Ubuntu USN-838-1 (dovecot)
5911| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
5912| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
5913| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
5914| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
5915| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
5916| [62854] FreeBSD Ports: dovecot-managesieve
5917| [61916] FreeBSD Ports: dovecot
5918| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
5919| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
5920| [60528] FreeBSD Ports: dovecot
5921| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
5922| [60089] FreeBSD Ports: dovecot
5923| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
5924| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
5925|
5926| SecurityTracker - https://www.securitytracker.com:
5927| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
5928| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
5929| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
5930|
5931| OSVDB - http://www.osvdb.org:
5932| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
5933| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
5934| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
5935| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
5936| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
5937| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
5938| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
5939| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
5940| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
5941| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
5942| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
5943| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
5944| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
5945| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
5946| [66113] Dovecot Mail Root Directory Creation Permission Weakness
5947| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
5948| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
5949| [66110] Dovecot Multiple Unspecified Buffer Overflows
5950| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
5951| [64783] Dovecot E-mail Message Header Unspecified DoS
5952| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
5953| [62796] Dovecot mbox Format Email Header Handling DoS
5954| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
5955| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
5956| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
5957| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
5958| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
5959| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
5960| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
5961| [43137] Dovecot mail_extra_groups Symlink File Manipulation
5962| [42979] Dovecot passdbs Argument Injection Authentication Bypass
5963| [39876] Dovecot LDAP Auth Cache Security Bypass
5964| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
5965| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
5966| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
5967| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
5968| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
5969| [23281] Dovecot imap/pop3-login dovecot-auth DoS
5970| [23280] Dovecot Malformed APPEND Command DoS
5971| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
5972| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
5973| [5857] Linux pop3d Arbitrary Mail File Access
5974| [2471] akpop3d username SQL Injection
5975|_
5976Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5977Aggressive OS guesses: Linux 3.5 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 2.6.32 (92%), Linux 3.11 (92%), Linux 3.8 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.32 - 3.1 (91%)
5978No exact OS matches for host (test conditions non-ideal).
5979Network Distance: 24 hops
5980
5981TRACEROUTE (using port 110/tcp)
5982HOP RTT ADDRESS
59831 79.47 ms 10.251.204.1
59842 79.54 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
59853 79.58 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
59864 79.52 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
59875 79.54 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
59886 79.69 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
59897 79.67 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
59908 79.64 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
59919 79.66 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
599210 79.74 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
599311 52.37 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
599412 52.32 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
599513 256.59 ms ae-4.r01.nycmny17.us.bb.gin.ntt.net (129.250.4.174)
599614 52.28 ms ae-7.r24.nycmny01.us.bb.gin.ntt.net (129.250.3.48)
599715 91.76 ms ae-4.r22.sttlwa01.us.bb.gin.ntt.net (129.250.4.13)
599816 256.57 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
599917 256.57 ms ae-2.r02.tokyjp05.jp.bb.gin.ntt.net (129.250.3.22)
600018 256.58 ms ae-3.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.30)
600119 256.50 ms 122.1.245.126
600220 235.95 ms 114.147.63.126
600321 235.01 ms 122.28.179.202
600422 289.25 ms 180.8.125.226
600523 270.07 ms 153.146.149.89
600624 248.90 ms c15t2a7n.mwprem.net (60.43.151.164)
6007#######################################################################################################################################
6008Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:25 EDT
6009NSE: Loaded 164 scripts for scanning.
6010NSE: Script Pre-scanning.
6011Initiating NSE at 12:25
6012Completed NSE at 12:25, 0.00s elapsed
6013Initiating NSE at 12:25
6014Completed NSE at 12:25, 0.00s elapsed
6015Initiating Parallel DNS resolution of 1 host. at 12:25
6016Completed Parallel DNS resolution of 1 host. at 12:25, 0.02s elapsed
6017Initiating SYN Stealth Scan at 12:25
6018Scanning c15t2a7n.mwprem.net (60.43.151.164) [1 port]
6019Discovered open port 443/tcp on 60.43.151.164
6020Completed SYN Stealth Scan at 12:25, 0.54s elapsed (1 total ports)
6021Initiating Service scan at 12:25
6022Scanning 1 service on c15t2a7n.mwprem.net (60.43.151.164)
6023Completed Service scan at 12:25, 14.64s elapsed (1 service on 1 host)
6024Initiating OS detection (try #1) against c15t2a7n.mwprem.net (60.43.151.164)
6025Retrying OS detection (try #2) against c15t2a7n.mwprem.net (60.43.151.164)
6026Initiating Traceroute at 12:25
6027Completed Traceroute at 12:25, 0.50s elapsed
6028Initiating Parallel DNS resolution of 24 hosts. at 12:25
6029Completed Parallel DNS resolution of 24 hosts. at 12:25, 0.25s elapsed
6030NSE: Script scanning 60.43.151.164.
6031Initiating NSE at 12:25
6032Completed NSE at 12:31, 346.49s elapsed
6033Initiating NSE at 12:31
6034Completed NSE at 12:31, 3.22s elapsed
6035Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
6036Host is up (0.24s latency).
6037
6038PORT STATE SERVICE VERSION
6039443/tcp open ssl/https?
6040|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
6041| http-brute:
6042|_ Path "/" does not require authentication
6043|_http-chrono: Request times for /; avg: 8757.81ms; min: 8648.11ms; max: 8878.05ms
6044|_http-csrf: Couldn't find any CSRF vulnerabilities.
6045|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
6046|_http-dombased-xss: Couldn't find any DOM based XSS.
6047|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
6048|_http-errors: ERROR: Script execution failed (use -d to debug)
6049|_http-feed: Couldn't find any feeds.
6050|_http-fetch: Please enter the complete path of the directory to save data in.
6051|_http-jsonp-detection: Couldn't find any JSONP endpoints.
6052|_http-mobileversion-checker: No mobile version detected.
6053| http-security-headers:
6054| Strict_Transport_Security:
6055|_ HSTS not configured in HTTPS Server
6056| http-sitemap-generator:
6057| Directory structure:
6058| Longest directory structure:
6059| Depth: 0
6060| Dir: /
6061| Total files found (by extension):
6062|_
6063|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
6064| http-vhosts:
6065|_127 names had status ERROR
6066|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
6067|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
6068|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
6069|_http-xssed: No previously reported XSS vuln.
6070Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6071Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 - 3.1 (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 3.9 (93%), Linux 3.5 (92%), Linux 3.2 (91%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.39 (91%)
6072No exact OS matches for host (test conditions non-ideal).
6073Uptime guess: 26.320 days (since Mon Sep 9 04:49:51 2019)
6074Network Distance: 24 hops
6075TCP Sequence Prediction: Difficulty=262 (Good luck!)
6076IP ID Sequence Generation: All zeros
6077
6078TRACEROUTE (using port 443/tcp)
6079HOP RTT ADDRESS
60801 89.51 ms 10.251.204.1
60812 89.57 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
60823 89.59 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
60834 89.56 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
60845 89.62 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
60856 89.66 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
60867 89.71 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
60878 89.69 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
60889 89.65 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
608910 28.89 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
609011 76.92 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
609112 44.53 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
609213 262.40 ms ae-4.r01.nycmny17.us.bb.gin.ntt.net (129.250.4.174)
609314 62.25 ms ae-2.r24.nycmny01.us.bb.gin.ntt.net (129.250.4.40)
609415 90.47 ms ae-4.r22.sttlwa01.us.bb.gin.ntt.net (129.250.4.13)
609516 262.37 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
609617 262.39 ms ae-2.r03.tokyjp05.jp.bb.gin.ntt.net (129.250.3.33)
609718 236.62 ms ae-0.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.18)
609819 262.35 ms 60.37.54.202
609920 262.28 ms 114.147.63.122
610021 263.68 ms 122.28.179.202
610122 255.03 ms 180.8.125.226
610223 295.05 ms 153.146.149.89
610324 308.95 ms c15t2a7n.mwprem.net (60.43.151.164)
6104
6105NSE: Script Post-scanning.
6106Initiating NSE at 12:31
6107Completed NSE at 12:31, 0.00s elapsed
6108Initiating NSE at 12:31
6109Completed NSE at 12:31, 0.00s elapsed
6110Read data files from: /usr/bin/../share/nmap
6111OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
6112Nmap done: 1 IP address (1 host up) scanned in 372.24 seconds
6113 Raw packets sent: 99 (8.582KB) | Rcvd: 120 (42.377KB)
6114#######################################################################################################################################
6115Version: 1.11.13-static
6116OpenSSL 1.0.2-chacha (1.0.2g-dev)
6117
6118Connected to 60.43.151.164
6119
6120Testing SSL server 60.43.151.164 on port 443 using SNI name 60.43.151.164
6121
6122 TLS Fallback SCSV:
6123Server supports TLS Fallback SCSV
6124
6125 TLS renegotiation:
6126Secure session renegotiation supported
6127
6128 TLS Compression:
6129Compression disabled
6130
6131 Heartbleed:
6132TLS 1.2 not vulnerable to heartbleed
6133TLS 1.1 not vulnerable to heartbleed
6134TLS 1.0 not vulnerable to heartbleed
6135
6136 Supported Server Cipher(s):
6137Preferred TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 1024 bits
6138Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 1024 bits
6139Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
6140Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
6141Accepted TLSv1.2 256 bits AES256-GCM-SHA384
6142Accepted TLSv1.2 256 bits AES256-SHA256
6143Accepted TLSv1.2 256 bits AES256-SHA
6144Accepted TLSv1.2 256 bits CAMELLIA256-SHA
6145Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 1024 bits
6146Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 1024 bits
6147Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
6148Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
6149Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 1024 bits
6150Accepted TLSv1.2 128 bits AES128-GCM-SHA256
6151Accepted TLSv1.2 128 bits AES128-SHA256
6152Accepted TLSv1.2 128 bits AES128-SHA
6153Accepted TLSv1.2 128 bits CAMELLIA128-SHA
6154Accepted TLSv1.2 112 bits DES-CBC3-SHA
6155Preferred TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
6156Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
6157Accepted TLSv1.1 256 bits AES256-SHA
6158Accepted TLSv1.1 256 bits CAMELLIA256-SHA
6159Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
6160Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
6161Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 1024 bits
6162Accepted TLSv1.1 128 bits AES128-SHA
6163Accepted TLSv1.1 128 bits CAMELLIA128-SHA
6164Accepted TLSv1.1 112 bits DES-CBC3-SHA
6165Preferred TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
6166Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
6167Accepted TLSv1.0 256 bits AES256-SHA
6168Accepted TLSv1.0 256 bits CAMELLIA256-SHA
6169Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
6170Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
6171Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 1024 bits
6172Accepted TLSv1.0 128 bits AES128-SHA
6173Accepted TLSv1.0 128 bits CAMELLIA128-SHA
6174Accepted TLSv1.0 112 bits DES-CBC3-SHA
6175
6176 SSL Certificate:
6177Signature Algorithm: sha256WithRSAEncryption
6178RSA Key Strength: 2048
6179
6180Subject: *.mwprem.net
6181Altnames: DNS:*.mwprem.net, DNS:mwprem.net
6182Issuer: JPRS Domain Validation Authority - G2
6183
6184Not valid before: Mar 11 00:50:20 2019 GMT
6185Not valid after: Mar 31 14:59:59 2021 GMT
6186#######################################################################################################################################
6187--------------------------------------------------------
6188<<<Yasuo discovered following vulnerable applications>>>
6189--------------------------------------------------------
6190+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
6191| App Name | URL to Application | Potential Exploit | Username | Password |
6192+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
6193| phpMyAdmin | http://60.43.151.164:80/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
6194+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
6195#######################################################################################################################################
6196Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 12:35 EDT
6197NSE: Loaded 47 scripts for scanning.
6198NSE: Script Pre-scanning.
6199Initiating NSE at 12:35
6200Completed NSE at 12:35, 0.00s elapsed
6201Initiating NSE at 12:35
6202Completed NSE at 12:35, 0.00s elapsed
6203Initiating Ping Scan at 12:35
6204Scanning 60.43.151.164 [4 ports]
6205Completed Ping Scan at 12:35, 0.28s elapsed (1 total hosts)
6206Initiating Parallel DNS resolution of 1 host. at 12:35
6207Completed Parallel DNS resolution of 1 host. at 12:35, 0.04s elapsed
6208Initiating SYN Stealth Scan at 12:35
6209Scanning c15t2a7n.mwprem.net (60.43.151.164) [65535 ports]
6210Discovered open port 993/tcp on 60.43.151.164
6211Discovered open port 110/tcp on 60.43.151.164
6212Discovered open port 21/tcp on 60.43.151.164
6213Discovered open port 587/tcp on 60.43.151.164
6214Discovered open port 143/tcp on 60.43.151.164
6215Discovered open port 80/tcp on 60.43.151.164
6216Discovered open port 443/tcp on 60.43.151.164
6217Discovered open port 995/tcp on 60.43.151.164
6218SYN Stealth Scan Timing: About 1.99% done; ETC: 13:01 (0:25:30 remaining)
6219SYN Stealth Scan Timing: About 4.39% done; ETC: 12:58 (0:22:10 remaining)
6220SYN Stealth Scan Timing: About 7.20% done; ETC: 12:57 (0:20:51 remaining)
6221Discovered open port 56459/tcp on 60.43.151.164
6222SYN Stealth Scan Timing: About 14.02% done; ETC: 12:58 (0:19:43 remaining)
6223SYN Stealth Scan Timing: About 18.16% done; ETC: 12:57 (0:18:33 remaining)
6224Discovered open port 59092/tcp on 60.43.151.164
6225SYN Stealth Scan Timing: About 24.61% done; ETC: 12:58 (0:17:21 remaining)
6226SYN Stealth Scan Timing: About 30.53% done; ETC: 12:58 (0:16:12 remaining)
6227Discovered open port 37820/tcp on 60.43.151.164
6228Discovered open port 56742/tcp on 60.43.151.164
6229SYN Stealth Scan Timing: About 36.25% done; ETC: 12:58 (0:14:59 remaining)
6230Discovered open port 2100/tcp on 60.43.151.164
6231SYN Stealth Scan Timing: About 42.57% done; ETC: 12:59 (0:13:47 remaining)
6232Discovered open port 4190/tcp on 60.43.151.164
6233SYN Stealth Scan Timing: About 48.08% done; ETC: 12:59 (0:12:33 remaining)
6234SYN Stealth Scan Timing: About 53.01% done; ETC: 12:59 (0:11:19 remaining)
6235SYN Stealth Scan Timing: About 58.12% done; ETC: 12:59 (0:10:06 remaining)
6236Discovered open port 8402/tcp on 60.43.151.164
6237SYN Stealth Scan Timing: About 63.64% done; ETC: 12:59 (0:08:54 remaining)
6238SYN Stealth Scan Timing: About 68.86% done; ETC: 12:59 (0:07:40 remaining)
6239SYN Stealth Scan Timing: About 74.02% done; ETC: 12:59 (0:06:25 remaining)
6240Discovered open port 49923/tcp on 60.43.151.164
6241Discovered open port 8403/tcp on 60.43.151.164
6242SYN Stealth Scan Timing: About 79.22% done; ETC: 13:00 (0:05:10 remaining)
6243Discovered open port 8400/tcp on 60.43.151.164
6244SYN Stealth Scan Timing: About 84.50% done; ETC: 13:00 (0:03:54 remaining)
6245SYN Stealth Scan Timing: About 89.77% done; ETC: 13:00 (0:02:35 remaining)
6246SYN Stealth Scan Timing: About 94.80% done; ETC: 13:00 (0:01:19 remaining)
6247Completed SYN Stealth Scan at 13:00, 1532.22s elapsed (65535 total ports)
6248Initiating Service scan at 13:00
6249Scanning 18 services on c15t2a7n.mwprem.net (60.43.151.164)
6250Completed Service scan at 13:03, 164.16s elapsed (18 services on 1 host)
6251Initiating OS detection (try #1) against c15t2a7n.mwprem.net (60.43.151.164)
6252Retrying OS detection (try #2) against c15t2a7n.mwprem.net (60.43.151.164)
6253Initiating Traceroute at 13:03
6254Completed Traceroute at 13:03, 3.06s elapsed
6255Initiating Parallel DNS resolution of 22 hosts. at 13:03
6256Completed Parallel DNS resolution of 22 hosts. at 13:03, 0.36s elapsed
6257NSE: Script scanning 60.43.151.164.
6258Initiating NSE at 13:03
6259Completed NSE at 13:03, 21.72s elapsed
6260Initiating NSE at 13:03
6261Completed NSE at 13:03, 3.30s elapsed
6262Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
6263Host is up (0.26s latency).
6264Not shown: 64506 closed ports, 1011 filtered ports
6265PORT STATE SERVICE VERSION
626621/tcp open ftp vsftpd 2.2.2
6267| vulscan: VulDB - https://vuldb.com:
6268| [43110] vsftpd up to 2.0.4 Memory Leak denial of service
6269|
6270| MITRE CVE - https://cve.mitre.org:
6271| [CVE-2011-2189] net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
6272| [CVE-2011-0762] The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
6273| [CVE-2009-5029] Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
6274| [CVE-2008-4969] ltp-network-test 20060918 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/vsftpd.conf, (b) /tmp/udp/2/*, (c) /tmp/tcp/2/*, (d) /tmp/udp/3/*, (e) /tmp/tcp/3/*, (f) /tmp/nfs_fsstress.udp.2.log, (g) /tmp/nfs_fsstress.udp.3.log, (h) /tmp/nfs_fsstress.tcp.2.log, (i) /tmp/nfs_fsstress.tcp.3.log, and (j) /tmp/nfs_fsstress.sardata temporary files, related to the (1) ftp_setup_vsftp_conf and (2) nfs_fsstress.sh scripts.
6275| [CVE-2008-2375] Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
6276| [CVE-2007-5962] Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
6277| [CVE-2007-4322] BlockHosts before 2.0.4 does not properly parse (1) sshd and (2) vsftpd log files, which allows remote attackers to add arbitrary deny entries to the /etc/hosts.allow file and cause a denial of service by adding arbitrary IP addresses to a daemon log file, as demonstrated by connecting through ssh with a client protocol version identification containing an IP address string, or connecting through ftp with a username containing an IP address string, different vectors than CVE-2007-2765.
6278|
6279| SecurityFocus - https://www.securityfocus.com/bid/:
6280| [82285] Vsftpd CVE-2004-0042 Remote Security Vulnerability
6281| [72451] vsftpd CVE-2015-1419 Security Bypass Vulnerability
6282| [51013] vsftpd '__tzfile_read()' Function Heap Based Buffer Overflow Vulnerability
6283| [48539] vsftpd Compromised Source Packages Backdoor Vulnerability
6284| [46617] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
6285| [41443] Vsftpd Webmin Module Multiple Unspecified Vulnerabilities
6286| [30364] vsftpd FTP Server Pluggable Authentication Module (PAM) Remote Denial of Service Vulnerability
6287| [29322] vsftpd FTP Server 'deny_file' Option Remote Denial of Service Vulnerability
6288| [10394] Vsftpd Listener Denial of Service Vulnerability
6289| [7253] Red Hat Linux 9 vsftpd Compiling Error Weakness
6290|
6291| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6292| [68366] vsftpd package backdoor
6293| [65873] vsftpd vsf_filename_passes_filter denial of service
6294| [55148] VSFTPD-WEBMIN-MODULE unknown unspecified
6295| [43685] vsftpd authentication attempts denial of service
6296| [42593] vsftpd deny_file denial of service
6297| [16222] vsftpd connection denial of service
6298| [14844] vsftpd message allows attacker to obtain username
6299| [11729] Red Hat Linux vsftpd FTP daemon tcp_wrapper could allow an attacker to gain access to server
6300|
6301| Exploit-DB - https://www.exploit-db.com:
6302| [17491] VSFTPD 2.3.4 - Backdoor Command Execution
6303| [16270] vsftpd 2.3.2 - Denial of Service Vulnerability
6304| [5814] vsftpd 2.0.5 (CWD) Remote Memory Consumption Exploit (post auth)
6305|
6306| OpenVAS (Nessus) - http://www.openvas.org:
6307| [70770] Gentoo Security Advisory GLSA 201110-07 (vsftpd)
6308| [70399] Debian Security Advisory DSA 2305-1 (vsftpd)
6309|
6310| SecurityTracker - https://www.securitytracker.com:
6311| [1025186] vsftpd vsf_filename_passes_filter() Bug Lets Remote Authenticated Users Deny Service
6312| [1020546] vsftpd Memory Leak When Invalid Authentication Attempts Occur Lets Remote Authenticated Users Deny Service
6313| [1020079] vsftpd Memory Leak in 'deny_file' Option Lets Remote Authenticated Users Deny Service
6314| [1008628] vsftpd Discloses Whether Usernames are Valid or Not
6315|
6316| OSVDB - http://www.osvdb.org:
6317| [73573] vsftpd on vsftpd.beasts.org Trojaned Distribution
6318| [73340] vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
6319| [61362] Vsftpd Webmin Module Unspecified Issues
6320| [46930] Red Hat Linux vsftpd w/ PAM Memory Exhaustion Remote DoS
6321| [45626] vsftpd deny_file Option Crafted FTP Data Remote Memory Exhaustion DoS
6322| [36515] BlockHosts sshd/vsftpd hosts.allow Arbitrary Deny Entry Manipulation
6323| [28610] vsftpd SIGURG Handler Unspecified Issue
6324| [28609] vsftpd tunable_chroot_local_user Filesystem Root Access
6325| [6861] vsftpd Login Error Message Username Enumeration
6326| [6306] vsftpd Connection Handling DoS
6327| [4564] vsftpd on Red Hat Linux Restricted Access Failure
6328|_
632980/tcp open http Apache httpd 2.2.15 ((CentOS))
6330|_http-server-header: Apache/2.2.15 (CentOS)
6331| vulners:
6332| cpe:/a:apache:http_server:2.2.15:
6333| CVE-2011-3192 7.8 https://vulners.com/cve/CVE-2011-3192
6334| CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
6335| CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
6336| CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
6337| CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
6338| CVE-2013-2249 7.5 https://vulners.com/cve/CVE-2013-2249
6339| CVE-2012-0883 6.9 https://vulners.com/cve/CVE-2012-0883
6340| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
6341| CVE-2017-12171 6.4 https://vulners.com/cve/CVE-2017-12171
6342| CVE-2013-1862 5.1 https://vulners.com/cve/CVE-2013-1862
6343| CVE-2014-0231 5.0 https://vulners.com/cve/CVE-2014-0231
6344| CVE-2014-0098 5.0 https://vulners.com/cve/CVE-2014-0098
6345| CVE-2013-6438 5.0 https://vulners.com/cve/CVE-2013-6438
6346| CVE-2012-4557 5.0 https://vulners.com/cve/CVE-2012-4557
6347| CVE-2011-3368 5.0 https://vulners.com/cve/CVE-2011-3368
6348| CVE-2010-2068 5.0 https://vulners.com/cve/CVE-2010-2068
6349| CVE-2010-1452 5.0 https://vulners.com/cve/CVE-2010-1452
6350| CVE-2012-0031 4.6 https://vulners.com/cve/CVE-2012-0031
6351| CVE-2011-3607 4.4 https://vulners.com/cve/CVE-2011-3607
6352| CVE-2016-4975 4.3 https://vulners.com/cve/CVE-2016-4975
6353| CVE-2013-1896 4.3 https://vulners.com/cve/CVE-2013-1896
6354| CVE-2012-4558 4.3 https://vulners.com/cve/CVE-2012-4558
6355| CVE-2012-3499 4.3 https://vulners.com/cve/CVE-2012-3499
6356| CVE-2012-0053 4.3 https://vulners.com/cve/CVE-2012-0053
6357| CVE-2011-4317 4.3 https://vulners.com/cve/CVE-2011-4317
6358| CVE-2011-3639 4.3 https://vulners.com/cve/CVE-2011-3639
6359| CVE-2011-3348 4.3 https://vulners.com/cve/CVE-2011-3348
6360| CVE-2011-0419 4.3 https://vulners.com/cve/CVE-2011-0419
6361| CVE-2016-8612 3.3 https://vulners.com/cve/CVE-2016-8612
6362| CVE-2012-2687 2.6 https://vulners.com/cve/CVE-2012-2687
6363|_ CVE-2011-4415 1.2 https://vulners.com/cve/CVE-2011-4415
6364| vulscan: VulDB - https://vuldb.com:
6365| [75668] Apache Sling API/Sling Servlets Post up to 2.2.1 HtmlResponse cross site scripting
6366| [65386] Apache Solr up to 2.2.1 on TYPO3 cross site scripting
6367| [65385] Apache Solr up to 2.2.1 on TYPO3 unknown vulnerability
6368| [64466] Apache OpenJPA up to 2.2.1 Serialization memory corruption
6369| [63089] Apache HTTP Server up to 2.2.13 mod_proxy_ajp denial of service
6370| [59850] Apache Geronimo up to 2.2.1 denial of service
6371| [57435] Apache Struts up to 2.2.1.1 FileHandler.java cross site scripting
6372| [57425] Apache Struts up to 2.2.1.1 cross site scripting
6373| [54166] Apache HTTP Server up to 2.2.12 mod_cache Crash denial of service
6374| [49856] Apache HTTP Server 2.2.13 mod_proxy_ftp ap_proxy_ftp_handler denial of service
6375| [3130] Apache OpenOffice 2.2.1 RTF Document Heap-based memory corruption
6376| [135663] Apache Camel up to 2.23.x JSON-lib Library XML Data XML External Entity
6377| [134290] Apache UIMA DUCC up to 2.2.2 cross site scripting
6378| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
6379| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
6380| [124152] Apache Camel Mail up to 2.22.0 Path directory traversal
6381| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
6382| [122456] Apache Camel up to 2.20.3/2.21.0 XSD Validator XML External Entity
6383| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
6384| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
6385| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
6386| [102697] Apache HTTP Server 2.2.24/2.2.32 HTTP Strict Parsing ap_find_token Request Header memory corruption
6387| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
6388| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
6389| [100162] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Commons Collections privilege escalation
6390| [100160] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Trinidad unknown vulnerability
6391| [87540] Apache Ambari up to 2.2.0 File Browser View information disclosure
6392| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
6393| [65313] Apache Sling 2.2.0/2.3.0 AbstractCreateOperation.java deepGetOrCreateNode denial of service
6394| [9891] Apache HTTP Server 2.2.22 suEXEC Feature .htaccess information disclosure
6395| [64485] Apache Struts up to 2.2.3.0 privilege escalation
6396| [64457] Apache Struts up to 2.2.3.0 cross site scripting
6397| [63646] Apache HTTP Server up to 2.2.23/2.4.3 mod_proxy_balancer.c balancer_handler cross site scripting
6398| [60352] Apache Struts up to 2.2.3 memory corruption
6399| [4583] Apache HTTP Server up to 2.2.21 Threaded MPM denial of service
6400| [4582] Apache HTTP Server up to 2.2.21 protocol.c information disclosure
6401| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
6402| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
6403| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
6404| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
6405| [4352] Apache HTTP Server 2.2.x APR apr_fnmatch denial of service
6406| [54394] Apache CXF up to 2.2.8 Memory Consumption denial of service
6407| [40502] Apache HTTP Server up to 2.2.5 mod_proxy_balancer memory corruption
6408| [40501] Apache HTTP Server 2.2.6 mod_proxy_balancer cross site request forgery
6409| [40398] Apache HTTP Server up to 2.2 mod_proxy_balancer cross site scripting
6410| [40397] Apache HTTP Server up to 2.2 mod_proxy_balancer balancer_handler denial of service
6411| [40221] Apache HTTP Server 2.2.6 information disclosure
6412|
6413| MITRE CVE - https://cve.mitre.org:
6414| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
6415| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
6416| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
6417| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
6418| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
6419| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
6420| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
6421| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
6422| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
6423| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
6424| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
6425| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
6426| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
6427| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
6428| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
6429| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
6430| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
6431| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
6432| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
6433| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
6434| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
6435| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
6436| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
6437|
6438| SecurityFocus - https://www.securityfocus.com/bid/:
6439| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
6440| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
6441|
6442| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6443| [75211] Debian GNU/Linux apache 2 cross-site scripting
6444|
6445| Exploit-DB - https://www.exploit-db.com:
6446| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
6447| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
6448| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
6449| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
6450| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
6451| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
6452| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
6453| [17691] Apache Struts < 2.2.0 - Remote Command Execution
6454| [15319] Apache 2.2 (Windows) Local Denial of Service
6455| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
6456|
6457| OpenVAS (Nessus) - http://www.openvas.org:
6458| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
6459|
6460| SecurityTracker - https://www.securitytracker.com:
6461| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
6462| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
6463| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
6464| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
6465| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
6466|
6467| OSVDB - http://www.osvdb.org:
6468| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
6469|_
6470110/tcp open tcpwrapped
6471143/tcp open tcpwrapped
6472443/tcp open ssl/https?
6473587/tcp open smtp Postfix smtpd
6474| vulscan: VulDB - https://vuldb.com:
6475| [108975] Apple macOS up to 10.13.1 Postfix unknown vulnerability
6476| [98314] PostfixAdmin up to 3.0.1 AliasHandler delete.php gen_show_status denial of service
6477| [71720] Postfix up to 2.3.0 backup.php pacrypt sql injection
6478| [12746] Postfix Admin 2.3.6 functions.inc.php sql injection
6479| [57422] Postfix memory corruption
6480| [56843] Postfix up to 2.7.2 Cleartext weak encryption
6481|
6482| MITRE CVE - https://cve.mitre.org:
6483| [CVE-2013-2852] Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
6484| [CVE-2011-1720] The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
6485| [CVE-2011-0411] The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
6486| [CVE-2010-0230] SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.
6487| [CVE-2009-2939] The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
6488| [CVE-2008-4977] ** DISPUTED ** postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
6489| [CVE-2008-3889] Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
6490| [CVE-2008-3646] The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible when mail is sent from a local command-line tool, which allows remote attackers to send mail to local Mac OS X users.
6491| [CVE-2008-2937] Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
6492| [CVE-2008-2936] Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
6493| [CVE-2007-3791] Buffer overflow in the w_read function in sockets.c in Cami Sardinha and Nigel Kukard policyd before 1.81 for Postfix allows remote attackers to cause a denial of service and possibly execute arbitrary code via long SMTP commands. NOTE: some of these details are obtained from third party information.
6494| [CVE-2006-0213] Kolab Server 2.0.1, 2.0.2 and development versions pre-2.1-20051215 and earlier, when authenticating users via secure SMTP, stores authentication credentials in plaintext in the postfix.log file, which allows local users to gain privileges.
6495| [CVE-2005-1127] Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
6496| [CVE-2005-0337] Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
6497| [CVE-2004-1113] SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses.
6498| [CVE-2004-1088] Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.
6499| [CVE-2004-0925] Postfix on Mac OS X 10.3.x through 10.3.5, with SMTPD AUTH enabled, does not properly clear the username between authentication attempts, which allows users with the longest username to prevent other valid users from being able to authenticate.
6500| [CVE-2003-0540] The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
6501| [CVE-2003-0468] Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
6502| [CVE-2001-0894] Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
6503|
6504| SecurityFocus - https://www.securityfocus.com/bid/:
6505| [96142] PostfixAdmin CVE-2017-5930 Session Management Security Bypass Vulnerability
6506| [90814] Postfix Admin Multiple Cross Site Request Forgery Vulnerabilities
6507| [67250] Postfix Arbitrary Content Security Bypass Vulnerability
6508| [66455] Postfix Admin 'functions.inc.php' SQL Injection Vulnerability
6509| [65184] Fail2ban Postfix Filter Remote Denial of Service Vulnerability
6510| [51680] Postfix Admin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
6511| [47778] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
6512| [36469] Debian and Ubuntu Postfix Insecure Temporary File Creation Vulnerability
6513| [31721] Apple Mac OS X 10.5 Postfix Security Bypass Vulnerability
6514| [30977] Postfix 'epoll' Linux Event Handler Local Denial of Service Vulnerability
6515| [30691] Postfix Local Information Disclosure and Local Privilege Escalation Vulnerabilities
6516| [13133] Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
6517| [13129] Salim Gasmi GLD Postfix Greylisting Daemon Buffer Overflow Vulnerability
6518| [12445] Postfix IPv6 Unauthorized Mail Relay Vulnerability
6519| [11898] SQLgrey Postfix Greylisting Service Unspecified SQL Injection Vulnerability
6520| [11633] SQLgrey Postfix Greylisting Service SQL Injection Vulnerability
6521| [11323] Apple Mac OS X Postfix Release SMTPD AUTH Username Denial Of Service Vulnerability
6522| [8362] Postfix SMTP Malformed E-mail Envelope Address Denial of Service Vulnerability
6523| [8361] Postfix Connection Proxying Vulnerability
6524| [8333] Multiple Postfix Denial of Service Vulnerabilities
6525| [3638] SuSEConfig.postfix chroot Local DoS Attack Vulnerability
6526| [3637] SuSEConfig.postfix chroot File Ownership Vulnerability
6527| [3544] Postfix SMTP Log Denial Of Service Vulnerability
6528| [1428] cyrus With postfix and Procmail Remote Shell Expansion Vulnerabilities
6529|
6530| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6531| [72752] Postfix Admin multiple parameters SQL injection
6532| [72751] PostfixAdmin multiple parameters cross-site scripting
6533| [67359] Postfix Cyrus SASL library in the SMTP server code execution
6534| [55970] SUSE Linux Enterprise postfix security bypass
6535| [53425] Postfix in Debian and Ubuntu pid symlink
6536| [45876] Apple Mac OS X Postfix configuration file weak security
6537| [44865] Postfix file descriptor denial of service
6538| [44461] Postfix email information disclosure
6539| [44460] Postfix symlink code execution
6540| [22655] RHSA-2005:152 updates for postfix not installed
6541| [19218] Postfix IPv6 mail relay
6542| [18435] SQLgrey Postfix greylisting service SQL injection
6543| [18353] Postfix CRAM-MD5 authentication replay attack
6544| [17998] SQLgrey Postfix greylisting service SQL injection
6545| [17595] Apple Mac OS postfix SMTPD AUTH denial of service
6546| [12816] Postfix MAIL FROM or RCPT TO denial of service
6547| [12815] Postfix could be used as a distributed denial of service tool
6548| [7568] Postfix SMTP log denial of service
6549| [4905] Cyrus with postfix and procmail integration could allow remote command execution
6550|
6551| Exploit-DB - https://www.exploit-db.com:
6552| [25392] Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability
6553| [22982] Postfix 1.1.x Denial of Service Vulnerabilities (2)
6554| [22981] Postfix 1.1.x Denial of Service Vulnerabilities (1)
6555| [16841] GLD (Greylisting Daemon) Postfix Buffer Overflow
6556| [10023] Salim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow
6557| [6472] Postfix < 2.4.9, 2.5.5, 2.6-20080902 - (.forward) Local DoS Exploit
6558| [6337] Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit
6559| [934] gld 1.4 (Postfix Greylisting Daemon) Remote Format String Exploit
6560|
6561| OpenVAS (Nessus) - http://www.openvas.org:
6562| [902517] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
6563| [881389] CentOS Update for postfix CESA-2011:0422 centos5 x86_64
6564| [881293] CentOS Update for postfix CESA-2011:0843 centos4 x86_64
6565| [881278] CentOS Update for postfix CESA-2011:0422 centos4 x86_64
6566| [881267] CentOS Update for postfix CESA-2011:0843 centos5 x86_64
6567| [880520] CentOS Update for postfix CESA-2011:0422 centos5 i386
6568| [880509] CentOS Update for postfix CESA-2011:0843 centos5 i386
6569| [880488] CentOS Update for postfix CESA-2011:0843 centos4 i386
6570| [880485] CentOS Update for postfix CESA-2011:0422 centos4 i386
6571| [880268] CentOS Update for postfix CESA-2008:0839 centos3 i386
6572| [880023] CentOS Update for postfix CESA-2008:0839 centos3 x86_64
6573| [870658] RedHat Update for postfix RHSA-2011:0423-01
6574| [870440] RedHat Update for postfix RHSA-2011:0843-01
6575| [870418] RedHat Update for postfix RHSA-2011:0422-01
6576| [870021] RedHat Update for postfix RHSA-2008:0839-01
6577| [863100] Fedora Update for postfix FEDORA-2011-6777
6578| [863097] Fedora Update for postfix FEDORA-2011-6771
6579| [862950] Fedora Update for postfix FEDORA-2011-3394
6580| [862938] Fedora Update for postfix FEDORA-2011-3355
6581| [860510] Fedora Update for postfix FEDORA-2008-8593
6582| [860419] Fedora Update for postfix FEDORA-2008-8595
6583| [850126] SuSE Update for postfix SUSE-SA:2010:011
6584| [850031] SuSE Update for postfix SUSE-SA:2008:040
6585| [840658] Ubuntu Update for postfix USN-1131-1
6586| [840648] Ubuntu Update for postfix USN-1113-1
6587| [840227] Ubuntu Update for postfix vulnerabilities USN-642-1
6588| [840190] Ubuntu Update for postfix vulnerability USN-636-1
6589| [831400] Mandriva Update for postfix MDVSA-2011:090 (postfix)
6590| [830713] Mandriva Update for postfix MDVSA-2008:171 (postfix)
6591| [830635] Mandriva Update for postfix MDVSA-2008:190 (postfix)
6592| [830075] Mandriva Update for postfix MDKA-2007:079 (postfix)
6593| [72452] Gentoo Security Advisory GLSA 201209-18 (postfixadmin)
6594| [71559] Gentoo Security Advisory GLSA 201206-33 (Postfix)
6595| [70744] FreeBSD Ports: postfixadmin
6596| [69770] FreeBSD Ports: postfix, postfix-base
6597| [69733] Debian Security Advisory DSA 2233-1 (postfix)
6598| [69363] FreeBSD Ports: postfix, postfix-base
6599| [66394] Mandriva Security Advisory MDVSA-2009:224-1 (postfix)
6600| [65957] SLES10: Security update for Postfix
6601| [65911] SLES10: Security update for Postfix
6602| [65353] SLES9: Security update for Postfix
6603| [65350] SLES9: Security update for postfix
6604| [64696] Mandrake Security Advisory MDVSA-2009:224 (postfix)
6605| [61646] Gentoo Security Advisory GLSA 200809-09 (postfix)
6606| [61445] Gentoo Security Advisory GLSA 200808-12 (postfix)
6607| [61435] Debian Security Advisory DSA 1629-2 (postfix)
6608| [61434] Debian Security Advisory DSA 1629-1 (postfix)
6609| [60836] FreeBSD Ports: postfix-policyd-weight
6610| [58580] Debian Security Advisory DSA 1361-1 (postfix-policyd)
6611| [53833] Debian Security Advisory DSA 093-1 (postfix)
6612| [53652] Debian Security Advisory DSA 363-1 (postfix)
6613|
6614| SecurityTracker - https://www.securitytracker.com:
6615| [1025521] Postfix SASL Authentication Heap Overflow Lets Remote Users Deny Service
6616| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
6617| [1020800] Postfix Linux epoll File Descriptor Leak Lets Local Users Deny Service
6618| [1020700] Postfix Symlink Dereference Bug Lets Local Users Gain Elevated Privileges
6619| [1012395] Postfix CRAM-MD5 Replay Attack May Let Remote Users Send Mail
6620| [1011532] Postfix Buffer Error May Prevent Remote Users from Being Able to Authenticate Using SMTPD AUTH
6621| [1007382] Postfix Bounce Messages Let Remote Users Scan for Open Ports on Other Hosts
6622| [1007381] Postfix Address Resolver Parsing Bug Lets Remote Users Hang the System
6623| [1002756] Postfix Mail Server Can Be Crashed By Remote Users Initiating Unsuccessful Sessions
6624|
6625| OSVDB - http://www.osvdb.org:
6626| [94034] Linux Kernel Broadcom B43 Wireless Driver b43_request_firmware Function fwpostfix modprobe Parameter Format String Local Privilege Escalation
6627| [78567] Postfix Admin backup.php Unspecified SQL Injection
6628| [78566] Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection
6629| [78565] Postfix Admin create-domain.php Unspecified SQL Injection
6630| [78564] Postfix Admin Unspecified XSS
6631| [78563] Postfix Admin edit-alias.php Unspecified XSS
6632| [78562] Postfix Admin create-alias.php Unspecified XSS
6633| [78561] Postfix Admin create-domain.php Unspecified XSS
6634| [78560] Postfix Admin templates/edit-vacation.php domain Parameter XSS
6635| [78559] Postfix Admin templates/menu.php domain Parameter XSS
6636| [72259] Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
6637| [71021] Postfix STARTTLS Arbitrary Plaintext Command Injection
6638| [68340] Artica postfix.events.php Unrestricted Access Information Disclosure
6639| [61983] SUSE Linux postfix Network Interface Remote Access Restriction Bypass
6640| [58325] Debian GNU/Linux postfix postfix.postinst Symlink Arbitrary File Overwrite
6641| [49634] Postfix postfix_groups.pl Multiple Temporary File Symlink Arbitrary File Overwrite
6642| [48973] Apple Mac OS X Postfix Network Access Configuration Weakness
6643| [48108] Postfix epoll File Descriptor Leak Local DoS
6644| [47659] Postfix Cross-user Filename Local Mail Interception
6645| [47658] Postfix Hardlink to Symlink Mailspool Arbitrary Content Append
6646| [43888] policyd-weight for Postfix Socket Handling Unspecified Arbitrary File Manipulation
6647| [38091] policyd for Postfix sockets.c read_w() Function SMTP Command Remote Overflow
6648| [22381] Kolab Server Secure SMTP postfix.log Authentication Credential Disclosure
6649| [13470] Postfix IPv6 Patch if_inet6 Failure Arbitrary Mail Relay
6650| [12339] SQLgrey Postfix greylisting service Unspecified SQL Injection
6651| [12200] Apple Mac OS X Postfix CRAM-MD5 Replay Credentials
6652| [11571] SQLgrey Postfix greylisting Email Address SQL Injection
6653| [10545] Postfix Multiple Mail Header SMTP listener DoS
6654| [10544] Postfix Malformed Envelope Address nqmgr DoS
6655| [10500] Apple Mac OS X Postfix SMTPD AUTH Username Overflow DoS
6656| [6551] Postfix Bounce Scan / Packet Amplification DDoS
6657| [1991] Postfix SMTP Log DoS
6658|_
6659993/tcp open tcpwrapped
6660995/tcp open tcpwrapped
66612100/tcp open amiganetfs?
66624190/tcp open sieve Dovecot Pigeonhole sieve 1.0
6663| vulscan: VulDB - https://vuldb.com:
6664| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6665| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6666| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
6667| [40356] Dovecot 1.0.9 Cache unknown vulnerability
6668| [38222] Dovecot 1.0.2 directory traversal
6669| [36376] Dovecot up to 1.0.x directory traversal
6670| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
6671| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
6672| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
6673| [54944] Dovecot up to 1.2.14 denial of service
6674| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
6675| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
6676| [53277] Dovecot up to 1.2.10 denial of service
6677| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
6678| [45256] Dovecot up to 1.1.5 directory traversal
6679| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
6680|
6681| MITRE CVE - https://cve.mitre.org:
6682| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
6683| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
6684| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
6685| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
6686| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
6687| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
6688| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
6689| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
6690| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
6691| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
6692| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
6693| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
6694|
6695| SecurityFocus - https://www.securityfocus.com/bid/:
6696| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
6697| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
6698| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
6699| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
6700| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
6701| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
6702| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
6703| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
6704| [67306] Dovecot Denial of Service Vulnerability
6705| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
6706| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
6707| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6708| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
6709| [59078] sieve-connect TLS Hostname Verification Spoofing Vulnerability
6710| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
6711| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
6712| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
6713| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
6714| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
6715| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
6716| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
6717| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
6718| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
6719| [36296] Cyrus IMAP Server SIEVE Script Local Buffer Overflow Vulnerability
6720| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
6721| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
6722| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
6723| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
6724| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
6725| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
6726| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
6727| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
6728| [17961] Dovecot Remote Information Disclosure Vulnerability
6729| [16672] Dovecot Double Free Denial of Service Vulnerability
6730| [6300] libSieve Error Message Buffer Overrun Vulnerability
6731| [6299] libSieve IMAP Flag Buffer Overrun Vulnerability
6732| [6294] libSieve Header Name Buffer Overrun Vulnerability
6733|
6734| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6735| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
6736| [86382] Dovecot POP3 Service denial of service
6737| [84396] Dovecot IMAP APPEND denial of service
6738| [83439] sieve-connect TSL spoofing
6739| [80453] Dovecot mail-search.c denial of service
6740| [71354] Dovecot SSL Common Name (CN) weak security
6741| [67675] Dovecot script-login security bypass
6742| [67674] Dovecot script-login directory traversal
6743| [67589] Dovecot header name denial of service
6744| [63267] Apple Mac OS X Dovecot information disclosure
6745| [62340] Dovecot mailbox security bypass
6746| [62339] Dovecot IMAP or POP3 denial of service
6747| [62256] Dovecot mailbox security bypass
6748| [62255] Dovecot ACL entry security bypass
6749| [60639] Dovecot ACL plugin weak security
6750| [57267] Apple Mac OS X Dovecot Kerberos security bypass
6751| [56763] Dovecot header denial of service
6752| [54363] Dovecot base_dir privilege escalation
6753| [53097] Cyrus IMAP SIEVE buffer overflow
6754| [46672] ManageSieve .sieve directory traversal
6755| [46323] Dovecot dovecot.conf information disclosure
6756| [46227] Dovecot message parsing denial of service
6757| [45669] Dovecot ACL mailbox security bypass
6758| [45667] Dovecot ACL plugin rights security bypass
6759| [41085] Dovecot TAB characters authentication bypass
6760| [41009] Dovecot mail_extra_groups option unauthorized access
6761| [39342] Dovecot LDAP auth cache configuration security bypass
6762| [35767] Dovecot ACL plugin security bypass
6763| [34082] Dovecot mbox-storage.c directory traversal
6764| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
6765| [26536] Dovecot IMAP LIST information disclosure
6766| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
6767| [24709] Dovecot APPEND command denial of service
6768| [18693] Avelsieve MANAGESIEVE denial of service
6769| [18529] Symantec Brightmail Anti-Spam Sieve denial of service
6770|
6771| Exploit-DB - https://www.exploit-db.com:
6772| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
6773|
6774| OpenVAS (Nessus) - http://www.openvas.org:
6775| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
6776| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
6777| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
6778| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
6779| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
6780| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
6781| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
6782| [62854] FreeBSD Ports: dovecot-managesieve
6783|
6784| SecurityTracker - https://www.securitytracker.com:
6785| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
6786| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
6787| [1022863] Cyrus IMAP Server Buffer Overflow in Sieve Component Lets Local Users Gain Elevated Privileges
6788| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
6789| [1005737] Cyrus IMAP Server 'Sieve' Buffer Overflows Let Local Users Gain Elevated Privileges
6790|
6791| OSVDB - http://www.osvdb.org:
6792| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
6793| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
6794| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
6795| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
6796| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6797| [92489] sieve-connect TSL Identity Hostname Validation MitM Spoofing Weakness
6798| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
6799| [87680] Tine 2.0 /Felamimail/Controller/Sieve.php Vacation Sieve Rule Handling DoS
6800| [82189] Cyrus IMAP Server timsieved Layers Unspecified Issue
6801| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
6802| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
6803| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6804| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
6805| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
6806| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
6807| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
6808| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
6809| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
6810| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
6811| [66113] Dovecot Mail Root Directory Creation Permission Weakness
6812| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
6813| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
6814| [66110] Dovecot Multiple Unspecified Buffer Overflows
6815| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
6816| [64783] Dovecot E-mail Message Header Unspecified DoS
6817| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
6818| [62796] Dovecot mbox Format Email Header Handling DoS
6819| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
6820| [60175] Cyrus Sieve / libSieve Script Error String Handling Remote Overflow
6821| [60174] Cyrus Sieve / libSieve IMAP Flag Handling Remote Overflow
6822| [60173] Cyrus Sieve / libSieve Header Name Handling Remote Overflow
6823| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
6824| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
6825| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
6826| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
6827| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
6828| [48545] bitweaver pigeonholes/list.php URL XSS
6829| [43137] Dovecot mail_extra_groups Symlink File Manipulation
6830| [42979] Dovecot passdbs Argument Injection Authentication Bypass
6831| [39876] Dovecot LDAP Auth Cache Security Bypass
6832| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
6833| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
6834| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
6835| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
6836| [23281] Dovecot imap/pop3-login dovecot-auth DoS
6837| [23280] Dovecot Malformed APPEND Command DoS
6838| [12577] avelsieve MANAGESIEVE Class Local DoS
6839| [12458] Symantec Brightmail Sieve Module Memory Exhaustion DoS
6840|_
68418400/tcp open cvd?
68428402/tcp open galaxy Galaxy Client Event Manager
6843| vulscan: VulDB - https://vuldb.com:
6844| [140585] events-manager Plugin up to 5.3.6.0 on WordPress Admin Area cross site scripting
6845| [140584] events-manager Plugin up to 5.3.8 on WordPress Search Form cross site scripting
6846| [140583] events-manager Plugin up to 5.4 on WordPress EM_Ticket::get_post cross site scripting
6847| [140582] events-manager Plugin up to 5.5.1 on WordPress Booking Form cross site scripting
6848| [140581] events-manager Plugin up to 5.1.6 on WordPress JSON Call Links cross site scripting
6849| [139847] events-manager Plugin up to 5.5.6 on WordPress cross site scripting
6850| [139846] events-manager Plugin up to 5.5.7.0 on WordPress DOM-Based cross site scripting
6851| [139845] events-manager Plugin up to 5.5 on WordPress Code Injection privilege escalation
6852| [139844] events-manager Plugin up to 5.5 on WordPress cross site scripting
6853| [133380] Events Manager Plugin 5.9.4 on WordPress edit.php Parameter cross site scripting
6854| [132690] Micro Focus Content Manager 9.1/9.2/9.3 Web Client File Upload privilege escalation
6855| [132649] Synology DiskStation Manager up to 6.1.4 SYNO.Core.PersonalNotification.Event cross site scripting
6856| [117676] Events Manager Plugin up to 5.8 on WordPress cross site scripting
6857| [115023] Events Manager Plugin up to 5.8.1.1 on WordPress events-manager.js Parameter cross site scripting
6858| [112781] Event Manager 1.0 event.php Parameter sql injection
6859| [110018] IBM Business Process Manager 8.6.0.0 Event Manager denial of service
6860| [100728] Quest Privilege Manager up to 6.0.0.060 pmmasterd ACT_ALERT_EVENT Request memory corruption
6861| [100643] Remote Service Manager up to 3.1.4 Client Certificate Validator privilege escalation
6862| [99752] Solarwinds Log & Event Manager up to 6.3.0 HF3 SSH Service Default Credentials weak authentication
6863| [99566] Solarwinds Log & Event Manager up to 6.3.0 HF3 privilege escalation
6864| [99565] Solarwinds Log & Event Manager up to 6.3.0 HF3 information disclosure
6865| [98140] Cisco Workload Automation/Tidal Enterprise Scheduler Client Manager Server File information disclosure
6866| [97038] Cisco Intrusion Prevention System Device Manager information disclosure
6867| [95608] Oracle Applications Manager 12.1.3/12.2.3/12.2.4/12.2.5/12.2.6 OAM Client unknown vulnerability
6868| [92425] EMC Replication Manager up to 5.5.3.0 Client privilege escalation
6869| [87681] HPE Service Manager up to 9.41 Web Client/Service Request Catalog/Mobility information disclosure
6870| [78497] Solarwinds Log and Event Manager up to 6.1.x Command Line Management Console privilege escalation
6871| [78496] Solarwinds Log and Event Manager Traceroute nonsecurestreamingamf privilege escalation
6872| [74290] Dell Asset Manager GetClientPackage.aspx sql injection
6873| [73017] IBM Qradar Security Information And Event Manager up to 7.2.1 information disclosure
6874| [73015] IBM Qradar Security Information And Event Manager up to 7.2.1 unknown vulnerability
6875| [72137] IBM Qradar Security Information And Event Manager 7.2.0 Privileges privilege escalation
6876| [72136] IBM Qradar Security Information And Event Manager 7.2.0 Session information disclosure
6877| [72135] IBM Qradar Security Information And Event Manager 7.2.0 unknown vulnerability
6878| [72134] IBM Qradar Security Information And Event Manager 7.2.0 cross site scripting
6879| [72133] IBM Qradar Security Information And Event Manager 7.2.0 Cleartext unknown vulnerability
6880| [71939] IBM Qradar Security Information And Event Manager 7.2.0 cross site scripting
6881| [71566] IBM Qradar Security Information And Event Manager 7.2.0 memory corruption
6882| [71293] IBM Qradar Security Information And Event Manager Cleartext unknown vulnerability
6883| [71292] IBM Qradar Security Information And Event Manager sql injection
6884| [70813] SolarWinds Log and Event Manager memory corruption
6885| [69656] Netweblogic Events Manager up to 5.2 index.php cross site scripting
6886| [66254] IBM Qradar Security Information And Event Manager up to 7.2.0 Console privilege escalation
6887| [66253] IBM Qradar Security Information And Event Manager up to 7.2.0 Certificates spoofing
6888| [66252] IBM Qradar Security Information And Event Manager up to 7.2.0 cross site scripting
6889| [66251] IBM Qradar Security Information And Event Manager up to 7.2.0 cross site request forgery
6890| [12067] Red Hat Enterprise Virtualization Manager 3.3 SPICE Client Invocation spoofing
6891| [65598] IBM Qradar Security Information And Event Manager 7.0.0 cross site scripting
6892| [65597] IBM Qradar Security Information And Event Manager up to 7.0.0 Access Restriction unknown vulnerability
6893| [65596] IBM Qradar Security Information And Event Manager cross site scripting
6894| [64227] IBM QRadar Security Information and Event Manager up to 7.0.0 privilege escalation
6895| [5053] Novell iManager up to 2.7.4 Web Interface jclient Create Attribute memory corruption
6896| [57348] EMC Data Loss Prevention Enterprise Manager cross site scripting
6897| [54911] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 Eventlog FastBackServer.exe _Eventlog memory corruption
6898| [53466] EMC Rsa Key Manager Client 1.5.0 sql injection
6899| [48050] IBM Tivoli Storage Manager Client up to 5.3.2 unknown vulnerability
6900| [48051] IBM Tivoli Storage Manager Client up to 5.5.0.0 unknown vulnerability
6901| [46029] Cisco Security Manager up to 3.1 Event Viewer unknown vulnerability
6902| [44781] IBM Tivoli Storage Manager Client up to 5.4.1.1 Data Protection dsmcat.exe memory corruption
6903| [44555] Acresso FLEXnet Connect 6.1 ActiveX Control MSVNClientDownloadManager61Lib.DownloadManager.1 unknown vulnerability
6904| [44330] Phlatline Personal Information Manager 1.0 events.php cross site scripting
6905| [40948] Print Manager Plus Client Billing and Authentication 7.0.127.16 pqcore.exe memory corruption
6906| [39463] IBM Tivoli Storage Manager Client up to 5.4.1.2 cross site scripting
6907| [39113] NetSupport Netsupport Manager Client 10.20 memory corruption
6908| [38936] NetSupport NetSupport Manager Client up to 9.9 spoofing
6909| [38893] IBM Tivoli Storage Manager Client up to 5.3.5.1 memory corruption
6910| [3319] IBM Tivoli Storage Manager Client memory corruption
6911| [2676] HP OpenView Client Configuration Manager up to 2.0 Radia Notify Daemon denial of service
6912| [32622] IBM Client Security Password Manager unknown vulnerability
6913| [141954] IBM Financial Transaction Manager up to 2.0.0.5/2.1.0.4/2.1.1.4/3.0.0.8 URL Request directory traversal
6914| [141651] Eclipse Paho Java Client Library 1.2.0 TLS Connection weak authentication
6915| [141631] Microsoft Windows up to Server 2019 SMB Client Driver information disclosure
6916| [141580] Microsoft Windows up to Server 2019 Transaction Manager information disclosure
6917| [141331] CA Client Automation/Workload Automation AE Common Service DIA privilege escalation
6918| [141280] ES File Explorer File Manager 4.2.0.1.3 on Android Intent com.estrongs.android.pop.ftp.ESFtpShortcut Application privilege escalation
6919| [141274] Cisco Webex Teams Client on Windows privilege escalation
6920| [141265] F5 BIG-IP/Enterprise Manager REST privilege escalation
6921| [141218] download-manager Plugin up to 2.9.93 on WordPress Category Parameter cross site scripting
6922| [141212] affiliates-manager Plugin up to 2.6.5 on WordPress cross site request forgery
6923| [141104] Micro Focus Content Manager 9.1/9.2/9.3 information disclosure
6924| [141102] Snare Central up to 7.4.4 DiskManager.php Parameter privilege escalation
6925| [141088] TeamSpeak Client up to 3.3.1 Unicode Character Crash denial of service
6926| [141084] VideoLAN VLC Media Player 3.0.7.1 MKV File mkv::event_thread_t memory corruption
6927| [140983] iThemes Builder Style Manager up to 0.7.6 on WordPress add_query_arg/remove_query_arg cross site scripting
6928| [140806] Raml-Module-Builder 26.4.0 PostgresClient.update sql injection
6929| [140756] Fortinet FortiManager VM up to 6.2.0 Integrity Check Image privilege escalation
6930| [140747] Tasking Manager up to 3.3.x sql injection
6931| [140725] Bolt up to 3.6.9 FilesystemManager.php createFolder/createFile cross site scripting
6932| [140716] Atlassian Universal Plugin Manager up to 2.22.18/3.0.2/4.0.2 REST Endpoint cross site request forgery
6933| [140662] Nexus Repository Manager up to 3.17.x Stored cross site scripting
6934| [140632] event-notifier Plugin up to 1.2.0 on WordPress Loading Animation cross site scripting
6935| [140493] the-events-calendar Plugin up to 4.8.1 on WordPress URL Parameter cross site scripting
6936| [140340] user-access-manager Plugin up to 1.1 on WordPress cross site request forgery
6937| [140338] Live555 Session ID createNewClientSessionWithId memory corruption
6938| [140333] rest-client Gem 1.6.13 on Ruby Backdoor privilege escalation
6939| [140314] Pivotal Application Service up to 2.3.15/2.4.11/2.5.7/2.6.2 Apps Manager /cloudapplication weak encryption
6940| [140303] OAuth2 Client Extension up to 0.3 on MediaWiki Parameter cross site request forgery
6941| [140278] RIOT up to 2019.07 TCP Implementation gnrc_tcp_eventloop.c _receive Network Packet denial of service
6942| [140272] Adobe Experience Manager 6.4/6.5 Code Execution weak authentication
6943| [140237] WSO2 API Manager up to 2.6.0 File Upload Filename cross site scripting
6944| [140235] Zoho ManageEngine ManageEngine OpManager up to 12.4x Password weak authentication
6945| [140234] Zoho ManageEngine Application Manager up to 14.2 NewThresholdConfiguration.jsp Parameter sql injection
6946| [140233] Zoho ManageEngine ManageEngine OpManager up to 12.4x NewThresholdConfiguration.jsp Parameter sql injection
6947| [140101] Yandex ClickHouse MySQL Client information disclosure
6948| [140130] WebStudio Ultimate Loan Manager 2.0 Branch Parameter cross site scripting
6949| [140065] Wind River VxWorks 6.6/6.7/6.8/6.9/7 RARP Client Reverse ARP Reply Logic privilege escalation
6950| [140003] PCManager 9.1.3.1 Driver Interface Code Execution
6951| [139879] Microsoft Windows up to Server 2019 DHCP Client memory corruption
6952| [139838] job-manager Plugin up to 0.7.18 on WordPress cross site scripting
6953| [139766] Wind River VxWorks up to 6.9.4 IGMPv3 Client information disclosure
6954| [139726] Huawei PCManager information disclosure
6955| [139725] Huawei PCManager Code Execution
6956| [139724] Huawei PCManager Code Execution
6957| [139709] Zoho ManageEngine AssetExplorer up to 6.2.0 ClientUtilServlet Parameter Server-Side Request Forgery
6958| [139647] Micro Focus Content Manager 9.1/9.2/9.3 Checkin Request privilege escalation
6959| [139636] VMware Lab Manager Slaves Plugin up to 0.2.8 on Jenkins Hostname Verification weak authentication
6960| [139511] Wind River VxWorks up to 7 ipdhcpc DHCP Client privilege escalation
6961| [139339] cPanel up to 64.0.20 ImageManager API Call Code Execution
6962| [139183] cPanel up to 11.54.0.3 WHM Feature Manager interface Stored cross site scripting
6963| [139141] Apache ActiveMQ Client up to 5.15.4 ActiveMQConnection.java ActiveMQConnection denial of service
6964| [138994] cPanel up to 82.0.1 WHM Tomcat Manager Interface Stored cross site scripting
6965| [138987] 10Web Photo Gallery plugin up to 1.5.30 on WordPress Filemanager filemanager/model.php sql injection
6966| [138974] cPanel up to 76.0.7 MultiPHP Manager Interface Stored cross site scripting
6967| [138947] One Identity Cloud Access Manager 8.1.3 HSTS weak encryption
6968| [138921] Tridactyl up to 1.15.x Key Event Fake unknown vulnerability
6969| [138873] MISP 2.4.111 event-graph View event-graph.js cross site scripting
6970| [138847] CentOS Web Panel 0.9.8.846 Filemanager filemanager2.php Parameter cross site scripting
6971| [138846] CentOS Web Panel 0.9.8.846 Filemanager Reverse Shell privilege escalation
6972| [138845] CentOS Web Panel 0.9.8.840 Filemanager /tmp/login.log information disclosure
6973| [138761] Qualcomm Snapdragon Auto Client Hostname information disclosure
6974| [138756] McAfee Data Loss Prevention up to 11.2.x ePO Extension command injection
6975| [138755] McAfee Data Loss Prevention up to 11.2.x ePO Extension Web Page cross site scripting
6976| [138518] Mozilla Firefox/Thunderbird/Firefox ESR Chrome Event Use-After-Free memory corruption
6977| [138509] HAProxy up to 2.0.2 proto_htx.c htx_manage_client_side_cookies denial of service
6978| [138473] Mozilla Firefox/Thunderbird/Firefox ESR Event Listener Use-After-Free denial of service
6979| [138418] Linux Foundation ONOS up to 1.15.0 YangLiveCompilerManager.java runJavaCompiler HTTP Request privilege escalation
6980| [138402] Foxit PhantomPDF up to 8.3.10 XFA Javascript xfa.event.rest denial of service
6981| [138369] Elcom CMS up to 10.6 EventSearchByState.aspx sql injection
6982| [138364] H3C H3Cloud OS ear/grid_event Parameter sql injection
6983| [138359] Linux Foundation ONOS SDN Controller up to 1.15 YangLiveCompilerManager.java privilege escalation
6984| [138332] Adobe Experience Manager up to 6.4 Reflected cross site scripting
6985| [138331] Adobe Experience Manager up to 6.4 Stored cross site scripting
6986| [138330] Adobe Experience Manager up to 6.4 cross site request forgery
6987| [138304] Linux Foundation ONOS up to 2.0.0 FlowRuleManager.java applyFlowRules/apply privilege escalation
6988| [138288] CampTix Event Ticketing Plugin up to 1.4 on WordPress Admin Section cross site scripting
6989| [138287] CampTix Event Ticketing Plugin up to 1.4 on WordPress Export CSV Injection privilege escalation
6990| [138260] Sitecore 9.0 rev 171002 Media Library/File Manager Parameter Persistent cross site scripting
6991| [138253] Zoho ManageEngine ADManager Plus/ADSelfService Plus/DesktopCentral Permission privilege escalation
6992| [138239] LibreOffice up to 6.2.4 Event Python Command privilege escalation
6993| [138137] Oracle Tape Virtual Storage Manager GUI 6.2 WebLogic unknown vulnerability
6994| [138131] Oracle MICROS Retail XBRi Loss Prevention 10.8.0/10.8.1/10.8.2/10.8.3 Apache Tomcat unknown vulnerability
6995| [138111] Oracle MICROS Retail XBRi Loss Prevention 10.8.0/10.8.1/10.8.2/10.8.3 Apache Commons FileUpload unknown vulnerability
6996| [138097] Oracle MySQL Server up to 5.7.26/8.0.16 Client programs denial of service
6997| [138028] Oracle Identity Manager 11.1.2.3.0/12.2.1.3.0 Apache Log4j unknown vulnerability
6998| [137932] Oracle Enterprise Manager Ops Center 12.3.3/12.4.0 Beanutils unknown vulnerability
6999| [137931] Oracle Enterprise Manager Ops Center 12.3.3/12.4.0 Spring Framework information disclosure
7000| [137930] Oracle Enterprise Manager Base Platform 12.1.0.5.0/13.2.0.0.0/13.3.0.0.0 Spring Framework information disclosure
7001| [137929] Oracle Enterprise Manager Base Platform 12.1.0.5.0/13.2.0.0.0/13.3.0.0.0 cxf unknown vulnerability
7002| [137927] Oracle Enterprise Manager Base Platform 12.1.0.5.0/13.2.0.0.0/13.3.0.0.0 jackson-databind denial of service
7003| [137926] Oracle Enterprise Manager for Fusion Middleware 13.2/13.3 Apache Commons FileUpload information disclosure
7004| [137924] Oracle Enterprise Manager Base Platform 12.1.0.5.0/13.2.0.0.0/13.3.0.0.0 Apache Commons FileUpload unknown vulnerability
7005| [137922] Oracle Enterprise Manager Ops Center 12.3.3/12.4.0 jackson-databind unknown vulnerability
7006| [137921] Oracle Enterprise Manager for Virtualization 13.1/13.2/13.3 jackson-databind unknown vulnerability
7007| [137780] Zoom Client up to 4.4.1 on MacOS ZoomOpener Daemon URL Code Execution
7008| [137790] Avaya Control Manager up to 7.x/8.0.3.x sql injection
7009| [137755] Ivanti Endpoint Manager up to 2017.3 SU6/2018.3 SU2 Core Server Code Execution
7010| [137751] osbs-client up to 0.56.0 yaml.load() YAML File Code Execution
7011| [137744] Juniper Junos Telnet Client Environment Variable Stack-based memory corruption
7012| [137739] IBM Security Identity Manager 7.0.1 information disclosure
7013| [137707] Cloudera Manager up to 5.15 Access Control privilege escalation
7014| [137625] Eventum 3.5.0 htdocs/manage/users.php cross site request forgery
7015| [137624] Eventum 3.5.0 /htdocs/list.php cross site scripting
7016| [137623] Eventum 3.5.0 /htdocs/popup.php Parameter cross site scripting
7017| [137622] Eventum 3.5.0 /htdocs/validate.php Parameter cross site scripting
7018| [137621] Eventum 3.5.0 htdocs/switch.php Parameter cross site scripting
7019| [137620] Eventum 3.5.0 htdocs/ajax/update.php Parameter cross site scripting
7020| [137600] KEYNTO Team Password Manager 1.5.0 Online Vault cross site scripting
7021| [137499] Zoom/RingCentral Client on MacOS Web Server Video Call privilege escalation
7022| [137497] Sonatype Nexus Repository Manager up to 3.16.x privilege escalation
7023| [137496] Sonatype Nexus Repository Manager up to 3.16.x weak authentication
7024| [137457] D-Link Central WiFi Manager CWM(100) PayAction.class.php Parameter sql injection
7025| [137456] D-Link Central WiFi Manager CWM(100) PayAction.class.php Parameter cross site scripting
7026| [137455] D-Link Central WiFi Manager CWM(100) /web/Public/Conn.php Parameter sql injection
7027| [137454] D-Link Central WiFi Manager CWM(100) Cookie IndexAction.class.php Empty Password weak authentication
7028| [137418] Cisco Unified Communications Manager Session Initiation Protocol SIP Packet denial of service
7029| [137442] Attendance Manager up to 0.5.6 cross site request forgery
7030| [137441] Attendance Manager up to 0.5.6 cross site scripting
7031| [137399] Eventum 3.5.0 /htdocs/switch.php Parameter Open Redirect
7032| [137284] BlogEngine.NET 3.3.7.0 /api/filemanager Parameter directory traversal
7033| [137254] Cloudera Manager File Permission privilege escalation
7034| [137253] Cloudera Manager Keystore Password cloudera-scm-agent information disclosure
7035| [137239] virt-manager 2.2.0 cirt-install Command Line Argument information disclosure
7036| [137187] Spacewalk up to 2.8 Cache Client Token privilege escalation
7037| [137186] Spacewalk up to 2.8 Client Token Header weak authentication
7038| [137152] F5 BIG-IP/BIG-IQ/iWorkflow/Enterprise Manager TMOS Shell privilege escalation
7039| [137089] Synology Calendar up to 2.3.0 Event Editor Parameter cross site scripting
7040| [137067] Ministry of Interior of the Slovak Republic eID Client Web Server HTML Page privilege escalation
7041| [137045] Grouptime Teamwire Desktop Client up to 1.8.x Admin Interface Stored cross site scripting
7042| [137044] Grouptime Teamwire Desktop Client up to 1.8.x on Windows Template Code Execution
7043| [137038] Odoo Community/Enterprise 10.0/11.0 Database Manager weak authentication
7044| [137031] McAfee Enterprise Security Manager up to 10.3.x/11.1.x directory traversal
7045| [137030] McAfee Enterprise Security Manager up to 10.3.x/11.1.x Parameter command injection
7046| [137029] McAfee Enterprise Security Manager up to 10.3.x/11.1.x Parameter command injection
7047| [137028] McAfee Enterprise Security Manager up to 10.3.x/11.1.x Application Protection Parameter Impersonation privilege escalation
7048| [137011] Google Chrome Download Manager HTML Page Out-of-Bounds memory corruption
7049| [136982] McAfee Enterprise Security Manager up to 11.1.x Access Control privilege escalation
7050| [136931] Cisco Data Center Network Manager Web-based Management Interface Request information disclosure
7051| [136930] Cisco Data Center Network Manager Web-based Management Interface Request privilege escalation
7052| [136929] Cisco Data Center Network Manager Web-based Management Interface File Upload privilege escalation
7053| [136928] Cisco Data Center Network Manager Web-based Management Interface HTTP Request weak authentication
7054| [136883] IBM Security Access Manager up to 9.0.6 privilege escalation
7055| [136882] IBM Security Access Manager up to 9.0.6 Web UI cross site scripting
7056| [136881] IBM Security Access Manager up to 9.0.6 weak encryption
7057| [136880] IBM Security Access Manager up to 9.0.6 Open Redirect
7058| [136879] IBM Security Access Manager up to 9.0.6 Session Expiration Session Token weak authentication
7059| [136878] IBM Security Access Manager up to 9.0.6 weak encryption
7060| [136877] IBM Security Access Manager up to 9.0.6 Certificate Man-in-the-Middle weak authentication
7061| [136875] IBM Security Access Manager up to 9.0.6 Impersonation spoofing
7062| [136848] BCN Quark Quarking Password Manager 3.1.84 Clickjacking privilege escalation
7063| [136800] Cloudera Manager up to 5.15.0 Wizard Parameter Open Redirect
7064| [136742] Cisco Security Manager XML Data XML External Entity
7065| [136763] Google Android 8.1/9.0 Password Reset DevicePolicyManagerService.java resetPasswordInternal privilege escalation
7066| [136702] Symantec Data Loss Prevention up to 15.5 MP1 cross site scripting
7067| [136603] UrBackup 2.2.6 CClientThread.cpp ProcessPacket Request denial of service
7068| [136599] RubyGems up to 3.0.2 Gem::CommandManager#run Escape Sequence privilege escalation
7069| [136558] Foxit Reader SDK Professsional 5.4.0.1031 Object GetDocEventHandler Office Document memory corruption
7070| [136514] Electronic Arts Origin Client up to 10.5 URI Argument Backdoor privilege escalation
7071| [136445] Intel RSTe up to 5.5.0 Accelerated Storage Manager Reflected cross site scripting
7072| [136411] SAP Work Manager/Inventory Manager Flooding denial of service
7073| [136407] SAP Solution Manager 7.2 Diagnostics Agent weak encryption
7074| [136349] Microsoft Windows up to Server 2019 Event Viewer eventvwr.msc XML External Entity
7075| [136194] Micro Focus Solution Business Manager up to 11.4.1 Open Redirect
7076| [136180] Cloudera Manager cross site scripting
7077| [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
7078| [136174] UrBackup 2.2.6 Client Application CClientThread.cpp GetFileHashAndMetadata Request denial of service
7079| [136148] Huawei PCManager up to 9.0.1 Application Code Execution
7080| [136147] Huawei PCManager up to 9.0.1 Application privilege escalation
7081| [136137] Pivotal Ops Manager up to 2.2.22/2.3.15/2.4.10/2.5.2 Token Expired weak authentication
7082| [136033] Cisco Unified Communications Manager IM and Presence Authentication Service Authentication Request Restart denial of service
7083| [136016] HPE Smart Update Manager up to 8.3.4 privilege escalation
7084| [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
7085| [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
7086| [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
7087| [135868] Micro Focus Service Manager up to 9.61 privilege escalation
7088| [135729] Google Sign-In with Google API C++ Client Integer denial of service
7089| [135727] Synacor Zimbra Collaboration Suite/Zimbra Web Client up to 8.8.8 Patch 6/8.8.9 Briefcase Persistent cross site scripting
7090| [135724] Synacor Zimbra Mail Client up to 8.6.0 Patch 4 Warning Dialog cross site scripting
7091| [135710] Adobe Experience Manager Forms 6.2/6.3/6.4 Stored cross site scripting
7092| [135674] Synacor Zimbra Collaboration Suite up to 8.8.10 Web Client cross site scripting
7093| [135670] Fortinet FortiClient Online Installer up to 6.0.5 on Windows DLL Loader FortiClientOnlineInstaller.exe Search Path memory corruption
7094| [135660] Fortinet FortiAnalyzer/FortiManager up to 5.6.0 DHCP Request Parameter cross site scripting
7095| [135563] Oracle Enterprise Manager Ops Center 12.3.3 Crash denial of service
7096| [135533] Eventum 3.5.0 /htdocs/post_note.php Parameter cross site scripting
7097| [135514] Qualcomm Snapdragon Auto up to SM7150 Event weak authentication
7098| [135513] Cloudera Manager up to 5.13.3/5.14.3/5.15.0 information disclosure
7099| [135509] Precurio 2.1 Xinha Plugin ExtendedFileManager.php directory traversal
7100| [135448] Zoho ManageEngine ManageEngine OpManager 12.2 Google Map cross site scripting
7101| [135447] Zoho ManageEngine ManageEngine OpManager 12.2 getmailserversettings Parameter sql injection
7102| [135446] Zoho ManageEngine Applications Manager 12.3 Domain Name userconfiguration.do information disclosure
7103| [135390] Zoho ManageEngine Application Manager 13.1 Build 13100 Alarm File Upload privilege escalation
7104| [135389] Zoho ManageEngine Application Manager 13.1 Build 13100 Widget cross site scripting
7105| [135388] Zoho ManageEngine Application Manager 13.1 Build 13100 /auditLogAction.do sql injection
7106| [135387] Zoho ManageEngine ManageEngine OpManager 12.2 Group Chat File Upload privilege escalation
7107| [135301] WSO2 API Manager 2.6.0 File Upload privilege escalation
7108| [135286] Carts Guru Plugin 1.4.5 on WordPress Deserialization wc-cartsguru-event-handler.php Cookie unknown vulnerability
7109| [135201] Intel Unite Client up to 3.x on Android privilege escalation
7110| [135196] Intel Unite Client up to 3.3 denial of service
7111| [135142] Cisco AnyConnect Secure Mobility Client on Linux HostScan HTTP Traffic information disclosure
7112| [135095] MiniUPnP MiniUPnPd up to 2.1 upnpevents.c upnp_event_prepare Return Value information disclosure
7113| [135081] McAfee Network Security Manager up to 9.1 Update 4 cross site scripting
7114| [135069] Cisco Video Surveillance Manager Web-based Management Interface Parameter information disclosure
7115| [135045] WSO2 API Manager 2.6.0 API Documentation Document information disclosure
7116| [135043] WSO2 API Manager 2.6.0 Server-Side Request Forgery
7117| [135022] SAP Solution Manager Authorization privilege escalation
7118| [135017] Enghouse Cloud Contact Center Platform 7.2.5 XML Data ClientServiceConfigController.cs XML External Entity
7119| [134626] D-Link DIR-868L 2.05B02 /HNAP1/SetClientInfoDemo Parameter command injection
7120| [134606] Seagate NAS OS 4.3.15.1 Application Manager cross site scripting
7121| [134603] Seagate NAS OS 4.3.15.1 Download Manager Loopback privilege escalation
7122| [134583] NetApp OnCommand Unified Manager up to 9.4 HTTP Security Header information disclosure
7123| [134582] NetApp OnCommand Unified Manager up to 5.2.3 HTTP Security Header information disclosure
7124| [134544] NetIQ Identity Manager up to 4.5 ServiceNow Driver information disclosure
7125| [134459] Sonatype Nexus Repository Manager up to 2.14.12 cross site scripting
7126| [134436] WooCommerce Checkout Manager Plugin up to 4.2 on WordPress admin-ajax.php Parameter denial of service
7127| [134433] Sierra Wireless AirLink ES450 4.9.3 ACEManager EmbeddedAceSet_Task.cgi HTTP Request privilege escalation
7128| [134432] Sierra Wireless AirLink ES450 4.9.3 ACEManager EmbeddedAceSet_Task.cgi privilege escalation
7129| [134431] Sierra Wireless AirLink ES450 4.9.3 ACEManager EmbeddedAceGet_Task.cgi information disclosure
7130| [134430] Sierra Wireless AirLink ES450 4.9.3 ACEManager EmbeddedAceGet_Task.cgi information disclosure
7131| [134429] Sierra Wireless AirLink ES450 4.9.3 ACEManager Credentials weak encryption
7132| [134428] Sierra Wireless AirLink ES450 4.9.3 ACEManager HTTP Request Config information disclosure
7133| [134427] Sierra Wireless AirLink ES450 4.9.3 ACEManager template_load.cgi HTTP Request information disclosure
7134| [134426] Sierra Wireless AirLink ES450 up to 4.9.3 ACEManager HTTP Request cross site request forgery
7135| [134425] Sierra Wireless AirLink ES450 4.9.3 ACEManager ping_result.cgi cross site scripting
7136| [134422] Sierra Wireless AirLink ES450 4.9.3 ACEManager iplogging.cgi HTTP Request command injection
7137| [134349] Cisco ASA VPN Session Manager Request denial of service
7138| [134288] IBM Rational Engineering Lifecycle Manager up to 6.0.6 weak encryption
7139| [134244] Strato HiDrive Desktop Client up to 5.0.1.0 on Windows HiDriveMaintenanceService privilege escalation
7140| [134243] InfinitumIT DirectAdmin up to 1.561 FileManager CSRF privilege escalation
7141| [134187] NSS up to 3.38 SSLv2 ClientHello weak encryption
7142| [134076] Fortinet FortiManager up to 5.4.1 Man-in-the-Middle weak encryption
7143| [134047] CMS Made Simple up to 2.2.10 File Manager Reflected cross site scripting
7144| [134042] TIBCO ActiveMatrix BPM Workspace Client URL Open Redirect
7145| [134041] TIBCO ActiveMatrix BPM Workspace Client Settings privilege escalation
7146| [134035] Pivotal Apps Manager up to 665.0.27/666.0.20/667.0.6 Invitation Service HTTP weak encryption
7147| [134025] TIBCO ActiveMatrix BPM up to 4.2.0 Client/REST API Request cross site scripting
7148| [133984] Zoho ManageEngine Applications Manager 12.x/13.x/14 FaultTemplateOptions.jsp sql injection
7149| [133955] Zoho ManageEngine Applications Manager 11.x/12.x/13.x/14.0 Popup_SLA.jsp sql injection
7150| [133923] Kubernetes up to 1.13.0 rest.AnonymousClientConfig() information disclosure
7151| [133863] Electronic Arts Origin Client 10.5.36 on Windows Template Parameter Code Execution
7152| [133862] TeamSpeak Client up to 3.2.4 QT Framework Code Execution
7153| [133854] Activision Infinity Ward Call of Duty: Black Ops 2 SV_SteamAuthClient Authentication Request memory corruption
7154| [133847] Dell SupportAssist Client up to 3.2 Code Execution
7155| [133846] Dell SupportAssist Client up to 3.2 Origin Validator cross site request forgery
7156| [133813] Cisco Unified Communications Manager 10.5/11.5/12.0/12.5 User Data Services UDS API Request denial of service
7157| [133790] Cisco IOS XR up to 6.5.0 Event Management Service Daemon gRPC Request Crash denial of service
7158| [133487] Oracle Commerce Merchandising 11.2.0.3 Asset Manager unknown vulnerability
7159| [133395] mndpsingh287 File Manager Plugin 3.0 on WordPress Parameter cross site scripting
7160| [133394] mndpsingh287 File Manager Plugin 3.0 on WordPress Parameter cross site request forgery
7161| [133324] Joomla CMS up to 3.9.4 Media Manager directory traversal
7162| [133247] Norton Password Manager IP Address spoofing
7163| [133238] Sophos IPSec Client up to 11.03 Software Update Man-in-the-Middle weak encryption
7164| [133124] Eye4 App on Android/iOS/Windows Phone vstc.vscam.client privilege escalation
7165| [133101] IBM Tivoli Storage Manager 7.1/8.1 Clickjacking privilege escalation
7166| [133006] VMware Lab Manager Slaves Plugin on Jenkins Permission Check LabManager.DescriptorImpl#doTestConnection privilege escalation
7167| [133005] VMware Lab Manager Slaves Plugin on Jenkins LabManager.DescriptorImpl#doTestConnection cross site request forgery
7168| [132723] QASymphony qTest Manager 9.0.0 qTest Portal /portal/loginform Parameter Open Redirect
7169| [132661] Synology DiskStation Manager up to 6.2.1 Control Panel Parameter cross site scripting
7170| [132660] Synology Router Manager up to 1.1.7 Configuration File /usr/syno/etc/mount.conf information disclosure
7171| [132659] Synology DiskStation Manager up to 6.2.1 Configuration File /usr/syno/etc/mount.conf information disclosure
7172| [132658] Synology Router Manager up to 1.1.7 SYNO.Core.ACL Parameter information disclosure
7173| [132657] Synology Router Manager up to 1.1.7 SYNO.FolderSharing.List Parameter information disclosure
7174| [132655] Synology Router Manager up to 1.1.7 Permission synouser.conf information disclosure
7175| [132654] Synology DiskStation Manager up to 6.2 Permission synouser.conf information disclosure
7176| [132653] Synology Router Manager up to 1.1.7 ftpd Command OS Command Injection privilege escalation
7177| [132652] Synology DiskStation Manager up to 6.2 ftpd Command OS Command Injection privilege escalation
7178| [132651] Synology SSL VPN Client up to 1.2.5 client.cgi Parameter weak encryption
7179| [132639] Grandstream GXV3370/WP820 manager Shell Metacharacter Code Execution
7180| [132635] Grandstream GAC2500/GXP2200/GVC3202/GXV3275/GXV3240 up to 1.0.3 manager Shell Metacharacter Code Execution
7181| [132503] Micro Focus Solutions Business Manager up to 11.4 Reflected cross site scripting
7182| [132502] Micro Focus Solutions Business Manager up to 11.4 information disclosure
7183| [132501] Micro Focus Solutions Business Manager up to 11.4 denial of service
7184| [132500] Micro Focus Solutions Business Manager up to 11.4 Code Execution
7185| [132468] CMS Made Simple 2.2.8 ModuleManager action.installmodule.php privilege escalation
7186| [132464] CMS Made Simple 2.2.8 DesignManager action.admin_bulk_css.php Parameter privilege escalation
7187| [132444] McAfee Network Security Manager 9.1/9.2 GUI Session privilege escalation
7188| [132437] CMS Made Simple 2.2.10 Layout Design Manager cross site scripting
7189| [132086] PuTTY up to 0.70 on Unix Server-to-Client Forwarding memory corruption
7190| [132041] Sonatype Nexus Repository Manager up to 3.14.x Access Control privilege escalation
7191| [132022] LogonBox Nervepoint Access Manager up to 2017 runJob.html GET Request denial of service
7192| [132021] BlogEngine.NET up to 3.3.6.0 File Manager PostList.ascx.cs directory traversal
7193| [131977] WSO2 API Manager 2.1.0/2.6.0 Carbon Reflected cross site scripting
7194| [131976] WSO2 API Manager 2.1.0/2.6.0 Store DOM-Based cross site scripting
7195| [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
7196| [131786] IBM Rational Engineering Lifecycle Manager up to 5.x/6.0.6 Web UI cross site scripting
7197| [131785] IBM Rational Engineering Lifecycle Manager up to 5.x/6.0.6 URL privilege escalation
7198| [131784] IBM Rational Engineering Lifecycle Manager up to 5.x/6.0.6 Web UI cross site scripting
7199| [131783] IBM Rational Engineering Lifecycle Manager up to 5.x/6.0.6 Web UI cross site scripting
7200| [131782] IBM Rational Engineering Lifecycle Manager up to 5.x/6.0.6 Web UI cross site scripting
7201| [131780] IBM Rational Quality Manager up to 5.x/6.0.6 Web UI cross site scripting
7202| [131779] IBM Rational Quality Manager up to 5.x/6.0.6 Web UI cross site scripting
7203| [131778] IBM Rational Quality Manager up to 5.x/6.0.6 Web UI cross site scripting
7204| [131777] IBM Rational Quality Manager up to 5.x/6.0.6 Web UI cross site scripting
7205| [131773] IBM Rational Quality Manager up to 5.x/6.0.6 Web UI cross site scripting
7206| [131772] IBM Rational Quality Manager up to 5.x/6.0.6 Web UI cross site scripting
7207| [131770] IBM Rational Quality Manager up to 5.x/6.0.6 Web UI cross site scripting
7208| [131703] F5 BIG-IP/Enterprise Manager Configuration Utility cross site scripting
7209| [131702] F5 BIG-IP/Enterprise Manager Traffic Management User Interface Request denial of service
7210| [131701] F5 BIG-IP/Enterprise Manager Traffic Management User Interface privilege escalation
7211| [131700] F5 BIG-IP up to 11.5.8/11.6.3.2/12.1.3.6/13.1.1.1/14.0.0.2 TMM ClientHello Message memory corruption
7212| [131696] Dell EMC RSA Authentication Manager up to 8.4 Credential Management Credentials information disclosure
7213| [131662] Microsoft Visual Studio on Mac Package Manager privilege escalation
7214| [131661] NuGet up to 4.9.4 Package Manager privilege escalation
7215| [131660] Microsoft Mono Framework 5.18.0.223/5.20.0 Package Manager privilege escalation
7216| [131659] Microsoft .NET Core SDK 1.1/2.1.500 Package Manager privilege escalation
7217| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7218| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7219| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
7220| [131609] Korenix JetPort 5601/JetPort 5601f Web Manager Persistent cross site scripting
7221| [131539] Upcoming Events Plugin up to 1.32 on MyBB upcoming_events.php cross site scripting
7222| [131528] GNOME glib 2.59.2 GTask gio/gsocketclient.c g_socket_client_connected_callback denial of service
7223| [131523] UltraVNC up to 1.2.2.3 VNC Client Out-of-Bounds memory corruption
7224| [131515] UltraVNC up to 1.2.2.3 VNC Client Out-of-Bounds denial of service
7225| [131514] UltraVNC up to 1.2.2.3 VNC Client Stack-based denial of service
7226| [131513] UltraVNC up to 1.2.2.3 VNC Client ReadString memory corruption
7227| [131512] UltraVNC up to 1.2.2.3 VNC Client Out-of-Bounds denial of service
7228| [131511] UltraVNC up to 1.2.2.3 VNC Client Mode Copybuffer memory corruption
7229| [131510] UltraVNC up to 1.2.2.3 VNC Client Mode Out-of-Bounds memory corruption
7230| [131509] UltraVNC up to 1.2.2.3 VNC Client Ultra2 Decoder Out-of-Bounds memory corruption
7231| [131475] Bolt up to 3.6.4 Filemanager FilesystemManager.php privilege escalation
7232| [131454] Pivotal Operations Manager up to 2.1.19/2.2.15/2.3.9/2.4.2 Reflected cross site scripting
7233| [131452] Dell WES Wyse Device Agent/Wyse ThinLinux Hagent FTP Client memory corruption
7234| [131431] Monstra CMS 3.0.4 filesmanager.admin.php privilege escalation
7235| [131414] Webmin 1.900 Java File Manager /updown/upload.cgi Code Execution
7236| [131388] ApowerManager App up to 3.1.7 on Android ?Key=PhoneRequestAuthorization denial of service
7237| [131361] UltraVNC Revision 1203 Client RAW Decoder Out-of-Bounds memory corruption
7238| [131360] UltraVNC Revision 1203 Client Ultra Decoder Heap-based memory corruption
7239| [131359] UltraVNC Revision 1199 Client CoRRE Decoder Out-of-Bounds memory corruption
7240| [131358] UltraVNC Revision 1199 Client RRE Decoder Out-of-Bounds memory corruption
7241| [131357] UltraVNC Revision 1198 Client Memory Leak memory corruption
7242| [131356] UltraVNC Revision 1198 Client Heap-based memory corruption
7243| [131316] UltraVNC Revision 1198 Client Underflow memory corruption
7244| [131226] CA Privileged Access Manager 3.x jk-manager/jk-status weak authentication
7245| [131221] F5 BIG-IP Access Policy Manager 11.5.x/11.6.x Admin Web UI cross site scripting
7246| [131849] SQLiteManager 1.2.0/1.2.4 main.php sql injection
7247| [131205] Cordaware bestinformed up to 6.2.0 Microsoft Windows Client Certificate Downgrade weak encryption
7248| [131204] Cordaware bestinformed up to 6.2.0 Microsoft Windows Client privilege escalation
7249| [131203] Cisco WebEx Teams 3.13.26920 on iOS Client Application privilege escalation
7250| [131181] Tecrail Responsive FileManager up to 9.13.4 ajax_calls.php Parameter directory traversal
7251| [131180] Tecrail Responsive FileManager 9.13.4 ajax_calls.php save_img Image File directory traversal
7252| [131179] Tecrail Responsive FileManager 9.13.4 execute.php create_file directory traversal
7253| [131178] Tecrail Responsive FileManager 9.13.4 ajax_calls.php get_file Parameter directory traversal
7254| [131177] Tecrail Responsive FileManager 9.13.4 Media File Upload media_preview cross site scripting
7255| [131176] Tecrail Responsive FileManager 9.13.4 execute.php delete_file directory traversal
7256| [131175] Tecrail Responsive FileManager 9.13.4 execute.php delete_folder directory traversal
7257| [131097] Signiant Manager+Agents up to 13.4 set Command memory corruption
7258| [131045] Cisco HyperFlex Software up to 3.5 CLuster Service Manager privilege escalation
7259| [130985] TinTin++/WinTin++ 2.01.6 Client strip_vt102_codes Long Message memory corruption
7260| [130972] Intel Data Center Manager SDK up to 5.0.1 Session weak authentication
7261| [130957] ZoneMinder up to 1.32.3 events.php Parameter sql injection
7262| [130916] ES File Explorer File Manager 4.1.9.7.4 on Android Help Man-in-the-Middle weak encryption
7263| [130879] Yokogawa B-M9000 License Manager Service privilege escalation
7264| [130836] Solutions Business Manager up to 11.4 weak authentication
7265| [130623] MyWebSQL 3.7 User Manager Stored cross site scripting
7266| [130606] Job Import Plugin up to 2.1 on Jenkins XML Data RestApiClient.java XML External Entity
7267| [130585] GPAC up to 0.7.2 scene_manager.c gf_sm_load_init memory corruption
7268| [130536] Mozilla Firefox up to 64 Texture Client Out-of-Bounds memory corruption
7269| [130516] D-Link DIR-823G 1.02B03 HNAP API /bin/goahead GetClientInfo information disclosure
7270| [130499] ZoneMinder up to 1.32.3 events.php sortHeader() Query String cross site scripting
7271| [130468] Hex Package Manager up to 0.3.0 Code Execution
7272| [130467] Hex Package Manager up to 0.18.2 Code Execution
7273| [130453] IBM Security Identity Manager 7.0.1 XML Data XML External Entity
7274| [130450] IBM Tivoli Application Dependency Discovery Manager 7.2.2/7.3 Password Hash Memory information disclosure
7275| [130387] Avaya Aura Communication Manager up to 6.3.x/7.1.3.1/8.0.0 Call Processor denial of service
7276| [130365] Media File Manager Plugin 1.4.2 on WordPress wp-admin/admin-ajax.php directory traversal
7277| [130364] Media File Manager Plugin 1.4.2 on WordPress wp-admin/admin-ajax.php dir_from/dir_to Parameter directory traversal
7278| [130363] Media File Manager Plugin 1.4.2 on WordPress wp-admin/admin-ajax.php mrelocator_getdir cross site scripting
7279| [130362] Media File Manager Plugin 1.4.2 on WordPress wp-admin/admin-ajax.php mrelocator_getdir directory traversal
7280| [130357] D-Link Central WiFiManager CWM-100 1.03 r0098 MailConnect Server-Side Request Forgery
7281| [130356] D-Link Central WiFiManager CWM-100 1.03 r0098 Service Port 8000 Server-Side Request Forgery
7282| [130337] LibVNC up to 0.9.11 libvncclient/rfbproto.c memory corruption
7283| [130289] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Reflected cross site scripting
7284| [130288] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Stored cross site scripting
7285| [130287] Adobe Experience Manager Forms 6.2/6.3/6.4 Stored cross site scripting
7286| [130132] Foxit Reader up to 9.2.0.9297 XFA Event memory corruption
7287| [133069] Uniqkey Password Manager 1.14 Credentials information disclosure
7288| [132960] Uniqkey Password Manager 1.14 Credentials denial of service
7289| [132740] Uniqkey Password Manager 1.14 Credentials information disclosure
7290| [130215] Cisco Webex Teams Client URI privilege escalation
7291| [130213] IBM Financial Transaction Manager 3.2.1 information disclosure
7292| [130129] IBM Security Key Lifecycle Manager 3.0.0.0/3.0.0.1/3.0.0.2 weak encryption
7293| [129982] CA Service Desk Manager 14.1/17 User Interface privilege escalation
7294| [129981] CA Service Desk Manager 14.1/17 information disclosure
7295| [129960] Atlassian Universal Plugin Manager up to 2.22.13 Upload Add-On Network Request XML External Entity
7296| [129848] IBM Security Identity Manager 6.0.0 XML Data XML External Entity
7297| [129836] SAS Web Infrastructure Platform up to 9.4M2 Logon Manager Reflected cross site scripting
7298| [129823] ES File Explorer File Manager up to 4.1.9.7.4 on Android Service Port 59777 privilege escalation
7299| [129738] Zenbership v107 event-add.php cross site request forgery
7300| [129691] Oracle Solaris 10 DHCP Client unknown vulnerability
7301| [129597] Oracle Health Sciences Information Manager 3.0 Health Policy Engine unknown vulnerability
7302| [129519] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Apache ActiveMQ unknown vulnerability
7303| [129516] Oracle Enterprise Manager Base Platform 13.2/13.3 Jasper Project unknown vulnerability
7304| [129515] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Jasper Project denial of service
7305| [129514] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Jasper Project unknown vulnerability
7306| [129513] Oracle Enterprise Manager Base Platform 12.1.0.5/13.2.0/13.3.0 Bouncy Castle Java Library denial of service
7307| [129512] Oracle Enterprise Manager for Virtualization 13.2.2/13.2.3/13.3.1 OpenSSL memory corruption
7308| [129511] Oracle Enterprise Manager for Virtualization 13.2.2/13.2.3/13.3.1 Bouncy Castle Java Library unknown vulnerability
7309| [129509] Oracle Enterprise Manager Base Platform 12.1.0.5/13.2.0/13.3.0 jackson-databind unknown vulnerability
7310| [129508] Oracle Applications Manager up to 12.2.8 Apache Derby unknown vulnerability
7311| [129495] Oracle Content Manager up to 12.2.8 OpenSSL unknown vulnerability
7312| [129485] Oracle Communications Unified Session Manager SCz7.3.5 OpenSSL denial of service
7313| [129157] Premium WP Suite Easy Redirect Manager Plugin 28.07-17 on WordPress Log View redirect-log.php GET Request cross site scripting
7314| [129152] IBM Security Identity Manager 6.0.0 Upload Malicious privilege escalation
7315| [129151] IBM Security Identity Manager 6.0.0 Web UI cross site scripting
7316| [129150] IBM Security Identity Manager 6.0.0 Password Policy privilege escalation
7317| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
7318| [128992] Cisco Jabber Client Framework cross site scripting
7319| [128990] Cisco Unified Communications Manager Web-based Management Interface Credentials information disclosure
7320| [128883] Cybozu Remote Service up to 3.1.8 Client Certificates Management Screen Clickjacking denial of service
7321| [128875] Event Calendar WD up to 1.1.21 cross site scripting
7322| [128778] SAP CRM WebClient UI cross site scripting
7323| [128777] SAP CRM WebClient UI cross site scripting
7324| [128775] SAP Work and Inventory Manager Flooding denial of service
7325| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
7326| [128714] Apache Thrift Java Client Library up to 0.11.0 SASL Negotiation org.apache.thrift.transport.TSaslTransport unknown vulnerability
7327| [128711] NetApp OnCommand Unified Manager for 7-Mode up to 5.2.3 Cookie Man-in-the-Middle weak authentication
7328| [128669] Vivotek Network Camera up to 0x08x event_script.js Query String cross site scripting
7329| [128626] SDL Web 8.5.0 Content Manager XML External Entity
7330| [128555] HSWeb 3.0.4 OAuth2ClientController.java Parameter cross site request forgery
7331| [128554] HSWeb 3.0.4 FlowableModelManagerController.java Parameter cross site scripting
7332| [128491] Evolution CMS 1.4.x manager/ Parameter cross site scripting
7333| [128490] Evolution CMS 1.4.x manager/ Parameter cross site scripting
7334| [128393] Synology DiskStation Manager up to 6.1.6 Log Exporter CSV command injection
7335| [128392] Synology DiskStation Manager up to 6.1.6 SYNO.Core.Desktop.SessionData information disclosure
7336| [128391] Synology Router Manager up to 1.1.7 info.cgi Parameter cross site scripting
7337| [128390] Synology DiskStation Manager up to 6.1.6 info.cgi Parameter cross site scripting
7338| [128355] DouCo DouPHP 1.5 manager.php cross site request forgery
7339| [128319] Tenda ADSL Modem 1.0.1 DHCP Client Hostname cross site scripting
7340| [128318] TP-LINK TD-W8961ND DHCP Client Hostname cross site scripting
7341| [128277] Zoho ManageEngine OpManager up to 12.3 Alarms cross site scripting
7342| [128276] Zoho ManageEngine OpManager up to 12.3 Alarms sql injection
7343| [128236] Elasticsearch Security 6.5.0/6.5.1 Java Security Manager Request XML External Entity
7344| [128179] Alpine Linux up to 2.6.9/2.7.5/2.10.0 Package Manager Code Execution
7345| [128140] Pulse Secure Virtual Traffic Manager up to 9.9r1/10.3 information disclosure
7346| [128139] Pulse Secure Virtual Traffic Manager up to 9.9r1/10.3 Web Administration User Interface Stored cross site scripting
7347| [128124] LibVNC Client NULL Pointer Dereference denial of service
7348| [128123] LibVNC Client Stack-based memory corruption
7349| [128122] LibVNC Client Stack-based memory corruption
7350| [128121] LibVNC Client Loop denial of service
7351| [128100] Webroot BrightCloud SDK HTTP Client TLS Certificate weak encryption
7352| [128086] IBM Event Streams 2018.3.0 API Request Header privilege escalation
7353| [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
7354| [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
7355| [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
7356| [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
7357| [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
7358| [128013] Zoho ManageEngine OpManager up to 12.2 getGraphData API sql injection
7359| [127962] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 information disclosure
7360| [127958] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 Web UI cross site scripting
7361| [127957] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 weak encryption
7362| [127956] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 Blacklist privilege escalation
7363| [127952] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 Error Message information disclosure
7364| [127951] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 Session Man-in-the-Middle weak encryption
7365| [127950] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 Clickjacking privilege escalation
7366| [127949] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 Web UI cross site scripting
7367| [127942] IBM Security Access Manager Appliance 9.0.1.0/9.0.2.0/9.0.3.0/9.0.4.0/9.0.5.0 Web UI cross site scripting
7368| [127907] iManager up to 3.1 SP1 cross site scripting
7369| [127739] Aruba ClearPass Policy Manager up to 6.6.10/6.7.5 Guest Authorization privilege escalation
7370| [127738] Aruba ClearPass Policy Manager up to 6.6.10/6.7.5 API weak authentication
7371| [127737] Aruba ClearPass Policy Manager up to 6.6.10/6.7.5 OneConnect Command privilege escalation
7372| [127736] Aruba ClearPass Policy Manager up to 6.6.10/6.7.5 sql injection
7373| [127664] Zoho ManageEngine OpManager up to 12.2 Domain Controller cross site scripting
7374| [127658] MISP up to 2.4.9x Import app/Model/Event.php Filename String privilege escalation
7375| [127652] Norton Password Manager on Android cross site scripting
7376| [127350] Dell OpenManage Network Manager up to 6.4.x MySQL privilege escalation
7377| [127349] Dell Network Manager up to 6.5.2 Authorization /etc/sudoers privilege escalation
7378| [127292] Pulse Secure Desktop Client up to R6.0 Build 1769 on Windows Permission privilege escalation
7379| [127268] Cisco Prime License Manager Web Framework HTTP POST Request sql injection
7380| [127211] ZyXEL NSA325 V2 4.81 zyshclient command injection
7381| [127189] TerraMaster TOS 3.1.03 File Manager Username cross site scripting
7382| [127096] University of Washington IMAP Toolkit 2007f on Unix rsh Command c-client/imap4r1.c imap_open() privilege escalation
7383| [127071] Tryton up to 5.0.0 Client bus.py weak encryption
7384| [127092] VMware vSphere Data Protection up to 6.0.8/6.1.9 Java Management Client Private Key information disclosure
7385| [127031] Zoho ManageEngine OpManager up to 12.3 cross site scripting
7386| [127030] Zoho ManageEngine OpManager up to 12.3 Stored cross site scripting
7387| [127012] Access Manager Identity Provider up to 4.4 SP2 Open Redirect
7388| [126954] School Event Management System 1.0 student/index.php Parameter sql injection
7389| [126953] School Event Management System 1.0 controller.php cross site request forgery
7390| [126952] School Event Management System 1.0 controller.php privilege escalation
7391| [126933] Zoho ManageEngine OpManager up to 12.2 updateWidget API cross site scripting
7392| [126929] Sonatype Nexus Repository Manager up to 3.13 Java Expression Language Injection privilege escalation
7393| [126928] Sonatype Nexus Repository Manager up to 3.13 Access Control privilege escalation
7394| [126927] Sonatype Nexus Repository Manager up to 3.13 cross site scripting
7395| [126918] NetIQ Access Manager up to 4.4 SP2 cross site scripting
7396| [126869] Google Android up to 9.0 eas_smf.c SMF_ParseMetaEvent denial of service
7397| [126785] SAP Fiori Client on Android Log View cross site scripting
7398| [126784] SAP Fiori Client on Android Broadcast Message unknown vulnerability
7399| [126782] SAP Fiori Client on Android Push Notification Crash denial of service
7400| [126780] SAP Fiori Client on Android Javascript API privilege escalation
7401| [126772] SAP Business Intelligence 4.1/4.2 Web Intelligence Richclient 3 Flooding denial of service
7402| [126771] Micro Focus Service Manager up to 9.51 information disclosure
7403| [126768] Losant Arduino MQTT Client up to 2.6 Stack-based memory corruption
7404| [126756] TIBCO DataSynapse GridServer Manager up to 6.3.0 Broker/Director cross site request forgery
7405| [126664] IBM Case Manager up to 5.3.3.0 directory traversal
7406| [126896] Apache Commons FileUpload 1.3.3 on LDAP Manager DiskFileItem File privilege escalation
7407| [126563] libIEC61850 1.3 client/client_control.c ControlObjectClient_setCommandTerminationHandler memory corruption
7408| [126507] Google Android up to 8.1 smp_br_main.cc smp_br_state_machine_event memory corruption
7409| [126472] Zoho ManageEngine Network Configuration Manager/OpManager up to 12.3.213 ProcessRequest.do GET Request XML External Entity
7410| [126456] Zoho ManageEngine OpManager up to 12.3 Mail Server Settings sql injection
7411| [126451] libIEC61850 1.3 client/ied_connection.c ClientDataSet_getValues denial of service
7412| [126422] IBM Rational Engineering Lifecycle Manager up to 6.0.6 XML Data XML External Entity
7413| [126412] Pivotal Operations Manager up to 2.0.23/2.1.14/2.2.6/2.3.0 privilege escalation
7414| [126409] IBM Quality Manager up to 6.0.6 Web UI cross site scripting
7415| [126390] NetGain Enterprise Manager up to 10.0.56 Code Execution
7416| [126389] NetGain Enterprise Manager up to 10.1.11 Stored cross site scripting
7417| [126375] Tecrail Responsive FileManager 9.13.4 Incomplete Fix upload.php Parameter Server-Side Request Forgery
7418| [126347] Synology DiskStation Manager up to 6.2 SYNO.Core.ACL Parameter information disclosure
7419| [125998] systemd up to 239 dhcp6 Client Heap-based memory corruption
7420| [125962] Mozilla Firefox up to 62.x Nested Event Loop denial of service
7421| [125901] Zoho ManageEngine OpManager up to 12.2 File Upload privilege escalation
7422| [125842] IBM Security Access Manager Appliance 9.0.3.1/9.0.4.0/9.0.5.0 Advanced Access Control privilege escalation
7423| [125817] Ekushey Project Manager CRM 3.1 create Parameter cross site scripting
7424| [125734] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Stored cross site scripting
7425| [125733] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Stored cross site scripting
7426| [125732] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Reflected cross site scripting
7427| [125731] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Reflected cross site scripting
7428| [125730] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Stored cross site scripting
7429| [125681] Zoho ManageEngine OpManager up to 12.2 cross site scripting
7430| [125604] Oracle Retail Predictive Application Server 14.0/14.1/15.0/16.0 RPAS Fusion Client unknown vulnerability
7431| [125503] Oracle Hyperion 11.1.2.4 Common Events unknown vulnerability
7432| [125502] Oracle Hyperion 11.1.2.4 Common Events unknown vulnerability
7433| [125501] Oracle Hyperion 11.1.2.4 Common Events unknown vulnerability
7434| [125500] Oracle Hyperion 11.1.2.4 Common Events unknown vulnerability
7435| [125485] Oracle Virtual Directory 11.1.1.7.0/11.1.1.9.0 Virtual Directory Manager denial of service
7436| [125449] Oracle Identity Manager 11.1.2.3.0/12.2.1.3.0 Advanced Console denial of service
7437| [125438] Oracle Adaptive Access Manager 11.1.1.7.0/11.1.2.3.0 OAAM Server unknown vulnerability
7438| [125429] Oracle Identity Manager 11.1.2.3.0/12.2.1.3.0 Installer unknown vulnerability
7439| [125416] Oracle Enterprise Manager Base Platform 12.1.0.5/13.2 Discovery Framework denial of service
7440| [125415] Oracle Enterprise Manager for MySQL Database 13.2 EM Plugin unknown vulnerability
7441| [125414] Oracle Configuration Manager 12.1.2.0.2/12.1.2.0.5 Collector of Config and Diag unknown vulnerability
7442| [125413] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Jython memory corruption
7443| [125410] Oracle E-Business Suite up to 12.2.7 Oracle Applications Manager information disclosure
7444| [125399] Oracle E-Business Suite up to 12.2.7 Oracle Applications Manager unknown vulnerability
7445| [125372] Oracle GoldenGate 12.1.2.1.0/12.2.0.2.0/12.3.0.1.0 Manager denial of service
7446| [125371] Oracle GoldenGate 12.1.2.1.0/12.2.0.2.0/12.3.0.1.0 Manager denial of service
7447| [125370] Oracle GoldenGate 12.1.2.1.0/12.2.0.2.0/12.3.0.1.0 Monitoring Manager unknown vulnerability
7448| [125344] Orange AirBox Y858_FL_01.16_04 goform/getWlanClientInfo information disclosure
7449| [125332] IBM Security Key Lifecycle Manager 2.5/2.6/2.7/3.0 XML Data XML External Entity
7450| [125331] IBM Security Key Lifecycle Manager 2.5/2.6/2.7/3.0 Request directory traversal
7451| [125275] IBM FileNet Content Manager 5.2.1/5.5.0 XML Data XML External Entity
7452| [125257] IBM Security Key Lifecycle Manager 2.7/3.0 SKLM Server Restart denial of service
7453| [125256] IBM Security Key Lifecycle Manager 2.6/2.7/3.0 Authentication Mechanism privilege escalation
7454| [125242] Responsive FileManager 9.8.1 dialog.php cross site scripting
7455| [125241] Responsive FileManager 9.8.1 Interface dialog.php privilege escalation
7456| [125181] SAP Business Intelligence 4.10/4.20 Web Intelligence DHTML Client cross site scripting
7457| [125170] Redaxo up to 5.6.3 Mediamanager cross site scripting
7458| [125108] Microsoft Windows up to Server 2019 Filter Manager memory corruption
7459| [125061] IBM Tivoli Key Lifecycle Manager 2.6/2.7/3.0 Error Message information disclosure
7460| [125060] IBM Security Key Lifecycle Manager 3.0 Permission privilege escalation
7461| [125059] IBM Tivoli Key Lifecycle Manager 2.6/2.7/3.0 Blacklist privilege escalation
7462| [125058] D-Link Central WiFi Manager Parameter Stored cross site scripting
7463| [125057] D-Link Central WiFi Manager File Upload PHP Code Execution privilege escalation
7464| [125056] D-Link Central WiFi Manager Parameter Stored cross site scripting
7465| [125055] D-Link Central WiFi Manager FTP Server Default Credentials weak authentication
7466| [125054] IBM Tivoli Key Lifecycle Manager 2.6/2.7/3.0 information disclosure
7467| [125052] IBM Tivoli Key Lifecycle Manager 2.6/2.7/3.0 privilege escalation
7468| [124929] Cisco Video Surveillance Manager privilege escalation
7469| [124881] Cisco IOS/IOS XE TACACS+ Client Subsystem Crafted Packet denial of service
7470| [124873] Pivotal Operations Manager up to 1.11.x/2.0.15/2.1.10/2.2.0 Config information disclosure
7471| [124857] Cisco Data Center Network Manager 11.0(1) Management Interface directory traversal
7472| [124845] Cisco Data Center Network Manager Web-based Management Interface cross site scripting
7473| [124839] Cisco Data Center Network Manager Web Interface HTTP Request privilege escalation
7474| [124809] Carestream Vue RIS/RIS Client up to 11.2 on Windows 8.1 Error information disclosure
7475| [124804] IBM Financial Transaction Manager 3.0.2 Log File information disclosure
7476| [124798] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7477| [124797] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7478| [124796] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7479| [124727] Google Android 7.0/7.1.1/7.1.2/8.0/8.1 Download Manager sql injection
7480| [124695] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7481| [124694] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7482| [124693] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7483| [124692] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7484| [124687] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7485| [124685] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7486| [124680] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7487| [124679] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7488| [124678] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7489| [124677] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7490| [124676] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7491| [124675] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7492| [124668] IBM Rational Quality Manager up to 6.0.6 Web UI cross site scripting
7493| [124649] Emerson AMS Device Manager up to 13.5 privilege escalation
7494| [124648] Emerson AMS Device Manager up to 13.5 Script Code Execution
7495| [124589] Dell EMC ESRS Policy Manager up to 6.8 JMX Service Code Execution
7496| [124583] Dell EMC RSA Authentication Manager up to 8.3 P2 Security Console Page Reflected cross site request forgery
7497| [124582] Dell EMC RSA Authentication Manager up to 8.3 P2 MadCap Flare Help File DOM-Based cross site scripting
7498| [124581] Dell EMC RSA Authentication Manager up to 8.3 P2 Operations Console Stored cross site scripting
7499| [124548] Article Factory Manager 4.3.9 on Joomla Parameter sql injection
7500| [124566] HPE enhanced Internet Usage Manager 9.0FP1 privilege escalation
7501| [124516] IBM Tivoli Storage Manager 7.1/8.1 weak encryption
7502| [124486] Zoho ManageEngine Applications Manager SMB Share Code Execution
7503| [124477] IBM Tivoli Storage Manager 7.1/8.1 weak encryption
7504| [124460] IBM Rational Engineering Lifecycle Manager up to 6.0.6 Web UI cross site scripting
7505| [124459] IBM Rational Engineering Lifecycle Manager up to 6.0.6 XML Data XML External Entity
7506| [124458] IBM Rational Engineering Lifecycle Manager up to 6.0.6 XML Data XML External Entity
7507| [124457] IBM Rational Engineering Lifecycle Manager up to 6.0.6 Web UI cross site scripting
7508| [124456] IBM Rational Engineering Lifecycle Manager up to 6.0.6 Request weak authentication
7509| [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
7510| [124408] MCMS 4.6.5 ms/basic/manager/save.do cross site request forgery
7511| [124337] Zoho ManageEngine OpManager /oputilsServlet Parameter privilege escalation
7512| [124317] Zoho ManageEngine OpManager Global Search sql injection
7513| [124309] IBM Business Process Manager 8.5.x/8.6.0/18.0.0.0/18.0.0.1 Back-End Database sql injection
7514| [124307] Ubisoft Uplay Desktop Client 63.0.5699.0 URI upc.exe privilege escalation
7515| [124232] Foscam C1 Indoor HD Camera 2.52.2.43 DDNS Client memory corruption
7516| [124142] Pivotal Application Service up to 2.0.20/2.1.12/2.2.4 Applications Manager privilege escalation
7517| [124138] Foscam C1 Indoor HD Camera 2.52.2.43 DDNS Client memory corruption
7518| [124137] Foscam C1 Indoor HD Camera 2.52.2.43 DDNS Client memory corruption
7519| [124136] Foscam C1 Indoor HD Camera 2.52.2.43 DDNS Client memory corruption
7520| [124061] K-Net Cisco Configuration Manager up to 2014-11-19 devices.php cross site scripting
7521| [123977] Intel Data Center Manager SDK up to 5.0 Reference UI privilege escalation
7522| [123961] Elefant CMS up to 2.0.6 Filemanager drop.php Code Execution
7523| [123894] spice-client LZ Compressed Frame Heap-based memory corruption
7524| [123885] Infinispan up to 9.0.x Java Client Code Execution
7525| [123814] Apache ActiveMQ Client up to 5.15.5 TLS Hostname Verification Man-in-the-Middle weak authentication
7526| [123772] Eventum up to 3.3.x Open Redirect
7527| [123736] mndpsingh287 File Manager Plugin 2.9 on WordPress admin.php Parameter cross site scripting
7528| [123692] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 cross site scripting
7529| [123636] Kaizen Asset Manager/Training Manager isxdl.dll Code Execution
7530| [123604] Vivotek FD8177 eventscript.cgi Code Execution
7531| [123600] Fortinet FortiManager up to 6.0.1 Interface information disclosure
7532| [123505] DotClear up to 2.14.1 Media Manager class.dc.core.php HTML Content cross site scripting
7533| [123481] ImageMagick up to 7.0.8-7 MagickCore/log.c CheckEventLogging denial of service
7534| [123335] Zoho ManageEngine ADManager Plus 6.5.7 Workflow Delegation/Requester Roles cross site scripting
7535| [123334] Zoho ManageEngine ADManager Plus 6.5.7 AD Delegation/Help Desk Technicians HTML Injection cross site scripting
7536| [123260] Joomanager up to 2.0.0 on Joomla index.php information disclosure
7537| [123227] Responsive Filemanager up to 9.13.3 Archive ajax_calls.php directory traversal
7538| [123226] Responsive Filemanager up to 9.13.3 ajax_calls.php directory traversal
7539| [123199] IBM Security Access Manager 9.0.4.0/9.0.5.0 Advanced Access Control Code Execution
7540| [123040] Reprise License Manager up to 12.2BL2 /goform/edit_lf_get_data Parameter cross site scripting
7541| [123039] Reprise License Manager up to 12.2BL2 Web Interface rlm.exe Parameter directory traversal
7542| [123016] Responsive Filemanager up to 9.13.2 /filemanager/upload.php directory traversal
7543| [123014] Sentinel License Manager 8.5.3.35 UDP lservnt.exe unknown vulnerability
7544| [122949] Trend Micro Control Manager 6.0/7.0 DLL denial of service
7545| [122948] Trend Micro Control Manager 6.0/7.0 Server-Side Request Forgery
7546| [122947] Trend Micro Control Manager 6.0/7.0 Code Execution directory traversal
7547| [122937] Cisco Unified Communications Domain Manager cross site scripting
7548| [122925] IBM Tivoli Application Dependency Discovery Manager 7.2.2/7.3 cross site request forgery
7549| [123361] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 information disclosure
7550| [123360] Adobe Experience Manager 6.0/6.1/6.2/6.3/6.4 Reflected cross site scripting
7551| [122914] HPE XP P9000 Command View Advanced Edition up to 8.5.x Device Manager/Configuration Manager information disclosure
7552| [122912] Sony IPELA E Network Camera G5 1.87.00 802dot1xclientcert.cgi POST Request memory corruption
7553| [122891] Eclipse Vert.x up to 3.5.1 HttpServer/HttpClient Header Header Injection privilege escalation
7554| [122821] VMware Horizon Client/Horizon up to 4.8.0/6.2.6/7.5.0 Message Framework Library Out-of-Bounds memory corruption
7555| [122817] OpenEMR up to 5.0.1.3 add_edit_event_user.php Parameter sql injection
7556| [122803] Vuze BitTorrent Client 5.7.6.0 XML Parsing Engine XML External Entity
7557| [122743] libpq up to 10.5 PostgreSQL Client Library PQescape() Parameter privilege escalation
7558| [122717] Zoho ManageEngine Applications Manager 13 /deleteMO.do cross site scripting
7559| [122716] Zoho ManageEngine Applications Manager 13 editDisplaynames.do GET Request sql injection
7560| [122732] IBM Rhapsody Model Manager 6.0.6 Web UI cross site scripting
7561| [122710] Automation License Manager up to 5.3.4.3 Network Packet Scan information disclosure
7562| [122709] Automation License Manager up to 5.3.4.3/6.0.0 Code Execution directory traversal
7563| [122700] HPE Moonshot Provisioning Manager up to 1.23 Bypass privilege escalation
7564| [122589] Responsive Filemanager 9.13.1 upload.php Parameter Server-Side Request Forgery
7565| [122531] Apache Tomcat up to 7.0.88/8.0.52/8.5.31/9.0.9 WebSocket Client unknown vulnerability
7566| [122481] Cisco Unified Communications Manager Web-based Management Interface Reflected cross site scripting
7567| [122460] NSS 3.21.x Diffie Hellman Client Key Exchange Private Key weak encryption
7568| [122435] Foxit Reader XFA Event privilege escalation
7569| [122411] Foxit Reader 9.0.1.1049 instanceManager.nodes.append instanceManagernodesappend privilege escalation
7570| [122328] Synology DiskStation Manager up to 6.2 Random Generator Man-in-the-Middle weak encryption
7571| [122276] rpm-ostree/rpm-ostree-client GPG Signature privilege escalation
7572| [122154] Pivotal Application Service up to 1.12.25/2.0.16/2.1.7/2.2.0 Apps Manager Injection privilege escalation
7573| [122092] Pydio up to 8.2.0 UpgradeManager UpgradeManager.php Server-Side Request Forgery
7574| [122058] joyplus-cms 1.6.0 manager/admin_ajax.php String sql injection
7575| [122053] Xperience Experience Manager up to 6.4 SSRF information disclosure
7576| [122052] Adobe Experience Manager 6.2/6.3 SSRF information disclosure
7577| [122020] Adobe Experience Manager up to 6.4 SSRF information disclosure
7578| [121983] IBM Rational Rhapsody Design Manager Error Message information disclosure
7579| [121982] IBM Rational Rhapsody Design Manager Web UI cross site scripting
7580| [121981] IBM Rational Rhapsody Design Manager Web UI cross site scripting
7581| [121980] IBM Rational Rhapsody Design Manager up to 5.0 Web UI cross site scripting
7582| [121957] joyplus-cms 1.6.0 manager/admin_ajax.php Parameter sql injection
7583| [121956] joyplus-cms 1.6.0 manager/admin_ajax.php Parameter cross site scripting
7584| [121927] Cisco Policy Suite up to 18.1.x Cluster Manager Default Credentials weak authentication
7585| [121904] Eclipse Mojarra up to 2.3.4 ResourceManager.java getLocalePrefix directory traversal
7586| [121879] Oracle Agile PLM MCAD Connector 3.3/3.4/3.5/3.6 CAX Client unknown vulnerability
7587| [121876] Oracle Agile PLM 9.3.3/9.3.4/9.3.5/9.3.6 Event Java PX unknown vulnerability
7588| [121830] Oracle Retail Predictive Application Server 15.0.3 RPAS Fusion Client unknown vulnerability
7589| [121785] Oracle MySQL Client up to 5.5.60/5.6.40/5.7.22/8.0.11 Client Programs denial of service
7590| [121777] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Client mysqldump denial of service
7591| [121772] Oracle MySQL Enterprise Monitor up to 3.4.7.4297/4.0.4.5235/8.0.0.8131 Service Manager unknown vulnerability
7592| [121624] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Networking denial of service
7593| [121623] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Networking unknown vulnerability
7594| [121622] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Framework unknown vulnerability
7595| [121621] Oracle Enterprise Manager Base Platform 13.2.x Installer unknown vulnerability
7596| [121620] Oracle Enterprise Manager for Fusion Middleware 12.1.0.5 FMW Plugin for CC unknown vulnerability
7597| [121619] Oracle Enterprise Manager Ops Center 12.2.2 Networking unknown vulnerability
7598| [121617] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Networking unknown vulnerability
7599| [121616] Oracle Enterprise Manager for Virtualization 13.2.2/13.2.3 Plug-In Lifecycle unknown vulnerability
7600| [121615] Oracle Enterprise Manager for Peoplesoft 13.1.1.1/13.2.1.1 PSEM Plugin unknown vulnerability
7601| [121614] Oracle Enterprise Manager for Database 12.1.0.8/13.2.2 Provisioning unknown vulnerability
7602| [121613] Oracle Enterprise Manager for MySQL Database up to 13.2.2.0.0 EM Plugin unknown vulnerability
7603| [121612] Oracle Enterprise Manager for Fusion Middleware 12.1.0.5/13.2.x FMW Plugin for CC unknown vulnerability
7604| [121611] Oracle Enterprise Manager for Fusion Middleware 12.1.0.5/13.2.x Application Replay unknown vulnerability
7605| [121610] Oracle Enterprise Manager Base Platform 12.1.0.5/13.2.x Security Framework unknown vulnerability
7606| [121609] Oracle Enterprise Manager Base Platform 12.1.0.5/13.2.x Installer unknown vulnerability
7607| [121604] Oracle Applications Manager up to 12.2.7 Diagnostics Interfaces unknown vulnerability
7608| [121514] Fortinet FortiManager/FortiAnalyzer up to 5.6.4/6.0.0 Certificates cross site scripting
7609| [121498] Atlassian Universal Plugin Manager up to 2.22.8 Add-On Name NotificationRepresentationFactoryImpl cross site scripting
7610| [121465] Zoho ManageEngine Applications Manager 12/13 Java Object privilege escalation
7611| [121458] Zoho ManageEngine Applications Manager 12/13 /register.do directory traversal
7612| [121457] Zoho ManageEngine Applications Manager 12/13 Property privilege escalation
7613| [121449] SHDesigns Resident Download Manager Firmware UDP Packet privilege escalation
7614| [121444] ShoreTel Mobility Client App 9.1.3.109 on iOS/Android SSL Certificate Validator Man-in-the-Middle weak authentication
7615| [121400] MODX Revolution up to 2.6.4 modmanagerrequest.class.php Web Request directory traversal
7616| [121345] Pivotal Operations Manager up to 1.12.21/2.0.14/2.1.5 Random Number Generator weak encryption
7617| [121340] ELO up to 9.18/10.18 Access Manager GET Parameter sql injection
7618| [121180] IBM Rational Quality Manager up to 5.0.2/6.0.5 Response Splitting privilege escalation
7619| [121179] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7620| [121173] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7621| [121142] Microfocus NetIQ iManager 3.1.1 cross site scripting
7622| [121127] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7623| [121126] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7624| [121125] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7625| [121124] IBM Rational Quality Manager up to 5.0.2/6.0.5 privilege escalation
7626| [121123] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7627| [121108] Microsoft Mail Client 8.1 information disclosure
7628| [120938] concrete5 8.2.0 File Manager remote.php Server-Side Request Forgery
7629| [120907] IBM Tivoli Application Dependency Discovery Manager up to 7.2.1.4/7.2.1 Protection Mechanism weak encryption
7630| [120698] GalaxyCoin mintToken Smart Contract privilege escalation
7631| [120577] SeaCMS 6.61 admin_manager.php cross site request forgery
7632| [120576] SeaCMS 6.61 admin_manager.php cross site request forgery
7633| [120518] Google Android ADSPRPC Heap Manager Integer Overflow memory corruption
7634| [120492] Synology SSL VPN Client up to 1.2.4 HTTP Daemon Man-in-the-Middle privilege escalation
7635| [120489] IBM FileNet Content Manager 5.2.1/5.5.0 Web UI cross site scripting
7636| [120488] IBM FileNet Content Manager 5.2.1/5.5.0 Web UI cross site scripting
7637| [120486] IBM FileNet Content Manager 5.2.1/5.5.0 XML Data XML External Entity
7638| [120470] IBM Quality Manager up to 5.0.x/6.0.5 cross site scripting
7639| [120469] IBM Quality Manager up to 5.0.x/6.0.5 cross site scripting
7640| [120468] IBM Quality Manager up to 5.0.x/6.0.5 cross site scripting
7641| [120467] IBM Quality Manager up to 5.0.x/6.0.5 Error information disclosure
7642| [120466] IBM Quality Manager up to 5.0.x/6.0.5 Web UI cross site scripting
7643| [120455] CyberArk Endpoint Privilege Manager privilege escalation
7644| [120263] ClipperCMS 1.3.3 Tools Configuration manager/ cross site scripting
7645| [120244] Dell EMC RSA Certificate Manager 6.9 Build 564 CMP Enroll Server/REST Enroll Server directory traversal
7646| [120243] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7647| [120242] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7648| [120241] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7649| [120240] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7650| [120239] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7651| [120238] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7652| [120237] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7653| [120236] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7654| [120235] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7655| [120234] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7656| [120233] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7657| [120232] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7658| [120231] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7659| [120230] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7660| [120229] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7661| [120228] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7662| [120227] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7663| [120226] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7664| [120225] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7665| [120224] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7666| [120223] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7667| [120222] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7668| [120221] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7669| [120220] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7670| [120219] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7671| [120218] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7672| [120217] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7673| [120216] IBM Rational Quality Manager up to 5.0.2/6.0.6 Web UI cross site scripting
7674| [120215] IBM Rational Quality Manager up to 5.0.2/6.0.5 Web UI cross site scripting
7675| [120161] Zoho ManageEngine Applications Manager 13.x /j_security_check POST Request sql injection
7676| [120134] Zoho ManageEngine EventLog Analyzer 11.12 Search Box cross site scripting
7677| [120133] Zoho ManageEngine EventLog Analyzer 11.12 Logs cross site scripting
7678| [120101] Weblication CMS Core & Grid 12.6.24 wFilemanager.php cross site scripting
7679| [120095] Zoho ManageEngine Applications Manager up to 12 GraphicalView.do cross site scripting
7680| [120079] Fortinet FortiManager up to 6.0.0 CLI Config Installation Log cross site scripting
7681| [120040] TIBCO Spotfire Web Player Client information disclosure
7682| [120038] TIBCO Spotfire Web Player Client Code Execution
7683| [120033] Fortinet FortiManager/FortiAnalyzer up to 6.0.0 FortiView PDF Document Open Redirect
7684| [120032] Fortinet FortiManager/FortiAnalyzer up to 6.0.0 Access Control privilege escalation
7685| [120005] IBM WebSphere MQ up to 7.1.0.9/7.5.0.8/8.0.0.8/9.0.0.2/9.0.4 Queue Manager denial of service
7686| [120003] CyberArk Endpoint Privilege Manager 10.2.1.603 Account Name VfManager.asmx cross site scripting
7687| [119933] Galaxy 14.10 Template cross site scripting
7688| [119923] Metronet Tag Manager 1.2.7 Settings Page options-general.php Request cross site request forgery
7689| [119852] Seco Versatile Security Manager Ethereum ERC20 Token sell Smart Contract privilege escalation
7690| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
7691| [119839] Linux Kernel up to 4.17.2 Filter Parser trace_events_filter.c memory corruption
7692| [119823] Micro Focus Business Manager up to 11.3 SBM RESTful Service privilege escalation
7693| [119804] NetApp OnCommand Unified Manager for 7-mode up to 5.2.2 LDAP Authentication Account information disclosure
7694| [119797] Micro Focus Business Manager up to 11.3 Log File information disclosure
7695| [119796] Micro Focus Business Manager up to 11.3 Favorites cross site scripting
7696| [119795] Micro Focus Business Manager up to 11.3 HTTP Header Reflected privilege escalation
7697| [119794] Micro Focus Business Manager up to 11.3 ASP.NET Avatar Image Code Execution
7698| [119781] Cisco Unified Communications Domain Manager Web-based Management Interface cross site request forgery
7699| [119780] Cisco Unified Communications Manager Web-based Management Interface cross site request forgery
7700| [119657] ovirt-engine up to 4.2.2 Web Console transport.py EventData information disclosure
7701| [119687] CA Privileged Access Manager 2.x sql injection
7702| [119686] CA Privileged Access Manager 2.x Password weak encryption
7703| [119685] CA Privileged Access Manager 2.x Link Reflected cross site scripting
7704| [119684] CA Privileged Access Manager 2.x Session Session Fixation weak authentication
7705| [119683] CA Privileged Access Manager 2.x Log File Poison privilege escalation
7706| [119682] CA Privileged Access Manager 2.x Log File spoofing
7707| [119681] CA Privileged Access Manager 2.x update_crld Argument privilege escalation
7708| [119680] CA Privileged Access Manager up to 2.8.2 Configuration File privilege escalation
7709| [119679] CA Privileged Access Manager up to 2.8.2 weak authentication
7710| [119651] CA Privileged Access Manager up to 2.4.4 privilege escalation
7711| [119599] Artica Pandora FMS up to 7.23 File Upload update_manager.ajax privilege escalation
7712| [119650] Dell RSA Authentication Manager up to 8.3 Security Console cross site scripting
7713| [119649] Dell RSA Authentication Manager up to 8.3 Operations Console cross site scripting
7714| [119568] Puppet PE Client Tools up to 16.4.5/17.3.5/18.1.1 on Windows Configuration File privilege escalation
7715| [119546] Synology Calendar up to 2.1.2 SYNO.Cal.Event Parameter privilege escalation
7716| [119530] IBM Financial Transaction Manager 3.0.6 ACH Services for Multi-Platform information disclosure
7717| [119520] Matrix Synapse up to 0.31.0 API handlers/federation.py on_get_missing_events information disclosure
7718| [119491] McAfee Network Security Manager Session Fixation weak authentication
7719| [119486] Apache Geode up to 1.4.0 Security Manager Code Execution
7720| [119374] VMware AirWatch Agent on Android/Windows Mobile Time File Manager Code Execution
7721| [119360] Mozilla Firefox ESR/Thunderbird up to 52.5 Event FORM Element Use-After-Free memory corruption
7722| [119319] Sonatype Nexus Repository Manager up to 3.11.x Administration UI cross site scripting
7723| [119290] Synology DiskStation Manager up to 6.2 Change Password privilege escalation
7724| [119289] IBM Security Identity Manager Virtual Appliance 7.0 privilege escalation
7725| [119279] IBM Security Identity Manager Virtual Appliance 7.0 Update privilege escalation
7726| [119278] Synology Router Manager up to 1.1.6 EZ-Internet Parameter command injection
7727| [119277] Synology DiskStation Manager up to 6.2 EZ-Internet Parameter command injection
7728| [119272] Canon LBP6030w System Manager Mode /checkLogin.cgi weak authentication
7729| [119256] joyplus-cms 1.6.0 manager/index.php Code Execution
7730| [119254] Eaton Intelligent Power Manager 1.6 node_upgrade_srv.js downloadFirmware Local File Inclusion
7731| [119248] Cisco Unified Communications Manager Web UI Clickjacking cross site scripting
7732| [119244] Cisco Unified Communications Manager Web Framework Parameter cross site scripting
7733| [119239] Cisco AnyConnect Network Access Manager TLS Certificate Management Subsystem privilege escalation
7734| [119183] fbr-client on Node.js URL directory traversal
7735| [119096] HTTP Client Module on Node.js ZIP Archive Memory Consumption denial of service
7736| [119092] rtcmulticonnection-client on Node.js URL directory traversal
7737| [119088] datachannel-client on Node.js URL directory traversal
7738| [119005] IBM Security Access Manager up to 8.0.1.6/9.0.3.1 Log File information disclosure
7739| [119004] IBM Security Access Manager up to 7.0.0/8.0.1.6/9.0.3.1 HSTS information disclosure
7740| [119003] IBM Security Access Manager up to 7.0.0/8.0.1.6/9.0.3.1 information disclosure
7741| [119001] Zoho ManageEngine Applications Manager 13 CustomFieldsFeedServlet privilege escalation
7742| [118949] Zoho ManageEngine Applications Manager 12/13 Parameter cross site scripting
7743| [118948] Zoho ManageEngine Applications Manager 12/13 MenuHandlerServlet sql injection
7744| [118830] Canon MF210/MF220 System Manager Mode /login.html weak authentication
7745| [118421] engine.io-client up to 1.6.8 on Node.js Certificate Verification weak authentication
7746| [118390] ClipperCMS 1.3.3 Manage Modules manager/ cross site scripting
7747| [118385] MISP 2.4.91 eventattribute.ctp cross site scripting
7748| [118377] Synacor Zimbra Collaboration up to 8.7.11 Patch 3/8.8.8 Patch 3 Web Client Persistent cross site scripting
7749| [118238] McAfee Data Loss Prevention/DLP Endpoint on Windows privilege escalation
7750| [118202] Pluck 4.7.4 Manage Images function.all.php preventXSS cross site scripting
7751| [118155] IBM Tivoli Application Dependency Discovery Manager up to 7.1.2/7.2.1.4 AXIS Webapp happyaxis.jsp information disclosure
7752| [118184] NetApp OnCommand Unified Manager 7.2/7.3 on Linux Java Management Extension Code Execution
7753| [118172] DB Manager/PerformA SQL privilege escalation
7754| [118156] IBM Tivoli Application Dependency Discovery Manager up to 7.1.2/7.2.1.4 Credentials weak encryption
7755| [118143] Apache NiFi activemq-client Library Deserialization denial of service
7756| [118110] HP Service Manager Software Web Tier up to 9.51 sql injection
7757| [118109] Joomla CMS up to 3.8.7 Media Manager cross site scripting
7758| [118017] Adobe Experience Manager up to 6.2 Stored cross site scripting
7759| [117933] Foxit Reader 9.0.1.1049 Shift Event memory corruption
7760| [117928] Foxit Reader 9.0.1.1049 Button execEvent memory corruption
7761| [117846] Cisco Unified Communications Manager Web Framework Parameter cross site scripting
7762| [117803] Solarwinds Serv-U up to 15.1.6 /Web%20Client/ denial of service
7763| [117640] Pivotal Application Service up to 1.12.21/2.0.12/2.1.3 Apps Manager privilege escalation
7764| [117652] HPE Service Manager up to 9.51 sql injection
7765| [117517] MySQL Multi-Master Replication Manager 2.2.1 on Solaris mmm_agentd send_arp MMM Protocol Message command injection
7766| [117516] MySQL Multi-Master Replication Manager 2.2.1 on FreeBSD mmm_agentd clear_ip MMM Protocol Message command injection
7767| [117515] MySQL Multi-Master Replication Manager 2.2.1 on Solaris mmm_agentd clear_ip MMM Protocol Message command injection
7768| [117514] MySQL Multi-Master Replication Manager 2.2.1 on Linux mmm_agentd clear_ip MMM Protocol Message command injection
7769| [117513] MySQL Multi-Master Replication Manager 2.2.1 on FreeBSD mmm_agentd add_ip MMM Protocol Message command injection
7770| [117512] MySQL Multi-Master Replication Manager 2.2.1 on Solaris mmm_agentd add_ip MMM Protocol Message command injection
7771| [117511] MySQL Multi-Master Replication Manager 2.2.1 on Linux mmm_agentd add_ip MMM Protocol Message command injection
7772| [117510] MySQL Multi-Master Replication Manager 2.2.1 mmm_agentd _execute MMM Protocol Message command injection
7773| [117436] EMC RSA Authentication Manager up to 8.3 Host Header Cache Poisoning privilege escalation
7774| [117435] EMC RSA Authentication Manager up to 8.3 XML File XML External Entity
7775| [117387] CSP MySQL User Manager 2.3.1 Username sql injection
7776| [117332] Sentinel HASP LDK RTE up to 7.79 License Manager Service cross site scripting
7777| [117293] Cisco Prime Data Center Network Manager Prime File Upload directory traversal
7778| [117288] Cisco Wireless LAN Controller up to 8.5.110.0 on IOS WebAuth Client privilege escalation
7779| [117255] TIBCO DataSynapse GridServer Manager up to 6.2.0 Broker/Driver/Engine cross site request forgery
7780| [117254] TIBCO DataSynapse GridServer Manager up to 6.2.0 Broker/Driver/Engine weak encryption
7781| [117243] ManageIQ Enterprise Virtualization Manager cross site request forgery
7782| [117167] IBM Endpoint Manager for Remote Control Password Hashing weak encryption
7783| [117148] Fortinet FortiClient weak encryption
7784| [117139] Centers for Disease Control and Prevention MicrobeTRACE 0.1.12 CSV File cross site scripting
7785| [117138] Centers for Disease Control and Prevention MicrobeTRACE 0.1.11 CSV File cross site scripting
7786| [116964] IBM Security Access Manager up to 8.0.1.6/9.0.3.1 weak encryption
7787| [116855] IBM Tivoli Identity Manager/Security Identity Manager SSL Cipher information disclosure
7788| [116853] IBM Tivoli Identity Manager/Security Identity Manager Access Restriction privilege escalation
7789| [116852] IBM Tivoli Identity Manager/Security Identity Manager Man-in-the-Middle weak encryption
7790| [116889] Cisco ASR 5000 on StarOS IPsec Manager Restart denial of service
7791| [116885] Cisco Unified Communications Manager Web Framework Parameter information disclosure
7792| [116880] Cisco Industrial Ethernet Switch Device Manager Web Interface cross site request forgery
7793| [116866] Cisco AnyConnect Secure Mobility Client SAML SSO Authentication Request Session Fixation weak authentication
7794| [116863] Cisco WebEx Business Suite Client SWF File Code Execution
7795| [116311] Nagios XI up to 5.2.x/5.4.12 Core Config Manager Parameter sql injection
7796| [116310] Nagios XI up to 5.2.x/5.4.12 Core Config Manager sql injection
7797| [116824] Oracle Agile PLM Framework 5.2 Web Client unknown vulnerability
7798| [116810] Oracle Integrated Lights Out Manager 3.x/4.x System Management unknown vulnerability
7799| [116798] Oracle Retail Predictive Application Server 13.4.3/14.0.3/14.1.3 RPAS Fusion Client information disclosure
7800| [116742] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Client programs denial of service
7801| [116714] Oracle Hospitality Simphony First Edition 1.6/1.7 Operations, Client Application Loader unknown vulnerability
7802| [116713] Oracle Hospitality Simphony 2.8/2.9 Client Application Loader unknown vulnerability
7803| [116709] Oracle Hospitality Simphony First Edition 1.6/1.7 Client Application Loader information disclosure
7804| [116698] Oracle Access Manager 10.1.4.3.0/11.1.2.3.0/12.2.1.3.0 Web Server Plugin unknown vulnerability
7805| [116688] Oracle Adaptive Access Manager 11.1.2.3.0 OAAM Admin unknown vulnerability
7806| [116676] Oracle Access Manager 11.1.2.3.0/12.2.1.3.0 Authentication Engine unknown vulnerability
7807| [116675] Oracle Access Manager 10.1.4.3.0/11.1.2.3.0/12.2.1.3.0 Web Server Plugin unknown vulnerability
7808| [116626] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Networking information disclosure
7809| [116625] Oracle Enterprise Manager Base Platform 12.1.0.5/13.2.0.0 Discovery Framework information disclosure
7810| [116624] Oracle Enterprise Manager Base Platform 12.1.0.5 UI Framework denial of service
7811| [116623] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Framework denial of service
7812| [116622] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General (Apache Tomcat) unknown vulnerability
7813| [116621] Oracle Enterprise Manager for Virtualization 13.2 Generic Virtualization (jackson-databind) unknown vulnerability
7814| [116620] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General (Spring Framework) unknown vulnerability
7815| [116619] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General unknown vulnerability
7816| [116617] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Networking unknown vulnerability
7817| [116298] IBM WebSphere MQ 8.0.0.8/9.0.0.2/9.0.4 Queue Manager denial of service
7818| [116221] Eshtery CMS FileManager.aspx Parameter directory traversal
7819| [116180] joyplus-cms 1.6.0 manager/admin_vod.php Parameter cross site scripting
7820| [116150] Red Hat Gluster Storage 2.1 on RHEL Network Client Tools Man-in-the-Middle weak authentication
7821| [118019] Adobe Experience Manager up to 6.1 Stored cross site scripting
7822| [118018] Adobe Experience Manager up to 6.3 cross site scripting
7823| [115969] SAP Solution Manager 7.10/7.20 Incident Management Work Center Attachment File Upload cross site scripting
7824| [115930] Dell EMC Installation Manager privilege escalation
7825| [115656] Google Android Linux Kernel wma_wow_wakeup_host_event() memory corruption
7826| [115530] Zoho ManageEngine Recovery Manager Plus up to 5.3 Build 5330 technicianAction.do cross site scripting
7827| [115490] Docker Notary Comment gotuf/client/client.go checkRoot privilege escalation
7828| [115263] IBM Financial Transaction Manager 3.0/3.0.2/3.0.2.1 Web UI cross site scripting
7829| [115262] IBM Business Process Manager 8.6 Web UI cross site scripting
7830| [115250] Google Android wma_peer_info_event_handler() memory corruption
7831| [115249] IBM Business Process Manager 8.6 Web UI cross site scripting
7832| [115248] IBM Business Process Manager 8.6 Task privilege escalation
7833| [115247] IBM Business Process Manager 8.6 Application Server information disclosure
7834| [115244] IBM Security Privileged Identity Manager 2.1.0 information disclosure
7835| [115235] Google Android wma_unified_power_debug_stats_event_handler() Variable memory corruption
7836| [115422] Apple macOS up to 10.13.4 File System Events race condition privilege escalation
7837| [115364] Apple tvOS up to 11.2 File System Events race condition privilege escalation
7838| [115343] Apple watchOS up to 4.2 File System Events race condition privilege escalation
7839| [115300] Apple iOS up to 11.2 File System Events race condition privilege escalation
7840| [115214] IBM Endpoint Manager for Remote Control 9.0.1/9.1.0 On-Demand Plugin privilege escalation
7841| [115161] Cisco IOS/IOS XE Smart Install Client Crafted Packet denial of service
7842| [115148] NetIQ Identity Manager up to 4.6 Userapp information disclosure
7843| [115147] NetIQ Identity Manager up to 4.6 User Console Open Redirect
7844| [115140] Roland Gruber Softwareentwicklung LDAP Account Manager up to 6.2 cmd.php Parameter cross site scripting
7845| [115134] Roland Gruber Softwareentwicklung LDAP Account Manager up to 6.2 CSRF Protection Parameter cross site request forgery
7846| [115133] Roland Gruber Softwareentwicklung LDAP Account Manager up to 6.2 cmd.php Parameter cross site scripting
7847| [115110] Cisco Unified Communications Manager Database Table privilege escalation
7848| [115076] NetIQ Identity Manager up to 4.6 Communication Channel denial of service
7849| [115064] NetIQ Identity Manager up to 4.6 Driver Log File information disclosure
7850| [115063] NetIQ Identity Manager up to 4.6 Driver Log File information disclosure
7851| [115062] NetIQ Identity Manager up to 4.6 Driver SSL weak authentication
7852| [114866] NetIQ iManager up to 3.0 Administrative Web Interface Reflected cross site scripting
7853| [114864] NetIQ iManager up to 3.0 privilege escalation
7854| [114863] NetIQ iManager up to 3.0 Downgrade privilege escalation
7855| [114813] GNOME NetworkManager up to 1.10.2 DNS Resolver information disclosure
7856| [114728] libevt 2018-03-17 SID Data libevt_record_values.c libevt_record_values_read_event() memory corruption
7857| [114716] Apps Manager for PCF up to 1.11.25/1.12.13/2.0.4 privilege escalation
7858| [114706] Google Android Linux Kernel wma_unified_bcntx_status_event_handler() memory corruption
7859| [114705] Google Android Linux Kernel wma_scan_event_callback() memory corruption
7860| [114704] Google Android Linux Kernel wma_wow_wakeup_host_event() memory corruption
7861| [114700] Google Android Linux Kernel wma_p2p_lo_event_handler() memory corruption
7862| [114698] Google Android Linux Kernel wma_rcpi_event_handler() memory corruption
7863| [114689] Dell Storage Manager up to 16.3.19 EMConfigMigration directory traversal
7864| [114635] IBM Business Process Manager 7.5.x/8.0.x/8.5.0/8.5.5/8.5.6.0 CF2 denial of service
7865| [114631] Zoho ManageEngine EventLog Analyzer 11.0 Build 11000 cross site scripting
7866| [114612] NetIQ Access Manager 4.3/4.4 Administration Console cross site scripting
7867| [114611] NetIQ Access Manager 4.4 Identity Server cross site request forgery
7868| [114590] SAP Business Client 6.5 information disclosure
7869| [114577] spice-gtk up to 0.34 spice-client Messages memory corruption
7870| [114486] Zoho ManageEngine EventLog Analyzer up to 11.12 cross site scripting
7871| [114393] CMS Made Simple 2.2.5 File Manager Code Execution
7872| [114354] Abine Blur up to 7.8 on MacOS Password Manager Extension weak authentication
7873| [114257] IBM Tivoli Business Service Manager up to 6.1.0-TIV-BSM-FP0005/6.1.1-TIV-BSM-FP0003 privilege escalation
7874| [114256] IBM Financial Transaction Manager up to 2.1.1.1 JMS privilege escalation
7875| [114254] IBM Financial Transaction Manager up to 2.1.1.1 Clickjacking privilege escalation
7876| [114253] IBM Financial Transaction Manager up to 2.1.1.1 cross site request forgery
7877| [114252] IBM Financial Transaction Manager up to 2.1.1.1 XML Data XXE information disclosure
7878| [114251] IBM Financial Transaction Manager cross site scripting
7879| [114247] Zoho ManageEngine Applications Manager 13.5 testCredential.do Code Execution
7880| [114246] calibre 3.18 Bookmark Import bookmarkmanager.py cPickle.load Code Execution
7881| [114220] Dell EMC Unisphere for VMAX vApp Manager File Upload privilege escalation
7882| [114217] Cisco Security Manager Web-based Management Interface Reflected cross site scripting
7883| [114205] Cisco Data Center Network Manager Web-based Management Interface cross site request forgery
7884| [114200] Cisco Prime Data Center Network Manager Web-based Management Interface cross site scripting
7885| [114180] Giribaz File Manager Plugin up to 5.0.1 on WordPress inc/logger.php information disclosure
7886| [114079] NetIQ Privileged Account Manager up to 3.1 Update 2 JSON Request cross site scripting
7887| [114078] Identity Manager Plugin up to 2.7.7.6 on iManager cross site scripting
7888| [114057] Huawei DP300/RP200/TE50/TE60/VP9660 System Manager Putty Key Loop denial of service
7889| [114052] Open Ticket Request System up to 5.0.24/6.0.1 Admin Package Manager OPM File Code Execution
7890| [114026] NetIQ eDirectory up to 9.0 SP3 ebaclient privilege escalation
7891| [114025] NetIQ Identity Manager up to 4.5.6.0 GET URL information disclosure
7892| [114024] NetIQ Identity Manager up to 4.5.6.0 File Upload Double Extension privilege escalation
7893| [114023] NetIQ Identity Manager Oracle EBS Driver up to 4.0.1.x EBS Log Password information disclosure
7894| [114021] Novell Access Manager iManager up to 4.3.2 Parameter Reflected cross site scripting
7895| [114019] NetIQ Account Manager up to 3.1 Patch Update 2 DOM Parameter cross site scripting
7896| [114018] NetIQ Identity Manager up to 4.5 XML Config Password information disclosure
7897| [114016] NetIQ Access Manager up to 4.2.3/4.3.1 Oauth cross site scripting
7898| [114015] NetIQ iManager up to 3.0.2 JAR File Credentials information disclosure
7899| [114011] Novell Access Manager up to 4.3.2 Admin Console/IDP Server URL Open Redirect
7900| [114010] NetIQ Access Manager up to 4.3.2 Parameter Reflected cross site scripting
7901| [113989] FTPshell Client 6.7 Response memory corruption
7902| [113968] NetIQ Identity Manager Plugins up to 4.6.0 XML Data XML External Entity
7903| [113958] NetIQ Access Manager up to 4.3.2 Policy Editor Parameter Reflected cross site scripting
7904| [113957] NetIQ Access Manager up to 4.3.2 ESP Parameter cross site scripting
7905| [113725] unixODBC up to 2.3.4 DriverManager/__info.c unicode_to_ansi_copy() Unicode memory corruption
7906| [113706] IBM Runtimes for Java Technology 6.0/6.1/7.0/7.1/8.0 Security Manager privilege escalation
7907| [113703] IBM Financial Transaction Manager 3.0.4/3.1.0 ACH Services for Multi-Platform privilege escalation
7908| [113702] IBM Financial Transaction Manager 3.0.4/3.1.0 ACH Services for Multi-Platform privilege escalation
7909| [113678] Cisco Unified Communications Manager Web-based Management Interface Reflected cross site scripting
7910| [113674] Cisco Jabber Client Framework cross site scripting
7911| [113672] Cisco Jabber Client Framework cross site scripting
7912| [113666] Cisco Unified Communications Domain Manager up to 11.5 Key Generation privilege escalation
7913| [113679] Reprise License Manager 11.0 goform/edit_lf_get_data POST Parameter directory traversal
7914| [113664] IBM Financial Transaction Manager 6.0/6.1 XML Data privilege escalation
7915| [113659] IBM Security Identity Manager Virtual Appliance up to 7.0.1.3 Error Message information disclosure
7916| [113658] IBM Security Identity Manager Virtual Appliance up to 7.0.1.3 weak encryption
7917| [113657] IBM Security Identity Manager Virtual Appliance up to 7.0.1.3 Cookie weak encryption
7918| [113596] LibVNCServer up to 0.9.11 rfbserver.c rfbProcessClientNormalMessage() Message memory corruption
7919| [113565] Photo Gallery plugin up to 1.2.12 on WordPress Filemanager cross site scripting
7920| [113561] Symantec Altiris Deployment Solution up to 6.9 SP3 DBManager Request Use-After-Free denial of service
7921| [113505] CUPS up to 2.2.1 IPP scheduler/client.c valid_host() POST Request privilege escalation
7922| [113835] Microsoft Identity Manager 2016 SP1 cross site scripting
7923| [113471] HPE Moonshot Provisioning Manager Appliance 1.20 denial of service
7924| [113470] HPE Moonshot Provisioning Manager Appliance 1.20 privilege escalation
7925| [113469] HPE Moonshot Provisioning Manager Appliance 1.20 privilege escalation
7926| [113451] HPE Network Node Manager i 10.0x/10.1x/10.2x Bypass privilege escalation
7927| [113435] HPE Version Control Repository Manager up to 7.5 denial of service
7928| [113317] HPE Systems Insight Manager up to 7.5 denial of service
7929| [113316] HPE Systems Insight Manager up to 7.5 cross site scripting
7930| [113315] HPE Systems Insight Manager up to 7.5 denial of service
7931| [113314] HPE Version Control Repository Manager up to 7.5 File Upload privilege escalation
7932| [113313] HPE Version Control Repository Manager up to 7.5 information disclosure
7933| [113312] HPE Version Control Repository Manager up to 7.5 cross site request forgery
7934| [113274] SAP CRM WebClient UI up to 8.01 cross site scripting
7935| [113268] ARM mbed TLS up to 2.6.x PSK Identity library/ssl_srv.c ssl_parse_client_psk_identity() memory corruption
7936| [113812] Adobe Experience Manager 6.1/6.2/6.3 cross site scripting
7937| [113811] Adobe Experience Manager 6.0/6.1 Reflected cross site scripting
7938| [113188] Saperion Web Client 7.5.2 83166 File information disclosure
7939| [113187] Saperion Web Client 7.5.2 83166 privilege escalation
7940| [113145] Apache Thrift up to 0.9.3 Go Client Library privilege escalation
7941| [113143] CloudMe up to 1.10.9 CloudMe Sync Client memory corruption
7942| [113118] Sonatype Nexus Repository Manager up to 2.14.5 index.html Parameter cross site scripting
7943| [113117] Sonatype Nexus Repository Manager up to 3.7 index.html Parameter cross site scripting
7944| [113116] Trend Micro Control Manager 6.0 XXXTreeNode sql injection
7945| [113115] Trend Micro Control Manager 6.0 XXXStatusXXX/XXXSummary/TemplateXXX/XXXCompliance sql injection
7946| [113114] Trend Micro Control Manager 6.0 TopXXX/ViolationXXX/IncidentXXX sql injection
7947| [113113] Trend Micro Control Manager 6.0 GetXXX sql injection
7948| [113112] Trend Micro Control Manager 6.0 CGGIServlet sql injection
7949| [113111] Trend Micro Control Manager 6.0 AdHocQuery_Processor sql injection
7950| [113110] Trend Micro Control Manager 6.0 Password Hash weak authentication
7951| [113109] Trend Micro Control Manager 6.0 XXE information disclosure
7952| [113067] Git up to 2.15.1 Client privilege escalation
7953| [113059] Invoice Plane up to 1.5.4 Client Details cross site scripting
7954| [113002] IBM WebSphere Application Server up to 6.1.0.42/7.0.0.20/8.0.0.1 Virtual Member Manager javax.naming.directory.AttributeInUseException weak authentication
7955| [112990] Cisco Unified Communications Manager Request information disclosure
7956| [112981] Cisco Unified Communications Manager Web Framework HTTP Requests sql injection
7957| [112974] Mailbutler Shimo up to 4.1.5.0 on MacOS VPN Client privilege escalation
7958| [112954] Zoho ManageEngine AD Manager Plus up to Build 6613 CSRF Protection /LoadFrame Parameter privilege escalation
7959| [112866] boot2docker up to 1.2 Docker Daemon Manager TCP Connection privilege escalation
7960| [112853] Avaya Aura up to 7.1.1 System Manager privilege escalation
7961| [112790] Mod-gnutls GnuTLSClientVerify spoofing
7962| [112798] IBM TRIRIGA Application Platform up to 3.3.1 Document Manager information disclosure
7963| [112797] IBM Tivoli Business Service Manager up to 6.1.0/6.1.1 cross site scripting
7964| [112729] Cloud Foundry Audit Event Log Session information disclosure
7965| [112692] Pulse Secure Desktop Client up to 5.2R9.0/5.3R4.1 on Linux GUI Certificate weak authentication
7966| [112677] Apache Tomcat Native Connector up to 1.1.34/1.2.14 OCSP Checker Client weak authentication
7967| [112670] Eventum up to 2.3.4 htdocs/setup/index.php Parameter privilege escalation
7968| [112669] Eventum up to 2.3.4 /setup/index.php privilege escalation
7969| [112663] CP Event Calendar 3.0.1 on Joomla Parameter sql injection
7970| [112619] Vastal I-tech Buddy Zone Facebook Clone 2.9.9 /search_events.php Parameter sql injection
7971| [112477] NetIQ Access Manager 4.3/4.4 Administrative Console File Upload privilege escalation
7972| [112471] Swarm Plugin Client up to 3.4 on Jenkins commons-httpclient weak authentication
7973| [112466] Maven Plugin up to 2.17 on Jenkins commons-httpclient Certificate weak authentication
7974| [112465] Jenkins up to 2.73.1/2.83 commons-httpclient Certificate weak authentication
7975| [112436] MariaDB/XtraDB Cluster Access Restriction event_data_objects.cc privilege escalation
7976| [112416] EMC RSA Authentication Manager up to 8.2 SP1 P6 Security Console Blind sql injection
7977| [112397] IBM Business Process Manager 8.6 cross site request forgery
7978| [112396] Apache Hadoop 2.7.3/2.7.4 YARN NodeManager Credentials information disclosure
7979| [112529] Mozilla Firefox up to 57.x Mouse Event Use-After-Free denial of service
7980| [112348] HP JetAdvantage Security Manager up to 3.0.0 Stored cross site scripting
7981| [112347] HP JetAdvantage Security Manager up to 3.0.0 Stored cross site scripting
7982| [112340] Rise Ultimate Project Manager 1.9 Parameter sql injection
7983| [112324] NetGain Enterprise Manager 7.2.699 Build 1001 script_test.jsp Parameter privilege escalation
7984| [112323] NetGain Enterprise Manager RMI Registry privilege escalation
7985| [112322] NetGain Enterprise Manager upload_save_do.jsp privilege escalation
7986| [112321] NetGain Enterprise Manager download.jsp information disclosure
7987| [112320] NetGain Enterprise Manager exec.jsp String privilege escalation
7988| [112319] NetGain Enterprise Manager heapdumps.jsp information disclosure
7989| [112318] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter privilege escalation
7990| [112317] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter File privilege escalation
7991| [112316] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter File privilege escalation
7992| [112315] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter privilege escalation
7993| [112314] NetGain Enterprise Manager 7.2.730 Build 1034 org.apache.jsp.u.jsp.tools.exec_jsp Servlet Parameter privilege escalation
7994| [112313] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter File privilege escalation
7995| [112312] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter File privilege escalation
7996| [112311] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter File denial of service
7997| [112310] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter privilege escalation
7998| [112309] NetGain Enterprise Manager 7.2.730 Build 1034 WRQ Request privilege escalation
7999| [112308] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter privilege escalation
8000| [112307] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter privilege escalation
8001| [112306] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter File privilege escalation
8002| [112305] NetGain Enterprise Manager 7.2.730 Build 1034 Parameter weak authentication
8003| [112304] NetGain Enterprise Manager 7.2.730 Build 1034 common.download_jsp Servlet Parameter weak authentication
8004| [112303] NetGain Enterprise Manager 7.2.699 Build 1001 Parameter weak authentication
8005| [112302] NetGain Enterprise Manager Base Platform 7.2.699 Build 1001 MainFilter Servlet doFilter weak authentication
8006| [112274] LabF nfsAxe 3.7 FTP Client memory corruption
8007| [112249] NetIQ NetIQ Access Manager 4.3/4.4 Identity Server privilege escalation
8008| [112248] Parity Ethereum Client 1.7.8 JSON-RPC Endpoint JSON Object CORS privilege escalation
8009| [112216] Cisco Unified Communications Manager Web Framework information disclosure
8010| [112157] Oracle Agile PLM MCAD Connector 3.3/3.4/3.5/3.6 CAX Client privilege escalation
8011| [112148] Oracle Integrated Lights Out Manager 3.x/4.x Remote Console Application privilege escalation
8012| [112146] Oracle Integrated Lights Out Manager 3.x/4.x Remote Console Application unknown vulnerability
8013| [112145] Oracle Integrated Lights Out Manager 3.x/4.x System Management privilege escalation
8014| [112140] Oracle Siebel Engineering - Installer & Deployment 16.0/17.0 Siebel Approval Manager information disclosure
8015| [112139] Oracle Siebel CRM Desktop 16.0/17.0 Outlook Client unknown vulnerability
8016| [112136] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Tomcat privilege escalation
8017| [112128] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 privilege escalation
8018| [112026] Oracle Access Manager 10.1.4.3.0 Web Server Plugin information disclosure
8019| [112025] Oracle Access Manager 11.1.2.3.0 Web Server Plugin information disclosure
8020| [112021] Oracle Internet Directory 11.1.1.7.0/11.1.1.9.0/12.2.1.3.0 Oracle Directory Services Manager privilege escalation
8021| [112011] Oracle Identity Manager 11.1.2.3.0 Apache Commons Collections privilege escalation
8022| [112010] Oracle Identity Manager Connector 9.0.4.20.6/9.0.4.21.0/9.0.4.25.4 CA ACF2 privilege escalation
8023| [112009] Oracle Identity Manager 11.1.2.3.0 Security privilege escalation
8024| [111910] IBM Rational Engineering Lifecycle Manager cross site scripting
8025| [111909] IBM Rational Engineering Lifecycle Manager cross site scripting
8026| [111908] IBM Rational Engineering Lifecycle Manager up to 3.0.1.6 iFix6/4.0.7 iFix9 Query Engine information disclosure
8027| [111907] IBM Rational Engineering Lifecycle Manager cross site scripting
8028| [111895] download-manager Plugin up to 2.9.51 on WordPress wp-admin/admin-ajax.php wpdm_generate_password Parameter cross site scripting
8029| [111820] Wachipi WP Events Calendar Plugin 1.0 on WordPress event.php Parameter sql injection
8030| [111797] IBM Security Identity Manager up to 7.0.1.0 cross site scripting
8031| [111796] IBM Security Identity Manager up to 7.0.1.0 cross site request forgery
8032| [111795] IBM Security Identity Manager up to 7.0.1.0 Login Lockout privilege escalation
8033| [111793] IBM Security Identity Manager up to 7.0.1.0 privilege escalation
8034| [111762] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8035| [111761] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8036| [111760] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8037| [111758] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8038| [111756] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8039| [111753] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8040| [111750] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8041| [111749] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8042| [111746] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8043| [111745] TP-LINK WVR/WAR/ER pptp_client.lua Variable command injection
8044| [111731] Cisco Unified Communications Manager Web-based Management Interface cross site scripting
8045| [111715] Hibernate Validator up to 5.2.4 Security Manager privilege escalation
8046| [111712] Office Tracker 11.2.5 /otweb/OTPClientLogin Parameter cross site scripting
8047| [111698] IBM Security Access Manager 8.0.0/9.0.0 URL Open Redirect
8048| [111697] IBM Security Access Manager 9.0.3 Web UI cross site scripting
8049| [111696] IBM Security Access Manager 8.0.0/9.0.0 privilege escalation
8050| [111554] GM Shanghai OnStar SOS iOS Client 7.1 Storage Cleartext weak encryption
8051| [111551] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 URL Request directory traversal
8052| [111550] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 Back-End Database sql injection
8053| [111549] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 Open Redirect
8054| [111548] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 XML Data XML External Entity
8055| [111542] GM OnStar SOS iOS Client 7.1 weak encryption
8056| [111541] GM OnStar SOS iOS Client 7.1 weak authentication
8057| [111529] SAP Solution Manager 7.20 BPO privilege escalation
8058| [111520] ITGuard-Manager 0.0.0.1 cgi-bin/drknow.cgi privilege escalation
8059| [111503] Aruba Networks ClearPass Policy Manager up to 6.1.x/6.2.5/6.3.0 EAP privilege escalation
8060| [111394] WP-DBManager up to 2.7.1 on WordPress Database Manager INSERT Statement File information disclosure
8061| [111337] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 Error Message information disclosure
8062| [111335] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 Web UI cross site scripting
8063| [111334] IBM Tivoli Key Lifecycle Manager 2.6/2.7 cross site request forgery
8064| [111333] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 URL Parameter Log information disclosure
8065| [111332] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 weak encryption
8066| [111331] IBM Tivoli Key Lifecycle Manager 2.5/2.6/2.7 weak encryption
8067| [111312] Online Ticket Booking admin/eventlist.php Parameter cross site scripting
8068| [111294] Mautic up to 2.11.0 Filemanager File Download information disclosure
8069| [111193] PHP Scripts Mall Muslim Matrimonial Script admin/event_add.php Parameter cross site scripting
8070| [111189] PHP Scripts Mall Muslim Matrimonial Script admin/event_edit.php Parameter cross site scripting
8071| [111181] NetTransport Download Manager up to 2.96L NetTransport.exe HTTP Response memory corruption
8072| [111180] Netwin SurgeFTP 23f2 Web Manager Interface cgi/surgeftpmgr.cgi Parameter cross site scripting
8073| [111124] Siemens 7KT PAC1200 Data Manager up to 2.02 Integrated Web Server privilege escalation
8074| [111053] GetGo Download Manager up to 5.3.0.2712 HTTP Server memory corruption
8075| [111000] Rockwell Automation FactoryTalk Alarms and Events up to 2.90 Service Port TCP 403 denial of service
8076| [110992] Micro Focus Operations Manager i 10.60/10.61/10.62 cross site scripting
8077| [110966] Piwigo 2.9.2 Batch Manager admin.php Parameter cross site scripting
8078| [110965] Piwigo 2.9.2 Batch Manager batch_manager_unit.php Parameter sql injection
8079| [110936] VMware ESXi up to 5.5/6.5 Host Client Stored cross site scripting
8080| [110881] IBM Business Process Manager 8.5 Web UI cross site scripting
8081| [110848] Solarwinds Storage Manager/Storage Profiler/Backup Profiler up to 5.1.1 LoginServlet Page sql injection
8082| [110803] Zoom Client up to 2.0 on Linux zoommtg:// Scheme ZoomLauncher privilege escalation
8083| [110802] Zoom Client up to 2.0 on Linux zoommtg:// Scheme ZoomLauncher memory corruption
8084| [110767] Sonatype Nexus Repository Manager up to 2.14.5 Password weak encryption
8085| [110728] Zoho ManageEngine Password Manager Pro up to 9.3 BulkAccessControlView.ec cross site scripting
8086| [110715] Fortinet FortiClient up to 5.6.0 information disclosure
8087| [110705] Fortinet FortiClient up to 5.4.3/5.5.x on Windows Security Alert privilege escalation
8088| [110685] xTuple PostBooks up to 4.6.x URL guiclient/guiclient.cpp Environment Variable privilege escalation
8089| [110673] KildClient up to 3.0.x URL prefs.c Environment Variable privilege escalation
8090| [110637] Responsive Events And Movie Ticket Booking 3.2.1 findcity.php Parameter sql injection
8091| [110621] Event Search Script 1.0 /event-list Parameter sql injection
8092| [110492] IBM Financial Transaction Manager up to 3.0.0.7 sql injection
8093| [110437] Adobe Experience Manager 6.0/6.1/6.2/6.3 Token HTTP GET Request information disclosure
8094| [110436] Adobe Experience Manager 6.0/6.1/6.2/6.3 HtmlRendererServlet Reflected cross site scripting
8095| [110426] Adobe Experience Manager 6.0/6.1/6.2/6.3 Apache Sling Servlets Post cross site scripting
8096| [110355] Synology Router Manager up to 1.1.5 SYNO.FileStation.Extract directory traversal
8097| [110354] Synology DiskStation Manager up to 5.2/6.0.3 SYNO.FileStation.Extract directory traversal
8098| [110352] Synology Calendar up to 2.0.1 Access Control SYNO.Cal.EventBase privilege escalation
8099| [110281] Google Android up to 8.0 activitymanagerservice information disclosure
8100| [110280] Google Android up to 8. activitymanagerservice information disclosure
8101| [110279] Google Android up to 8.0 activitymanagerservice information disclosure
8102| [110238] Dell Storage Manager up to 16.3.19 SMI-S Service HTTP Requests denial of service
8103| [110221] Bitbucket Auto-Unapprove Plugin Event privilege escalation
8104| [110193] Synology DiskStation Manager up to 5.2 smart.cgi command injection
8105| [110092] Cisco WebEx Event Center information disclosure
8106| [110084] Cisco Unified Communications Manager Web-based Management Interface cross site scripting
8107| [110075] Cisco Data Center Network Manager Configuration Parameter cross site scripting
8108| [110074] Cisco Data Center Network Manager Configuration Parameter cross site scripting
8109| [110073] Cisco Data Center Network Manager Configuration Parameter cross site scripting
8110| [110072] Cisco Data Center Network Manager Configuration Parameter cross site scripting
8111| [110071] Cisco Data Center Network Manager Configuration Parameter cross site scripting
8112| [110048] Fortinet FortiWebManager 5.8.0 Access Control weak authentication
8113| [110004] Hipchat Desktop Client on Mac Video Call Link Parser privilege escalation
8114| [109873] Huawei iManager NetEco V600R008C00/V600R008C10 privilege escalation
8115| [109788] EMC RSA Authentication Manager up to 8.2 SP1 P5 Security Console cross site scripting
8116| [109780] MapOS up to 3.1.11 /clientes/visualizar Parameter cross site scripting
8117| [109668] VMware vSphere Web Client up to 5.5/6.0 POST Request Server-Side Request Forgery
8118| [109617] nv-websocket-client X.509 Certificate Verification Man-in-the-Middle weak authentication
8119| [109608] October CMS Build 412 Asset Manager PHP Code Execution privilege escalation
8120| [109564] Zoho ManageEngine Applications Manager 13 /MyPage.do sql injection
8121| [109563] Zoho ManageEngine Applications Manager 13 /showresource.do sql injection
8122| [109562] Zoho ManageEngine Applications Manager 13 /MyPage.do sql injection
8123| [109561] Zoho ManageEngine Applications Manager 13 /manageConfMons.do sql injection
8124| [109560] Zoho ManageEngine Applications Manager 13 /showresource.do sql injection
8125| [109559] Zoho ManageEngine Applications Manager 13 /manageApplications.do sql injection
8126| [109486] Google Android 8.0 Window Manager privilege escalation
8127| [109485] Google Android up to 8.0 Device Policy Client privilege escalation
8128| [109456] Cisco Unified Communications Manager SQL Database Interface sql injection
8129| [109319] IBM Security Access Manager 9.0.3 XML Data XML External Entity
8130| [109318] IBM Security Access Manager 9.0.3 Request privilege escalation
8131| [109314] IBM Tivoli Endpoint Manager 9.2/9.5 HSTC information disclosure
8132| [109313] IBM Tivoli Endpoint Manager 9.2/9.5 Password Policy weak authentication
8133| [109309] Recurly Client .NET Library up to 1.8.0 API Key Server-Side Request Forgery
8134| [109308] Recurly Client Python Library up to 2.6.1 API Key Resource.get Server-Side Request Forgery
8135| [109307] Recurly Client Ruby Library up to 2.11.2 API Key Resource#find Server-Side Request Forgery
8136| [109301] Kickbase Bundesliga Manager App up to 2.2.0 on iOS id678241305 weak encryption
8137| [109274] Inedo BuildMaster up to 5.8.1 Event Listener privilege escalation
8138| [109248] NetApp OnCommand Unified Manager for 7-mode up to 5.2.0 User Interface Clickjacking privilege escalation
8139| [109247] Avaya IP Office up to 10.1.0 SoftConsole Client memory corruption
8140| [109232] HPE Content Manager Workgroup Service 9.00 denial of service
8141| [109225] Cacti 1.1.27 Client-IP Header remote_agent.php Request privilege escalation
8142| [109176] NetIQ iManager up to 2.7.7 Patch 10 HF1/3.0.3.1 Reflected cross site scripting
8143| [109170] KeystoneJS up to 4.0.0-beta.6 CSRF Prevention privilege escalation
8144| [109146] Zoho ManageEngine Applications Manager 13 GraphicalView.do sql injection
8145| [109145] Zoho ManageEngine Applications Manager 13 manageApplications.do sql injection
8146| [108899] Cisco Firepower 4100/Firepower 9300 Smart Licensing Manager privilege escalation
8147| [108861] Intel McAfee Network Data Loss Prevention Response Body privilege escalation
8148| [108860] Intel McAfee Network Data Loss Prevention 9.3.x Webserver information disclosure
8149| [108859] Intel McAfee Network Data Loss Prevention 9.3.x XSS cross site request forgery
8150| [108787] Apache HttpClient up to 4.3.0 HttpClientBuilder.java unknown vulnerability
8151| [108761] Mailing List Manager Pro 3.0 admin/users Parameter sql injection
8152| [108745] HPE RSA Authentication Manager up to 8.2 SP1 P4 Parameter cross site scripting
8153| [108721] Artica Pandora FMS 7.0 Manager Files PHP File PHP Code Execution privilege escalation
8154| [108642] IBM Tivoli Endpoint Manager 9.2/9.5 Web UI cross site scripting
8155| [108640] IBM Tivoli Endpoint Manager 9.2/9.5 Cleartext weak encryption
8156| [108639] IBM Tivoli Endpoint Manager 9.2/9.5 Random Number Generator information disclosure
8157| [108638] IBM Tivoli Endpoint Manager 9.2/9.5 Secure Cookie weak encryption
8158| [108637] IBM Tivoli Endpoint Manager 9.2/9.5 Error Log Error Message information disclosure
8159| [108636] IBM Tivoli Endpoint Manager 9.2/9.5 URL Parameter History information disclosure
8160| [108635] IBM Tivoli Endpoint Manager 9.2/9.5 privilege escalation
8161| [108634] IBM Tivoli Endpoint Manager 9.2/9.5 information disclosure
8162| [108632] KeyCloak CSRF Prevention privilege escalation
8163| [108314] TYPO3 CMS up to 4.1.13/4.2.12/4.3.3/4.4.0 Extension Manager Parameter cross site scripting
8164| [108292] Phpsugar PHP Melody up to 2.7.2 page_manager.php Parameter cross site scripting
8165| [108290] Webmin up to 1.859 File Manager Request privilege escalation
8166| [108260] Job Manager Plugin up to 0.7.24 CV File Manager information disclosure
8167| [108242] Oracle Integrated Lights Out Manager up to 3.2.5 System Management information disclosure
8168| [108236] Oracle Integrated Lights Out Manager (ILOM) up to 3.2.5 System Management denial of service
8169| [108234] Oracle Integrated Lights Out Manager (ILOM) up to 3.2.5 System Management denial of service
8170| [108222] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Batik denial of service
8171| [108219] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Tomcat unknown vulnerability
8172| [108172] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.19 Client programs information disclosure
8173| [108095] Oracle Access Manager 11.1.2.3.0 Web Server Plugin information disclosure
8174| [108085] Oracle Identity Manager 11.1.2.3.0 Apache Struts 1 memory corruption
8175| [108076] Oracle Access Manager 11.1.2.3.0 Web Server Plugin information disclosure
8176| [108060] Oracle Enterprise Manager Ops Center 12.2.2/12.3.2 Apache Groovy unknown vulnerability
8177| [108020] Oracle Communications Unified Session Manager 7.x OpenSSL denial of service
8178| [107951] Google Android ServiceManager service_manager.c denial of service
8179| [107931] Form Manager Plugin up to 1.7.2 on WordPress ajax.php fm_saveHelperGatherItems privilege escalation
8180| [107902] Aruba Networks ClearPass Policy Manager up to 6.4.6/6.5.1 privilege escalation
8181| [107806] EMC Network Configuration Manager 9.3.x/9.4.0.x/9.4.1.x/9.4.2.x Reflected cross site scripting
8182| [107697] Pure Storage Purity 4.7.5 SNMP Trap Manager Site Parameter Stored cross site scripting
8183| [107683] IBM Financial Transaction Manager 3.0.2 information disclosure
8184| [107595] IDenticard Two-Reader Controller Configuration Manager 1.18.8 /~user_handler cross site scripting
8185| [107535] Trend Micro OfficeScan 11.0/12.0 cgiShowClientAdm.exe memory corruption
8186| [107524] IBM Tivoli Storage Manager 7.1/8.1 Application Trace Credentials information disclosure
8187| [107517] IBM Tivoli Storage Manager 7.1/8.1 Authentication information disclosure
8188| [107489] Cisco License Manager Web Interface HTTP Request directory traversal
8189| [107488] Cisco Unified Communications Manager Web UI iFRAME cross site scripting
8190| [107483] Cisco Intrusion Prevention System Advanced Malware Protection IPv6 Packet CPU Exhaustion denial of service
8191| [107380] phpCollab up to 2.5.1 File Upload clients/editclient.php Request privilege escalation
8192| [107335] UCOPIA Wireless Appliance up to 5.1.7 chroothole_client privilege escalation
8193| [107333] Apache Wicket up to 8.0.0-M1 CSRF Prevention HTTP Header privilege escalation
8194| [107287] Tine Community Edition up to 2.0 Filenmanager Stored cross site scripting
8195| [107281] HP UCMDB Configuration Manager up to 10.23 cross site scripting
8196| [107280] HP UCMDB Configuration Manager up to 10.23 privilege escalation
8197| [107228] Cisco IOS XE up to 16.1 on Catalyst Wireless Controller Manager Request denial of service
8198| [107209] IBM Security Identity Manager 6.0/7.0 privilege escalation
8199| [107200] IBM Security Identity Manager Virtual Appliance 6.0/7.0 Request privilege escalation
8200| [107174] Event Espresso Lite Plugin 3.1.37.12.L on WordPress index.php Parameter sql injection
8201| [107171] SaltStack Salt local_batch Client weak authentication
8202| [107170] IBM Business Process Manager 7.5/8.0/8.5 LDAP privilege escalation
8203| [107169] IBM Business Process Manager 7.5/8.0/8.5 Web UI cross site scripting
8204| [107168] IBM Business Process Manager 7.5/8.0/8.5 Web UI cross site scripting
8205| [107167] IBM Business Process Manager 7.5/8.0/8.5 XML Data XML External Entity
8206| [107159] IBM Business Process Manager 8.0.1.1/8.5.7 Web UI cross site scripting
8207| [107114] IBM Business Process Manager 8.5.7 Web UI cross site scripting
8208| [107090] pulp-consumer-client up to 2.6.3 TLS Certificate weak authentication
8209| [107037] CA Identity Manager up to r12.6 SP8/14.0/14.1 Search Account information disclosure
8210| [106958] Google Android Qualcomm msm_dba_register_client memory corruption
8211| [106895] Simple Ads Manager Plugin 2.5.94/2.5.96 on WordPress information disclosure
8212| [106868] Polycom RealPresence Resource Manager up to 8.3 PlcmRmWeb/FileDownload SOAP Request directory traversal
8213| [106867] Polycom RealPresence Resource Manager up to 8.3 Session Identifier HTTP GET Request information disclosure
8214| [106866] Polycom RealPresence Resource Manager up to 8.3 PlcmRmWeb/JConfigManager HTTP POST Request information disclosure
8215| [106830] Netsweeper up to 3.1.9/4.0.8/4.1.1 Client Filter Admin Portal weak authentication
8216| [106778] Twitter Client 6.62/6.62.1 on iOS Server Certificate Validator /1.1/help/settings.json weak authentication
8217| [106776] IBM Security Identity Manager 5.1/6.0/7.0 cross site request forgery
8218| [106770] Job Manager Plugin up to 0.4.6 on WordPress Parameter cross site request forgery
8219| [106721] IBM Business Process Manager 7.5.x/8.0.x/8.5.x Access Restriction privilege escalation
8220| [106709] Event Expresso Free up to 3.1.37.11.L on WordPress edit_event_category Parameter sql injection
8221| [106706] Easy Team Manager up to 1.3.1 on WordPress easy_team_manager_desc_edit.php sql injection
8222| [106702] eventr Plugin 1.02.2 on WordPress edit.php Parameter sql injection
8223| [106701] eventr Plugin 1.02.2 on WordPress edit.php Parameter sql injection
8224| [106580] D-Link DIR-850L up to FW114WWb07_h2ab_beta1/FW208WWb02 DHCP Client inet_ipv4.php privilege escalation
8225| [106557] Entity Event Registration Module up to 7.x-1.4 on Drupal information disclosure
8226| [106348] Honeywell NVR /RPC2 userManager.addUser privilege escalation
8227| [106294] Wolf CMS 0.8.3.1 /plugin/file_manager/ create-file-popup/create-directory-popup cross site scripting
8228| [106244] Google Android up to 7.1.2 windowmanager privilege escalation
8229| [106236] Cisco Unified Communications Manager 10.0(1.10000.24) Trust Verification Service denial of service
8230| [106199] Community Events Plugin up to 1.3 on WordPress sql injection
8231| [106141] ConnMan Project Connection Manager Daemon up to 1.34 DNS Packet memory corruption
8232| [106115] Apache Hadoop up to 2.6.4/2.7.2 YARN NodeManager Password information disclosure
8233| [106041] phpFileManager 0.9.8 URL Command privilege escalation
8234| [106031] Async Http Client up to 2.0.34 privilege escalation
8235| [105877] Aruba Networks ClearPass Policy Manager up to 6.4.6/6.5.1 privilege escalation
8236| [105876] Aruba Networks ClearPass Policy Manager up to 6.4.6/6.5.1 privilege escalation
8237| [105874] Aruba Networks ClearPass Policy Manager up to 6.4.6/6.5.1 cross site request forgery
8238| [105873] Aruba Networks ClearPass Policy Manager up to 6.4.6/6.5.1 privilege escalation
8239| [105872] Aruba Networks ClearPass Policy Manager up to 6.4.6/6.5.1 Permission Check privilege escalation
8240| [105810] Synology Router Manager up to 1.1.4 SYNO.Core.PortForwarding.Rules denial of service
8241| [105786] IBM Business Process Manager up to 7.5/8.0.0/8.5.4 cross site scripting
8242| [105768] Replibit Backup Manager up to 2017 sudo Command privilege escalation
8243| [105705] ONOS up to 1.4.x Ethernet Frame PacketManager.java denial of service
8244| [105701] Red Hat Enterprise Virtualization Manager up to 3.6 SLAAC IPv6 Address privilege escalation
8245| [105766] IBM Security Access Manager up to 9.0.3 Open Redirect
8246| [105648] NoviWare up to NW400.2.6 novi_process_manager_daemon Stack-based memory corruption
8247| [105618] Codiad up to 2.8.3 class.filemanager.php Parameter privilege escalation
8248| [105583] Google Android Audio Client Pointer Dereference denial of service
8249| [105544] Google Android ClientHello Memory Leak denial of service
8250| [105482] Google Android GPS Client weak encryption
8251| [105424] Cisco Unified Communications Manager 10.5(2.10000.5)/11.0(1.10000.10)/11.5(1.10000.6) Role Based Access Control HTTP Request privilege escalation
8252| [105409] Cisco VNF Element Manager up to 5.0.3/5.1.3 privilege escalation
8253| [105399] WildMIDI 0.4.2 mid File internal_midi.c _WM_SetupMidiEvent denial of service
8254| [105398] WildMIDI 0.4.2 mid File internal_midi.c _WM_SetupMidiEvent denial of service
8255| [105396] WildMIDI 0.4.2 mid File internal_midi.c _WM_SetupMidiEvent denial of service
8256| [105394] Cisco AnyConnect Secure Mobility Client WebLaunch cross site scripting
8257| [105244] Adobe Experience Manager up to 6.1 information disclosure
8258| [105243] Adobe Experience Manager up to 6.2 File privilege escalation
8259| [105242] Adobe Experience Manager up to 6.3 Configuration unknown vulnerability
8260| [105231] Fortinet FortiManager up to 5.0.10/5.2.1 Parameter sql injection
8261| [105230] Fortinet FortiManager up to 5.0.10/5.2.1 Parameter cross site scripting
8262| [105229] Fortinet FortiManager up to 5.0.10/5.2.1 File information disclosure
8263| [105207] IBM Rational Engineering Lifecycle Manager 4.0/5.0/6.0 Web UI cross site scripting
8264| [105147] Alcatel-Lucent Home Device Manager up to 4.1.9/4.2.1 spoofing
8265| [105003] Siemens SIMATIC WinCC Sm@rtClient up to 1.0.2 TLS weak encryption
8266| [104932] Zend Framework up to 2.2.8/2.3.3 Session Validator SessionManager privilege escalation
8267| [104925] Download Manager Plugin up to 2.7.2 on WordPress basic_settings privilege escalation
8268| [104905] Cisco Prime Collaboration Provisioning Tool 12.1 UpgradeManager privilege escalation
8269| [104904] Cisco Unified Communications Manager 11.5(1.10000.6) Web Framework directory traversal
8270| [104903] Cisco Unified Communications Manager 10.5(2.10000.5)/11.0(1.10000.10)/11.5(1.10000.6) Blind sql injection
8271| [104897] Cisco Data Center Network Manager 5.2(1) Java Port TCP Packet Flooding denial of service
8272| [104819] Dell Storage Manager up to 2016 R2.1 doGet directory traversal
8273| [104802] Zoho ManageEngine OpManager up to 12.2 weak encryption
8274| [104790] Trend Micro Control Manager 6.0 XXE information disclosure
8275| [104789] Trend Micro Control Manager 6.0 directory traversal
8276| [104788] Trend Micro Control Manager 6.0 RestfulServiceUtility.NET.dll sql injection
8277| [104787] Trend Micro Control Manager 6.0 weak authentication
8278| [104786] Trend Micro Control Manager 6.0 cmdHandlerNewReportScheduler.dll Opcode sql injection
8279| [104785] Trend Micro Control Manager 6.0 cmdHandlerStatusMonitor.dll Opcode sql injection
8280| [104784] Trend Micro Control Manager 6.0 mdHandlerLicenseManager.dll Opcode sql injection
8281| [104783] Trend Micro Control Manager 6.0 cmdHandlerTVCSCommander.dll sql injection
8282| [104736] Xoops 2.5.8 MIME Type imagemanager.php cross site scripting
8283| [104731] Event List Plugin 0.7.9 on WordPress Array wp-admin/admin.php Parameter cross site scripting
8284| [104706] IBM Web Content Manager 7.0/8.0/8.5/9.0 cross site scripting
8285| [104705] IBM Tivoli Endpoint Manager Crash denial of service
8286| [104649] Comcast DPC3939 syseventd privilege escalation
8287| [104563] Zoho ManageEngine Event Log Analyzer 11.4/11.5 Log Parser Persistent cross site scripting
8288| [104562] Zoho ManageEngine Event Log Analyzer 11.4/11.5 cross site scripting
8289| [104561] Zoho ManageEngine Event Log Analyzer 11.4/11.5 Parameter Reflected cross site scripting
8290| [104472] oxide-qt up to 1.9.0 on Ubuntu JavaScriptDialogManager memory corruption
8291| [104467] Synology DiskStation Manager up to 6.1.3 forget_passwd.cgi information disclosure
8292| [104466] Synology DiskStation Manager up to 6.1.3 SYNO.API.Encryption Parameter weak encryption
8293| [104457] IBM Rational Software Architect Design Manager 5.0/6.0 Web UI cross site scripting
8294| [104416] AmosConnect 8 Task Manager Default Credentials weak authentication
8295| [104103] Apple iOS up to 10.3.2 EventKitUI Resource Exhaustion denial of service
8296| [104098] IBM Tivoli Endpoint Manager weak encryption
8297| [104097] IBM Tivoli Endpoint Manager Open Redirect
8298| [104096] IBM Tivoli Endpoint Manager XML Data XML External Entity
8299| [104095] IBM Tivoli Endpoint Manager cross site request forgery
8300| [104094] IBM Tivoli Endpoint Manager Web UI Lifecycle/Power/Patch) cross site scripting
8301| [104086] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 Client mysqldump unknown vulnerability
8302| [103961] Oracle Hospitality Cruise Materials Management 7.30.562 Event Viewer unknown vulnerability
8303| [103861] Oracle Agile PLM 9.3.5/9.3.6 Web Client unknown vulnerability
8304| [103853] Oracle General Ledger up to 12.2.6 Account Hierarchy Manager unknown vulnerability
8305| [103852] Oracle Applications Manager 12.1.3 Diagnostics Interfaces denial of service
8306| [103838] Oracle Enterprise Manager Ops Center 12.2.2/12.3.2 Hosted Framework denial of service
8307| [103837] Oracle Enterprise Manager Ops Center 12.2.2/12.3.2 Networking unknown vulnerability
8308| [103836] Oracle Enterprise Manager Base Platform 12.1.0/13.1.0/13.2.0 Discovery Framework unknown vulnerability
8309| [103835] Oracle Configuration Manager up to 12.1.2 Installation unknown vulnerability
8310| [103833] Oracle Enterprise Manager Base Platform 12.1.0/13.1.0/13.2.0 UI Framework unknown vulnerability
8311| [103831] Oracle Enterprise Manager Ops Center 12.2.2/12.3.2 Satellite Framework unknown vulnerability
8312| [103577] MyWebSQL 3.6 Database Manager Stored cross site scripting
8313| [103548] EMC RSA Authentication Manager up to 8.2 SP1 Patch 1 Self-Service Console PIN denial of service
8314| [103547] EMC RSA Authentication Manager up to 8.2 SP1 cross site scripting
8315| [103476] FineCMS 2.1.0 URL Manager ,phpinfo() privilege escalation
8316| [103412] Rise Ultimate Project Manager 1.8 My Profile cross site scripting
8317| [103411] Rise Ultimate Project Manager 1.8 Messaging cross site scripting
8318| [103555] EMC RSA Authentication Manager up to 8.2 SP1 Stored cross site scripting
8319| [103370] EMC ESRS Policy Manager up to 6.7 Default Admin Password weak authentication
8320| [103329] Event Calendar WD up to 1.0.93 cross site scripting
8321| [103324] Download Manager up to 2.9.50 on WordPress Open Redirect
8322| [103323] Download Manager up to 2.9.49 on WordPress cross site scripting
8323| [103274] X.org X Server XEvent privilege escalation
8324| [103273] X.org X Server X Event Stack-based memory corruption
8325| [103042] Xen up to 4.8.x Event Channel Port NULL Pointer Dereference memory corruption
8326| [103013] Cisco Prime Infrastructure/Programmable Network Manager 2.0(4.0.45B)/3.1(1) Web-based Management Interface DOM-based cross site scripting
8327| [103012] Cisco Prime Infrastructure/Programmable Network Manager 2.0(4.0.45B)/3.1(1) Web-based Management Interface Reflected cross site scripting
8328| [103011] Cisco Prime Infrastructure/Programmable Network Manager 2.0(4.0.45B)/3.1(1) SQL Database Interface sql injection
8329| [102997] NetApp OnCommand System Manager up to 8.x Cluster Peering Credentials information disclosure
8330| [102880] TeamSpeak Client 3.0.19 Unicode Crash denial of service
8331| [102843] Adobe Experience Manager 6.1.0 cross site scripting
8332| [111939] FortiClientWindows 5.4.1/5.4.2 FortiClientNamedPipe privilege escalation
8333| [102779] McAfee Data Loss Prevention Endpoint 10.0.x ePO Extension IMG Tag cross site scripting
8334| [102639] Kibana up to 5.2.0 SSL Client Access File Descriptor Crash denial of service
8335| [102622] Apache Thrift up to 0.9.2 Client Libraries skip denial of service
8336| [102508] Mozilla Firefox up to 53.x Javascript Event Address spoofing
8337| [102368] Event List Plugin 0.7.8 on WordPress wp-admin/admin.php Parameter sql injection
8338| [102347] IBM Quality Manager up to 6.0.3 Web UI cross site scripting
8339| [102346] IBM Quality Manager up to 6.0.3 Web UI cross site scripting
8340| [102345] IBM Quality Manager up to 6.0.3 Web UI cross site scripting
8341| [102344] IBM Quality Manager up to 6.0.3 Web UI cross site scripting
8342| [102296] Cisco Ultra Services Framework Element Manager 21.0.v0.65839 Default Credentials weak authentication
8343| [102291] Cisco Ultra Services Framework Element Manager 21.0.0 Default Credentials weak authentication
8344| [102290] Cisco Ultra Services Framework Element Manager Default Credentials weak authentication
8345| [102280] Cisco Unified Communications Domain Manager 8.1(7)ER1 Web-based GUI Open Redirect
8346| [102279] Cisco Unified Communications Domain Manager 8.1(7)ER1 Web-based GUI sql injection
8347| [102194] SKYSEA Client View up to 11.221.03 Management Console TCP Connection privilege escalation
8348| [102152] IBM Tivoli Federated Identity Manager 6.2 Sessio Cookie unknown vulnerability
8349| [102150] IBM Business Process Manager 8.0/8.5 Web UI cross site scripting
8350| [102143] IBM Tivoli Key Lifecycle Manager 2.0.1/2.5/2.6 Permission privilege escalation
8351| [102142] IBM Tivoli Key Lifecycle Manager Password Policy weak authentication
8352| [102127] ClearPass Policy Manager up to 6.5.6/6.6.0 sql injection
8353| [102108] Huawei OceanStor UDS DeviceManager UDS Patch information disclosure
8354| [102106] F5 BIG-IP/Enterprise Manager mcpq Daemon memory corruption
8355| [102097] Cisco Prime Data Center Network Manager up to 10.1 Administrative Console Credentials privilege escalation
8356| [102096] Cisco Prime Data Center Network Manager 10.1(1)/10.1(2) Role-Based Access Control privilege escalation
8357| [102058] IBM Endpoint Manager for Security and Compliance 1.9.70 Web UI cross site scripting
8358| [102052] IBM Security Privileged Identity Manager 2.0.2/2.1.0 URL information disclosure
8359| [102051] IBM Security Access Manager for Web 9.0.0 privilege escalation
8360| [102050] IBM Security Access Manager for Web 9.0.0 weak encryption
8361| [102008] Google Android Resource Power Manager privilege escalation
8362| [101877] Tiki Wiki CMS Groupware 16.2 XSS Filter PreventXss.php cross site scripting
8363| [101858] Apache Hive up to 1.2.1/2.0.0 Client weak authentication
8364| [101852] Hitachi Device Manager/Replication Manager up to 8.5.2 cross site scripting
8365| [101851] Hitachi Device Manager up to 8.5.2 Open Redirect
8366| [101850] Hitachi Device Manager/Tuning Manager up to 8.5.2 Open Redirect
8367| [101849] Hitachi Device Manager/Replication Manager up to 8.5.2 XXE information disclosure
8368| [101848] Hitachi Device Manager up to 8.5.2 RMI Port privilege escalation
8369| [101823] Gajim up to 0.16.7 Remote Controlling Clients Extension Plaintext information disclosure
8370| [101796] Fortinet FortiOS 5.4.3 FortiClient SSL_VPN Linux privilege escalation
8371| [101795] Fortinet FortiOS 5.4.2 FortiClient SSL_VPN Linux privilege escalation
8372| [101784] NetApp OnCommand Unified Manager Core Package up to 5.2.2 Error Message information disclosure
8373| [101783] NetApp OnCommand Unified Manager Core Package up to 5.2.2 sql injection
8374| [101720] Sitecore CRM 8.1 Rev 151207 Package Manager UploadPackage2.aspx ZIP Archive privilege escalation
8375| [101627] PgBouncer up to 1.5.4 Password Packet src/client.c denial of service
8376| [101618] IBM Tivoli Federated Identity Manager 6.2 Web UI cross site scripting
8377| [101615] IBM Business Process Manager 8.0/8.5 Open Redirect
8378| [101565] Cisco Unified Communications Manager up to 10.5 Web-based Management Interface cross site scripting
8379| [101561] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
8380| [101560] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
8381| [101559] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
8382| [101558] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
8383| [101557] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
8384| [101556] Cisco Remote Expert Manager 11.0.0 Web Interface HTTP Requests information disclosure
8385| [101555] Cisco Remote Expert Manager 11.0.0 TCP Connection Flooding denial of service
8386| [101551] Cisco Industrial Ethernet 1000 Series Switch 1.3 Device Manager Web Interface cross site request forgery
8387| [101544] Mimosa Client Radios up to 2.2.2 Web Interface GET Parameter information disclosure
8388| [101543] Mimosa Client Radios/Backhaul Radios up to 2.2.3 Web Interface POST Request OS Command Injection privilege escalation
8389| [101542] Mimosa Client Radios/Backhaul Radios up to 2.2.2 Web Interface information disclosure
8390| [101541] Mimosa Client Radios/Backhaul Radios up to 2.2.2 Web Interface privilege escalation
8391| [101540] Mimosa Client Radios/Backhaul Radios up to 2.2.2 Mosquitto Default Credentials weak authentication
8392| [101539] Mimosa Client Radios/Backhaul Radios up to 2.2.2 denial of service
8393| [101527] Secure Bytes Secure Cisco Auditor 3.0 Cisco Configuration Manager directory traversal
8394| [101440] McAfee Network Data Loss Prevention 9.3.x Web Interface Username information disclosure
8395| [101439] McAfee Network Data Loss Prevention 9.3.x Web Server HTTP Method information disclosure
8396| [101438] McAfee Network Data Loss Prevention 9.3.x HTTP Response Header Clickjacking privilege escalation
8397| [101437] McAfee Network Data Loss Prevention 9.3.x Session privilege escalation
8398| [101436] McAfee Network Data Loss Prevention 9.3.x HTTP Response Header Banner information disclosure
8399| [101435] McAfee Network Data Loss Prevention 9.3.x HTTP Request information disclosure
8400| [101434] McAfee Network Data Loss Prevention 9.3.x HTTP Header cross site scripting
8401| [101425] Flexera FlexNet Manager Suite up to 2017 Inventory Agent/Beacon privilege escalation
8402| [101065] BlackBerry Unified Endpoint Manager up to 12.6.1 Management Console Stored cross site scripting
8403| [101059] IBM Rational Quality Manager Web UI cross site scripting
8404| [100956] Adobe Experience Manager Forms 6.0/6.1/6.2 Pre-population Service information disclosure
8405| [100895] Advantech B+B SmartWorx MESR901 up to 1.5.2 Web Interface Client weak authentication
8406| [100819] Novell iManager up to 2.7 SP7 Patch 10/3.0.3.0 Upload privilege escalation
8407| [100818] Novell iManager up to 2.7 SP7 Patch 10/3.0.3.0 Object Manager Persistent cross site request forgery
8408| [100817] Novell iManager up to 2.7 SP7 Patch 10/3.0.3.0 Framework Persistent cross site scripting
8409| [100816] NetIQ iManager up to 3.0.3.0 Tomcat unknown vulnerability
8410| [100805] Kerio Connect/Connect Client Desktop Application E-Mail Preview Clickjacking privilege escalation
8411| [100761] GetSimple CMS 3.3.13 CSRF Prevention template_functions.php privilege escalation
8412| [100640] UDFclient up to 0.8.7 C Library strlcpy memory corruption
8413| [100636] Simple PHP File Manager index.php directory traversal
8414| [100631] Novell iManager up to 2.7 Communication Certificate MD5 weak authentication
8415| [101791] Fortinet FortiManager/FortiAnalyzer 5.4.0/5.4.1/5.4.2 SecurityWall.co Open Redirect
8416| [100595] Joomla CMS up to 3.6.5 Template Manager cross site scripting
8417| [100592] Joomla CMS up to 3.6.5 Template Manager cross site scripting
8418| [100561] NetIQ Access Manager 4.2/4.3 Access Gateway Error Page /NAGErrors Referer Header cross site scripting
8419| [100495] concrete5 8.1.0 File Manager imageeditor cross site request forgery
8420| [100721] F5 BIG-IP/Enterprise Manager sshd denial of service
8421| [100422] Reporting Module 1.12.0 on OpenMRS manageReports.jsp cross site request forgery
8422| [100406] NetIQ Access Manager up to 4.2 SP3/4.3 SP1 SAML 2.0 Identity Server information disclosure
8423| [100405] NetIQ Access Manager up to 4.2.2/4.3.0 Identity Server samlp:AuthnRequest Document cross site scripting
8424| [100400] Cisco Unified Communications Manager Session Initiation Protocol denial of service
8425| [100336] Zoho ManageEngine Password Manager Pro up to 8.4 cross site request forgery
8426| [100310] Mozilla Firefox up to 52 Libevent Library denial of service
8427| [100237] Oracle Automatic Service Request up to 5.6 ASR Manager unknown vulnerability
8428| [100233] Oracle Automatic Service Request up to 5.6 ASR Manager unknown vulnerability
8429| [100204] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Client mysqldump unknown vulnerability
8430| [100149] Oracle up to 16.2 Project Manager information disclosure
8431| [100097] Oracle Retail XBRi Loss Prevention up to 10.8.1 Internal Operations privilege escalation
8432| [100093] Oracle Hospitality OPERA 5 Property Services up to 5.5.1.x OPERA Business Events unknown vulnerability
8433| [100009] Oracle Transportation Manager up to 6.4.2 unknown vulnerability
8434| [99997] Oracle Enterprise Manager 12.1.0/13.1.0/13.2.0 Discovery Framework denial of service
8435| [99996] Oracle Enterprise Manager 12.1.0/13.1.0/13.2.0 Security Framework denial of service
8436| [99983] Oracle Social Network up to 11.1.11 Android Client information disclosure
8437| [99965] Oracle Identity Manager 11.1.2.3.0 Rules Engine unknown vulnerability
8438| [99935] Apache CXF up to 3.0.12/3.1.10 STSClient Cache information disclosure
8439| [99934] Apache CXF up to 3.0.12/3.1.10 JAX-RS XML Security Streaming Client spoofing
8440| [99927] IBM Financial Transaction Manager 3.0.0.x Web UI cross site scripting
8441| [99890] Quest Privilege Manager 6.0.0-27/6.0.0-50 pmmasterd privilege escalation
8442| [99874] IBM Financial Transaction Manager 3.0.1/3.0.2 weak authentication
8443| [99873] IBM Tivoli Application Dependency Discovery Manager 7.2.2/7.3 Web UI cross site scripting
8444| [99872] IBM Tivoli Application Dependency Discovery Manager 7.2.2/7.3 File information disclosure
8445| [99871] IBM Tivoli Application Dependency Discovery Manager 7.2.2/7.3 File information disclosure
8446| [99870] Wolf CMS up to 0.8.3.0 File Manager JPEG Image privilege escalation
8447| [99817] Samsung Galaxy S6 SecEmailSync sql injection
8448| [99713] Spider Event Calendar Plugin up to 1.5.51 on WordPress calendar_functions.php sql injection
8449| [99696] Microsoft Windows up to Vista SP2 Adobe Type Manager Font Driver ATMFD.dll information disclosure
8450| [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
8451| [99555] NetApp OnCommand Performance Manager up to 7.1 Java Management Extension information disclosure
8452| [99526] Netikus EventSentry up to 3.2.1.43 SNMP cross site scripting
8453| [99431] Cisco Unified Communications Manager 12.0(0.98000.452) Web-based Management Interface Reflected cross site scripting
8454| [99429] Cisco Unified Communications Manager Manager Web Interface Database sql injection
8455| [99319] IBM TRIRIGA Document Manager privilege escalation
8456| [99175] Huawei FusionManager V100R002C03/V100R003C00 Web Interface cross site request forgery
8457| [99157] TigerVNC 1.7.1 SMsgReader.cxx readClientCutText) denial of service
8458| [99133] IBM Rational Quality Manager 4.0/5.0/6.0 cross site scripting
8459| [99132] IBM Rational Quality Manager 4.0/5.0/6.0 Web UI cross site scripting
8460| [99131] IBM Quality Manager 4.0/5.0/6.0 Web UI cross site scripting
8461| [99070] Sync Breeze Enterprise Client 9.5 Import Command Long Name memory corruption
8462| [98993] IBM TRIRIGA Report Manager 3.2/3.3/3.4/3.5 privilege escalation
8463| [98950] IBM Tivoli Key Lifecycle Manager 2.5/2.6 information disclosure
8464| [98937] Samsung GALAXY Apps weak encryption
8465| [98902] Apple macOS Server up to 5.2 Profile Manager Resource Exhaustion denial of service
8466| [98658] Apple macOS up to 10.12.3 MCX Client privilege escalation
8467| [98421] Alcatel-Lucent Motive Home Device Manager up to 4.1 Management Console getDeviceType.do cross site scripting
8468| [98400] NetIQ Access Manager up to 4.1.2/4.2.1 SP1 Upload cross site request forgery
8469| [98399] NetIQ Access Manager up to 4.1.2/4.2.1 SP1 iManager Admin Console Credentials information disclosure
8470| [98398] NetIQ Access Manager up to 4.1.2/4.2.1 SP1 nps/servlet/frameservice cross site scripting
8471| [98397] NetIQ Access Manager up to 4.1.2/4.2.1 SP1 Clickjacking privilege escalation
8472| [98396] NetIQ Access Manager up to 4.1.2/4.2.1 SP1 information disclosure
8473| [98395] NetIQ Access Manager up to 4.1.2/4.2.1 Identity Server SAML2 information disclosure
8474| [98394] NetIQ Access Manager up to 4.1.2/4.2.1 SAML cross site scripting
8475| [98393] NetIQ Access Manager up to 4.1.2/4.2.1 iManager privilege escalation
8476| [98382] Cisco IOS/IOS XE DHCP Client denial of service
8477| [98261] Cisco Unified Communications Manager 11.5(1.11007.2) Web Framework cross site request forgery
8478| [98259] Cisco Unified Communications Manager 11.5(1.11007.2) cross site scripting
8479| [98258] Cisco Unified Communications Manager 10.5(2.14076.1) Filter cross site scripting
8480| [98130] libevent up to 2.1.5 evdns.c search_make_new memory corruption
8481| [98129] libevent up to 2.1.5 evutil.c evutil_parse_sockaddr_port memory corruption
8482| [98128] libevent up to 2.1.5 evdns.c name_parse memory corruption
8483| [98218] Joomla CMS 1.5 com_sngevents sql injection
8484| [97889] Joomla CMS 1.5 com_eventlist /index.php sql injection
8485| [97839] Novell iPrint Client up to 5.41 on XP/Vista/Win7 ActiveX Plugin memory corruption
8486| [97807] Pharos PopUp Printer Client 9.0 psnotifyd Heap-based memory corruption
8487| [97806] Pharos PopUp Printer Client 9.0 psnotifyd Heap-based memory corruption
8488| [97805] Pharos PopUp Printer Client 9.0 psnotifyd Out-of-Bounds denial of service
8489| [97804] Pharos PopUp Printer Client 9.0 psnotifyd Heap-based memory corruption
8490| [97795] FTPshell Client 6.53 PWD Command memory corruption
8491| [97787] Cloud Foundry up to v252 UAA OAuth Client denial of service
8492| [97604] IBM Business Process Manager 7.5/8.0/8.5 File Download privilege escalation
8493| [97600] IBM Tivoli Storage Manager 6.1/6.2/6.3/7.1 SQL information disclosure
8494| [97586] Cloudera Manager up to 5.5 /api/v11/users/sessions information disclosure
8495| [97585] Cloudera Manager up to 5.5 logs information disclosure
8496| [97584] Cloudera Manager up to 5.5 cross site scripting
8497| [97511] Dropbear SSH up to 2016 dbclient privilege escalation
8498| [97429] mp3splt 2.6.2 options_manager.c free_options denial of service
8499| [97428] mp3splt 2.6.2 options_manager.c free_options denial of service
8500| [97418] Siemens SINUMERIK Integrate Operate Client up to 2.0.6/3.0.6 TLS Session weak encryption
8501| [97388] Contact Form Manager Plugin on WordPress cross site scripting
8502| [97387] Contact Form Manager Plugin on WordPress cross site request forgery
8503| [97377] File Manager Plugin 3.0.1 on WordPress cross site request forgery
8504| [97374] WordPress Download Manager Plugin 2.8.99 on WordPress cross site request forgery
8505| [97372] Simple Ads Manager Plugin on WordPress PHP Code Execution privilege escalation
8506| [97370] WP-Filebase Download Manager Plugin 3.4.4 on WordPress cross site scripting
8507| [97309] MikroTik RouterOS 6.37.4/6.83.3 L2TP Client IPsec weak encryption
8508| [97295] IBM Tivoli Storage Manager 7.1 SQL Query memory corruption
8509| [97216] FlightGear Route Manager Nasal Script File privilege escalation
8510| [97213] Teeworlds up to 0.6.3 Snap engine/client/client.cpp ProcessServerPacket memory corruption
8511| [97212] IBM WebSphere MQ 8.0 Queue Manager denial of service
8512| [97211] IBM WebSphere MQ 8.0 Queue Manager denial of service
8513| [97193] Cisco Unified Communications Manager 11.5(1.11007.2) Web Framework information disclosure
8514| [97191] Cisco Unified Communications Manager 12.0(0.99999.2) Web Framework cross site scripting
8515| [97189] Cisco Unified Communications Manager 12.0(0.98000.280) Web Management Interface cross site scripting
8516| [97188] Cisco Unified Communications Manager 11.0(1.10000.10)/11.5(1.10000.69) Web Management Interface cross site scripting
8517| [97186] Cisco Unified Communications Manager 10.5(2.14076.1) Reflected cross site scripting
8518| [97260] Elefant CMS 1.3.12-RC File Upload /filemanager/upload/drop privilege escalation
8519| [97049] IBM Security Access Manager For Web up to 9.0.2.0 weak encryption
8520| [96985] VMware Tivoli Storage Manager for Virtual Environments 7.1 cross site request forgery
8521| [96949] Hanwha Techwin Smart Security Manager up to 1.5 Redis/Apache Felix Gogo privilege escalation
8522| [96948] Hanwha Techwin Smart Security Manager up to 1.5 directory traversal
8523| [96934] VideoInsight Web Client 6.3.5.11 sql injection
8524| [96889] Fortinet FortiManager TLS Certificate weak authentication
8525| [96814] MariaDB up to 5.5.54/10.0.29/10.1.21/10.2.3 libmysqlclient.so denial of service
8526| [96808] Oracle MySQL up to 5.6.21/5.7.4 libmysqlclient.so denial of service
8527| [96767] F5 BIG-IP Virtual Server Client SSL Uninitialized Memory information disclosure
8528| [96756] BusyBox up to 1.24.x DHCP Client Heap-based memory corruption
8529| [96755] BusyBox up to 1.24.x DHCP Client Integer denial of service
8530| [96744] Cisco ASA Clientless SSL VPN Heap-based memory corruption
8531| [96733] IBM Tivoli Storage Manager Fastback Installer privilege escalation
8532| [96724] IBM Tivoli Endpoint Manager privilege escalation
8533| [96716] IBM Security Access Manager Config File Password information disclosure
8534| [96610] IBM Tivoli Key Lifecycle Manager 2.5/2.6 privilege escalation
8535| [96608] IBM Tivoli Key Lifecycle Manager 2.0.1/2.5/2.6 Web UI cross site scripting
8536| [96607] IBM Tivoli Key Lifecycle Manager 2.0.1/2.5/2.6 information disclosure
8537| [96600] NetApp OnCommand System Manager up to 8.3.1 privilege escalation
8538| [96599] IBM Security Access Manager For Web 7.0.0/8.0.0/9.0.0 privilege escalation
8539| [96589] NetApp OnCommand System Manager up to 8.3.1 privilege escalation
8540| [96569] dotCMS 3.7.0 /news-events/events cross site scripting
8541| [96511] EMC Network Configuration Manager 9.3.x/9.4.0.x/9.4.1.x/9.4.2.x weak authentication
8542| [96510] EMC Network Configuration Manager 9.3.x/9.4.0.x/9.4.1.x/9.4.2.x Java RMI privilege escalation
8543| [96507] SageCRM up to 7.3 SP2 Component Manager aspshell.asp privilege escalation
8544| [96499] IBM Tivoli Key Lifecycle Manager 2.5/2.6 information disclosure
8545| [96498] IBM Tivoli Key Lifecycle Manager 2.5/2.6 cross site request forgery
8546| [96497] IBM Tivoli Key Lifecycle Manager 2.5/2.6 information disclosure
8547| [96496] IBM Tivoli Key Lifecycle Manager 2.5/2.6 Account Lockout weak authentication
8548| [96491] IBM Business Process Manager cross site scripting
8549| [96490] IBM Security Identity Manager Virtual Appliance cross site scripting
8550| [96451] IBM Tivoli Key Lifecycle Manager 2.5/2.6 Debugging information disclosure
8551| [96448] IBM Tivoli Key Lifecycle Manager 2.5/2.6 privilege escalation
8552| [96436] IBM Tivoli Storage Manager Operations Center cross site scripting
8553| [96435] IBM Tivoli Storage Manager Operations Center cross site request forgery
8554| [96434] IBM Tivoli Storage Manager Operations Center REST API privilege escalation
8555| [96429] IBM Tivoli Storage Manager for Virtual Environments on Vmware Password information disclosure
8556| [96416] IBM Security Privileged Identity Manager Cookie information disclosure
8557| [96397] IBM Security Access Manager For Web sql injection
8558| [96396] IBM Security Access Manager For Web URL Parameter information disclosure
8559| [96395] IBM Security Access Manager For Web information disclosure
8560| [96392] IBM Security Access Manager For Web cross site request forgery
8561| [96391] IBM Security Access Manager For Web XML External Entity
8562| [96389] IBM Security Access Manager For Web File Name information disclosure
8563| [96388] IBM Security Access Manager For Web File Permission information disclosure
8564| [96387] IBM Security Access Manager For Web information disclosure
8565| [96386] IBM Security Access Manager For Web cross site scripting
8566| [96385] IBM Security Access Manager For Web information disclosure
8567| [96384] IBM Security Access Manager For Web Patch privilege escalation
8568| [96375] IBM Tivoli Endpoint Manager Command privilege escalation
8569| [96371] IBM Tivoli Endpoint Manager MDM information disclosure
8570| [96643] Bitrix Site Manager Contact Form cross site scripting
8571| [96251] User Access Manager Plugin 1.2.6.7 on WordPress Persistent cross site scripting
8572| [96258] Autodesk Backburner Manager NULL Pointer Dereference denial of service
8573| [95996] Cisco Unified Communications Manager 12.0(0.99000.9) cross site scripting
8574| [95993] Cisco Unified Communications Manager 11.0(1.10000.10)/11.5(1.10000.6) cross site scripting
8575| [96073] InfiniteWP Client Plugin 1.5.1.3/1.6.0 on WordPress privilege escalation
8576| [96072] CMS Commander Client Plugin on WordPress privilege escalation
8577| [96022] Mozilla Firefox up to 50 CSP Header mozAddonManager privilege escalation
8578| [96021] Mozilla Firefox up to 50 Extension mozAddonManager privilege escalation
8579| [95866] SAP AS JAVA P4 SERVERCORE getClientStatistic information disclosure
8580| [95864] Open Enterprise Server Remote Manager directory traversal
8581| [95835] CakePHP up to 3.2.4 HTTP Header clientIp spoofing
8582| [95785] Hitek Automize 10.x/11.x passManager.jsd information disclosure
8583| [95751] Viprinet Multichannel VPN Router 300 2013070830/2013080900 Hardware VPN Client Replay weak authentication
8584| [95750] Viprinet Multichannel VPN Router 300 2013070830/2013080900 Hardware VPN Client Certificate weak authentication
8585| [95735] Moodle 2.x/3.x Event Monitor information disclosure
8586| [95677] Oracle up to 16.2 Project Manager denial of service
8587| [95670] Oracle Retail Predictive Application Server up to 15.0 RPAS Fusion Client unknown vulnerability
8588| [95600] Oracle Service Fulfillment Manager up to 12.2.6 User Interface unknown vulnerability
8589| [95592] Oracle Fulfillment Manager up to 12.2.6 User Interface unknown vulnerability
8590| [95580] Oracle Enterprise Manager 12.4.0.2/12.5.0.2/12.5.0.3 Application Testing Suite unknown vulnerability
8591| [95579] Oracle Enterprise Manager 12.1.4/12.2.2/12.3.2 Ops Center unknown vulnerability
8592| [95578] Oracle Enterprise Manager 12.1.4/12.2.2/12.3.2 Ops Center unknown vulnerability
8593| [95577] Oracle Enterprise Manager 12.1.0.5/13.1/13.2 unknown vulnerability
8594| [95576] Oracle Enterprise Manager 12.1.4/12.2.2/12.3.2 Ops Center information disclosure
8595| [95575] Oracle Enterprise Manager 12.1.4/12.2.2/12.3.2 Ops Center denial of service
8596| [95574] Oracle Enterprise Manager 12.1.0.5/13.1/13.2 memory corruption
8597| [95573] Oracle Enterprise Manager 12.5.0.3 Application Testing Suite memory corruption
8598| [95479] Google Chrome up to 54 on Android Content View Client privilege escalation
8599| [95478] Google Chrome up to 54 on Android Content Renderer Client Same-Origin Policy privilege escalation
8600| [95460] Symantec Endpoint Protection Norton Download Manager privilege escalation
8601| [95394] MC Inventory Manager Script /dashboard.php sql injection
8602| [95393] MC Inventory Manager Script /admin/ sql injection
8603| [95346] Serendipity up to 2.0.5 Event Plugin/Sidebar Plugin cross site request forgery
8604| [95323] Brocade Virtual Traffic Manager up to 11.0 cross site request forgery
8605| [95318] ntpd up to 4.2.8p8 Broadcast Mode Replay Prevention denial of service
8606| [95357] Salesforce Online Service Event Registration unknown vulnerability
8607| [95203] CA Service Desk Manager 12.9/14.1 RESTful Request privilege escalation
8608| [95181] Cobi Tools 1.0.8 on iOS EventLog Persistent cross site scripting
8609| [95118] http-client up to 0.10 Environment Variable Proxy privilege escalation
8610| [95107] PHProxy up to 0.5b2 Hotlinking Prevention privilege escalation
8611| [95049] McAfee Enterprise Security Manager privilege escalation
8612| [94798] LibVNCServer up to 0.9.10 LibVNCClient ultra.c FramebufferUpdate Message memory corruption
8613| [94797] LibVNCServer up to 0.9.10 LibVNCClient rfbproto.c FramebufferUpdate Message memory corruption
8614| [94735] Piwigo up to 2.8.3 admin/batch_manager.php privilege escalation
8615| [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
8616| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
8617| [94606] Glype up to 1.4.4 Hotlinking Prevention privilege escalation
8618| [94533] Adobe Experience Manager up to 6.2 cross site request forgery
8619| [94532] Adobe Experience Manager up to 6.1 DAM Create Assets cross site scripting
8620| [94531] Adobe Experience Manager 6.2 Create Launch wizard cross site scripting
8621| [94530] Adobe Experience Manager up to 6.2 WCMDebug Filter cross site scripting
8622| [94527] Adobe Experience Manager Forms/LiveCycle PMAdmin cross site scripting
8623| [94526] Adobe Experience Manager Forms/LiveCycle AACComponent cross site scripting
8624| [94170] Cisco Unified Communications Manager 11.5(1.11007.2) Upload Tool File privilege escalation
8625| [94490] Mozilla Firefox up to 50 DOM Event Use-After-Free memory corruption
8626| [93996] DotClear up to 2.9 Media Manager admin/media.php cross site scripting
8627| [93993] BusyBox NTP Packet networking/ntpd.c recv_and_process_client_pkt denial of service
8628| [94033] Cisco Unified Communications Manager 11.5(1.10000.6)/11.5(1.11007.2) ccmadmin Page cross site scripting
8629| [93988] Microsoft Desktop Client for Mac up to 8.0.36 privilege escalation
8630| [93963] Microsoft Windows Authorization Manager msxml3.dll information disclosure
8631| [93962] Microsoft Windows 7 SP1 Event Viewer File information disclosure
8632| [93927] e107 CMS 2.1.2 CSRF Prevention privilege escalation
8633| [93783] IBM Security Access Manager for Web Command privilege escalation
8634| [93782] IBM Security Access Manager Login Brute Force privilege escalation
8635| [93781] IBM Security Privileged Identity Manager up to 2.0.2 FP7 privilege escalation
8636| [93772] IBM Security Privileged Identity Manager up to 2.0.2 FP7 Session Cookie Cleartext information disclosure
8637| [93793] VMware vSphere Client 5.5/6.0 XML External Entity
8638| [93791] VMware vRealize Automation 7.1.x Identity Manager /SAAS/WEB-INF information disclosure
8639| [93736] Zoho ManageEngine OpManager 12100/12200 Cookie weak encryption
8640| [93735] Zoho ManageEngine OpManager 12100/12200 Notes index.jsp cross site scripting
8641| [93734] Zoho ManageEngine OpManager 12100/12200 Packet Loss Graph index.jsp cross site scripting
8642| [93733] Zoho ManageEngine OpManager 12100/12200 index.jsp cross site scripting
8643| [93732] Zoho ManageEngine OpManager 12100/12200 DNS Name cross site scripting
8644| [93731] Zoho ManageEngine OpManager 12100/12200 EncryptPassword API denial of service
8645| [93673] Cisco Unified Communication Manager 11.5(1.2) ccmivr Page cross site scripting
8646| [93702] Lepton CMS 2.2.2 Droplet Permission Manager tool.php sql injection
8647| [93635] Mozilla Firefox up to 49 mozAddonManager API privilege escalation
8648| [93556] CA Service Desk Manager 12.9/14.1 cross site scripting
8649| [93388] Microsoft Windows up to Server 2016 Animation Manager Stylesheets memory corruption
8650| [93348] Adobe Connect up to 9.5.6 Events Registration cross site scripting
8651| [93462] Google Android Input Manager Service denial of service
8652| [93457] Google Android Account Manager Service privilege escalation
8653| [93448] Google Android Download Manager information disclosure
8654| [93283] WinaXe 7.7 FTP Client memory corruption
8655| [93525] HPE Network Node Manager i cross site scripting
8656| [93524] HPE Network Node Manager i cross site scripting
8657| [93523] HPE Network Node Manager i privilege escalation
8658| [93325] Moodle 3.1.2 File Manager privilege escalation
8659| [93287] Edusson Robot Don Client cross site scripting
8660| [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
8661| [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
8662| [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
8663| [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
8664| [93194] DokuWiki 2016-06-26a Media File Fetching /inc/HTTPClient.php HttpClient information disclosure
8665| [93163] HPE Financial Transaction Manager up to 3.0.0.x/3.0.1.0 iFix0001 Web UI cross site scripting
8666| [93158] IBM Financial Transaction Manager up to 3.0.0.x/3.0.1.0 iFix0001 Payments Director Clickjacking privilege escalation
8667| [93143] Cisco Unified Communications Manager iframe cross site scripting
8668| [93133] NetIQ Designer for Identity Manager up to 4.5.2 nrfEntitlementReport.do cross site scripting
8669| [93125] NetIQ Designer for Identity Manager up to 4.5.2 forgotUser.do cross site scripting
8670| [93113] Yandex Browser up to 16.5 CSRF Prevention privilege escalation
8671| [93027] IBM Rational Quality Manager OS Command Injection privilege escalation
8672| [93033] Huge-IT Portfolio Gallery Manager 1.1.5 sql injection
8673| [93032] Huge-IT Portfolio Gallery Manager 1.1.5 sql injection
8674| [92964] Oracle Agile PLM 9.3.4/9.3.5 Event Java PX memory corruption
8675| [92935] Oracle Enterprise Manager 12.1.4/12.2.2/12.3.2 Ops Center memory corruption
8676| [92918] Oracle Enterprise Manager 12.1.4/12.2.2 Ops Center information disclosure
8677| [92917] Oracle Enterprise Manager 12.1.4/12.2.2/12.3.2 Ops Center unknown vulnerability
8678| [92804] Oracle Agile PLM 9.3.4/9.3.5 File Manager information disclosure
8679| [92801] Oracle PeopleSoft Enterprise HCM 9.2 Talent Acquisition Manager unknown vulnerability
8680| [92707] IBM Business Process Manager up to 7.5.1.2/8.0.1.3/8.5.7.0 Business Space cross site scripting
8681| [93005] OpenSSL 1.1.0 ssl_add_clienthello_tlsext memory corruption
8682| [92704] Siemens Automation License Manager up to 5.3 SP2 File privilege escalation
8683| [92703] Siemens Automation License Manager up to 5.3 SP3 ALM Service sql injection
8684| [92702] Siemens Automation License Manager up to 5.3 SP3 ALM Service denial of service
8685| [92587] Microsoft Windows 8.1/10/RT 8.1/Server 2012/Server 2012 R2 Transaction Manager privilege escalation
8686| [92516] Google Android Qualcomm Sound Driver msm-lsm-client.c memory corruption
8687| [94764] Mirror Manager 0.7.2 Checkin privilege escalation
8688| [92503] Fortinet FortiManager up to 5.0.11/5.2.2 Report Filter cross site scripting
8689| [92488] IBM Sterling Secure Proxy up to 3.4.2.0 iFix 7/3.4.3.0 Configuration Manager information disclosure
8690| [92487] IBM Sterling Secure Proxy up to 3.4.2.0 iFix 7/3.4.3.0 Configuration Manager information disclosure
8691| [92486] IBM Sterling Secure Proxy up to 3.4.2.0 iFix 7/3.4.3.0 Configuration Manager Reuse weak authentication
8692| [92485] IBM Sterling Secure Proxy up to 3.4.2.0 iFix 7/3.4.3.0 Configuration Manager directory traversal
8693| [92446] Cisco IOS/IOS XE IKEv2 Client Reload denial of service
8694| [92444] Cisco Videoscape Distribution Suite Service Manager up to 3.4.0 cross site scripting
8695| [92442] IBM Business Process Manager up to 8.5.7.0 cross site scripting
8696| [92424] EMC Unisphere for VMAX Virtual Appliance up to 8.2.x vApp Manager privilege escalation
8697| [92423] EMC Unisphere for VMAX Virtual Appliance up to 8.2.x vApp Manager privilege escalation
8698| [92422] EMC Replication Manager up to 5.5.2 privilege escalation
8699| [92314] Apache MyFaces Trinidad up to 1.0.13/1.2.15/2.0.1/2.1.1 CoreResponseStateManager memory corruption
8700| [92187] IBM Security Privileged Identity Manager up to 2.0.2 FP7 cross site scripting
8701| [92186] IBM Security Privileged Identity Manager up to 2.0.2 FP7 privilege escalation
8702| [92185] IBM Security Privileged Identity Manager up to 2.0.2 FP7 XXE denial of service
8703| [92184] IBM Security Privileged Identity Manager up to 2.0.2 FP7 URL directory traversal
8704| [92183] IBM Security Privileged Identity Manager up to 2.0.2 FP7 Updater privilege escalation
8705| [92182] IBM Security Privileged Identity Manager up to 2.0.2 FP7 weak encryption
8706| [91890] Cisco IronPort AsyncOS up to 9.1.2/9.7.2/10.0.0 on ESA Enrollment Client privilege escalation
8707| [91837] Kerio Unified Threat Management 9.1.0 CSRF Prevention privilege escalation
8708| [91835] Jcraft jsch 0.1.53 on Windows sftp Client directory traversal
8709| [91647] Pivotal Cloud Foundry Ops Manager up to 1.6.18/1.7.9 vCloud/vSphere Default Credentials weak authentication
8710| [91644] Pivotal Cloud Foundry Ops Manager up to 1.6.16 cross site scripting
8711| [91641] Pivotal Cloud Foundry Ops Manager up to 1.6.16/1.7.7 vCloud/vSphere SSH privilege escalation
8712| [91639] Pivotal Cloud Foundry Ops Manager up to 1.5.13/1.6.8 Cookie Key weak encryption
8713| [91621] Cisco IOS/IOS XE Local Manager cross site scripting
8714| [91392] HPE Operations Manager up to 9.21 AdminUI cross site scripting
8715| [91389] XenSource Xen 4.4.x event_fifo.c cleanup_event_array denial of service
8716| [91385] cURL/libcURL up to 7.50.1 TLS Certificate lib/vtls/nss.c SelectClientCert privilege escalation
8717| [91073] Malware Information Sharing Platform up to 2.3.89 Serialization populate_event_from_template_attributes.ctp privilege escalation
8718| [91038] Cisco Wireless LAN Controller up to 8.0.1/8.2/8.3 Adaptive Wireless Intrusion Prevention System denial of service
8719| [91036] NetApp OnCommand System Manager up to 8.3.2P4 denial of service
8720| [91060] Google Chrome up to 52 Event Binding Use-After-Free memory corruption
8721| [90882] Fortinet FortiManager/FortiAnalyzer up to 5.0.11/5.2.5 Web-UI cross site scripting
8722| [90881] Fortinet FortiManager/FortiAnalyzer up to 5.0.11/5.2.5 Address Page cross site scripting
8723| [90880] Fortinet FortiManager/FortiAnalyzer up to 5.0.11/5.2.5/5.4.0 cross site scripting
8724| [90897] Cisco Unified Communications Manager 11.5 UDS API information disclosure
8725| [90875] TeamSpeak Server clientinit Command denial of service
8726| [90873] TeamSpeak Server cmd_clientsetserverquerylogin race condition
8727| [90718] EMC RSA Authentication Manager 3.0/3.1 Prime Self-Service Portal privilege escalation
8728| [90717] Adobe Experience Manager 5.6.1/6.0/6.1/6.2 Backup information disclosure
8729| [90716] Adobe Experience Manager 5.6.1/6.0/6.1/6.2 cross site scripting
8730| [90715] Adobe Experience Manager 5.6.1/6.0/6.1 Audit Log information disclosure
8731| [90714] Adobe Experience Manager 5.6.1/6.0/6.1 cross site scripting
8732| [90604] Fortinet FortiAnalyzer/FortiManager up to 5.5.5 Upload Image cross site scripting
8733| [90448] cURL/libcURL up to 7.50.0 TLS Session Resumption Client Certificate privilege escalation
8734| [90411] Crestron DM-TXRX-100-STR up to 1.3039 Client weak authentication
8735| [90400] Google Chrome up to 52 mali_kbase_vinstr.c kbasep_vinstr_attach_client memory corruption
8736| [90397] HPE Operations Manager up to 9.21 on Linux/Unix/Solaris AdminUI privilege escalation
8737| [90376] Cisco Videoscape Session Resource Manager Flooding denial of service
8738| [90063] Oracle 8.3/8.4/15.1/15.2 Project manager information disclosure
8739| [90054] Oracle 8.3/8.4/15.1 Project manager denial of service
8740| [90037] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 memory corruption
8741| [90031] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 memory corruption
8742| [90016] Oracle Health Sciences Information Manager 1.2.8.3/2.0.2.3/3.0.1.0 Health Policy Monitor unknown vulnerability
8743| [90003] Oracle Communications Unified Session Manager 7.2.5/7.3.5 Routing information disclosure
8744| [89997] Oracle Communications Core Session Manager 7.2.5/7.3.5 Routing denial of service
8745| [89986] Oracle Knowledge 8.5.x Information Manager Console information disclosure
8746| [89980] Oracle Siebel Core 8.1.1/8.2.2/IP2014/IP2015/IP2016 Object Manager information disclosure
8747| [89979] Oracle Knowledge 8.5.x Information Manager Console unknown vulnerability
8748| [89966] Oracle Agile PLM 9.3.4/9.3.5 WebClient / Admin unknown vulnerability
8749| [89938] Oracle One-to-One Fulfillment up to 12.2.5 Content Manager information disclosure
8750| [89934] Oracle Applications Manager 12.1.3 Cookie Management information disclosure
8751| [89925] Oracle Advanced Inbound Telephony 12.1.1/12.1.2/12.1.3 SDK client integration cross site scripting
8752| [89921] Oracle Enterprise Manager Ops Center 12.1.4/12.2.2/12.3.2 Update Provisioning denial of service
8753| [89920] Oracle Enterprise Manager Base Platform 12.1.0.5/13.1.0.0 UI Framework information disclosure
8754| [89919] Oracle Enterprise Manager for Fusion Middleware 11.1.1.7/11.1.1.9 SOA Topology Viewer information disclosure
8755| [89918] Oracle Enterprise Manager Ops Center 12.1.4/12.2.2/12.3.2 Networking information disclosure
8756| [89917] Oracle Enterprise Manager Base Platform 12.1.0.5/13.1.0.0 Discovery Framework information disclosure
8757| [89915] Oracle Enterprise Manager Ops Center 12.1.4/12.2.2/12.3.2 OS Provisioning denial of service
8758| [89914] Oracle Enterprise Manager Ops Center 12.1.4/12.2.2/12.3.2 Networking information disclosure
8759| [89913] Oracle Enterprise Manager Ops Center 12.1.4/12.2.2/12.3.2 Framework unknown vulnerability
8760| [89912] Oracle Enterprise Manager Ops Center 12.1.4/12.2.2/12.3.2 Enterprise Controller Install memory corruption
8761| [89902] Oracle Access Manager 10.1.4.x/11.1.1.7 Web Server Plugin information disclosure
8762| [89465] IBM Security Identity Manager up to 7.0.1.1 Clickjacking privilege escalation
8763| [89463] IBM Security Identity Manager up to 7.0.1.1 Session Identifier spoofing
8764| [89461] IBM Security Identity Manager up to 7.0.1.1 Password weak authentication
8765| [88829] Symantec Norton Antivirus on Windows Client IDS Driver PE File Crash denial of service
8766| [88828] Symantec Endpoint Protection on Windows Client IDS Driver PE File Crash denial of service
8767| [88820] Samba up to 4.2.13/4.3.10/4.4.4 Client-Signing Protection smbXcli_base.c smb2cli_session_set_session_key weak authentication
8768| [88511] Cisco EPC3928 goform/WClientMACList Crash denial of service
8769| [89005] Apache Qpid AMQP JMS Client getObject privilege escalation
8770| [88501] IBM MessageSight up to 1.1.0.0/1.2.0.2/2.0.0.0 JMS Client privilege escalation
8771| [88382] IBM Business Process Manager up to 8.5.6.2/8.5.7 REST API privilege escalation
8772| [88364] IBM WebSphere MQ up to 8.0.0.4 Queue-Manager Agent Memory Leak denial of service
8773| [88395] Symantec Endpoint Protection Manager up to 12.1.6 MP4 Management Console directory traversal
8774| [88394] Symantec Endpoint Protection Manager up to 12.1.6 MP4 Port 8445 weak encryption
8775| [88393] Symantec Endpoint Protection Manager up to 12.1.6 MP4 PHP Script DOM cross site scripting
8776| [88392] Symantec Endpoint Protection Manager up to 12.1.6 MP4 PHP Script Open Redirect
8777| [88391] Symantec Endpoint Protection Manager up to 12.1.6 MP4 cross site request forgery
8778| [88390] Symantec Endpoint Protection Manager up to 12.1.6 MP4 PHP JSESSIONID information disclosure
8779| [88389] Symantec Endpoint Protection Manager up to 12.1.6 MP4 cross site scripting
8780| [88388] Symantec Endpoint Protection Manager up to 12.1.6 MP4 Credentials information disclosure
8781| [88387] Symantec Endpoint Protection Manager up to 12.1.6 MP4 information disclosure
8782| [88386] Symantec Endpoint Protection Manager up to 12.1.6 MP4 Lockout weak authentication
8783| [88385] Symantec Endpoint Protection Manager up to 12.1.6 MP4 Authentication Interface cross site request forgery
8784| [88046] HP Service Manager Software up to 9.41 SSRF information disclosure
8785| [88044] Solarwinds Virtualization Manager up to 6.3.1 RMI Service Command privilege escalation
8786| [88023] Adobe Brackets up to 1.6 Extension Manager unknown vulnerability
8787| [87947] Microsoft Windows up to Vista SP2 Adobe Type Manager Font Driver atmfd.dll privilege escalation
8788| [87888] Apache Ranger up to 0.5.2 Policy Admin Tool eventTime sql injection
8789| [87803] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8790| [87786] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8791| [87780] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8792| [87779] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8793| [87778] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8794| [87777] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8795| [87776] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8796| [87775] HPE Systems Insight Manager up to 7.5.0 privilege escalation
8797| [87723] IBM SDK Java Technology Edition Sandbox com.ibm.CORBA.iiop.ClientDelegate privilege escalation
8798| [87407] PHP up to 5.4.43/5.5.27/5.6.11 ext/soap/php_http.c SoapClient::__call memory corruption
8799| [83814] Accellion File Transfer Appliance up to FTA_9_12 YUM_CLIENT Role privilege escalation
8800| [83811] HPE Network Node Manager i up to 10.01 privilege escalation
8801| [83810] HPE Network Node Manager i up to 10.01 information disclosure
8802| [83809] HPE Network Node Manager i up to 10.01 weak authentication
8803| [83808] HPE Network Node Manager i up to 10.01 cross site scripting
8804| [83807] HPE Network Node Manager i up to 10.01 cross site scripting
8805| [83806] HPE Network Node Manager i up to 10.01 Apache Commons Collections Library privilege escalation
8806| [83804] EMC RSA Authentication Manager up to 8.1 SP1 P13 CRLF privilege escalation
8807| [83803] EMC RSA Authentication Manager up to 8.1 SP1 P13 cross site scripting
8808| [83802] EMC RSA Authentication Manager up to 8.1 SP1 P13 cross site scripting
8809| [87127] Squid Proxy 3.5.17/4.0.9 ESI Response client_side_request.cc denial of service
8810| [83191] EMC RSA Data Loss Prevention up to 9.6 SP4 Clickjacking privilege escalation
8811| [83190] EMC RSA Data Loss Prevention up to 9.6 SP4 privilege escalation
8812| [83189] EMC RSA Data Loss Prevention up to 9.6 SP4 information disclosure
8813| [83188] EMC RSA Data Loss Prevention up to 9.6 SP4 cross site scripting
8814| [82982] ntp 4.2.8 ntpd Client privilege escalation
8815| [82971] Mozilla Firefox 45 ServiceWorkerManager race condition memory corruption
8816| [82672] Oracle Sun Storage Common Array Manager 6.9.0 Jetty Web Server denial of service
8817| [82458] mod_auth_mellon up to 0.11.0 POST Data ap_get_client_block denial of service
8818| [82457] VMware vCenter Server up to 5.5 U3a/5.5 U3b/5.5 U3c/6.0 U1 Client Integration Plugin privilege escalation
8819| [82446] EMC Unisphere for VMAX Virtual Appliance up to 8.1.x vApp Manager File privilege escalation
8820| [82406] Samba 3.6/4.2.9/4.3.6/4.4.0 LDAP Client privilege escalation
8821| [82092] Trend Micro Password Manager Pro HTTP Server openUrlInDefaultBrowser privilege escalation
8822| [82082] Apache JetSpeed up to 2.3.0 User Manager Service privilege escalation
8823| [82080] Apache OpenMeetings up to 3.1.0 Event cross site scripting
8824| [82073] Apache JetSpeed up to 2.3.0 User Manager Service sql injection
8825| [82072] Apache JetSpeed up to 2.3.0 Portal Site Manager ZIP Archive directory traversal
8826| [81879] SAP Java AS 7.4 Internet Communication Manager HTTP Request denial of service
8827| [81622] HPE Asset Manager 9.40/9.41/9.50 Apache Commons Collections Library Java Object privilege escalation
8828| [81616] IBM Tivoli Storage Manager Fastback up to 5.5.x/6.1.12.1 Server TCP Packet Crash denial of service
8829| [81615] IBM Tivoli Storage Manager Fastback up to 5.5.x/6.1.12.1 Server memory corruption
8830| [81614] IBM Tivoli Storage Manager Fastback up to 5.5.x/6.1.12.1 Server memory corruption
8831| [81613] IBM Tivoli Storage Manager Fastback up to 5.5.x/6.1.12.1 Server / memory corruption
8832| [81612] IBM Tivoli Storage Manager Fastback up to 5.5.x/6.1.12.1 Server / memory corruption
8833| [81669] Zoho ManageEngine Password Manager Pro AddUser.do cross site request forgery
8834| [81668] Zoho ManageEngine Password Manager Pro AjaxResponse.jsp weak authentication
8835| [81667] Zoho ManageEngine Password Manager Pro PasswdRetriveAjaxResponse.jsp information disclosure
8836| [81666] Zoho ManageEngine Password Manager Pro AjaxResponse.jsp privilege escalation
8837| [81665] Zoho ManageEngine Password Manager Pro AjaxResponse.jsp privilege escalation
8838| [81664] Zoho ManageEngine Password Manager Pro EditUser.do privilege escalation
8839| [81663] Zoho ManageEngine Password Manager Pro EditUser.do privilege escalation
8840| [81662] Zoho ManageEngine Password Manager Pro /AddMail.ve cross site scripting
8841| [81585] Google Android up to 4.4.3/5.0.1/5.1.0 Download Manager privilege escalation
8842| [81541] Autodesk Backburner up to 2016.0.0.2150 Manager manager.exe memory corruption
8843| [81540] Cisco Unified Communications Domain Manager 8.1(1) cross site scripting
8844| [81533] Cisco Unified Communications Manager 15.3/15.4 SIP Message Reload denial of service
8845| [81532] Cisco IOS 12.2/15.0/15.2 Smart Install Client Reload denial of service
8846| [81406] HPE Service Manager up to 9.35 P3/9.41 P1 Apache Commons Collections Library Command privilege escalation
8847| [81395] IBM WebSphere Application Server up to 8.5.5.8 OPenID Connect OIDC Client cross site scripting
8848| [81393] Symantec Endpoint Protection Manager up to 12.1 RU6-MP3 sql injection
8849| [81392] Symantec Endpoint Protection Manager up to 12.1 RU6-MP3 Logging Script cross site request forgery
8850| [81346] IBM Tivoli Monitoring up to 6.2.2 FP9/6.2.3 FP5/6.3.0 FP6 Portal Client privilege escalation
8851| [81208] Mozilla Firefox 44 ServiceWorkerManager denial of service
8852| [81184] Cisco Unified Communications Domain Manager up to 8.1.0 cross site scripting
8853| [81182] IBM Business Process Manager up to 8.0.1.3/8.5.0.2/8.5.6.2 URL cross site scripting
8854| [81139] OpenSSL up to 0.9.8/1.0.0q/1.0.1l/1.0.2 SSLv2 s2_srvr.c get_client_master_key weak encryption
8855| [81138] OpenSSL up to 0.9.8/1.0.0q/1.0.1l/1.0.2 SSLv2 s2_srvr.c get_client_master_key weak encryption
8856| [81120] IBM Tivoli Storage Manager Fastback up to 5.5/6.1.11.1 Stack-Based memory corruption
8857| [81119] IBM Tivoli Storage Manager Fastback up to 5.5/6.1.11.1 Stack-Based memory corruption
8858| [81118] IBM Tivoli Storage Manager Fastback up to 5.5/6.1.11.1 Stack-Based memory corruption
8859| [81117] IBM Business Process Manager up to 8.5.0.2/8.5.5.0/8.5.6.2 Process Portal cross site scripting
8860| [81094] Cisco ACE up to A5(3.0) Device Manager GUI POST Request privilege escalation
8861| [81079] Apache Tomcat 6.0/7.0/8.0/9.0 StatusManagerServlet information disclosure
8862| [81029] IBM Tivoli Storage Manager for Virtual Environments Data Protection URL privilege escalation
8863| [80992] Cybozu Office up to 10.3.0 CSRF Prevention privilege escalation
8864| [80977] IBM Financial Transaction Manager up to 3.0.0 FP11 README File information disclosure
8865| [80976] IBM Financial Transaction Manager up to 3.0.0 FP11 Error Log information disclosure
8866| [80967] IBM Security Access Manager for Web up to 8.0.1.3 IF3/9.0.0.1 cross site scripting
8867| [80959] IBM Security Access Manager For Web Appliance up to 7.0.0 IF18/8.0.1.3 IF2/9.0.0.0 SSH weak encryption
8868| [80958] IBM Security Access Manager for Web up to 7.0.0 IF20/8.0.1.3 IF3/9.0.0.1 Login Lockout privilege escalation
8869| [80898] Adobe Experience Manager 5.6.1/6.0.0/6.1.0 Java Object unknown vulnerability
8870| [80897] Adobe Experience Manager 5.6.1/6.0.0/6.1.0 Dispatcher Filter privilege escalation
8871| [80896] Adobe Experience Manager 5.6.1/6.0.0/6.1.0 Apple Sling information disclosure
8872| [80895] Adobe Experience Manager 5.6.1/6.0.0/6.1.0 cross site scripting
8873| [80828] Cisco Unified Communications Manager 11.5(0.98000.480) information disclosure
8874| [80813] Cisco Unified Communications Manager 10.5(2.13900.9) sql injection
8875| [80782] CloudBees Jenkins up to 1.639/1.625.1 Plugins Manager spoofing
8876| [80757] McAfee Vulnerability Manager up to 7.5.9 Enterprise Manager cross site request forgery
8877| [80750] HPE Operations Manager 8.x/9.0 on Windows Apache Commons Collections Library privilege escalation
8878| [80745] NEC EXPRESSCLUSTER X up to 3.3.3.3-1-1/3.3.11.31 WebManager File directory traversal
8879| [80718] OpenSSL 1.0.1/1.0.2 SSL/TLS Client Man-in-the-Middle weak encryption
8880| [80715] MariaDB up to 5.5.46/10.0.22/10.1.9 sql-common/client.c ssl_verify_server_cert spoofing
8881| [80714] Privoxy up to 3.0.23 HTTP Host Header parsers.c client_host denial of service
8882| [80636] wolfSSL up to 3.6.7 DTLS Cookie ClientHello Message denial of service
8883| [80635] Cisco FX-OS/Unified Computing System Manager CGI Script privilege escalation
8884| [80606] IBM Spectrum Protect up to 5.5/6.3.2.4/6.4.3.0/7.1.2 CAD Client Crash denial of service
8885| [80502] Oracle E-Business Suite 12.1.3 Applications Manager unknown vulnerability
8886| [80481] Oracle E-Business Suite 11.5.10.2/12.1.3/12.2.3/12.2.4 Report Manager information disclosure
8887| [80480] Oracle E-Business Suite 11.5.10.2 Report Manager denial of service
8888| [80426] Oracle Enterprise Manager 11.1.0.1/11.2.0.4/12.1.0.4/12.1.0.5 Base Platform information disclosure
8889| [80425] Oracle Enterprise Manager 11.1.0.1/12.1.0.4/12.1.0.5 Base Platform information disclosure
8890| [80424] Oracle Enterprise Manager 12.1.0.4 Base Platform information disclosure
8891| [80418] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8892| [80417] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8893| [80416] Oracle Enterprise Manager 12.4.0.2 /12.5.0.2 Application Testing Suite information disclosure
8894| [80415] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8895| [80414] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8896| [80413] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8897| [80412] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8898| [80411] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8899| [80410] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite information disclosure
8900| [80409] Oracle Enterprise Manager up to 12.1.3/12.2.x Ops Center denial of service
8901| [80408] Oracle Enterprise Manager up to 12.1.3/12.2.x Ops Center information disclosure
8902| [80407] Oracle Enterprise Manager up to 12.1.3/12.2.x Ops Center denial of service
8903| [80405] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite directory traversal
8904| [80404] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite directory traversal
8905| [80403] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite directory traversal
8906| [80402] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite unknown vulnerability
8907| [80401] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite directory traversal
8908| [80400] Oracle Enterprise Manager up to 12.1.3/12.2.x Ops Center spoofing
8909| [80399] Oracle Enterprise Manager 12.1.0.4/12.1.0.5 Base Platform spoofing
8910| [80398] Oracle Enterprise Manager 12.4.0.2/12.5.0.2 Application Testing Suite directory traversal
8911| [80397] Oracle Enterprise Manager 12.1.0.4/12.1.0.5 Base Platform unknown vulnerability
8912| [80396] Oracle Enterprise Manager 11.1.0.1/12.1.0.4/12.1.0.5 Base Platform unknown vulnerability
8913| [80395] Oracle Enterprise Manager up to 12.1.3/12.2.x Ops Center denial of service
8914| [80359] Oracle Database Server 11.2.0.4 Workspace Manager unknown vulnerability
8915| [80309] IBM Tivoli Federated Identity Manager up to 6.2.2 FP15 cross site scripting
8916| [80281] HPE Arcsight Logger up to 6.1 Intellicus/Client-Certificate Upload Code Injection privilege escalation
8917| [80280] HPE Arcsight Logger up to 6.1 Intellicus/Client-Certificate Upload Code Injection privilege escalation
8918| [80160] TYPO3 up to 6.2.15/7.6.0 Extension Manager cross site scripting
8919| [80152] Pygments up to 2.0.2 Font Name formatters/img.py FontManager_get_nix_font_path privilege escalation
8920| [80106] Cisco Unified Communications Manager 11.0(0.98000.225) sql injection
8921| [80103] Google Android up to 5.1.1 LMY49C/6.0 SyncManager Reboot denial of service
8922| [80028] IBM Tivoli Storage Manager for Virtual Environments up to 7.1 Data Protection Extension information disclosure
8923| [80027] IBM Tivoli Storage Manager for Virtual Environments up to 7.1 Data Protection Extension Command privilege escalation
8924| [79985] IBM Business Process Manager Remote Artifact Loader information disclosure
8925| [79958] OrientDB Server Community Edition up to 2.0.14/2.1.0 Studio OHttpSessionManager.java weak authentication
8926| [79956] Idera Uptime Infrastructure Monitor up to 7.6 up.time Client information disclosure
8927| [79954] Idera Uptime Infrastructure Monitor 6.0/7.2 up.time Client Format String
8928| [79897] Adcon Telemetry A840 Telemetry Gateway Base Station Java Client Path information disclosure
8929| [79895] Adcon Telemetry A840 Telemetry Gateway Base Station Java Client SSL weak encryption
8930| [79884] Google Chrome up to 47 MIDI Subsystem midi_manager.cc memory corruption
8931| [79871] Moxa OnCell Central Manager up to 2.1 Login RequestController privilege escalation
8932| [79870] Moxa OnCell Central Manager up to 2.1 MessageBrokerServlet Servlet privilege escalation
8933| [79823] Cisco Unified Communications Manager 10.5(0.98000.88) WebApplications Identity Management Subsystem Session Token denial of service
8934| [79786] Cisco Unified Communications Manager up to 8.6 XSS Protection cross site scripting
8935| [79770] Cisco Unified Communications Domain Manager 10.6(1) Outage denial of service
8936| [79766] Cisco Unified Email Interaction Manager 11.0(1) cross site scripting
8937| [79762] Cisco Unified Communications Manager Mobile and Remote Access Services spoofing privilege escalation
8938| [79767] Cisco Videoscape Distribution Suite Service Manager up to 3.4.0 Backend Database RBAC privilege escalation
8939| [79375] McAfee Enterprise Security Manager up to 9.3.2MR18/9.4.2MR8/9.5.0MR7 AD/LDAP Authentication Manager/Log weak authentication
8940| [79228] GNOME NetworkManager IPv6 IPv6 Router Advertisement Message denial of service
8941| [79217] NetworkManager 1.x IPv6 Stack rdisc/nm-lndp-rdisc.c receive_ra privilege escalation
8942| [79215] PC-EGG pWebManager up to 2.2.1/3.3.9 Editor Role privilege escalation
8943| [79209] Cisco Content Delivery System Manager 3.2 on Videoscape REST API information disclosure
8944| [79195] Symantec Endpoint Protection Manager up to 12.0 Java Port privilege escalation
8945| [79194] Symantec Endpoint Protection Manager up to 12.1 OS Command Injection privilege escalation
8946| [79074] IBM Security Access Manager For Web up to 7.0.0.15/8.0.1.2 WebSEAL HTTPTransformation Request File privilege escalation
8947| [79068] IBM Security QRadar Vulnerability Manager up to 7.5.5 cross site request forgery
8948| [79014] ISUCON5 Qualifier Portal up to 2015-10-29 eventapp/lib/gcloud.rb privilege escalation
8949| [79057] Samsung Galaxy S6 JPEG Image memory corruption
8950| [79056] Samsung Galaxy S6 GIF Image Crash denial of service
8951| [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
8952| [78997] Fortinet FortiManager up to 5.2.3 Graphical User Interface SOMServiceObjDialog cross site scripting
8953| [78996] Fortinet FortiManager up to 5.2.3 Graphical User Interface FGDMngUpdHistory cross site scripting
8954| [78994] MiniUPnP Client up to 1.9 XML Element Name igd_desc_parse.c IGDstartelt memory corruption
8955| [78971] Cisco Unified Communications Domain Manager up to 10.6 Error Message File information disclosure
8956| [78895] ownCloud Desktop Client up to 2.0.0 Qt ignoreSslErrors spoofing
8957| [78887] ownCloud Desktop Client up to 1.8.1 ignoreSslErrors information disclosure
8958| [78880] IBM Cognos Disclosure Management up to 10.2.4 IF9 Client Upload spoofing
8959| [78679] Oracle MySQL Enterprise Monitor up to 2.3.20/3.0.20 C-Agent / Service Manager denial of service
8960| [78658] Oracle Integrated Lights Out Manager (ILOM) 3.0/3.1/3.2 Web unknown vulnerability
8961| [78657] Oracle Integrated Lights Out Manager (ILOM) 3.0/3.1/3.2 System Management unknown vulnerability
8962| [78599] Oracle E-Business Suite 11.5.10.2/12.0.6/12.1.3/12.2.3/12.2.4 Applications Manager sql injection
8963| [78591] Oracle E-Business Suite 11.5.10.2/12.0.6/12.1.3/12.2.3/12.2.4 Report Manager denial of service
8964| [78588] Oracle Enterprise Manager 12.1.0.1/12.2.2 unknown vulnerability
8965| [78586] Oracle Enterprise Manager 12.1.0.4/12.1.0.5 denial of service
8966| [78585] Oracle Enterprise Manager 12.1.0.4/12.1.0.5 unknown vulnerability
8967| [78584] Oracle Enterprise Manager up to 8.8.15.7 OSS Support Tools spoofing
8968| [78572] Oracle Fusion Middleware 11.1.1.7/11.1.2.2/11.1.2.3 Identity Manager unknown vulnerability
8969| [78569] Oracle Fusion Middleware 11.1.2.2/11.1.2.3 Access Manager information disclosure
8970| [78547] HP Persistent Accelerite Radia Client Automation up to 9.1 Notify privilege escalation
8971| [78546] HP Radia Client Automation up to 9.1 RBAC privilege escalation
8972| [78545] HP Persistent Accelerite Radia Client Automation up to 9.0 memory corruption
8973| [78544] HP Persistent Accelerite Radia Client Automation up to 9.0 Agent Stack-Based memory corruption
8974| [78481] Linux Kernel up to 4.x Direct Rendering Manager Graphics Execution Manager Object Memory Consumption denial of service
8975| [78495] Solarwinds Storage Manager up to 6.1 ProcessFileUpload.jsp privilege escalation
8976| [78346] Zoho ManageEngine OpManager up to 11.6 PGSQL:SubmitQuery.do privilege escalation
8977| [78345] Zoho ManageEngine OpManager up to 11.5 Build 11600 Authentication Default Credentials weak authentication
8978| [78313] Apple Mac OS X up to 10.10 AppleEvents privilege escalation
8979| [78297] Apache Commons Components HttpClient up to 4.3.5 HTTPS Timeout denial of service
8980| [78229] IBM Business Process Manager cross site scripting
8981| [78292] Tripwire IP360 VnE Vulnerability Manager 7.2.2/7.2.5 RPC Service privilege escalation
8982| [78190] Cisco Unified Communications Manager 11.5 IM Service/Presence Service denial of service
8983| [78189] McAfee Vulnerability Manager up to 7.5.9 cross site request forgery
8984| [78173] Google Android up to 5.1.0 ActivityManagerService.java getProcessRecordLocked privilege escalation
8985| [78166] Google Android up to 5.1.0 Java ActivityManagerService.java getRunningAppProcesses information disclosure
8986| [78157] EMC RSA Certificate Manager and Registration Manager up to 6.9 Build 558 OneStep directory traversal
8987| [78137] Zoho ManageEngine EventLog Analyzer up to 10.6 event/runQuery.do unknown vulnerability
8988| [78060] Resource Data Management Data Manager up to 2.1 Password privilege escalation
8989| [78058] Resource Data Management Data Manager up to 2.1 cross site request forgery
8990| [78016] McAfee Enterprise Security Manager up to 9.3.2MR17/9.4.2MR7/9.5.0MR6 Filename privilege escalation
8991| [77986] Avira Management Console Update Manager Service Use-After-Free memory corruption
8992| [77972] Retrospect Client Password Hash Generator weak authentication
8993| [77943] Schneider Electric StruxureWare Building Expert MPM up to 2.14 Client-Server Data Stream Credentials weak encryption
8994| [77701] Borland AccuRev Reprise License Manager Service activate_doit memory corruption
8995| [77700] Borland AccuRev Reprise License Manager Service Stack-Based memory corruption
8996| [77751] F5 BIG-IP Manager 11.5.1 FastL4 Virtual Server denial of service
8997| [77613] Microsoft Windows up to Vista SP2 Adobe Type Manager Library atmfd.dll OpenType Font denial of service
8998| [77463] HP Virtual Connect Enterprise Manager up to 7.4.x information disclosure
8999| [77462] HP Virtual Connect Enterprise Manager up to 7.4.x privilege escalation
9000| [77451] HP Systems Insight Manager up to 7.4.x privilege escalation
9001| [77450] HP Systems Insight Manager up to 7.4.x privilege escalation
9002| [77449] HP Systems Insight Manager up to 7.4.x information disclosure
9003| [77443] HP Systems Insight Manager up to 7.4.x information disclosure
9004| [77442] HP Systems Insight Manager up to 7.4.x information disclosure
9005| [77456] HP Version Control Repository Manager up to 7.4.x privilege escalation
9006| [77455] HP Version Control Repository Manager up to 7.4.x cross site request forgery
9007| [77454] HP Version Control Repository Manager up to 7.4.x information disclosure
9008| [77453] HP Version Control Repository Manager up to 7.4.x memory corruption
9009| [77452] HP Version Control Repository Manager up to 7.4.x memory corruption
9010| [77430] libevent up to 2.0.21/2.1.4 evbuffer API evbuffer_read memory corruption
9011| [77403] PolarSSL up to 1.3.8 ClientHello Message Memory Leak denial of service
9012| [77400] libevent up to 1.4.14/2.0.21/2.1.4 bufferevent_write memory corruption
9013| [77390] IBM Tivoli Storage FlashCopy Manager Mailbox-Restore information disclosure
9014| [77378] HP Operations Manager i up to 10.01 privilege escalation
9015| [77375] Apache Tapestry up to 5.3.5 Client-Side Object Storage privilege escalation
9016| [77516] Netsweeper 4.0.8 AJAX File Manager Code Injection privilege escalation
9017| [77349] EMC RSA BSAFE Micro Edition Suite up to 4.0.7/4.1.2 Client Authentication Crash denial of service
9018| [77344] Cisco Unified Web and E-Mail Interaction Manager 9.0(2) cross site scripting
9019| [77334] Cisco Unified Web and E-Mail Interaction Manager 9.0(2) denial of service
9020| [77333] Cisco Unified Web and E-Mail Interaction Manager 9.0(2)/11.0(1) privilege escalation
9021| [77279] Modern Tribe Eventbrite Tickets Plugin up to 3.10.1 on WordPress Event Import Page import-eventbrite-events.php cross site scripting
9022| [77082] Job Manager Plugin up to 0.7.22 on WordPress cross site scripting
9023| [77243] Apple Mac OS X up to 10.10.4 SMBClient memory corruption
9024| [77040] Microsoft Windows up to Vista Object Manager privilege escalation
9025| [77037] Microsoft Windows Server 2012/Server 2012 R2 System Center Operations Manager cross site scripting
9026| [76939] Websense Triton Content Manager 8.0.0 handle_debug_network memory corruption
9027| [76896] IBM Tivoli Storage Manager Fastback up to 6.1.12.0 Stack-Based memory corruption
9028| [76895] IBM Tivoli Storage Manager Fastback up to 6.1.12.0 Stack-Based memory corruption
9029| [76894] IBM Tivoli Storage Manager Fastback up to 6.1.12.0 Stack-Based memory corruption
9030| [76893] IBM Tivoli Storage Manager Fastback up to 6.1.12.0 Stack-Based memory corruption
9031| [76892] IBM Tivoli Storage Manager Fastback up to 6.1.12.0 Stack-Based memory corruption
9032| [76866] Cisco Unified Communications Manager 10.5(3.10000.9) Prime Collaboration Deployment Credentials information disclosure
9033| [76861] IBM Business Process Manager up to 8.0.1.3/8.5.0.1/8.5.5.0/8.5.6.0 Enterprise Content Management privilege escalation
9034| [76859] Symantec Endpoint Protection Manager up to 12.1 Management Console sql injection
9035| [76857] Symantec Endpoint Protection Manager up to 12.1 Management Console privilege escalation
9036| [76856] Symantec Endpoint Protection Manager up to 12.1 Management Console information disclosure
9037| [76855] Symantec Endpoint Protection Manager up to 12.1 Filename privilege escalation
9038| [76854] Symantec Endpoint Protection Manager up to 12.1 Management Console weak authentication
9039| [76858] Symantec Endpoint Protection Manager up to 12.1 Management Console directory traversal
9040| [76850] Cisco AnyConnect Secure Mobility Client 4.0(2049) Head-End System directory traversal
9041| [76765] TIBCO Spotfire Client up to 7.0 memory corruption
9042| [76764] Cisco Videoscape Policy Resource Manager 3.5.4 TCP Memory Consumption denial of service
9043| [76753] IBM Business Process Manager up to 8.5.6.0 REST API cross site scripting
9044| [76752] IBM Business Process Manager up to 8.5.6.0 REST API privilege escalation
9045| [76756] Microsoft Windows up to Vista SP2 Adobe Type Manager Library atmfd.dll memory corruption
9046| [76746] IBM Case Manager up to 5.2.1.1 Error Dialog cross site scripting
9047| [76698] Oracle Applications Manager 12.1.3/12.2.3/12.2.4 OAM Dashboard unknown vulnerability
9048| [76685] Oracle Fusion Middleware 11.1.1.7/11.1.2.2 Access Manager denial of service
9049| [76681] Oracle Fusion Middleware 11.1.1.7/12.1.3.0 Event Processing unknown vulnerability
9050| [76669] Oracle Enterprise Manager Grid Control 11.1.0.1 RAC Management unknown vulnerability
9051| [76633] Oracle Enterprise Manager Grid Control 11.1.0.1 Enterprise Manager for Oracle Database unknown vulnerability
9052| [76632] Oracle Enterprise Manager Grid Control 11.1.0.1 Enterprise Manager for Oracle Database unknown vulnerability
9053| [76596] Oracle Commerce Platform 3.0.2/3.1.1/3.1.2/11.0/11.1 Guided Search/Experience Manager unknown vulnerability
9054| [76564] Oracle PeopleSoft Enterprise HCM 9.1/9.2 Talent Acquisition Manager unknown vulnerability
9055| [76504] Cisco Unified Communications Manager 10.5(2.10000.5) ccmivr cross site scripting
9056| [76502] Cisco Unified Communications Manager 10.5(1.99995.9) Tomcat Throttling denial of service
9057| [76418] IBM Business Process Manager up to 7.5.1.2/8.0.1.3/8.5.5.0/8.5.6.0 REST API Javascript privilege escalation
9058| [76399] VMware Workstation/Player/Horizon View Client on Windows Discretionary Access Control List privilege escalation
9059| [76348] Zoho ManageEngine Password Manager Pro up to 8.0 SQLAdvancedALSearchResult.cc sql injection
9060| [76321] Solarwinds Storage Manager AuthenticationFilter privilege escalation
9061| [76320] Solarwinds Storage Manager AuthenticationFilter privilege escalation
9062| [76283] Mozilla Firefox up to 38.x IndexedDatabaseManager memory corruption
9063| [76300] Cisco Unified Communications Domain Manager Platform Software privilege escalation
9064| [76276] IBM Tivoli Federated Identity Manager up to 6.2.2 FP14 cross site scripting
9065| [76267] Cisco Digital Content Manager 15.0.0 Ad Message Reboot denial of service
9066| [76162] Cisco Unified Communications Domain Manager 8.1(4)ER1 Web Framework information disclosure
9067| [76159] Droidware UK Explorer+ File Manager up to 2.3.2 on Android directory traversal
9068| [76158] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server privilege escalation
9069| [76157] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server Stack-Based memory corruption
9070| [76156] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server Stack-Based memory corruption
9071| [76155] IBM Tivoli Storage Manager Fastback up to 6.1.11 Stack-Based memory corruption
9072| [76154] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server Stack-Based memory corruption
9073| [76153] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server Stack-Based memory corruption
9074| [76152] IBM Tivoli Storage Manager Fastback up to 6.1.11 Stack-Based memory corruption
9075| [76151] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server privilege escalation
9076| [76150] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server Stack-Based memory corruption
9077| [76149] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server File privilege escalation
9078| [76148] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server Format String
9079| [76147] IBM Tivoli Storage Manager Fastback up to 6.1.11 Server privilege escalation
9080| [76146] IBM Tivoli Storage Manager Fastback up to 6.1.11 Stack-Based memory corruption
9081| [76145] IBM Tivoli Storage Manager Fastback up to 6.1.11 Stack-Based memory corruption
9082| [76144] IBM Tivoli Storage Manager Fastback up to 6.1.11 Stack-Based memory corruption
9083| [76143] IBM Tivoli Storage Manager Fastback up to 6.1.11 Stack-Based memory corruption
9084| [76142] IBM Tivoli Storage Manager Fastback up to 6.1.11 memory corruption
9085| [76238] NetIQ Access Manager 4.0 SP1 XML Data information disclosure
9086| [76111] IBM Business Process Manager URL directory traversal
9087| [76110] Symantec Data Loss Prevention up to 12.5.1 Enforce Server cross site request forgery
9088| [76103] IBM WebSphere Message Broker Toolkit MQ Client TLS weak encryption
9089| [76100] Symantec Data Loss Prevention up to 12.5.1 Enforce Server cross site scripting
9090| [76087] Samsung Galaxy S5 createFromParcel memory corruption
9091| [76065] Async Http Client up to 1.8.x X.509 Certificate Validator AsyncHttpClientConfig.java spoofing
9092| [76064] Async Http Client up to 1.8.x X.509 Certificate Validator spoofing
9093| [76035] EMC RSA Validation Manager up to 3.2 cross site scripting
9094| [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
9095| [76020] SwiftKey Galaxy S4 unknown vulnerability
9096| [76003] Synology DiskStation Manager up to 5.2-5565 entry.cgi cross site scripting
9097| [76002] EQ Event Calendar on Joomla sql injection
9098| [75969] Akronymmanager Extension up to 6.x on TYPO3 mod1/index.php sql injection
9099| [75967] EMC Unified Infrastructure Manager/Provisioning 4.1 LDAP weak authentication
9100| [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
9101| [75948] Cisco AnyConnect Secure Mobility Client 4.0(48) vpnapi.dll ConnectVpn memory corruption
9102| [75703] PHP 5.6 SoapClient do_soap_call privilege escalation
9103| [75702] PHP 5.6 SoapClient _call privilege escalation
9104| [75671] Thycotic Password Manager Secret Server up to 2.3 on iOS X.509 Certificate Chain Validation spoofing
9105| [75615] IBM Business Process Manager up to 7.5.1.2/8.0.1.3/8.5.5.0 cross site scripting
9106| [75596] Cisco Unified Email Interaction Manager 9.0(2) sql injection
9107| [75589] Aruba Networks ClearPass Policy Manager up to 6.4.4 cross site scripting
9108| [75586] Aruba Networks ClearPass Policy Manager up to 6.4.3 directory traversal
9109| [75585] Aruba Networks ClearPass Policy Manager up to 6.4.4 privilege escalation
9110| [75584] Aruba Networks ClearPass Policy Manager up to 6.4.4 sql injection
9111| [75583] Aruba Networks ClearPass Policy Manager up to 6.4.4 tipsLoginSubmit.action cross site scripting
9112| [75582] Aruba Networks ClearPass Policy Manager up to 6.4.x privilege escalation
9113| [75543] Emerson AMS Device Manager up to 12 sql injection
9114| [75533] IBM Business Process Manager cross site scripting
9115| [75531] IBM Tivoli Storage Manager Fastback up to 6.0 FastBackMount Process memory corruption
9116| [75521] IBM Tivoli Endpoint Manager 9.0.1/9.1.0 Endpoint Manager for Remote Control weak authentication
9117| [75516] IBM Tivoli Storage Manager Fastback up to 6.1.11.0 FastBackMount Process Stack-Based memory corruption
9118| [75497] Valve Steam Client Detection Protocol Crash denial of service
9119| [75488] IBM WebSphere MQ up to 7.5.0.4/8.0.0.1 Cluster Repository Manager Transmit-Queue Record denial of service
9120| [75417] Hancom Word Viewer 2007/2010/2014 HwpApp::CHncSDS_Manager denial of service
9121| [75392] Cisco Security Manager 4.7(0)SP1(1) HTTP Module cross site scripting
9122| [75420] Apache Tomcat up to 6.0.43/7.0.58/8.0.16 Security Manager privilege escalation
9123| [75335] Microsoft Windows up to Vista SP2 Service Control Manager privilege escalation
9124| [75207] Cisco Unified Communications Manager 11.0(0.98000.225) Administrative Web Interface sql injection
9125| [75217] F5 BIG-IP Application Security Manager 11.4.0/11.4.1 JSON privilege escalation
9126| [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
9127| [75166] Red Hat Enterprise Virtualization Manager up to 3.5.0 denial of service
9128| [75165] Realtek SDK miniigd SOAP Service NewInternalClient Request privilege escalation
9129| [75159] Oracle MySQL up to 5.7.2 SSL Client weak encryption
9130| [75091] Mozilla Firefox up to 37.0.1 HTML AsyncPaintWaitEvent privilege escalation
9131| [75037] Simple Ads Manager Plugin up to 2.5.95 on WordPress sam-ajax-admin.php privilege escalation
9132| [74995] Lenovo ThinkServer System Manager up to 1.27.73475 Certificate spoofing
9133| [74994] Lenovo ThinkServer System Manager up to 1.27.73475 Authentication HTTP Request Handler Crash denial of service
9134| [74991] Hotspot Express hotEx Billing Manager 73 Cookie privilege escalation
9135| [74976] Cisco Unified Communications Manager 10.5.1.98991.13 Interactive Voice Response sql injection
9136| [74947] Oracle MySQL Server up to 5.6.22 Encryption s23_srvr.c ssl23_get_client_hello denial of service
9137| [74945] Oracle MySQL Enterprise Monitor up to 2.3.19/3.0.18 Service Manager s:token/ cross site request forgery
9138| [74944] Oracle MySQL Enterprise Monitor up to 2.3.16/3.0.10 Service Manager memory corruption
9139| [74942] Oracle VM Server for SPARC 3.1/3.2 Ldom Manager unknown vulnerability
9140| [74916] Oracle Commerce Guided Search/Experience Manager 3.x/11.x Workbench unknown vulnerability
9141| [74896] Oracle Enterprise Manager Base Platform 12.1.0.5/12.1.0.6 My Oracle Support Plugin unknown vulnerability
9142| [74881] Oracle Access Manager 11.1.1.5/11.1.1.7 Authentication Engine unknown vulnerability
9143| [74861] Hotspot Express hotEx Billing Manager 73 cgi-bin/hotspotlogin.cgi cross site scripting
9144| [74749] Apple MacOS X up to 10.10.2 Open Directory Client weak encryption
9145| [74743] Apple MacOS X up to 10.10.2 OpenSSL s23_srvr.c ssl23_get_client_hello weak encryption
9146| [74689] Apple Safari 6.0/7.0/8.0 Client Certificate Matching privilege escalation
9147| [74655] Simple Ads Manager Plugin 2.5.94/2.5.96 on WordPress sql injection
9148| [74654] Ericsson Drutt Mobile Service Delivery Platform 4/5/6 3PI Manager start-3pi-manager.jsp Open Redirect
9149| [74640] IBM Tivoli Storage Manager Fastback up to 6.1.11.0 Mount privilege escalation
9150| [74618] Cisco Unified Communications Domain Manager 8.1(4) Image Management sql injection
9151| [74617] Cisco Unified Communications Domain Manager 8.1(4) File-Inclusion privilege escalation
9152| [74616] Cisco Unified Communications Domain Manager 8.1(4) Deprecated Page privilege escalation
9153| [74615] Cisco Prime Data Center Network Manager up to 7.1 fmserver Servlet directory traversal
9154| [74614] Cisco Unity Connection up to 8.5/8.6/9.1 Connection Conversation Manager SIP TCP Connection Termination Restart denial of service
9155| [74612] Cisco Unity Connection up to 8.5/8.6/9.1 Connection Conversation Manager SIP INVITE Message Restart denial of service
9156| [74611] Cisco Unity Connection up to 8.5/8.6/9.1 Connection Conversation Manager SIP INVITE Message denial of service
9157| [74610] Cisco Unity Connection up to 8.5/8.6/9.1 Connection Conversation Manager denial of service
9158| [74581] Synology DiskStation Manager up to 3.0 mDNS Responder denial of service
9159| [74546] IBM Security Access Manager for Web up to 7.x denial of service
9160| [74532] Cisco Unified Call Manager 9.1(2.1000.28) unknown vulnerability
9161| [74567] Websense Personal Email Manager up to 7.x cross site request forgery
9162| [74558] McAfee Data Loss Prevention Endpoint up to 9.2 ePO Extension cross site scripting
9163| [74557] McAfee Data Loss Prevention Endpoint up to 9.2 ePO Extension cross site request forgery
9164| [74556] McAfee Data Loss Prevention Endpoint up to 9.2 ePO Extension information disclosure
9165| [74555] McAfee Data Loss Prevention Endpoint up to 9.2 ePO Extension denial of service
9166| [74491] Websense Data Loss Prevention 7.8.3 cross site scripting
9167| [74490] Websense Appliance Manager up to 7.8.2 Network Diagnostics Tool privilege escalation
9168| [74124] F-Secure Policy Manager up to 11.30 Update Channel privilege escalation
9169| [74473] Solarwinds Firewall Security Manager up to 6.6.4 Privileges userlogin.jsp memory corruption
9170| [74464] IBM Business Process Manager up to 8.0.1.1 cross site scripting
9171| [74460] IBM Business Process Manager up to 8.0.1.0 cross site scripting
9172| [74459] IBM Business Process Manager up to 8.0.1.1 cross site scripting
9173| [74458] IBM Business Process Manager up to 8.0.1.1 cross site scripting
9174| [74100] DokuWiki 2014-09-29c User Manager cross site scripting
9175| [74447] ProjectSend 561 Client client-edit.php sql injection
9176| [74071] Apple Mac OS X 10.10.2 IOHIDFamily.kext IOHIDSecurePromptClient memory corruption
9177| [74052] OpenSSL 1.0.2 Client Authentication ClientKeyExchange Message denial of service
9178| [74051] OpenSSL 0.9.8/1.0.0/1.0.1/1.0.2 SSLv2 Message CLIENT-MASTER-KEY Message denial of service
9179| [74043] OpenSSL 1.0.2 ClientHello Handshake NULL Pointer Dereference denial of service
9180| [74432] IBM Rational Quality Manager up to 3.0.1.5 cross site scripting
9181| [74430] IBM Rational Quality Manager up to 3.0.1.5 cross site scripting
9182| [74073] Apple Mac OS X 10.10.2 IOHIDSecurePromptClient memory corruption
9183| [74072] Apple Mac OS X 10.10.2 IOHIDFamily.kext IOHIDSecurePromptClient memory corruption
9184| [74061] Websense Appliance Manager 7.8.3 Network Diagnostics Tool CommandLineServlet memory corruption
9185| [75379] HP ArcSight Enterprise Security Manager up to 6.8 cross site request forgery
9186| [74410] IBM Rational Quality Manager up to 4.0.6 cross site scripting
9187| [74407] IBM Rational Quality Manager up to 3.0.1.5 cross site scripting
9188| [74399] EMC RSA Certificate Manager up to 6.7 Administration Server multipart/ denial of service
9189| [74398] EMC RSA Certificate Manager up to 6.7 cross site scripting
9190| [74397] EMC RSA Certificate Manager up to 6.7 cross site scripting
9191| [74394] Zoho ManageEngine ADManager Plus up to 6.1 cross site scripting
9192| [73986] Cisco Intrusion Prevention System SSL/TLS Subsystem denial of service
9193| [75375] Solarwinds Orion Network Performance Monitor 2015.1 Configuration Manager sql injection
9194| [74380] Webgateinc eDVR Manager 2.6.4 ActiveX Control Connect memory corruption
9195| [74379] Webgateinc eDVR Manager 2.6.4 ActiveX Control SetConnectInfo memory corruption
9196| [75361] Google Chrome 40.0.2214.115 device_orientation_event_pump.cc unknown vulnerability
9197| [74335] HP Xp7 Global Link Manager Software up to 8.1.1 Replication cross site scripting
9198| [73924] Google Chrome up to 40.0.2214.85 Proxy proxy_client_socket.cc privilege escalation
9199| [74328] Cisco Unified Web And E-mail Interaction Manager cross site scripting
9200| [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
9201| [74267] Piwigo up to 2.7.2 Manager admin.php sql injection
9202| [69201] Cisco Intrusion Prevention System SSL/TLS Key Regeneration denial of service
9203| [74227] McAfee Email Gateway up to 7.0.3 Web Mail Client cross site scripting
9204| [74226] McAfee Data Loss Prevention Endpoint up to 9.3.299 cross site scripting
9205| [74225] McAfee Data Loss Prevention Endpoint up to 9.3.299 cross site scripting
9206| [74224] McAfee Data Loss Prevention Endpoint up to 9.3.299 sql injection
9207| [74214] Solarwinds Server and Application Monitor Manager Stack-Based memory corruption
9208| [74213] Samsung Samsung Security Manager up to 1.29 denial of service
9209| [74212] Persistent Systems Radia Client Automation User Account unknown vulnerability
9210| [74211] Persistent Systems Radia Client Automation 7.9 radexecd.exe privilege escalation
9211| [74201] IBM Tivoli Endpoint Manager up to 9.1.1116 cross site scripting
9212| [74200] IBM Tivoli Endpoint Manager up to 9.1.1116 Web Reports cross site scripting
9213| [74182] IBM Optim Performance Manager up to 4.1.1 directory traversal
9214| [74181] IBM Business Process Manager 8.5.0.1 Access Restriction unknown vulnerability
9215| [74171] Cisco Prime Security Manager up to 9.2.1-2 cross site scripting
9216| [74156] Fortinet FortiClient 5.2.3.091 Certificates spoofing
9217| [74155] Fortinet FortiClient 5.2.028 Certificates spoofing
9218| [69162] Microsoft System Center Virtual Machine Manager 2012 privilege escalation
9219| [74144] Hitachi Tiered Storage Manager up to 8.1.0 Replication cross site scripting
9220| [74136] Mactek Bullet Device Type Manager 1.00.0 memory corruption
9221| [73893] Attachmate Reflection FTP Client up to 14.1.428 ActiveX Control rftpcom.dll memory corruption
9222| [73892] Attachmate Reflection FTP Client up to 14.1.428 ActiveX Control rftpcom.dll memory corruption
9223| [73891] Attachmate Reflection FTP Client up to 14.1.428 ActiveX Control rftpcom.dll memory corruption
9224| [73875] CMSJunkie J-ClassifiedsManager cross site scripting
9225| [73874] CMSJunkie J-ClassifiedsManager sql injection
9226| [73869] Zoho ManageEngine OpManager up to 10.1 sql injection
9227| [73835] Bluecoat ProxyClient up to 3.3.3.1 Software Update spoofing
9228| [73834] Fortinet FortiClient 5.2.3.091 Encryption Key weak encryption
9229| [73811] Cybozu Remote Service Manager up to 2.3.0 denial of service
9230| [69033] Cisco AnyConnect Secure Mobility Client 3.1(.02043) cross site scripting
9231| [69031] Cisco Unified Communications Domain Manager 10 Admin GUI denial of service
9232| [73791] Attachmate Reflection FTP Client up to 14.1.428 Stack-Based memory corruption
9233| [73757] osTicket up to 1.9.4 client.inc.php cross site scripting
9234| [73755] EventSentry 3.1.0 Web Reports cross site scripting
9235| [73740] Cisco Unified Communications Manager Real-Time Monitoring Tool directory traversal
9236| [73715] IBM Business Process Manager up to 8.0.1.0 cross site scripting
9237| [73714] IBM Business Process Manager up to 8.0.1.0 cross site scripting
9238| [68855] McAfee Email Gateway 5.6/7.0/7.5/7.6 Web Mail Client Interface Reflected cross site scripting
9239| [68787] Oracle Integrated Lights Out Manager up to 3.2.3 denial of service
9240| [68784] Oracle Integrated Lights Out Manager up to 3.2.3 Messages NULL Pointer Dereference denial of service
9241| [68783] Oracle Integrated Lights Out Manager up to 3.2.3 Backup Restore information disclosure
9242| [68764] Oracle Integrated Lights Out Manager up to 3.2.3 IPMI unknown vulnerability
9243| [68695] Oracle Enterprise Manager Ops Center 11.1.3/12.1.4 Update Provisioning Cleartext information disclosure
9244| [68694] Oracle Enterprise Manager Ops Center 11.1.3/12.1.4 Update Provisioning spoofing
9245| [68693] Oracle Enterprise Manager Ops Center 11.1/12.1/12.2 Network Security Service Plaintext denial of service
9246| [68692] Oracle Enterprise Manager Ops Center 11.1.3/12.1.4 User Interface Framework unknown vulnerability
9247| [68691] Oracle Enterprise Manager Base Platform 12.1.0.3/12.1.0.4 Process Management & Notification information disclosure
9248| [68690] Oracle Enterprise Manager Base Platform 12.1.0.3/12.1.0.4 UI Framework unknown vulnerability
9249| [68689] Oracle Enterprise Manager Base Platform 12.1.0.3 denial of service
9250| [68688] Oracle Enterprise Manager Ops Center 11.1.3/12.1.4 Networking NULL Pointer Dereference denial of service
9251| [68687] Oracle Enterprise Manager Ops Center 11.1.3/12.1.4 Update Provisioning information disclosure
9252| [68686] Oracle Enterprise Manager Ops Center 11.1.3/12.1.4 File Upload Utility privilege escalation
9253| [68672] Oracle Access Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 Integration with OAM information disclosure
9254| [68663] Oracle Access Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 SSO Engine unknown vulnerability
9255| [68661] Oracle Adaptive Access Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 OAM Integration unknown vulnerability
9256| [68645] Oracle Database Server 11.1.0.7/11.2.0.3/11.2.0.4/12.1.0.1 Workspace Manager unknown vulnerability
9257| [73698] Clorius Controls A Java Web Client up to 01.00.x Cleartext unknown vulnerability
9258| [73667] Cisco Unified Communications Domain Manager 10.0 cross site request forgery
9259| [73603] clientResponse 4.1 cross site scripting
9260| [73586] PHPJabbers Event Booking Calendar 2.0 load-calendar.php sql injection
9261| [73585] PHPJabbers Event Booking Calendar 2.0 cross site request forgery
9262| [68613] Cisco AnyConnect Secure Mobility Client Authentication Form spoofing
9263| [68635] F5 BIG-IP 11.5.1 Application Security Manager cross site scripting
9264| [73553] Cisco Unified Communications Domain Manager Platform Software Flooding denial of service
9265| [68517] OpenSSL 1.0.1j SSLv3 s23_srvr.c ssl23_get_client_hello ClientHello denial of service
9266| [73523] SAP Netweaver Business Client For Html 3.0 cross site scripting
9267| [73474] Installatron GQ File Manager 0.2.5 cross site scripting
9268| [73431] IBM Security Identity Manager up to 5.1.0.8 cross site request forgery
9269| [73347] Cisco Unified Communications Domain Manager 8.0 cross site scripting
9270| [68536] NetIQ Access Manager 4.0 debug.jsp cross site scripting
9271| [68467] NetIQ Access Manager 4.0 cross site request forgery
9272| [68466] NetIQ Access Manager 4.0 cross site scripting
9273| [68465] NetIQ Access Manager 4.0 Password information disclosure
9274| [68464] NetIQ Access Manager 4.0 XXE information disclosure
9275| [73298] IBM Business Process Manager up to 8.0.1.0 cross site scripting
9276| [73296] IBM Rational Quality Manager up to 3.0.1.5 cross site scripting
9277| [73290] IBM Security Access Manager for Web denial of service
9278| [73289] IBM Security Access Manager for Web information disclosure
9279| [73288] IBM Security Access Manager for Web information disclosure
9280| [73287] IBM Security Access Manager for Web information disclosure
9281| [73286] IBM Security Access Manager for Web information disclosure
9282| [73285] IBM Security Access Manager for Web unknown vulnerability
9283| [73284] IBM Security Access Manager for Web denial of service
9284| [73283] IBM Security Access Manager for Web sql injection
9285| [73282] IBM Security Access Manager for Web unknown vulnerability
9286| [73281] IBM Security Access Manager for Web cross site request forgery
9287| [73280] IBM Security Access Manager for Web unknown vulnerability
9288| [68449] GIT Client 1.8.5.5/1.9.4/2.0.4/2.1.3/2.2.0 Path privilege escalation
9289| [73269] IBM Business Process Manager up to 8.0.1.0 export directory traversal
9290| [73268] IBM Business Process Manager up to 8.0.1.0 Access Restriction unknown vulnerability
9291| [73264] IBM Business Process Manager up to 7.5.0.1 Service Bus information disclosure
9292| [73262] Zoho ManageEngine Password Manager Pro up to 7.0 directory traversal
9293| [73241] WAPPushManager up to 2.1 sql injection
9294| [73231] LibVNCServer up to 0.9.9 rfbProcessClientNormalMessage denial of service
9295| [73228] Cisco Prime Security Manager up to 9.2.1-2 Web Framework cross site scripting
9296| [68428] RSA Authentication Manager 8.0/8.1 Redirect spoofing
9297| [73201] IBM Operational Decision Manager unknown vulnerability
9298| [73197] Cisco Unified Communications Domain Manager 8.0 Web Framework unknown vulnerability
9299| [73189] Zoho ManageEngine OpManager up to 10.1 directory traversal
9300| [73171] F5 BIG-IP Application Acceleration Manager up to 11.6.0 Cleartext unknown vulnerability
9301| [73126] IBM Tivoli Endpoint Manager Mobile Device Management memory corruption
9302| [73121] Creative Minds CM Download Manager up to 2.0.1 CmdownloadController.php create_function unknown vulnerability
9303| [73098] Creative Minds Cm Download Manager up to 2.0.5 cross site request forgery
9304| [73096] Zoho ManageEngine Password Manager Pro up to 7.0 sql injection
9305| [73095] Zoho ManageEngine Desktop Central Password Manager sql injection
9306| [73094] Zoho ManageEngine OpManager 11.4 sql injection
9307| [73093] Zoho ManageEngine OpManager 11.4 sql injection
9308| [73092] Zoho ManageEngine OpManager up to 10.3 directory traversal
9309| [73091] Zoho ManageEngine OpManager up to 11.4 directory traversal
9310| [73090] Zoho ManageEngine OpManager up to 10.1 directory traversal
9311| [73060] Sp Project & Document Manager up to 2.4.1 remove_cat sql injection
9312| [73050] Ad-Manager 1.1.2 track-click.php unknown vulnerability
9313| [73032] Springshare LibCal 2.0 api_events.php cross site scripting
9314| [68303] OpenVAS Manager up to 5.0.6 OMP Command modify_schedule sql injection
9315| [73014] IBM QRadar Risk Manager up to 7.2.2 unknown vulnerability
9316| [73013] IBM QRadar Risk Manager up to 7.2.2 cross site request forgery
9317| [68499] LibreSSL 2.1.1 d1_srtp.c ssl_parse_clienthello_use_srtp_ext denial of service
9318| [72986] Aruba ClearPass Policy Manager up to 6.4.0 sql injection
9319| [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
9320| [72902] IBM Security Identity Manager up to 6.0.0.2 unknown vulnerability
9321| [72901] IBM Security Identity Manager up to 6.0.0.2 unknown vulnerability
9322| [72900] IBM Security Identity Manager up to 6.0.0.2 Cleartext unknown vulnerability
9323| [72899] IBM Security Identity Manager up to 6.0.0.2 cross site scripting
9324| [72898] IBM Security Identity Manager up to 6.0.0.2 directory traversal
9325| [72893] Zoho ManageEngine Password Manager Pro up to 7.0 SQLAdvancedALSearchResult.cc sql injection
9326| [72892] Zoho ManageEngine Password Manager Pro up to 7.0 BulkEditSearchResult.cc sql injection
9327| [68156] Cisco Unified Communications Manager TLS Certificate spoofing
9328| [68159] SAP NetWeaver 7.02/7.30 Internet Communication Manager Crash denial of service
9329| [68123] Symantec Endpoint Protection Manager 12.1 ConsoleServlet privilege escalation
9330| [68122] Symantec Endpoint Protection Manager 12.1 Reflected cross site scripting
9331| [68121] Symantec Endpoint Protection Manager 12.1 XML XXE information disclosure
9332| [72796] CP Multi View Event Calendar 1.0.1 sql injection
9333| [72795] Download Manager 2.0.1 directory traversal
9334| [72768] WP-DBManager 2.71 privilege escalation
9335| [72758] IBM Tivoli Application Dependency Discovery Manager up to 7.2.2.2 cross site scripting
9336| [72757] IBM Tivoli Application Dependency Discovery Manager up to 7.2.2.2 unknown vulnerability
9337| [72756] IBM Business Process Manager up to 8.5.0.1 cross site scripting
9338| [72755] Cisco Unified Communications Manager cross site scripting
9339| [72754] Cisco Unified Communications Manager Admin Interface cross site scripting
9340| [72753] Cisco Unified Communications Manager cross site scripting
9341| [72752] Cisco Unified Communications Manager cross site scripting
9342| [72751] Cisco Unified Communications Manager Administrative Web Interface sql injection
9343| [72749] Adaptivecomputing TORQUE Resource Manager up to 4.2.6.1 Session lib/Libifl/tm.c tm_adopt unknown vulnerability
9344| [68104] Fortinet FortiAnalyzer/FortiManager 5.0.6 Reflected cross site scripting
9345| [68103] Fortinet FortiAnalyzer/FortiManager 5.0.6 Reflected cross site scripting
9346| [68102] Fortinet FortiAnalyzer/FortiManager 5.0.6 Reflected cross site scripting
9347| [72743] IBM Tivoli Application Dependency Discovery Manager up to 7.2.2.2 directory traversal
9348| [68077] BSD FTP Client HTTP Redirect privilege escalation
9349| [68090] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1 information disclosure
9350| [68089] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1 TLS/SSL memory corruption
9351| [68088] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1 HTTP Cookie httponly information disclosure
9352| [72717] Zoho ManageEngine EventLog Analyzer 9.0 Upload Servlet memory corruption
9353| [72681] Megapolis.Portal Manager cross site scripting
9354| [72679] Red Hat Virtual Desktop Service Manager Locking denial of service
9355| [72662] CBI Referral Manager up to 1.2.1 getNetworkSites.php cross site scripting
9356| [72604] 133 Flight Manager 4 X.509 Certificate spoofing
9357| [72583] Mobile BASEBALL MANAGER K 1.13 X.509 Certificate spoofing
9358| [72389] Cycling Manager Game Cff 1 X.509 Certificate spoofing
9359| [72120] Red Hat Enterprise Virtualization Manager up to 3.4.0 unknown vulnerability
9360| [72081] Google Calendar Events up to 2.0.3.0 cross site scripting
9361| [68029] Apple Mac OS X up to 10.9.3 NetFS Client Framework privilege escalation
9362| [67904] Oracle PeopleSoft Enterprise HRMS 9.2 Talent Acquisition Manager unknown vulnerability
9363| [67891] Oracle E-Business Suite 12.0.6/12.1.3/12.2.2/12.2.3/12.2.4 Applications Manager unknown vulnerability
9364| [67886] Oracle Enterprise Manager 10.2.0.5/11.1.0.1 unknown vulnerability
9365| [67885] Oracle Enterprise Manager up to 12.1.0.6.x Application Performance Management unknown vulnerability
9366| [67883] Oracle Identity Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 End User Self Service memory corruption
9367| [67880] Oracle Identity Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 User Management firstlogin memory corruption
9368| [67878] Oracle Access Manager 11.1.2.1/11.1.2.2 Admin Console unknown vulnerability
9369| [67877] Oracle Access Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 Admin Console unknown vulnerability
9370| [67875] Oracle Access Manager 11.1.2.1/11.1.2.2 Admin Console unknown vulnerability
9371| [67874] Oracle Access Manager 11.1.1.5/11.1.1.7 Admin Console unknown vulnerability
9372| [67869] Oracle Identity Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 OIM Legacy UI commons-beanutils-1.8.0.jar memory corruption
9373| [67867] Oracle Adaptive Access Manager 11.1.1.5/11.1.1.7/11.1.2.1/11.1.2.2 OAAM Server commons-beanutils-1.8.0.jar memory corruption
9374| [67807] Cisco Intrusion Prevention System 7.2 IP Logging denial of service
9375| [71933] mobileeventguide IDS 2013 1.21 X.509 Certificate spoofing
9376| [71906] HP Records Manager up to 8.0 cross site scripting
9377| [71905] HP Operations Manager 9.20 memory corruption
9378| [71904] HP Operations Manager 9.10/9.11 memory corruption
9379| [71856] IBM Business Process Manager up to 8.0.1.0 Authorization weak authentication
9380| [71855] IBM Tivoli Service Automation Manager up to 7.2.2.1 cross site scripting
9381| [67776] Google Chrome 38.0.2125.7 Events Use-After-Free memory corruption
9382| [67736] Cisco Intrusion Prevention System 7.1(8)S17 MainApp denial of service
9383| [71847] Rexx-systems Recruitment R6.1/R7.0 Event cross site scripting
9384| [71842] libvncserver 0.9.9 rfbProcessClientNormalMessage denial of service
9385| [67755] TeamSpeak Client 3.0.14 IMG Tag memory corruption
9386| [67754] TeamSpeak Client 3.0.14 IMG Tag memory corruption
9387| [71833] HP Systems Insight Manager up to 7.1 cross site scripting
9388| [71832] Apple Mac OS X IOHIDSecurePromptClient memory corruption
9389| [71831] HP Systems Insight Manager up to 7.1 unknown vulnerability
9390| [71830] HP Systems Insight Manager up to 7.1 Privileges unknown vulnerability
9391| [71793] femanager Extension up to 1.0.8 on TYPO3 unknown vulnerability
9392| [68556] McAfee Network Data Loss Prevention 9.2.0 cross site scripting
9393| [68555] McAfee Network Data Loss Prevention 9.2.0 MySQL Database weak authentication
9394| [68554] McAfee Network Data Loss Prevention 9.2.0 cross site request forgery
9395| [68553] McAfee Network Data Loss Prevention 9.2.0 Autocomplete Password information disclosure
9396| [68548] McAfee Network Data Loss Prevention 9.2.0 information disclosure
9397| [68547] McAfee Network Data Loss Prevention 9.2.0 ICMP Redirect memory corruption
9398| [71776] IBM Security Access Manager For Web 8.0 up to 8.0.0.1 Management Interface cross site scripting
9399| [71775] IBM Security Access Manager For Web 8.0 up to 8.0.0.1 Administration Console privilege escalation
9400| [71774] IBM Security Access Manager For Web 8.0 up to 8.0.0.1 denial of service
9401| [71757] Ford Credit Account Manager 1.0.1 X.509 Certificate spoofing
9402| [71726] IBM Tivoli Federated Identity Manager unknown vulnerability
9403| [71691] Hibernate Validator Java Security Manager unknown vulnerability
9404| [67715] Cisco WebEx Meetings Server 2.5.0.4 ClientUpgrade Servlet information disclosure
9405| [71574] Vector Outage Manager 1.7 X.509 Certificate spoofing
9406| [71531] S-Link SLFileManager 1.2.5 directory traversal
9407| [71507] igg Galaxy Online 2 1.2.3 X.509 Certificate spoofing
9408| [71500] Cisco Unified Communications Domain Manager Platform up to 4.4 Platform Software denial of service
9409| [68079] F5 Enterprise Manager up to 2.3.0/3.1.1 Configuration Utility XXE information disclosure
9410| [67659] Apple Mac OS X up to 10.9.4 OpenSSL s3_clnt.c ssl3_send_client_key_exchange denial of service
9411| [71223] Cisco Unified Communications Manager 9.1 Web Framework cross site scripting
9412| [71221] IBM Rational Rhapsody Design Manager Jazz Team Server unknown vulnerability
9413| [71215] Zoho ManageEngine EventLog Analyzer 9.0 Eventlog unknown vulnerability
9414| [71207] Akronymmanager 0.5.0 cross site scripting
9415| [71202] Flat Manager up to 2.7.8 sql injection
9416| [71177] HP Network Node Manager i 9.10 memory corruption
9417| [71157] IBM Rational Rhapsody Design Manager cross site request forgery
9418| [71067] mobileeventguide Uber B2B 1.9 X.509 Certificate spoofing
9419| [70996] Scoutmob Scoutmob Local Deals! Event 3.0.18 X.509 Certificate spoofing
9420| [70961] metago ASTRO File Manager with Cloud 4.4.592 X.509 Certificate spoofing
9421| [70944] Cubettechnologies Cloud Manager 1.6 X.509 Certificate spoofing
9422| [70852] permadi Mahjong Galaxy Space Lite 2.5 X.509 Certificate spoofing
9423| [70806] Apache Commons-httpclient 4.2/4.2.1/4.2.2 spoofing
9424| [70802] IBM Business Process Manager up to 8.5.5.0 information disclosure
9425| [70801] IBM Business Process Manager up to 8.0.1.0 Access Restriction privilege escalation
9426| [70798] IBM Business Process Manager up to 8.0.1.0 cross site scripting
9427| [67438] Cisco IOS XR 4.3.2.BASE ICMPv6 Client Library CPU Exhaustion denial of service
9428| [70777] VMTurbo Operations Manager vmtadmin.cgi privilege escalation
9429| [70772] Zoho ManageEngine EventLog Analyzer cross site scripting
9430| [70771] Arubanetworks ClearPass Policy Manager 6.3.0.60730 Management Console privilege escalation
9431| [70761] IBM Flex System Manager 1.3.1 Encryption weak encryption
9432| [67429] F5 Enterprise Manager up to 3.1.1 ConfigSync Access Control privilege escalation
9433| [70719] HP Service Manager up to 9.29 Access Restriction denial of service
9434| [70718] HP Service Manager up to 9.29 cross site request forgery
9435| [70717] HP Service Manager up to 9.29 memory corruption
9436| [70716] HP Service Manager up to 7.20 cross site scripting
9437| [70703] Bssys RBS BS-Client 3.17.9 sql injection
9438| [67452] Novell GroupWise Client 8.0x/2012/2014 on Windows memory corruption
9439| [70669] Riverbed Steelapp Traffic Manager 9.6 cross site scripting
9440| [67675] Fortinet FortiOS up to 5.0.7 FortiManager Service weak authentication
9441| [67407] Fortinet FortiOS up to 5.0.7 FortiManager Protocol Service denial of service
9442| [70650] IBM Business Process Manager up to 8.0.1.0 callService.do unknown vulnerability
9443| [70649] IBM Global Console Manager 16 up to 1.20.0.22574 Firmware systest.php privilege escalation
9444| [70648] IBM Global Console Manager 16 up to 1.20.0.22574 Firmware prodtest.php cross site scripting
9445| [70647] IBM Global Console Manager 16 up to 1.20.0.22574 kvm.cgi cross site scripting
9446| [70616] Fujitsu ServerView Operations Manager up to 5.00.09 cross site scripting
9447| [70611] Cisco Unified Communications Manager 10.0 Single Sign-On privilege escalation
9448| [70608] Cisco Unified Communications Domain Manager up to 8.6 Crash denial of service
9449| [70592] IBM Security Access Manager for Mobile 8.0.0.1 cross site scripting
9450| [70586] IBM Tivoli Business Service Manager up to 4.2.0 cross site scripting
9451| [70582] IBM Business Process Manager up to 8.5.5.0 information disclosure
9452| [70578] Cisco Unified Communications Manager up to 8.6 unknown vulnerability
9453| [70570] Lyris List Manager 8.95a cross site scripting
9454| [70556] SolarWinds Network Configuration Manager up to 7.2.1 memory corruption
9455| [70528] SAP FI Manager Self-Service unknown vulnerability
9456| [70527] SAP Solution Manager 7.1 denial of service
9457| [70517] IBM Rational Software Architect Design Manager up to 3.0.0 memory corruption
9458| [70516] IBM Rational Software Architect Design Manager 4.0.6 memory corruption
9459| [70510] Cisco Prime Data Center Network Manager up to 6.3 cross site scripting
9460| [70457] Cisco Security Manager 4.5 Web Framework sql injection
9461| [70454] Zoho ManageEngine EventLog Analyzer 9.0 cross site scripting
9462| [67279] McAfee Security Manager 6.1.15.38/7.1.5.14/7.1.15.6/7.5.5.8/8.1.7.2 User Management Module cross site request forgery
9463| [67219] Symantec Endpoint Protection Manager 11/12 Login Form weak authentication
9464| [70382] Cisco Unified Communications Domain Manager up to 8.1 Admin Web Interface unknown vulnerability
9465| [70380] IBM Business Process Manager up to 8.0.1.0 cross site scripting
9466| [67102] Oracle Agile Product Collaboration 9.3.3 Web Client unknown vulnerability
9467| [67097] Oracle Applications Manager 12.0.6/12.1.3/12.2.2/12.2.3 unknown vulnerability
9468| [70356] Cisco Unified Communications Manager 10.0 Real-Time Monitoring Tool directory traversal
9469| [70355] Cisco Unified Communications Manager 10.0 directory traversal
9470| [70350] Bannersky BSK PDF Manager 1.3.2 Dashboard sql injection
9471| [70319] Cisco Unified Communications Manager directory traversal
9472| [70318] Cisco Unified Communications Manager unknown vulnerability
9473| [70317] Cisco Unified Communications Manager viewfilecontents.do cross site scripting
9474| [70273] IBM Flex System Manager up to 1.3.1 User Account unknown vulnerability
9475| [70239] Your-text-manager 0.3.0 cross site scripting
9476| [70230] WP Plugin Manager up to 1.6.4.b cross site scripting
9477| [70227] WordPress Hot Files:File Sharing and Download Manager up to 1.0.0 tpls/editmedia.php cross site scripting
9478| [70198] dsSearchAgent 1.0 client-assist.php cross site scripting
9479| [70187] Cisco Universal Small Cell DHCP Client privilege escalation
9480| [70184] IBM Tivoli Endpoint Manager up to 9.0 information disclosure
9481| [70181] IBM Tivoli Application Dependency Discovery Manager up to 7.1.2.1 directory traversal
9482| [70162] Diversesolutions dsIDXpress IDX plugin client-assist.php cross site scripting
9483| [66986] NetIQ Security Manager up to 6.5.4 NQMcsVarSet ActiveX Control DumpToFile privilege escalation
9484| [70155] EMC Smarts Network Configuration Manager up to 9.0 unknown vulnerability
9485| [70130] IBM Security Access Manager For Mobile Software 8.0 memory corruption
9486| [70129] IBM Security Access Manager For Mobile Software up to 8.0 Management Interface unknown vulnerability
9487| [70128] IBM Security Access Manager For Web Appliance 8.0 weak encryption
9488| [46301] Novell Identity Manager 4.0.2 MKDQUOTESAFE privilege escalation
9489| [70090] F5 ARX Data Manager up to 3.0.0 Web Service sql injection
9490| [70068] Hitachi Tuning Manager up to 8.0.0 cross site scripting
9491| [70067] Hitachi Tuning Manager up to 8.0.0 cross site request forgery
9492| [29835] Symantec Web Gateway up to 5.2.1 clientreport.php sql injection
9493| [70046] SAP NetWeaver Business Client cross site scripting
9494| [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
9495| [70008] Cloudera Manager up to 5.0.0 information disclosure
9496| [13568] Google Chrome 35.0.1916.114 Clipboard renderer_clipboard_client.cc memory corruption
9497| [13562] Mozilla Firefox 29.0.1 CompileEventHandlerInternal memory corruption
9498| [13574] Cisco Unified Communications Manager 10.0.1 BulkViewFileContentsAction.java sql injection
9499| [13572] Cisco Unified Communications Manager Real-Time Monitoring Tool information disclosure
9500| [69976] IBM Tivoli Identity Manager up to 5.0.0.5 cross site request forgery
9501| [69975] Cisco Unified Communications Domain Manager Web Framework unknown vulnerability
9502| [69974] Cisco Unified Communications Domain Manager Web Framework unknown vulnerability
9503| [69969] DevExpress Aspxfilemanager Control For Webforms And Mvc up to 12.0 directory traversal
9504| [69960] EMC Documentum Digital Asset Manager up to 6.4 Proxy Server unknown vulnerability
9505| [69952] AuraCMS 3.0 filemanager.php directory traversal
9506| [69951] AuraCMS 3.0 filemanager.php cross site scripting
9507| [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
9508| [69908] Cisco Unified Communications Domain Manager up to 9.0 Administration unknown vulnerability
9509| [69860] Cisco Unified Communications Domain Manager up to 9.0 Web Framework unknown vulnerability
9510| [69859] Cisco Unified Communications Domain Manager up to 9.0 Administration unknown vulnerability
9511| [69858] Cisco Unified Communications Domain Manager up to 9.0 Administration unknown vulnerability
9512| [69857] Cisco Unified Communications Domain Manager up to 9.0 Administration unknown vulnerability
9513| [13416] F5 Enterprise Manager 11.x Configuration Utility list.jsp cross site scripting
9514| [13438] F-Secure Client Security Online Safety and Browsing Protection privilege escalation
9515| [13410] McAfee Data Loss Prevention 9.1/9.2/9.3 RAR Archive denial of service
9516| [69809] IBM Tivoli Service Request Manager up to 7.1.1.11 privilege escalation
9517| [69806] IBM Tivoli Service Request Manager up to 7.1.1.11 sql injection
9518| [69802] HP Operations Manager i up to 9.13 memory corruption
9519| [13349] Cisco Security Manager 4.5/4.6 cross site scripting
9520| [69757] VMTurbo Operations Manager directory traversal
9521| [13333] Cisco Security Manager 4.7.0 cross site request forgery
9522| [69752] Construtiva CIS Manager CMS sql injection
9523| [13290] Cisco Unified Web/E-Mail Interaction Manager 9.0.1 Session weak authentication
9524| [13287] Cisco Security Manager 4.7.0 Auto Update Server cross site scripting
9525| [13256] Novell NetIQ Sentinel Agent Manager NQMcsVarSet.ocx directory traversal
9526| [69711] Adaptivecomputing TORQUE Resource Manager up to 2.5.6 lib/Libdis/disrsi_.c memory corruption
9527| [13289] Cisco Unified Web/E-mail Interaction Manager 9.0.2 entrypoint privilege escalation
9528| [13288] Cisco Unified Web/E-Mail Interaction Manager 9.0.1 cross site scripting
9529| [13242] Cisco WebEx up to 27.32.31.15/28.12.13.17/29.5.1.11 Event Center meetinginfo.do information disclosure
9530| [69689] VICIDIAL 2.7/2.8 manager_send.php privilege escalation
9531| [69654] Disk Pool Manager up to 1.8.2 dpm_update_spcmd_entry sql injection
9532| [69637] HP Network Node Manager i 9.20 cross site scripting
9533| [69635] IBM Operational Decision Manager up to 7.4 Console information disclosure
9534| [69634] IBM Operational Decision Manager up to 7.4 cross site scripting
9535| [69633] IBM Operational Decision Manager up to 7.4 cross site request forgery
9536| [69544] SAP Netweaver Software Lifecycle Manager 7.1 information disclosure
9537| [13094] Mozilla Firefox up to 28.0.1 Text Track Manager AddCue HTML Video memory corruption
9538| [13132] Cisco Unified Communications Manager Call Detail Records information disclosure
9539| [13131] Cisco Unified Communications Manager IP Manager Assistant information disclosure
9540| [69465] Sixnet SixView Manager 2.4.1 directory traversal
9541| [69415] IBM Rational Software Architect Design Manager up to 3.0.0 unknown vulnerability
9542| [69412] HP Network Node Manager i 9.02 memory corruption
9543| [69405] Cybozu Remote Service Manager up to 2.3.0 unknown vulnerability
9544| [69404] Cybozu Remote Service Manager up to 2.3.0 denial of service
9545| [69344] IBM Messagesight Jms Client up to 1.0.0.0 Access Restriction privilege escalation
9546| [69343] IBM Messagesight Jms Client up to 1.0.0.0 denial of service
9547| [69342] IBM Messagesight Jms Client up to 1.0.0.0 WebSockets denial of service
9548| [69341] IBM Messagesight Jms Client up to 1.0.0.0 WebSockets Crash denial of service
9549| [69333] OpenStack python-keystoneclient up to 0.4.2 Privileges Stack-Based unknown vulnerability
9550| [12972] Oracle MySQL Client up to 5.5.36/5.6.16 unknown vulnerability
9551| [12921] Oracle PeopleSoft Enterprise 9.0/9.1/9.2 HRMS Talent Acquisition Manager unknown vulnerability
9552| [12899] Oracle Event Processing 11.1.1.7.0 CEP System unknown vulnerability
9553| [12898] Oracle Access Manager 11.1.1.5 Webserver Plugin denial of service
9554| [12897] Oracle Access Manager up to 11.1.2.2.0 WebGate unknown vulnerability
9555| [69308] Apps4u%40android SD Card Manager up to 20140222 directory traversal
9556| [69304] Construtiva CIS Manager CMS default.asp sql injection
9557| [66927] IBM Business Process Manager up to 7.5.x Authorization information disclosure
9558| [66920] SAP Software Deployment Manager denial of service
9559| [12876] VMware vSphere Client 4.0/4.1/5.0/5.1 Certificate spoofing
9560| [12875] VMware vSphere Client 4.0/4.1/5.0/5.1 URL privilege escalation
9561| [12986] Google Chrome 34.0.1847.115 software_frame_manager.cc swaptonewframe memory corruption
9562| [66873] HP IceWall Identity Manager up to 5.0 denial of service
9563| [12784] Cisco Security Manager 4.2 HTTP Header Open Redirect
9564| [66808] Cisco Prime Security Manager up to 9.2 cross site scripting
9565| [13386] Apache Tomcat Security Manager up to 6.0.39/7.0.53/8.0.5 XSLT privilege escalation
9566| [66792] IBM Tivoli Storage FlashCopy Manager Data Protection unknown vulnerability
9567| [12745] Synology DiskStation Manager 5.0-4458 cross site scripting
9568| [12696] RSA Authentication Manager 6.1/8.0/8.1 Self-Service Console cross site scripting
9569| [66771] McAfee Asset Manager 6.6 directory traversal
9570| [66770] McAfee Asset Manager 6.6 sql injection
9571| [66745] EMC Connectrix Manager up to 12.1.1 Firmware information disclosure
9572| [12717] PayPal App 5.3 on Android SSL Certificate WebHybridClient.java spoofing
9573| [66703] Freedownloadmanager Free Download Manager up to 3.8 Downloads_Deleted.cpp UpdateDownload memory corruption
9574| [12644] Synology DiskStation Manager 4.0-2257/4.1-2851/4.2-3236/4.3-3810 article.php sql injection
9575| [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
9576| [66584] Abeel Simple PHP Agenda up to 0.2.0 edit_event.php sql injection
9577| [12593] Google Chrome up to 33.0.1750.117 Event URL cross site scripting
9578| [12565] Apple iOS 6.1/7.0.5 IOKit HID Event information disclosure
9579| [12530] Microsoft Windows Server 2003/Server 2008/Server 2012/Vista/XP Security Account Manager Lockout privilege escalation
9580| [12599] Squid Proxy up to 3.3.11/3.4.3 SSL-Bump Range Request Stat Manager denial of service
9581| [66544] Serena Dimensions CM 12.2 Web Client dimensions cross site scripting
9582| [66534] Getgosoft GetGo Download Manager up to 4.4.5.502 Stack-based memory corruption
9583| [12474] EMC Data Loss Prevention 9.0/9.5/9.6 Session Management privilege escalation
9584| [12579] Synology DiskStation Manager 4.3-3810 update 1 VPN Module weak authentication
9585| [12489] Cisco Unified Communications Manager 9.0(.1) BVSM cross site scripting
9586| [13022] Red Hat JBoss Enterprise Application Platform 6.2.2 Java Security Manager privilege escalation
9587| [12444] Cisco Unified Communications Manager 10.0(1.10000.3) Certificate Authority Proxy Function privilege escalation
9588| [12443] Cisco Unified Communications Manager 10.0(1.10000.3) Call Detail Records Analysis and Reporting Page cross site request forgery
9589| [66425] IBM WebSphere eXtreme Scale Client up to 8.6.0.4 Web Container information disclosure
9590| [12461] HP Service Manager 9.30/9.31/9.32/9.33 denial of service
9591| [12460] HP Service Manager 9.30/9.31/9.32/9.33 information disclosure
9592| [12459] HP Service Manager 9.30/9.31/9.32/9.33 weak authentication
9593| [12458] HP Service Manager 9.30/9.31/9.32/9.33 memory corruption
9594| [12457] HP Service Manager 9.30/9.31/9.32/9.33 HTTP Request cross site request forgery
9595| [12456] HP Service Manager 9.30/9.31/9.32/9.33 URL cross site scripting
9596| [12354] Cisco Unified Communications Manager 10.0(1.10000.3) Administration Interface information disclosure
9597| [12353] Cisco Unified Communications Manager 10.0(1.10000.3) Real Time Monitoring Tool Web Application information disclosure
9598| [12352] Cisco Unified Communications Manager 10.0(1.10000.3) Enterprise License Manager information disclosure
9599| [12351] Cisco Unified Communications Manager 10.0(1.10000.3) Certificate Authority Proxy Function sql injection
9600| [12350] Cisco Unified Communications Manager 10.0(1.10000.3) IP Manager Assistant Iinterface cross site scripting
9601| [12349] Cisco Unified Communications Manager 10.0(1.10000.3) Call Detail Records Analysis and Reporting Page cross site request forgery
9602| [66387] SAP Netweaver Solution Manager 7.0 information disclosure
9603| [12322] Symantec Endpoint Protection Manager 11/12 SQL Database sql injection
9604| [12321] Symantec Endpoint Protection Manager 11/12 SAP XML Parser XXE information disclosure
9605| [12326] Netgear DGN2200 N300 up to 1.0.0.36-7.0.37 CSRF Prevention Filter cross site request forgery
9606| [12307] Cisco Unified Communications Manager WAR File information disclosure
9607| [12306] Cisco Unified Communications Manager sql injection
9608| [12305] Cisco Unified Communications Manager IP Manager Assistant sql injection
9609| [12290] Cisco Unified Communications Manager log4jint denial of service
9610| [12289] Cisco Unified Communications Manager IP Manager Assistant Interface cross site scripting
9611| [12288] Cisco Unified Communications Manager Bulk Administration Interface information disclosure
9612| [12287] Cisco Unified Communications Manager Java Database Interface sql injection
9613| [12286] Cisco Unified Communications Manager Enterprise Mobility Application sql injection
9614| [12409] Google Android SDK 2.0 ADB Client Code Stack-Based memory corruption
9615| [66329] Download Manager up to 2.5.7 cross site scripting
9616| [13140] Plex Media Server 0.9.9.10 clientaccesspolicy.xml cross site request forgery
9617| [66310] Kolja Schleich leaguemanager up to 2.0 leaguemanager.php sql injection
9618| [12206] Google Android SDK Platform Tools 18.0.1 Signedness adb/adb_client.c adb_connect memory corruption
9619| [12194] Citrix XenMobile Device Manager Server 6.x/7.x/8.5/8.6 Stored information disclosure
9620| [66279] IBM Financial Transaction Manager Access Restriction privilege escalation
9621| [66278] IBM Financial Transaction Manager cross site scripting
9622| [66277] IBM Financial Transaction Manager cross site request forgery
9623| [66276] IBM Financial Transaction Manager directory traversal
9624| [12143] WordPress up to 3.8.1 Media Manager Description Field Stored cross site scripting
9625| [66231] IBM Tivoli Application Dependency Discovery Manager up to 7.2.1.2 Administration sql injection
9626| [12128] IBM Sametime Connect Client 8.5.2/9.0 Java Plugin information disclosure
9627| [66230] McAfee Vulnerability Manager 7.5 cross site scripting
9628| [12204] TYPO3 6.1 Extension Manager cross site request forgery
9629| [12135] Oracle MySQL client/mysql.cc Server Version memory corruption
9630| [66191] Cisco Video Surveillance Operations Manager MySQL Database denial of service
9631| [66190] Avanset Visual CertExam Manager up to 3.0.1 sql injection
9632| [12335] Drupal 7.14 eventcalander/ cross site scripting
9633| [66156] IBM Filenet P8 Business Process Manager up to 5.1.0 cross site scripting
9634| [66153] OpenStack python-keystoneclient 0.2.2/0.2.3 Stack-Based weak authentication
9635| [66136] IBM Tivoli Federated Identity Manager up to 6.2.2.3 unknown vulnerability
9636| [66104] Xyzscripts Newsletter Manager up to 1.0 cross site request forgery
9637| [66103] Xyzscripts Newsletter Manager cross site scripting
9638| [66102] Xyzscripts Newsletter Manager up to 1.0 cross site scripting
9639| [11991] Cisco WebEx Meetings Server 1.5/1.5.1.6/1.5.1.131 Enterprise License Manager Web Portal Cleartext Password information disclosure
9640| [66079] CSP MySQL User Manager 2.3 Login Page sql injection
9641| [66076] WellinTech KingAlarm&Event up to 2.0.1 ActiveX Control unknown vulnerability
9642| [66075] WellinTech KingAlarm&Event up to 2.0.1 Access Restriction unknown vulnerability
9643| [11931] Oracle MySQL Enterprise Monitor up to 2.3.14/3.0.4 Service Manager unknown vulnerability
9644| [11828] Oracle Identity Manager 11.1.2.0/11.1.2.1 Identity Console unknown vulnerability
9645| [11824] Oracle Portal 11.1.1.6 Page Parameters and Events unknown vulnerability
9646| [11823] Oracle Identity Manager 11.1.2.0/11.1.2.1 Identity Console unknown vulnerability
9647| [11822] Oracle Identity Manager 11.1.1.5/11.1.1.7/11.1.2.0/11.1.2.1 End User Self Service unknown vulnerability
9648| [11818] Oracle Identity Manager 11.1.1.5/11.1.1.7/11.1.2.0/11.1.2.1 End User Self Service unknown vulnerability
9649| [66059] CGENE Security File Manager up to 1.0.6 directory traversal
9650| [66048] Red Hat ManageIQ Enterprise Virtualization Manager up to 5.0 sql injection
9651| [12222] McAfee Vulnerability Manager 7.5.5 cross site request forgery
9652| [12221] McAfee Vulnerability Manager 7.5.5 cross site scripting
9653| [66020] Cisco Unified Communications Manager up to 8.6%282%29 Role-Based Access Control privilege escalation
9654| [11800] McAfee Vulnerability Manager 7.0.11/7.5.4/7.5.5 Validation Reflected cross site scripting
9655| [11995] libvirt up to 1.2.1 rpc/virnetserverclient.c virNetServerClientStartKeepAlive denial of service
9656| [12032] Juniper Web Device Manager Authentication Default Credentials weak authentication
9657| [65903] HP Service Manager Web Tier up to 9.20 cross site scripting
9658| [65902] HP Service Manager Web Tier up to 9.20 memory corruption
9659| [65875] Red Hat Subscription Asset Manager up to 1.2.0 Configuration File weak authentication
9660| [65864] Cisco Unified Communications Manager up to 8.6%282%29 Disaster Recovery System unknown vulnerability
9661| [11571] Synology DiskStation Manager 4.3-3810 file_sharing.cgi directory traversal
9662| [11570] Synology DiskStation Manager 4.3-3810 file_download.cgi directory traversal
9663| [11569] Synology DiskStation Manager 4.3-3810 file_share.cgi directory traversal
9664| [11568] Synology DiskStation Manager 4.3-3810 file_MVCP.cgi directory traversal
9665| [11567] Synology DiskStation Manager 4.3-3810 file_rename.cgi directory traversal
9666| [11566] Synology DiskStation Manager 4.3-3810 html5_upload.cgi directory traversal
9667| [11565] Synology DiskStation Manager 4.3-3810 file_delete.cgi POST Request directory traversal
9668| [11562] IBM WebSphere Portal up to 6.1.5.3/7.0.0.2/8.0.0.1 Web Content Manager URL information disclosure
9669| [11561] Synology DiskStation Manager 4.0-2257/4.1-2851/4.2-3236/4.3-3810 SliceUpload webman/imageSelector.cgi privilege escalation
9670| [65825] IBM Rational Clearcase up to 8.0.0.7 Web Client information disclosure
9671| [12002] MediaWiki up to 1.22.0 Deleted Page ApiQueryLogEvents.php information disclosure
9672| [65807] IBM Security Access Manager For Web 6.1 denial of service
9673| [65778] IBM Flex System Manager up to 1.1.0 cross site scripting
9674| [65724] EMC Connectrix Manager up to 12.0.2 memory corruption
9675| [11500] Cisco Unified Communications Manager TFTP Service SPDefault.cnf.xml information disclosure
9676| [11484] TYPO3 up to 4.7.16 Extension Manager Reflected cross site scripting
9677| [11478] Plone up to 4.3.2 Session BrowserIdManager.py cross site scripting
9678| [11458] Mozilla Firefox 25.0.1 Event Listener HandleEventSubType memory corruption
9679| [65645] Easytimestudio Easy File Manager 1.1 directory traversal
9680| [65617] IBM FileNet Content Manager 4.5.1 workingSet.jsp cross site scripting
9681| [11408] Cisco Adaptive Security Device Manager Web Login Portal Lockout Mechanism Failure Brute Force Vulnerability weak authentication
9682| [65605] Novell SUSE Manager 1.2 cross site scripting
9683| [65594] HP Service Manager 7.11 memory corruption
9684| [11338] Novell iPrint Client 5.92 id1.getprinterurllist denial of service
9685| [11421] D-Link DSL-6740U CSRF Prevention Filter cross site request forgery
9686| [11280] EMC Data Protection Manager Appliance 3.2.4.1/3.5 cross site scripting
9687| [11279] EMC Data Protection Manager Appliance 3.2.4.1/3.5 SSL/TLS Handshake NULL Pointer Dereference privilege escalation
9688| [65506] Adaptivecomputing TORQUE Resource Manager up to 4.2.4.0 send_the_mail privilege escalation
9689| [11390] Google Chrome 31.0.1650.57 Mouse Event dom/Document.cpp updateHoverActiveState memory corruption
9690| [11243] Drupal up to 7.x-dev CSRF Prevention Filter Bypass cross site request forgery
9691| [65488] Cisco Unified Communications Manager up to 8.6 Enterprise License Manager directory traversal
9692| [11278] Novell Identity Manager 4.0.2 cross site scripting
9693| [11305] phpMyFAQ 2.8.2 ajaxfilemanager.php privilege escalation
9694| [11231] RIM BlackBerry Link 1.2.1.30 on Windows/Mac Peer Manager IPv6 WebDAV Share privilege escalation
9695| [11218] Fortinet Manager 5.0.4 SYSAdminUserDialog weak authentication
9696| [11198] Google Chrome 30.0.1599.101 Mutation Event Handlers memory corruption
9697| [11197] Google Chrome 30.0.1599.101 Touch Event WebPluginContainerImpl.cpp handleEvent memory corruption
9698| [11169] RIM BlackBerry Link up to 1.2.0.28/up to 1.1.1 on Windows/Mac Peer Manager %APPDATA% memory corruption
9699| [11163] OpenVAS Manager/Administrator 1.2.1/1.3.1 OAP Authentication weak authentication
9700| [11162] OpenVAS Manager up to 4.0.3 OMP Authentication privilege escalation
9701| [65445] EMC Documentum Digital Asset Manager up to 6.4 cross site scripting
9702| [65440] Tuxfamily Chrony up to 1.28 sed Command cmdmon.c handle_client_accesses information disclosure
9703| [65434] Ldap-account-manager LDAP Account Manager 4.2.1 cross site scripting
9704| [11072] Cisco AnyConnect Secure Mobility Client VPN API COM Active Template Library memory corruption
9705| [65394] Cisco Unified Communications Manager denial of service
9706| [11319] Valve Steam Client Friend Message memory corruption
9707| [11058] Mozilla Firefox/Thunderbird 24.0 Worker::SetEventListener memory corruption
9708| [11057] Mozilla Firefox/Thunderbird 24.0 SetEventHandler memory corruption
9709| [11080] Novell ZENworks Configuration Management 11.2 CSRF Prevention Filter cross site request forgery
9710| [11042] Horde Groupware Webmail Edition 5.1.2 Authentication Manager horde/ingo/basic.php weak authentication
9711| [65350] IBM Flex System Manager 1.3.0 Access Restriction unknown vulnerability
9712| [65343] Dell Quest One Password Manager 5.0 information disclosure
9713| [10953] Apple Mac OS X Server Profile Manager cross site scripting
9714| [10952] Apple Mac OS X Server Profile Manager cross site scripting
9715| [10951] Apple Mac OS X Server Profile Manager cross site scripting
9716| [10950] Apple Mac OS X Server Profile Manager cross site scripting
9717| [10949] Apple Mac OS X Server Profile Manager denial of service
9718| [11181] Google Chrome 30.0.1599.101 TLS Renegotiation Certificate Validation ssl_client_socket_nss.cc privilege escalation
9719| [10857] VMware vCenter Server up to 5.0 Update 2 Web Client Server privilege escalation
9720| [65297] HP Service Manager up to 9.32 cross site scripting
9721| [65296] HP Service Manager up to 9.32 information disclosure
9722| [65295] HP Service Manager up to 9.31 information disclosure
9723| [65294] HP Service Manager up to 9.32 memory corruption
9724| [10815] Oracle MySQL Enterprise Monitor up to 2.3.13 Service Manager privilege escalation
9725| [10718] Oracle Enterprise Manager Base Platform 10.2.0.5/11.1.0.1 Storage Management unknown vulnerability
9726| [10717] Oracle Enterprise Manager Base Platform 10.2.0.5/11.1.0.1 Storage Management unknown vulnerability
9727| [10716] Oracle Enterprise Manager Base Platform 10.2.0.5/11.1.0.1 Schema Management unknown vulnerability
9728| [10715] Oracle Enterprise Manager Base Platform 10.2.0.5/11.1.0.1 DB Performance Advisories/UIs unknown vulnerability
9729| [10709] Oracle Identity Manager 11.1.2.0.0/11.1.2.1.0 End User Self Service unknown vulnerability
9730| [10706] Oracle Access Manager 11.1.1.5.0/11.1.2.0.0 Authentication Engine unknown vulnerability
9731| [65273] Adaptivecomputing TORQUE Resource Manager up to 4.2.4.1 unknown vulnerability
9732| [65258] Cisco Unified Communications Manager Administrative Web Interface directory traversal
9733| [10673] Juniper Junos up to 13.1 CSRF Prevention Filter cross site request forgery
9734| [10658] Cisco ASA 8.4(2)/8.6(1.2) AnyConnect SSL VPN Client Disconnection Memory Consumption denial of service
9735| [10657] Cisco ASA up to 9.1(1.3) Clientless SSL VPN HTTPS Request denial of service
9736| [10891] IBM Tivoli Endpoint Manager 9.0.777 (patch 2) Authentication privilege escalation
9737| [10627] Microsoft Internet Explorer 6/7/8/9/10 Event mshtml.dll memory corruption
9738| [10582] Google Chrome 29.0.1547.76 Gesture Event denial of service
9739| [65168] Cisco Unified Communications Domain Manager Web Framework sql injection
9740| [65157] F5 BIG-IP Access Policy Manager up to 11.3.0 Access Policy Logout Page cross site scripting
9741| [65156] F5 BIG-IP Access Policy Manager up to 11.1.0 unknown vulnerability
9742| [65147] David King vino up to 2.31.91 vino-server.c vino_server_client_data_pending denial of service
9743| [65112] IBM Rational ClearQuest up to 7.1.0.0 Web Client information disclosure
9744| [65073] Envato Complete Gallery Manager plugin up to 2.0.2 File Upload memory corruption
9745| [65053] Cisco Video Surveillance Operations Manager Administrative Web Interface unknown vulnerability
9746| [10529] IBM DB2 10.1/10.5 Fast Communications Manager denial of service
9747| [65021] IBM Optim Performance Manager Configuration Manager unknown vulnerability
9748| [65020] IBM Optim Performance Manager Configuration Manager information disclosure
9749| [11227] Nagios Core Config Manager 3.0.3 nagiosql/index.php sql injection
9750| [64998] Cisco Prime Data Center Network Manager up to 5.x information disclosure
9751| [64997] Cisco Prime Data Center Network Manager up to 5.x information disclosure
9752| [64996] Cisco Prime Data Center Network Manager up to 5.x processImageSave.jsp directory traversal
9753| [64994] HP IceWall File Manager up to 3.0 information disclosure
9754| [64992] HP IceWall File Manager up to 3.0 information disclosure
9755| [10457] Cisco Intrusion Prevention System 7.0/7.1 Management Interface denial of service
9756| [10455] HP ArcSight Enterprise Security Manager 5.4 cross site scripting
9757| [10443] Mozilla Firefox/Thunderbird 23.0 Animation Manager Stylesheets buildanimations memory corruption
9758| [64920] HP ProCurve Manager 3.20 privilege escalation
9759| [64919] HP ProCurve Manager 3.20 Certificates memory corruption
9760| [64918] HP ProCurve Manager 3.20 memory corruption
9761| [64917] HP ProCurve Manager 3.20 memory corruption
9762| [64916] HP ProCurve Manager 3.20 sql injection
9763| [64909] Citrix CloudPortal Services Manager unknown vulnerability
9764| [64908] Citrix CloudPortal Services Manager unknown vulnerability
9765| [64907] Citrix CloudPortal Services Manager unknown vulnerability
9766| [64906] Citrix CloudPortal Services Manager unknown vulnerability
9767| [64905] Citrix CloudPortal Services Manager unknown vulnerability
9768| [64904] Citrix CloudPortal Services Manager unknown vulnerability
9769| [64903] Citrix CloudPortal Services Manager unknown vulnerability
9770| [64902] Citrix CloudPortal Services Manager unknown vulnerability
9771| [64899] Cisco Digital Media Manager unknown vulnerability
9772| [10565] Google Chrome 29.0.1547.76 Different Frame User Gesture Event Use-After-Free privilege escalation
9773| [10256] Synology DiskStation Manager up to 4.3-3776 uistrings.cgi privilege escalation
9774| [10255] Synology DiskStation Manager 4.3-3776 Web Interface /webman/info.cgi cross site scripting
9775| [10254] Synology DiskStation Manager 4.3-3776 Web Interface /scripts/uistrings.cgi privilege escalation
9776| [10253] Synology DiskStation Manager 4.3-3776 externaldevices.cgi privilege escalation
9777| [10252] Synology DiskStation Manager 4.3-3776 webman/wallpaper.cgi unknown vulnerability
9778| [64810] Cisco Unified Communications Manager Enterprise License Manager cross site request forgery
9779| [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
9780| [10099] Citrix XenClient 2.1.2/3.0.0/3.1.3 NDVM Connection privilege escalation
9781| [64777] Cisco Unified Communications Manager up to 8.x memory corruption
9782| [64776] Cisco Unified Communications Manager up to 8.x Flooding denial of service
9783| [64775] Cisco Unified Communications Manager up to 8.x Memory Leak denial of service
9784| [64774] Cisco Unified Communications Manager up to 7.x denial of service
9785| [64765] Myrephp MYRE Realty Manager search.php cross site scripting
9786| [64764] Myrephp MYRE Realty Manager sql injection
9787| [64746] Cisco Unified Communications Manager up to 8.x Memory Leak denial of service
9788| [64737] IBM Global Console Manager 32 up to 1.18.0.22010 ping.php privilege escalation
9789| [10056] IBM InfoSphere Optim Performance Manager up to 5.1.1.1 directory traversal
9790| [10102] WebkitGTK+ Root Node dom/EventRetargeter.h eventTargetRespectingTargetRules denial of service
9791| [64690] HP Service Manager 9.31 privilege escalation
9792| [9970] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2 Session weak authentication
9793| [9969] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2 cross site request forgery
9794| [9965] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2 cross site scripting
9795| [9964] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2 Java Stack Trace information disclosure
9796| [9961] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2 Partition Mount privilege escalation
9797| [9960] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2 Field Autocomplete privilege escalation
9798| [9959] McAfee Network Data Loss Prevention 8.6/9.2.0/9.2.1/9.2.2 Cookie privilege escalation
9799| [64611] Cisco Unified Communications Manager cross site request forgery
9800| [64610] Cisco Unified Communications Manager cross site request forgery
9801| [64609] Cisco Unified Communications Manager Web Portal Stack-Based unknown vulnerability
9802| [64594] CA Service Desk Manager up to 12.7 cross site scripting
9803| [9823] Google Chrome 28.0.1500.72 html/RadioInputType.cpp handleKeydownEvent memory corruption
9804| [9819] Google Chrome 28.0.1500.72 Unload Event memory corruption
9805| [64565] HP Network Node Manager I 9.03 Enterprise Portal Platform denial of service
9806| [10495] TP-LINK TL-WDR4300 3.13.31 CSRF Prevention Filter cross site request forgery
9807| [64541] Cisco Video Surveillance Manager directory traversal
9808| [64540] Cisco Video Surveillance Manager directory traversal
9809| [64539] Cisco Video Surveillance Manager directory traversal
9810| [64537] IBM Star Command Center up to 3.0.5 Web Client cross site scripting
9811| [64530] Cisco Unified Operations Manager Administrative Web Interface cross site scripting
9812| [64529] Cisco Unified Operations Manager cross site scripting
9813| [64528] Cisco Unified Operations Manager sql injection
9814| [64492] Cisco Unified Communications Manager up to 9.1(2) Encryption Key weak encryption
9815| [64489] Cisco Unified Communications Manager up to 8.6 sql injection
9816| [64488] Cisco Unified Communications Manager up to 8.6 sql injection
9817| [64486] Cisco Unified Communications Manager up to 8.6 unspecified privilege escalation
9818| [9920] cPanel WHM 11.34.1.24/11.36.1.14/11.38.1.12/11.39.0.4 Web Host Manager WHM privilege escalation
9819| [9919] cPanel WHM 11.34.1.24/11.36.1.14/11.38.1.12/11.39.0.4 Web Host Manager WHM privilege escalation
9820| [9564] Cisco Intrusion Prevention System up to 7.1(7)E4 IP Packet Stack-Based denial of service
9821| [9563] Cisco Intrusion Prevention System 7.1(4)E4 IP Stack Packet denial of service
9822| [9621] Oracle Agile PLM Framework 9.3.1 Web Client CS unknown vulnerability
9823| [9613] Oracle Enterprise Grid Manager up to 10.2.0.5/11.1.0.7 User Interface Framework unknown vulnerability
9824| [9612] Oracle Enterprise Grid Manager up to 12.1.0.3 Schema Management unknown vulnerability
9825| [9598] Oracle Access Manager 11.1.1.5.0/11.1.1.7.0/11.1.2.0.0 SSO Engine unknown vulnerability
9826| [64474] HP Network Node Manager i 9.10 denial of service
9827| [64468] Cisco Unified Communications Domain Manager Management Interface Memory Consumption denial of service
9828| [64459] Cisco Unified Communications Domain Manager cross site scripting
9829| [9502] Google Chrome 27.0.1453.116 download_protection_service.cc CheckClientDownloadRequest memory corruption
9830| [64439] Symantec Security Information Manager Management Console information disclosure
9831| [64438] Symantec Security Information Manager Management Console cross site scripting
9832| [64437] Symantec Security Information Manager Management Console sql injection
9833| [64434] IBM Business Process Manager up to 7.5.1.0 cross site scripting
9834| [64423] Red Hat Enterprise Virtualization Manager denial of service
9835| [9339] IBM AIX 6.1/7.1 tftp Client information disclosure
9836| [64334] Cisco Unified Communications Manager cross site request forgery
9837| [9447] McAfee Data Loss Prevention up to 9.2.1 ReDownloadLogs.do information disclosure
9838| [10003] Google Chrome 28.0.1500.95 Speech Recognition speech_recognition_manager_impl.cc SessionStart denial of service
9839| [64308] Huawei Seco Versatile Security Manager unknown vulnerability
9840| [9239] Symantec Endpoint Protection Manager 12.0.x/12.1.x Management Console secars.dll memory corruption
9841| [64266] HP Service Manager 9.31 cross site scripting
9842| [64265] HP Service Manager 9.31 information disclosure
9843| [64263] Cisco Video Surveillance Operations Manager unknown vulnerability
9844| [9361] cPanel WHM up to 11.38.0.14 Web Host Manager privilege escalation
9845| [9145] VMware vCenter Chargeback Manager up to 2.5 File Validation memory corruption
9846| [12152] Cisco WebEx Meetings Server 1.0 Event Center Module Password and Host Keys information disclosure
9847| [9002] Apple Mac OS X up to 10.8.3 QuickDraw Manager DSTCPEndpoint.cpp AllocFromProxyStruct memory corruption
9848| [8946] Google Chrome 27.0.1453.94 HTML5 Audio WebMediaPlayerClientImpl.cpp memory corruption
9849| [8927] Horde Groupware up to 3.0.3 Ingo Email Filter Rules Manager Smartphone Rule cross site scripting
9850| [8900] HTC One/Sense 4.x Mail Client SSL Connection weak authentication
9851| [8893] X.Org libXRes up to 1.0.6 Graphical Library XResQueryClients/XResQueryClientResources() memory corruption
9852| [64155] Cisco Unified Communications Manager denial of service
9853| [8994] Google Chrome 27.0.1453.94 editing/Editor.cpp dispatchEditableContentChangedEvents memory corruption
9854| [8754] Mozilla Firefox/Thunderbird up to 20.0/17.0.5 DOMSVGZoomEvent information disclosure
9855| [64064] HP Service Manager Web Tier up to 9.30 cross site scripting
9856| [64063] HP Service Manager Web Tier up to 9.30 information disclosure
9857| [64062] Cisco Unified Communications Domain Manager Flooding denial of service
9858| [8583] Fortinet FortiClient 2.0/4.0.2/4.0.2012/4.3.3.445 Authentication Cleartext information disclosure
9859| [64044] Cisco Unified Communications Domain Manager Web Framework cross site scripting
9860| [64043] IBM Lotus Sametime up to 8.5.1 Web Client unknown vulnerability
9861| [8587] IBM Tivoli Federated Identity Manager up to 6.2.2 FIM SAML 2.0 Protocol cross site scripting
9862| [8540] Cisco Unified Computing System up to 1.4(x)/2.0(1m) Manager Web Interface information disclosure
9863| [8534] Cisco Device Manager up to 5.2.7 element-manager.jnlp privilege escalation
9864| [64000] Lester Chan WP-DownloadManager up to 1.60 cross site request forgery
9865| [8356] Oracle Retail Integration Bus 13.0/13.1/13.2 Retail Integration Bus Manager unknown vulnerability
9866| [8352] Oracle Siebel UI Framework 8.1.1/8.2.2 Open UI Client unknown vulnerability
9867| [8347] Oracle Siebel UI Framework 8.1.1/8.2.2 Open UI Client unknown vulnerability
9868| [8328] Oracle E-Business Suite 12.0.6/12.1.3 Applications Manager unknown vulnerability
9869| [8301] Oracle Web Services Manager 11.1.1.6.0 Web Services Security unknown vulnerability
9870| [8428] Cisco Jabber Extensible Communications Platform Connection Manager denial of service
9871| [8426] Novell iManager up to 2.7.5 Session weak authentication
9872| [8199] Microsoft Remote Desktop Connection Client up to 7.0 mstscax.dll memory corruption
9873| [63945] Cisco Hosted Collaboration Solution Service Manager denial of service
9874| [63936] Schneider Electric Modicon M340 Bmxp3420xx FTP Client Crash denial of service
9875| [63926] Red Hat Subscription Asset Manager cross site scripting
9876| [9558] Novell GroupWise Client up to 2012 12.0.1 HP1 on Windows Javascript/Active X Script cross site scripting
9877| [63912] Novell Identity Manager Roles Based Provisioning Module up to 4.0.1 unknown vulnerability
9878| [63904] Novell Sentinel Log Manager up to 1.0.0.4 weak authentication
9879| [63900] EMC Smarts Network Configuration Manager up to 9.2 unknown vulnerability
9880| [63899] EMC Smarts Server Manager up to 9.0 cross site scripting
9881| [63898] EMC Smarts Network Configuration Manager up to 9.0 memory corruption
9882| [63879] Mattias Hutterer Taxonomy Manager cross site request forgery
9883| [63876] Joe Haskins Og Manager Change up to 7.x-2.x cross site scripting
9884| [8127] Cisco IOS up to 15.3 Smart Install Client Feature denial of service
9885| [63840] IBM Rational ClearQuest up to 8.0.0.0 Web Client cross site scripting
9886| [8092] IBM Tivoli Endpoint Manager up to 1.3 AMF Message cross site request forgery
9887| [8075] IBM Tivoli Endpoint Manager up to 8.2.1371 Plaintext cross site scripting
9888| [8085] Electronic Arts Origin Client URI privilege escalation
9889| [8973] Google Chrome up to 26.0.1410.65 Notification notification_ui_manager_impl.cc CancelAllByProfile memory corruption
9890| [11664] Tor 0.2.4.11-alpha ClientDNSRejectInternalAddresses Rule IPv6 Packet privilege escalation
9891| [63744] Red Hat Enterprise Virtualization Manager up to 3.0 denial of service
9892| [8478] TP-LINK TL-WR1043N Firmware TL-WR1043ND_V1_120405 Manager userRpm/NasFtpCfgRpm.htm information disclosure
9893| [63718] HP Intelligent Management Center User Access Manager up to 5.0 denial of service
9894| [63717] HP up to 5.0 Authentication Manager denial of service
9895| [7948] McAfee Vulnerability Manager up to 7.5 cross site scripting
9896| [8953] Google Chrome up to 26.0.1410.65 NaCl Loader chrome_content_renderer_client.cc privilege escalation
9897| [63689] IBM Tivoli Application Dependency Discovery Manager User Interface Welcome.do cross site scripting
9898| [7944] WebkitGTK+ up to 1.11.90 HTMLMediaElement Destructor readystatechange Event memory corruption
9899| [7906] IBM Tivoli Application Dependency Discovery Manager up to 7.2.1.3 SSL Configuration spoofing
9900| [7902] IBM Tivoli Application Dependency Discovery Manager up to 7.2.1.3 cross site scripting
9901| [63655] Cisco Unified Communications Manager up to 9.x denial of service
9902| [63654] Cisco Unified Communications Manager up to 8.x denial of service
9903| [88140] Alt-N MDaemon 12.5.6/13.0.3 Worldclient Credentials information disclosure
9904| [11544] Google Chrome 24.0.1312.71 WebInputEvent Class WriteData IPC Message information disclosure
9905| [7818] SAP Software Deployment Manager Authentication denial of service
9906| [7800] Google Chrome 24.0.1312.71 chrome_download_manager_delegate.cc IsDangerousFile privilege escalation
9907| [7795] Google Chrome 24.0.1312.71 chrome_content_renderer_client.cc IsNaClAllowed memory corruption
9908| [63609] IBM Tivoli Storage Manager up to 5.3.6.2 unknown vulnerability
9909| [63608] IBM Tivoli Storage Manager up to 5.3.6.2 denial of service
9910| [63596] IBM Tivoli Service Request Manager 7.2.0.0 cross site scripting
9911| [7786] Alt-N MDaemon up to 13.0.3 WorldClient.dll Eingabe weak authentication
9912| [7785] Alt-N MDaemon up to 13.0.3 WorldClient.dll cross site request forgery
9913| [7784] Alt-N MDaemon up to 13.0.3 HTTP Requests Sanitizer WorldClient.dll information disclosure
9914| [88139] Alt-N MDaemon 13.0.3 Worldclient Session weak authentication
9915| [7747] Twitter Client 2.1.1 on Mac Unicode Unicode Character denial of service
9916| [63583] LSI 3ware Disk Manager directory traversal
9917| [63580] Schneider Electric Accutech Manager up to 2.00.1 RFManagerService.exe memory corruption
9918| [11274] Novell Identity Manager 4.0.2 Password Reset Bypass weak authentication
9919| [11273] Novell Identity Manager 4.0.2 cross site scripting
9920| [11272] Novell Identity Manager 4.0.2 cross site scripting
9921| [11271] Novell Identity Manager 4.0.2 cross site scripting
9922| [11270] Novell Identity Manager 4.0.2 cross site scripting
9923| [7727] SonicWALL Scrutinizer 9.5.2 Alarm New Board Policy Manager cross site scripting
9924| [7692] IBM Tivoli Application Dependency Discovery Manager 7.2.1 cmd/Welcome.do cross site request forgery
9925| [7691] IBM Tivoli Application Dependency Discovery Manager 7.2.1 Session Identifier cmd/logon.do weak authentication
9926| [7690] IBM Tivoli Application Dependency Discovery Manager 7.2.1 cmd/Welcome.do cross site scripting
9927| [7689] IBM Tivoli Application Dependency Discovery Manager 7.2.1 cmd/Welcome.do spoofing
9928| [63512] HP Network Node Manager i 9.03 cross site scripting
9929| [63489] Wireshark up to 1.8.4 dissect_oampdu_event_notification denial of service
9930| [63470] Cisco Unified Communications Domain Manager cross site scripting
9931| [7576] VMware VI-Client 2.5 Management Authentication Protocol memory corruption
9932| [7575] VMware vSphere Client up to 4.1 Management Authentication Protocol memory corruption
9933| [7568] Novell GroupWise Client up to 2012.0 SP1 Pointer memory corruption
9934| [63384] Siemens SIMATIC RF-MANAGER 2008 up to 3.0 memory corruption
9935| [63371] IBM Tivoli Federated Identity Manager up to 6.2.1.1 spoofing
9936| [63364] IBM Tivoli Federated Identity Manager up to 6.2.1.1 Cleartext unknown vulnerability
9937| [7408] Oracle Sun Storage Common Array Manager 6.9.0 Fault Management System unknown vulnerability
9938| [7371] Oracle Enterprise Manager Grid Control 10.2.0.5 Base Platform unknown vulnerability
9939| [7370] Oracle Enterprise Manager Grid Control 10.2.0.5/11.1.0.1 Base Platform unknown vulnerability
9940| [7369] Oracle Enterprise Manager Grid Control 10.2.0.5/11.1.0.1 Base Platform unknown vulnerability
9941| [7368] Oracle Enterprise Manager Grid Control 10.2.0.5 Base Platform unknown vulnerability
9942| [7367] Oracle Enterprise Manager Grid Control 10.2.0.5/11.1.0.1 Base Platform unknown vulnerability
9943| [7366] Oracle Enterprise Manager Grid Control 10.2.0.5/11.1.0.1 Base Platform Distributed/Cross unknown vulnerability
9944| [7365] Oracle Enterprise Manager Grid Control 11.1.0.1/12.1.0.1 Base Platform Distributed/Cross unknown vulnerability
9945| [7364] Oracle Enterprise Manager Grid Control 10.2.0.5/11.1.0.1 Base Platform Distributed/Cross unknown vulnerability
9946| [7363] Oracle Enterprise Manager Grid Control 10.2.0.5/11.1.0.1 Base Platform unknown vulnerability
9947| [7362] Oracle Enterprise Manager Grid Control 10.2.0.5/11.1.0.1 Base Platform unknown vulnerability
9948| [7361] Oracle Enterprise Manager Grid Control 6.5/11.1/12.1.0.2 Application Performance Management unknown vulnerability
9949| [7360] Oracle Enterprise Manager Grid Control 6.5/11.1/12.1.0.2 Application Performance Management unknown vulnerability
9950| [7359] Oracle Enterprise Manager Grid Control 6.5/11.1/12.1.0.2 Application Performance Management unknown vulnerability
9951| [7355] Oracle Fusion Middleware 10.1.4.3.0/11.1.1.5.0/11.1.2.0.0 Access Manager unknown vulnerability
9952| [7313] Oracle Java 1.7.x setSecurityManager memory corruption
9953| [8589] Microsoft System Center Operations Manager 2007 R2/2007 SP1 ViewTypeManager.aspx cross site scripting
9954| [7305] Mozilla Firefox/Thunderbird up to 17.0 ListenerManager Stack-Based memory corruption
9955| [7290] Mozilla Firefox/Thunderbird up to 17.0 nsWindow::OnExposeEvent memory corruption
9956| [7252] Microsoft System Center Operations Manager 2007 ExecuteTask.aspx cross site scripting
9957| [7251] Microsoft System Center Operations Manager 2007 cross site scripting
9958| [63324] Red Hat Enterprise Virtualization Manager up to 2.0 information disclosure
9959| [63323] Red Hat Enterprise Virtualization Manager up to 2.0 SSL Certificate unknown vulnerability
9960| [63238] IBM Tivoli Storage Manager for Space Management File System unknown vulnerability
9961| [63219] IBM Rational ClearQuest up to 7.1.1 Web Client cross site scripting
9962| [63204] Siemens Automation License Manager up to 5.0 Memory Leak denial of service
9963| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
9964| [7167] Google Chrome up to 23.0.1271.96 Chromoting Client Plugin memory corruption
9965| [7164] Google Chrome up to 23.0.1271.96 Visibility Event denial of service
9966| [63165] HP Network Node Manager i 9.10 memory corruption
9967| [7102] IBM eDiscovery Manager 220 cross site scripting
9968| [7073] Apache Tomcat up to 6.0.35/7.0.31 CSRF Prevention Filter cross site request forgery
9969| [7053] McAfee Gateway 7.0/7.0.1/7.0.2 Secure Web Delivery Client denial of service
9970| [63083] IBM Tivoli Endpoint Manager up to 8.1 denial of service
9971| [63051] OpenVAS OpenVAS Manager manage_sql.c send_to_sourcefire privilege escalation
9972| [63050] AWCM ar web content manager up to 2.2 Web Content Manager show_video.php denial of service
9973| [63049] AWCM ar web content manager 2.2 Web Content Manager cookie_gen.php privilege escalation
9974| [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
9975| [7006] Mozilla Firefox 17.0 nsWindow::OnExposeEvent memory corruption
9976| [6972] Mozilla Firefox/Thunderbird 16.0.1/16.0.2 FireClipboardEvent memory corruption
9977| [6991] IBM Business Process Manager up to 8.0.1 Integrated Solution ConsoleInput Validation cross site scripting
9978| [6970] IBM Business Process Manager 8.0/8.0.1 Missing Document Attachment Control cross site scripting
9979| [7221] Novell NetIQ 2.3.0/2.3.1 Privileged User Manager unifid.exe pa_modify_accounts weak authentication
9980| [7220] Novell NetIQ 2.3.0/2.3.1 Privileged User Manager unifid.exe set_log_config directory traversal
9981| [7219] Novell NetIQ 2.3.0/2.3.1 Privileged User Manager unifid.exe ldapagnt_eval Perl Code privilege escalation
9982| [6966] RSA Data Protection Manager Appliance up to 3.2 cross site scripting
9983| [6965] RSA Data Protection Manager Appliance up to 3.2 Account weak authentication
9984| [62857] Jpmorganchase Chase mobile X509TrustManager spoofing
9985| [62830] Apache Commons-httpclient 3.0 Payments spoofing
9986| [62828] Amazon Elastic Load Balancing API Tools 1.0 X509TrustManager spoofing
9987| [62818] Cisco Prime Data Center Network Manager up to 5.x privilege escalation
9988| [6881] IBM Tivoli Federated Identity Manager up to 6.2.2 OpenID Validator cross site scripting
9989| [6880] IBM Tivoli Federated Identity Manager up to 6.2.2 Management Console information disclosure
9990| [62765] Hitachi JP1/ServerConductor/DeploymentManager TFTP Service directory traversal
9991| [6831] Microsoft Office Picture Manager 2010 File memory corruption
9992| [8445] Google Chrome errorEventSender ImageLoader.cpp memory corruption
9993| [6792] Oracle MySQL Server up to 5.5.26 MySQL Client information disclosure
9994| [6786] Oracle MySQL Server up to 5.5.26 MySQL Client sql injection
9995| [6744] Oracle PeopleSoft 8.50/8.51/8.52 Tree Manager unknown vulnerability
9996| [6696] Oracle Fusion Middleware 2.0/11.1.1.4.0/11.1.1.6.0 Event Processing unknown vulnerability
9997| [11267] Novell Identity Manager sessionID weak authentication
9998| [6644] Mozilla Firefox/Thunderbird 15 IME State Manager GetNameSpaceID memory corruption
9999| [6624] Microsoft SQL Server up to 2012 Report Manager cross site scripting
10000| [62537] HP Network Node Manager i 9.20 information disclosure
10001| [62493] Guac-dev Guacamole 0.5.0/0.6.0/0.6.2 guac_client_plugin_open memory corruption
10002| [6574] IBM Tivoli Federated Identity Manager up to 6.2.2 XML Validator weak authentication
10003| [6571] Cisco Unified Communications Manager up to 8.5(1)su3 SIP Network Packet denial of service
10004| [6565] Trend Micro Control Manager 5.5/6 AdHocQuery_Processor.aspx sql injection
10005| [62416] SQLiteManager 1.2.4 main.php cross site scripting
10006| [6563] Novell GroupWise 2012/8.0/8.00/8.01/8.02 Client for Windows memory corruption
10007| [6514] Microsoft Internet Explorer 9 Event Listener Use-After-Free memory corruption
10008| [62396] Apple Mac OS X up to 10.3 Profile Manager unknown vulnerability
10009| [62381] HP Network Node Manager i 9.10 cross site scripting
10010| [6542] EMC RSA Authentication Client 3.5 weak authentication
10011| [6337] Apple iOS up to 5.1.1 DHCP Client Uninitialized Memory information disclosure
10012| [62355] Hitachi JP1/Cm2/Network Node Manager memory corruption
10013| [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
10014| [62283] Cisco AnyConnect Secure Mobility Client VPN Downloader information disclosure
10015| [62282] Cisco AnyConnect Secure Mobility Client ScanSafe unknown vulnerability
10016| [11037] IBM DB2 UDB 10.1 Index Manager Crafted Reorg Table memory corruption
10017| [62239] Microsoft Systems Management Server 2003 Configuration Manager Reflected cross site scripting
10018| [62204] IBM Tivoli Service Request Manager up to 7.0 information disclosure
10019| [62202] IBM Tivoli Service Request Manager up to 7.0 unknown vulnerability
10020| [62201] IBM Tivoli Service Request Manager up to 7.0 sql injection
10021| [62197] IBM Tivoli Service Request Manager up to 7.0 cross site request forgery
10022| [62178] Honeywellprocess Enterprise Building Manager R410.1 ActiveX Control Stack-based memory corruption
10023| [61955] Epractizelabs Subscription Manager 1.0 showImg.php memory corruption
10024| [6081] Digium Asterisk up to 1.8.15.0/10.7.0 Manager Interface main/manager.c privilege escalation
10025| [61776] John Geo Blogs Manager up to 1.101 authors_list.php sql injection
10026| [61751] McAfee Enterprise Mobility Manager up to 9.5 information disclosure
10027| [61750] McAfee Enterprise Mobility Manager up to 9.5 User Account About.aspx information disclosure
10028| [61749] McAfee Enterprise Mobility Manager up to 9.5 About.aspx cross site scripting
10029| [61747] McAfee Enterprise Mobility Manager Agent denial of service
10030| [61746] McAfee Enterprise Mobility Manager Agent spoofing
10031| [61682] IBM Rational ClearQuest up to 7.1.1 Web Client cross site scripting
10032| [61669] HP Service Center Web Tier 6.28 Service Manager cross site scripting
10033| [61668] HP Service Center Server 6.2.8 Service Manager denial of service
10034| [61651] Transmission up to 0.89 Web Client cross site scripting
10035| [61612] Timely All-in-One Event Calendar up to 1.4 cross site scripting
10036| [61589] Itechscripts Proman Xpress 5.0.1 client_details.php cross site scripting
10037| [61497] HP Network Node Manager i 9.03 cross site scripting
10038| [61489] Cisco IOS 15.1/15.2 Clientless SSL VPN denial of service
10039| [5914] SUSE Manager up to 0.2.1 on Linux auditlog-keeper.conf unknown vulnerability
10040| [5919] Cisco AnyConnect Secure Mobility Client up to 3.0.07059 spoofing
10041| [5918] Cisco AnyConnect Secure Mobility Client up to 3.0.07059 vpnagentd denial of service
10042| [5917] Cisco AnyConnect Secure Mobility Client up to 3.0.08066 spoofing
10043| [5916] Cisco AnyConnect Secure Mobility Client up to 3.0.07059 spoofing
10044| [5907] Novell Remote Manager 2.0.2 Release 99.10 Small Http Interface Daemon ProcessAuthorizationFailure HTTP Header denial of service
10045| [5725] Oracle Enterprise Manager up to 10.2.0.5/11.1.0.1/12.1.0.2 DB Performance Advisories/UIs unknown vulnerability
10046| [5703] Oracle Fusion Middleware 10.1.3.5 Enterprise Manager unknown vulnerability
10047| [5694] Oracle Database Server 11.1.0.7/11.2.0.2/11.2.0.3 Enterprise Manager Advisories/UIs unknown vulnerability
10048| [5670] Mozilla Firefox up to 13.0 IsEventBased memory corruption
10049| [61306] HP AssetManager 5.20/5.21/5.22/9.30 cross site scripting
10050| [5667] EMC RSA Authentication Manager up to 7.1 unknown vulnerability
10051| [5665] EMC RSA Authentication Manager up to 7.1 cross site scripting
10052| [5664] EMC RSA Authentication Manager up to 7.1 cross site scripting
10053| [61218] HP Network Node Manager i 9.03 cross site scripting
10054| [61196] MyClientBase 0.12 cross site scripting
10055| [61195] MyClientBase 0.12 sql injection
10056| [61182] Red Hat dtach 0.8 IRC Client attach.c information disclosure
10057| [5638] EMC RSA Access Manager up to 6.1 SP1 weak authentication
10058| [5618] Horde IMP Webmail Client up to 5.0.21 File cross site scripting
10059| [5596] Red Hat RPM Package Manager up to 4.8.0 Perl privilege escalation
10060| [5597] dhcpcd 3.2.3 DHCP Client Stack-based memory corruption
10061| [61042] Cisco AnyConnect Secure Mobility Client VPN Downloader memory corruption
10062| [61040] Cisco AnyConnect Secure Mobility Client up to 2.1 VPN Downloader unknown vulnerability
10063| [5577] Cisco AnyConnect Secure Mobility Client up to 3.0 VPN Downloader WebLaunch Java/ActiveX memory corruption
10064| [61025] Canonical Linux 11.04/11.10/12.04 Update Manager unknown vulnerability
10065| [61022] Dell Wyse Device Manager 4.7.1 hagent.exe memory corruption
10066| [60872] Canonical Linux 11.04/11.10/12.04 Update Manager unknown vulnerability
10067| [5468] Sony VAIO up to 3.0 Wireless Manager WifiMan.dll HTML Page memory corruption
10068| [5472] Digium Asterisk up to 10.4.0 Channel Driver channels/chan_skinny.c schedule_delivery() Client Connection Termination denial of service
10069| [60776] Kolja Schleich LeagueManager 3.7 cross site scripting
10070| [60740] SAP NetWeaver 7.0 disp+work.exe DiagiEventSource denial of service
10071| [60710] Oracle Database 11g 11.1.0.7 Enterprise Manager unknown vulnerability
10072| [60703] Cisco Unified Communications Manager 8.5 Stack-Based denial of service
10073| [60698] Cisco Intrusion Prevention System 7.1 denial of service
10074| [60697] Cisco Unified Communications Manager up to 7.1%282a%29su1 Memory Leak denial of service
10075| [60679] Cisco IOS 12.2/12.3/12.4/15.0 Telnet Client unknown vulnerability
10076| [5336] HP Insight Manager up to 6.3 weak authentication
10077| [5331] HP Insight Manager up to 6.3 denial of service
10078| [5330] HP Insight Manager up to 6.3 privilege escalation
10079| [5329] HP Insight Manager up to 6.3 cross site request forgery
10080| [5327] HP Insight Manager up to 6.3 privilege escalation
10081| [5326] Nokia PC Suite Video Manager up to 7.1.180.64 MP4 denial of service
10082| [5110] Oracle Fusion Middleware 11.1.1.3/11.1.1.5 Identity Manager unknown vulnerability
10083| [5106] Oracle Enterprise Manager Security Framework unknown vulnerability
10084| [5105] Oracle Database Server 10.2.0.3/10.2.0.4/10.2.0.5/11.1.0.7 Enterprise Manager Base Platform /em/console/logon/logon weak authentication
10085| [5104] Oracle Enterprise Manager 10.2.0.5 Schema Management unknown vulnerability
10086| [5103] Oracle Database Server up to 11.2.0.3 Enterprise Manager Base Platform grantObjPrivs privilege escalation
10087| [5102] Oracle Enterprise Manager 10.2.0.5 Schema Management unknown vulnerability
10088| [5101] Oracle Database Server up to 11.2.0.3 Enterprise Manager Base Platform table prevPage privilege escalation
10089| [5100] Oracle Enterprise Manager 10.2.0.5/11.1.0.1 Config Management unknown vulnerability
10090| [5099] Oracle Database Server 11.1.0.7/11.2.0.2/11.2.0.3 Enterprise Manager Base Platform searchPage sql injection
10091| [5094] Oracle Enterprise Manager 10.2.0.5/11.1.0.1 Security Framework unknown vulnerability
10092| [5093] Oracle Database Server 10.2.0.3/10.2.0.4/10.2.0.5/11.1.0.7/11.2.0.2 Enterprise Manager Base Platform unknown vulnerability
10093| [5091] Oracle PeopleSoft Enterprise HRMS 9 eCompensation Manager Desktop unknown vulnerability
10094| [5089] Oracle Fusion Middleware 9.1.0.4 Identity Manager Connector unknown vulnerability
10095| [5086] Oracle Enterprise Manager Config Management unknown vulnerability
10096| [5085] Oracle Database Server 11.1.0.7/11.2.0.2 Enterprise Manager Base Platform compareWizFirstConfig sql injection
10097| [60584] Cloudera Manager up to 3.7.4 Configuration Manager taskcontroller.cfg unknown vulnerability
10098| [5285] Samba up to 3.6.x ReportEventW memory corruption
10099| [5282] Samba up to 3.6.x SetInfoPolicy AuditEventsInfo memory corruption
10100| [5039] Red Hat RPM Package Manager 4.9.1.2 Header Region Size lib/header.c headerLoad privilege escalation
10101| [5038] Red Hat RPM Package Manager 4.9.1.2 Region Tag Parser privilege escalation
10102| [5037] Red Hat RPM Package Manager 4.9.1.2 Header Ranger Parser lib/header.c headerVerifyInfo privilege escalation
10103| [5026] Joomla CMS 2.5.0/2.5.1/2.5.2/2.5.3 Update Manager cross site scripting
10104| [60531] HP Performance Manager 9.00 memory corruption
10105| [60520] AtMail AtMail Open up to 1.04 Webmail Client phpinfo unknown vulnerability
10106| [60519] AtMail AtMail Open up to 1.3 Webmail Client mime.php directory traversal
10107| [60518] Atmail AtMail Open up to 1.3 Webmail Client compose.php directory traversal
10108| [60517] AtMail AtMail Open up to 1.3 Webmail Client compose.php directory traversal
10109| [60516] AtMail AtMail Open up to 1.3 Webmail Client memory corruption
10110| [4976] Novell iManager 2.7 sql injection
10111| [4975] Novell iManager 2.7 SP4 Patch 2 cross site scripting
10112| [4876] GnuTLS up to 2.12 libtasn1 asn1_get_length_der X.509 Client Certificate memory corruption
10113| [60442] GE Intelligent Platforms Proficy Plant Applications up to 4.2.2 License Manager PRLicenseMgr.exe memory corruption
10114| [4841] VMware vShield Manager up to 4.0.1/4.1.0 cross site request forgery
10115| [4839] VMware vSphere Client 4.1/5.0 Logging cross site scripting
10116| [4838] VMware View 4.6.0 View Manager Portal cross site scripting
10117| [4913] IBM Tivoli Endpoint Manager 8.1 HTTPOnly Flag Cookie Handling information disclosure
10118| [4828] IBM Tivoli Endpoint Manager up to 8.x Web Reports cross site scripting
10119| [4797] VMware vCenter 1.6.2/2.0.0 Chargeback Manager privilege escalation
10120| [60339] Cisco Unified Communications Manager up to 7.x sql injection
10121| [60338] Cisco Unified Communications Manager up to 7.x denial of service
10122| [4677] Novell GroupWise Client 8.0 Novell Address Book File memory corruption
10123| [4657] Google Chrome 17.0.963.46 Native Client Validator Use-After-Free denial of service
10124| [60173] Zoho ManageEngine Applications Manager 9.2 sql injection
10125| [60172] Zoho ManageEngine Applications Manager 9.2 showHistoryData.do cross site scripting
10126| [60160] Zoho ManageEngine ADManager Plus 5.2 cross site scripting
10127| [4680] VMware Zimbra Web Client zimbra/h/calendar cross site scripting
10128| [4625] Google Chrome 16.0.912.77 Paste Event memory corruption
10129| [4620] Google Chrome 16.0.912.77 Mousemove Event Use-After-Free memory corruption
10130| [60073] phux Download Manager download.php sql injection
10131| [4599] Skype Client up to 5.8.0.154 unknown vulnerability
10132| [91248] Zoho ManageEngine Monitoring Manager 9.x/10.x showresource.do cross site scripting
10133| [91247] Zoho ManageEngine Monitoring Manager 9.x/10.x PopUp_Graph.jsp cross site scripting
10134| [91246] Zoho ManageEngine Monitoring Manager 9.x/10.x ThresholdActionConfiguration.jsp cross site scripting
10135| [59952] Cisco Digital Media Manager up to 5.2.1 memory corruption
10136| [5192] Oracle Fusion Middleware up to 11.1.1.5 Web Services Manager information disclosure
10137| [5191] Oracle Fusion Middleware up to 11.1.1.5 Web Services Manager unknown vulnerability
10138| [5190] Oracle Fusion Middleware up to 11.1.1.5 Web Services Manager unknown vulnerability
10139| [59916] Cluster Resources TORQUE Resource Manager up to 1.2.x memory corruption
10140| [59906] Siemens Automation License Manager up to 5.1 ActiveX Control almaxcx.dll directory traversal
10141| [59905] Siemens Automation License Manager up to 5.1 NULL Pointer Dereference denial of service
10142| [59904] Siemens Automation License Manager up to 5.1 grant->VERSION denial of service
10143| [59903] Siemens Automation License Manager up to 5.1 memory corruption
10144| [59894] Siemens Tecnomatix FactoryLink 6.6.1 Client ActiveX Control memory corruption
10145| [59876] IBM Tivoli Federated Identity Manager 6.2.0 unknown vulnerability
10146| [59839] novell Sentinel Log Manager up to 1.2.0.1 938 directory traversal
10147| [59803] Trend Micro Control Manager up to 5.4 CmdProcessor.exe AddTask memory corruption
10148| [4496] Mozilla Firefox up to 7.0.1 SVG accessKey Event NULL Pointer Dereference privilege escalation
10149| [59714] Parallels Plesk Panel 10.2.0 Build20110407.20 Control Panel file-manager sql injection
10150| [59692] Phpletter Ajax File and Image Manager up to 0.8 unknown vulnerability
10151| [59680] WHMCS WHMCompleteSolution 3.0.0 clientarea.php directory traversal
10152| [4449] Microsoft Windows CSRSS Device Event Message privilege escalation
10153| [59633] IBM Rational Asset Manager up to 7.0.0.1 cross site scripting
10154| [59585] HP Protecttools Device Access Manager up to 6.0.0.8 memory corruption
10155| [59486] Zabbix up to 1.8.1 events.php sql injection
10156| [59473] Zenprise Zenprise Device Manager up to 6.1.0 cross site request forgery
10157| [59468] VMware vCenter Update Manager Default Configuration directory traversal
10158| [59455] HP Network Node Manager i 9.03 cross site scripting
10159| [59454] HP Network Node Manager i 9.03 cross site scripting
10160| [59411] EMC Rsa Key Manager Appliance up to 2.6 memory corruption
10161| [10630] Cisco Router and Security Device Manager weak authentication
10162| [59319] Emophp EMO Realty Manager sql injection
10163| [59309] HP OpenView Network Node Manager 7.53 memory corruption
10164| [59308] HP OpenView Network Node Manager 7.53 memory corruption
10165| [59307] HP OpenView Network Node Manager 7.53 memory corruption
10166| [59306] GE Intelligent Platforms Proficy Historian License Manager PRProficyMgr.exe memory corruption
10167| [59302] esoftpro Online Contact Manager 3.0 view.php sql injection
10168| [59297] Kay Messerschmidt Com Eventcal 1.6.4 index.php sql injection
10169| [59260] Cisco Unified Communications Manager up to 7.x Memory Leak denial of service
10170| [59235] Cisco Unified Communications Manager up to 5.1%282%29 directory traversal
10171| [59129] Oracle PeopleSoft Enterprise HRMS 8.9 Profile Manager unknown vulnerability
10172| [59126] Oracle PeopleSoft Enterprise HRMS 9.1 Talent Acquisition Manager unknown vulnerability
10173| [59121] Oracle Fusion Middleware 10.1.3.5.1 Web Services Manager unknown vulnerability
10174| [59085] Oracle Fusion Middleware 10.1.3.5 Web Services Manager unknown vulnerability
10175| [58967] Joachim Ruhs Event 0.2.2/0.2.4/0.2.5/0.2.7/0.3.4 sql injection
10176| [58917] WebManager-Pro CMS WebManager-Pro up to 7.4.3 c.php unknown vulnerability
10177| [58916] WebManager-Pro CMS WebManager-Pro up to 7.4.2 c.php sql injection
10178| [58905] Novell Identity Manager User Application 3.7.0 cross site scripting
10179| [58902] Novell Identity Manager User Application 3.7.0 cross site scripting
10180| [58872] Cisco Nac Manager 4.8 directory traversal
10181| [58855] Danieljamesscott Com Clubmanager index.php sql injection
10182| [58851] Galaxyscriptz MyPhpAuction 2010 product_desc.php sql injection
10183| [58805] Cisco Unified Communications Manager up to 7.1 Memory Leak denial of service
10184| [58792] Symantec IM Manager Management Console memory corruption
10185| [58791] Symantec IM Manager Management Console sql injection
10186| [58790] Symantec IM Manager Management Console cross site scripting
10187| [58747] Sonexis ConferenceManager 9.3.14.0 sql injection
10188| [58746] Sonexis ConferenceManager 9.2.11.0 HostLogin.asp cross site scripting
10189| [58745] Sonexis ConferenceManager 9.2.11.0/9.3.14.0 myAddressBook.asp cross site scripting
10190| [58741] Zoho ManageEngine EventLog Analyzer 6.1 INDEX.do cross site scripting
10191| [58740] Zoho ManageEngine EventLog Analyzer 6.1 Eventlog SysEvttCol.exe memory corruption
10192| [58730] Phpwebscripts Ad Manager Pro 3.0 website-page.php sql injection
10193| [58717] WEBinsta mailing list manager 1.3e Error Message information disclosure
10194| [58435] Novell Cloud Manager up to 1.1.1 memory corruption
10195| [58422] Juniper IDP 4.1/4.1r1/4.1r2/4.2 Configuration Manager cross site scripting
10196| [58380] Cisco Unified Communications Manager up to 8.x denial of service
10197| [58379] Cisco Unified Communications Manager up to 8.x denial of service
10198| [58378] Cisco Unified Communications Manager up to 7.x denial of service
10199| [58377] Cisco Unified Communications Manager up to 7.x denial of service
10200| [58376] Cisco Unified Communications Manager 4.3 Memory Consumption denial of service
10201| [58375] Cisco Unified Communications Manager up to 7.1 unknown vulnerability
10202| [58290] Clusterresources TORQUE Resource Manager up to 2.4.7 privilege escalation
10203| [58279] IBM Tivoli Federated Identity Manager unknown vulnerability
10204| [58277] IBM Tivoli Federated Identity Manager unknown vulnerability
10205| [58276] IBM Tivoli Federated Identity Manager spoofing
10206| [58266] HP Proliant Sl Advanced Power Manager up to 1.9 Firmware denial of service
10207| [91157] McAfee Web Gateway 6.8.6.x Incident Manager cross site scripting
10208| [4395] Microsoft Windows Client/Server Run-Time Subsystem privilege escalation
10209| [91981] Hyperic HQ Enterprise 4.5.1 Escalation Schemes Configuration Client cross site scripting
10210| [91957] byRemote Surveillance Center 2.0 /events.jsp sql injection
10211| [91272] MODX CMS v1.0.x /modx/manager/index.php cross site scripting
10212| [91271] MODX CMS v1.0.x /modx/manager/ cross site scripting
10213| [91270] MODX CMS v1.0.x /modx/manager/index.php cross site scripting
10214| [91269] MODX CMS v1.0.x /modx/manager/index.php cross site scripting
10215| [91146] Bitweaver Framework v2.8.1 list_events.php sql injection
10216| [91252] OpenEMR 3.2.x add_edit_event.php sql injection
10217| [91249] OpenEMR 3.2.x add_edit_event.php sql injection
10218| [58052] Oracle Netra Sparc T3-1b Integrated Lights Out Manager unknown vulnerability
10219| [58039] Oracle Netra Sparc T3-1b Integrated Lights Out Manager unknown vulnerability
10220| [58031] Oracle PeopleSoft Products 9.1 Talent Acquisition Manager unknown vulnerability
10221| [58030] Oracle PeopleSoft Products 9.1 Talent Acquisition Manager unknown vulnerability
10222| [58017] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10223| [58011] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10224| [58008] Oracle Enterprise Manager Grid Control 10.2.0.5 Security Framework unknown vulnerability
10225| [57995] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10226| [57994] Oracle Enterprise Manager Grid Control 10.1.0.6 unknown vulnerability
10227| [57992] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10228| [57991] Oracle Enterprise Manager Grid Control 10.1.0.6 unknown vulnerability
10229| [57990] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10230| [57989] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10231| [57988] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10232| [57987] Oracle Enterprise Manager Grid Control 10.1.0.6 unknown vulnerability
10233| [57986] Oracle Enterprise Manager Grid Control 10.2.0.5 Security Framework unknown vulnerability
10234| [57985] Oracle Enterprise Manager Grid Control 10.1.0.6 unknown vulnerability
10235| [57981] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10236| [57980] Oracle Enterprise Manager Grid Control 10.1.0.6 unknown vulnerability
10237| [57979] Oracle Enterprise Manager Grid Control 10.1.0.6 unknown vulnerability
10238| [57978] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10239| [91925] Zoho ManageEngine OpManager 8.8 /Login.do information disclosure
10240| [91924] Zoho ManageEngine OpManager 8.8 /ipslaProbeDetails.do sql injection
10241| [57960] Symantec Data Loss Prevention up to 11.0 File Viewer memory corruption
10242| [57907] HP User Access Manager iNodeMngChecker.exe memory corruption
10243| [57899] AWCM AR Web Content Manager 2.1 File Inclusion privilege escalation
10244| [57888] Apache HttpClient 4.0/4.0.1/4.1 Authorization information disclosure
10245| [57787] Clusterresources TORQUE Resource Manager up to 2.4.6 memory corruption
10246| [57651] HP Service Manager 9.21 cross site scripting
10247| [57650] HP Service Manager 9.21 cross site scripting
10248| [57649] HP Service Manager 9.21 information disclosure
10249| [57648] HP Service Manager 9.21 unknown vulnerability
10250| [57647] HP Service Manager 9.21 information disclosure
10251| [57645] HP Service Manager 9.21 Access Restriction unknown vulnerability
10252| [4363] Microsoft Windows SMB Client SMB Response memory corruption
10253| [4358] VMware Virtual Infrastructure up to 3.x Client ActiveX Control memory corruption
10254| [57565] Cisco AnyConnect Secure Mobility Client up to 2.4.201 Downloader vpndownloader.exe memory corruption
10255| [57564] Cisco AnyConnect Secure Mobility Client up to 2.2.135 ActiveX Control vpndownloader.exe memory corruption
10256| [57525] IBM Web Content Manager up to 7.0.0.0 Stack-Based denial of service
10257| [57524] IBM Web Content Manager up to 7.0.0 unknown vulnerability
10258| [57478] cisco Unified Operations Manager cross site scripting
10259| [57476] Cisco Unified Operations Manager sql injection
10260| [57475] Cisco Unified Operations Manager cross site scripting
10261| [57466] IBM Datacap Taskmaster Capture up to 8.0.0 Web Client Service Cleartext unknown vulnerability
10262| [4346] Skype Client 5.x on Mac Message Processor memory corruption
10263| [57337] Cisco Unified Communications Manager up to 8.5.0 xmldirectorylist.jsp sql injection
10264| [57336] Cisco Unified Communications Manager up to 8.5.0 sql injection
10265| [57335] Cisco Unified Communications Manager up to 8.5.0 directory traversal
10266| [57334] Cisco Unified Communications Manager up to 8.5.0 denial of service
10267| [57333] Cisco Unified Communications Manager up to 8.5.0 denial of service
10268| [57332] Cisco Unified Communications Manager up to 8.5.0 Memory Leak denial of service
10269| [57274] HP Systems Insight Manager up to 4.1 cross site request forgery
10270| [57273] HP Systems Insight Manager up to 4.1 cross site scripting
10271| [57262] Digium Asterisk up to C.1.5 Manager Interface manager.c privilege escalation
10272| [57233] HP Network Node Manager i 9.03 unknown vulnerability
10273| [57209] Oracle PeopleSoft Enterprise HRMS 9.1 Talent Acquisition Manager unknown vulnerability
10274| [57199] Oracle Sun Java System Access Manager Policy Agent 2.2 unknown vulnerability
10275| [57155] Oracle Database Server 11.1.0.7 Enterprise Manager unknown vulnerability
10276| [57121] HP Network Node Manager i 9.00 cross site scripting
10277| [57042] AWCM AR Web Content Manager 2.2 search.php cross site scripting
10278| [57013] HP Network Node Manager i 9.03 information disclosure
10279| [56977] Digium Asterisk up to 1.6.1.18 manager.c denial of service
10280| [56877] OTRS Mail Client unknown vulnerability
10281| [56842] RSA Access Manager Server 6.0.4 privilege escalation
10282| [56848] HP Client Automation Enterprise 7.9 memory corruption
10283| [56826] HP Power Manager up to 4.2.7 cross site scripting
10284| [4313] Microsoft Windows Remote Desktop Client Designfehler
10285| [56705] Apple iTunes up to 10.1 Event Listener memory corruption
10286| [56636] F-Secure Policy Manager up to 8.x Error Message information disclosure
10287| [56635] F-Secure Policy Manager cross site scripting
10288| [56611] Cisco TelePresence Manager up to 1.6.2 RMI Interface memory corruption
10289| [56610] Cisco TelePresence Manager up to 1.6.2 unknown vulnerability
10290| [56609] Cisco TelePresence Manager up to 1.6.2 memory corruption
10291| [56562] IBM FileNet P8 Content Manager up to 4.0.1 privilege escalation
10292| [56545] novell ZENworks Configuration Manager up to 10.3.1 novell-tftp.exe memory corruption
10293| [56506] Scadaengine BACnet OPC Client up to 1.0.23 csv memory corruption
10294| [56390] HP Data Protector Cell Manager crs.exe memory corruption
10295| [4291] OpenSSL up to 1.0.0c ClientHello Handshake memory corruption
10296| [56470] EMC Replication Manager up to 5.2.2 irccd.exe RunProgram privilege escalation
10297| [56389] HP Power Manager up to 4.2.7 Admin cross site request forgery
10298| [56362] AWCM AR Web Content Manager 2.2 index.php directory traversal
10299| [4284] Apache Tomcat 5.x HTML Manager Infinite Loop cross site scripting
10300| [56347] Google Chrome up to 8.0.552.208 Event Crash denial of service
10301| [56360] Erick Woods Terminal Server Client 0.150 src/support.c tsc_launch_remote memory corruption
10302| [56359] Erick Woods Terminal Server Client 0.150 src/support.c tsc_launch_remote memory corruption
10303| [56299] Symantec IM Manager up to 6.0 IMAdminSchedTask.asp ScheduleTask() memory corruption
10304| [56245] OpenVAS OpenVAS Manager up to 2.0 manage_sql.c email privilege escalation
10305| [56289] Adobe ColdFusion up to 9.0.1 Event cross site scripting
10306| [56261] Sun OpenOffice up to 3.2.1 WW8ListManager memory corruption
10307| [4255] HP OpenView Storage Data Protector up to 6.x Cell Manager memory corruption
10308| [56127] Oracle Enterprise Manager Grid Control 6.0 sql injection
10309| [56117] IBM Tivoli Access Manager for e-business up to 6.1.0.3 directory traversal
10310| [4245] Oracle Enterprise Manager 10.x Grid Control JSP File privilege escalation
10311| [87105] OpenVAS Manager manage_sql.c Email privilege escalation
10312| [56169] Wayneeseguin Ruby Version Manager Terminal privilege escalation
10313| [56158] Oracle Peoplesoft And Jdedwards Product Suite 9.1 Talent Acquisition Manager unknown vulnerability
10314| [56157] Sun Java System Access Manager 7.1 unknown vulnerability
10315| [56154] Oracle Peoplesoft And Jdedwards Product Suite 9.1 Talent Acquisition Manager unknown vulnerability
10316| [56149] Sun Solaris 5.10 CDE Calendar Manager Service Daemon rpc.cmsd memory corruption
10317| [56144] Oracle Supply Chain Products Suite 9.3.1 Web Client unknown vulnerability
10318| [56057] HP OpenView Network Node Manager 7.53 privilege escalation
10319| [56055] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
10320| [56054] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
10321| [56052] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
10322| [56051] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
10323| [56050] HP OpenView Network Node Manager 7.53 ovutil.dll memory corruption
10324| [56049] HP OpenView Network Node Manager 7.53 ovas.exe memory corruption
10325| [56048] HP OpenView Network Node Manager 7.53 ovwebsnmpsrv.exe stringToSeconds memory corruption
10326| [56047] HP OpenView Network Node Manager 7.53 jovgraph.exe memory corruption
10327| [56056] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
10328| [56053] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
10329| [56197] HP Data Protector Manager 6.11 rds.exe denial of service
10330| [56014] NetSupport NetSupport Manager Agent 11.00 Stack-based memory corruption
10331| [55964] TIBCO Collaborative Information Manager unknown vulnerability
10332| [55963] TIBCO Collaborative Information Manager information disclosure
10333| [55962] TIBCO Collaborative Information Manager cross site scripting
10334| [55961] TIBCO Collaborative Information Manager sql injection
10335| [55960] Novell Identity Manager Roles Based Provisioning Module cross site scripting
10336| [55893] IBM Tivoli Access Manager for e-business up to 6.1.0 denial of service
10337| [55867] IBM Tivoli Storage Manager up to 6.2.0 Storage Management privilege escalation
10338| [55863] IBM Rational ClearQuest up to 7.1.1 Web Client privilege escalation
10339| [55861] IBM Rational ClearQuest up to 7.1.1 Web Client information disclosure
10340| [55892] IBM Tivoli Access Manager for e-business up to 6.1.0 directory traversal
10341| [55848] IBM Lotus Mobile Connect up to 6.1.2 Connection Manager unknown vulnerability
10342| [55847] IBM Lotus Mobile Connect up to 6.1.2 Connection Manager Memory Consumption denial of service
10343| [55846] IBM Lotus Mobile Connect up to 6.1.2 Connection Manager denial of service
10344| [55845] IBM Lotus Mobile Connect up to 6.1.2 Connection Manager Memory Consumption denial of service
10345| [55843] IBM Lotus Mobile Connect up to 6.1.2 Connection Manager cross site scripting
10346| [55836] HP Power Manager up to 4.2.6 Stack-based memory corruption
10347| [55817] Dmasoftlab Radius Manager 3.8.0 admin.php cross site scripting
10348| [55802] Sap NetWeaver Business Client ActiveX Control sapwdpcd.dll memory corruption
10349| [55671] Red Hat spice-activex ImpersonateNamedPipeClient unknown vulnerability
10350| [55888] Novell iPrint Client 5.52 ActiveX Control ienipp.ocx GetDriverSettings() memory corruption
10351| [55480] Apple Mac OS X 10.6.5 Mail Client information disclosure
10352| [58479] Edgetechweb Event Registration up to 5.32 sql injection
10353| [55400] Cisco Intelligent Contact Manager up to 5.x agent.exe memory corruption
10354| [55338] Netsupportsoftware NetSupport Manager Cleartext information disclosure
10355| [55286] IBM Tivoli Provisioning Manager Os Deployment 7.1.1.3 unknown vulnerability
10356| [55277] HP Version Control Repository Manager up to 2.0.1.29 cross site scripting
10357| [87078] Symantec IM Manager sql injection
10358| [87077] Symantec IM Manager sql injection
10359| [55269] Symantec IM Manager rdpageimlogic.aspx sGetDefinition sql injection
10360| [55249] HP Virtual Connect Enterprise Manager 6.1 weak authentication
10361| [55245] TYPO3 up to 4.4.3 Extension Manager unknown vulnerability
10362| [55226] HP Systems Insight Manager up to 4.1 privilege escalation
10363| [55225] HP Systems Insight Manager up to 4.1 cross site scripting
10364| [55224] HP Systems Insight Manager cross site request forgery
10365| [87076] IBM Tivoli Access Manager for e-business ibm/wpm/webseal cross site scripting
10366| [87075] IBM Tivoli Access Manager for e-business ibm/wpm/user cross site scripting
10367| [87074] IBM Tivoli Access Manager for e-business ibm/wpm/rule cross site scripting
10368| [87073] IBM Tivoli Access Manager for e-business ibm/wpm/pop cross site scripting
10369| [87072] IBM Tivoli Access Manager for e-business ibm/wpm/os cross site scripting
10370| [87071] IBM Tivoli Access Manager for e-business ibm/wpm/gsogroup cross site scripting
10371| [87070] IBM Tivoli Access Manager for e-business ibm/wpm/gso cross site scripting
10372| [87069] IBM Tivoli Access Manager for e-business ibm/wpm/group cross site scripting
10373| [87068] IBM Tivoli Access Manager for e-business ibm/wpm/domain cross site scripting
10374| [87067] IBM Tivoli Access Manager for e-business ibm/wpm/acl cross site scripting
10375| [55285] IBM Tivoli Access Manager for e-business up to 6.1.0 cross site scripting
10376| [55118] G.rodola pyftpdlib 0.1/0.1.1 FTP Client ftp_PORT unknown vulnerability
10377| [55098] HP Systems Insight Manager 6.1 unknown vulnerability
10378| [55093] Red Hat Enterprise MRG up to 1.1.0 Cluster::deliveredEvent denial of service
10379| [55005] Oracle Database Server 10.1.0.5 Enterprise Manager unknown vulnerability
10380| [55003] Oracle E-Business Suite 11.5.10.2 Applications Manager unknown vulnerability
10381| [4194] Microsoft Windows 7/Server 2008/Vista SChannel Client Certificate Request denial of service
10382| [57247] Site2Nite Auto e-Manager detail.asp sql injection
10383| [54950] Jasig phpCAS up to 1.1.2 client.php callback directory traversal
10384| [54948] Jasig phpCAS up to 1.1.2 client.php callback cross site scripting
10385| [54915] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 memory corruption
10386| [54914] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 FastBackMount.exe denial of service
10387| [54913] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 FastBackMount.exe memory corruption
10388| [54912] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 FastBackServer.exe ActivateLTScriptReply) memory corruption
10389| [54910] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 FastBackServer.exe _CalcHashValueWithLength denial of service
10390| [54909] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 FastBackServer.exe _DAS_ReadBlockReply denial of service
10391| [54908] IBM Tivoli Storage Manager Fastback up to 5.5.6.0 FastBackServer.exe FXCLI_OraBR_Exec_Command memory corruption
10392| [58889] MODX Revolution 2.0.2-pl manager/index.php cross site scripting
10393| [54864] Blueriver Sava CMS up to 5.2 fileManager.cfc directory traversal
10394| [54838] HP OpenView Network Node Manager 7.53 denial of service
10395| [4185] Microsoft Windows Client/Server Run-Time Subsystem privilege escalation
10396| [54699] IBM Filenet Content Manager up to 4.5.0 unknown vulnerability
10397| [54698] IBM Filenet Content Manager up to 4.5.0 information disclosure
10398| [54697] IBM Filenet Content Manager up to 4.5.0 Cleartext information disclosure
10399| [54696] IBM Filenet Content Manager up to 4.5.0 cross site scripting
10400| [54762] Symphony CMS 2.0.7/2.1.1 event.section.php sql injection
10401| [54673] RSA Access Manager Server up to 6.0.3 information disclosure
10402| [54672] RSA Access Manager Agent up to 4.7.0 Adaptive Authentication information disclosure
10403| [58938] DMXReady Polling Booth Manager inc_pollingboothmanager.asp sql injection
10404| [54524] Cisco Unified Communications Manager up to 7.x denial of service
10405| [54523] Cisco Unified Communications Manager up to 7.x denial of service
10406| [54562] Adobe Extension Manager CS5 5.0.298 dwmapi.dll memory corruption
10407| [54507] DevonIT thin-client management tool Cleartext unknown vulnerability
10408| [54506] DevonIT thin-client management tool Console memory corruption
10409| [54448] DeskShare Auto Ftp Manager 4.31 directory traversal
10410| [54446] 3dftp 3D-FTP Client 9.02 directory traversal
10411| [54443] HP OpenView Network Node Manager 7.53 memory corruption
10412| [54439] SmartFTP 4.0.1124.0 tftp Client directory traversal
10413| [54436] SoftX FTP Client 3.3 directory traversal
10414| [54427] IBM Tivoli Storage Manager Fastback denial of service
10415| [54426] IBM Tivoli Storage Manager Fastback denial of service
10416| [54425] IBM Tivoli Storage Manager Fastback memory corruption
10417| [54424] IBM Tivoli Storage Manager Fastback memory corruption
10418| [54392] ZNC 0.092 Ping Command Client.cpp denial of service
10419| [54440] Porta+ FTP Client 4.1 directory traversal
10420| [54343] Citrix ICA Client for Linux memory corruption
10421| [54255] Red Hat JBoss Enterprise Application Platform 4.3.0 Java Security Manager memory corruption
10422| [54263] HP OpenView Network Node Manager 7.53 webappmon.exe memory corruption
10423| [55250] IBM Rational Test Lab Manager Default Password memory corruption
10424| [54167] IBM FileNet Content Manager up to 4.0.0 unknown vulnerability
10425| [54159] Christian Ehmann Event Registr up to 1.0.0 sql injection
10426| [54149] Emophp EMO Breeder Manager video.php sql injection
10427| [54148] HP OpenView Network Node Manager 7.53 nnmrptconfig.exe memory corruption
10428| [54135] Jared Meeker Event Horizon 1.1.10 modfile.php sql injection
10429| [54134] Jared Meeker Event Horizon 1.1.10 Error Message modfile.php cross site scripting
10430| [54144] RSA Federated Identity Manager unknown vulnerability
10431| [54103] HP Client Automation Enterprise Infrastructure Default Configuration denial of service
10432| [54102] HP Virtual Connect Enterprise Manager up to 6.9 cross site scripting
10433| [54147] HP OpenView Network Node Manager 7.53 webappmon.exe execvp_nc memory corruption
10434| [54184] Pidgin up to 2.7.1 Protocol Plugin family_icbm.c clientautoresp denial of service
10435| [54059] Oracle Enterprise Manager Grid Control 10.2.0.5 unknown vulnerability
10436| [54052] Oracle E-Business Suite 11.5.10.2 Applications Manager unknown vulnerability
10437| [54044] Oracle E-Business Suite 11.5.10.2 Applications Manager unknown vulnerability
10438| [53995] TopManage OLK module 1.91.30 clientes.asp sql injection
10439| [53978] Esoftpro Online Contact Manager 3.0 index.php cross site scripting
10440| [53977] Creasito e-commerce content manager 1.3.16 sql injection
10441| [53959] Opera Web Browser up to 7.19 Event denial of service
10442| [53911] Makotemplates Mako up to 0.3.3 Event cgi.escape cross site scripting
10443| [53965] Adaptivedisplays Alpha Ethernet Adapter Ii Web Manager 3.40.2 Configuration File unknown vulnerability
10444| [53916] Joomanager 1.1.1 index.php sql injection
10445| [53919] Hitachi ServerConductor/Deployment Manager up to 08-52 denial of service
10446| [53835] Novell iManager 2.7.0/2.7.3 Off-By-One denial of service
10447| [87041] Novell iManager /nps/servlet/webacc/ unknown vulnerability
10448| [55587] Harmistechnology Com Jeajaxeventcalendar index.php sql injection
10449| [53852] Harmistechnology Com Jeajaxeventcalendar 1.0.5 index.php sql injection
10450| [4142] Skype Client 2.8 on Mac Chat Unicode unknown vulnerability
10451| [53710] Novell Access Manager up to 3.0 Administration Console memory corruption
10452| [53700] HP OpenView Network Node Manager 7.53 ovwebsnmpsrv.exe main memory corruption
10453| [59326] Mckenziecreations Virtual Real Estate Manager 3.5 listing_detail.asp sql injection
10454| [53561] Apple Safari up to 4.0.5 Event Listener memory corruption
10455| [53737] DMXReady Online Notebook Manager 1.0 onlinenotebookmanager.asp sql injection
10456| [53531] HP OpenView Network Node Manager 7.53 ovwebsnmpsrv.exe sprintf memory corruption
10457| [53530] HP OpenView Network Node Manager 7.53 Error ovwebsnmpsrv.exe memory corruption
10458| [87028] RPM Package Manager unknown vulnerability
10459| [53404] Google Chrome up to 4.1.249.1055 Unload Event spoofing
10460| [53357] Novell Access Manager up to 3.0 Access Restriction unknown vulnerability
10461| [53356] Novell Access Manager up to 3.0 Administration Console unknown vulnerability
10462| [59487] Zoho ManageEngine ADManager Plus 4.4.0 remote_share.jsp cross site scripting
10463| [53308] Angrydonuts CTools 6.x-1.0/6.x-1.1/6.x-1.2/6.x-1.3/6.x-1.x Chaos Tool Suite page_manager_handler_import_validate unknown vulnerability
10464| [53249] NEC WebSAM DeploymentManager up to 5.13 Deployment denial of service
10465| [53432] Harmistechnology Com Jeajaxeventcalendar 1.0.3 index.php directory traversal
10466| [53217] HP Systems Insight Manager 6.0 information disclosure
10467| [87021] Free Download Manager unknown vulnerability
10468| [87020] Free Download Manager unknown vulnerability
10469| [87019] Free Download Manager unknown vulnerability
10470| [53227] Freedownloadmanager Free Download Manager up to 3.0.850 directory traversal
10471| [53226] Freedownloadmanager Free Download Manager up to 3.0.850 Stack-based memory corruption
10472| [53199] HP OpenView Network Node Manager 7.53 getnnmdata.exe memory corruption
10473| [53198] HP OpenView Network Node Manager 7.53 getnnmdata.exe memory corruption
10474| [53197] HP OpenView Network Node Manager 7.53 getnnmdata.exe memory corruption
10475| [53196] HP OpenView Network Node Manager 7.53 snmpviewer.exe doLoad memory corruption
10476| [53195] HP OpenView Network Node Manager 7.53 netmon.exe _OVParseLLA memory corruption
10477| [53194] HP OpenView Network Node Manager 7.53 ovet_demandpoll.exe memory corruption
10478| [53085] VMware View Manager up to 3.1.0 cross site scripting
10479| [53058] Tonec Internet Download Manager up to 5.17 Stack-based memory corruption
10480| [53051] Roxio CinePlayer 3.2 ActiveX Control IAManager.dll memory corruption
10481| [53015] Cisco Router and Security Device Manager 2.5 cross site scripting
10482| [52955] HP Systems Insight Manager up to 4.1 unknown vulnerability
10483| [52954] HP Systems Insight Manager up to 4.1 cross site request forgery
10484| [52953] HP Systems Insight Manager up to 4.1 cross site scripting
10485| [4122] Palm Pre WebOS 1.x SMS Client cross site scripting
10486| [52883] Joachim Ruhs Flat Manager up to 1.9.2 sql injection
10487| [52864] HP Operations Manager 8.10 ActiveX Control srcvw32.dll memory corruption
10488| [52776] Microsoft Windows SMB Client memory corruption
10489| [52774] Microsoft Windows SMB Client memory corruption
10490| [52817] Ternaria Com Preventive 1.0.5 index.php directory traversal
10491| [52811] Ternaria Com Jprojectmanager 1.0 index.php directory traversal
10492| [4105] Microsoft Windows SMB Client memory corruption
10493| [52807] Trellian FTP 3.01/3.1.3.1789 FTP Client Stack-based memory corruption
10494| [52810] Focusdev Com Mv Restaurantmenumanager up to 1.5.2 index.php sql injection
10495| [52650] Heartlogic HL-SiteManager 0.50/0.70/0.71/1.00 sql injection
10496| [52347] AdvertisementManager 3.1.0 File Inclusion privilege escalation
10497| [52248] Chi Hoang Ch Lightem up to 1.0.34 Extension Manager information disclosure
10498| [52240] Technotoad TT Web Site Manager 0.5 sql injection
10499| [52239] Boldfx Model Agency Manager PRO photos.php sql injection
10500| [52282] IBM DB2 Content Manager up to 8.2 Single Sign-On unknown vulnerability
10501| [52544] Apple iPhone OS 3.1 HTTP Client Crash denial of service
10502| [52082] Cisco Digital Media Manager up to 5.0.1 Stack-Based unknown vulnerability
10503| [52081] Cisco Digital Media Manager 5.0.2 memory corruption
10504| [52080] Cisco Digital Media Manager 5.0.2 Default Password memory corruption
10505| [52074] Symantec Data Loss Prevention Detection Servers up to 8.1.1 kvolefio.dll memory corruption
10506| [52061] Cisco Unified Communications Manager up to 4.x denial of service
10507| [52060] Cisco Unified Communications Manager denial of service
10508| [52059] Cisco Unified Communications Manager up to 7.x denial of service
10509| [52058] Cisco Unified Communications Manager denial of service
10510| [52057] Cisco Unified Communications Manager up to 4.x Capabilities denial of service
10511| [51163] VMware Stage Manager up to 4.0 wwhelp_entry.html cross site scripting
10512| [51963] CA eHealth Performance Manager up to 6.2 cross site scripting
10513| [51948] NOS Microsystems getPlus Download Manager 1.5.2.35 ActiveX Control unknown vulnerability
10514| [51900] Symantec Client Security up to 3.0 ActiveX Control CLIproxy.dll SetRemoteComputerName memory corruption
10515| [51895] Accellion Secure File Transfer Appliance web_client_user_guide.html directory traversal
10516| [51943] Symantec IM Manager up to 8.2 cross site scripting
10517| [51944] Symantec Client Security up to 3.1 ActiveX Control SYMLTCOM.dll memory corruption
10518| [51849] Juniper Odyssey Access Client 4.72.11421.0 Installer dsInstallerService.dll memory corruption
10519| [51939] CommodityRentals Trade Manager Script products.php sql injection
10520| [51845] JEvents JEvents Search plugin up to 1.5.1 Search Plugin eventsearch.php onSearch sql injection
10521| [51816] HP Network Node Manager 8.13 privilege escalation
10522| [51869] Google Chrome up to 2.0.172.32 Password Manager login_prompt.cc information disclosure
10523| [4085] Microsoft Windows SMB Client unknown vulnerability
10524| [51824] Dmanager DocumentManager up to 3.0 unknown vulnerability
10525| [52028] Perlunity phpunity.newsmanager tell.php directory traversal
10526| [52024] Harmistechnology Com Jeeventcalendar 1.0 index.php sql injection
10527| [52025] Harmistechnology Com Jeeventcalendar 1.0 index.php sql injection
10528| [51685] Sun Change Manager 1.0 memory corruption
10529| [51682] TheGreenBow IPSec VPN Client 4.65.003 vpnconf.exe memory corruption
10530| [52346] AdvertisementManager 3.1.0/3.6 index.php cross site scripting
10531| [51629] HP Power Manager up to 4.2.6 memory corruption
10532| [51628] HP Power Manager up to 4.2.8 Stack-based memory corruption
10533| [51599] Myrephp MYRE Holiday Rental Manager search.php cross site scripting
10534| [51598] Myrephp MYRE Holiday Rental Manager review.php sql injection
10535| [51585] TYPO3 mjseventpro 0.2.1 sql injection
10536| [51982] Zenoss 2.3.0/2.3.3/2.4.0/2.4.2/2.4.5 getJSONEventsInfo sql injection
10537| [51641] Hong Chuyen Com Articlemanager index.php sql injection
10538| [4079] Microsoft Internet Explorer 6/6 SP1/7/8 Event memory corruption
10539| [52309] The-ghost AR Web Content Manager 2.1 db_backup.php information disclosure
10540| [51401] SQLiteManager 1.2.0 main.php cross site scripting
10541| [51302] F5 Big-IP Protocol Security Manager up to 9.4.5 Application Security Manager memory corruption
10542| [51283] GNOME NetworkManager 0.7.2 denial of service
10543| [51259] ManageEngine Password Manager Pro6.1 ShowInContentAreaAction.do cross site scripting
10544| [51208] HP OpenView Storage Data Protector 6.0 Cell Manager rds.exe _ncp32._NtrpTCPReceiveMsg memory corruption
10545| [4063] Zoho ManageEngine Password Manager Pro up to Build 6104 cross site scripting
10546| [52945] Phpwebscripts Ad Manager Pro 3.0 admins.php cross site request forgery
10547| [52944] Scriptez Mail Manager Pro admin.php cross site request forgery
10548| [51142] Realestatephp Real Estate Manager 1.0.1 index.php cross site scripting
10549| [51120] Sun Ray Server Software 4.1 Authentication Manager memory corruption
10550| [51112] HP OpenView Network Node Manager 7.53 Stack-based memory corruption
10551| [51111] HP OpenView Network Node Manager 7.53 ovwebsnmpsrv.exe memory corruption
10552| [51110] HP OpenView Network Node Manager 7.53 snmpviewer.exe memory corruption
10553| [51109] HP OpenView Network Node Manager 7.53 ovalarm.exe memory corruption
10554| [51108] HP OpenView Network Node Manager 7.53 OvWebHelp.exe memory corruption
10555| [51107] HP OpenView Network Node Manager 7.53 webappmon.exe memory corruption
10556| [51106] HP OpenView Network Node Manager 7.53 ovsessionmgr.exe memory corruption
10557| [51105] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe memory corruption
10558| [51104] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe vsprintf memory corruption
10559| [51103] HP OpenView Network Node Manager 7.53 memory corruption
10560| [51102] HP OpenView Network Node Manager 7.53 ovlogin.exe memory corruption
10561| [51101] HP OpenView Network Node Manager 7.53 privilege escalation
10562| [86864] TestLink eventviewer.php sql injection
10563| [86862] TestLink eventviewer.php cross site scripting
10564| [51117] Symantec Veritas Command Central Storage Change Manager up to 5.1 Management Console VRTSweb.exe memory corruption
10565| [51069] Novell iPrint Client up to 5.30 ienipp.ocx memory corruption
10566| [51478] Novell iManager up to 2.7.2 Stack-based memory corruption
10567| [51295] Pps.jussieu Polipo 0.9.8/0.9.12/1.0.4 client.c httpClientDiscardBody denial of service
10568| [51020] Stonesoft StoneGate Clientless SSL VPN cross site scripting
10569| [51017] Interspire Knowledge Manager 5 directory traversal
10570| [51013] HP Operations Manager Servlet Container manager memory corruption
10571| [51012] HP Operations Dashboard Servlet Container manager memory corruption
10572| [50949] Yoono up to 3.0.5.2625 Event privilege escalation
10573| [4064] Cisco VPN Client up to 5.0.06.0100 cvpnd Service denial of service
10574| [50886] HP Operations Manager 8.10 on Windows File Upload org.apache.catalina.manager.HTMLManagerServlet memory corruption
10575| [50853] HP OpenView Network Node Manager 7.53 ActiveX Control ActiveDom.ocx memory corruption
10576| [50851] HP OpenView Network Node Manager 7.53 ovdbrun.exe denial of service
10577| [50778] Apple Mac OS X up to 10.5.7 QuickDraw Manager Heap-based memory corruption
10578| [50810] McAfee IntruShield Network Security Manager up to 5.1.7.72 Session Identifier cross site scripting
10579| [50809] McAfee IntruShield Network Security Manager up to 5.1.7.72 Login.jsp cross site scripting
10580| [50798] Google Chrome up to 2.0.172.32 webframeloaderclient_impl.cc dispatchDidChangeLocationWithinPage denial of service
10581| [50719] HP Power Manager Login Form Stack-based memory corruption
10582| [50696] IBM Tivoli Storage Manager up to 5.2 memory corruption
10583| [50695] IBM Tivoli Storage Manager up to 5.2 memory corruption
10584| [50694] IBM Tivoli Storage Manager up to 5.4.0 Stack-based memory corruption
10585| [50629] Michael J Greenwood PHP Content Manager 0.3.2 directory traversal
10586| [50536] Websense Personal Email Manager up to 7.0 STEMWADM.EXE denial of service
10587| [50535] Websense Personal Email Manager up to 7.0 cross site scripting
10588| [50523] EMC Documentum Applicationxtender Workflow Manager up to 5.40 Agent Service aws_tmxn.exe memory corruption
10589| [50550] Oracle Database Server 10.2.0.4 Workspace Manager unknown vulnerability
10590| [50549] Oracle Database Server 10.2.0.4 Workspace Manager unknown vulnerability
10591| [50515] IBM Rational RequisitePro 7.1.0 Web Client workingSet.jsp cross site scripting
10592| [50332] IBM Installation Manager up to 1.0 IBMIM.exe unknown vulnerability
10593| [50306] Todor Lazarov T-HTB Manager 0.5 index.php sql injection
10594| [50201] Roshan Shah Subdomain Manager unknown vulnerability
10595| [50241] Cisco Unified Callmanager up to 5.x denial of service
10596| [50175] Focusdev Com Surveymanager 1.5.0 index.php sql injection
10597| [50119] IBM WebSphere Business Events 6.1 memory corruption
10598| [50115] IBM Tivoli Identity Manager 5.0.0.5 cross site scripting
10599| [49982] Boldfx Model Agency Manager PRO view.php sql injection
10600| [49957] Silcnet Silc Toolkit up to 1.1.2 lib/silcclient/command.c memory corruption
10601| [49916] Silcnet Silc Toolkit up to 1.0 client_entry.c memory corruption
10602| [49861] HP Operations Manager 8.1 HP OpenView unknown vulnerability
10603| [49837] OTManager CMS 2.4 unknown vulnerability
10604| [49825] Sami Ekblad Page Manager 2006-02-04 File Upload upload.php memory corruption
10605| [49821] GNOME GDM up to 2.16 Gnome Display Manager unknown vulnerability
10606| [49813] Webformatique Reservation Manager index.php cross site scripting
10607| [49772] Simon Rycroft SID client.php privilege escalation
10608| [49754] RedGalaxy Download Center 1.2 cross site scripting
10609| [49975] Mevin Basic-php-events-lister 2.0 admin/reset.php unknown vulnerability
10610| [49731] XySSL up to 0.8 ssl_parse_client_key_exchange unknown vulnerability
10611| [49675] Cisco Unified Communications Manager denial of service
10612| [49677] Cisco Unified Communications Manager Flooding denial of service
10613| [49676] Cisco Unified Communications Manager Flooding denial of service
10614| [49674] Cisco Unified Communications Manager sipSafeStrlen denial of service
10615| [49673] Cisco Unified Communications Manager up to 6.1 denial of service
10616| [49633] Ocean12tech FAQ Manager Pro information disclosure
10617| [49576] Libra File Manager Php Filemanager up to 1.03 unknown vulnerability
10618| [50057] Raizlabs PHP eMail Manager 3.3.0 remove.php sql injection
10619| [49526] CA Host-Based Intrusion Prevention System up to 8.0 Crash denial of service
10620| [50220] Craig Barratt BackupPC 3.1.0 Restore ClientNameAlias unknown vulnerability
10621| [49309] Sun Java System Access Manager 7.1 information disclosure
10622| [49186] Interlogy Profile Manager sql injection
10623| [49181] Ordasoft Com Realestatemanager 1.0 toolbar_ext.php privilege escalation
10624| [49179] Ordasoft Com Vehiclemanager 1.0 toolbar_ext.php privilege escalation
10625| [49154] Sun Java System Access Manager Policy Agent 2.2 Crash denial of service
10626| [50067] The-ghost AR Web Content Manager 2.1 a.php directory traversal
10627| [50066] The-ghost AR Web Content Manager 2.1 control/login.php sql injection
10628| [49135] IBM Tivoli Identity Manager 5.0.0.6 unknown vulnerability
10629| [49134] Akamai Technologies Download Manager manager.exe memory corruption
10630| [49042] Oracle JD Edwards EnterpriseOne 8.9 Profile Manager unknown vulnerability
10631| [49040] Oracle E-Business Suite 11.5.10.2 Applications Manager unknown vulnerability
10632| [49025] Oracle Enterprise Manager 10.2.0.4 configHistory unknown vulnerability
10633| [49024] Oracle Enterprise Manager 10.2.0.4 unknown vulnerability
10634| [49004] ISC DHCP 2.0/3.0/3.1/4.0/4.1.0 DHCP Server client/dhclient.c script_write_params memory corruption
10635| [48992] Xigla Absolute Poll Manager XE 4.1 unknown vulnerability
10636| [48990] Xigla Absolute Banner Manager.net 4.0 unknown vulnerability
10637| [48988] Xigla Absolute News Manager.NET 5.1 privilege escalation
10638| [48986] Xigla Absolute Faq Manager .net 6.0 privilege escalation
10639| [61023] Dell Wyse Device Manager 4.7.1 hagent.exe memory corruption
10640| [48943] Dutchmonkey DM FileManager 3.9.4 File Inclusion privilege escalation
10641| [86746] IBM Tivoli Identity Manager cross site scripting
10642| [48861] IBM Tivoli Identity Manager 5.0 cross site scripting
10643| [48835] HP OpenView Network Node Manager 7.53 webappmon.exe memory corruption
10644| [48805] Sun Java System Access Manager 7.1 Domain Controller cross site scripting
10645| [48801] Awesomephp Mega File Manager 1.0 index.php directory traversal
10646| [48786] DMXReady Registration Manager 1.1 File Upload memory corruption
10647| [48740] Cisco Video Surveillance Stream Manager Firmware denial of service
10648| [48648] Webmediaexplorer Webmedia Explorer 5.10 Event index.php cross site scripting
10649| [48630] Mattias Hutterer Taxonomy manager up to 5.x-1.x cross site scripting
10650| [48623] Drupal Taxonomy manager up to 5.x-1.0 cross site scripting
10651| [48595] Mozilla Firefox up to 3.0.10 Event memory corruption
10652| [48599] Mozilla Firefox up to 3.0.10 nsViewManager.cpp denial of service
10653| [48563] HP OpenView Network Node Manager up to 7.52 Stack-based memory corruption
10654| [48495] Dutchmonkey DM FileManager 3.9.2 unknown vulnerability
10655| [48490] Virtuenetz Virtue News Manager news_detail.php cross site scripting
10656| [48489] Virtuenetz Virtue News Manager news_detail.php sql injection
10657| [3985] Microsoft Internet Explorer 7 Event memory corruption
10658| [48507] Apple Safari up to 4.0 Beta Event Use-After-Free memory corruption
10659| [48501] Apple Safari up to 4.0 Beta Event cross site scripting
10660| [48460] irssi 0.8.13 event_wallops denial of service
10661| [48456] IBM FileNet Content Manager 4.0 unknown vulnerability
10662| [48425] LuxBum 0.5.5 manager.php sql injection
10663| [48360] Mozilla Firefox 3.0.10 Event Memory Consumption denial of service
10664| [48352] DMXReady Registration Manager 1.1 information disclosure
10665| [48310] Google Android 1.5 Installation PackageManagerService.java PackageManagerService unknown vulnerability
10666| [48255] Cisco Ciscoworks Voice Manager up to 3.1 TFTP Service directory traversal
10667| [48251] Dutchmonkey DM FileManager 3.9.2 login.php sql injection
10668| [86729] ACollab events/add_event.php cross site scripting
10669| [48171] Apple Mac OS X up to 10.5.0 QuickDraw Manager memory corruption
10670| [48159] Apple Mac OS X up to 10.5.0 QuickDraw Manager Heap-based memory corruption
10671| [48049] IBM Tivoli Storage Manager Express up to 5.3.3.0 memory corruption
10672| [86708] IBM Tivoli Storage Manager dsmagent.exe unknown vulnerability
10673| [48046] IBM Tivoli Storage Manager Express up to 5.3.3.0 Agent Service dsmagent.exe memory corruption
10674| [48048] HP OpenView Network Node Manager 7.01 memory corruption
10675| [48027] Galaxyscripts Mini File Host 1.5 File Upload name.php memory corruption
10676| [47939] HP OpenView Network Node Manager 7.01 ovalarmsrv.exe memory corruption
10677| [47826] Novell Netidentity Client1.2.3 up to 1.2.3 xtagent.exe memory corruption
10678| [47908] Neocrome Seditio 1.0 events.inc.php sql injection
10679| [47784] Abk-soft AbleSpace 1.0 events_view.php sql injection
10680| [47740] Oracle Database 10g 10.2.0.4 Workspace Manager unknown vulnerability
10681| [47732] Oracle Database 10g 10.2.0.4 Workspace Manager unknown vulnerability
10682| [47730] Oracle Database 10g 10.2.0.4 Workspace Manager unknown vulnerability
10683| [47729] Oracle Database 10g 10.2.0.4 Workspace Manager unknown vulnerability
10684| [47816] Drupal Localization client up to 6.x-1.1 cross site scripting
10685| [47702] Cisco Subscriber Edge Services Manager cross site scripting
10686| [47636] Apache Struts 2.0.9 xip_client.html cross site scripting
10687| [47725] HP ProCurve Manager up to 2.2 information disclosure
10688| [47490] IBM DB2 Content Manager up to 8.4.0 unknown vulnerability
10689| [47447] IBM Tivoli Storage Manager unknown vulnerability
10690| [47438] IBM Tivoli Storage Manager Crash denial of service
10691| [47437] IBM Tivoli Storage Manager up to 5.2.0 Console Mode unknown vulnerability
10692| [47422] Ixprim-cms Ixprim 2.0 Libraries Theme_Manager.class.php privilege escalation
10693| [47292] Sun Java System Identity Manager 7.0 unknown vulnerability
10694| [47291] Sun Java System Identity Manager 7.0 privilege escalation
10695| [47290] Sun Java System Identity Manager 7.0 unknown vulnerability
10696| [47289] Sun Java System Identity Manager 7.0 cross site scripting
10697| [47288] Sun Java System Identity Manager 7.0 cross site scripting
10698| [47287] Sun Java System Identity Manager 7.0 cross site scripting
10699| [47286] Sun Java System Identity Manager 7.0 unknown vulnerability
10700| [47285] Sun Java System Identity Manager 7.0 unknown vulnerability
10701| [47284] Sun Java System Identity Manager 7.0 unknown vulnerability
10702| [47283] Sun Java System Identity Manager 7.0 unknown vulnerability
10703| [47282] Sun Java System Identity Manager 7.0 information disclosure
10704| [47276] HP Network Node Manager 7.5.1 ov.dll memory corruption
10705| [47129] Mevin Basic-php-events-lister 1.0 event.php sql injection
10706| [47094] HP Systems Insight Manager 2.5 information disclosure
10707| [47088] IBM Tivoli Storage Manager 5.3 dsmsvc.exe memory corruption
10708| [47085] IBM Tivoli Storage Manager Hsm 5.5.1.4 memory corruption
10709| [47016] Brian Wilson ol bookmarks manager up to 0.7.5 show.php directory traversal
10710| [47015] Brian Wilson ol bookmarks manager 0.7.5 index.php sql injection
10711| [47014] Brian Wilson ol bookmarks manager 0.7.5 frame.php privilege escalation
10712| [47013] Brian Wilson ol bookmarks manager 0.7.5 frame.php directory traversal
10713| [46922] SpeedTech Organization and Resource Manager up to 5.x-1.13/6.x-1.17 on Drupal sql injection
10714| [46917] Mxmania Calendar Mx Professional 2.0.0 calendar_Eventupdate.asp sql injection
10715| [46912] Ocean12tech FAQ Manager Pro 1.0 default.asp sql injection
10716| [46897] Donnafontenot MyCal Personal Events Calendar information disclosure
10717| [46896] Donnafontenot evCal Events Calendar information disclosure
10718| [46853] CFMSource Cf Calendar calendarevent.cfm sql injection
10719| [46836] ToursManager Tours Manager tourview.php sql injection
10720| [46826] Cisco Application Networking Manager up to 1.1 Configuration File denial of service
10721| [46825] Cisco Application Networking Manager up to 1.1 unknown vulnerability
10722| [46824] Cisco Application Networking Manager up to 1.1 Default User Credentials denial of service
10723| [46823] Cisco Application Networking Manager up to 1.1 directory traversal
10724| [46812] gwm Galatolo WebManager 1.3a privilege escalation
10725| [46801] Toursmanager Tours Manager 1.0 cityview.php sql injection
10726| [46752] E-topbiz AdManager 4.0 view.php sql injection
10727| [46738] Gwm Galatolo WebManager up to 1.3a sql injection
10728| [46737] Galatolo Galatolo WebManager up to 1.3a all.php cross site scripting
10729| [46719] Plunet Business Manager up to 4.1 Access Restriction privilege escalation
10730| [46718] Plunet Business Manager up to 4.1 cross site scripting
10731| [46682] Dada Mail Manager 2.6 config.dadamail.php privilege escalation
10732| [46669] EMC Networker Client up to 7.3.2 nsrexecd nsrexecd.exe denial of service
10733| [46660] FreeBSD 7.0/7.0 Beta4/7.0 Releng/7.0-release/7.1 Telnet Client sys_term.c memory corruption
10734| [46609] Drupal Localization client up to 6.x-1.1 cross site request forgery
10735| [46598] SourceForge WOW Raid Manager cross site scripting
10736| [46474] Scriptsez Ez Ringtone Manager main.php directory traversal
10737| [46448] GWM Galatolo WebManager 1.0 result.php cross site scripting
10738| [46445] A4Desk A4desk Flash Event Calendar sql injection
10739| [46444] A4Desk A4desk Flash Event Calendar index.php privilege escalation
10740| [46425] DMXReady Online Notebook Manager 1.1 sql injection
10741| [46362] HP OpenView Network Node Manager 7.53 memory corruption
10742| [46361] HP OpenView Network Node Manager 7.53 nnmRptConfig.exe information disclosure
10743| [46360] HP OpenView Network Node Manager 7.53 webappmon.exe memory corruption
10744| [46319] DMXReady Member Directory Manager up to 1.1 sql injection
10745| [46318] DMXReady Classified Listings Manager up to 1.1 sql injection
10746| [46313] Com Eventing 1.6.5 on Joomla index.php sql injection
10747| [46292] TightVnc 1.3.9 ClientConnection.cpp CheckBufferSize memory corruption
10748| [46258] Free Download Manager 3.0 memory corruption
10749| [86677] FlatnuX CMS filemanager.php privilege escalation
10750| [46257] Free Download Manager 3.0 Authorization Stack-based memory corruption
10751| [46180] Sun Java System Access Manager 7.1 unknown vulnerability
10752| [46177] Sun Fire X2200 M2 up to 2.18 Embedded Lights Out Manager privilege escalation
10753| [46176] Sun Fire X2200 M2 up to 2.18 Embedded Lights Out Manager privilege escalation
10754| [46171] DMXReady Blog Manager inc_webblogmanager.asp sql injection
10755| [46170] DMXReady Blog Manager inc_webblogmanager.asp cross site scripting
10756| [46264] Gplhost Domain Technologie Control up to 0.26.8 client/new_account.php sql injection
10757| [46094] Flaxweb Flax Article Manager 1.1 category.php sql injection
10758| [46085] Ocean12 Technologies Mailing List Manager information disclosure
10759| [46084] Ocean12 Technologies Mailing List Manager default.asp cross site scripting
10760| [46083] Ocean12 Technologies Mailing List Manager default.asp sql injection
10761| [46031] Cisco Unified Communications Manager up to 6.x Certificate Authority Proxy Function denial of service
10762| [45983] ASP-DEv XM Events Diary information disclosure
10763| [45982] ASP-DEv XM Events Diary diary_viewC.asp sql injection
10764| [45981] ASP-DEv XM Events Diary default.asp sql injection
10765| [45958] Symantec AppStream Client up to 5.1 ActiveX Control launcher.dll memory corruption
10766| [45946] Sun Java System Access Manager 7.0 2005q4 unknown vulnerability
10767| [45945] Sun Java System Access Manager 7.1 unknown vulnerability
10768| [45923] Berkeley Boinc Client 6.4.5 lib/crypt.cpp RSA_public_decrypt unknown vulnerability
10769| [45890] Oracle Enterprise Manager Grid Control 10g 10.2.0.4 unknown vulnerability
10770| [45814] HP OpenView Network Node Manager 7.51 OpenView5.exe memory corruption
10771| [45700] Sirium Am Events Module 0.22 print.php sql injection
10772| [45685] Bpftp BulletProof FTP Client Stack-based memory corruption
10773| [45684] Bpftp BulletProof FTP Client 2.63 Stack-based memory corruption
10774| [45641] Avaya Communication Manager 3.1.4 Web Management Interface unknown vulnerability
10775| [45640] Avaya Communication Manager Web Management Interface memory corruption
10776| [45638] Kvm Qumranet KVM up to 79 vnc.c protocol_client_msg denial of service
10777| [45635] University of Washington IMAP up to 2007d C-Client Library rfc822_output_char memory corruption
10778| [45608] IBM Tivoli Provisioning Manager up to 5.0 LDAP Service unknown vulnerability
10779| [45549] AlstraSoft Article Manager Pro 1.6 sql injection
10780| [45500] Gazatem Technologies QMail Mailing List Manager 1.2 information disclosure
10781| [45490] Dotnetindex Ikon AdManager up to 2.1 information disclosure
10782| [45469] Proclanmanager Pro Clan Manager up to 0.4.2 unknown vulnerability
10783| [49244] Alt-N WorldClient 10.0.2 cross site scripting
10784| [45323] NOS Microsystems getPlus Download Manager 1.2.2.50 ActiveX Control gp.ocx memory corruption
10785| [45237] GHH Google Hack Honeypot File Upload Manager 1.3 index.php unknown vulnerability
10786| [46929] Ocean12tech Membership Manager Pro login.asp sql injection
10787| [46911] Ocean12tech Membership Manager Pro login.asp sql injection
10788| [46910] Ocean12tech Contact Manager Pro 1.02 default.asp cross site scripting
10789| [46909] Ocean12tech Contact Manager Pro 1.02 default.asp sql injection
10790| [45220] IBM Tivoli Access Manager for e-business 6.0.0.17 Crash denial of service
10791| [45243] Scripts4you FAQ Manager 1.2 include/header.php privilege escalation
10792| [45242] Scripts4you FAQ Manager 1.2 catagorie.php sql injection
10793| [45152] OTManager CMS 24a index.php cross site scripting
10794| [45151] OTManager CMS 24a index.php directory traversal
10795| [45144] SoftVisions Software Online Booking Manager 2.2 checkavail.php sql injection
10796| [45126] Clientsoftware Wincom Mpd Total up to 3.0.2.623 Administration Service LPDService.exe memory corruption
10797| [45112] SSH Tectia Client up to 5.0.3 Error Plaintext weak encryption
10798| [45110] Clientsoftware Wincome Mpd Total up to 3.0.2.623 Remote Administration Protocol Integer memory corruption
10799| [45109] Clientsoftware Wincome Mpd Total up to 3.0.2.623 memory corruption
10800| [45106] smsclient 2.0.8z mail2sms.sh privilege escalation
10801| [45081] Ocean12 Technologies Calendar Manager 2.04 information disclosure
10802| [45080] Ocean12 Technologies Poll Manager 1.00 information disclosure
10803| [45079] Ocean12 Technologies Membership Manager Pro information disclosure
10804| [45078] Ocean12 Technologies Contact Manager 1.02 information disclosure
10805| [45032] Novell User Application 3.5.0 Identity Manager cross site scripting
10806| [44996] Mozilla Firefox up to 3.0.3 Listener NotifyEventListeners memory corruption
10807| [86651] Cluster Project rgmanager privilege escalation
10808| [86650] Cluster Project rgmanager privilege escalation
10809| [45059] HP Service Manager memory corruption
10810| [44980] Network-client.com FTP Now 2.6 Heap-based memory corruption
10811| [45069] Sun Java System Identity Manager up to 7.0 cross site scripting
10812| [45068] Sun Java System Identity Manager up to 7.0 unknown vulnerability
10813| [45067] Sun Java System Identity Manager up to 7.0 helpServer.jsp directory traversal
10814| [45066] Sun Java System Identity Manager up to 7.0 changeself.jsp cross site request forgery
10815| [45065] Sun Java System Identity Manager up to 7.0 cross site scripting
10816| [45010] OTManager 2.4 Admin/ADM_Pagina.php privilege escalation
10817| [44952] University of Washington IMAP Toolkit 2007b C-Client Library smtp.c denial of service
10818| [86627] DevelopItEasy Events Calendar calendar_details.php sql injection
10819| [47525] DevelopItEasy Events Calendar 1.2 admin/index.php sql injection
10820| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
10821| [44741] Wikidsystems wClient-PHP 3.0-1/3.0-2 sample.php cross site scripting
10822| [44645] WebBiscuits Events Calendar 1.1 File Inclusion privilege escalation
10823| [44622] Mywebland myEvent 1.6 viewevent.php sql injection
10824| [44562] HP Systems Insight Manager up to 4.1 information disclosure
10825| [44535] XIGLA Absolute Poll Manager XE 4.1 xlacomments.asp sql injection
10826| [44506] Oracle Database 11i 11.1.0.6 Workspace Manager unknown vulnerability
10827| [44496] Oracle Database 11i 11.1.0.6 Workspace Manager unknown vulnerability
10828| [44495] Oracle Database 11i 11.1.0.6 Workspace Manager unknown vulnerability
10829| [44494] Oracle Database 11i 11.1.0.6 Workspace Manager unknown vulnerability
10830| [49614] Wowraidmanager up to 3.5.1 auth_phpbb3.php CheckPassword weak authentication
10831| [44463] HP OpenView Network Node Manager 7.01 denial of service
10832| [44462] HP OpenView Network Node Manager 7.01 Stack-based memory corruption
10833| [44439] Phlatline Personal Information Manager 1.01 notes.php directory traversal
10834| [44419] Tonec Inc. Internet Download Manager up to 5.14 parsing memory corruption
10835| [44414] DataFeedFile Dff Framework Api DFF_affiliate_client_API.php privilege escalation
10836| [44409] Built2Go Real Estate Listings 1.5 event_detail.php sql injection
10837| [44332] Phlatline Personal Information Manager up to 1.0 File Upload upload.php memory corruption
10838| [44331] Phlatline Personal Information Manager up to 1.0 changepassword.php weak authentication
10839| [44329] Phlatline Personal Information Manager 1.0 upload.php directory traversal
10840| [44241] Libra File Manager Php Filemanager up to 1.03 fileadmin.php privilege escalation
10841| [44202] Cisco Unified Callmanager up to 4.3 Session Initiation Protocol denial of service
10842| [44201] Cisco Unified Callmanager up to 4.3 Session Initiation Protocol denial of service
10843| [44133] Horde Turba Contact Manager H3 up to 3.2.1 cross site scripting
10844| [44037] Source Workshop Reciprocal Links Manager 1.1 index.php sql injection
10845| [44009] Friendly PPPoE Client 3.0.0.57 ActiveX Control fwRemoteCfg.dll unknown vulnerability
10846| [44008] Friendly PPPoE Client 3.0.0.57 ActiveX Control fwRemoteCfg.dll unknown vulnerability
10847| [44007] Friendly PPPoE Client 3.0.0.57 ActiveX Control fwRemoteCfg.dll memory corruption
10848| [43941] Novell iPrint Client up to 5.5 ActiveX Control ienipp.ocx GetFileList2 memory corruption
10849| [43898] Cisco ASA 5500 up to 8.0 Clientless SSL VPN denial of service
10850| [43897] Cisco ASA 5500 up to 8.0 Clientless SSL VPN Memory Leak denial of service
10851| [43871] HP OpenView Network Node Manager 7.01 denial of service
10852| [43870] HP OpenView Network Node Manager 7.01 denial of service
10853| [43860] ZoneMinder up to 1.23.3 zm_html_view_events.php executeFilter privilege escalation
10854| [43858] ZoneMinder up to 1.23.3 zm_html_view_event.php sql injection
10855| [43809] Trend Micro Client Server Messaging Suite up to 3.5 Management Console memory corruption
10856| [43805] Ipswitch WS_FTP Home client memory corruption
10857| [43785] Avaya Communication Manager 5.0 denial of service
10858| [43718] Party Gaming Party Poker Client 121-120 memory corruption
10859| [43655] Computer Associates Host Based Intrusion Prevention System R8 denial of service
10860| [43647] McAfee Encrypted USB Manager 3.1.0.0 unknown vulnerability
10861| [43600] Cisco WebEx Meeting Manager up to 20.2008.2601.4927 ActiveX Control atucfobj.dll memory corruption
10862| [43599] Fhm-script Free Hosting Manager 1.2 privilege escalation
10863| [43569] mPFM mask PHP File Manager up to 2.1 privilege escalation
10864| [43558] RealVNC RealVNC Windows Client 4.1.2.0 vncviewer.exe denial of service
10865| [43552] Novell iManager up to 2.7.0 privilege escalation
10866| [43489] HP System Administration Manager b.11.11 unknown vulnerability
10867| [86597] Affinium Campaign /manager/jsp/test.jsp cross site scripting
10868| [43450] Infomining BookMine events.cfm sql injection
10869| [43421] WordPress Wp Downloads Manager 0.2 File Upload upload.php memory corruption
10870| [43348] EMC Dantz Retrospect Backup Client 7.5.116 retroclient.exe memory corruption
10871| [43347] EMC Dantz Retrospect Backup Client 7.5.116 Cleartext information disclosure
10872| [43345] EMC Dantz Retrospect Backup Client 7.5.116 retroclient.exe denial of service
10873| [43343] Alain Barbet Filesys Smbclientparser up to 2.6 SMB Server filesys::smbclientparser memory corruption
10874| [43260] Dreamlevels DreamNews Manager dreamnews-rss.php sql injection
10875| [43241] Oracle Enterprise Manager 10.2.0.4 cross site scripting
10876| [43237] Oracle Times Ten Client Server 7.0.3.0.0 unknown vulnerability
10877| [43236] Oracle Times Ten Client Server 7.0.3.0.0 unknown vulnerability
10878| [43228] Oracle Instance Management component 10.1.0.5 Enterprise Manager unknown vulnerability
10879| [43224] Oracle Report Manager component 12.0.4 unknown vulnerability
10880| [43181] Nortel SIP Multimedia PC Client 4.0 denial of service
10881| [42991] Sun Java System Access Manager up to 6.3 memory corruption
10882| [42980] T0pp8uzz Dana IRC client up to 1.1 IRC Client Stack-based memory corruption
10883| [42966] Novell iPrint Client up to 4.34 Client for Windows ienipp.ocx memory corruption
10884| [42928] ShareCMS 0.1 event_info.php sql injection
10885| [42924] Cisco Unified Communications Manager up to 5.0 information disclosure
10886| [42923] Cisco Unified Communications Manager up to 4.1 unknown vulnerability
10887| [42922] Cisco Unified Communications Manager Telephony Crash denial of service
10888| [47683] Avaya Communication Manager 3.1.4 Web Management Interface privilege escalation
10889| [47682] Avaya Communication Manager 4.0.1 Web Management Interface memory corruption
10890| [47681] Avaya Communication Manager 3.1.4 Web Management Interface information disclosure
10891| [47680] Avaya Communication Manager 3.1.4 Web Management Interface information disclosure
10892| [47685] Avaya Communication Manager up to 4.0.0 Web Administration Interface privilege escalation
10893| [47684] Avaya Communication Manager up to 4.0.0 Web Administration Interface memory corruption
10894| [42871] 3dftp 3D-FTP Client 8.01 directory traversal
10895| [47660] Thomas Waggershauser Air Filemanager up to 0.1.1 privilege escalation
10896| [42832] Xigla Absolute Poll Manager Xe cross site scripting
10897| [42831] Xigla Absolute Poll Manager Xe search.asp sql injection
10898| [42825] Xigla Absolute Banner Manager 2.0 searchbanners.asp cross site scripting
10899| [42824] Xigla Absolute Banner Manager 2.0 searchbanners.asp sql injection
10900| [42822] Xigla Absolute News Manager XE 3.2 cross site scripting
10901| [42821] Xigla Absolute News Manager XE 3.2 search.asp sql injection
10902| [42808] Cisco Intrusion Prevention System up to 5.0 denial of service
10903| [42981] Lyris List Manager 9.3d cross site scripting
10904| [42775] Sun Java System Access Manager 7.1 privilege escalation
10905| [42766] GWM Galatolo WebManager 1.0 directory traversal
10906| [42758] JiRo FAQ Manager eXperience 1.0 read.asp sql injection
10907| [42754] ProManager 0.73 directory traversal
10908| [42752] Lavrsen Motion up to 3.2.10 webhttpd.c read_client memory corruption
10909| [42767] GWM Galatolo WebManager up to 1.0 view.php sql injection
10910| [42711] Barad Dur BitKinex 2.9.3 FTP Client directory traversal
10911| [42699] Red Swoosh Client 3322 Management Interface cross site request forgery
10912| [42658] Akamai Download Manager up to 2.2.3.4 ActiveX Control memory corruption
10913| [42656] CA eTrust Secure Content Manager 8.0 icihttp.exe memory corruption
10914| [42647] HP Instant Support up to 1.0.0.22 ActiveX Control hpisdatamanagerlib.datamgr startapp memory corruption
10915| [42646] HP Instant Support up to 1.0.0.22 ActiveX Control hpisdatamanagerlib.datamgr appendstringtofile memory corruption
10916| [42645] HP Instant Support up to 1.0.0.22 ActiveX Control hpisdatamanagerlib.datamgr deletesinglefile memory corruption
10917| [42644] HP Instant Support up to 1.0.0.22 ActiveX Control hpisdatamanagerlib.datamgr downloadfile memory corruption
10918| [42643] HP Instant Support up to 1.0.0.21 ActiveX Control hpisdatamanagerlib.datamgr registrystring memory corruption
10919| [42642] HP Instant Support up to 1.0.0.22 ActiveX Control hpisdatamanagerlib.datamgr movefile memory corruption
10920| [42641] HP Instant Support up to 1.0.0.22 ActiveX Control hpisdatamanagerlib.datamgr getfiletime memory corruption
10921| [42640] HP Instant Support up to 1.0.0.21 ActiveX Control hpisdatamanagerlib.datamgr extractcab memory corruption
10922| [42625] QuickUpCMS events3.php sql injection
10923| [42621] TYPO3 Rlmp Eventdb up to 1.1.0 cross site scripting
10924| [42606] CA Internet Security Suite Plus 2008 ActiveX Control umxeventcli.dll directory traversal
10925| [42473] gnu gnutls up to 1.0.18 lib/gnutls_kx.c _gnutls_recv_client_kx_message denial of service
10926| [42464] WebManager-Pro CMS WebManager-Pro index.php sql injection
10927| [42457] TYPO3 Air Filemanager up to 0.6.0 memory corruption
10928| [42456] TYPO3 Air Filemanager up to 0.6.0 cross site scripting
10929| [42455] Avalonnet News Manager 2.0 information disclosure
10930| [42454] Avalonnet News Manager 2.0 attachments.php directory traversal
10931| [42453] Avalonnet News Manager 2.0 ch_readalso.php privilege escalation
10932| [42452] Avalonnet News Manager 2.0 advsearch.php sql injection
10933| [42410] Emophp EMO Realty Manager news.php sql injection
10934| [42407] Cisco Building Broadband Service Manager 5.3 accesscodestart.asp cross site scripting
10935| [42405] Cisco Unified Communications Manager denial of service
10936| [42404] Cisco Unified Callmanager up to 4.1.2 denial of service
10937| [42403] Cisco Unified Communications Manager up to 5.0 Agent Service Stack-Based denial of service
10938| [42402] Cisco Unified Communications Manager up to 5.0 denial of service
10939| [42401] Cisco Unified Communications Manager up to 6.0 Certificate Authority Proxy Function proxy denial of service
10940| [42400] Cisco Unified Communications Manager Certificate Trust List Memory Leak denial of service
10941| [42399] Cisco Unified Communications Manager up to 5.0 Certificate Trust List Memory Leak denial of service
10942| [42334] Shelter Manager Animal Shelter Manager up to 1.39 privilege escalation
10943| [42267] qto QTOFileManager 1.0 File Upload qtofm.php unknown vulnerability
10944| [42229] Bitrix Site Manager 6.5 redirect.php privilege escalation
10945| [42217] Akamai Technologies Download Manager ActiveX Control downloadmanagerv2.ocx memory corruption
10946| [42157] CA Secure Content Manager up to 8.0.28000.511 Crash denial of service
10947| [42138] IBM Lotus Expeditor Client 6.1.2 URI memory corruption
10948| [42147] Horde Groupware 1.0.5/1.0.6 addevent.php cross site scripting
10949| [42072] Carboncommunities Carbon Communities up to 2.1 events.asp sql injection
10950| [42063] CDNetworks Download Client 1.0.5 ActiveX Control neffylauncher.dll unknown vulnerability
10951| [42062] CDNetworks Download Client 1.0.5 ActiveX Control neffylauncher.dll directory traversal
10952| [42030] iScripts SocialWare events.php sql injection
10953| [42024] HP OpenView Network Node Manager 7.53 denial of service
10954| [42023] HP OpenView Network Node Manager 7.53 NULL Pointer Dereference denial of service
10955| [42022] HP OpenView Network Node Manager 7.53 denial of service
10956| [42008] HP OpenView Network Node Manager up to 6.2 ovspmd.exe memory corruption
10957| [42002] Cisco Network Admission Control up to 3.6.0.0 Access Manager information disclosure
10958| [42019] HP OpenView Network Node Manager 7.53 openview5.exe directory traversal
10959| [41917] Ignite Realtime Openfire 3.4.5 connectionmanagerimpl.java denial of service
10960| [41962] iScripts SocialWare File Upload events.php sql injection
10961| [47470] Avaya Communication Manager 3.1.4 sql injection
10962| [41868] HP OpenView Network Node Manager up to 7.0.1 ovas.exe memory corruption
10963| [41860] CA Threat Manager for the Enterprise up to R8.1 alert.exe memory corruption
10964| [41845] IBM DB2 Content Manager up to 8.2 unknown vulnerability
10965| [41844] Cisco Unified Communications Manager 5.1 memory corruption
10966| [41834] Savas Place Savas Link Manager 2.0 index.php directory traversal
10967| [41833] Perlbal 1.60 clienthttpbase.pm _serve_request_multiple directory traversal
10968| [41826] Guillaume Meister Php Spammanager 0.53 body.php directory traversal
10969| [41825] Savas Place Savas Link Manager 2.0 viewlinks.php sql injection
10970| [41801] 2X ThinClientServer 3.2.0.0/5.0 TFTP Service tftpd.exe directory traversal
10971| [47472] Avaya Communication Manager 3.1.4 denial of service
10972| [47471] Avaya Communication Manager 3.1.4 denial of service
10973| [41769] ManageEngine Applications Manager 8.1 search.do cross site scripting
10974| [41755] silc SILC Client up to 1.1.2 silcpkcs1.c silc_pkcs1_decode memory corruption
10975| [41740] ManageEngine EventLog Analyzer 5 searchaction.do cross site scripting
10976| [41718] Mozilla Firefox/Thunderbird up to 2.0.12 Event cross site scripting
10977| [41537] Microsoft Internet Explorer 5/6 FTP Client privilege escalation
10978| [41477] Besavvy Savvy Content Manager searchresults.cfm cross site scripting
10979| [3650] Microsoft Internet Explorer up to 6 FTP Client unknown vulnerability
10980| [41460] Adobe Form Client 5.0 ActiveX Control filedlg.dll memory corruption
10981| [41440] Argontechnology Client Management Services up to 1.31 tftpsrvs.exe directory traversal
10982| [41371] Sun Java System Access Manager 7.1 Administration Console cross site scripting
10983| [49759] Eye.fi Eye-Fi Manager 1.1.2 cross site request forgery
10984| [49758] Eye.fi Eye-Fi Manager 1.1.2 unknown vulnerability
10985| [49757] Eye.fi Eye-Fi Manager 1.1.2 Crash denial of service
10986| [41309] Barryvan Compo Barryvan Compo Manager 0.3 main.php privilege escalation
10987| [41241] Linux Web Shop php Download Manager 1.1 directory traversal
10988| [41209] XOOPS Tiny Event Module 1.01 index.php sql injection
10989| [41207] Novell iPrint Client up to 4.31 ActiveX Control ienipp.ocx memory corruption
10990| [41166] Hitachi EUR Print Manager up to 05-06 denial of service
10991| [41119] Lyris List Manager up to 9.x unknown vulnerability
10992| [41096] Horde Turba Contact Manager up to 2.1.5 Address Book lib/driver/sql.php unknown vulnerability
10993| [41089] LookStrike Lan Manager 0.9 modules\class\table.php directory traversal
10994| [41073] Cisco Skinny Client Control Protocol Firmware Heap-based memory corruption
10995| [41072] Cisco Skinny Client Control Protocol Firmware memory corruption
10996| [41071] Cisco Skinny Client Control Protocol Telnet Server memory corruption
10997| [41070] Cisco Skinny Client Control Protocol Firmware memory corruption
10998| [41069] Cisco Skinny Client Control Protocol denial of service
10999| [41068] Cisco Skinny Client Control Protocol Firmware denial of service
11000| [41055] Cisco Unified CallManager up to 5.x User Interface sql injection
11001| [41045] IBM Informix Storage Manager up to 10.00.xc8 Stack-based memory corruption
11002| [41043] Brooks Internet Software Rpm Remote Print Manager Elite up to 4.5.1.11 rpmsrvc.exe memory corruption
11003| [41032] Novell Client 4.91 nwspool.dll enumprinters memory corruption
11004| [41031] Novell Client 4.91 nwspool.dll memory corruption
11005| [41026] cyan soft Cyanprintip Professional up to 4.10.1030 reportsyslogevent memory corruption
11006| [40957] ACDSee Photo Manager 9.0 memory corruption
11007| [50087] MODX CMS 0.9.6.1 manager/index.php cross site scripting
11008| [40875] HP OpenView Network Node Manager 6.41 Out-of-Bounds denial of service
11009| [40793] F5 BIG-IP 9.4.3 Application Security Manager cross site scripting
11010| [40777] Sqlite Manager 1.2 sql injection
11011| [40742] ManageEngine Applications Manager 8.1 Build 8100 monitortype.do information disclosure
11012| [40741] ManageEngine Applications Manager 8.1 Build 8100 information disclosure
11013| [40740] ManageEngine Applications Manager 8.1 Build 8100 cross site scripting
11014| [40862] UltraVNC 1.0.2/1.0.4/1.0.4 Rc6/1.0.4 Rc7/1.0.4 Rc8 ClientConnection.cpp negotiateprotocolversion memory corruption
11015| [40683] 360 Web Manager 3.0 form.php sql injection
11016| [40668] IBM Tivoli Provisioning Manager Os Deployment up to 5.1.0.1 memory corruption
11017| [40663] BitDefender Update Server Enterprise Manager http.exe directory traversal
11018| [40622] Galaxyscripts Mini File Host up to 1.2.1 directory traversal
11019| [3559] Cisco VPN Client 5.0.02.0090 IPsec Crash denial of service
11020| [86322] Oracle E-Business Suite Applications Manager information disclosure
11021| [40588] Cisco Unified Callmanager up to 4.2 Certificate Trust List ctlprovider.exe memory corruption
11022| [40509] StreamAudio Chaincast Proxymanager Activex Control ActiveX Control ccpm_0237.dll memory corruption
11023| [40508] IBM Tivoli Storage Manager Express up to 5.2 dsmsvc.exe memory corruption
11024| [40500] Sun Java System Identity Manager up to 7.0 cross site scripting
11025| [40499] Sun Java System Identity Manager up to 7.0 cross site scripting
11026| [40498] Sun Java System Identity Manager up to 7.0 cross site scripting
11027| [38157] Webevents 2.7/2.61/2.71/2.72/4.03 webevent.cgi cross site scripting
11028| [40486] MySQL up to 1.7.5 handshake.cpp processoldclienthello memory corruption
11029| [40482] WordPress filemanager 1.2 File Upload ajaxfilemanager.php unknown vulnerability
11030| [40310] SkyFex SkyFex Client 1.0.2.77 ActiveX Control skyfexclient.ocx memory corruption
11031| [40146] Stbernard Open File Manager 9.5 ofmnt.exe memory corruption
11032| [40331] Novell Identity Manager 3.5.1 Crash denial of service
11033| [40091] IBM Tivoli Provisioning Manager Express Error Message information disclosure
11034| [40090] IBM Tivoli Provisioning Manager Express tpmx cross site scripting
11035| [86320] Form Tools client_page_open.php unknown vulnerability
11036| [40050] bcoos Event Calendar 1.0.10 cross site scripting
11037| [40028] HP OpenView Network Node Manager 7.0.1 cross site scripting
11038| [40026] HP OpenView Network Node Manager 7.0.1 ovlogin.exe memory corruption
11039| [40021] Meridian Software Prolog Manager up to 7.0 Cleartext weak encryption
11040| [39979] Xigla Absolute Banner Manager.net 4.0 abm.aspx sql injection
11041| [39968] SonicWALL GLobal VPN Client 4.0.0.810 Configuration File memory corruption
11042| [39966] Xigla Absolute News Manager.NET 5.1 Error Message getpath.aspx information disclosure
11043| [3488] IBM Tivoli Netcool Security Manager 1.3.0 cross site scripting
11044| [3487] IBM Tivoli Netcool Security Manager 1.3.0 cross site scripting
11045| [86336] Absolute News Manager pages/default.aspx cross site scripting
11046| [39965] Xigla Absolute News Manager.NET 5.1 xlaabsolutenm.aspx cross site scripting
11047| [39964] Xigla Absolute News Manager.NET 5.1 xlaabsolutenm.aspx sql injection
11048| [39963] Xigla Absolute News Manager.NET 5.1 pages/default.aspx directory traversal
11049| [39869] vu Case Manager default.asp sql injection
11050| [39854] vu Case Manager Login Page default.asp sql injection
11051| [39836] Flor De Utopia WorkingOnWeb 2.0.1400 events.php sql injection
11052| [39742] Acdsee Photo Manager 9.0 Integer memory corruption
11053| [39611] ManageEngine OpManager 7.0 jsp/Login.do cross site scripting
11054| [39538] Novell BorderManager 3.8 clntrust.exe memory corruption
11055| [39793] AdventNet EventLog Analyzer Build 4030 unknown vulnerability
11056| [40048] IBM Tivoli Netcool Security Manager LDAP Authentication unknown vulnerability
11057| [39555] Hitachi Groupmax Collaboration Portal up to 07_32_c Web Client information disclosure
11058| [39501] IPSwitch IMail Server 2006.22 Mail Client memory corruption
11059| [3420] Sun Fire X2100/X2200 Embedded Lights Out Manager privilege escalation
11060| [39457] HP OpenView Configuration Management up to 4.2 Configuration Manager unknown vulnerability
11061| [85981] Codewidgets Online Event Registration CodeWidgets.com sql injection
11062| [39460] CodeWidgets Online Event Registration Template codewidgets.com sql injection
11063| [86410] PHP Project Management /blocks/events.php privilege escalation
11064| [39408] Nortel Business Communications Manager spoofing
11065| [39406] Nortel Business Communications Manager spoofing
11066| [39405] Nortel Business Communications Manager spoofing
11067| [3398] Cisco CallManager SIP Auth Header spoofing
11068| [39300] Oracle Database Server up to 10.2.0.4.0 Workspace Manager sql injection
11069| [39328] Cisco Unified Communications Manager up to 5.1 memory corruption
11070| [39327] Cisco Unified Communications Manager up to 5.1 Flooding denial of service
11071| [39319] Oracle Database Server 10.1.0.5 Enterprise Manager unknown vulnerability
11072| [39299] Oracle Database Server up to 10.2.0.4.0 Workspace Manager unknown vulnerability
11073| [39389] Alcatel-Lucent OmniVista 4760 R4.2 php-bin/Webclient.php cross site scripting
11074| [39201] Pindorama 0.1 client.php privilege escalation
11075| [39247] CRS Manager index.php privilege escalation
11076| [39148] Daniel Broadbent DB Manager 2.0 edit.asp cross site scripting
11077| [39139] Hitachi Ucosminexus Client denial of service
11078| [39078] Altnet Altnet Download Manager 4.0.0.6 ActiveX Control adm4.dll Install memory corruption
11079| [39042] CA BrightStor Hierarchical Storage Manager up to 11.4 Agent Service sql injection
11080| [39041] CA BrightStor Hierarchical Storage Manager up to 11.4 Agent Service Integer memory corruption
11081| [39040] CA BrightStor Hierarchical Storage Manager up to 11.4 Agent Service Stack-based memory corruption
11082| [3356] Sun Fire X2100/X2200 Embedded Lights Out Manager Umgehungs-Angriff
11083| [86068] eGov Manager Index.exe cross site scripting
11084| [39021] Sun Java System Access Manager 7.1 memory corruption
11085| [39020] Sun Java System Access Manager 7.1 unknown vulnerability
11086| [38995] Boesch-it SimpNews 2.41.03 Error Message events.php mktime information disclosure
11087| [38955] Sisd Freeside 1.7.2 cust_bill_event.cgi cross site scripting
11088| [3320] IBM Tivoli Storage Manager memory corruption
11089| [38846] Omnistar Interactive OmniStar Article Manager article.php sql injection
11090| [86546] Der Dirigent class.filemanager.php unknown vulnerability
11091| [39017] North Country Public Radio Public Media Manager 1.3 newstopic_inc.php privilege escalation
11092| [38728] Microsoft SQL Server 2005 Enterprise Manager sqldmo.dll memory corruption
11093| [40235] IBM Db2 Content Manager Toolkit up to 8.2 unknown vulnerability
11094| [38654] Hitachi Jp1 Cm2 Network Node Manager up to 07_10_02 memory corruption
11095| [38668] Telecom Italy Alice Messenger 1.1 ActiveX Control hp.revolution.registrymanager.dll unknown vulnerability
11096| [38601] Cisco Call Manager up to 4.3 sql injection
11097| [38600] Cisco Call Manager up to 4.3 cross site scripting
11098| [38596] Novell Client 4.91 nwspool.dll memory corruption
11099| [38580] Dale Mooney Calendar Events viewevent.php sql injection
11100| [38495] Ripe Website Manager up to 0.8.4 cross site scripting
11101| [38490] EventList 0.8 on Joomla index.php sql injection
11102| [86059] Ripe Website Manager do_new_page.php cross site scripting
11103| [86058] Ripe Website Manager do_new_nav.php cross site scripting
11104| [86057] Ripe Website Manager do_new_item.php cross site scripting
11105| [86056] Ripe Website Manager delete_item.php cross site scripting
11106| [86055] Ripe Website Manager delete_menu.php cross site scripting
11107| [38496] Ripe Website Manager up to 0.8.4 pages/delete_page.php cross site scripting
11108| [38473] eCentrex VOIP Client module 2.0.1 ActiveX Control uacomx.ocx memory corruption
11109| [38337] Motive Incorporated Service Activation Manager up to 5.1 ActiveX Control activeutils.dll memory corruption
11110| [3236] Cisco Unified Communications Manager SIP Packet memory corruption
11111| [38269] serendipity 1.1.3 Password Protection serendipity_event_entryproperties.php privilege escalation
11112| [3227] GNOME Display Manager up to 2.18.4 File Creation denial of service
11113| [38219] Morgan Ids Next Gen Portfolio Manager default.asp sql injection
11114| [38123] Platon phpWebFileManager 0.5 index.php privilege escalation
11115| [38216] Hitachi Groupmax Collaboration Web Client up to 07-32_a information disclosure
11116| [38115] Codewidgets Online Event Registration Template sign_in.aspx sql injection
11117| [38114] Codewidgets Online Event Registration Template sign_in.aspx sql injection
11118| [38089] AlstraSoft Article Manager Pro 1.6 contact_author.php cross site scripting
11119| [37907] CA Threat Manager up to 7 alert.exe memory corruption
11120| [37906] IBM Tivoli Provisioning Manager Os Deployment up to 5.1.0.1 rembo.exe denial of service
11121| [37882] Mozilla Firefox 2.0/2.0.0.1/2.0.0.2/2.0.0.3/2.0.0.4 Event memory corruption
11122| [37831] Hitachi Jp1-netm-dm Manager sql injection
11123| [39331] OpenSSH 4.3p2 Audit Log linux_audit_record_event unknown vulnerability
11124| [37798] RSA Authentication Manager 6.1 mprosrv.exe memory corruption
11125| [37805] Cisco Unified Communications Manager up to 5.x risdc.exe memory corruption
11126| [37796] Cisco Unified Communications Manager up to 5.x Certificate Trust List ctlprovider.exe memory corruption
11127| [37812] Cisco Unified Communications Manager 5.1 information disclosure
11128| [37811] Cisco Unified Communications Manager 5.1 denial of service
11129| [37822] Belkin F5D7231-4 Firmware 4.05.03 DHCP Client cross site scripting
11130| [37698] Hitachi Jp1-hicommand Tiered Storage Manager Replication cross site scripting
11131| [37702] Levent Veysi Portal 1.0 oku.asp sql injection
11132| [3165] SAP Web Application Server Internet Communication Manager denial of service
11133| [3162] Citrix Presentation Server up to 10.100 Clients Content Crash denial of service
11134| [37644] Novell Access Manager up to 2 unknown vulnerability
11135| [37791] silc SILC Toolkit up to 1.1.0 client_notify.c memory corruption
11136| [86176] ManageEngine OpManager DeviceAssociation.do cross site scripting
11137| [86175] ManageEngine OpManager ServiceConfiguration.do cross site scripting
11138| [86174] ManageEngine OpManager ReportViewAction.do cross site scripting
11139| [86173] ManageEngine OpManager map/traceRoute.do cross site scripting
11140| [86172] ManageEngine OpManager map/ping.do cross site scripting
11141| [37603] Ripe Website Manager up to 0.8.9 includes/phpinfo.php phpinfo unknown vulnerability
11142| [37599] ArcadeBuilder Game Portal Manager 1.7 sql injection
11143| [37597] Wesmo phpEventCalendar 0.2.3 eventdisplay.php sql injection
11144| [85911] Ripe Website Manager admin_header.php privilege escalation
11145| [37602] Ripe Website Manager up to 0.8.9 author_panel_header.php privilege escalation
11146| [86182] Buddy Zone view_events.php sql injection
11147| [37593] Sweetphp TotalCalendar 2.402 view_event.php sql injection
11148| [37468] kvirc IRC Client 3.2.0 parseircurl privilege escalation
11149| [37533] Xythos Enterprise Document Manager spoofing
11150| [37532] Xythos Enterprise Document Manager cross site request forgery
11151| [37531] Xythos Enterprise Document Manager cross site scripting
11152| [37403] Microsoft Internet Explorer 5/6/7 FTP Client privilege escalation
11153| [37427] Nortel Pc Client Soft Phone Sip 4.1 Crash denial of service
11154| [37378] Efstratios Geroulis Jasmine CMS 1.0 admin/plugin_manager.php directory traversal
11155| [37221] SafeNET Softremote VPN Client 1.4 denial of service
11156| [37136] Numara Asset Manager 8.0 xferwan.exe memory corruption
11157| [37420] Mywebland MyEvent 1.6 includes/template.php privilege escalation
11158| [37108] Hitachi Groupmax Collaboration Web Client File Sharing cross site scripting
11159| [85760] Logitech CallManager memory corruption
11160| [37057] Mozilla Firefox up to 2.0.0.3 Event Listener cross site scripting
11161| [37023] myEvent 1.6 Error Message login.php information disclosure
11162| [37048] F-Secure Policy Manager up to 7.00 fsmsh.dll denial of service
11163| [86022] myEvent myevent.php information disclosure
11164| [3097] Sun Solaris 8.0/9.0/10.0 NFS Client Module denial of service
11165| [3095] Symantec Enterprise Security Manager up to 6.5.3 race condition
11166| [37008] Dokeos 1.8.0 ImageManager/editor.php cross site scripting
11167| [2977] Cisco CallManager up to 4.1 Web Interface /CCMAdmin/serverlist.asp cross site scripting
11168| [36927] ClientExec 3.0 Beta2 index.php cross site scripting
11169| [36861] Touteresa ResManager 1.2.1 edit_day.php sql injection
11170| [85551] MyBB event.php information disclosure
11171| [36786] Bugada Andrea PHP Advanced Transfer Manager 1.30 index.php directory traversal
11172| [36747] Bradford CampusManager Network Control Application Server 3.1(6) runtime information disclosure
11173| [36739] Extrovert Software Thyme Calndar 1.3 event_view.php sql injection
11174| [36699] Adobe RoboHelp 6/X5 windowmanager.dll cross site scripting
11175| [36842] HP Systems Insight Manager 4.2 unknown vulnerability
11176| [36632] SmartCode VNC Manager 3.6 ActiveX Control scvncctrl.dll connectasyncex memory corruption
11177| [36472] phpBandManager 0.8 suite/index.php privilege escalation
11178| [36574] Cisco PIX 7.1/7.2 Clientless SSL VPN denial of service
11179| [36516] Symantec Enterprise Security Manager up to 6.5.1 memory corruption
11180| [37103] Mbedthis AppWeb HTTP Server 2.0.5-4 Logging mprlogtofile::logevent denial of service
11181| [36542] ManageEngine PasswordManager Pro unknown vulnerability
11182| [36457] Goldcoders Manager smarty.class.php privilege escalation
11183| [36429] Digium Asterisk up to 1.4.2 Manager Interface manager.conf denial of service
11184| [36418] ABC-View Manager 1.42 memory corruption
11185| [36339] Webinsta FM Manager up to 0.1.4 admin/login.php privilege escalation
11186| [36367] Ripe Website Manager up to 0.8.4 contact/index.php sql injection
11187| [36366] Ripe Website Manager up to 0.8.4 contact/index.php cross site scripting
11188| [36300] BMC Performance Manager Configuration File patrolagent.exe memory corruption
11189| [36274] Oracle Enterprise Manager 9.2.0.8 unknown vulnerability
11190| [36203] Akamai Technologies Manager 2.2.0.0 downloadmanagerv2.ocx memory corruption
11191| [36202] Akamai Technologies Download Manager ActiveX Control downloadmanagerv2.ocx getprivateprofilesectionw memory corruption
11192| [36194] Openads 2.3.30 Media Manager unknown vulnerability
11193| [36436] News Manager Deluxe 1.0.1 includes/footer.php directory traversal
11194| [85875] AjPortal2Php includes/events.inc.php unknown vulnerability
11195| [36146] InoutMailingListManager 3.1 changename.php sql injection
11196| [36145] InoutMailingListManager 3.1 Authorization unknown vulnerability
11197| [36144] InoutMailingListManager 3.1 unknown vulnerability
11198| [38594] Xigla Absolute Poll Manager XE 4.1 xlaapmview.asp cross site scripting
11199| [36156] MyNews 4.2.2 week_events.php privilege escalation
11200| [36475] Enterasys NetSight Inventory Manager 2.1 Console Crash denial of service
11201| [36474] Enterasys NetSight Inventory Manager 2.1 Console Stack-based memory corruption
11202| [36084] Acd Systems ACDSee Photo Manager 9.0 Integer memory corruption
11203| [36007] IBM Tivoli Provisioning Manager Os Deployment up to 5.0 memory corruption
11204| [35985] LDAP Account Manager lib/modules.inc cross site scripting
11205| [35979] Cisco Unified CallManager Flooding denial of service
11206| [35978] Cisco Unified CallManager up to 3.2 denial of service
11207| [35951] Chapi Tiny Event up to 1.01 index.php sql injection
11208| [35990] Php Fusion Expanded Calendar Module 2.00 show_event.php sql injection
11209| [35998] Hitachi Jp1-hicommand Tuning Manager 05_10 information disclosure
11210| [35928] Hitachi Cosminexus Collaboration Portal Web Client sql injection
11211| [35902] AOL Client Software deskbar.dll denial of service
11212| [35965] Cisco Unified CallManager denial of service
11213| [35880] HP OpenView Network Node Manager 6.20 privilege escalation
11214| [35856] Car Manager up to 1.1 on Joomla index.php sql injection
11215| [85358] CipherTrust IronMail systemLicenseManager.do cross site scripting
11216| [35722] Radscan Network Audio System up to 1.x readrequestfromclient denial of service
11217| [35658] McAfee ProtectionPilot 1.1.1/1.5.0 Management Console sitemanager.dll swprintf memory corruption
11218| [35629] Cisco Acs Solution Engine 4.1 Security Device Manager presearch.html cross site scripting
11219| [38814] ewire Payment Client 1.70 ewirepcfunctions.php ewirepc_decrypt privilege escalation
11220| [35601] Apple Mac OS X up to 10.3.9 Server Manager denial of service
11221| [35652] Avaya Communication Manager up to 3.1.2 privilege escalation
11222| [35421] DMXReady Site Engine Manager 1.0 index.asp sql injection
11223| [35384] Netrek Netrek Vanilla Server 2.12.0 Eventlog new_warning memory corruption
11224| [35381] built2go News Manager Blog 1.0 news.php cross site scripting
11225| [35472] Novell Access Manager 3 unknown vulnerability
11226| [35247] Shop Kit Plus Initial Error Message events.php information disclosure
11227| [35366] SQLiteManager 1.2.0 sql injection
11228| [85145] ActiveCalendar data/xmlevents.php cross site scripting
11229| [35225] ActiveCalendar 1.2.0 flatevents.php cross site scripting
11230| [35365] SQLiteManager 1.2.0 main.php cross site scripting
11231| [85141] ActiveCalendar data/mysqlevents.php cross site scripting
11232| [85231] Hitachi JP1/Cm2/Network Node Manager Utility unknown vulnerability
11233| [35208] Hitachi Cm2-network Node Manager memory corruption
11234| [85151] SiteX calendar_events.php cross site scripting
11235| [85148] sitex calendar_events.php information disclosure
11236| [35107] Niels Provos libevent 1.2/1.2a denial of service
11237| [2945] Trend Micro OfficeScan 7.0/7.3 Client ActiveX Control memory corruption
11238| [2934] MailEnable Web Mail Client Body Eingabeung\xC3\xBCltigkeit
11239| [35002] Microsoft Internet Explorer 5.01/6 FTP Client wininet.dll memory corruption
11240| [34925] cPanel WebHost Manager memory corruption
11241| [34986] cPanel WebHost Manager up to 11.0.0 cross site scripting
11242| [2909] HP OpenView Network Node Manager up to 7.50 Directory HP OpenView Directory privilege escalation
11243| [85156] cPanel WebHost Manager scripts2/objcache privilege escalation
11244| [84965] phpEventMan common.function.php unknown vulnerability
11245| [34822] phpEventMan 1.0.2 text.ctrl.php privilege escalation
11246| [85699] PhP Generic Library & Framework membreManager.php unknown vulnerability
11247| [34752] Sun Java System Access Manager up to 6.0 cross site scripting
11248| [34695] Interactive-Scripts.Com PHP Membership Manager 1.5 admin.php cross site scripting
11249| [34596] Openads 2.3.30 Media Manager affiliate-search.php cross site scripting
11250| [34550] Easebay Manager sql injection
11251| [34549] Easebay Manager cross site scripting
11252| [34548] Easebay Manager 3.0 sql injection
11253| [34547] Easebay Manager 3.0 cross site scripting
11254| [85635] Login Manager memberlist.php sql injection
11255| [34531] WDaemon 7.2.0/9.0.4/9.5.4 Worldclient worldclient.dll unknown vulnerability
11256| [34544] Cisco Adaptive Security Device Manager up to 4.2.2 spoofing
11257| [85110] Oracle Enterprise Manager unknown vulnerability
11258| [85109] Oracle Enterprise Manager unknown vulnerability
11259| [34448] Oracle Enterprise Manager 10.1.0.5 unknown vulnerability
11260| [34447] Oracle Enterprise Manager 10.1.0.5 unknown vulnerability
11261| [2845] BEA WebLogic up to 8.1.5 X.509 Client Certificate weak authentication
11262| [34403] easy-content File Manager unknown vulnerability
11263| [34355] HP OpenView Network Node Manager 6.20 unknown vulnerability
11264| [2808] Microsoft Outlook 2000/2002/2003 Meeting VEVENT memory corruption
11265| [34265] Perforce client unknown vulnerability
11266| [2803] Novell Access Manager 3 Error Message /nidp/idff/sso cross site scripting
11267| [85077] Fix and Chips CMS client-results.php cross site scripting
11268| [2796] Novell Client up to 4.91 SP3 on Windows Terminal Server/Citrix unknown vulnerability
11269| [34240] Cisco Clean Access up to 3.5.x Access Manager unknown vulnerability
11270| [34100] DMXReady Secure Login Manager 1.0 Admin Panel set_preferences.asp cross site scripting
11271| [34098] Mxmania Mxmania File Upload Manager up to 1.0.6 detail.asp sql injection
11272| [34085] Limbo CMS event module 1.0 eventcal/mod_eventcal.php privilege escalation
11273| [85172] Secure Login Manager members.asp sql injection
11274| [85171] Secure Login Manager content.asp sql injection
11275| [85170] Secure Login Manager login.asp sql injection
11276| [85169] Secure Login Manager list.asp sql injection
11277| [85168] Secure Login Manager send_password_preferences.asp sql injection
11278| [34101] DMXReady Secure Login Manager 1.0 Admin Panel set_preferences.asp sql injection
11279| [34038] Microsoft Windows Event Viewer eventvwr.exe unknown vulnerability
11280| [33996] MGinternet Property Site Manager detail.asp sql injection
11281| [33995] MGinternet Property Site Manager listings.asp cross site scripting
11282| [33920] Mambo Extcalthai Module up to 0.9.1 admin_events.php privilege escalation
11283| [33894] IBM Tivoli Identity Manager 4.6 information disclosure
11284| [33883] ScriptMate User Manager up to 2.1 sql injection
11285| [33882] ScriptMate User Manager 2.0 sql injection
11286| [33871] ScriptMate User Manager up to 2.1 Search Box information disclosure
11287| [33870] ScriptMate User Manager up to 2.1 Search Box cross site scripting
11288| [2758] GNOME Display Manager up to 2.17 Face Browser Configuration GUI Format String
11289| [33841] tucows Client Code Suite up to 1.2.1015 domainutils.inc.php privilege escalation
11290| [33838] cPanel WebHost Manager 3.1.0 cross site scripting
11291| [2746] Novell Client 4.91 SP2/4.91 SP3 on Windows NMAS Username denial of service
11292| [33753] Novell Client 4.91 ndppnt.dll memory corruption
11293| [33750] AOL Client Software 7.0 ActiveX Control cddbcontrolaol.cddbaolcontrol setclientinfo memory corruption
11294| [33711] 2X ThinClientServer 3.0 unknown vulnerability
11295| [33688] ONEdotOH Simple File Manager 0.24a fm.php memory corruption
11296| [2723] Novell Client up to 4.91 SP2 on Windows ndppnt.dll memory corruption
11297| [2722] Novell Client up to 4.91 SP2 on Windows SRVLOC.SYS denial of service
11298| [33641] IBM Tivoli Storage Manager up to 5.2.8 Crash denial of service
11299| [33636] Adobe Download Manager up to 2.1 dm.ini memory corruption
11300| [33635] IBM Tivoli Storage Manager up to 5.2.8 smexecutewdsfsession memory corruption
11301| [33536] cPanel WebHost Manager 3.1.0 cross site scripting
11302| [33476] JiRos FAQ Manager 1.0 index.asp sql injection
11303| [33475] JiRos Links Manager 1.0 submitlink.asp cross site scripting
11304| [33474] JiRos Links Manager 1.0 openlink.asp sql injection
11305| [33435] Dotnetindex Active News Manager activenews_search.asp cross site scripting
11306| [2704] Mozilla Firefox up to 2.0 Password Manager cross site scripting
11307| [33390] NetEpi Case Manager up to 0.97 Error Message unknown vulnerability
11308| [33352] MGinternet Car Site Manager cross site scripting
11309| [33348] WebEvents Online Event Registration up to 2.0 Profiles save_profile.asp unknown vulnerability
11310| [2702] Novell Client 4.91/4.91 SP1/4.91 SP2 on Windows NWSPOOL.DLL memory corruption
11311| [84952] ActiveNews Manager default.asp sql injection
11312| [33434] Dotnetindex Active News Manager activenews_view.asp sql injection
11313| [84846] Dragon Internet Events Listing venue_detail.asp sql injection
11314| [84845] Dragon Internet Events Listing event_searchdetail.asp sql injection
11315| [33405] Dragon Internet Events Listing 2.x admin_login.asp sql injection
11316| [33306] MGinternet Car Site Manager sql injection
11317| [33305] MGinternet Car Site Manager cross site scripting
11318| [33304] Website Designs for Less Inventory Manager sql injection
11319| [33303] Website Designs For Less Inventory Manager cross site scripting
11320| [33297] Iexpress Estate Agent Manager up to 1.3 sql injection
11321| [33287] Efficientip iPmanager 2.3 index.php cross site scripting
11322| [33280] Omnistar Interactive OmniStar Article Manager sql injection
11323| [84849] Active News Manager activenews_search.asp sql injection
11324| [84848] Active News Manager activeNews_comments.asp sql injection
11325| [33433] Dotnetindex Active News Manager activenews_categories.asp sql injection
11326| [2688] Microsoft Windows 2000/Server 2003/XP Client Service for Netware denial of service
11327| [2686] Microsoft Windows 2000/Server 2003/XP Client Service for Netware memory corruption
11328| [2677] Novell BorderManager 3.8 ISAKMP Cookie Bypass weak authentication
11329| [33160] Creasito Creasito E-Commerce Content Manager 1.3.08 addnewcont.php unknown vulnerability
11330| [2660] AOL Instant Messenger up to 5.1 ICQPhone.SipxPhoneManager memory corruption
11331| [2656] Red Hat RPM Package Manager up to 4.4.2 RPM Packet Heap-based memory corruption
11332| [33112] Zend Zend Google Data Client Library Preview 0.2.0 basedemo.php cross site scripting
11333| [33104] Alt-N MDaemon up to 9.49 Worldclient Memory Leak denial of service
11334| [33079] Evandor easy notesManager 0.0.1 login.php sql injection
11335| [33066] Novell iManager 1.5/2.0/2.0.2/2.5 NULL Pointer Dereference denial of service
11336| [33038] Thepeak Thepeak File Upload Manager 1.3 index.php directory traversal
11337| [32924] SSH Tectia Manager up to 5.1.0 Certificates unknown vulnerability
11338| [32912] Novell eDirectory 8.8/8.8.1 LDAP Service evtfilteredmonitoreventsrequest memory corruption
11339| [2628] Novell eDirectory 8.8/8.8.1 evtFilteredMonitorEventsRequest memory corruption
11340| [32870] University of Glasgow Specimen Image Database client.php privilege escalation
11341| [85311] Campsite Event.php privilege escalation
11342| [32730] Asbru Software Asbru Website Manager up to 6.1.21 privilege escalation
11343| [2607] Novell BorderManager 3.8 IPsec IKE.NLM denial of service
11344|
11345| MITRE CVE - https://cve.mitre.org:
11346| [CVE-2006-5484] SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents Tectia from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339.
11347| [CVE-2013-2970] Unspecified vulnerability in IBM QRadar Security Information and Event Manager (SIEM) 7.x before 7.1 MR2 Patch 1 allows remote authenticated users to execute operating-system commands via unknown vectors.
11348| [CVE-2013-2396] Unspecified vulnerability in the Oracle Applications Manager component in Oracle E-Business Suite 12.0.6 and 12.1.3 allows remote attackers to affect integrity via vectors related to HTML OAM client.
11349| [CVE-2013-1192] The JAR files on Cisco Device Manager for Cisco MDS 9000 devices before 5.2.8, and Cisco Device Manager for Cisco Nexus 5000 devices, allow remote attackers to execute arbitrary commands on Windows client machines via a crafted element-manager.jnlp file, aka Bug IDs CSCty17417 and CSCty10802.
11350| [CVE-2013-0973] Software Update in Apple Mac OS X through 10.7.5 does not prevent plugin loading within the marketing-text WebView, which allows man-in-the-middle attackers to execute plugin code by modifying the client-server data stream.
11351| [CVE-2013-0472] The Web GUI in the client in IBM Tivoli Storage Manager (TSM) 6.3 before 6.3.1.0 and 6.4 before 6.4.0.1 allows man-in-the-middle attackers to obtain unspecified client access, and consequently obtain unspecified server access, via unknown vectors.
11352| [CVE-2013-0471] The traditional scheduler in the client in IBM Tivoli Storage Manager (TSM) before 6.2.5.0, 6.3 before 6.3.1.0, and 6.4 before 6.4.0.1, when Prompted mode is enabled, allows remote attackers to cause a denial of service (scheduling outage) via unspecified vectors.
11353| [CVE-2012-5516] Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when moving disks between storage domains, does not properly wipe-after-delete, which prevents disks from being securely deleted and might allow local users to obtain sensitive information via unspecified vectors.
11354| [CVE-2012-3310] IBM Tivoli Federated Identity Manager (TFIM) before 6.1.1.14, 6.2.0 before 6.2.0.12, and 6.2.1 before 6.2.1.4 allows context-dependent attackers to discover (1) a cleartext LDAP Bind Password, (2) keystore passwords, (3) a cleartext Basic Authentication password from a client, or (4) a cleartext user password by leveraging a logging configuration with a log trace setting of all.
11355| [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
11356| [CVE-2012-1699] The ProcSetEventMask function in difs/events.c in the xfs font server for X.Org X11R6 through X11R6.6 and XFree86 before 3.3.3 calls the SendErrToClient function with a mask value instead of a pointer, which allows local users to cause a denial of service (memory corruption and crash) or obtain potentially sensitive information from memory via a SetEventMask request that triggers an invalid pointer dereference.
11357| [CVE-2012-0861] The vds_installer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, uses the -k curl parameter when downloading deployUtil.py and vds_bootstrap.py, which prevents SSL certificates from being validated and allows remote attackers to execute arbitrary Python code via a man-in-the-middle attack.
11358| [CVE-2011-5094] ** DISPUTED ** Mozilla Network Security Services (NSS) 3.x, with certain settings of the SSL_ENABLE_RENEGOTIATION option, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-1473. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.
11359| [CVE-2011-4759] Parallels Plesk Small Business Panel 10.2.0 generates web pages containing external links in response to GET requests with query strings for client@1/domain@1/hosting/file-manager/ and certain other files, which makes it easier for remote attackers to obtain sensitive information by reading (1) web-server access logs or (2) web-server Referer logs, related to a "cross-domain Referer leakage" issue.
11360| [CVE-2011-4755] Parallels Plesk Small Business Panel 10.2.0 does not properly validate string data that is intended for storage in an XML document, which allows remote attackers to cause a denial of service (parsing error) or possibly have unspecified other impact via a crafted cookie, as demonstrated by cookies to client@1/domain@1/hosting/file-manager/ and certain other files.
11361| [CVE-2011-4530] Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 does not properly copy fields obtained from clients, which allows remote attackers to cause a denial of service (exception and daemon crash) via long fields, as demonstrated by fields to the (1) open_session->workstation->NAME or (2) grant->VERSION function.
11362| [CVE-2011-4188] Buffer overflow in the Create Attribute function in jclient in Novell iManager 2.7.4 before patch 4 allows remote authenticated users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted EnteredAttrName parameter, a related issue to CVE-2010-1929.
11363| [CVE-2011-3408] Csrsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka "CSRSS Local Privilege Elevation Vulnerability."
11364| [CVE-2011-2491] The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.
11365| [CVE-2011-1967] Winsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka "CSRSS Vulnerability."
11366| [CVE-2011-1473] ** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.
11367| [CVE-2011-1423] Cross-site scripting (XSS) vulnerability in RSA Data Loss Prevention (DLP) Enterprise Manager 8.x before 8.5 SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
11368| [CVE-2011-1224] IBM WebSphere MQ 6.0 before 6.0.2.11 and 7.0 before 7.0.1.5 does not use the CRL Distribution Points (CDP) certificate extension, which might allow man-in-the-middle attackers to spoof an SSL partner via a revoked certificate for a (1) client, (2) queue manager, or (3) application.
11369| [CVE-2011-1223] Buffer overflow in the Alternate Data Stream (aka ADS or named stream) functionality in the backup-archive client in IBM Tivoli Storage Manager (TSM) before 5.4.3.4, 5.5.x before 5.5.3, 6.x before 6.1.4, and 6.2.x before 6.2.2 on Windows allows local users to gain privileges via unspecified vectors.
11370| [CVE-2011-1222] Buffer overflow in the Journal Based Backup (JBB) feature in the backup-archive client in IBM Tivoli Storage Manager (TSM) before 5.4.3.4, 5.5.x before 5.5.3, 6.x before 6.1.4, and 6.2.x before 6.2.2 on Windows and AIX allows local users to gain privileges via unspecified vectors.
11371| [CVE-2011-1036] The XML Security Database Parser class in the XMLSecDB ActiveX control in the HIPSEngine component in the Management Server before 8.1.0.88, and the client before 1.6.450, in CA Host-Based Intrusion Prevention System (HIPS) 8.1, as used in CA Internet Security Suite (ISS) 2010, allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via vectors involving the SetXml and Save methods.
11372| [CVE-2011-0959] Multiple cross-site scripting (XSS) vulnerabilities in Cisco Unified Operations Manager (CUOM) before 8.6 allow remote attackers to inject arbitrary web script or HTML via (1) the extn parameter to iptm/advancedfind.do, (2) the deviceInstanceName parameter to iptm/ddv.do, the (3) cmd or (4) group parameter to iptm/eventmon, the (5) clusterName or (6) deviceName parameter to iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp, or the (7) ccmName or (8) clusterName parameter to iptm/logicalTopo.do, aka Bug ID CSCtn61716.
11373| [CVE-2011-0921] crs.exe in the Cell Manager Service in the client in HP Data Protector does not properly validate credentials associated with the hostname, domain, and username, which allows remote attackers to execute arbitrary code by sending unspecified data over TCP, related to the webreporting client, the applet domain, and the java username.
11374| [CVE-2011-0830] Unspecified vulnerability in the Event Management component in Oracle Database Server 10.1.0.5, 10.2.0.3, and 10.2.0.4, and Oracle Enterprise Manager Grid Control 10.1.0.6, allows remote attackers to affect integrity via unknown vectors related to Rules Management UI.
11375| [CVE-2011-0647] The irccd.exe service in EMC Replication Manager Client before 5.3 and NetWorker Module for Microsoft Applications 2.1.x and 2.2.x allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
11376| [CVE-2010-4606] Unspecified vulnerability in the Space Management client in the Hierarchical Storage Management (HSM) component in IBM Tivoli Storage Manager (TSM) 5.4.x before 5.4.3.4, 5.5.x before 5.5.3, 6.1.x before 6.1.4, and 6.2.x before 6.2.2 on Unix and Linux allows remote attackers to execute arbitrary commands via unknown vectors, related to a "script execution vulnerability."
11377| [CVE-2010-4605] Unspecified vulnerability in the backup-archive client in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.3, 6.1.x before 6.1.4, and 6.2.x before 6.2.2 on Unix and Linux allows local users to overwrite arbitrary files via unknown vectors.
11378| [CVE-2010-4604] Stack-based buffer overflow in the GeneratePassword function in dsmtca (aka the Trusted Communications Agent or TCA) in the backup-archive client in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.2.10, and 6.1.x before 6.1.3.1 on Unix and Linux allows local users to gain privileges by specifying a long LANG environment variable, and then sending a request over a pipe.
11379| [CVE-2010-4591] The Connection Manager in IBM Lotus Mobile Connect (LMC) before 6.1.4, when HTTP Access Services (HTTP-AS) is enabled, does not delete LTPA tokens in response to use of the iNotes Logoff button, which might allow physically proximate attackers to obtain access via an unattended client, related to a cookie domain mismatch.
11380| [CVE-2010-4184] NetSupport Manager (NSM) before 11.00.0005 sends HTTP headers with cleartext fields containing details about client machines, which allows remote attackers to obtain potentially sensitive information by sniffing the network.
11381| [CVE-2010-3757] Format string vulnerability in the _Eventlog function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to execute arbitrary code via format string specifiers located after a | (pipe) character in a string. NOTE: this might overlap CVE-2010-3059.
11382| [CVE-2010-3600] Unspecified vulnerability in the Client System Analyzer component in Oracle Database Server 11.1.0.7 and 11.2.0.1 and Enterprise Manager Grid Control 10.2.0.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this issue involves an exposed JSP script that accepts XML uploads in conjunction with NULL bytes in an unspecified parameter that allow execution of arbitrary code.
11383| [CVE-2010-2793] Race condition in the SPICE (aka spice-activex) plug-in for Internet Explorer in Red Hat Enterprise Virtualization (RHEV) Manager before 2.2.4 allows local users to create a certain named pipe, and consequently gain privileges, via vectors involving knowledge of the name of this named pipe, in conjunction with use of the ImpersonateNamedPipeClient function.
11384| [CVE-2010-2625] Unspecified vulnerability in the Client Service for DPM in Hitachi ServerConductor / Deployment Manager 01-00, 01-01, and 06-00 through 06-00-/A
11385| [CVE-2010-2526] The cluster logical volume manager daemon (clvmd) in lvm2-cluster in LVM2 before 2.02.72, as used in Red Hat Global File System (GFS) and other products, does not verify client credentials upon a socket connection, which allows local users to cause a denial of service (daemon exit or logical-volume change) or possibly have unspecified other impact via crafted control commands.
11386| [CVE-2010-1941] Unspecified vulnerability in NEC WebSAM DeploymentManager 5.13 and earlier, as used in SigmaSystemCenter 2.1 Update2 and earlier, BladeSystemCenter, ExpressSystemCenter, and VirtualPCCenter 2.2 and earlier, allows remote attackers to cause a denial of service (OS shutdown or restart) via unknown vectors related to Client Service for DPM and crafted packets to port 56010.
11387| [CVE-2010-1929] Multiple stack-based buffer overflows in the jclient._Java_novell_jclient_JClient_defineClass@20 function in jclient.dll in the Tomcat web server in Novell iManager 2.7, 2.7.3, and 2.7.3 FTF2 allow remote authenticated users to execute arbitrary code via the (1) EnteredClassID or (2) NewClassName parameter to nps/servlet/webacc.
11388| [CVE-2010-1904] SQL injection vulnerability in EMC RSA Key Manager (RKM) C Client 1.5.x allows user-assisted remote attackers to execute arbitrary SQL commands via the metadata section of encrypted key data.
11389| [CVE-2010-1439] yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network profile, and possibly prevent future security updates, by leveraging authentication data from this file.
11390| [CVE-2010-0995] Stack-based buffer overflow in Internet Download Manager (IDM) before 5.19 allows remote attackers to execute arbitrary code via a crafted FTP URI that causes unspecified "test sequences" to be sent from client to server.
11391| [CVE-2010-0586] Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz49741, the "SCCP Request Handling Denial of Service Vulnerability."
11392| [CVE-2010-0585] Cisco IOS 12.1 through 12.4, when Cisco Unified Communications Manager Express (CME) or Cisco Unified Survivable Remote Site Telephony (SRST) is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug ID CSCsz48614, the "SCCP Packet Processing Denial of Service Vulnerability."
11393| [CVE-2010-0500] Event Monitor in Apple Mac OS X before 10.6.3 does not properly validate hostnames of SSH clients, which allows remote attackers to cause a denial of service (arbitrary client blacklisting) via a crafted DNS PTR record, related to a "plist injection issue."
11394| [CVE-2010-0384] Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files.
11395| [CVE-2010-0106] The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via "specific events" that prevent the user from having read access to unspecified resources.
11396| [CVE-2009-3855] Multiple unspecified vulnerabilities in the (1) UNIX and (2) Linux backup-archive clients, and the (3) OS/400 API client, in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.6, 5.4 before 5.4.2, and 5.5 before 5.5.1, when the MAILPROG option is enabled, allow attackers to read, modify, or delete arbitrary files via unknown vectors.
11397| [CVE-2009-3854] Buffer overflow in the traditional client scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7 and 5.4 before 5.4.2 allows remote attackers to execute arbitrary code via unspecified vectors.
11398| [CVE-2009-3853] Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet.
11399| [CVE-2009-3110] Race condition in the file transfer functionality in Symantec Altiris Deployment Solution 6.9.x before 6.9 SP3 Build 430 allows remote attackers to read sensitive files and prevent client updates by connecting to the file transfer port before the expected client does.
11400| [CVE-2009-2713] The CDCServlet component in Sun Java System Access Manager 7.0 2005Q4 and 7.1, when Cross Domain Single Sign On (CDSSO) is enabled, does not ensure that "policy advice" is presented to the correct client, which allows remote attackers to obtain sensitive information via unspecified vectors.
11401| [CVE-2009-2462] The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) the frame chain and synchronous events, (2) a SetMayHaveFrame assertion and nsCSSFrameConstructor::CreateFloatingLetterFrame, (3) nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial reflow, (5) GetLastSpecialSibling, (6) nsFrameManager::GetPrimaryFrameFor and MathML, (7) nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame, (9) nsDOMOfflineResourceList, and (10) nsContentUtils::ComparePosition.
11402| [CVE-2009-1522] The IBM Tivoli Storage Manager (TSM) client 5.5.0.0 through 5.5.1.17 on AIX and Windows, when SSL is used, allows remote attackers to conduct unspecified man-in-the-middle attacks and read arbitrary files via unknown vectors.
11403| [CVE-2009-1521] Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors.
11404| [CVE-2009-1520] Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors.
11405| [CVE-2009-1432] Symantec Reporting Server, as used in Symantec AntiVirus (SAV) Corporate Edition 10.1 before 10.1 MR8 and 10.2 before 10.2 MR2, Symantec Client Security (SCS) before 3.1 MR8, and the Symantec Endpoint Protection Manager (SEPM) component in Symantec Endpoint Protection (SEP) before 11.0 MR2, allows remote attackers to inject arbitrary text into the login screen, and possibly conduct phishing attacks, via vectors involving a URL that is not properly handled.
11406| [CVE-2009-1392] The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr
11407| [CVE-2009-1251] Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays.
11408| [CVE-2009-1250] The cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58, and IBM AFS 3.6 before Patch 19, on Linux allows remote attackers to cause a denial of service (system crash) via an RX response with a large error-code value that is interpreted as a pointer and dereferenced, related to use of the ERR_PTR macro.
11409| [CVE-2009-1231] Unspecified vulnerability in the eClient in IBM DB2 Content Manager 8.4.1 before 8.4.1.1 has unknown impact and attack vectors.
11410| [CVE-2009-0869] Buffer overflow in the client in IBM Tivoli Storage Manager (TSM) HSM 5.3.2.0 through 5.3.5.0, 5.4.0.0 through 5.4.2.5, and 5.5.0.0 through 5.5.1.4 on Windows allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
11411| [CVE-2009-0632] The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.
11412| [CVE-2009-0057] The Certificate Authority Proxy Function (CAPF) service in Cisco Unified Communications Manager 5.x before 5.1(3e) and 6.x before 6.1(3) allows remote attackers to cause a denial of service (voice service outage) by sending malformed input over a TCP session in which the "client terminates prematurely."
11413| [CVE-2008-7154] Docebo 3.5.0.3 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) class/class.conf_fw.php, (2) class.module/class.event_manager.php, (3) lib/lib.domxml5.php, or (4) menu/menu_over.php in doceboCore/
11414| [CVE-2008-5872] Multiple unspecified vulnerabilities in the UNIStim File Transfer Protocol (UFTP) processing in IP Client Manager (IPCM) in Nortel Multimedia Communication Server (MSC) 5100 3.0.13 allow remote attackers to cause a denial of service (device outage) via a UFTP message that has a negative block size or other crafted Connection Details values.
11415| [CVE-2008-5684] Unspecified vulnerability in the X Inter Client Exchange library (aka libICE) in Sun Solaris 8 through 10 and OpenSolaris before snv_85 allows context-dependent attackers to cause a denial of service (application crash), as demonstrated by a port scan that triggers a segmentation violation in the Gnome session manager (aka gnome-session).
11416| [CVE-2008-4828] Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.
11417| [CVE-2008-4816] Unspecified vulnerability in the Download Manager in Adobe Reader 8.1.2 and earlier on Windows allows remote attackers to change Internet Security options on a client machine via unknown vectors.
11418| [CVE-2008-4801] Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM)
11419| [CVE-2008-4587] Insecure method vulnerability in the MSVNClientDownloadManager61Lib.DownloadManager.1 ActiveX control (ISDM.exe 6.1.100.61372) in Macrovision FLEXnet Connect 6.1 allows remote attackers to force the download and execution of arbitrary files via the AddFile and RunScheduledJobs methods. NOTE: this could be leveraged for code execution by uploading executable files to Startup folders.
11420| [CVE-2008-4426] Cross-site scripting (XSS) vulnerability in events.php in Phlatline's Personal Information Manager (pPIM) 1.0 allows remote attackers to inject arbitrary web script or HTML via the date parameter in a new action.
11421| [CVE-2008-3820] Cisco Security Manager 3.1 and 3.2 before 3.2.2, when Cisco IPS Event Viewer (IEV) is used, exposes TCP ports used by the MySQL daemon and IEV server, which allows remote attackers to obtain "root access" to IEV via unspecified use of TCP sessions to these ports.
11422| [CVE-2008-2640] Multiple cross-site scripting (XSS) vulnerabilities in the Flex 3 History Management feature in Adobe Flex 3.0.1 SDK and Flex Builder 3, and generated applications, allow remote attackers to inject arbitrary web script or HTML via the anchor identifier to (1) client-side-detection-with-history/history/historyFrame.html, (2) express-installation-with-history/history/historyFrame.html, or (3) no-player-detection-with-history/history/historyFrame.html in templates/html-templates/. NOTE: Firefox 2.0 and possibly other browsers prevent exploitation.
11423| [CVE-2008-1130] Unspecified vulnerability in IBM WebSphere MQ 6.0.x before 6.0.2.2 and 5.3 before Fix Pack 14 allows attackers to bypass access restrictions for a queue manager via a SVRCONN (MQ client) channel.
11424| [CVE-2008-0875] Unspecified vulnerability in Hitachi EUR Print Manager, and related Client and Local Server products, 05-06 through 05-06-/B and 05-08 allows remote attackers to cause a denial of service (service hang or termination) via unspecified vectors related to "unexpected data."
11425| [CVE-2008-0693] Stack-based buffer overflow in PQCore.exe in Print Manager Plus 2008 Client Billing and Authentication 7.0.127.16 allows remote attackers to cause a denial of service (service outage) via a series of long packets to TCP port 48101.
11426| [CVE-2008-0354] Cross-site scripting (XSS) vulnerability in the chat client in IBM Lotus Sametime 7.5 and 7.5.1 allows user-assisted remote attackers to inject arbitrary web script or HTML via a crafted message, which triggers code execution after a mouseover event initiated by the victim.
11427| [CVE-2007-6741] The ftp_PORT function in FTPServer.py in pyftpdlib before 0.2.0 does not prevent TCP connections to privileged ports if the destination IP address matches the source IP address of the connection from the FTP client, which might allow remote authenticated users to conduct FTP bounce attacks via crafted FTP data, as demonstrated by an FTP bounce attack against a NAT server, a related issue to CVE-1999-0017.
11428| [CVE-2007-6705] The WebSphere MQ XA 5.3 before FP13 and 6.0.x before 6.0.2.1 client for Windows, when running in an MTS or a COM+ environment, grants the PROCESS_DUP_HANDLE privilege to the Everyone group upon connection to a queue manager, which allows local users to duplicate an arbitrary handle and possibly hijack an arbitrary process.
11429| [CVE-2007-6525] Unspecified vulnerability in eClient in IBM DB2 Content Manager (CM) Toolkit 8.3 before fix pack 7 for z/OS has unknown impact and attack vectors, related to "scripting."
11430| [CVE-2007-6330] Meridian Prolog Manager 2007, and 7.5 and earlier, sends all usernames and passwords to the client in a (1) cleartext or (2) weakly encrypted format to support client-side login authentication, which makes it easier for remote attackers to obtain database access by capturing credentials via a man-in-the-middle attack.
11431| [CVE-2007-6319] Multiple unspecified vulnerabilities in Lyris ListManager 8.x before 8.95d, 9.2 before 9.2c, and 9.3 before 9.3b allow remote attackers to (1) gain list administrator privileges or (2) access arbitrary mailing lists via unknown vectors related to modification of client-side information
11432| [CVE-2007-5767] Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote attackers to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character backslash or NULL character.
11433| [CVE-2007-5738] The FlashUpload component in Korean GHBoard uses a client-side protection mechanism to prevent uploading of dangerous file extensions, which allows remote attackers to bypass restrictions and upload arbitrary files via a modified copy of component/flashupload/upload.html.
11434| [CVE-2007-5640] The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and additional Nortel products from the IP Phone, Business Communications Manager (BCM), Mobile Voice Client, and other product lines, allow remote attackers to block calls and force re-registration via a resume message to the Signaling Server that has a spoofed source IP address for the phone. NOTE: the attack is more disruptive if a new spoofed resume message is sent after each re-registration.
11435| [CVE-2007-5608] The DownloadFile function in the HPISDataManagerLib.Datamgr ActiveX control in HPISDataManager.dll in HP Instant Support before 1.0.0.24 allows remote attackers to force a download of an arbitrary file onto a client machine via a URL in the first argument and a destination filename in the second argument, a different vulnerability than CVE-2008-0952 and CVE-2008-0953.
11436| [CVE-2007-5413] httpd.tkd in Radia Integration Server in Hewlett-Packard (HP) OpenView Configuration Management (CM) Infrastructure 4.0 through 4.2i and Client Configuration Manager (CCM) 2.0 allows remote attackers to read arbitrary files via URLs containing tilde (~) references to home directories, as demonstrated by ~root.
11437| [CVE-2007-5282] Hitachi Cosminexus Agent 03-00 through 03-05, and Cosminexus Library Standard and Web Edition 04-00 and 04-01, might allow remote attackers to cause a denial of service (agent process crash) via invalid data from clients other than Cosminexus Manager.
11438| [CVE-2007-5252] Buffer overflow in NetSupport Manager (NSM) Client 10.00 and 10.20, and NetSupport School Student (NSS) 9.00, allows remote NSM servers to cause a denial of service or possibly execute arbitrary code via crafted data in the configuration exchange phase of an initial connection setup. NOTE: a vendor statement, which is too vague to be sure that it is for this particular issue, says that only a denial of service is possible.
11439| [CVE-2007-5057] NetSupport Manager Client before 10.20.0004 allows remote attackers to bypass the (1) basic and (2) authentication schemes by spoofing the NetSupport Manager.
11440| [CVE-2007-5022] Unspecified vulnerability in certain IBM Tivoli Storage Manager (TSM) clients 5.1 before 5.1.8.1, 5.2 before 5.2.5.2, 5.3 before 5.3.5.3, and 5.4 before 5.4.1.2, when using "server-initiated prompted scheduling," allows remote attackers to read a client's data, aka IC53616.
11441| [CVE-2007-4880] Buffer overflow in the Client Acceptor Daemon (CAD), dsmcad.exe, in certain IBM Tivoli Storage Manager (TSM) clients 5.1 before 5.1.8.1, 5.2 before 5.2.5.2, 5.3 before 5.3.5.3, and 5.4 before 5.4.1.2 allows remote attackers to execute arbitrary code via crafted HTTP headers, aka IC52905.
11442| [CVE-2007-4526] The Client Login Extension (CLE) in Novell Identity Manager before 3.5.1 20070730 stores the username and password in a local file, which allows local users to obtain sensitive information by reading this file.
11443| [CVE-2007-4348] Cross-site scripting (XSS) vulnerability in the CAD service in IBM Tivoli Storage Manager (TSM) Client 5.3.5.3 and 5.4.1.2 for Windows allows remote attackers to inject arbitrary web script or HTML via HTTP requests to port 1581, which generate log entries in a dsmerror.log file that is accessible through a certain web interface.
11444| [CVE-2007-3380] The Distributed Lock Manager (DLM) in the cluster manager for Linux kernel 2.6.15 allows remote attackers to cause a denial of service (loss of lock services) by connecting to the DLM port, which probably prevents other processes from accessing the service.
11445| [CVE-2007-2918] Multiple stack-based buffer overflows in ActiveX controls (1) VibeC in (a) vibecontrol.dll, (2) CallManager and (3) ViewerClient in (b) StarClient.dll, (4) ComLink in (c) uicomlink.dll, and (5) WebCamXMP in (d) wcamxmp.dll in Logitech VideoCall allow remote attackers to cause a denial of service (browser crash) and execute arbitrary code via unspecified vectors.
11446| [CVE-2007-2280] Stack-based buffer overflow in OmniInet.exe (aka the backup client service daemon) in the Application Recovery Manager component in HP OpenView Storage Data Protector 5.50 and 6.0 allows remote attackers to execute arbitrary code via an MSG_PROTOCOL command with long arguments, a different vulnerability than CVE-2009-3844.
11447| [CVE-2007-1889] Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize.
11448| [CVE-2007-1786] SQL injection vulnerability in Hitachi Collaboration - Online Community Management 01-00 through 01-30, as used in Groupmax Collaboration Portal, Groupmax Collaboration Web Client, uCosminexus Collaboration Portal, Cosminexus Collaboration Portal, and uCosminexus Content Manager, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
11449| [CVE-2007-1467] Multiple cross-site scripting (XSS) vulnerabilities in (1) PreSearch.html and (2) PreSearch.class in Cisco Secure Access Control Server (ACS), VPN Client, Unified Personal Communicator, MeetingPlace, Unified MeetingPlace, Unified MeetingPlace Express, CallManager, IP Communicator, Unified Video Advantage, Unified Videoconferencing 35xx products, Unified Videoconferencing Manager, WAN Manager, Security Device Manager, Network Analysis Module (NAM), CiscoWorks and related products, Wireless LAN Solution Engine (WLSE), 2006 Wireless LAN Controllers (WLC), and Wireless Control System (WCS) allow remote attackers to inject arbitrary web script or HTML via the text field of the search form.
11450| [CVE-2006-5782] radexecd.exe in HP OpenView Client Configuraton Manager (CCM) does not require authentication before executing commands in the installation directory, which allows remote attackers to cause a denial of service (reboot) by calling radbootw.exe or create arbitrary files by calling radcrecv.
11451| [CVE-2006-5161] IBM Client Security Password Manager stores and distributes saved passwords based upon the title of a website, which allows remote attackers to obtain username and password credentials by changing the title of an HTML page.
11452| [CVE-2006-4855] The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data.
11453| [CVE-2006-4465] ** DISPUTED ** Microsoft Terminal Server, when running an application session with the "Start program at logon" and "Override settings from user profile and Client Connection Manager wizard" options, allows local users to execute arbitrary code by forcing an Explorer error. NOTE: a third-party researcher has stated that the options are "a convenience to users" and were not intended to restrict execution of arbitrary code.
11454| [CVE-2006-4315] Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under "Program Files" or its subdirectories.
11455| [CVE-2006-4186] The iManager in eMBoxClient.jar in Novell eDirectory 8.7.3.8 writes passwords in plaintext to a log file, which allows local users to obtain passwords by reading the file.
11456| [CVE-2006-3697] Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the "open folder" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function
11457| [CVE-2006-3172] Multiple PHP remote file inclusion vulnerabilities in Content*Builder 0.7.5 allow remote attackers to execute arbitrary PHP code via a URL with a trailing slash (/) character in the (1) lang_path parameter to (a) cms/plugins/col_man/column.inc.php, (b) cms/plugins/poll/poll.inc.php, (c) cms/plugins/user_managment/usrPortrait.inc.php, (d) cms/plugins/user_managment/user.inc.php, (e) cms/plugins/media_manager/media.inc.php, (f) cms/plugins/events/permanent.eventMonth.inc.php, (g) cms/plugins/events/events.inc.php, and (h) cms/plugins/newsletter2/newsletter.inc.php
11458| [CVE-2006-2369] RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
11459| [CVE-2006-2316] S24EvMon.exe in the Intel PROset/Wireless software, possibly 10.1.0.33, uses a S24EventManagerSharedMemory shared memory section with weak permissions, which allows local users to read or modify passwords or other data, or cause a denial of service.
11460| [CVE-2006-2314] PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "\" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of "Encoding-Based SQL Injection." NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.
11461| [CVE-2006-1275] GGZ Gaming Zone 0.0.12 allows remote attackers to cause a denial of service (client disconnect) via inputs that produce malformed XML, including (1) trailing ' (apostrophe) character on the ID attribute in a PLAYER XML tag, (2) joining with a long ID attribute or non-trailing ' characters, which causes a <none> name to be assigned, and then disconnecting, or (3) a long CDATA message attribute, which prevents closing tags from being added to the string.
11462| [CVE-2006-1102] Sauerbraten 2006_02_28, as derived from the Cube engine, allows remote attackers to cause a denial of service (client exit) by forcing the server to change to a map (ogz) file whose name contains ".." sequences and has a certain length that prevents the addition of the ".ogz" extension.
11463| [CVE-2006-0197] The XClientMessageEvent struct used in certain components of X.Org 6.8.2 and earlier, possibly including (1) the X server and (2) Xlib, uses a "long" specifier for elements of the l array, which results in inconsistent sizes in the struct on 32-bit versus 64-bit platforms, and might allow attackers to cause a denial of service (application crash) and possibly conduct other attacks.
11464| [CVE-2005-4332] Cisco Clean Access 3.5.5 and earlier on the Secure Smart Manager allows remote attackers to bypass authentication and cause a denial of service or upload files via direct requests to obsolete JSP files including (1) admin/uploadclient.jsp, (2) apply_firmware_action.jsp, and (3) file.jsp.
11465| [CVE-2005-4209] WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability.
11466| [CVE-2005-3176] Microsoft Windows 2000 before Update Rollup 1 for SP4 does not record the IP address of a Windows Terminal Services client in a security log event if the client connects successfully, which could make it easier for attackers to escape detection.
11467| [CVE-2005-2969] The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
11468| [CVE-2005-2790] BFCommand & Control Server Manager BFCC 1.22_A and earlier, and BFVCC 2.14_B and earlier, relies on the client to enforce permissions and perform actions such as disconnections, which allows remote attackers to bypass administrative restrictions via a modified client.
11469| [CVE-2005-1659] Cross-site scripting (XSS) vulnerability in filemanager.cpp in MyServer 0.8 allows remote attackers to inject arbitrary Javascript via a URL with a "..." (triple dot) followed by an onmouseover event.
11470| [CVE-2005-1519] Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.
11471| [CVE-2004-2598] Quake II server before R1Q2, as used in multiple products, allows remote attackers to corrupt the server's client state data structure by exiting a session without a valid disconnect command, then reconnecting, which prevents a mod from being notified of changes in the client state. NOTE: the impact of this issue will vary depending on which mod is being used.
11472| [CVE-2004-0933] Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
11473| [CVE-2003-1229] X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files.
11474| [CVE-2002-1292] The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running.
11475| [CVE-2002-0541] Buffer overflow in Tivoli Storage Manager TSM (1) Server or Storage Agents 3.1 through 5.1, and (2) the TSM Client Acceptor Service 4.2 and 5.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request to port 1580 or port 1581.
11476| [CVE-2002-0131] ActivePython ActiveX control for Python in the AXScript package, when used in Internet Explorer, does not prevent a script from reading files from the client's filesystem, which allows remote attackers to read arbitrary files via a malicious web page containing Python script.
11477| [CVE-2001-1504] Lotus Notes R5 Client 4.6 allows remote attackers to execute arbitrary commands via a Lotus Notes object with code in an event, which is automatically executed when the user processes the e-mail message.
11478| [CVE-2001-1058] The License Manager (mathlm) for Mathematica 4.0 and 4.1 allows remote attackers to bypass access control (specified by the -restrict argument) and steal a license via a client request that includes the name of a host that is allowed to obtain the license.
11479| [CVE-2001-1057] The License Manager (mathlm) for Mathematica 4.0 and 4.1 allows remote attackers to cause a denial of service (resource exhaustion) by connecting to port 16286 and not disconnecting, which prevents users from making license requests.
11480| [CVE-2001-0860] Terminal Services Manager MMC in Windows 2000 and XP trusts the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through a Network Address Translation (NAT).
11481| [CVE-2001-0629] HP Event Correlation Service (ecsd) as included with OpenView Network Node Manager 6.1 allows a remote attacker to gain addition privileges via a buffer overflow attack in the '-restore_config' command line parameter.
11482| [CVE-2001-0324] Windows 98 and Windows 2000 Java clients allow remote attackers to cause a denial of service via a Java applet that opens a large number of UDP sockets, which prevents the host from establishing any additional UDP connections, and possibly causes a crash.
11483| [CVE-2000-1169] OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent.
11484| [CVE-2000-0651] The ClientTrust program in Novell BorderManager does not properly verify the origin of authentication requests, which could allow remote attackers to impersonate another user by replaying the authentication requests and responses from port 3024 of the victim's machine.
11485| [CVE-1999-1404] IBM/Tivoli OPC Tracker Agent version 2 release 1 allows remote attackers to cause a denial of service (resource exhaustion) via malformed data to the localtracker client port (5011), which prevents the connection from being closed properly.
11486|
11487| SecurityFocus - https://www.securityfocus.com/bid/:
11488| [101069] Skybox Manager Client Application Multiple Local Security Vulnerabilities
11489| [97094] SolarWinds Log and Event Manager CVE-2017-5198 Local Privilege Escalation Vulnerability
11490| [97090] SolarWinds Log and Event Manager CVE-2017-5199 Remote Code Execution Vulnerability
11491| [96502] IBM QRadar Security Information and Event Manager Local Information Disclosure Vulnerability
11492| [96256] Cisco Intrusion Prevention System Device Manager CVE-2017-3842 Information Disclosure Vulnerability
11493| [95000] IBM QRadar Security Information and Event Manager CVE-2016-2873 SQL Injection Vulnerability
11494| [94861] IBM QRadar Security Information and Event Manager Local Information Disclosure Vulnerability
11495| [94808] IBM Tivoli Storage Manager Client CVE-2016-5985 Local Buffer Overflow Vulnerability
11496| [91534] IBM Tivoli Storage Manager Client CVE-2016-2894 Local Information Disclosure Vulnerability
11497| [91449] Symantec Endpoint Protection Manager and Client CVE-2016-5306 Security Bypass Vulnerability
11498| [91448] Symantec Endpoint Protection Manager and Client CVE-2016-5305 Security Bypass Vulnerability
11499| [91447] Symantec Endpoint Protection Manager and Client CVE-2016-5304 Open Redirect Vulnerability
11500| [91446] Symantec Endpoint Protection Manager and Client Local Race Condition Security Bypass Vulnerability
11501| [91445] Symantec Endpoint Protection Manager and Client CVE-2016-3651 Security Bypass Vulnerability
11502| [91444] Symantec Endpoint Protection Manager and Client Multiple Cross Site Scripting Vulnerabilities
11503| [91443] Symantec Endpoint Protection Manager and Client CVE-2016-5307 Directory Traversal Vulnerability
11504| [91442] Symantec Endpoint Protection Manager and Client Multiple Cross Site Request Forgery Vulnerabilities
11505| [91441] Symantec Endpoint Protection Manager and Client Brute Force Authentication Bypass Vulnerability
11506| [91440] Symantec Endpoint Protection Manager and Client CVE-2016-3649 Information Disclosure Vulnerability
11507| [91433] Symantec Endpoint Protection Manager and Client CVE-2016-3647 Security Bypass Vulnerability
11508| [91432] Symantec Endpoint Protection Manager and Client CVE-2016-3650 Information Disclosure Vulnerability
11509| [85275] IBM QRadar Security Information and Event Manager Local Information Disclosure Vulnerability
11510| [85210] IBM QRadar Security Information and Event Manager CVE-2015-2008 Information Disclosure Vulnerability
11511| [85209] IBM QRadar Security Information and Event Manager CVE-2015-4956 Remote Code Execution Vulnerability
11512| [84344] Symantec Endpoint Protection Manager and Client CVE-2015-8154 Security Bypass Vulnerability
11513| [82406] HP Client Security Manager Cross Site Scripting Vulnerability
11514| [79879] IBM QRadar Security Information and Event Manager CVE-2015-7409 HTML Injection Vulnerability
11515| [77370] IBM QRadar Security Information and Event Manager CVE-2015-5044 Denial of Service Vulnerability
11516| [77320] SolarWinds Log and Event Manager XML External Entity Injection Vulnerability
11517| [77118] SolarWinds Log and Event Manager CVE-2015-7840 Command Injection Vulnerability
11518| [77016] SolarWinds Log and Event Manager Command Injection Vulnerability
11519| [76700] IBM QRadar Security Information and Event Manager Remote Command Execution Vulnerability
11520| [76697] IBM QRadar Security Information and Event Manager CVE-2015-2016 Command Execution Vulnerability
11521| [76695] IBM QRadar Security Information and Event Manager Unspecified Remote Command Execution Vulnerability
11522| [75204] Symantec Endpoint Protection Manager and Client CVE-2014-9229 SQL Injection Vulnerability
11523| [75203] Symantec Endpoint Protection Manager and Client DLL Loading Local Privilege Escalation Vulnerability
11524| [75202] Symantec Endpoint Protection Manager and Client CVE-2014-9228 Local Denial of Service Vulnerability
11525| [74323] IBM Tivoli Storage Manager Client CVE-2014-4813 Local Privilege Escalation Vulnerability
11526| [74320] IBM Tivoli Storage Manager Client CVE-2014-6184 Local Stack Buffer Overflow Vulnerability
11527| [72868] IBM Tivoli Storage Manager Client CVE-2014-6185 Local Privilege Escalation Vulnerability
11528| [70379] IBM QRadar Security Information and Event Manager CVE-2014-3091 Cross Site Scripting Vulnerability
11529| [70111] IBM QRadar Security Information and Event Manager Remote Code Execution Vulnerability
11530| [69851] IBM QRadar Security Information and Event Manager CVE-2014-4826 Information Disclosure Vulnerability
11531| [69850] IBM QRadar Security Information and Event Manager CVE-2014-4824 SQL Injection Vulnerability
11532| [69555] Attachmate NetIQ AppManager Client Resource Monitor Remote Code Execution Vulnerability
11533| [65127] IBM QRadar Security Information and Event Manager Multiple Security Vulnerabilities
11534| [65102] IBM Tivoli Storage Manager Client CVE-2013-5371 Insecure File Permissions Vulnerability
11535| [63939] IBM QRadar Security Information and Event Manager CVE-2013-6307 Cross Site Scripting Vulnerability
11536| [63938] IBM QRadar Security Information and Event Manager CVE-2013-5448 Cross Site Scripting Vulnerability
11537| [63934] IBM QRadar Security Information and Event Manager Remote Security Bypass Vulnerability
11538| [62863] WordPress Events Manager Plugin Multiple Unspecified Cross Site Scripting Vulnerabilities
11539| [62789] IBM Tivoli Storage Manager Client CVE-2013-2964 Local Buffer Overflow Vulnerability
11540| [60284] IBM QRadar Security Information and Event Manager Remote Command Injection Vulnerability
11541| [60078] WordPress Events Manager Plugin Multiple Cross Site Scripting Vulnerabilities
11542| [58331] WordPress Events Manager Plugin Multiple Cross Site Scripting Vulnerabilities
11543| [57738] IBM Tivoli Storage Manager Client CVE-2013-0472 Unauthorized Access Vulnerability
11544| [57477] WordPress Events Manager Plugin Multiple Cross Site Scripting Vulnerabilities
11545| [52511] Epson EventManager 'x-protocol-version' Denial of Service Vulnerability
11546| [52238] phxEventManager 'search.php' SQL Injection Vulnerability
11547| [49555] IBM Tivoli Security Information and Event Manager Custom Reports Cross Site Scripting Vulnerability
11548| [48519] IBM Tivoli Storage Manager Client Multiple Buffer Overflow Vulnerabilities
11549| [48220] WordPress Events Manager Plugin 'admin.php' SQL Injection Vulnerability
11550| [47642] RSA Data Loss Prevention (DLP) Enterprise Manager Unspecified Cross Site Scripting Vulnerability
11551| [46235] EMC Replication Manager Client Control Service Remote Code Execution Vulnerability
11552| [45401] IBM Tivoli Storage Manager Client Multiple Remote Vulnerabilities
11553| [44097] Gekko Manager FTP Client 'LIST' Command Remote Buffer Overflow Vulnerability
11554| [43011] WordPress Events Manager Extended Plugin Multiple HTML Injection Vulnerabilities
11555| [40553] RSA Key Manager C Client Metadata SQL Injection Vulnerability
11556| [40098] Wordpress Events Manager Plugin 'events-manager.php' SQL Injection Vulnerability
11557| [37426] Joomla Event Manager Component 'id' Parameter SQL Injection Vulnerability
11558| [35998] EMC Replication Manager Client Control Service Remote Code Execution Vulnerability
11559| [34326] IBM DB2 Content Manager eClient Unspecified Security Vulnerability
11560| [34034] IBM Tivoli Storage Manager HSM for Windows Client Remote Buffer Overflow Vulnerability
11561| [33381] Cisco Security Manager IPS Event Viewer Remote Unauthorized TCP Port Access Vulnerability
11562| [31988] IBM Tivoli Storage Manager Client Remote Heap Buffer Overflow Vulnerability
11563| [31801] Hitachi JP1/NETM/DM SubManager and JP1/NETM/DM Client Denial Of Service Vulnerability
11564| [27028] Novell Identity Manager Client 'asampsp' Denial of Service Vulnerability
11565| [26975] IBM z/OS DB2 Content Manager eClient Unspecified Scripting Vulnerability
11566| [26285] Novell BorderManager Client Trust Heap Based Buffer Overflow Vulnerability
11567| [26221] IBM Tivoli Storage Manager Client CAD Service HTML Injection Vulnerability
11568| [25932] NetSupport Manager Initial Client Connection Buffer Overflow Vulnerability
11569| [25743] IBM Tivoli Storage Manager Client Multiple Vulnerabilities
11570| [25420] Novell Identity Manager Client Login Extension Local Information Disclosure Vulnerability
11571| [20971] HP OpenView Client Configuration Manager Remote Authentication Bypass Vulnerability
11572| [20308] IBM Client Security Password Manager Design Error Vulnerability
11573| [4492] IBM Tivoli Storage Manager Client Acceptor Buffer Overflow Vulnerability
11574| [104548] Cisco AnyConnect Secure Mobility Client for Windows CVE-2018-0373 Denial of Service Vulnerability
11575| [104546] Fortinet FortiAnalyzer and FortiManager CVE-2018-1355 Open Redirect Vulnerability
11576| [104545] Pivotal Operations Manager CVE-2018-11046 Security Vulnerability
11577| [104544] Linux Kernel 'kernel/trace/trace_events_filter.c' Local Denial of Service Vulnerability
11578| [104537] Fortinet FortiAnalyzer and FortiManager CVE-2018-1354 Access Bypass Vulnerability
11579| [104536] NetApp OnCommand Unified Manager Core Package CVE-2017-7568 Information Disclosure Vulnerability
11580| [104534] EMC RSA Authentication Manager Cross Site Scripting and HTML Injection Vulnerabilities
11581| [104533] Fortinet FortiManager CVE-2018-1351 Cross Site Scripting Vulnerability
11582| [104523] Cisco Unified Communications Manager IM CVE-2018-0363 Cross Site Request Forgery Vulnerability
11583| [104501] IBM Security Access Manager Appliance CVE-2017-1476 Information Disclosure Vulnerability
11584| [104496] CA Privileged Access Manager Multiple Security Vulnerabilities
11585| [104478] TIBCO DataSynapse GridServer Manager CVE-2017-5536 Cross Site Scripting Vulnerability
11586| [104476] IBM Security Access Manager Appliance CVE-2017-1474 Unspecified Information Disclosure Vulnerability
11587| [104471] IBM Security Access Manager Products CVE-2017-1480 Information Disclosure Vulnerability
11588| [104467] Zoho ManageEngine Applications Manager CVE-2018-11808 Access Bypass Vulnerability
11589| [104466] IBM Financial Transaction Manager CVE-2018-1393 Information Disclosure Vulnerability
11590| [104448] Cisco Unified Communications Manager CVE-2018-0340 Cross Site Scripting Vulnerability
11591| [104436] SAP Business Client Unspecified Security Vulnerability
11592| [104430] Cisco AnyConnect Secure Mobility Client Certificate Validation Security Bypass Vulnerability
11593| [104425] Cisco Unified Communications Manager CVE-2018-0355 Cross Frame Scripting Vulnerability
11594| [104370] MySQL Multi-Master Replication Manager Multiple Remote Command Injection Vulnerabilities
11595| [104315] VMware Horizon Client CVE-2018-6964 Local Privilege Escalation Vulnerability
11596| [104299] McAfee Data Loss Prevention Endpoint CVE-2018-6664 Local Security Bypass Vulnerability
11597| [104224] IBM Business Process Manager CVE-2017-1766 Authorization Bypass Vulnerability
11598| [104177] Adobe Acrobat and Reader NT LAN Manager CVE-2018-4993 Information Disclosure Vulnerability
11599| [104147] IBM Content Manager Enterprise Edition CVE-2018-1502 Cross Site Scripting Vulnerability
11600| [104141] HP Service Manager CVE-2018-6494 SQL Injection Vulnerability
11601| [104113] EMC RSA Authentication Manager CVE-2018-1248 Host Header Injection Vulnerability
11602| [104107] EMC RSA Authentication Manager CVE-2018-1247 XML External Entity Injection Vulnerability
11603| [103937] Cisco Unified Communications Manager CVE-2018-0267 Information Disclosure Vulnerability
11604| [103933] Cisco Unified Communications Manager CVE-2018-0266 Information Disclosure Vulnerability
11605| [103871] Oracle Enterprise Manager Base Platform CVE-2018-2750 Remote Security Vulnerability
11606| [103866] Oracle Enterprise Manager Ops Center CVE-2018-2742 Remote Security Vulnerability
11607| [103822] Oracle Access Manager CVE-2018-2587 Remote Security Vulnerability
11608| [103806] Oracle Adaptive Access Manager CVE-2018-2770 Remote Security Vulnerability
11609| [103788] Oracle Access Manager CVE-2018-2879 Remote Security Vulnerability
11610| [103784] Oracle Access Manager CVE-2018-2739 Remote Security Vulnerability
11611| [103773] ZOHO ManageEngine Recovery Manager Plus CVE-2018-9163 HTML Injection Vulnerability
11612| [103763] Novell iManager CVE-2018-1345 Unspecified Privilege Escalation Vulnerability
11613| [103737] SLF4J 'EventData' Constructor Remote Code Execution Vulnerability
11614| [103709] Adobe Experience Manager CVE-2018-4931 HTML Injection Vulnerability
11615| [103707] Adobe Experience Manager CVE-2018-4929 HTML Injection Vulnerability
11616| [103706] Adobe Experience Manager CVE-2018-4930 Cross Site Scripting Vulnerability
11617| [103703] SAP Solution Manager CVE-2018-2405 Cross Site Scripting Vulnerability
11618| [103682] IBM Financial Transaction Manager for Check Services Cross Site Scripting Vulnerability
11619| [103681] IBM Business Process Manager CVE-2018-1384 Cross Site Scripting Vulnerability
11620| [103679] IBM Business Process Manager CVE-2017-1767 Cross Site Scripting Vulnerability
11621| [103678] IBM Business Process Manager CVE-2017-1765 Information Disclosure Vulnerability
11622| [103677] IBM Security Privileged Identity Manager CVE-2017-1705 Information Disclosure Vulnerability
11623| [103607] Linux Kernel 'kernel/events/core.c' Local Denial of Service Vulnerability
11624| [103589] IBM Business Process Manager CVE-2017-1756 Local Information Disclosure Vulnerability
11625| [103533] Novell NetIQ Identity Manager CVE-2018-7673 Denial of Service Vulnerability
11626| [103532] Novell NetIQ Identity Manager CVE-2018-1350 Information Disclosure Vulnerability
11627| [103531] Novell NetIQ Identity Manager CVE-2018-1349 Information Disclosure Vulnerability
11628| [103530] Novell NetIQ Identity Manager CVE-2018-1348 Man in the Middle Security Bypass Vulnerability
11629| [103492] Novell iManager CVE-2018-1347 Cross Site Scripting Vulnerability
11630| [103478] GNOME NetworkManager CVE-2018-1000135 Information Disclosure Vulnerability
11631| [103467] Dell Storage Manager CVE-2017-14384 Directory Traversal Vulnerability
11632| [103424] ZOHO ManageEngine Event LogAnalyzer CVE-2018-8721 HTML Injection Vulnerability
11633| [103421] NetIQ Access Manager CVE-2018-7678 Cross Site Scripting Vulnerability
11634| [103420] NetIQ Access Manager CVE-2018-7677 Cross Site Request Forgery Vulnerability
11635| [103370] SAP NetWeaver Business Client CVE-2018-2398 Unspecified Information Disclosure Vulnerability
11636| [103362] IBM Tivoli Business Service Manager CVE-2016-0286 Information Disclosure Vulnerability
11637| [103358] ManageEngine Applications Manager CVE-2018-7890 Remote Code Execution Vulnerability
11638| [103352] IBM Financial Transaction Manager CVE-2018-1391 Denial of Service Vulnerability
11639| [103341] Cisco Security Manager CVE-2018-0223 Cross Site Scripting Vulnerability
11640| [103335] Cisco Data Center Network Manager CVE-2018-0210 Cross Site Request Forgery Vulnerability
11641| [103327] Cisco Prime Data Center Network Manager CVE-2018-0144 Cross Site Scripting Vulnerability
11642| [103278] Linux Kernel 'fs/ocfs2/cluster/nodemanager.c' Local Denial of Service Vulnerability
11643| [103224] NetIQ Identity Manager CVE-2017-7426 Multiple XML External Entity Injection Vulnerabilities
11644| [103146] Cisco Unified Communications Manager CVE-2018-0206 Cross Site Scripting Vulnerability
11645| [103127] IBM Rational Rhapsody Design Manager CVE-2017-1462 Cross Site Scripting Vulnerability
11646| [103121] IBM Security Identity Manager Virtual Appliance CVE-2016-0367 Information Disclosure Vulnerability
11647| [103119] IBM Security Identity Manager CVE-2016-0366 Man in the Middle Information Disclosure Vulnerability
11648| [103114] Cisco Unified Communications Domain Manager CVE-2018-0124 Remote Code Execution Vulnerability
11649| [103112] Microsoft Identity Manager CVE-2018-0908 Remote Privilege Escalation Vulnerability
11650| [103002] SAP Customer Relationship Management (CRM) WebClient UI Cross Site Scripting Vulnerability
11651| [102991] Adobe Experience Manager CVE-2018-4875 Cross Site Scripting Vulnerability
11652| [102990] Adobe Experience Manager CVE-2018-4876 Cross Site Scripting Vulnerability
11653| [102984] IBM Tivoli Business Service Manager CVE-2016-0311 Cross Site Scripting Vulnerability
11654| [102965] Cisco Unified Communications Manager CVE-2018-0198 Information Disclosure Vulnerability
11655| [102964] Cisco Unified Communications Manager CVE-2018-0135 Information Disclosure Vulnerability
11656| [102958] Cisco Unified Communications Manager CVE-2018-0120 SQL Injection Vulnerability
11657| [102940] Avaya Aura System Manager CVE-2018-6635 Security Bypass Vulnerability
11658| [102908] Pulse Secure Desktop Linux Client CVE-2018-6374 Man in the Middle Security Bypass Vulnerability
11659| [102906] Gemalto Sentinel License Manager Multiple Security Vulnerabilities
11660| [102838] EMC RSA Authentication Manager CVE-2017-15546 SQL Injection Vulnerability
11661| [102837] Lenovo Fingerprint Manager Pro CVE-2017-3762 Multiple Local Security Weaknesses
11662| [102835] NetIQ Access Manager CVE-2018-1342 Arbitrary File Upload Vulnerability
11663| [102801] NetGain Systems Enterprise Manager CVE-2017-16593 Directory Traversal Vulnerability
11664| [102777] IBM Business Process Manager CVE-2017-1769 Cross Site Request Forgery Vulnerability
11665| [102768] NetGain Systems Enterprise Manager CVE-2017-16604 Directory Traversal Vulnerability
11666| [102725] Cisco Unified Communications Manager CVE-2018-0105 Information Disclosure Vulnerability
11667| [102606] Oracle Integrated Lights Out Manager (ILOM) CVE-2018-2568 Remote Security Vulnerability
11668| [102603] Oracle Integrated Lights Out Manager (ILOM) CVE-2018-2566 Remote Security Vulnerability
11669| [102562] Oracle Access Manager CVE-2017-10262 Remote Security Vulnerability
11670| [102528] NetGain Systems Enterprise Manager CVE-2017-16600 Directory Traversal Vulnerability
11671| [102512] NetGain Systems Enterprise Manager CVE-2017-16605 Directory Traversal Vulnerability
11672| [102502] IBM Security Access Manager CVE-2017-1478 Local Information Disclosure Vulnerability
11673| [102496] IBM Security Access Manager CVE-2017-1533 Unspecified Cross Site Scripting Vulnerability
11674| [102487] IBM Security Key Lifecycle Manager CVE-2017-1671 Directory Traversal Vulnerability
11675| [102480] Aruba Networks ClearPass Policy Manager CVE-2014-2071 Remote Privilege Escalation Vulnerability
11676| [102478] Cisco Unified Communications Manager CVE-2018-0118 Cross Site Scripting Vulnerability
11677| [102470] IBM Security Key Lifecycle Manager CVE-2017-1664 Information Disclosure Vulnerability
11678| [102468] IBM Security Key Lifecycle Manager CVE-2017-1669 Information Disclosure Vulnerability
11679| [102456] NetGain Systems Enterprise Manager CVE-2017-16594 Arbitrary File Upload Vulnerability
11680| [102450] SAP Solution Manager CVE-2018-2361 Remote Authorization Bypass Vulnerability
11681| [102439] IBM Security Key Lifecycle Manager CVE-2017-1665 Information Disclosure Vulnerability
11682| [102436] IBM Security Key Lifecycle Manager CVE-2017-1673 Cross Site Scripting Vulnerability
11683| [102434] IBM Security Key Lifecycle Manager CVE-2017-1666 XML External Entity Injection Vulnerability
11684| [102432] IBM Security Key Lifecycle Manager CVE-2017-1727 Information Disclosure Vulnerability
11685| [102429] IBM Security Key Lifecycle Manager CVE-2017-1670 Unspecified SQL Injection Vulnerability
11686| [102410] HP Moonshot Provisioning Manager Multiple Security Vulnerabilities
11687| [102341] NetGain Systems Enterprise Manager CVE-2017-16602 Remote Command Injection Vulnerability
11688| [102337] NetGain Systems Enterprise Manager CVE-2017-16609 Arbitrary File Download Vulnerability
11689| [102322] NetGain Systems Enterprise Manager CVE-2017-16590 Authentication Bypass Vulnerability
11690| [102318] NetGain Systems Enterprise Manager CVE-2017-16591 Directory Traversal Vulnerability
11691| [102310] NetGain Systems Enterprise Manager CVE-2017-16592 Directory Traversal Vulnerability
11692| [102309] NetGain Systems Enterprise Manager CVE-2017-16606 Directory Traversal Vulnerability
11693| [102307] NetGain Systems Enterprise Manager CVE-2017-16603 Directory Traversal Vulnerability
11694| [102298] NetGain Systems Enterprise Manager CVE-2017-16595 Directory Traversal Vulnerability
11695| [102297] NetGain Systems Enterprise Manager CVE-2017-16598 Directory Traversal Vulnerability
11696| [102296] NetGain Systems Enterprise Manager CVE-2017-16597 Directory Traversal Vulnerability
11697| [102269] Zoho ManageEngine Applications Manager Multiple SQL Injection Vulnerabilities
11698| [102261] Zoom Client for Linux CVE-2017-15048 Stack-Based Buffer Overflow Vulnerability
11699| [102257] NetGain Systems Enterprise Manager CVE-2017-16601 Directory Traversal Vulnerability
11700| [102249] NetGain Systems Enterprise Manager CVE-2017-17407 Remote Code Execution Vulnerability
11701| [102247] NetGain Systems Enterprise Manager CVE-2017-17406 Remote Code Execution Vulnerability
11702| [102246] NetGain Systems Enterprise Manager CVE-2017-16610 Remote Code Execution Vulnerability
11703| [102245] NetGain Systems Enterprise Manager CVE-2017-16608 Remote Code Execution Vulnerability
11704| [102243] ZOHO ManageEngine Password Manager Pro CVE-2017-17698 Multiple Cross Site Scripting Vulnerabilities
11705| [102219] NetGain Systems Enterprise Manager CVE-2017-16607 Information Disclosure Vulnerability
11706| [102218] IBM Business Process Manager CVE-2017-1494 Cross Site Scripting Vulnerability
11707| [102189] Drupal Services Single Sign-On Client Module Cross Site Scripting Vulnerability
11708| [102176] Fortinet FortiClient CVE-2017-7344 Privilege Escalation Vulnerability
11709| [102123] Fortinet FortiClient CVE-2017-14184 Local Information Disclosure Vulnerability
11710| [102114] Rockwell Automation FactoryTalk Alarms and Events CVE-2017-14022 Denial of Service Vulnerability
11711| [102083] Palo Alto Networks Global Protect Client CVE-2017-15870 Local Privilege Escalation Vulnerability
11712| [102049] IBM Financial Transaction Manager CVE-2017-1606 SQL Injection Vulnerability
11713| [101999] Cisco WebEx Event Center CVE-2017-12365 Information Disclosure Vulnerability
11714| [101996] Cisco Data Center Network Manager Multiple Remote Security Vulnerabilities
11715| [101988] Cisco Unified Communications Manager CVE-2017-12357 Cross Site Scripting Vulnerability
11716| [101976] IBM Rational Rhapsody Design Manager CVE-2017-1240 Information Disclosure Vulnerability
11717| [101970] McAfee Network Security Manager CVE-2016-8029 Remote Authorization Bypass Vulnerability
11718| [101953] Fortinet FortiWebManager CVE-2017-14189 Security Bypass Vulnerability
11719| [101940] Jenkins Git Client Plugin CVE-2017-1000242 Insecure Temporary File Creation Vulnerability
11720| [101925] EMC RSA Authentication Manager CVE-2017-14379 HTML Injection Vulnerability
11721| [101910] Infinispan 'hotrod java' Client Remote Code Execution Vulnerability
11722| [101900] IBM Business Process Manager CVE-2017-1628 Denial of Service Vulnerability
11723| [101853] Cisco Unified Communications Manager CVE-2017-12302 SQL Injection Vulnerability
11724| [101843] Adobe Experience Manager CVE-2017-3111 Information Disclosure Vulnerability
11725| [101834] Adobe Experience Manager CVE-2017-3109 Cross Site Scripting Vulnerability
11726| [101792] HP Content Manager Workgroup Service CVE-2017-14360 Unspecified Denial of Service Vulnerability
11727| [101778] NetApp OnCommand Unified Manager Core Package CVE-2017-11461 Clickjacking Vulnerability
11728| [101695] McAfee Network Data Loss Prevention CVE-2017-3934 Man in the Middle Security Bypass Vulnerability
11729| [101682] Fortinet FortiClient CVE-2016-8493 Privilege Escalation Vulnerability
11730| [101628] McAfee Network Data Loss Prevention CVE-2017-3933 Unspecified Cross Site Scripting Vulnerability
11731| [101605] RSA Authentication Manager CVE-2017-14373 Cross Site Scripting Vulnerability
11732| [101504] Symantec Endpoint Protection Manager CVE-2017-13681 Local Privilege Escalation Vulnerability
11733| [101486] IBM Business Process Manager CVE-2016-6109 Cross Site Scripting Vulnerability
11734| [101445] Oracle Integrated Lights Out Manager (ILOM) CVE-2017-10194 Remote Security Vulnerability
11735| [101431] Oracle Integrated Lights Out Manager (ILOM) CVE-2017-10265 Remote Security Vulnerability
11736| [101426] Oracle Integrated Lights Out Manager (ILOM) CVE-2017-10260 Remote Security Vulnerability
11737| [101386] Oracle Access Manager CVE-2017-10154 Remote Security Vulnerability
11738| [101331] Oracle Access Manager CVE-2017-10259 Remote Security Vulnerability
11739| [101313] Oracle Identity Manager Connector CVE-2017-10270 Local Security Vulnerability
11740| [101218] SAP NetWeaver Mobile Client Information Disclosure Vulnerability
11741| [101217] SAP NetWeaver Mobile Client Information Disclosure Vulnerability
11742| [101214] SAP NetWeaver Mobile Client Information Disclosure Vulnerability
11743| [101209] SAP Customer Relationship Management (CRM) IC WebClient Unspecified Spoofing Vulnerability
11744| [101194] EMC Network Configuration Manager CVE-2017-8017 Cross Site Scripting Vulnerability
11745| [101184] Siemens 7KT PAC1200 Data Manager CVE-2017-9944 Authentication Bypass Vulnerability
11746| [101172] Cisco Unified Communications Manager CVE-2017-12258 Cross Frame Scripting Vulnerability
11747| [101169] Cisco License Manager Software CVE-2017-12263 Directory Traversal Vulnerability
11748| [101157] Cisco AnyConnect Secure Mobility Client CVE-2017-12268 Local Security Bypass Vulnerability
11749| [101154] HP UCMDB Configuration Manager Software CVE-2017-14352 Cross Site Scripting Vulnerability
11750| [101062] IBM Rational Engineering Lifecycle Manager Multiple Cross Site Scripting Vulnerabilities
11751| [101024] EMC ESRS Policy Manager CVE-2017-4976 Insecure Default Password Vulnerability
11752| [101015] IBM Security Identity Manager Virtual Appliance Arbitrary Command Execution Vulnerability
11753| [100967] IBM Business Process Manager CVE-2017-1539 Remote Privilege Escalation Vulnerability
11754| [100964] IBM Business Process Manager CVE-2017-1346 Local Information Disclosure Vulnerability
11755| [100963] IBM Business Process Manager CVE-2017-1531 HTML Injection Vulnerability
11756| [100962] IBM Business Process Manager CVE-2017-1424 HTML Injection Vulnerability
11757| [100961] IBM Business Process Manager CVE-2017-1425 Cross Site Scripting Vulnerability
11758| [100960] IBM Business Process Manager CVE-2017-1530 HTML Injection Vulnerability
11759| [100959] IBM Business Process Manager CVE-2017-1527 XML External Entity Injection Vulnerability
11760| [100956] CA Identity Manager CVE-2017-9393 Information Disclosure Vulnerability
11761| [100806] SAP Point of Sale Store Manager Hardcoded Credentials Vulnerability
11762| [100662] Cisco Unified Communications Manager CVE-2017-6791 Denial of Service Vulnerability
11763| [100660] Drupal Clientside Validation Module Remote Code Execution Vulnerability
11764| [100602] Aruba Networks ClearPass Policy Manager CVE-2015-3654 Remote Privilege Escalation Vulnerability
11765| [100600] Aruba Networks ClearPass Policy Manager CVE-2015-3657 Remote Privilege Escalation Vulnerability
11766| [100597] Aruba Networks ClearPass Policy Manager CVE-2015-3656 Remote Privilege Escalation Vulnerability
11767| [100594] Aruba Networks ClearPass Policy Manager CVE-2015-3655 Cross Site Request Forgery Vulnerability
11768| [100593] Aruba Networks ClearPass Policy Manager CVE-2015-3653 Remote Privilege Escalation Vulnerability
11769| [100592] IBM Security Access Manager CVE-2017-1489 Local Open Redirection Vulnerability
11770| [100554] Symantec ProxyClient CVE-2017-13674 Local Privilege Escalation Vulnerability
11771| [100539] Aruba Networks ClearPass Policy Manager CVE-2015-4649 Remote Privilege Escalation Vulnerability
11772| [100528] IBM Sametime Connect Client CVE-2016-2974 Information Disclosure Vulnerability
11773| [100375] Cisco Unified Communications Manager CVE-2017-6785 Remote Privilege Escalation Vulnerability
11774| [100364] Cisco AnyConnect Secure Mobility Client Software CVE-2017-6788 Cross Site Scripting Vulnerability
11775| [100362] Cisco Virtual Network Function Element Manager CVE-2017-6710 Remote Command Execution Vulnerability
11776| [100328] Cisco Data Center Network Manager CVE-2011-4650 Denial of Service Vulnerability
11777| [100269] IBM Rational Engineering Lifecycle Manager CVE-2017-1168 Cross Site Scripting Vulnerability
11778| [100195] Adobe Experience Manager CVE-2017-3108 Arbitrary Code Execution Vulnerability
11779| [100192] Adobe Experience Manager CVE-2017-3110 Information Disclosure Vulnerability
11780| [100188] Adobe Experience Manager CVE-2017-3107 Information Disclosure Vulnerability
11781| [100168] SAP Customer Relationship Management (CRM) WebClient User Interface SQL Injection Vulnerability
11782| [100165] SAP Customer Relationship Management (CRM) WebClient UI Cross Site Scripting Vulnerability
11783| [100138] Dell Storage Manager CVE-2017-10949 Directory Traversal Vulnerability
11784| [100121] Cisco Unified Communications Manager CVE-2017-6757 SQL Injection Vulnerability
11785| [100119] Cisco Unified Communications Manager CVE-2017-6758 Directory Traversal Vulnerability
11786| [100092] Microsoft Volume Manager Extension Driver CVE-2017-8668 Local Information Disclosure Vulnerability
11787| [100078] Trend Micro Control Manager Multiple Security Vulnerabilities
11788| [100073] IBM Tivoli Endpoint Manager CVE-2017-1227 Denial of Service Vulnerability
11789| [99981] ZOHO ManageEngine Event LogAnalyzer CVE-2017-11685 Multiple Cross Site Scripting Vulnerabilities
11790| [99649] Oracle Enterprise Manager Base Platform CVE-2017-10091 Remote Security Vulnerability
11791| [99593] TYPO3 Event Management and Registration Extension SQL Injection Vulnerability
11792| [99582] Siemens SIMATIC WinCC Sm@rtClient for Android ICSA-17-194-03 Multiple Security Vulnerabilities
11793| [99572] EMC RSA Authentication Manager CVE-2017-8000 HTML Injection Vulnerability
11794| [99554] EMC RSA Authentication Manager CVE-2017-8006 Brute Force Authentication Bypass Vulnerability
11795| [99481] Cisco Wide Area Application Services Central Manager Information Disclosure Vulnerability
11796| [99382] NetApp OnCommand System Manager CVE-2016-5045 Information Disclosure Vulnerability
11797| [99342] HP Network Node Manager i (NNMi) Software Multiple Unspecified Security Vulnerabilities
11798| [99308] TeamSpeak Client CVE-2017-9982 Denial of Service Vulnerability
11799| [99303] HP Systems Insight Manager CVE-2016-8516 Unspecified Denial of Service Vulnerability
11800| [99301] HP Systems Insight Manager CVE-2016-8517 Unspecified Cross Site Scripting Vulnerability
11801| [99297] HP Systems Insight Manager CVE-2016-8518 Unspecified Denial of Service Vulnerability
11802| [99214] Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerability
11803| [99155] WordPress Event Calendar WD Plugin CVE-2017-2224 Cross Site Scripting Vulnerability
11804| [98984] VMware Horizon View Client CVE-2017-4918 Command Injection Vulnerability
11805| [98981] Cisco Ultra Services Framework Element Manager CVE-2017-6687 Insecure Default Password Vulnerability
11806| [98960] HP UCMDB Configuration Manager Software Unspecified Remote Code Execution Vulnerability
11807| [98947] Cisco Unified Communications Domain Manager CVE-2017-6668 Multiple SQL Injection Vulnerabilities
11808| [98946] Cisco Unified Communications Domain Manager CVE-2017-6670 Open Redirection Vulnerability
11809| [98938] Cisco AnyConnect Secure Mobility Client CVE-2017-6638 Local Privilege Escalation Vulnerability
11810| [98937] Cisco Prime Data Center Network Manager (DCNM) Default Account Authentication Bypass Vulnerability
11811| [98935] Cisco Prime Data Center Network Manager CVE-2017-6639 Remote Code Execution Vulnerability
11812| [98912] IBM Security Access Manager CVE-2016-3051 Security Bypass Vulnerability
11813| [98832] IBM Security Access Manager Products CVE-2016-3019 Information Disclosure Vulnerability
11814| [98829] IBM Security Privileged Identity Manager CVE-2016-5959 Information Disclosure Vulnerability
11815| [98825] IBM Security Privileged Identity Manager CVE-2016-5960 Local Information Disclosure Vulnerability
11816| [98765] Hitachi Device Manager CVE-2017-9294 Arbitrary Command Execution Vulnerability
11817| [98742] Avaya Communication Manager '/auth-cgi-bin/distUpgReq' Command Injection Vulnerability
11818| [98738] Fortinet FortiClient SSLVPN CVE-2016-8496 Remote Code Execution Vulnerability
11819| [98722] ClearPass Policy Manager Multiple Security Vulnerabilities
11820| [98718] Netikus EventSentry CVE-2016-5077 HTML Injection Vulnerability
11821| [98676] NetApp OnCommand Unified Manager Core Package CVE-2017-7439 Information Disclosure Vulnerability
11822| [98675] NetApp OnCommand Unified Manager Core Package CVE-2017-7236 SQL Injection Vulnerability
11823| [98661] Intel Hardware Accelerated Execution Manager CVE-2017-5683 Local Privilege Escalation Vulnerability
11824| [98561] IBM Business Process Manager CVE-2017-1159 Open Redirect Vulnerability
11825| [98557] FortiAnalyzer and FortiManager CVE-2017-3126 Open Redirect Vulnerability
11826| [98542] Cisco Remote Expert Manager Software CVE-2017-6643 Information Disclosure Vulnerability
11827| [98539] Cisco Remote Expert Manager Software CVE-2017-6644 Information Disclosure Vulnerability
11828| [98538] Cisco Remote Expert Manager Software CVE-2017-6647 Information Disclosure Vulnerability
11829| [98537] Cisco Remote Expert Manager Software CVE-2017-6645 Information Disclosure Vulnerability
11830| [98534] Cisco Remote Expert Manager Software CVE-2017-6642 Information Disclosure Vulnerability
11831| [98532] Cisco Remote Expert Manager Software CVE-2017-6641 Denial of Service Vulnerability
11832| [98529] Cisco Remote Expert Manager Software CVE-2017-6646 Information Disclosure Vulnerability
11833| [98527] Cisco Unified Communications Manager CVE-2017-6654 Cross Site Scripting Vulnerability
11834| [98482] IBM Tivoli Federated Identity Manager CVE-2017-1320 Unspecified Cross Site Scripting Vulnerability
11835| [98480] IBM Tivoli Federated Identity Manager CVE-2017-1319 Remote Information Disclosure Vulnerability
11836| [98447] Privilege Manager for Unix CVE-2017-6553 Buffer Overflow Vulnerability
11837| [98418] IBM Rational Quality Manager CVE-2016-6035 Cross Site Scripting Vulnerability
11838| [98415] Google google-api-php-client 'url-shortener.php' Multiple Cross Site Scripting Vulnerabilities
11839| [98348] Adobe Experience Manager Forms CVE-2017-3067 Information Disclosure Vulnerability
11840| [98344] CA Client Automation CVE-2017-8391 Local Information Disclosure Vulnerability
11841| [98335] IBM Tivoli Storage Manager CVE-2016-8916 Local Information Disclosure Vulnerability
11842| [98254] Wonderware Historian Client CVE-2017-7907 Local XML External Entity Injection Vulnerability
11843| [98193] Google Android Qualcomm Secure Channel Manager Driver Privilege Escalation Vulnerability
11844| [98093] NetIQ Access Manager CVE-2017-5191 Cross Site Scripting Vulnerability
11845| [97965] Novell NetIQ Access Manager CVE-2017-5190 Remote Information Disclosure Vulnerability
11846| [97922] Cisco Unified Communications Manager CVE-2017-3808 Denial of Service Vulnerability
11847| [97921] VMware Workstation and Horizon View Client CVE-2017-4912 Remote Code Execution Vulnerability
11848| [97920] VMware Workstation and Horizon Client CVE-2017-4913 Integer Overflow Vulnerability
11849| [97916] VMware Workstation and Horizon View Client CVE-2017-4911 Remote Code Execution Vulnerability
11850| [97913] VMware Workstation and Horizon View Client CVE-2017-4910 Remote Code Execution Vulnerability
11851| [97912] VMware Workstation and Horizon View Client CVE-2016-4908 Heap Based Buffer Overflow Vulnerability
11852| [97911] VMware Workstation and Horizon View Client CVE-2016-4909 Heap Based Buffer Overflow Vulnerability
11853| [97728] Oracle Identity Manager CVE-2017-3553 Remote Security Vulnerability
11854| [97723] Oracle Transportation Manager CVE-2017-3530 Remote Security Vulnerability
11855| [97721] Oracle Commerce Guided Search and Commerce Experience Manager CVE-2017-3572 Security Vulnerability
11856| [97720] Oracle Enterprise Manager Base Platform CVE-2017-3518 Remote Security Vulnerability
11857| [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
11858| [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
11859| [97686] Quest Privilege Manager CVE-2017-6554 Arbitrary File Overwrite Vulnerability
11860| [97656] WordPress Spider Event Calendar Plugin CVE-2017-7719 Multiple SQL Injection Vulnerabilities
11861| [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
11862| [97629] IBM Tivoli Application Dependency Discovery Manager CVE-2016-8927 Cross Site Scripting Vulnerability
11863| [97625] IBM Tivoli Application Dependency Discovery Manager CVE-2016-8925 Remote File Include Vulnerability
11864| [97541] Trend Micro Control Manager Authentication Bypass Vulnerability
11865| [97478] FortiClient SSLVPN CVE-2016-8497 Privilege Escalation Vulnerability
11866| [97432] Cisco Unified Communications Manager CVE-2017-3886 SQL Injection Vulnerability
11867| [97431] Cisco Unified Communications Manager CVE-2017-3888 Cross Site Scripting Vulnerability
11868| [97394] ManageEngine Applications Manager Multiple Security Vulnerabilities
11869| [97322] IBM Business Process Manager CVE-2017-1140 Cross Site Scripting Vulnerability
11870| [97173] IBM Rational Quality Manager CVE-2016-6022 Cross Site Scripting Vulnerability
11871| [97172] IBM Rational Quality Manager CVE-2016-6036 Cross Site Scripting Vulnerability
11872| [97169] IBM Rational Quality Manager CVE-2016-6031 Cross Site Scripting Vulnerability
11873| [97113] PhishWall Client CVE-2017-2130 DLL Loading Remote Code Execution Vulnerability
11874| [97086] Trend Micro Control Manager Multiple SQL Injection Vulnerabilities
11875| [97035] NetIQ Access Manager CVE-2016-5758 Cross Site Request Forgery Vulnerability
11876| [97015] Candlepin subscription-manager CVE-2017-2663 Multiple Local Privilege Escalation Vulnerabilities
11877| [96976] IBM Security Key Lifecycle Manager CVE-2016-6102 Information Disclosure Vulnerability
11878| [96916] Cisco Unified Communications Manager CVE-2017-3872 Cross Site Scripting Vulnerability
11879| [96915] Cisco Unified Communications Manager CVE-2017-3877 Cross Site Request Forgery Vulnerability
11880| [96914] Cisco Unified Communications Manager CVE-2017-3874 Cross Site Scripting Vulnerability
11881| [96830] IBM Rational Rhapsody Design Manager CVE-2016-9696 HTML Injection Vulnerability
11882| [96829] IBM Rational Rhapsody Design Manager CVE-2016-9698 XML External Entity Injection Vulnerability
11883| [96828] IBM Rational Rhapsody Design Manager CVE-2016-9697 Information Disclosure Vulnerability
11884| [96826] IBM Rational Rhapsody Design Manager CVE-2016-8973 Arbitrary File Upload Vulnerability
11885| [96825] IBM Rational Rhapsody Design Manager CVE-2016-9694 Cross Site Scripting Vulnerability
11886| [96816] Juniper Networks IDP Appliance Configuration Manager Cross Site Scripting Vulnerability
11887| [96792] Google Android Location Manager CVE-2017-0489 Remote Privilege Escalation Vulnerability
11888| [96791] Google Android Package Manager CVE-2017-0491 Privilege Escalation Vulnerability
11889| [96742] Pharos PopUp Printer Client Multiple Heap Based Buffer Overflow Vulnerabilities
11890| [96738] Pharos PopUp Printer Client CVE-2017-2787 Heap Based Buffer Overflow Vulnerability
11891| [96736] Pharos PopUp Printer Client CVE-2017-2786 Denial of Service Vulnerability
11892| [96570] FTPShell Client CVE-2017-6465 Buffer Overflow Vulnerability
11893| [96504] Veritas NetBackup Server and Client/NetBackup Appliance Authentication Bypass Vulnerability
11894| [96500] Veritas NetBackup Server and Client/ NetBackup Appliance Hardcoded Credentials Vulnerability
11895| [96493] Veritas NetBackup Server and Client/NetBackup Appliance Local Command Execution Vulnerability
11896| [96491] Veritas NetBackup Server and Client/ NetBackup Appliance Local Privilege Escalation Vulnerability
11897| [96490] Veritas NetBackup Server and Client/ NetBackup Appliance Arbitrary Command Execution Vulnerability
11898| [96489] Veritas NetBackup Server and Client/ NetBackup Appliance Arbitrary Command Execution Vulnerability
11899| [96488] Veritas NetBackup Server and Client/NetBackup Appliance DNS Spoofing Vulnerability
11900| [96486] Veritas NetBackup Server and Client/NetBackup Appliance Multiple Directory Traversal Vulnerabilities
11901| [96485] Veritas NetBackup Server and Client/ NetBackup Appliance Denial-of-Service Vulnerability
11902| [96484] Veritas NetBackup Server and Client/ NetBackup Appliance Arbitrary Command Execution Vulnerability
11903| [96443] IBM Tivoli Storage Manager Server CVE-2016-8998 Buffer Overflow Vulnerability
11904| [96395] HP Version Control Repository Manager CVE-2017-5787 Unspecified Denial of Service Vulnerability
11905| [96381] Oracle Java 'sun.net.ftp.impl.FtpClient' Remote Security Vulnerability
11906| [96380] IBM Security Access Manager Products CVE-2016-3018 Cross Site Scripting Vulnerability
11907| [96368] IBM Security Access Manager Products CVE-2016-3017 Information Disclosure Vulnerability
11908| [96358] NetApp OnCommand Unified Manager for Clustered Data ONTAP Remote Code Execution Vulnerability
11909| [96357] IBM Security Access Manager CVE-2016-3020 Security Bypass Vulnerability
11910| [96294] Symantec Endpoint Protection Client CVE-2016-9093 Local Privilege Escalation Vulnerability
11911| [96286] IBM Rational Rhapsody Design Manager CVE-2016-8974 XML External Entity Injection Vulnerability
11912| [96278] IBM Security Access Manager Products CVE-2016-5919 Information Disclosure Vulnerability
11913| [96265] QEMU 'nbd/client.c' Stack Buffer Overflow Vulnerability
11914| [96251] Cisco Unified Communications Manager CVE-2017-3836 Information Disclosure Vulnerability
11915| [96250] Cisco Unified Communications Manager CVE-2017-3829 Cross Site Scripting Vulnerability
11916| [96246] Cisco Unified Communications Manager CVE-2017-3833 Cross Site Scripting Vulnerability
11917| [96241] Cisco Unified Communications Manager CVE-2017-3821 Cross Site Scripting Vulnerability
11918| [96240] Cisco Unified Communications Manager CVE-2017-3828 Cross Site Scripting Vulnerability
11919| [96186] Xabber XMPP Client CVE-2017-5606 User Impersonation Vulnerability
11920| [96184] MCabber XMPP Client CVE-2017-5604 User Impersonation Vulnerability
11921| [96176] Jappix XMPP Client CVE-2017-5602 User Impersonation Vulnerability
11922| [96173] Profanity XMPP Client CVE-2017-5592 User Impersonation Vulnerability
11923| [96157] FortiManager CVE-2016-8495 SSL Certificate Validation Information Disclosure Vulnerability
11924| [96147] Hanwha Techwin Smart Security Manager Multiple Input Validation Vulnerabilities
11925| [96145] Cisco AnyConnect Secure Mobility Client CVE-2017-3813 Local Privilege Escalation Vulnerability
11926| [96133] IBM Security Access Manager Products CVE-2016-3029 Cross Site Request Forgery Vulnerability
11927| [96132] IBM Security Access Manager CVE-2016-3024 Local Information Disclosure Vulnerability
11928| [96131] Trend Micro Control Manager Multiple Directory Traversal Vulnerabilities
11929| [96130] IBM Security Access Manager Products CVE-2016-3022 Information Disclosure Vulnerability
11930| [96127] IBM Security Access Manager Products CVE-2016-3027 XML External Entity Injection Vulnerability
11931| [96124] IBM Security Access Manager Products CVE-2016-3023 Information Disclosure Vulnerability
11932| [96123] Trend Micro Control Manager Multiple SQL Injection Vulnerabilities
11933| [96114] IBM Security Access Manager CVE-2016-3021 Information Disclosure Vulnerability
11934| [96090] IBM Security Access Manager Products CVE-2015-5013 Information Disclosure Vulnerability
11935| [96014] libevent Multiple Security Vulnerabilities
11936| [95985] IBM Security Key Lifecycle Manager CVE-2016-6093 Security Bypass Vulnerability
11937| [95984] IBM Security Key Lifecycle Manager CVE-2016-6094 Information Disclosure Vulnerability
11938| [95983] IBM Security Key Lifecycle Manager CVE-2016-6096 Cross Site Scripting Vulnerability
11939| [95982] IBM Tivoli Key Lifecycle Manager CVE-2016-6098 Security Bypass Vulnerability
11940| [95980] IBM Tivoli Key Lifecycle Manager CVE-2016-6104 Arbitrary File Upload Vulnerability
11941| [95977] IBM Security Key Lifecycle Manager CVE-2016-6097 Local Information Disclosure Vulnerability
11942| [95976] IBM Tivoli Storage Manager CVE-2016-6034 Information Disclosure Vulnerability
11943| [95972] Trend Micro Control Manager Multiple Information Disclosure Vulnerabilities
11944| [95966] IBM Security Key Lifecycle Manager CVE-2016-6116 Information Disclosure Vulnerability
11945| [95965] IBM Security Key Lifecycle Manager CVE-2016-6095 Brute Force Authentication Bypass Vulnerability
11946| [95958] IBM Security Key Lifecycle Manager CVE-2016-6099 Information Disclosure Vulnerability
11947| [95950] IBM Security Key Lifecycle Manager CVE-2016-6103 Cross Site Request Forgery Vulnerability
11948| [95944] Cisco Firepower Device Manager CVE-2017-3822 Remote Security Bypass Vulnerability
11949| [95938] EMC Smarts Network Configuration Manager CVE-2017-2767 Remote Code Execution Vulnerability
11950| [95936] EMC Smarts Network Configuration Manager CVE-2017-2768 Remote Security Bypass Vulnerability
11951| [95930] Brocade Virtual Traffic Manager CVE-2016-8201 Cross Site Request Forgery Vulnerability
11952| [95908] Mp3splt 'options_manager.c' Denial of Service Vulnerability
11953| [95905] IBM Security Key Lifecycle Manager CVE-2016-6117 Information Disclosure Vulnerability
11954| [95904] IBM Tivoli Key Lifecycle Manager CVE-2016-6105 Security Bypass Vulnerability
11955| [95898] SHDesigns Resident Download Manager CVE-2016-6567 Remote Code Execution Vulnerability
11956| [95872] Cisco Unified Communications Manager CVE-2017-3798 Cross Site Scripting Vulnerability
11957| [95636] Cisco Unified Communications Manager CVE-2017-3802 Cross Site Scripting Vulnerability
11958| [95444] Symantec Norton Download Manager CVE-2016-6592 DLL Loading Remote Code Execution Vulnerability
11959| [95416] Web Client CVE-2017-5151 Unspecified SQL Injection Vulnerability
11960| [95379] Cybozu Remote Service Manager CVE-2016-7815 Certificate Validation Security Bypass Vulnerability
11961| [95366] Computer Associates Service Desk Manager CVE-2016-10086 Security Bypass Vulnerability
11962| [95327] IBM Security Identity Manager Virtual Appliance Local Information Disclosure Vulnerability
11963| [95326] IBM Security Identity Manager CVE-2016-9739 Local Information Disclosure Vulnerability
11964| [95323] IBM Security Identity Manager Virtual Appliance Cross Site Scripting Vulnerability
11965| [95306] IBM Tivoli Storage Manager CVE-2016-6110 Local Information Disclosure Vulnerability
11966| [95295] IBM Security Access Manager Products CVE-2016-2908 Information Disclosure Vulnerability
11967| [95224] Shoretel Mobility Client CVE-2016-6562 SSL Certificate Validation Security Bypass Vulnerability
11968| [95199] IBM Security Privileged Identity Manager CVE-2016-5990 Arbitrary File Upload Vulnerability
11969| [95198] IBM Security Privileged Identity Manager CVE-2016-5988 Information Disclosure Vulnerability
11970| [95197] IBM Security Privileged Identity Manager CVE-2016-5966 Information Disclosure Vulnerability
11971| [95196] IBM Security Privileged Identity Manager CVE-2016-5958 Information Disclosure Vulnerability
11972| [95107] IBM Security Access Manager CVE-2016-3043 Man in the Middle Information Disclosure Vulnerability
11973| [95105] IBM Business Process Manager CVE-2016-9731 Cross Site Scripting Vulnerability
11974| [95104] IBM Security Access Manager CVE-2016-3046 SQL Injection Vulnerability
11975| [95103] IBM Security Access Manager for Web CVE-2016-3045 Information Disclosure Vulnerability
11976| [95093] IBM Tivoli Storage Manager Operations Center CVE-2016-6046 Cross Site Scripting Vulnerability
11977| [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
11978| [95091] IBM Tivoli Storage Manager Operations Center CVE-2016-6044 Security Bypass Vulnerability
11979| [95090] IBM Tivoli Storage Manager Operations Center CVE-2016-6043 Local Security Vulnerability
11980| [95087] IBM Tivoli Storage Manager Operations Center CVE-2016-6045 Cross Site Request Forgery Vulnerability
11981| [95062] SKYSEA Client View CVE-2016-7836 Arbitrary Code Execution Vulnerability
11982| [94949] HP Version Control Repository Manager Multiple Security Vulnerabilities
11983| [94876] Adobe Experience Manager CVE-2016-7885 Cross Site Request Forgery Vulnerability
11984| [94869] Adobe Experience Manager Multiple Cross Site Scripting Vulnerabilities
11985| [94867] Adobe Experience Manager and LiveCycle Multiple Cross Site Scripting Vulnerabilities
11986| [94809] Microsoft Remote Desktop Client for Mac Remote Code Execution Vulnerability
11987| [94802] Cisco Unified Communications Manager IM and Presence Service Information Disclosure Vulnerability
11988| [94798] Cisco Unified Communications Manager CVE-2016-9210 Directory Traversal Vulnerability
11989| [94793] Cisco Unified Communications Manager CVE-2016-9206 Cross Site Scripting Vulnerability
11990| [94770] Cisco AnyConnect Secure Mobility Client CVE-2016-9192 Local Privilege Escalation Vulnerability
11991| [94705] Google Android Package Manager CVE-2016-6774 Information Disclosure Vulnerability
11992| [94695] RETIRED: Symantec Norton Download Manager DLL Loading Remote Code Execution Vulnerability
11993| [94543] IBM Security Privileged Identity Manager CVE-2016-0353 Information Disclosure Vulnerability
11994| [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
11995| [94483] VMware vSphere Client CVE-2016-7458 XML External Entity Information Disclosure Vulnerability
11996| [94482] VMware Identity Manager and vRealize Automation CVE-2016-5334 Information Disclosure Vulnerability
11997| [94469] IBM Tivoli Storage Manager FastBack CVE-2016-6091 Stack Buffer Overflow Vulnerability
11998| [94413] IBM Web Content Manager Production Analytics Unspecified Cross Site Scripting Vulnerability
11999| [94381] Teeworlds 'client.cpp' Memory Corruption Vulnerability
12000| [94364] Cisco Unified Communications Manager CVE-2016-6472 Multiple Cross Site Scripting Vulnerabilities
12001| [94308] IBM Security Privileged Identity Manager Brute Force Authentication Bypass Vulnerability
12002| [94258] Computer Associates Service Desk Manager CVE-2016-9148 Cross Site Scripting Vulnerability
12003| [94195] HPE Network Node Manager i (NNMi) Multiple Security vulnerabilities
12004| [94180] Google Android Input Manager Service CVE-2016-6724 Denial of Service Vulnerability
12005| [94175] Google Android Account Manager Service CVE-2016-6718 Local Privilege Escalation Vulnerability
12006| [94170] Google Android Download Manager CVE-2016-6710 Information Disclosure Vulnerability
12007| [94154] HP Network Node Manager i CVE-2016-4397 Local Code Execution Vulnerability
12008| [94148] IBM Tivoli Storage Manager CVE-2016-0371 Local Information Disclosure Vulnerability
12009| [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
12010| [94087] JPKI Client Software CVE-2016-4902 DLL Loading Remote Code Execution Vulnerability
12011| [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
12012| [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
12013| [94058] Microsoft Windows Boot Manager CVE-2016-7247 Local Security Bypass Vulnerability
12014| [94033] Microsoft Windows Animation Manager CVE-2016-7205 Memory Corruption Vulnerability
12015| [94027] Microsoft Windows File Manager CVE-2016-7212 Remote Code Execution Vulnerability
12016| [93973] Novell NetIQ Identity Manager CVE-2016-1592 HTML Injection Vulnerability
12017| [93972] Novell NetIQ Identity Manager CVE-2015-0787 HTML Injection Vulnerability
12018| [93953] Monit Service Manager CVE-2016-7067 Multiple Cross Site Request Forgery Vulnerabilities
12019| [93944] Apache Tomcat Security Manager CVE-2016-6796 Security Bypass Vulnerability
12020| [93942] Apache Tomcat Security Manager CVE-2016-5018 Security Bypass Vulnerability
12021| [93926] Candlepin 'subscription-manager' CVE-2016-4455 Insecure File Permissions Vulnerability
12022| [93882] Cloudera Manager CVE-2016-4949 Information Disclosure Vulnerability
12023| [93879] Cloudera Manager CVE-2016-4950 User Enumeration Vulnerability
12024| [93878] Cloudera Manager Multiple HTML Injection and Cross Site Scripting vulnerabilities
12025| [93833] Novell NetIQ Identity Manager CVE-2016-1598 Cross Site Scripting Vulnerability
12026| [93824] IBM Rational Quality Manager CVE-2016-0326 Remote Command Injection Vulnerability
12027| [93821] Joomla! Huge-IT Portfolio Gallery Manager Multiple Security Vulnerabilities
12028| [93813] McAfee Host Intrusion Prevention Services CVE-2016-8007 Local Authentication Bypass Vulnerability
12029| [93751] Oracle Enterprise Manager Base Platform CVE-2016-5604 Local Security Vulnerability
12030| [93553] Siemens Automation License Manager Multiple Security Vulnerabilities
12031| [93522] Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerability
12032| [93521] Cisco Unified Communications Manager CVE-2016-6440 Clickjacking Vulnerability
12033| [93413] FortiAnalyzer and FortiManager CVE-2015-7363 HTML Injection Vulnerability
12034| [93405] IBM Business Process Manager CVE-2016-3056 Unspecified HTML Injection Vulnerability
12035| [93391] Microsoft Transaction Manager CVE-2016-3341 Local Privilege Escalation Vulnerability
12036| [93353] IBM Business Process Manager Advanced CVE-2016-5901 Unspecified Cross Site Scripting Vulnerability
12037| [93347] IBM Sterling Secure Proxy Configuration Manager CVE-2016-6023 Directory Traversal Vulnerability
12038| [93345] IBM Sterling Secure Proxy Configuration Manager CVE-2016-6025 Local Security Bypass Vulnerability
12039| [93343] Dell EMC vApp Manager Multiple Arbitrary Command Execution Vulnerabilities
12040| [93252] TYPO3 Events Extension SQL Injection Vulnerability
12041| [93223] systemd 'manager_invoke_notify_message()' Function Local Denial of Service Vulnerability
12042| [93178] IBM Security Access Manager CVE-2016-3025 Security Bypass Vulnerability
12043| [93176] IBM Security Access Manager CVE-2016-3028 Remote Command Injection Vulnerability
12044| [93083] IBM Security Privileged Identity Manager Virtual Appliance Information Disclosure Vulnerability
12045| [93081] IBM Security Privileged Identity Manager XML External Entity Denial of Service Vulnerability
12046| [93080] IBM Security Privileged Identity Manager CVE-2016-5970 Directory Traversal Vulnerability
12047| [93078] IBM Security Privileged Identity Manager Unspecified Cross Site Scripting Vulnerability
12048| [93077] IBM Security Privileged Identity Manager CVE-2016-5972 Security Bypass Vulnerability
12049| [93076] IBM Security Privileged Identity Manager CVE-2016-5963 Security Bypass Vulnerability
12050| [93070] IBM Security Privileged Identity Manager CVE-2016-2996 Security Bypass Vulnerability
12051| [93027] Pivotal Cloud Foundry Ops Manager CVE-2016-0930 Insecure Default Password Vulnerability
12052| [92980] ABB DataManagerPro CVE-2016-4526 DLL Loading Local Code Execution Vulnerability
12053| [92977] Fortinet FortiClient Local Information Disclosure Vulnerability
12054| [92976] Fortinet FortiClient DLL Loading Remote Code Execution Vulnerability
12055| [92816] Veritas Infoscale Operations Manager Multiple Unspecified Security Vulnerabilities
12056| [92726] Fortinet FortiClient SSLVPN Local Information Disclosure Vulnerability
12057| [92723] IBM Tivoli Storage Manager for Space Management Local Information Disclosure Vulnerability_
12058| [92703] IBM Tivoli Storage Manager for Virtual Environments Authentication Bypass Vulnerability
12059| [92698] HP Operations Manager CVE-2016-4380 Cross Site Scripting Vulnerability
12060| [92685] NetApp OnCommand System Manager CVE-2016-5047 Unspecified Denial of Service Vulnerability
12061| [92634] IBM Financial Transaction Manager CVE-2016-5920 Unspecified Cross Site Scripting Vulnerability
12062| [92633] IBM Financial Transaction Manager CVE-2016-3060 Clickjacking Vulnerability
12063| [92627] ownCloud Desktop Client Local Code Injection Vulnerability
12064| [92625] Cisco AnyConnect Secure Mobility Client CVE-2016-6369 Local Privilege Escalation Vulnerability
12065| [92614] IBM Tivoli Storage Manager CVE-2016-5934 DLL Loading Local Code Execution Vulnerability
12066| [92608] VMware Identity Manager and vRealize Automation Local Privilege Escalation Vulnerability
12067| [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
12068| [92534] IBM Tivoli Storage Manager HSM for Windows CVE-2016-5918 Local Information Disclosure Vulnerability
12069| [92531] ABB DataManagerPro Local Privilege Escalation Vulnerability
12070| [92517] Cisco Unified Communications Manager CVE-2016-6364 Information Disclosure Vulnerability
12071| [92498] The Installer of PhishWall Client Internet Explorer DLL Loading Code Execution Vulnerability
12072| [92458] FortiManager and FortiAnalyzer CVE-2016-3193 HTML Injection Vulnerability
12073| [92456] FortiManager and FortiAnalyzer CVE-2016-3194 Cross Site Scripting Vulnerability
12074| [92453] FortiManager and FortiAnalyzer CVE-2016-3195 Cross Site Scripting Vulnerability
12075| [92412] Trend Micro Control Manager Multiple Information Disclosure Vulnerabilities
12076| [92401] Drupal OAuth2 Client Module Cross Site Request Forgery Vulnerability
12077| [92397] Trend Micro Control Manager Multiple SQL Injection Vulnerabilities
12078| [92394] RSA Authentication Manager Prime SelfService CVE-2016-0915 Security Bypass Vulnerability
12079| [92382] Adobe Experience Manager CVE-2016-4169 Information Disclosure Vulnerability
12080| [92380] Adobe Experience Manager CVE-2016-4253 Information Disclosure Vulnerability
12081| [92378] Adobe Experience Manager CVE-2016-4170 Cross Site Scripting Vulnerability
12082| [92377] Adobe Experience Manager CVE-2016-4168 Cross Site Scripting Vulnerability
12083| [92363] Trend Micro Control Manager Multiple Security Vulnerabilities
12084| [92271] Cisco Unified Communications Manager IM and Presence Service Denial of Service Vulnerability
12085| [92265] FortiAnalyzer and FortiManager 'Filenames' HTML Injection Vulnerability
12086| [92205] IBM Tivoli Storage Manager for Databases CVE-2016-3059 Local Information Disclosure Vulnerability
12087| [92204] mongodb-clients CVE-2016-6494 Local Information Disclosure Vulnerability
12088| [92151] Cisco Videoscape Session Resource Manager CVE-2016-1467 Denial of Service Vulnerability
12089| [92122] HP Operations Manager CVE-2016-4373 Remote Code Execution Vulnerability
12090| [92121] Reprise License Manager 'akey' Parameter Stack Buffer Overflow Vulnerability
12091| [92120] Reprise License Manager '/goform/activate_doit' Stack Buffer Overflow Vulnerability
12092| [92044] Cisco Unified Computing System Performance Manager CVE-2016-1374 Remote Code Execution Vulnerability
12093| [92022] Oracle Integrated Lights Out Manager CVE-2016-3451 Remote Security Vulnerability
12094| [92014] Oracle Integrated Lights Out Manager CVE-2016-5453 Remote Security Vulnerability
12095| [92012] RETIRED: Oracle Integrated Lights Out Manager CVE-2015-5600 Remote Security Vulnerability
12096| [92008] Oracle Integrated Lights Out Manager CVE-2016-5448 Remote Security Vulnerability
12097| [91998] Oracle Integrated Lights Out Manager CVE-2016-5446 Remote Security Vulnerability
12098| [91995] Oracle Integrated Lights Out Manager CVE-2016-5457 Remote Security Vulnerability
12099| [91991] Oracle Integrated Lights Out Manager CVE-2016-5445 Remote Security Vulnerability
12100| [91986] Oracle Integrated Lights Out Manager CVE-2016-5449 Remote Security Vulnerability
12101| [91982] Oracle Integrated Lights Out Manager CVE-2016-5447 Remote Security Vulnerability
12102| [91977] Oracle Integrated Lights Out Manager CVE-2016-3481 Remote Security Vulnerability
12103| [91952] Oracle Integrated Lights Out Manager CVE-2016-3585 Remote Security Vulnerability
12104| [91892] Oracle Enterprise Manager Base Platform CVE-2016-3540 Remote Security Vulnerability
12105| [91887] Oracle Enterprise Manager for Fusion Middleware CVE-2016-3496 Remote Security Vulnerability
12106| [91880] Oracle Enterprise Manager Base Platform CVE-2016-3563 Local Security Vulnerability
12107| [91872] Oracle Enterprise Manager Ops Center CVE-2016-3494 Remote Security Vulnerability
12108| [91737] SAP Solution Manager Remote Code Injection Vulnerability
12109| [91692] IBM Security Identity Manager Virtual Appliance CVE-2016-0340 Local Security Vulnerability
12110| [91689] IBM Security Identity Manager Virtual Appliance CVE-2016-0339 Spoofing Vulnerability
12111| [91688] IBM Security Identity Manager CVE-2016-0338 Local Information Disclosure Vulnerability
12112| [91686] IBM Security Identity Manager Virtual Appliance CVE-2016-0330 Weak Password Security Vulnerability
12113| [91531] ManageEngine Password Manager Pro CVE-2016-1161 Cross-Site Request Forgery Vulnerability
12114| [91426] IBM Business Process Manager CVE-2016-0349 Security Bypass Vulnerability
12115| [91416] Pivotal Software Ops Manager CVE-2016-0927 Unspecified HTML Injection Vulnerability
12116| [91264] Solarwinds Virtualization Manager CVE-2016-5709 Weak Encryption Algorithm Security Weakness
12117| [91248] HP Systems Insight Manager CVE-2016-4366 Unspecified Security Vulnerability
12118| [91226] Python 'urrlib2/urllib/httplib/http.client' HTTP Header Injection Vulnerability
12119| [91222] Solarwinds Virtualization Manager CVE-2016-3642 Remote Code Execution Vulnerability
12120| [91221] Solarwinds Virtualization Manager CVE-2016-3643 Local Privilege Escalation Vulnerability
12121| [91145] Drupal Page Manager Search Module Information Disclosure Vulnerability
12122| [91126] HP Service Manager CVE-2016-4371 Server Side Request Forgery Security Bypass Vulnerability
12123| [91014] ManageEngine OpManager Multiple Security Vulnerabilities
12124| [90963] Relay Ajax Directory Manager Arbitrary File Upload Vulnerability
12125| [90858] HP Service Manager CVE-2016-2025 Unspecified Information Disclosure Vulnerability
12126| [90849] Pivotal PCF Ops Manager CVE-2016-0883 Insecure Authentication Weakness
12127| [90808] IBM Rational Engineering Lifecycle Manager and Jazz Foundation HTML Injection Vulnerability
12128| [90807] IBM Rational Engineering Lifecycle Manager CVE-2015-7485 Cross Site Scripting Vulnerability
12129| [90806] IBM Rational Engineering Lifecycle Manager CVE-2015-7486 Cross Site Scripting Vulnerability
12130| [90802] IBM Rational Engineering Lifecycle Manager CVE-2015-7484 Information Disclosure Vulnerability
12131| [90761] Drupal Dropbox client Module Cross Site Scripting and Security Bypass Vulnerabilities
12132| [90754] HP Version Control Repository Manager CVE-2015-5413 Remote Privilege Escalation Vulnerability
12133| [90753] HP Version Control Repository Manager CVE-2015-5412 Cross Site Request Forgery Vulnerability
12134| [90752] HP Version Control Repository Manager CVE-2015-5409 Buffer Overflow Vulnerability
12135| [90751] HP Version Control Repository Manager CVE-2015-5410 Arbitrary Code Execution Vulnerability
12136| [90673] ManageEngine Password Manager Pro CVE-2016-1159 Security Bypass Vulnerability
12137| [90563] Junkie Ftp Client CVE-2004-1281 Remote Security Vulnerability
12138| [90543] Junkie Ftp Client CVE-2004-1280 Remote Security Vulnerability
12139| [90452] ClientExec CVE-2004-1590 Information Disclosure Vulnerability
12140| [90378] ManageEngine Applications Manager Multiple Security Vulnerabilities
12141| [90331] Mailing List Manager CVE-2004-2744 Remote Security Vulnerability
12142| [90295] Softremote Vpn Client CVE-2005-0346 Information Disclosure Vulnerability
12143| [90250] Control Manager CVE-2005-0383 Remote Security Vulnerability
12144| [90239] HP Network Node Manager Multiple Unspecified Security Vulnerabilities
12145| [90232] Alterpath Manager CVE-2005-0540 Information Disclosure Vulnerability
12146| [90226] Ip Office Phone Manager CVE-2005-0506 Remote Security Vulnerability
12147| [90220] Alterpath Manager CVE-2005-0541 Remote Security Vulnerability
12148| [90218] Information Resource Manager CVE-2005-0505 Remote Security Vulnerability
12149| [90216] Alterpath Manager CVE-2005-0542 Local Security Vulnerability
12150| [90169] RSA Authentication Manager CVE-2016-0902 HTTP Response Splitting Vulnerability
12151| [90168] RSA Authentication Manager CVE-2016-0901 Cross Site Scripting Vulnerability
12152| [90167] RSA Authentication Manager CVE-2016-0900 Cross Site Scripting Vulnerability
12153| [90140] Client Access CVE-2005-0868 Remote Security Vulnerability
12154| [90041] OpenView Network Node Manager CVE-2005-1434 Denial-Of-Service Vulnerability
12155| [89942] Php Advanced Transfer Manager CVE-2005-1681 Remote Security Vulnerability
12156| [89937] Linux Kernel 'perf_event_open()' Function Local Information Disclosure Vulnerability
12157| [89855] IBM Security Identity Manager Virtual Appliance CVE-2016-0327 Local Command Injection Vulnerability
12158| [89851] IBM Security Identity Manager Virtual Appliance CVE-2016-0324 OS Command Injection Vulnerability
12159| [89850] IBM Security Identity Manager Virtual Appliance CVE-2016-0332 Security Bypass Vulnerability
12160| [89847] IBM Security Identity Manager Virtual Appliance Cross Site Request Forgery Vulnerability
12161| [89846] IBM Security Identity Manager Virtual Appliance Unspecified Cross Site Scripting Vulnerability
12162| [89830] File Upload Manager CVE-2005-1957 File-Upload Vulnerability
12163| [89822] File Upload Manager CVE-2005-1956 File-Upload Vulnerability
12164| [89811] Bitrix Site Manager CVE-2005-1995 Information Disclosure Vulnerability
12165| [89739] Backup Manager CVE-2005-2211 Local Security Vulnerability
12166| [89711] Backup Manager CVE-2005-2212 Remote Security Vulnerability
12167| [89589] EMC RSA Data Loss Prevention Multiple Security Vulnerabilities
12168| [89577] Netware Client CVE-2002-1754 Denial-Of-Service Vulnerability
12169| [89550] RealSecure Event Collector CVE-2002-1280 Denial-Of-Service Vulnerability
12170| [89548] Aquonics File Manager CVE-2002-1927 Local Security Vulnerability
12171| [89546] VPN Client for Linux CVE-2002-0852 Denial-Of-Service Vulnerability
12172| [89533] File Transfer Manager CVE-2002-0978 Remote Security Vulnerability
12173| [89310] Php Advanced Transfer Manager CVE-2005-2997 Directory Traversal Vulnerability
12174| [89291] Php Advanced Transfer Manager CVE-2005-2999 Remote Security Vulnerability
12175| [89285] Php Advanced Transfer Manager CVE-2005-2998 Remote Security Vulnerability
12176| [89185] Events System CVE-2005-1910 SQL-Injection Vulnerability
12177| [89176] Radia Client CVE-2005-1826 Remote Security Vulnerability
12178| [89137] Process Resource Manager CVE-2001-0976 Local Security Vulnerability
12179| [89048] Systems Insight Manager CVE-2005-3983 Denial-Of-Service Vulnerability
12180| [89035] Internet Download Manager CVE-2005-2210 Remote Security Vulnerability
12181| [88949] Listmanager CVE-2005-4145 Remote Security Vulnerability
12182| [88947] Program Neighborhood Client CVE-2005-4412 Local Security Vulnerability
12183| [88867] Php Advanced Transfer Manager CVE-2005-3000 Cross-Site Scripting Vulnerability
12184| [88828] NetworkManager CVE-2005-2410 Remote Security Vulnerability
12185| [88754] Asp Virtual News Manager CVE-2005-1573 SQL-Injection Vulnerability
12186| [88740] OpenView Event Correlation Services CVE-2005-1433 Denial-Of-Service Vulnerability
12187| [88728] Mailing List Manager CVE-2005-1419 SQL-Injection Vulnerability
12188| [88682] Jp1-Cm2-Network Node Manager 250 CVE-2005-4793 Remote Security Vulnerability
12189| [88569] Support Tools Manager CVE-2001-0079 Local Security Vulnerability
12190| [88512] VTun 'client.c' Denial of Service Vulnerability
12191| [88455] Policy Compliance Manager CVE-1999-1147 Remote Security Vulnerability
12192| [88443] Hotsync Manager CVE-1999-1065 Denial-Of-Service Vulnerability
12193| [88362] DHCP Client CVE-1999-0808 Denial-Of-Service Vulnerability
12194| [88320] Napster Client CVE-2000-0281 Denial-Of-Service Vulnerability
12195| [88169] Oracle Client CVE-2006-0550 Denial-Of-Service Vulnerability
12196| [88152] Zbattle Client CVE-2006-0505 Denial-Of-Service Vulnerability
12197| [88078] Php Advanced Transfer Manager CVE-2006-1209 Information Disclosure Vulnerability
12198| [87974] Listmanager CVE-2005-4149 SQL-Injection Vulnerability
12199| [87797] Backweb Client CVE-1999-1277 Local Security Vulnerability
12200| [87786] Resource Manager CVE-2003-0731 Remote Security Vulnerability
12201| [87724] Resource Manager CVE-2003-0732 Denial-Of-Service Vulnerability
12202| [87618] Bitrix Site Manager CVE-2006-2476 Information Disclosure Vulnerability
12203| [87617] Bitrix Site Manager CVE-2006-2479 Information Disclosure Vulnerability
12204| [87564] Client CVE-2006-2612 Local Security Vulnerability
12205| [87563] Article Manager Pro CVE-2006-2566 Information Disclosure Vulnerability
12206| [87528] IBM Security Privileged Identity Manager CVE-2016-0357 Click Jacking Vulnerability
12207| [87512] Tivoli Storage Manager Express CVE-2009-3854 Remote Security Vulnerability
12208| [87503] WebSphere Business Events CVE-2009-2741 Remote Security Vulnerability
12209| [87478] getPlus Download Manager CVE-2008-5364 Remote Security Vulnerability
12210| [87423] Retrospect Client CVE-2003-0490 Local Security Vulnerability
12211| [87411] Creasito E-Commerce Content Manager CVE-2006-5777 Security Bypass Vulnerability
12212| [87360] Online Event Registration CVE-2006-6007 Denial-Of-Service Vulnerability
12213| [87352] Netepi Case Manager CVE-2006-6052 Remote Security Vulnerability
12214| [87319] Client CVE-2006-6306 Local Security Vulnerability
12215| [87300] Tivoli Storage Manager Express CVE-2006-6309 Denial-Of-Service Vulnerability
12216| [87296] Simple File Manager CVE-2006-6376 Directory Traversal Vulnerability
12217| [87274] Client Code Suite CVE-2006-6551 Remote Security Vulnerability
12218| [87243] User Manager CVE-2006-6583 Information Disclosure Vulnerability
12219| [87187] Car Site Manager CVE-2006-6012 Cross-Site Scripting Vulnerability
12220| [87129] Venturi Client CVE-2003-0316 Remote Security Vulnerability
12221| [87103] Windows Event Viewer CVE-2006-6753 Remote Security Vulnerability
12222| [87017] Cisco Resource Manager CVE-1999-1126 Local Security Vulnerability
12223| [87012] Cisco Resource Manager CVE-1999-1042 Information Disclosure Vulnerability
12224| [86897] ClientExec CVE-2005-4630 SQL-Injection Vulnerability
12225| [86856] Clan Manager Pro CVE-2006-7046 Remote Security Vulnerability
12226| [86854] Clan Manager Pro CVE-2006-7045 Remote Security Vulnerability
12227| [86838] Clan Manager Pro CVE-2006-7044 Remote Security Vulnerability
12228| [86823] Power Manager CVE-2006-7240 Local Security Vulnerability
12229| [86781] Perforce Client CVE-2007-0100 Remote Security Vulnerability
12230| [86762] Easy-Content Filemanager CVE-2007-0252 Remote Security Vulnerability
12231| [86754] OpenView Network Node Manager CVE-2007-0441 Remote Security Vulnerability
12232| [86683] Softremote Vpn Client CVE-2002-2225 Denial-Of-Service Vulnerability
12233| [86636] Myevent CVE-2007-0690 Information Disclosure Vulnerability
12234| [86594] Jp1-Cm2-Network Node Manager CVE-2007-1093 Denial-Of-Service Vulnerability
12235| [86565] Access Manager CVE-2007-1309 Remote Security Vulnerability
12236| [86547] Communication Manager CVE-2007-1490 Remote Security Vulnerability
12237| [86391] Aol Client Software CVE-2007-1767 Denial-Of-Service Vulnerability
12238| [86368] IBM Financial Transaction Manager CVE-2016-0272 Cross Site Request Forgery Vulnerability
12239| [86360] IBM Financial Transaction Manager CVE-2016-0276 Remote Code Execution Vulnerability
12240| [86343] IBM Financial Transaction Manager CVE-2016-0275 Local Information Disclosure Vulnerability
12241| [86339] IBM Financial Transaction Manager CVE-2016-0253 Unspecified Cross Site Scripting Vulnerability
12242| [86334] Inoutmailinglistmanager CVE-2007-2003 Remote Security Vulnerability
12243| [86330] Inoutmailinglistmanager CVE-2007-2002 Remote Security Vulnerability
12244| [86325] IBM Financial Transaction Manager CVE-2016-0274 Click Jacking Vulnerability
12245| [86316] IBM Financial Transaction Manager XML External Entity Information Disclosure Vulnerability
12246| [86217] News Manager Deluxe CVE-2007-2303 File-Upload Vulnerability
12247| [86215] NetSight Inventory Manager CVE-2007-2344 Denial-Of-Service Vulnerability
12248| [86170] Backup Manager CVE-2007-2766 Local Security Vulnerability
12249| [86146] Campusmanager Network Control Application Server CVE-2007-2629 Information Disclosure Vulnerability
12250| [86139] VMware Client Integration Plugin CVE-2016-2076 Session Hijacking Vulnerability
12251| [85913] Microsoft Windows Client-Server Run-time Subsystem CVE-2016-0151 Local Security Bypass Vulnerability
12252| [85871] GNOME NetworkManager CVE-2016-0764 Local Information Disclosure Vulnerability
12253| [85826] Google Android Download Manager CVE-2016-0848 Remote Privilege Escalation Vulnerability
12254| [85795] ManageEngine Password Manager Pro Multiple Remote Security Vulnerabilities
12255| [85794] NetApp OnCommand System Manager CVE-2016-3063 Local Command Injection Vulnerability
12256| [85790] NetApp OnCommand System Manager CVE-2015-8322 Arbitrary Code Execution Vulnerability
12257| [85783] HP Device Manager CVE-2011-4722 Directory Traversal Vulnerability
12258| [85782] HP Asset Manager CVE-2016-2000 Remote Code Execution Vulnerability
12259| [85776] Trend Micro Maximum Security\Premium Security\Password Manager Command Execution Vulnerability
12260| [85753] ManageEngine EventLog Analyzer Multiple HTML Injection and Cross Site Scripting vulnerabilities
12261| [85710] Fortinet FortiClient SSLVPN CVE-2015-7362 Local Privilege Escalation Vulnerability
12262| [85690] Cisco Unified Communications Domain Manager CVE-2016-1314 Cross Site Scripting Vulnerability
12263| [85625] Access Manager CVE-2007-3570 Security Bypass Vulnerability
12264| [85372] Cisco IOS/ IOS XE/ Unified Communications Manager CVE-2016-1350 Denial of Service Vulnerability
12265| [85258] Tivoli Netcool Security Manager CVE-2007-6363 Remote Security Vulnerability
12266| [85208] IBM Security Access Manager for Web CVE-2015-5010 Information Disclosure Vulnerability
12267| [85206] IBM Security Access Manager for Web CVE-2015-5012 Information Disclosure Vulnerability
12268| [85202] IBM Security Access Manager CVE-2015-8531 Unspecified Cross Site Scripting Vulnerability
12269| [85115] Lan Manager CVE-2008-0803 File-Upload Vulnerability
12270| [85089] IBM Business Process Manager Advanced and WebSphere Process Server Security Bypass Vulnerability
12271| [85068] HP Service Manager CVE-2016-1998 Remote Code Execution Vulnerability
12272| [85018] Air Filemanager CVE-2008-2345 Remote Security Vulnerability
12273| [84998] Bitrix Site Manager CVE-2008-2052 Remote Security Vulnerability
12274| [84978] Moodle Event Monitor CVE-2016-2154 Access Bypass Vulnerability
12275| [84949] Tectia Client CVE-2006-5484 Remote Security Vulnerability
12276| [84896] SIP Multimedia PC Client CVE-2008-3157 Denial-Of-Service Vulnerability
12277| [84874] Documentum Applicationxtender Workflow Manager CVE-2008-3685 File-Upload Vulnerability
12278| [84713] Calendar Manager CVE-2008-5130 Information Disclosure Vulnerability
12279| [84710] Poll Manager CVE-2008-5129 Information Disclosure Vulnerability
12280| [84705] Membership Manager Pro CVE-2008-5128 Information Disclosure Vulnerability
12281| [84693] Contact Manager CVE-2008-5127 Information Disclosure Vulnerability
12282| [84651] Qmail Mailing List Manager CVE-2008-5606 Information Disclosure Vulnerability
12283| [84648] Ikon Admanager CVE-2008-5596 Information Disclosure Vulnerability
12284| [84615] Mailing List Manager CVE-2008-5980 Remote Security Vulnerability
12285| [84614] XM Events Diary CVE-2008-5925 Information Disclosure Vulnerability
12286| [84551] Localization Client CVE-2008-6169 Cross-Site Request Forgery Vulnerability
12287| [84545] Evcal Events Calendar CVE-2008-6356 Information Disclosure Vulnerability
12288| [84541] Mycal Personal Events Calendar CVE-2008-6357 Information Disclosure Vulnerability
12289| [84517] Presentation Server Client CVE-2008-6561 Local Security Vulnerability
12290| [84464] Faq Manager Pro CVE-2008-7063 Remote Security Vulnerability
12291| [84379] Tivoli Federated Identity Manager CVE-2008-7299 Remote Security Vulnerability
12292| [84354] Symantec Endpoint Protection Manager CVE-2015-8153 SQL Injection Vulnerability
12293| [84343] Symantec Endpoint Protection Manager CVE-2015-8152 Cross Site Request Forgery Vulnerability
12294| [84286] SAP Download Manager Weak Encryption Local Security Weakness
12295| [84244] Events Module CVE-2006-5039 Remote Security Vulnerability
12296| [84167] IBM Tivoli Storage Manager FastBack CVE-2015-8521 Stack Buffer Overflow Vulnerability
12297| [84166] IBM Tivoli Storage Manager FastBack CVE-2015-8520 Stack Buffer Overflow Vulnerability
12298| [84164] IBM Tivoli Storage Manager FastBack CVE-2015-8523 Denial of Service Vulnerability
12299| [84163] IBM Tivoli Storage Manager FastBack CVE-2015-8522 Stack Buffer Overflow Vulnerability
12300| [84161] IBM Tivoli Storage Manager FastBack CVE-2015-8519 Stack Buffer Overflow Vulnerability
12301| [84153] Php Advanced Transfer Manager CVE-2006-4749 Multiple Remote Security Vulnerabilities
12302| [84128] Cisco Unified Communications Domain Manager Unspecified Cross Site Scripting Vulnerability
12303| [84113] Panda SM Manager SSL Certificate Validation Security Bypass Vulnerability
12304| [84103] Site Manager CVE-2006-0465 Cross-Site Scripting Vulnerability
12305| [84101] Ideocontent Manager CVE-2006-0463 Cross-Site Scripting Vulnerability
12306| [84082] Ideocontent Manager CVE-2006-0464 SQL-Injection Vulnerability
12307| [84063] Maian Events CVE-2006-1341 SQL-Injection Vulnerability
12308| [83970] myEvent CVE-2006-1907 SQL-Injection Vulnerability
12309| [83968] myEvent CVE-2006-1908 Cross-Site Scripting Vulnerability
12310| [83940] Bitrix Site Manager CVE-2006-2478 Cross-Site Scripting Vulnerability
12311| [83929] Bitrix Site Manager CVE-2006-2477 Cross-Site Scripting Vulnerability
12312| [83916] Article Manager Pro CVE-2006-2565 SQL-Injection Vulnerability
12313| [83911] Article Manager Pro CVE-2006-2567 Cross-Site Scripting Vulnerability
12314| [83868] IBM Business Process Manager CVE-2016-0227 Cross Site Scripting Vulnerability
12315| [83834] Pre News Manager CVE-2006-2763 SQL-Injection Vulnerability
12316| [83824] St Admanager Lite CVE-2006-3037 Cross-Site Scripting Vulnerability
12317| [83819] Event Registration 2Checkout CVE-2006-3052 Cross-Site Scripting Vulnerability
12318| [83798] Easy Ad-Manager CVE-2006-3003 Cross-Site Scripting Vulnerability
12319| [83723] IBM Business Process Manager CVE-2015-8524 Unspecified Cross Site Scripting Vulnerability
12320| [83687] List Manager CVE-2006-4547 SQL-Injection Vulnerability
12321| [83581] List Manager CVE-2006-4546 Remote Security Vulnerability
12322| [83533] NetSight Inventory Manager CVE-2007-2343 Remote Security Vulnerability
12323| [83452] Photo Manager CVE-2008-0715 Remote Security Vulnerability
12324| [83327] Apache Tomcat Security Manager CVE-2016-0714 Remote Code Execution Vulnerability
12325| [83324] Apache Tomcat Security Manager CVE-2016-0706 Information Disclosure Vulnerability
12326| [83322] Huawei Document Security Manager(DSM) Information Disclosure Vulnerability
12327| [83281] IBM Tivoli Storage Manager FastBack CVE-2016-0213 Unspecified Stack Buffer Overflow Vulnerability
12328| [83280] IBM Tivoli Storage Manager FastBack CVE-2016-0216 Unspecified Stack Buffer Overflow Vulnerability
12329| [83278] IBM Tivoli Storage Manager FastBack CVE-2016-0212 Unspecified Stack Buffer Overflow Vulnerability
12330| [83173] myEvent CVE-2006-4083 Remote Security Vulnerability
12331| [83143] ManageEngine EventLog Analyzer Privilege Escalation Vulnerability
12332| [83140] ManageEngine Network Configuration Manager Privilege Escalation Vulnerability
12333| [83121] Adobe Experience Manager CVE-2016-0958 Remote Security Vulnerability
12334| [83117] Adobe Experience Manager CVE-2016-0955 Cross Site Scripting Vulnerability
12335| [83102] Cisco Unified Communications Manager CVE-2016-1317 Information Disclosure Vulnerability
12336| [82987] Wyse Device Manager CVE-2009-0693 Remote Security Vulnerability
12337| [82958] Mambo Gallery Manager CVE-2006-3981 Remote File Inclusion Vulnerability
12338| [82933] Gnutella Client CVE-2001-1004 Cross-Site Scripting Vulnerability
12339| [82734] Jenkins Plugins Manager CVE-2015-7539 Man in the Middle Security Bypass Vulnerability
12340| [82588] Cisco Unified Communications Manager CVE-2016-1308 SQL Injection Vulnerability
12341| [82557] Cisco ASA-CX and Cisco Prime Security Manager CVE-2016-1301 Privilege Escalation Vulnerability
12342| [82502] IBM WebSphere Business Events CVE-2009-2741 Remote Security Vulnerability
12343| [82447] IBM Tivoli Storage Manager CVE-2015-7408 Local Information Disclosure Vulnerability
12344| [82372] McAfee Vulnerability Manager CVE-2016-2199 Multiple Cross Site Request Forgery Vulnerabilities
12345| [82365] Calendar Manager Pro CVE-2005-1223 SQL-Injection Vulnerability
12346| [82334] Tivoli Storage Manager Express CVE-2009-3854 Remote Security Vulnerability
12347| [82296] eClinicalWorks Population Health (CCMR) Client Portal Multiple Security Vulnerabilities
12348| [82274] Palace Client CVE-1999-0343 Remote Security Vulnerability
12349| [82261] ManageEngine EventLog Analyzer Privilege Escalation Vulnerability
12350| [82259] HP Operations Manager CVE-2016-1985 Remote Code Execution Vulnerability
12351| [82238] PHP File Manager 'phpfm.php' Authentication Bypass Vulnerability
12352| [82193] User Manager CVE-2006-6595 SQL-Injection Vulnerability
12353| [82188] WebHost Manager CVE-2006-6548 Cross-Site Scripting Vulnerability
12354| [82184] User Manager CVE-2006-6582 Cross-Site Scripting Vulnerability
12355| [82179] User Manager CVE-2006-6594 SQL-Injection Vulnerability
12356| [82167] Mobility Manager CVE-2006-6953 Denial-Of-Service Vulnerability
12357| [82166] Dmxready Secure Login Manager CVE-2006-6815 Cross-Site Scripting Vulnerability
12358| [82066] Secure Client CVE-2006-3551 Local Security Vulnerability
12359| [82040] Site Engine Manager CVE-2006-7118 SQL-Injection Vulnerability
12360| [82003] Login Manager CVE-2007-0400 Cross-Site Scripting Vulnerability
12361| [82000] Login Manager CVE-2007-0401 SQL-Injection Vulnerability
12362| [81996] Paypal Subscription Manager CVE-2007-0402 Cross-Site Scripting Vulnerability
12363| [81969] Paypal Subscription Manager CVE-2007-0403 SQL-Injection Vulnerability
12364| [81857] Tiny Event CVE-2007-1811 SQL-Injection Vulnerability
12365| [81839] Inoutmailinglistmanager CVE-2007-2004 SQL-Injection Vulnerability
12366| [81830] Ripe Website Manager CVE-2007-2207 SQL-Injection Vulnerability
12367| [81683] Qtofilemanager CVE-2006-3406 Directory Traversal Vulnerability
12368| [81633] Article Manager Pro CVE-2007-4082 Cross-Site Scripting Vulnerability
12369| [81602] Call Manager CVE-2007-4634 SQL-Injection Vulnerability
12370| [81599] Ripe Website Manager CVE-2007-4523 Cross-Site Scripting Vulnerability
12371| [81588] Eventlist CVE-2007-4509 SQL-Injection Vulnerability
12372| [81553] Greenbone Security Manager CVE-2016-1926 Cross Site Scripting Vulnerability
12373| [81525] Tivoli Provisioning Manager Express CVE-2007-6407 Cross-Site Scripting Vulnerability
12374| [81512] Event Calendar CVE-2007-6365 Cross-Site Scripting Vulnerability
12375| [81436] IBM Tivoli Storage Manager CVE-2015-4951 Denial of Service Vulnerability
12376| [81379] Eventlog Analyzer CVE-2008-1538 Cross-Site Scripting Vulnerability
12377| [81348] Air Filemanager CVE-2008-2344 Cross-Site Scripting Vulnerability
12378| [81339] Client CVE-2008-2145 Denial-Of-Service Vulnerability
12379| [81205] Oracle Enterprise Manager CVE-2016-0455 Local Security Vulnerability
12380| [81199] Oracle Enterprise Manager CVE-2016-0476 Directory Traversal Vulnerability
12381| [81194] Oracle Enterprise Manager CVE-2016-0447 Local Security Vulnerability
12382| [81190] Oracle Enterprise Manager CVE-2016-0446 Local Security Vulnerability
12383| [81184] Oracle Enterprise Manager CVE-2016-0489 Directory Traversal Vulnerability
12384| [81179] Oracle Enterprise Manager CVE-2016-0427 Remote Security Vulnerability
12385| [81173] Oracle Enterprise Manager CVE-2016-0490 Remote Code Execution Vulnerability
12386| [81169] Oracle Enterprise Manager CVE-2016-0491 Remote Code Execution Vulnerability
12387| [81163] Oracle Enterprise Manager CVE-2016-0478 Directory Traversal Vulnerability
12388| [81158] Oracle Enterprise Manager CVE-2016-0492 Authentication Bypass Vulnerability
12389| [81153] Oracle Enterprise Manager CVE-2016-0477 Directory Traversal Vulnerability
12390| [81144] Oracle Enterprise Manager CVE-2016-0445 Local Security Vulnerability
12391| [81140] Oracle Enterprise Manager CVE-2016-0443 Remote Security Vulnerability
12392| [81134] Oracle Enterprise Manager CVE-2016-0442 Remote Security Vulnerability
12393| [81131] Oracle Enterprise Manager CVE-2016-0449 Local Security Vulnerability
12394| [81128] Oracle Enterprise Manager CVE-2015-4885 Remote Security Vulnerability
12395| [81124] Oracle Enterprise Manager CVE-2016-0487 Authentication Bypass Vulnerability
12396| [81120] Oracle Enterprise Manager CVE-2016-0411 Local Security Vulnerability
12397| [81111] Oracle Enterprise Manager CVE-2016-0415 Remote Security Vulnerability
12398| [81107] Oracle Enterprise Manager CVE-2016-0486 Directory Traversal Vulnerability
12399| [81105] Oracle Enterprise Manager CVE-2016-0485 Directory Traversal Vulnerability
12400| [81104] Oracle Enterprise Manager CVE-2016-0488 Authentication Bypass Vulnerability
12401| [81102] Oracle Enterprise Manager CVE-2016-0484 Directory Traversal Vulnerability
12402| [81100] Oracle Enterprise Manager CVE-2016-0482 Directory Traversal Vulnerability
12403| [81097] Oracle Enterprise Manager CVE-2016-0481 Directory Traversal Vulnerability
12404| [81091] Oracle Enterprise Manager CVE-2016-0444 Local Security Vulnerability
12405| [81070] Oracle Enterprise Manager CVE-2016-0480 Directory Traversal Vulnerability
12406| [81048] Absolute News Manager Xe CVE-2008-2757 SQL-Injection Vulnerability
12407| [81046] Absolute Banner Manager CVE-2008-2760 SQL-Injection Vulnerability
12408| [81038] Absolute News Manager Xe CVE-2008-2758 Cross-Site Scripting Vulnerability
12409| [81028] Absolute Poll Manager Xe CVE-2008-2767 SQL-Injection Vulnerability
12410| [81023] Absolute Banner Manager CVE-2008-2761 Cross-Site Scripting Vulnerability
12411| [81022] Galatolo Webmanager CVE-2008-2700 SQL-Injection Vulnerability
12412| [80853] Personal Information Manager CVE-2008-4426 Cross-Site Scripting Vulnerability
12413| [80814] Otmanager Cms CVE-2008-5202 Cross-Site Scripting Vulnerability
12414| [80777] Galatolo Webmanager CVE-2008-6108 Cross-Site Scripting Vulnerability
12415| [80765] Membership Manager Pro CVE-2008-6390 SQL-Injection Vulnerability
12416| [80762] Galatolo Webmanager CVE-2008-6249 SQL-Injection Vulnerability
12417| [80759] Animal Shelter Manager CVE-2008-6109 Denial-Of-Service Vulnerability
12418| [80743] Mailing List Manager CVE-2008-5979 Cross-Site Scripting Vulnerability
12419| [80644] Blog Manager CVE-2009-0339 SQL-Injection Vulnerability
12420| [80628] Member Directory Manager CVE-2009-0427 SQL-Injection Vulnerability
12421| [80620] Java System Identity Manager CVE-2009-1081 Cross-Site Scripting Vulnerability
12422| [80614] Java System Identity Manager CVE-2009-1080 Cross-Site Scripting Vulnerability
12423| [80603] Java System Identity Manager CVE-2009-1079 Cross-Site Scripting Vulnerability
12424| [80563] Taxonomy Manager CVE-2009-2083 Cross-Site Scripting Vulnerability
12425| [80550] Odyssey Access Client CVE-2009-4643 Stack Buffer Overflow Vulnerability
12426| [80528] Change Manager CVE-2003-1576 Denial Of Service Vulnerability
12427| [80526] HPE ArcSight Logger Client Certificate Upload Multiple Security Bypass Vulnerabilities
12428| [80514] Reservation Manager CVE-2009-3067 Cross-Site Scripting Vulnerability
12429| [80486] Download Manager CVE-2006-2964 Multiple File Include Vulnerabilities
12430| [80457] IBM Tivoli Identity Manager CVE-2009-3262 Cross-Site Scripting Vulnerability
12431| [80376] IBM Tivoli Federated Identity Manager CVE-2015-4959 Unspecified Cross Site Scripting Vulnerability
12432| [80367] Clan Manager Pro CVE-2006-2921 Multiple Remote File Inclusion Vulnerabilities
12433| [80339] Real Estate Manager CVE-2009-4318 Cross-Site Scripting Vulnerability
12434| [80260] Trend Micro Password Manager Remote Command Execution and Information Disclosure Vulnerabilities
12435| [80247] Tivoli Storage Manager Express CVE-2010-4604 Local Security Vulnerability
12436| [80243] Tivoli Storage Manager FastBack CVE-2010-3758 Multiple Stack Buffer Overflow Vulnerabilities
12437| [80228] Thin-Client Management Tool CVE-2010-3121 Buffer Overflow Vulnerability
12438| [80160] Mailmanager CVE-2006-2824 Remote Security Vulnerability
12439| [80144] IM Manager CVE-2011-0552 Cross-Site Scripting Vulnerability
12440| [80078] Security Access Manager for Web CVE-2014-6080 SQL-Injection Vulnerability
12441| [80071] Tivoli Endpoint Manager CVE-2014-6113 Cross-Site Scripting Vulnerability
12442| [80068] Rational Quality Manager CVE-2014-4801 Cross-Site Scripting Vulnerability
12443| [80060] Manageengine Opmanager CVE-2014-7864 SQL-Injection Vulnerability
12444| [80042] Business Process Manager CVE-2014-6173 Cross-Site Scripting Vulnerability
12445| [80014] Access Manager CVE-2014-9412 Cross-Site Scripting Vulnerability
12446| [80002] Business Process Manager CVE-2014-8913 Cross-Site Scripting Vulnerability
12447| [80001] Business Process Manager CVE-2014-8914 Cross-Site Scripting Vulnerability
12448| [79978] Netweaver Business Client For Html CVE-2014-9569 Cross-Site Scripting Vulnerability
12449| [79974] Gatequest File Manager CVE-2014-9445 Cross-Site Scripting Vulnerability
12450| [79952] Event Booking Calendar CVE-2014-10014 Cross-Site Scripting Vulnerability
12451| [79931] Event Booking Calendar CVE-2014-10015 SQL-Injection Vulnerability
12452| [79918] Clientresponse CVE-2014-100013 Cross-Site Scripting Vulnerability
12453| [79878] IBM Security Access Manager for Web and Security Access Manager OS Command Injection Vulnerability
12454| [79864] Alcatel-Lucent Home Device Manager CVE-2015-8687 Multiple XSS Vulnerabilities
12455| [79851] Google Android SyncManager CVE-2015-6645 Denial of Service Vulnerability
12456| [79845] Cisco Unified Communications Manager CVE-2015-6433 SQL Injection Vulnerability
12457| [79786] Device Manager CVE-2010-4741 Stack Buffer Overflow Vulnerability
12458| [79785] Groupwise 32-bit Client CVE-2010-4717 Multiple Stack Buffer Overflow Vulnerabilities
12459| [79783] EUR Form Client CVE-2010-4773 Remote Security Vulnerability
12460| [79782] Groupwise 32-bit Client CVE-2010-4714 Multiple Stack Buffer Overflow Vulnerabilities
12461| [79780] Groupwise 32-bit Client CVE-2010-4712 Multiple Stack Buffer Overflow Vulnerabilities
12462| [79750] Terminal Server Client CVE-2011-0901 Buffer Overflow Vulnerability
12463| [79694] IBM Business Process Manager Advanced and WebSphere Process Server Security Bypass Vulnerability
12464| [79607] Business Manager CVE-2009-0700 Security Bypass Vulnerability
12465| [79574] Java System Identity Manager CVE-2009-1078 Remote Security Vulnerability
12466| [79569] Java System Identity Manager CVE-2009-1076 Remote Security Vulnerability
12467| [79566] Java System Identity Manager CVE-2009-1077 Denial-Of-Service Vulnerability
12468| [79559] Java System Identity Manager CVE-2009-1084 Remote Security Vulnerability
12469| [79552] Java System Identity Manager CVE-2009-1083 Remote Security Vulnerability
12470| [79550] Java System Identity Manager CVE-2009-1075 Remote Security Vulnerability
12471| [79549] Java System Identity Manager CVE-2009-1082 Remote Security Vulnerability
12472| [79545] IBM Tivoli Storage FlashCopy Manager and Tivoli Storage Manager Privilege Escalation Vulnerability
12473| [79541] IBM Tivoli Storage FlashCopy Manager and Tivoli Storage Manager Privilege Escalation Vulnerability
12474| [79476] Registration Manager CVE-2009-1821 Information Disclosure Vulnerability
12475| [79312] Tivoli Storage Manager Express CVE-2009-3855 Remote Security Vulnerability
12476| [79275] Cisco Unified Communications Manager CVE-2015-6425 Denial of Service Vulnerability
12477| [79273] OpenView Network Node Manager CVE-2009-3977 Denial-Of-Service Vulnerability
12478| [79264] Operations Manager CVE-2009-4189 File-Upload Vulnerability
12479| [79254] TYPO3 Extension Manager Cross Site Scripting Vulnerability
12480| [79196] Cisco Unified Communications Manager Cross-Site Scripting Filter Security Bypass Vulnerability
12481| [79133] Mail Manager Pro CVE-2009-4827 Cross-Site Request Forgery Vulnerability
12482| [79131] Ad Manager Pro CVE-2009-4828 Cross-Site Request Forgery Vulnerability
12483| [79099] Tivoli Federated Identity Manager CVE-2009-5085 Security Bypass Vulnerability
12484| [79097] Tivoli Federated Identity Manager CVE-2009-5084 Information Disclosure Vulnerability
12485| [79082] Tivoli Federated Identity Manager CVE-2009-5083 Security Bypass Vulnerability
12486| [79057] Host Data Loss Prevention CVE-2009-5117 Information Disclosure Vulnerability
12487| [79034] Cisco Unified Email and Unified Web Interaction Manager Cross Site Scripting Vulnerability
12488| [79032] Cisco Unified Communications Domain Manager CVE-2015-6422 Denial of Service Vulnerability
12489| [78897] FileNet Content Manager CVE-2010-2896 Security Bypass Vulnerability
12490| [78896] Jp1 Serverconductor Deployment Manager CVE-2010-2625 Denial-Of-Service Vulnerability
12491| [78871] Cisco Videoscape Distribution Suite Service Manager CVE-2015-6417 Unauthorized Access Vulnerability
12492| [78854] 3D-Ftp Client CVE-2010-3102 Directory Traversal Vulnerability
12493| [78853] Ftp Client CVE-2010-3096 Directory Traversal Vulnerability
12494| [78852] ICA Client for Linux CVE-2010-2990 Remote Security Vulnerability
12495| [78844] Auto Ftp Manager CVE-2010-3104 Directory Traversal Vulnerability
12496| [78840] Thin-Client Management Tool CVE-2010-3122 Remote Security Vulnerability
12497| [78831] Identity Manager CVE-2010-3264 Information Disclosure Vulnerability
12498| [78803] Symantec Endpoint Encryption Client CVE-2015-6556 Information Disclosure Vulnerability
12499| [78799] Tivoli Storage Manager FastBack CVE-2010-3754 Remote Security Vulnerability
12500| [78791] Tivoli Storage Manager FastBack CVE-2010-3760 Denial-Of-Service Vulnerability
12501| [78789] Tivoli Storage Manager FastBack CVE-2010-3757 Remote Security Vulnerability
12502| [78787] Tivoli Storage Manager FastBack CVE-2010-3759 Remote Security Vulnerability
12503| [78784] Tivoli Storage Manager FastBack CVE-2010-3756 Denial-Of-Service Vulnerability
12504| [78783] Tivoli Storage Manager FastBack CVE-2010-3755 Denial-Of-Service Vulnerability
12505| [78781] Tivoli Storage Manager FastBack CVE-2010-3761 Remote Security Vulnerability
12506| [78741] Cisco Unified Communications Manager CVE-2015-6410 Security Bypass Vulnerability
12507| [78608] Data Protector Manager CVE-2011-0514 Denial-Of-Service Vulnerability
12508| [78594] Unified Communications Manager CVE-2011-0941 Denial-Of-Service Vulnerability
12509| [78466] Virtualization Manager CVE-2011-2163 Remote Security Vulnerability
12510| [78432] VPN Client for Windows CVE-2011-2678 Local Security Vulnerability
12511| [78396] Intrusion Prevention System CVE-2011-4022 Denial-Of-Service Vulnerability
12512| [78392] Unified Communications Manager CVE-2011-4019 Denial-Of-Service Vulnerability
12513| [78349] Safeguard Easy Device Encryption Client CVE-2011-5117 Local Security Vulnerability
12514| [78337] Subscription Manager CVE-2011-5136 Remote Security Vulnerability
12515| [78278] Tivoli Event Pump CVE-2012-0742 Information Disclosure Vulnerability
12516| [78270] Unified Communications Manager CVE-2012-0376 Denial-Of-Service Vulnerability
12517| [78246] Tivoli Endpoint Manager CVE-2012-1837 Information Disclosure Vulnerability
12518| [78188] AnyConnect Secure Mobility Client CVE-2012-3088 Remote Security Vulnerability
12519| [78187] Cloudera Manager CVE-2012-2230 Remote Security Vulnerability
12520| [78184] AnyConnect Secure Mobility Client CVE-2012-3094 Information Disclosure Vulnerability
12521| [78129] Intrusion Prevention System CVE-2012-3901 Denial-Of-Service Vulnerability
12522| [78124] Enterprise Mobility Manager CVE-2012-4592 Remote Security Vulnerability
12523| [78118] Intrustion Prevention software CVE-2012-3899 Denial-Of-Service Vulnerability
12524| [78079] 3Ware Disk Manager CVE-2013-0705 Directory Traversal Vulnerability
12525| [78019] Tivoli Composite Application Manager for Transactions CVE-2014-3051 Remote Security Vulnerability
12526| [78017] Tivoli Endpoint Manager CVE-2014-3066 Remote Security Vulnerability
12527| [78008] Flex System Manager CVE-2014-0897 Remote Security Vulnerability
12528| [77973] Business Process Manager CVE-2014-4844 Security Bypass Vulnerability
12529| [77956] Juniper Installer Service Client CVE-2014-3811 Local Security Vulnerability
12530| [77950] Security Access Manager for Web CVE-2014-6087 Information Disclosure Vulnerability
12531| [77947] Security Access Manager for Web CVE-2014-6089 Denial-Of-Service Vulnerability
12532| [77944] Security Access Manager for Web CVE-2014-6088 Information Disclosure Vulnerability
12533| [77942] Tivoli Service Request Manager CVE-2014-6102 Security Bypass Vulnerability
12534| [77938] Business Process Manager CVE-2014-6182 Directory Traversal Vulnerability
12535| [77934] Business Process Manager CVE-2014-6176 Information Disclosure Vulnerability
12536| [77933] Security Access Manager for Web CVE-2014-6083 Remote Security Vulnerability
12537| [77930] Security Access Manager for Web CVE-2014-6078 Remote Security Vulnerability
12538| [77927] Security Access Manager for Web CVE-2014-6084 Information Disclosure Vulnerability
12539| [77925] Business Process Manager CVE-2014-6139 Security Bypass Vulnerability
12540| [77924] Tivoli Service Request Manager CVE-2014-6194 Directory Traversal Vulnerability
12541| [77922] Security Access Manager for Web CVE-2014-6086 Information Disclosure Vulnerability
12542| [77920] Security Access Manager for Web CVE-2014-6082 Denial-Of-Service Vulnerability
12543| [77917] Security Access Manager for Web CVE-2014-6076 Remote Security Vulnerability
12544| [77866] Car Site Manager CVE-2006-6012 Cross-Site Scripting Vulnerability
12545| [77781] Cloudera Manager CVE-2014-8733 Local Security Vulnerability
12546| [77752] ONOS 'packet/impl/PacketManager.java' Remote Denial of Service Vulnerability
12547| [77702] IBM Tivoli Storage Manager for Virtual Environments CVE-2015-7426 Privilege Escalation Vulnerability
12548| [77623] GNOME Display Manager CVE-2015-7496 Local Denial of Service Vulnerability
12549| [77587] pWebManager CVE-2015-7774 OS Command Injection Vulnerability
12550| [77585] Symantec Endpoint Protection Clients CVE-2015-8113 Incomplete Fix Binary Planting Vulnerability
12551| [77579] Cisco Videoscape Distribution Suite Service Manager Information Disclosure Vulnerability
12552| [77558] IBM Installation Manager '/tmp' Local Command Injection Vulnerability
12553| [77529] SSSD 'sss_client/sssd_pac.c' Denial of Service Vulnerability
12554| [77518] SQLiteManager 'main.php' Multiple Cross Site Scripting Vulnerabilities
12555| [77495] Symantec Endpoint Protection Manager CVE-2015-6555 Remote Code Execution Vulnerability
12556| [77494] Symantec Endpoint Protection Manager CVE-2015-6554 Command Execution Vulnerability
12557| [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
12558| [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
12559| [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
12560| [77406] Alcatel-Lucent Home Device Manager CVE-2015-6498 Spoofing Vulnerability
12561| [77371] Tivoli Storage Manager Reporting and Monitoring Multiple Insecure File Permissions Vulnerabilities
12562| [77341] Cisco Unified Communications Domain Manager URI Enumeration Information Disclosure Vulnerability
12563| [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
12564| [77318] IBM Security Access Manager for Web CVE-2015-4963 Information Disclosure Vulnerability
12565| [77303] HP Asset Manager CVE-2015-5448 Unspecified Local Information Disclosure Vulnerability
12566| [77188] Oracle Integrated Lights Out Manager(ILOM) CVE-2015-4821 Remote Security Vulnerability
12567| [77182] Oracle Integrated Lights Out Manager(ILOM) CVE-2015-4915 Remote Security Vulnerability
12568| [77173] Oracle Enterprise Manager CVE-2015-2633 Remote Security Vulnerability
12569| [77166] Oracle Enterprise Manager CVE-2015-4874 Local Security Vulnerability
12570| [77157] Oracle Enterprise Manager CVE-2015-4875 Remote Security Vulnerability
12571| [77155] Oracle Enterprise Manager CVE-2015-4859 Remote Security Vulnerability
12572| [77110] Apache HttpComponents HttpClient CVE-2015-5262 Denial of Service Vulnerability
12573| [77055] Cisco AnyConnect Secure Mobility Client CVE-2015-6322 Local Privilege Escalation Vulnerability
12574| [77047] ManageEngine OpManager 'PGSQL:SubmitQuery.do' SQL Injection Vulnerability
12575| [77045] ManageEngine OpManager CVE-2015-7765 Hardcoded Password Information Disclosure Vulnerability
12576| [77028] IBM Endpoint Manager for SCM SCA CVE-2015-4929 Information Disclosure Vulnerability
12577| [77013] SolarWinds Storage Manager 'ProcessFileUpload.jsp' Arbitrary File Upload Vulnerability
12578| [76978] ownCloud Desktop Client Incomplete Fix Certificate Validation Security Bypass Vulnerability
12579| [76957] IBM Business Process Manager CVE-2015-4955 Unspecified Cross Site Scripting Vulnerability
12580| [76947] IBM Tivoli Storage Manager for Virtual Environments Unspecified Cross Site Scripting Vulnerability
12581| [76944] Cisco Unified Communications Manager IM and Presence Service Denial of Service Vulnerability
12582| [76935] Moxa OnCell Central Manager Remote Code Execution Vulnerability
12583| [76934] Moxa OnCell Central Manager 'MessageBrokerServlet' Servlet Authentication Bypass Vulnerability
12584| [76879] GNOME NetworkManager 'nm-lndp-rdisc.c' Denial of Service Vulnerability
12585| [76866] Zoho ManageEngine EventLog Analyzer 'runQuery.do' SQL Injection Vulnerability
12586| [76850] Fortinet FortiManager Cross Site Scripting and HTML Injection Vulnerabilities
12587| [76847] Fortinet FortiManager Multiple Cross Site Scripting Vulnerabilities
12588| [76827] Cisco AnyConnect Secure Mobility Client CVE-2015-6306 Local Privilege Escalation Vulnerability
12589| [76822] Data Manager CVE-2015-6470 Remote Privilege Escalation Vulnerability
12590| [76817] Cisco AnyConnect Secure Mobility Client CVE-2015-6305 Local Privilege Escalation Vulnerability
12591| [76814] GNOME NetworkManager 'ipv6/addrconf.c' Denial of Service Vulnerability
12592| [76551] SIS XGI VGA Display Manager CVE-2015-5466 Remote Privilege Escalation Vulnerability
12593| [76550] SIS Windows VGA Display Manager CVE-2015-5465 Multiple Memory Corruption Vulnerabilities
12594| [76542] FortiClient CVE-2015-5736 Local Privilege Escalation Vulnerability
12595| [76541] Fortinet FortiClient CVE-2015-4077 Multiple Local Information Disclosure Vulnerabilities
12596| [76540] FortiClient CVE-2015-5737 Multiple Local Information Disclosure Vulnerabilities
12597| [76539] Fortinet FortiClient CVE-2015-5735 Multiple Local Security Bypass Vulnerabilities
12598| [76503] WordPress Job Manager Plugin CVE-2015-2321 HTML Injection Vulnerability
12599| [76468] Ubuntu NetKit FTP Client Local Denial of Service Vulnerability
12600| [76406] Cisco Unified Web and E-Mail Interaction Manager CVE-2015-6255 Cross Site Scripting Vulnerability
12601| [76360] HP Operations Manager i CVE-2015-2137 Unspecified Remote Code Execution Vulnerability
12602| [76348] Cisco Unified Web and E-Mail Interaction Manager CVE-2015-4298 Authorization Bypass Vulnerability
12603| [76258] Microsoft System Center Operations Manager CVE-2015-2420 Cross Site Scripting Vulnerability
12604| [76227] Microsoft Windows Object Manager CVE-2015-2428 Local Privilege Escalation Vulnerability
12605| [76222] Microsoft Windows Mount Manager CVE-2015-1769 Local Privilege Escalation Vulnerability
12606| [76126] Cisco Unified Communications Manager IM and Presence Service Cross Site Scripting Vulnerability
12607| [76125] Cisco AnyConnect Secure Mobility Client CVE-2015-4289 Directory Traversal Vulnerability
12608| [76123] Cisco Unified Communications Manager CVE-2015-4295 Information Disclosure Vulnerability
12609| [76121] IBM Business Process Manager CVE-2015-1904 Security Bypass Vulnerablity
12610| [76111] IBM Tivoli Storage Manager FastBack CVE-2015-4933 Stack Buffer Overflow Vulnerability
12611| [76110] IBM Tivoli Storage Manager FastBack CVE-2015-4935 Stack Based Buffer Overflow Vulnerability
12612| [76109] IBM Tivoli Storage Manager FastBack CVE-2015-4934 Stack Buffer Overflow Vulnerability
12613| [76107] IBM Tivoli Storage Manager FastBack CVE-2015-4931 Stack Buffer Overflow Vulnerability
12614| [76106] IBM Tivoli Storage Manager FastBack CVE-2015-4932 Stack Buffer Overflow Vulnerability
12615| [76094] Symantec Endpoint Protection Manager CVE-2015-1487 Arbitrary File Write Vulnerability
12616| [76085] Cisco AnyConnect Secure Mobility Client CVE-2015-4290 Local Denial of Service Vulnerability
12617| [76083] Symantec Endpoint Protection Clients CVE-2015-1492 Binary Planting Vulnerability
12618| [76081] Symantec Endpoint Protection Manager CVE-2015-1490 Directory Traversal Vulnerability
12619| [76079] Symantec Endpoint Protection Manager CVE-2015-1491 SQL Injection Vulnerability
12620| [76078] Symantec Endpoint Protection Manager CVE-2015-1489 Remote Privilege Escalation Vulnerability
12621| [76077] Symantec Endpoint Protection Manager CVE-2015-1488 Arbitrary File Read Vulnerability
12622| [76074] Symantec Endpoint Protection Manager CVE-2015-1486 Authentication Bypass Vulnerability
12623| [76049] FortiClient SSLVPN Linux Client Symlink Attack Local Privilege Escalation Vulnerability
12624| [76041] php File Manager Multiple Security Vulnerabilities
12625| [75988] WordPress Eventbrite Tickets Plugin for The Events Calendar Cross Site Scripting Vulnerability
12626| [75977] IBM Business Process Manager CVE-2015-1905 Authorization Bypass Vulnerability
12627| [75975] IBM Business Process Manager CVE-2015-1906 Cross Site Scripting Vulnerability
12628| [75966] HP Client Automation Remote Code Execution and Stack Buffer Overflow Vulnerabilities
12629| [75958] Cisco Videoscape Policy Resource Manager CVE-2015-4283 Denial of Service Vulnerability
12630| [75953] Cisco Unified Computing System Manager CVE-2015-4279 Local Arbitrary Command Injection Vulnerability
12631| [75863] Oracle Commerce Guided Search and Commerce Experience Manager CVE-2015-2653 Security Vulnerability
12632| [75858] Oracle Commerce Guided Search and Commerce Experience Manager CVE-2015-2607 Security Vulnerability
12633| [75836] Oracle Enterprise Manager for Oracle Database CVE-2015-4735 Remote Security Vulnerability
12634| [75834] Oracle Enterprise Manager for Oracle Database CVE-2015-2646 Remote Security Vulnerability
12635| [75831] Oracle Access Manager CVE-2015-4751 Remote Security Vulnerability
12636| [75829] Oracle Event Processing CVE-2015-4747 Remote Security Vulnerability
12637| [75828] Oracle Enterprise Manager for Oracle Database CVE-2015-2647 Remote Security Vulnerability
12638| [75771] Oracle Access Manager CVE-2015-2593 Remote Security Vulnerability
12639| [75761] Oracle PeopleSoft Enterprise HCM Talent Acquisition Manager Remote Security Vulnerability
12640| [75692] ManageEngine Password Manager Pro 'SQLAdvancedALSearchResult.cc' SQL Injection Vulnerability
12641| [75667] WordPress InfiniteWP Client Plugin Unspecified Security Vulnerability
12642| [75544] WordPress Simple Ads Manager Plugin Denial of Service Vulnerability
12643| [75538] IBM Case Manager CVE-2015-1979 Cross Site Scripting Vulnerability
12644| [75536] IBM Business Process Manager CVE-2015-1961 Remote Code Execution Vulnerability
12645| [75529] Cisco Digital Content Manager Software CVE-2015-4228 Denial of Service Vulnerability
12646| [75515] SolarWinds Storage Manager Remote Code Execution Vulnerability
12647| [75514] Cisco Unified Communications Domain Manager CVE-2015-4196 Privilege Escalation Vulnerability
12648| [75507] Explorer+ File Manager CVE-2015-2966 Directory Traversal Vulnerability
12649| [75473] Cisco Unified Communications Domain Manager CVE-2015-4229 Information Disclosure Vulnerability
12650| [75461] IBM Tivoli Storage Manager FastBack CVE-2015-1986 Remote Command Injection Vulnerability
12651| [75459] IBM Tivoli Storage Manager FastBack CVE-2015-1949 Remote Command Injection Vulnerability
12652| [75458] IBM Tivoli Storage Manager FastBack CVE-2015-1965 Stack Buffer Overflow Vulnerability
12653| [75457] IBM Tivoli Storage Manager FastBack CVE-2015-1964 Stack Buffer Overflow Vulnerability
12654| [75456] IBM Tivoli Storage Manager FastBack CVE-2015-1953 Stack Buffer Overflow Vulnerability
12655| [75455] IBM Tivoli Storage Manager FastBack CVE-2015-1963 Stack Buffer Overflow Vulnerability
12656| [75454] IBM Tivoli Storage Manager FastBack CVE-2015-1962 Stack Buffer Overflow Vulnerability
12657| [75453] IBM Tivoli Storage Manager FastBack CVE-2015-1948 Stack Buffer Overflow Vulnerability
12658| [75452] IBM Tivoli Storage Manager FastBack CVE-2015-1930 Stack Buffer Overflow Vulnerability
12659| [75451] IBM Tivoli Storage Manager FastBack CVE-2015-1929 Stack Buffer Overflow Vulnerability
12660| [75450] IBM Tivoli Storage Manager FastBack CVE-2015-1942 Arbitrary File Access Vulnerability
12661| [75449] IBM Tivoli Storage Manager FastBack CVE-2015-1925 Stack Buffer Overflow Vulnerability
12662| [75448] IBM Tivoli Storage Manager FastBack CVE-2015-1954 Stack Buffer Overflow Vulnerability
12663| [75447] IBM Tivoli Storage Manager FastBack CVE-2015-1924 Stack Buffer Overflow Vulnerability
12664| [75446] IBM Tivoli Storage Manager FastBack CVE-2015-1941 Arbitrary File Read Vulnerability
12665| [75445] IBM Tivoli Storage Manager FastBack CVE-2015-1923 Buffer Overflow Vulnerability
12666| [75444] IBM Tivoli Storage Manager FastBack CVE-2015-1938 Remote Command Injection Vulnerability
12667| [75432] Polycom RealPresence Resource Manager Multiple Security vulnerabilities
12668| [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
12669| [75401] Cisco Unified Communications Manager IM and Presence Service Privilege Escalation Vulnerability
12670| [75400] Cisco Unified Communications Manager IM and Presence Service SQL Injection Vulnerability
12671| [75373] Cisco AnyConnect Secure Mobility Client CVE-2015-4211 Local Privilege Escalation Vulnerability
12672| [75360] IBM Business Process Manager and WebSphere Lombardi Edition Directory Traversal Vulnerability
12673| [75354] ownCloud Desktop Client CVE-2015-4456 Certificate Validation Security Bypass Vulnerability
12674| [75289] Symantec Data Loss Prevention CVE-2015-1485 Cross Site Request Forgery Vulnerability
12675| [75288] Symantec Data Loss Prevention CVE-2014-9230 Multiple HTML Injection Vulnerabilities
12676| [75261] Joomla! EQ Event Calendar Component 'id' parameter SQL Injection Vulnerability
12677| [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
12678| [75225] RSA Validation Manager CVE-2015-0526 Multiple Cross Site Scripting Vulnerabilities
12679| [75218] EMC Unified Infrastructure Manager/Provisioning CVE-2015-0546 Authentication Bypass Vulnerability
12680| [75214] FileZilla FTP Client Remote Denial of Service Vulnerability
12681| [75201] Retrospect Backup Client CVE-2015-2864 Weak Password Security Vulnerability
12682| [75195] Cisco Virtualization Experience Client 6000 Series Local Arbitrary Command Execution Vulnerability
12683| [75191] TYPO3 Akronymmanager Extension 'index.php' SQL Injection Vulnerability
12684| [75142] Linux Kernel KVM 'kvm_apic_has_events()' Function Denial of Service Vulnerability
12685| [75049] Jildi FTP Client Multiple Local Buffer Overflow Vulnerabilities
12686| [74954] Cisco AnyConnect Secure Mobility Client CVE-2015-0761 Local Privilege Escalation Vulnerability
12687| [74933] strongSwan VPN Client DNS Spoofing Vulnerability
12688| [74912] IBM Business Process Manager and WebSphere Lombardi Edition Cross Site Scripting Vulnerability
12689| [74909] Aruba Networks ClearPass Policy Manager CVE-2014-6628 Remote Code Execution Vulnerability
12690| [74906] Aruba Networks ClearPass Policy Manager CVE-2015-1392 Multiple SQL Injection Vulnerabilities
12691| [74905] Aruba Networks ClearPass Policy Manager CVE-2015-1551 Directory Traversal Vulnerability
12692| [74901] Aruba Networks ClearPass Policy Manager CVE-2015-1550 Remote Code Execution Vulnerability
12693| [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
12694| [74852] Aruba Networks ClearPass Policy Manager CVE-2015-4132 Multiple Cross Site Scripting Vulnerabilities
12695| [74849] Cisco Unified Web and E-Mail Interaction Manager CVE-2015-0753 SQL Injection Vulnerability
12696| [74840] Aruba Networks ClearPass Policy Manager CVE-2015-1389 HTML Injection Vulnerability
12697| [74826] Synology Cloud Station sync client CVE-2015-2851 Local Privilege Escalation Vulnerability
12698| [74811] Synology DiskStation Manager 'entry.cgi' Cross Site Scripting Vulnerability
12699| [74785] Cisco Unified Communications Manager CVE-2015-0749 Multiple Security Vulnerabilities
12700| [74774] Emerson AMS Device Manager CVE-2015-1008 Local SQL Injection Vulnerability
12701| [74751] PgBouncer src/client.c' Denial of Service Vulnerability
12702| [74743] ManageEngine EventLog Analyzer Cross Site Request Forgery Vulnerability
12703| [74740] ManageEngine Applications Manager Multiple SQL Injection Vulnerabilities
12704| [74692] ManageEngine Applications Manager Multiple SQL Injection Vulnerabilities
12705| [74691] ManageEngine Applications Manager 'It360SPUtil' Class SQL Injection Vulnerability
12706| [74690] ManageEngine OpManager Multiple SQL Injection Vulnerabilities
12707| [74680] Cisco Security Manager CVE-2015-0727 Cross Site Scripting Vulnerability
12708| [74658] IBM Business Process Manager CVE-2015-0156 Unspecified HTML Injection Vulnerability
12709| [74656] ManageEngine OpManager 'NPMRequestHandler' Servlet SQL Injection Vulnerability
12710| [74646] FortiAnalyzer and FortiManager CVE-2015-3620 Cross Site Scripting Vulnerability
12711| [74594] libinfinity 'inf-gtk-certificate-manager.c' SSL Certificate Validation Security Bypass Vulnerability
12712| [74579] Cisco Unified Communications Manager CVE-2015-0717 Local Privilege Escalation Vulnerability
12713| [74576] ManageEngine OpManager 'UpdateProbeUpgradeStatus' Servlet SQL Injection Vulnerability
12714| [74572] Cisco Unified Web and E-Mail Interaction Manager CVE-2015-4299 Security Bypass Vulnerability
12715| [74536] ManageEngine Applications Manager 'MaintenanceTaskAPIUtil' Class SQL Injection Vulnerability
12716| [74533] ManageEngine Applications Manager 'getMGDetails()' Method SQL Injection Vulnerability
12717| [74532] ManageEngine Applications Manager 'DBUtil' Class SQL Injection Vulnerability
12718| [74529] ManageEngine Applications Manager 'getAdminMG()' Method SQL Injection Vulnerability
12719| [74492] Microsoft Windows Service Control Manager CVE-2015-1702 Remote Privilege Escalation Vulnerability
12720| [74479] F5 BIG-IP Application Security Manager Security Bypass Vulnerability
12721| [74474] Cisco Unified Communications Manager CVE-2015-0715 SQL Injection Vulnerability
12722| [74444] FortiManager Multiple Security Vulnerabilities
12723| [74415] RubyGems rest-client CVE-2015-3448 Local Information Disclosure Vulnerability
12724| [74409] Ubuntu 'network-manager' Package CVE-2015-1322 Local Directory Traversal Vulnerability
12725| [74405] ManageEngine OpManager 'multipartRequest' Servlet Remote Denial of Service Vulnerability
12726| [74402] ManageEngine Applications Manager CVE-2014-7863 Information Disclosure Vulnerability
12727| [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
12728| [74396] Red Hat Virtual Desktop Server Manager (VDSM) CVE-2015-0237 Denial of Service Vulnerability
12729| [74234] WordPress Community Events Plugin CVE-2015-3313 Multiple SQL Injection Vulnerabilities
12730| [74218] IBM WebSphere Portal and Web Content Manager CVE-2015-1908 Cross Site Scripting Vulnerability
12731| [74211] Google Android adb backup 'server/BackupManagerService.java' Directory Traversal Vulnerability
12732| [74209] Wolf CMS 'FileManagerController.php' Arbitrary File Upload Vulnerability
12733| [74205] HotspotExpress HotExBilling Manager CVE-2015-3319 Information Disclosure Vulnerability
12734| [74199] Lenovo ThinkServer System Manager CVE-2015-3324 Certificate Validation Security Bypass Vulnerability
12735| [74197] Lenovo ThinkServer System Manager CVE-2015-3323 Denial of Service Vulnerability
12736| [74193] IBM Endpoint Manager for Remote Control CVE-2015-1915 Information Disclosure Vulnerability
12737| [74108] Oracle Commerce Guided Search/Commerce Experience Manager Remote Security Vulnerability
12738| [74100] Oracle Access Manager CVE-2015-0461 Remote Security Vulnerability
12739| [74077] Oracle Enterprise Manager Base Platform CVE-2015-0473 Remote Security Vulnerability
12740| [74036] IBM Tivoli Storage Manager FastBack CVE-2015-1898 Stack Buffer Overflow Vulnerability
12741| [74024] IBM Tivoli Storage Manager FastBack CVE-2015-1896 Stack Based Buffer Overflow Vulnerability
12742| [74021] IBM Tivoli Storage Manager FastBack CVE-2015-0120 Buffer Overflow Vulnerability
12743| [73941] HotspotExpress HotExBilling Manager 'hotspotlogin.cgi' Cross Site Scripting Vulnerability
12744| [73934] Ericsson Drutt MSDP 'jsp/start-3pi-manager.jsp' Open Redirection Vulnerability
12745| [73924] WordPress Simple Ads Manager Plugin Multiple Security Vulnerabilities
12746| [73917] IBM Tivoli Storage Manager FastBack CVE-2015-0119 Remote Code Execution Vulnerability
12747| [73907] ManageEngine OpManager CVE-2014-6036 Arbitrary File Upload Vulnerability
12748| [73826] Conferencemanager CVE-2011-3688 SQL-Injection Vulnerability
12749| [73821] Eventlog Analyzer CVE-2010-4841 Cross-Site Scripting Vulnerability
12750| [73817] Conferencemanager CVE-2011-3687 Cross-Site Scripting Vulnerability
12751| [73713] Mjseventpro CVE-2010-0340 SQL-Injection Vulnerability
12752| [73698] WordPress Simple Ads Manager Plugin 'sam-ajax.php' Multiple SQL Injection Vulnerabilities
12753| [73671] Groupwise 32-bit Client CVE-2010-2778 Cross-Site Scripting Vulnerability
12754| [73610] Conferencemanager CVE-2011-3686 Cross-Site Scripting Vulnerability
12755| [73479] Cisco Data Center Network Manager CVE-2015-0666 Directory Traversal Vulnerability
12756| [73449] Cisco Unified Communications Manager CVE-2015-0682 Remote Code Execution Vulnerability
12757| [73446] Cisco Unified Communications Domain Manager CVE-2015-0683 Information Disclosure Vulnerability
12758| [73444] Cisco Unified Communications Domain Manager CVE-2015-0684 SQL Injection Vulnerability
12759| [73422] McAfee Data Loss Prevention Endpoint CVE-2015-1616 Unspecified SQL Injection Vulnerability
12760| [73421] McAfee Data Loss Prevention Endpoint CVE-2015-1618 Security Bypass Vulnerability
12761| [73420] McAfee Email Gateway Secure Web Mail Client Cross Site Scripting Vulnerability
12762| [73419] McAfee Data Loss Prevention Endpoint CVE-2015-1617 Unspecified Cross Site Scripting Vulnerability
12763| [73403] McAfee Data Loss Prevention Endpoint Multiple Cross Site Request Forgery Vulnerabilities
12764| [73402] IBM Tivoli Netcool Service Quality Manager CVE-2015-0159 Unspecified Security Weakness
12765| [73399] McAfee Data Loss Prevention Endpoint 'ePO' Extension Remote Denial of Service Vulnerability
12766| [73397] McAfee Data Loss Prevention Endpoint CVE-2015-2758 Security Bypass Vulnerability
12767| [73393] Cisco Unified Communications Manager CVE-2015-0680 Information Disclosure Vulnerability
12768| [73385] PHP 'SoapClient' Object Multiple Information Disclosure Vulnerabilities
12769| [73361] Fortinet FortiClient CVE-2015-1570 SSL Certificate Validation Security Bypass Vulnerability
12770| [73357] PHP 'SoapClient's __call()' Function Type Confusion Remote Code Execution Vulnerability
12771| [73349] Google Chrome 'MidiManagerUsb::DispatchSendMidiData()' Function Remote Code Execution Vulnerability
12772| [73327] ManageEngine Network Configuration Manager Multiple Security Vulnerabilities
12773| [73295] RubyGems rest-client CVE-2015-1820 Session Fixation Vulnerability
12774| [73290] IBM Security Identity Manager Active Directory Adapter Local Information Disclosure Vulnerability
12775| [73276] IBM Business Process Manager CVE-2015-0105 Multiple Cross Site Scripting Vulnerabilities
12776| [73275] IBM Business Process Manager and WebSphere Lombardi Edition Cross Site Scripting Vulnerability
12777| [73272] IBM Business Process Manager CVE-2015-0103 Multiple HTML Injection Vulnerabilities
12778| [73266] IBM Business Process Manager CVE-2015-0158 Cross Site Scripting Vulnerability
12779| [73222] WebGate eDVR Manager CVE-2015-2095 ActiveX Control Remote Heap Buffer Overflow Vulnerability
12780| [73193] McAfee Data Loss Prevention Endpoint CVE-2015-2760 Unspecified Cross Site Scripting Vulnerability
12781| [73167] IBM Security Identity Manager CVE-2014-6106 Cross Site Request Forgery Vulnerability
12782| [73138] Google Android 'AudioPolicyManagerBase.cpp' Denial of Service Vulnerability
12783| [73123] Cisco AnyConnect Secure Mobility Client CVE-2015-0662 Local Arbitrary Code Execution Vulnerability
12784| [73122] Cisco AnyConnect Secure Mobility Client Arbitrary File Write Vulnerability
12785| [73120] Cisco AnyConnect Secure Mobility Client CVE-2015-0664 Arbitrary Code Execution Vulnerability
12786| [73104] IBM Rational Quality Manager CVE-2015-0128 Unspecified Cross Site Scripting Vulnerability
12787| [73103] IBM Rational Quality Manager CVE-2015-0124 Unspecified Cross Site Scripting Vulnerabilityy
12788| [73097] IBM Rational Quality Manager CVE-2015-0129 Unspecified Cross Site Scripting Vulnerability
12789| [73073] HP ArcSight Enterprise Security Manager Unspecified Multiple Remote Security Vulnerabilities
12790| [73056] ManageEngine ADManager Plus CVE-2015-1026 Multiple Cross Site Scripting Vulnerabilities
12791| [73055] ZOHO ManageEngine ADManager Plus CVE-2015-1026 Multiple Cross Site Scripting Vulnerabilities
12792| [73042] Cisco Intrusion Prevention System CVE-2015-0654 Denial of Service Vulnerability
12793| [72989] IBM Rational Quality Manager CVE-2014-6144 Unspecified Cross Site Scripting Vulnerability
12794| [72920] IBM Business Process Manager CVE-2015-0101 Unspecified Cross Site Scripting Vulnerability
12795| [72870] IBM InfoSphere Optim Performance Manager CVE-2014-6154 Unspecified Directory Traversal Vulnerability
12796| [72860] IBM Tivoli Storage Manager for Mail Multiple Local Authentication Bypass Vulnerabilities
12797| [72849] WebGate eDVR Manager CVE-2015-2096 ActiveX Control Remote Code Execution Vulnerability
12798| [72838] WebGate eDVR Manager ActiveX Controls CVE-2015-2098 Multiple Buffer Overflow Vulnerabilities
12799| [72835] WebGate eDVR Manager CVE-2015-2097 Multiple Stack Buffer Overflow Vulnerabilities
12800| [72824] Cisco Unified Web Interaction Manager CVE-2015-0655 Cross Site Scripting Vulnerability
12801| [72796] Cisco Application Networking Manager CVE-2015-0651 Cross Site Request Forgery Vulnerability
12802| [72786] osTicket 'client.inc.php' Cross Site Scripting Vulnerability
12803| [72781] EventSentry 'pageId' Parameter Cross Site Scripting Vulnerability
12804| [72771] IBM Tivoli Storage Manager CVE-2014-4818 Local Information Disclosure Vulnerability
12805| [72700] Cisco Intrusion Prevention System CVE-2015-0631 Denial of Service Vulnerability
12806| [72697] Dell Asset Manager CVE-2015-1605 Multiple SQL Injection Vulnerabilities
12807| [72679] IBM Flex System Manager CVE-2014-6147 Local Information Disclosure Vulnerability
12808| [72612] Persistent Systems Radia Client Automation CVE-2015-1497 Remote Code Execution Vulnerability
12809| [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
12810| [72559] IBM Tivoli Endpoint Manager CVE-2014-6137 HTML Injection Vulnerability
12811| [72554] Cisco Prime Security Manager CVE-2014-3365 Cross Site Scripting Vulnerability
12812| [72473] Microsoft Virtual Machine Manager CVE-2015-0012 Local Privilege Escalation Vulnerability
12813| [72406] Cybozu Remote Service Manager CVE-2014-7266 Incomplete Fix Denial of Service Vulnerability
12814| [72395] McAfee Data Loss Prevention Endpoint CVE-2015-1305 Local Privilege Escalation Vulnerability
12815| [72377] Fortinet FortiClient Multiple Security Vulnerabilities
12816| [72376] Cisco Meraki Systems Manager Cross Site Request Forgery and HTML Injection Vulnerabilities
12817| [72265] iPass Open Mobile Windows Client CVE-2015-0925 Remote Code Execution Vulnerability
12818| [72263] Cisco Unified Communications Manager CVE-2014-8008 File Disclosure Vulnerability
12819| [72260] Attachmate Reflection FTP Client Stack Buffer Overflow Vulnerability
12820| [72238] Oracle Enterprise Manager Ops Center CVE-2014-6573 Remote Security Vulnerability
12821| [72235] Oracle Enterprise Manager Base Platform CVE-2015-0426 Remote Security Vulnerability
12822| [72226] Oracle Access Manager CVE-2015-0434 Remote Security Vulnerability
12823| [72181] Oracle Integrated Lights Out Manager(ILOM) CVE-2015-0424 Remote Security Vulnerability
12824| [72179] Oracle Access Manager CVE-2015-0367 Remote Security Vulnerability
12825| [72177] Oracle Integrated Lights Out Manager (ILOM) CVE-2014-6584 Remote Security Vulnerability
12826| [72152] Oracle Adaptive Access Manager CVE-2014-6576 Remote Security Vulnerability
12827| [72084] Cisco Unified Communications Domain Manager CVE-2015-0591 Remote Denial of Service Vulnerability
12828| [72082] Cisco Unified Communications Domain Manager CVE-2015-0588 Cross Site Request Forgery Vulnerability
12829| [72068] Clorius Controls A/S Java Web Client CVE-2014-9199 Information Disclosure Vulnerability
12830| [72059] Cisco AnyConnect Secure Mobility Client CVE-2014-3314 Security Vulnerability
12831| [72014] F5 Networks BIG-IP Application Security Manager (ASM) HTML Injection Vulnerability
12832| [71977] e107 '/e107_admin/filemanager.php' Cross Site Scripting Vulnerability
12833| [71975] Cisco Unified Communications Domain Manager CVE-2014-8020 Remote Denial of Service Vulnerability
12834| [71971] Libevent CVE-2014-6272 Multiple Heap Based Buffer Overflow Vulnerabilities
12835| [71934] OpenSSL 'ssl23_get_client_hello()' Function NULL Pointer Dereference Denial of Service Vulnerability
12836| [71896] CGManager CVE-2014-1425 Local Information Disclosure Vulnerability
12837| [71826] NetIQ Access Manager CVE-2014-5214 XML External Entity Injection Vulnerability
12838| [71813] EMC Replication Manager and AppSync CVE-2014-4634 Local Privilege Escalation Vulnerability
12839| [71771] Cisco Unified Communications Domain Manager CVE-2014-8018 Cross Site Scripting Vulnerabilities
12840| [71755] NetIQ Access Manager CVE-2014-5217 Cross Site Request Forgery Vulnerability
12841| [71754] NetIQ Access Manager CVE-2014-5215 Multiple Information Disclosure Vulnerabilities
12842| [71745] NetIQ Access Manager CVE-2014-5216 Cross Site Scripting and HTML Injection Vulnerabilities
12843| [71669] Cisco Prime Security Manager CVE-2014-3364 Multiple Cross Site Scripting Vulnerabilities
12844| [71664] RSA Authentication Manager CVE-2014-2516 Unspecified URI Redirection Vulnerability
12845| [71643] ManageEngine Password Manager Pro CVE-2014-9372 Directory Traversal Vulnerability
12846| [71613] HP Smart Update Manager CVE-2014-2608 Unspecified Local Information Disclosure Vulnerability
12847| [71563] Cisco Unified Communications Domain Manager CVE-2014-8010 Command Injection Vulnerability
12848| [71547] IBM Operational Decision Manager CVE-2014-6114 XML External Entity Injection Vulnerability
12849| [71507] IBM Tivoli Endpoint Manager Mobile Device Management Arbitrary Code Execution Vulnerability
12850| [71490] WordPress Download Manager Plugin Remote Code Execution and Remote File Include Vulnerabilities
12851| [71432] Cisco Unified Communications Manager CVE-2015-0699 SQL Injection Vulnerability
12852| [71424] IBM Tivoli Endpoint Manager Mobile Device Management Cross Site Scripting Vulnerability
12853| [71418] WordPress CM Download Manager Plugin Cross Site Request Forgery Vulnerability
12854| [71360] OpenVAS Manager 'timezone' Parameter SQL Injection Vulnerability
12855| [71357] Aruba Networks ClearPass Policy Manager CVE-2014-8367 Unspecified SQL Injection Vulnerability
12856| [71345] IBM Qradar Risk Manager CVE-2014-6075 Information Disclosure Vulnerability
12857| [71320] WordPress Ad Manager Plugin 'track-click.php' Open Redirection Vulnerability
12858| [71319] Springshare LibCal 'api_events.php' Multiple Cross Site Scripting Vulnerabilities
12859| [71310] Android WAPPushManager Module SQL Injection Vulnerability
12860| [71291] clientResponse Responsive PHP Client Management Multiple HTML Injection Vulnerabilities
12861| [71274] Serenity Client Management Portal Arbitrary File Upload and Multiple HTML Injection Vulnerabilities
12862| [71204] WordPress CM Download Manager Plugin CVE-2014-8877 Remote PHP Code Execution Vulnerability
12863| [71173] Cisco Unified Communications Manager IM and Presence Service Information Disclosure Vulnerability
12864| [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
12865| [71118] IBM Security Identity Manager CVE-2014-6098 Information Disclosure Vulnerability
12866| [71116] IBM Security Identity Manager CVE-2014-6105 Clickjacking Vulnerability
12867| [71115] IBM Security Identity Manager CVE-2014-6095 Unspecified Directory Traversal Vulnerability
12868| [71114] IBM Security Identity Manager CVE-2014-6110 Local Security Bypass Vulnerability
12869| [71113] IBM Security Identity Manager CVE-2014-6096 Unspecified Cross Site Scripting Vulnerability
12870| [71112] IBM Security Identity Manager CVE-2014-6107 Man in the Middle Information Disclosure Vulnerability
12871| [71109] Tivoli Storage Manager Server CVE-2014-4817 Local Unauthorized Access Vulnerability
12872| [71086] Joomla! Eventbooking Component 'index.php' Cross-Site Scripting Vulnerability
12873| [71018] ManageEngine Password Manager Pro 'SEARCH_ALL' Parameter Multiple SQL Injection Vulnerabilities
12874| [71016] ManageEngine Password Manager Pro 'BulkEditSearchResult.cc' SQL Injection Vulnerability
12875| [71013] Cisco Unified Communications Manager TLS Certificate Validation Security Bypass Vulnerability
12876| [70974] Qt Creator SSH Client Man in the Middle Security Bypass Vulnerability
12877| [70960] ManageEngine EventLog Analyzer CVE-2014-6039 Password Disclosure Vulnerability
12878| [70959] ManageEngine EventLog Analyzer CVE-2014-6038 Information Disclosure Vulnerability
12879| [70890] FortiManager and FortiAnalyzer CVE-2014-2335 Multiple Cross Site Scripting Vulnerabilities
12880| [70889] FortiManager and FortiAnalyzer CVE-2014-2336 Multiple Cross Site Scripting Vulnerabilities
12881| [70887] FortiManager and FortiAnalyzer CVE-2014-2334 Multiple Cross Site Scripting Vulnerabilities
12882| [70855] Cisco Unified Communications Manager CVE-2014-3366 SQL Injection Vulnerability
12883| [70850] Cisco Unified Communications Manager CVE-2014-3375 Multiple Cross Site Scripting Vulnerabilities
12884| [70849] Cisco Unified Communications Manager Admin Interface Multiple Cross Site Scripting Vulnerabilities
12885| [70848] Cisco Unified Communications Manager CVE-2014-3373 Multiple Cross Site Scripting Vulnerabilities
12886| [70846] Cisco Unified Communications Manager Reports Interface Multiple Cross Site Scripting Vulnerabilities
12887| [70845] Symantec Endpoint Protection Manager CVE-2014-3439 Arbitrary File Write Vulnerability
12888| [70844] Symantec Endpoint Protection Manager CVE-2014-3438 Multiple Cross Site Scripting Vulnerabilities
12889| [70843] Symantec Endpoint Protection Manager CVE-2014-3437 XML External Entity Injection Vulnerability
12890| [70842] Tivoli Application Dependency Discovery Manager CVE-2014-6148 Information Disclosure Vulnerability
12891| [70840] McAfee Network Data Loss Prevention CVE-2014-8536 Local Information Disclosure Vulnerability
12892| [70835] McAfee Network Data Loss Prevention CVE-2014-8537 Local Information Disclosure Vulnerability
12893| [70831] McAfee Network Data Loss Prevention CVE-2014-8531 Weak Encryption Algorithm Security Weakness
12894| [70829] McAfee Network Data Loss Prevention CVE-2014-8532 Information Disclosure Weakness
12895| [70828] McAfee Network Data Loss Prevention CVE-2014-8530 Security Vulnerability
12896| [70826] McAfee Network Data Loss Prevention CVE-2014-8524 Information Disclosure Vulnerability
12897| [70825] McAfee Network Data Loss Prevention Cross Site Request Forgery Vulnerability
12898| [70824] McAfee Network Data Loss Prevention CVE-2014-8528 Local Information Disclosure Vulnerability
12899| [70823] McAfee Network Data Loss Prevention CVE-2014-8525 Information Disclosure Weakness
12900| [70822] McAfee Network Data Loss Prevention CVE-2014-8526 Local Information Disclosure Vulnerability
12901| [70821] McAfee Network Data Loss Prevention CVE-2014-8527 Information Disclosure Vulnerability
12902| [70820] McAfee Network Data Loss Prevention CVE-2014-8521 Unspecified Cross Site Scripting Vulnerability
12903| [70817] McAfee Network Data Loss Prevention CVE-2014-8522 Local Unauthorized Access Vulnerability
12904| [70816] McAfee Network Data Loss Prevention CVE-2014-8519 Local Information Disclosure Vulnerability
12905| [70815] McAfee Network Data Loss Prevention CVE-2014-8520 Unspecified Information Disclosure Vulnerability
12906| [70814] McAfee Network Data Loss Prevention CVE-2014-8533 Arbitrary Code Execution Vulnerability
12907| [70805] IBM Tivoli Application Dependency Discovery Manager CVE-2014-6149 Directory Traversal Vulnerability
12908| [70764] WordPress Download Manager Plugin 'file_download.php' Arbitrary File Download Vulnerabilitiy
12909| [70730] IBM Tivoli Application Dependency Discovery Manager CVE-2014-6150 Cross Site Scripting Vulnerability
12910| [70718] WordPress CP Multi View Event Calendar Plugin 'calid' Parameter SQL Injection Vulnerability
12911| [70697] WordPress CBI Referral Manager Plugin 'getNetworkSites.php' HTML Injection Vulnerability
12912| [70658] ZTE ZXDSL 931VII 'manager_dev_config_t.gch' Information Disclosure Vulnerability
12913| [70626] WordPress WP Database Manager Plugin Multiple Security Vulnerabilities
12914| [70615] Megapolis.Portal Manager Multiple Cross Site Scripting Vulnerabilities
12915| [70607] HP Operations Manager CVE-2014-2647 Multiple Unspecified Cross Site Scripting Vulnerabilities
12916| [70581] Cisco Intrusion Prevention System IP Logging Feature Denial of Service Vulnerability
12917| [70506] Oracle Enterprise Manager CVE-2014-6488 Remote Security Vulnerability
12918| [70494] Oracle Access Manager CVE-2014-6554 Remote Security Vulnerability
12919| [70483] Oracle Access Manager CVE-2014-6553 Remote Security Vulnerability
12920| [70477] Oracle Access Manager CVE-2014-6462 Remote Security Vulnerability
12921| [70458] Oracle Identity Manager CVE-2014-6487 Remote Security Vulnerability
12922| [70452] Oracle Access Manager CVE-2014-6552 Remote Security Vulnerability
12923| [70419] Microsoft Windows CVE-2014-4114 OLE Package Manager Remote Code Execution Vulnerability
12924| [70373] Telefonica O2 Connection Manager Local Privilege Escalation Vulnerability
12925| [70371] Telefonica O2 Connection Manager Local Privilege Escalation Vulnerability
12926| [70370] WordPress Google Calendar Events Plugin 'admin-ajax.php' Cross Site Scripting Vulnerability
12927| [70353] HP Operations Manager CVE-2014-2649 Unspecified Remote Code Execution Vulnerability
12928| [70350] HP Operations Manager CVE-2014-2648 Unspecified Remote Code Execution Vulnerability
12929| [70315] Red Hat Enterprise Virtualization Manager SSL Connection Denial of Service Vulnerability
12930| [70286] HP Records Manager CVE-2014-4661 Unspecified Cross Site Scripting Vulnerability
12931| [70284] IBM Tivoli Federated Identity Manager CVE-2014-3097 Unspecified Open Redirection Vulnerability
12932| [70283] IBM Security Access Manager for Web CVE-2014-4809 Remote Denial of Service Vulnerability
12933| [70278] Cisco Intrusion Prevention System CVE-2014-3402 Denial of Service Vulnerability
12934| [70249] Apple Mac OS X 'IOHIDSecurePromptClient' Remote Denial of Service Vulnerability
12935| [70248] IBM Business Process Manager CVE-2014-4802 Information Disclosure Vulnerability
12936| [70247] IBM Tivoli Service Automation Manager CVE-2014-0940 Multiple Cross Site Scripting Vulnerabilities
12937| [70242] Torque Resource Manager CVE-2014-3684 Denial of Service Vulnerability
12938| [70228] IBM Business Process Manager CVE-2014-6101 Cross Site Scripting Vulnerability
12939| [70225] HP Systems Insight Manager CVE-2014-2643 Unspecified Remote Privilege Escalation Vulnerability
12940| [70224] HP Systems Insight Manager CVE-2014-2645 Unspecified Clickjacking Vulnerability
12941| [70223] HP Systems Insight Manager CVE-2014-2644 Unspecified Cross Site Scripting Vulnerability
12942| [70219] TeamSpeak Client Multiple Buffer Overflow Vulnerabilities
12943| [70197] IBM Security Access Manager CVE-2014-6079 Unspecified Cross Site Scripting Vulnerability
12944| [70195] IBM Security Access Manager CVE-2014-4823 Remote Command Injection Vulnerability
12945| [70170] HP MPIO DSM Manager CVE-2014-2639 Local Privilege Escalation Vulnerability
12946| [70169] ManageEngine OpManager CVE-2014-6035 Arbitrary File Upload Vulnerability
12947| [70147] SLFileManager for Android CVE-2014-5319 Directory Traversal Vulnerability
12948| [70145] WordPress WP file upload and manager by N-Media Plugin Arbitrary File Upload Vulnerability
12949| [70044] Cisco Unified Communications Domain Manager CVE-2014-3380 Remote Denial of Service Vulnerability
12950| [70042] Mahjong Galaxy Space Lite For Android SSL Certificate Validation Security Bypass Vulnerability
12951| [69798] IBM FileNet Content Manager and Content Foundation Unspecified Cross Site Scripting Vulnerability
12952| [69743] Oracle MySQL Client yaSSL Certificate Decode Buffer Overflow Vulnerability
12953| [69739] Cisco Unified Communications Manager Web Framework Cross Site Scripting Vulnerability
12954| [69738] RETIRED: Cisco Unified Communications Manager Local Heap Based Buffer Overflow Vulnerability
12955| [69663] WordPress Premium Gallery Manager Plugin 'option_panel/ajax.php' Access Bypass Vulnerability
12956| [69561] TYPO3 Flat Manager Unspecified SQL Injection Vulnerability
12957| [69549] WordPress Advanced Access Manager Plugin CVE-2014-6059 Arbitrary File Overwrite Vulnerability
12958| [69547] IBM Business Process Manager and WebSphere CVE-2014-3075 Arbitrary File Upload Vulnerability
12959| [69544] IBM Business Process Manager CVE-2014-4759 Information Disclosure Vulnerability
12960| [69540] IBM Business Process Manager and WebSphere CVE-2014-4758 Security Bypass Vulnerability
12961| [69496] Jasig Multiple CAS Clients CVE-2014-4172 Security Bypass Vulnerability
12962| [69482] ManageEngine EventLog Analyzer Multiple Security Vulnerabilities
12963| [69450] Aerohive Hive Manager Multiple Security Vulnerabilities
12964| [69438] SolarWinds Storage Manager 'AuthenticationFilter' Class Remote Code Execution Vulnerability
12965| [69420] ManageEngine EventLog Analyzer '/event/index2.do' Multiple Cross Site Scripting Vulnerabilities
12966| [69408] IBM Flex System Manager CVE-2014-0897 Weak Encryption Security Weakness
12967| [69391] Aruba Networks ClearPass Policy Manager CVE-2014-2593 Command Injection Vulnerability
12968| [69380] HP Service Manager CVE-2013-6222 Multiple Cross Site Scripting and Unspecified Vulnerabilities
12969| [69379] HP Service Manager CVE-2014-2634 Unspecified Remote Unauthorized Access Vulnerability
12970| [69377] HP Service Manager CVE-2014-2632 Unspecified Remote Privilege Escalation Vulnerability
12971| [69376] HP Service Manager CVE-2014-2633 Unspecified Cross Site Request Forgery Vulnerability
12972| [69372] IBM Tivoli Storage Manager CVE-2013-6335 Local Unauthorized Access Vulnerability
12973| [69371] Bank Soft Systems RBS BS-Client Multiple SQL Injection Vulnerabilities
12974| [69317] AsyncHttpClient SSL Host Name Verification Security Weakness
12975| [69316] AsyncHttpClient SSL/TLS Certificate Validation Security Bypass Weakness
12976| [69303] ManageEngine Password Manager Pro and ManageEngine IT360 SQL Injection Vulnerability
12977| [69261] IBM Tivoli Storage Manager CVE-2014-0876 Local Denial of Service Vulnerability
12978| [69247] QEMU 'vmstate_xhci_event' Field Memory Corruption Vulnerability
12979| [69243] RiverBed Stingray Traffic Manager Virtual Appliance Cross Site Scripting Vulnerability
12980| [69225] VMTurbo Operations Manager '/cgi-bin/vmtadmin.cgi' Remote Command Execution Vulnerability
12981| [69209] WordPress dsSearchAgent Plugin 'client-assist.php' Cross Site Scripting Vulnerability
12982| [69200] Cisco Unified Communications Manager and Unified Presence Server SQL Injection Vulnerability
12983| [69180] IBM Tivoli Business Service Manager CVE 2014-3031 Unspecified Cross Site Scripting Vulnerability
12984| [69177] Cisco Unified Communications Manager CVE-2014-3337 Denial of Service Vulnerability
12985| [69176] Cisco Unified Communications Manager CVE-2014-3338 Command Injection Vulnerability
12986| [69156] Attachmate Reflection FTP Client ActiveX Control CVE-2014-0606 Remote Code Execution Vulnerability
12987| [69155] Attachmate Reflection FTP Client ActiveX Control CVE-2014-0605 Remote Code Execution Vulnerability
12988| [69154] Attachmate Reflection FTP Client ActiveX Control CVE-2014-0604 Remote Code Execution Vulnerability
12989| [69151] Attachmate Reflection FTP Client ActiveX Control CVE-2014-0603 Remote Code Execution Vulnerability
12990| [69068] Cisco Unified Communications Manager Concurrent Login Security Bypass Vulnerability
12991| [69056] McAfee Network Security Manager CVE-2014-2390 Cross Site Request Forgery Vulnerability
12992| [69053] IBM Business Process Manager CVE-2014-3076 Information Disclosure Vulnerability
12993| [69052] Fujitsu ServerView Operations Manager Unspecified Cross Site Scripting Vulnerability
12994| [69036] IBM Security Access Manager for Mobile CVE-2014-4751 Unspecified Cross Site Scripting Vulnerability
12995| [68973] Lyris ListManager 'doemailpassword.tml' Cross Site Scripting Vulnerability
12996| [68951] SAP FI Manager Self-Service Hardcoded Credentials Security Bypass Vulnerability
12997| [68949] SAP Solution Manager SAP_JTECHS Access Bypass Vulnerability
12998| [68946] Symantec Endpoint Protection Local Client ADC Buffer Overflow Vulnerability
12999| [68939] IBM 1754 GCM16 and GCM32 Global Console Managers Unspecified Remote Code Execution Vulnerability
13000| [68926] Cisco Prime Data Center Network Manager CVE-2014-3329 Cross Site Scripting Vulnerability
13001| [68882] BulletProof FTP Client Local Buffer Overflow Vulnerability
13002| [68877] Cisco Security Manager Web Framework CVE-2014-3326 SQL Injection Vulnerability
13003| [68854] ManageEngine EventLog Analyzer '/event/j_security_check' Cross Site Scripting Vulnerability
13004| [68845] Symantec Endpoint Protection Manager Brute Force Authentication Bypass Vulnerability
13005| [68826] Mozilla Firefox CVE-2014-1561 Event Spoofing Vulnerability
13006| [68785] IBM Rational Software Architect Design Manager CVE-2014-0947 Unspecified Security Vulnerability
13007| [68779] IBM 1754 GCM16 and GCM32 Global Console Managers Unspecified Arbitrary File Read Vulnerability
13008| [68777] IBM 1754 GCM16 and GCM32 Global Console Managers Cross Site Scripting Vulnerability
13009| [68737] RubyGems gyazo 'gyazo/client.rb' Insecure Temporary File Creation Vulnerability
13010| [68701] Cisco Unified Communications Manager Real-Time Monitoring Tool Directory Traversal Vulnerability
13011| [68694] Cisco Unified Communications Domain Manager Admin HTTP Open Redirection Vulnerability
13012| [68666] OpenVPN Access Server Desktop Client Cross Site Request Forgery Vulnerability
13013| [68522] WordPress Download Manager Plugin Arbitrary File Upload Vulnerability
13014| [68503] Cisco WebEx Meetings Client File Transfer Functionality Arbitrary File Download Vulnerabilitiy
13015| [68502] Cisco WebEx Meetings Client File Sharing Functionality Remote Heap Buffer Overflow Vulnerability
13016| [68488] WordPress BSK PDF Manager Plugin 'wp-admin/admin.php' Multiple SQL Injection Vulnerabilities
13017| [68482] Cisco Unified Communications Manager CVE-2014-3318 Directory Traversal Vulnerability
13018| [68481] Cisco Unified Communications Manager CVE-2014-3317 Directory Traversal Vulnerability
13019| [68479] Cisco Unified Communications Manager CVE-2014-3316 Arbitrary File Upload Vulnerability
13020| [68477] Cisco Unified Communications Manager Dialed Number Analyzer Cross Site Scripting Vulnerability
13021| [68468] Frog CMS file_manager Plugin Arbitrary File Upload Vulnerability
13022| [68452] IBM Tivoli Application Dependency Discovery Manager CVE-2013-3004 Directory Traversal Vulnerability
13023| [68440] NetIQ Security Manager 'NQMcsVarSet' ActiveX Remote Code Execution Vulnerability
13024| [68409] WordPress WP Plugin Manager Plugin 'wp-plugins-net/index.ph' Cross Site Scripting Vulnerability
13025| [68406] WordPress Hot Files: File Sharing and Download Manager Plugin Cross Site Scripting Vulnerability
13026| [68399] WordPress Your Text Manager Plugin 'settings/pwsettings.php' Cross Site Scripting Vulnerability
13027| [68370] IBM Flex System Manager CVE-2013-5423 User Enumeration Vulnerability
13028| [68334] Cisco Unified Communications Domain Manager CVE-2014-2198 Unauthorized Access Vulnerability
13029| [68333] Cisco Unified Communications Domain Manager CVE-2014-2197 Privilege Escalation Vulnerability
13030| [68331] Cisco Unified Communications Domain Manager BVSMWeb CVE-2014-3300 Security Bypass Vulnerability
13031| [68259] EMC Smarts Network Configuration Manager CVE-2014-2509 Session Fixation Vulnerability
13032| [68228] EMC RSA BSAFE Toolkits and RSA Data Protection Manager Predictable Random Number Generator Weakness
13033| [68139] Novell Identity Manager 'Fan-Out Platform' Services Local Command Injection Vulnerability
13034| [68138] IBM Security Access Manager CVE-2014-3052 Security Bypass Vulnerability
13035| [68137] IBM Security Access Manager CVE-2014-3073 Remote Code Execution Vulnerability
13036| [68132] IBM Security Access Manager for Web and Mobile CVE-2014-3053 Authentication Bypass Vulnerability
13037| [68078] F5 Networks ARX Data Manager CVE-2014-2949 SQL Injection Vulnerabilitiy
13038| [68065] T-Mobile webConnect Manager sysauth Cookie Information Disclosure Weakness
13039| [68000] Cisco Unified Communications Manager Java Interface SQL Injection Vulnerability
13040| [67995] SAP NetWeaver Business Client Multiple Cross Site Scripting Vulnerabilities
13041| [67982] Cisco Unified Communications Manager CVE-2014-3292 Multiple Arbitrary File Access Vulnerabilities
13042| [67959] DotNetNuke EventsCalendar 'downloaddoc.aspx' Arbitrary File Download Vulnerabilitiy
13043| [67925] Cisco Unified Communications Domain Manager Unauthorized Access Vulnerability
13044| [67924] Cisco Unified Communications Domain Manager BVSMWeb User Enumeration Vulnerability
13045| [67912] Cloudera Manager CVE-2014-0220 Information Disclosure Vulnerability
13046| [67909] IBM Tivoli Identity Manager and Security Identity Manager Cross Site Request Forgery Vulnerability
13047| [67902] DevExpress ASP.NET File Manager CVE-2014-2575 Directory Traversal Vulnerability
13048| [67868] EMC Documentum Digital Asset Manager CVE-2014-2503 Documentum Query Language Injection Vulnerability
13049| [67830] IPSwitch IMail Server WEB client Multiple HTML Injection Vulnerabilities
13050| [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
13051| [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
13052| [67771] Multiple F5 BIG-IP and Enterprise Manager 'list.jsp' Multiple Cross Site Scripting Vulnerabilities
13053| [67684] Red Hat Enterprise Virtualization Manager CVE-2014-0200 Insecure File Permissions Vulnerability
13054| [67682] Red Hat Enterprise Virtualization Manager Local Information Disclosure Vulnerability
13055| [67670] FreeRDP 'client/X11/xf_graphics.c' Multiple Integer Overflow Vulnerabilities
13056| [67666] Cisco Unified Communications Domain Manager Number Translation Information Disclosure Vulnerability
13057| [67665] Cisco Unified Communications Domain Manager Self-Care HTTP Open Redirection Vulnerability
13058| [67664] Cisco Unified Communications Domain Manager Remote Information Disclosure Vulnerability
13059| [67663] Cisco Unified Communications Domain Manager VOSS Operating System User Enumeration Vulnerability
13060| [67661] Cisco Unified Communications Domain Manager Remote Information Disclosure Vulnerability
13061| [67642] IBM Tivoli Storage FlashCopy Manager CVE-2013-6714 Local Privilege Escalation Vulnerability
13062| [67614] IBM Tivoli Storage Manager Server CVE-2013-6713 Local Unauthorized Access Vulnerability
13063| [67598] IBM Sametime Proxy Server and Web Client CVE-2014-3015 Cross Site Request Forgery Vulnerability
13064| [67587] SAP Sybase Event Stream Processor CVE-2014-3458 Multiple Remote Code Execution Vulnerabilities
13065| [67585] SAP Sybase Event Stream Processor Multiple Remote Code Execution Vulnerabilities
13066| [67570] HP Operations Manager i CVE-2014-2607 Unspecified Remote Code Execution Vulnerability
13067| [67569] Cisco Security Manager Web Framework Cross Site Scripting Vulnerability
13068| [67559] Dotclear 'filemanager::isFileExclude()' Method Arbitrary File Upload Vulnerability
13069| [67550] Cisco Security Manager CVE-2014-3267 Cross Site Request Forgery Vulnerability
13070| [67499] Cisco Security Manager Auto Update Server Cross Site Scripting Vulnerability
13071| [67498] Clipperz Password Manager 'backend/php/src/setup/rpc.php' Remote Code Execution Vulnerability
13072| [67495] Cisco Unified Web and E-Mail Interaction Manager Session Identifiers Security Bypass Vulnerability
13073| [67487] Novell NetIQ Sentinel Agent Manager 'NQMcsVarSet' ActiveX Remote Code Execution Vulnerability
13074| [67464] Cisco Unified Web and E-Mail Interaction Manager CVE-2014-2192 Cross Site Scripting Vulnerability
13075| [67458] Cisco Unified Web and E-Mail Interaction Manager XML External Entity Injection Vulnerability
13076| [67445] Juniper Network and Security Manager CVE-2014-3411 Remote Code Execution Vulnerability
13077| [67442] CIS Manager 'email' Parameter SQL Injection Vulnerability
13078| [67438] UPS Web/SNMP-Manager CS121 Authentication Bypass Vulnerability
13079| [67314] HP Network Node Manager i CVE-2013-6220 Unspecified HTML Injection Vulnerability
13080| [67305] HP Network Node Manager i Unspecified Cross Site Scripting Vulnerability
13081| [67292] VMTurbo Operations Manager Directory Traversal Vulnerability
13082| [67272] AVG Remote Administration 'ClientLibraryName' Parameter Remote Code Execution Vulnerability
13083| [67239] Idera Server Backup Manager Arbitrary File Overwrite Vulnerability
13084| [67238] IBM Security Access Manager for Web CVE-2014-0963 Remote Denial of Service Vulnerability
13085| [67229] IBM Operational Decision Manager CVE-2014-0946 Information Disclosure Vulnerability
13086| [67226] IBM Operational Decision Manager CVE-2014-0945 Unspecified Cross Site Scripting Vulnerability
13087| [67224] IBM Operational Decision Manager CVE-2014-0944 Cross Site Request Forgery Vulnerability
13088| [67172] RSA Access Manager Server CVE-2014-0646 Information Disclosure Vulnerability
13089| [67148] Responsive File Manager Multiple Cross Site Scripting Vulnerabilities
13090| [67147] SAP Solution Manager Remote Information Disclosure Vulnerability
13091| [67107] SAP Solution Manager Background Processing Security Bypass Vulnerability
13092| [67103] SAP Solution Manager Profile Maintenance Security Bypass Vulnerability
13093| [67101] Cisco Unified Communications Manager CVE-2014-2184 Information Disclosure Vulnerability
13094| [67099] Cisco Unified Communications Manager CVE-2014-2185 Information Disclosure Vulnerability
13095| [67015] SD Card Manager CVE-2014-1969 Directory Traversal Vulnerability
13096| [66983] Cybozu Remote Service Manager CVE-2014-1983 Denial of Service Vulnerability
13097| [66982] Cybozu Remote Service Manager CVE-2014-1984 Session Fixation Vulnerability
13098| [66958] Python XMLRPC Client Library Denial of Service Vulnerability
13099| [66923] Jigowatt PHP Event Calendar 'day_view.php' SQL Injection Vulnerability
13100| [66901] Oracle PeopleSoft Enterprise HRMS Talent Acquisition Manager CVE-2014-2449 Security Vulnerability
13101| [66871] Oracle Event Processing CVE-2014-2424 Remote Code Execution Vulnerability
13102| [66865] Oracle Access Manager CVE-2014-2452 Remote Security Vulnerability
13103| [66862] Oracle Access Manager CVE-2014-2404 Remote Security Vulnerability
13104| [66850] Oracle MySQL Client CVE-2014-2440 Remote Security Vulnerability
13105| [66773] vSphere Client Certificate Validation CVE-2014-1210 Spoofing Vulnerability
13106| [66772] vSphere Client CVE-2014-1209 Arbitrary File Download Vulnerability
13107| [66679] IBM Business Process Manager Authorization Bypass Vulnerability
13108| [66615] Oracle Identity Manager 'backUrl' Parameter URL Redirection Vulnerability
13109| [66596] JBoss Enterprise Application Platform Java Security Manager Policy Security Bypass Vulnerability
13110| [66590] CIS Manager 'TroncoID' Parameter SQL Injection Vulnerability
13111| [66589] Rhythm Software File Manager And File Manager HD Multiple Security Vulnerabilities
13112| [66566] Cisco Security Manager HTTP Header CVE-2014-2138 Open Redirection Vulnerability
13113| [66504] Synology DiskStation Manager Unspecified Cross Site Scripting Vulnerability
13114| [66494] OpenStack python-keystoneclient CVE-2014-0105 Privilage Escalation Vulnerability
13115| [66488] Cisco Prime Security Manager CVE-2014-2118 Cross Site Scripting Vulnerability
13116| [66461] RSA Authentication Manager CVE-2014-0623 Cross Frame Scripting Vulnerability
13117| [66345] phpSiteManager 'admin_pass1' Parameter Cross Site Scripting Vulnerability
13118| [66308] EMC Connectrix Manager Converged Network Edition Remote Information Disclosure Vulnerability
13119| [66281] SVNManager Multiple Unspecified SQL Injection Vulnerabilities
13120| [66277] Tivoli Storage FlashCopy Manager CVE-2013-3976 Local Information Disclosure Vulnerability
13121| [66211] Free Download Manager 'Downloads_Deleted.cpp' Stack Based Buffer Overflow Vulnerability
13122| [66202] Synology DiskStation Manager 'value' Parameter SQL Injection Vulnerability
13123| [66186] IBM Operational Decision Manager Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
13124| [66177] HP Smart Update Manager for Linux CVE-2013-6208 Unspecified Local Privilege Escalation Vulnerability
13125| [66076] Open Web Analytics 'owa_event' Parameter PHP Object Injection Vulnerability
13126| [66071] Ajax File and Image Manager 'search_folder' Parameter Directory Traversal Vulnerability
13127| [66044] WordPress Premium Gallery Manager Plugin Arbitrary File Upload Vulnerability
13128| [66012] Microsoft Windows Security Account Manager Remote protocol Security Bypass Vulnerability
13129| [65933] IBM Security Key Lifecycle Manager CVE-2014-0872 Information Disclosure Vulnerability
13130| [65914] EMC RSA Data Loss Prevention Improper Session Management Local Privilege Escalation Vulnerability
13131| [65913] GetGo Download Manager CVE-2014-2206 Stack Buffer Overflow Vulnerability
13132| [65879] Synology DiskStation Manager VPN Module Hardcoded Password Security Bypass Vulnerability
13133| [65873] Schneider Electric Floating License Manager Privilege Escalation Vulnerability
13134| [65869] Cisco Unified Communications Domain Manager Multiple Cross Site Scripting Vulnerabilities
13135| [65864] Cisco Intrusion Prevention System CVE-2014-2103 Denial of Service Vulnerability
13136| [65853] SAS for Windows Client Application Local Buffer Overflow Vulnerability
13137| [65837] WordPress BSK PDF Manager Parameter Multiple Cross Site Scripting Vulnerabilities
13138| [65801] IO File Manager for Android Directory Traversal Vulnerability
13139| [65796] Cisco Unified Communications Manager CVE-2014-0741 Local Privilege Escalation Vulnerability
13140| [65795] Cisco Unified Communications Manager CVE-2014-0740 Cross Site Request Forgery Vulnerability
13141| [65790] Cisco Unified Communications Manager CVE-2014-0747 Local Command Injection Vulnerability
13142| [65789] Cisco Unified Communications Manager CVE-2014-0743 Security Bypass Vulnerability
13143| [65788] Cisco Unified Communications Manager CVE-2014-0742 Local Privilege Escalation Vulnerability
13144| [65740] eshtery CMS 'FileManager.aspx' Local File Disclosure Vulnerability
13145| [65736] HP Service Manager CVE-2013-6202 Multiple Security Vulnerabilities
13146| [65645] Cisco Unified Communications Manager CAPF SQL Injection Vulnerability
13147| [65643] Cisco Unified Communications Manager ELM Information Disclosure Vulnerability
13148| [65642] Cisco Unified Communications Manager RTMT Information Disclosure Vulnerability
13149| [65641] Cisco Unified Communications Manager IPMA Cross Site Scripting Vulnerability
13150| [65640] Cisco Unified Communications Manager CVE-2014-0736 Cross Site Request Forgery Vulnerability
13151| [65570] TYPO3 femanager Extension Security Bypass Vulnerability
13152| [65543] SAP NetWeaver Solution Manager Unspecified Security Bypass Vulnerability
13153| [65518] Cisco Unified Communications Manager 'WAR' File Unauthorized Access Vulnerability
13154| [65516] Cisco Unified Communications Manager CMIVR Interface SQL Injection Vulnerability
13155| [65514] Cisco Unified Communications Manager IP Manager Assistant Interface SQL Injection Vulnerability
13156| [65501] Cisco Unified Communications Manager Enterprise Mobility Application SQL Injection Vulnerability
13157| [65499] Cisco Unified Communications Manager Java Database Interface SQL Injection Vulnerability
13158| [65497] Cisco Unified Communications Manager CVE-2014-0724 Arbitrary File Disclosure Vulnerability
13159| [65495] Cisco Unified Communications Manager IP Manager Assistant Cross Site Scripting Vulnerability
13160| [65467] Symantec Endpoint Protection Manager CVE-2013-5015 Local SQL Injection Vulnerability
13161| [65466] Symantec Endpoint Protection Manager CVE-2013-5014 XML External Entity Injection Vulnerability
13162| [65456] Asseco SEE iBank FX Client Multiple Local Privilege Escalation Vulnerabilities
13163| [65453] Enlightenment Window Manager 'Helper' Variable Local Privilege Escalation Vulnerability
13164| [65348] Citrix XenMobile Device Manager server CVE-2014-166 Unspecified Information Disclosure Vulnerability
13165| [65346] IBM Financial Transaction Manager Cross Site Request Forgery Vulnerability
13166| [65343] IBM Financial Transaction Manager Directory Traversal Vulnerability
13167| [65342] IBM Financial Transaction Manager CVE-2014-0832 Multiple Cross Site Scripting Vulnerabilities
13168| [65336] IBM Financial Transaction Manager CVE-2014-0833 Security Bypass Vulnerability
13169| [65298] Oracle MySQL Client 'main()' Function Buffer Overflow Vulnerability
13170| [65284] Calendar Scripts Eventy Multiple Security Vulnerabilities
13171| [65281] Cisco Unified Communications Manager CVE-2014-0686 Local Privilege Escalation Vulnerability
13172| [65250] NCH Inventoria Stock Manager 'id' Parameter Cross Site Scripting Vulnerability
13173| [65203] IBM Tivoli Application Dependency Discovery Manager Security Bypass Vulnerability
13174| [65196] Eventum 'hostname' Parameter Remote Code Execution Vulnerability
13175| [65186] Eventum CVE-2014-1631 Insecure File Permissions Vulnerability
13176| [65185] IBM Tivoli Service Automation Manager Multiple Cross Site Scripting Vulnerabilities
13177| [65148] WordPress Newsletter Manager Plugin Multiple Cross Site Request Forgery Vulnerabilities
13178| [65134] Drupal Event Calendar Module Cross Site Scripting Vulnerability
13179| [65111] Cisco Video Surveillance Operations Manager Unauthorized Access Vulnerability
13180| [65104] Avanset Visual CertExam Manager Multiple SQL Injection Vulnerabilities
13181| [65077] Red Hat Enterprise Virtualization Manager Man in the Middle Information Disclosure Vulnerability
13182| [65033] Hitachi Device Manager Host Data Collector Denial of Service Vulnerability
13183| [65018] ManageEngine EventLog Analyzer 'j_username' Parameter Cross Site Scripting Vulnerability
13184| [65004] libvirt Event Registration API Remote Security Bypass Vulnerability
13185| [64999] IBM Tivoli Federated Identity Manager Business Gateway Security Bypass Vulnerability
13186| [64977] Event Booking Calendar Multiple Input Validation Vulnerabilities
13187| [64842] Oracle Identity Manager CVE-2014-0383 Remote Security Vulnerability
13188| [64838] Oracle Identity Manager CVE-2013-5900 Remote Security Vulnerability
13189| [64829] Oracle Identity Manager CVE-2014-0391 Remote Security Vulnerability
13190| [64815] Oracle Identity Manager CVE-2013-5901 Remote Security Vulnerability
13191| [64795] McAfee Vulnerability Manager Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
13192| [64792] IBM Financial Transaction Manager Unspecified Directory Traversal Vulnerabilities
13193| [64755] Security File Manager For Android CVE-2014-0804 Arbitrary File Overwrite Vulnerability
13194| [64731] CSP MySQL User Manager 'login.php' Script SQL Injection Vulnerability
13195| [64690] Cisco Unified Communications Manager Unauthorized Access Vulnerability
13196| [64684] Schneider Electric Accutech Manager RFManagerService SQL Injection Vulnerablity
13197| [64637] Cisco Adaptive Security Device Manager Brute Force Authentication Bypass Vulnerability
13198| [64595] ClientExec Multiple Information Disclosure Vulnerabilities
13199| [64567] HP Service Manager Unspecified Cross Site Scripting Vulnerability
13200| [64562] HP Service Manager Unspecified Arbitrary Code Execution Vulnerability
13201| [64520] EMC Replication Manager Unquoted File Paths Local Privilege Escalation Vulnerability
13202| [64516] Synology DiskStation Manager 'imageSelector.cgi' Remote Command Execution Vulnerability
13203| [64515] Red Hat Subscription Asset Manager Weak Authentication Security Bypass Vulnerability
13204| [64500] Novell Identity Manager 'taskId' Cross Site Scripting Vulnerability.
13205| [64496] IBM Web Content Manager 'LIBRARY' Parameter XPath Injection Vulnerability
13206| [64492] IBM WebSphere Portal Web Content Manager Information Disclosure Vulnerability
13207| [64484] Novell Client 'VBA32 AntiRootKit' Component IOCTL Handling Local Denial of Service Vulnerability
13208| [64483] Synology DiskStation Manager 'FileBrowser' Component Multiple Directory Traversal Vulnerabilities
13209| [64477] IBM Security Access Manager for Enterprise Single Sign-On Information Disclosure Vulnerability
13210| [64475] IBM Security Access Manager for Enterprise CVE-2013-6745 Unspecified HTML Injection Vulnerability
13211| [64473] IBM Security Access Manager for Enterprise Unspecified HTML Injection Vulnerability
13212| [64421] Cisco Unified Communications Manager DRS Information Disclosure Vulnerability
13213| [64346] Veno File Manager 'q' Parameter Arbitrary File Download Vulnerability
13214| [64340] IBM Rational ClearQuest Web Client CVE-2013-5422 Unspecified Information Disclosure Vulnerability
13215| [64326] transifex-client CVE-2013-7110 SSL Certificate Validation Security Bypass Vulnerability
13216| [64318] Linux Kernel 'perf_trace_event_perm()' Function Local Security Bypass Vulnerability
13217| [64294] Cisco Unified Communications Manager CVE-2013-7030 Remote File Disclosure Vulnerability
13218| [64247] TYPO3 Extension Manager Unspecified Cross Site Scripting Vulnerability
13219| [64233] IBM Flex System Manager CVE-2013-5438 Cross Site Scripting Vulnerability
13220| [64219] Plone and Zope 'BrowserIdManager.py' Cross Site Scripting Vulnerability
13221| [64185] SUSE Manager CVE-2012-0414 Unspecified Cross-Site Scripting Vulnerability
13222| [64170] Easytime Studio Easy File Manager for iOS CVE-2013-3921 Directory Traversal Vulnerability
13223| [64159] WordPress Download Manager Plugin 'file[title]' Parameter Cross Site Scripting Vulnerability
13224| [64146] IBM Tivoli Storage Manager Server CVE-2012-5944 Local Unauthorized Access Vulnerability
13225| [64145] Tftpd32 Client CVE-2013-6809 'Remote File' Field Format String Vulnerability
13226| [64114] mod_nss Module NSSVerifyClient CVE-2013-4566 Authentication Bypass Vulnerability
13227| [64055] Novell Remote Manager HTTPSTK Service Denial of Service Vulnerability
13228| [64040] ClientExec Multiple Unspecified Security Vulnerabilities
13229| [64027] Novell iPrint Client 'id1.GetPrinterURLList()' Function Remote Denial of Service Vulnerability
13230| [64011] ClientExec Multiple SQL Injection and Cross Site Scripting Vulnerabilities
13231| [63968] phpMyFAQ Image Manager Arbitrary File Upload Vulnerability
13232| [63965] HP Service Manager and ServiceCenter CVE-2013-4844 Unspecified Remote Code Execution Vulnerability
13233| [63958] General Electric (GE) Ethernet Station Manager Command Processing Denial-Of-Service Vulnerability
13234| [63956] GE Ethernet Station Manager Multiple Unspecified Security Vulnerabilities
13235| [63947] GE Ethernet Station Manager Default Password Authentication Bypass Vulnerability
13236| [63892] phpMyFAQ 'ajaxfilemanager.php' Security Bypass Vulnerability
13237| [63867] EMC RSA Data Protection Manager Appliance CVE-2013-3288 Cross Site Scripting Vulnerability
13238| [63752] python-swiftclient SSL Certificate Validation Security Bypass Vulnerability
13239| [63733] Cisco Unified Communications Manager CVE-2013-6688 Directory Traversal Vulnerability
13240| [63731] Cisco Unified Communications Manager Command-line Utility Local Security Bypass Vulnerability
13241| [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
13242| [63632] OpenVAS Manager CVE-2013-6765 Authentication Bypass Vulnerability
13243| [63606] Bitrix Site Manager CVE-2013-6788 'BITRIX_SM_SALE_UID' Cookie User Identity Spoofing Vulnerability
13244| [63515] Apache Tomcat Manager Component CVE-2013-6357 Cross Site Request Forgery Vulnerability
13245| [63491] Cisco AnyConnect Secure Mobility Client CVE-2013-5559 Buffer Overflow Vulnerability
13246| [63458] Facebook Application And Facebook Pages Manager For Android Information Disclosure Vulnerability
13247| [63414] Beetel Connection Manager 'NetConfig.ini' File Handling Remote Buffer Overflow Vulnerability
13248| [63407] Cisco Unified Communications Manager CVE-2013-5555 Denial of Service Vulnerability
13249| [63396] IBM Tivoli Federated Identity Manager/Business Gateway Open Redirection Vulnerability
13250| [63340] VICIDIAL 'manager_send.php' CVE-2013-4467 SQL Injection Vulnerability
13251| [63288] VICIDIAL 'manager_send.php' CVE-2013-4468 Command Injection Vulnerability
13252| [63267] IBM Tivoli Endpoint Manager LDAP And AD Authentication Security Bypass Vulnerability
13253| [63259] DELL Quest One Password Manager CAPTCHA Security Bypass Vulnerability
13254| [63254] LDAP Account Manager 'current_language' Parameter Cross Site Scripting Vulnerability
13255| [63218] VMware vSphere Web Client Server Session ID CVE-2013-5971 Handling Session Fixation Vulnerability
13256| [63215] ADManager Plus Multiple Remote Security Vulnerabilities
13257| [63071] Oracle Enterprise Manager Base Platform CVE-2013-5827 Remote Security Vulnerability
13258| [63069] Oracle Identity Manager CVE-2013-5798 Remote Security Vulnerability
13259| [63068] Oracle Enterprise Manager Base Platform CVE-2013-3762 Remote Security Vulnerability
13260| [63064] Oracle Enterprise Manager Base Platform CVE-2013-5828 Remote Security Vulnerability
13261| [63061] Oracle Access Manager CVE-2013-3833 Remote Security Vulnerability
13262| [63056] Oracle Enterprise Manager Base Platform CVE-2013-5766 Remote Security Vulnerability
13263| [63038] HP Service Manager Multiple Security Vulnerabilities
13264| [62965] Idera Server Backup Manager Multiple Security Vulnerabilities
13265| [62960] Cisco Unified Communications Manager CVE-2013-5528 Directory Traversal Vulnerability
13266| [62936] InduSoft Thin Client 'novapi7.dll' ActiveX Control Buffer Overflow Vulnerability
13267| [62900] HP IMC Application Performance Manager Software CVE-2013-4827 SQL Injection Vulnerability
13268| [62883] WHMCS 'clientarea.php' SQL Injection Vulnerability
13269| [62835] Google Chrome Gesture Event Denial of Service Vulnerability
13270| [62746] Cisco Unified Communications Domain Manager CVE-2013-5517 SQL Injection Vulnerability
13271| [62719] Cisco Video Surveillance Operations Manager CVE-2013-3417 Information Disclosure Vulnerability
13272| [62578] Hitachi JP1/Cm2/Network Node Manager Multiple Unspecified Security Vulnerabilities
13273| [62577] Hitachi JP1/Cm2/Network Node Manager Multiple Unspecified Remote Security Vulnerabilities
13274| [62540] HP ArcSight Enterprise Security Manager Management Web Interface Cross Site Scripting Vulnerability
13275| [62519] Cisco AnyConnect Secure Mobility Client CVE-2013-1130 Local Privilege Escalation Vulnerability
13276| [62517] Cisco IPS Software Authentication Manager CVE-2013-5497 Denial of Service Vulnerability
13277| [62514] Ajax File and Image Manager 'ajax_file_upload.php' Arbitrary File Upload Vulnerability
13278| [62496] WordPress Complete Gallery Manager Plugin 'upload-images.php' Arbitrary File Upload Vulnerability
13279| [62485] Cisco Prime Data Center Network Manager XML External Entity Injection Vulnerability
13280| [62484] Cisco Prime Data Center Network Manager Multiple Remote Command Execution Vulnerabilities
13281| [62483] Cisco Prime Data Center Network Manager CVE-2013-5487 Information Disclosure Vulnerability
13282| [62423] Citrix XenClient XT NDVM Arbitrary Command Execution Vulnerability
13283| [62361] Cisco Virtualization Experience Client 6000 Local Arbitrary Command Execution Vulnerability
13284| [62350] Multiple HP Products 'GetEventsServlet' Multiple Remote Code Execution Vulnerabilities
13285| [62337] Cisco Digital Media Manager CVE-2013-3446 Open Redirection Vulnerability
13286| [62310] Synology DiskStation Manager Multiple Security Vulnerabilities
13287| [62309] eM Client 'Body' Element HTML Injection Vulnerability
13288| [62269] WordPress Event Easy Calendar Plugin Multiple Cross Site Request Forgery Vulnerabilities
13289| [62258] pyOpenSSL SSL Client Certificate Validation Security Bypass Vulnerability
13290| [62246] Citrix CloudPortal Services Manager CVE-2013-2938 Unspecified Security Vulnerability
13291| [62242] Citrix CloudPortal Services Manager CVE-2013-2940 Unspecified Security Vulnerability
13292| [62241] Citrix CloudPortal Services Manager CVE-2013-2935 Unspecified Security Vulnerability
13293| [62240] Citrix CloudPortal Services Manager CVE-2013-2937 Unspecified Information Disclosure Vulnerability
13294| [62237] Citrix CloudPortal Services Manager CVE-2013-2934 Unauthorized Access Security Bypass Vulnerability
13295| [62236] Citrix CloudPortal Services Manager CVE-2013-2939 Unspecified Security Vulnerability
13296| [62235] Citrix CloudPortal Services Manager CVE-2013-2936 Unspecified Security Vulnerability
13297| [62233] Citrix CloudPortal Services Manager CVE-2013-2933 Unspecified Security Vulnerability
13298| [62182] Microsoft Windows Service Control Manager CVE-2013-3862 Local Privilege Escalation Vulnerability
13299| [62032] Cisco Unified Communications Manager CVE-2013-3472 Cross Site Request Forgery Vulnerability
13300| [61948] IBM InfoSphere Optim Performance Manager CVE-2013-2979 Unspecified Directory Traversal Vulnerability
13301| [61917] Cisco Unified Communications Manager IM and Presence Service Remote Denial of Service Vulnerability
13302| [61913] Cisco Unified Communications Manager CVE-2013-3462 Buffer Overflow Vulnerability
13303| [61911] Cisco Unified Communications Manager CVE-2013-3459 Denial of Service Vulnerability
13304| [61909] Cisco Unified Communications Manager CVE-2013-3460 Denial of Service Vulnerability
13305| [61908] Cisco Unified Communications Manager CVE-2013-3461 Denial of Service Vulnerability
13306| [61825] MCImageManager Multiple Security Vulnerabilities
13307| [61823] Linux Kernel 'armpmu_event_init()' Function Local Denial of Service Vulnerability
13308| [61816] IBM 1754 GCM16 and GCM32 Global Console Managers Multiple Command Execution Vulnerabilities
13309| [61811] McAfee Data Loss Prevention Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
13310| [61793] Linux Kernel 'perf_event.c' Local Privilege Escalation Vulnerability
13311| [61789] HP Service Manager CVE-2013-4808 Unspecified Authentication Bypass Vulnerability
13312| [61765] All-in-One Event Calendar Plugin Multiple Cross Site Scripting and SQL Injection Vulnerabilities
13313| [61745] HTC Sync Manager Multiple DLL Loading Arbitrary Code Execution Vulnerabilities
13314| [61608] Cisco Unified Communications Manager CVE-2013-3442 Information Disclosure Vulnerability
13315| [61602] Cisco Unified Communications Manager CVE-2013-3451 Cross Site Request Forgery Vulnerability
13316| [61601] Cisco Unified Communications Manager CVE-2013-3450 Cross Site Request Forgery Vulnerability
13317| [61576] ISPmanager Remote Code Execution and Unspecified Security Vulnerabilities
13318| [61567] Red Hat Enterprise Virtualization Manager CVE-2013-2176 Local Privilege Escalation Vulnerability
13319| [61518] WordPress Better WP Security Plugin 'logevent()' Function HTML Injection Vulnerability
13320| [61508] OpenStack python-glanceclient CVE-2013-4111 SSL Certificate Validation Spoofing Vulnerability
13321| [61455] Computer Associates Service Desk Manager CVE-2013-2630 Cross Site Scripting Vulnerability
13322| [61432] Cisco Video Surveillance Manager CVE-2013-3430 Remote Authentication Bypass Vulnerability
13323| [61431] Cisco Video Surveillance Manager CVE-2013-3431 Remote Authentication Bypass Vulnerability
13324| [61430] Cisco Video Surveillance Manager CVE-2013-3429 Directory Traversal Vulnerability
13325| [61416] Cisco Unified Operations Manager CVE-2013-3439 Unspecified HTTP Header Injection Vulnerability
13326| [61414] Cisco Unified Operations Manager CVE-2013-3440 Cross Site Scripting Vulnerability
13327| [61380] Cisco Unified Operations Manager CVE-2013-3437 SQL Injection Vulnerability
13328| [61368] TinyMCE Image Manager Plugin Cross Site Scripting and Arbitrary File Upload Vulnerabilities
13329| [61364] Cisco Unified Communications Manager CVE-2013-4869 Information Disclosure Vulnerability
13330| [61350] McAfee Network Data Loss Prevention Local Information Disclosure Vulnerability
13331| [61348] McAfee Network Data Loss Prevention 'Domain' Field Local Denial of Service Vulnerability
13332| [61347] McAfee Network Data Loss Prevention Password Complexity Security Bypass Vulnerability
13333| [61346] McAfee Network Data Loss Prevention Local Security Bypass Vulnerability
13334| [61345] McAfee Network Data Loss Prevention Logs Local Information Disclosure Vulnerability
13335| [61304] Cisco WebEx One-Click Client Password Encryption Information Disclosure Vulnerability
13336| [61297] Cisco Unified Communications Manager CVE-2013-3433 Local Privilege Escalation Vulnerability
13337| [61296] Cisco Unified Communications Manager CVE-2013-3434 Local Privilege Escalation Vulnerability
13338| [61295] Cisco Unified Communications Manager CVE-2013-3412 SQL Injection Vulnerability
13339| [61293] Cisco Unified Communications Manager CVE-2013-3402 Command Injection Vulnerability
13340| [61292] Cisco Unified Communications Manager CVE-2013-3404 SQL Injection Vulnerability
13341| [61291] Cisco Unified Communications Manager Multiple Local Privilege Escalation Vulnerabilities
13342| [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
13343| [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
13344| [61213] Oracle Enterprise Manager Base Platform CVE-2013-3791 Remote Security Vulnerability
13345| [61212] Oracle Access Manager CVE-2013-3755 Remote Security Vulnerability
13346| [61205] Oracle Enterprise Manager Base Platform CVE-2013-3758 Remote Security Vulnerability
13347| [61199] Olive File Manager Multiple Input Vallidation Vulnerabilities
13348| [61188] Novell GroupWise Client CVE-2013-1087 Cross-Site Scripting Vulnerability
13349| [61159] Squid 'client_side_request.cc' File Remote Denial of Service Vulnerability
13350| [61141] Cisco Unified Communications Domain Manager CVE-2013-3418 Denial of Service Vulnerability
13351| [61132] HP Network Node Manager I CVE-2013-2351 Unspecified Unauthorized Access Vulnerability
13352| [61100] Cisco Unified Communications Domain Manager Multiple Cross Site Scripting Vulnerabilities
13353| [61068] SecureSphere Operations Manager CVE-2013-4093 Multiple Information Disclosure Vulnerabilities
13354| [61067] Imperva SecureSphere Operations Manager CVE-2013-4095 Arbitrary Command Execution Vulnerability
13355| [61066] Imperva SecureSphere Operations Manager Multiple Information Disclosure Vulnerabilities
13356| [61065] Imperva SecureSphere Operations Manager CVE-2013-4094 Multiple Arbitrary File Upload Vulnerabilities
13357| [61064] Imperva SecureSphere Operations Manager CVE-2013-4091 Information Disclosure Vulnerability
13358| [61033] McAfee Data Loss Prevention Multiple Information Disclosure Vulnerabilities
13359| [61028] Red Hat Enterprise Virtualization Manager CVE-2013-2144 Denial of Service Vulnerability
13360| [61027] Cisco Virtualization Experience Client 6000 CVE-2013-3408 Local Privilege Escalation Vulnerability
13361| [61021] EMC Replication Manager CVE-2013-3272 Local Information Disclosure Vulnerability
13362| [61020] RSA Authentication Manager CVE-2013-3273 Information Disclosure Vulnerability
13363| [60954] IBM AIX TFTP Client CVE-2013-3005 Security Bypass Vulnerability
13364| [60900] IBM Tivoli Federated Identity Manager Multiple Cross Site Scripting Vulnerabilities
13365| [60843] Ruby SSL Client Certificate Validation CVE-2013-4073 Security Bypass Vulnerability
13366| [60822] Cisco Unified Communications Manager CVE-2013-3397 Cross Site Request Forgery Vulnerability
13367| [60800] Apache Qpid Python Client SSL Certificate Verification Information Disclosure Vulnerability
13368| [60798] Symantec Security Information Manager CVE-2013-1615 Information Disclosure Vulnerability
13369| [60797] Symantec Security Information Manager Cross Site Scripting and HTML Injection Vulnerabilities
13370| [60796] Symantec Security Information Manager CVE-2013-1613 SQL Injection Vulnerability
13371| [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
13372| [60754] HP Smart Zero Client CVE-2013-2339 Local Unauthorized Access Vulnerability
13373| [60746] ClientExec Multiple Security Vulnerabilities
13374| [60684] OpenStack python-keystoneclient CVE-2013-2166 Security Bypass Vulnerability
13375| [60680] OpenStack python-keystoneclient CVE-2013-2167 Security Bypass Vulnerability
13376| [60673] ABB DataManager Multiple 'cwui.oc' ActiveX Controls 'ExportStyle()' Insecure Method Vulnerability
13377| [60593] gnome-shell '_gdk_x11_display_error_event()' Function Local Security Bypass Vulnerability
13378| [60579] Simple File Manager Admin Panel Security Bypass Vulnerability
13379| [60576] IBM Application Manager For Smart Business Multiple Unspecified Cross Site Scripting Vulnerabilities
13380| [60560] LibrettoCMS 'PGRFileManager.php' Arbitrary File Upload Vulnerability
13381| [60522] Cisco Video Surveillance Operations Manager CVE-2013-3376 Open Redirection Vulnerability
13382| [60484] VMware vCenter Chargeback Manager CVE-2013-3520 Remote Code Execution Vulnerability
13383| [60481] Simple PHP Agenda 'edit_event.php' SQL Injection Vulnerability
13384| [60475] Red Hat Enterprise Virtualization Manager CVE-2013-2152 Local Privilege Escalation Vulnerability
13385| [60473] Red Hat Enterprise Virtualization Manager CVE-2013-2151 Local Privilege Escalation Vulnerability
13386| [60472] HP Service Manager and ServiceCenter CVE-2013-2337 Unspecified Cross Site Scripting Vulnerability
13387| [60469] HP Service Manager and ServiceCenter CVE-2013-2336 Unspecified Information Disclosure Vulnerability
13388| [60341] Linux Kernel 'copy_event_to_user()' Function Local Information Disclosure Vulnerability
13389| [60286] Imperva SecureSphere Operations Manager Multiple Security Vulnerabilities
13390| [60207] RSA Authentication Manager CVE-2013-0947 Multiple Information Disclosure Vulnerabilities
13391| [60203] Novell Client for Windows 'nicm.sys' Local Privilege Escalation Vulnerability
13392| [60202] Novell Client 'NWFS.SYS' Local Integer Overflow Vulnerability
13393| [60193] OpenStack Keystone and python-keystoneclient PKI Tokens Validation Security Bypass Vulnerability
13394| [60176] NetIQ Access Manager 'Ecom_User_ID' Multiple Cross Site Scripting Vulnerabilities
13395| [60151] Openchrome X Window System Client Libraries CVE-2013-1994 Multiple Integer Overflow Vulnerabilities
13396| [60081] transifex-client CVE-2013-2073 SSL Certificate Validation Security Bypass Vulnerability
13397| [60080] WordPress Spider Event Calendar Multiple Security Vulnerabilities
13398| [59989] Moxiecode File Manager Multiple Remote File Upload Vulnerabilities
13399| [59988] TinyMCE MCImageManager Plugin Arbitrary File Upload Vulnerability
13400| [59886] WordPress wp-FileManager Plugin 'path' Parameter Arbitrary File Download Vulnerability
13401| [59866] Cisco Unified Communications Manager (CUCM) CVE-2013-1188 Denial of Service Vulnerability
13402| [59827] No-IP Dynamic Update Client 'i' Parameter Remote Stack Overflow Vulnerability
13403| [59688] NetApp OnCommand System Manager Multiple Cross Site Scripting and HTML Injection Vulnerabilities
13404| [59674] Red Hat Subscription Manager CVE-2012-6137 SSL Certificate Validation Security Bypass Vulnerability
13405| [59651] Cisco Unified Communications Manager CVE-2013-1240 Local Information Disclosure Vulnerability
13406| [59630] Cisco Unified Communications Domain Manager CVE-2013-1230 Denial of Service Vulnerability
13407| [59612] Novell iPrint Client CVE-2013-1091 Buffer Overflow Vulnerability
13408| [59604] Fortinet FortiClient VPN Client SSL Certificate Validation Security Bypass Vulnerability
13409| [59591] IBM Tivoli Federated Identity Manager CVE-2013-0582 Cross Site Scripting Vulnerability
13410| [59587] HP Service Manager CVE-2012-5222 Unspecified Information Disclosure Vulnerability
13411| [59586] HP Service Manager CVE-2013-2321 Unspecified Cross Site Scripting Vulnerability
13412| [59563] Tinymce Ajax File Manager Remote Code Execution Vulnerability
13413| [59545] Cisco Intrusion Prevention System CVE-2013-1219 Local Denial of Service Vulnerability
13414| [59540] Cisco Unified Communications Domain Manager Unspecified Cross Site Scripting Vulnerability
13415| [59526] IBM Sametime Clients CVE-2013-0553 Command Execution Vulnerability
13416| [59454] Multiple Cisco Products SNMP and License Manager CVE-2013-1179 Buffer Overflow Vulnerability
13417| [59450] Novell iManager CVE-2013-3268 Unspecified Security Vulnerability
13418| [59449] Cisco Device Manager CVE-2013-1192 Multiple Remote Command Execution Vulnerabilities
13419| [59315] McAfee Enterprise Mobility Manager Agent and Server DNS Spoofing Vulnerability
13420| [59271] Cisco Network Admission Control Manager CVE-2013-1177 Multiple SQL Injection Vulnerabilities
13421| [59255] SimpleHRM 'user_manager.php' Authentication Bypass Vulnerability
13422| [59106] Oracle E-Business Suite CVE-2013-2396 Remote Oracle Applications Manager Vulnerability
13423| [59042] Novell iManager Cross-Site-Request Forgery Vulnerability
13424| [59036] Cisco AnyConnect Secure Mobility Client Heap Overflow Local Privilege Escalation Vulnerability
13425| [59034] Cisco AnyConnect Secure Mobility Client Multiple Local Privilege Escalation Vulnerabilities
13426| [58937] WordPress WP-DownloadManager Plugin Cross Site Request Forgery Vulnerability
13427| [58872] Red Hat Subscription Asset Manager CVE-2013-1823 Cross Site Scripting Vulnerability
13428| [58788] EMC Smarts Network Configuration Manager CVE-2013-2717 Multiple Unspecified Security Vulnerabilities
13429| [58786] Novell Identity Manager CVE-2013-1083 Unspecified Vulnerability
13430| [58716] EMC Smarts Network Configuration Manager CVE-2013-0935 Authentication Bypass Vulnerability
13431| [58661] IBM Tivoli Endpoint Manager CVE-2013-0452 Cross Site Request Forgery Vulnerability
13432| [58656] Free Hosting Manager Multiple SQL Injection Vulnerabilities
13433| [58645] WordPress FAQs Manager Plugin Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
13434| [58644] WordPress IndiaNIC FAQs Manager Plugin Multiple SQL Injection Vulnerabilities
13435| [58632] IBM Tivoli Endpoint Manager CVE-2013-0453 Cross Site Scripting Vulnerability
13436| [58582] OpenCart 'filemanager.php' Multiple Directory Traversal Vulnerabilities
13437| [58541] IBM Business Process Manager Unspecified Security Vulnerability
13438| [58535] RETIRED: McAfee Vulnerability Manager Unspecified Cross Site Scripting Vulnerability
13439| [58529] Novell Messenger Client CVE-2013-1085 Buffer Overflow Vulnerability
13440| [58503] WordPress LeagueManager Plugin 'league_id' Parameter SQL Injection Vulnerability
13441| [58476] Cisco Video Surveillance Operations Manager Multiple Security Vulnerabilities
13442| [58416] Disk Pool Manager Multiple SQL Injection Vulnerabilities
13443| [58401] McAfee Vulnerability Manager 'cert_cn' Parameter Cross Site Scripting Vulnerability
13444| [58313] File Manager HTML Injection and Local File Include Vulnerabilities
13445| [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
13446| [58297] IBM Tivoli Application Dependency Discovery Manager CVE-2012-5770 Man in The Middle Vulnerability
13447| [58221] Cisco Unified Communications Manager (CUCM) CVE-2013-1134 Denial of Service Vulnerability
13448| [58219] Cisco Unified Communications Manager (CUCM) CVE-2013-1133 Denial of Service Vulnerability
13449| [58179] SAP Solution Manager Diagnostics Agent Code Injection Vulnerability
13450| [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
13451| [58100] Red Hat Subscription Asset Manager CVE-2012-5604 Authentication Security Bypass Vulnerability
13452| [58076] Alt-N MDaemon WorldClient And WebAdmin Cross Site Request Forgery Vulnerability
13453| [58075] Alt-N MDaemon WorldClient User Enumeration Weakness
13454| [58074] Alt-N MDaemon WorldClient Authentication Credentials Information Disclosure Vulnerability
13455| [58073] Apache Commons HttpClient CVE-2012-5783 SSL Certificate Validation Security Bypass Vulnerability
13456| [58068] Drupal Taxonomy Manager Module Cross Site Request Forgery Vulnerability
13457| [57941] Drupal Manager Change For Organic Groups Module 'autocomplete' Cross Site Scripting Vulnerability
13458| [57904] McAfee VirusScan Enterprise and Host Intrusion Prevention Local Privilege Escalation Vulnerability
13459| [57878] IBM Tivoli Application Dependency Discovery Manager Web UI Portal Multiple Security Vulnerabilities
13460| [57750] Red Hat Enterprise Virtualization Manager CVE-2013-0168 Denial of Service Vulnerability
13461| [57749] Red Hat Enterprise Virtualization Manager CVE-2012-6115 Local Information Disclosure Vulnerability
13462| [57737] IBM Tivoli Storage Manager CVE-2013-0471 Denial of Service Vulnerability
13463| [57666] Multiple VMware Products Client-Side Authentication Memory Corruption Vulnerability
13464| [57663] HP Network Node Manager i CVE-2012-3279 Multiple Unspecified Cross Site Scripting Vulnerabilities
13465| [57658] Novell Groupwise Client CVE-2012-0439 ActiveX Control Remote Code Execution Vulnerability
13466| [57657] Novell Groupwise Client CVE-2013-0804 Multiple Remote Code Execution Vulnerabilities
13467| [57651] Schneider Electric Accutech Manager Heap Buffer Overflow Vulnerability
13468| [57567] Cisco Unified Communications Domain Manager Unspecified Cross Site Scripting Vulnerability
13469| [57560] SQLiteManager 'add_database.php' Remote PHP Code Injection Vulnerability
13470| [57518] IBM Tivoli Federated Identity Manager CVE-2012-3310 Information Disclosure Vulnerability
13471| [57483] Cisco VPN Client for Windows CVE-2012-5429 Local Denial of Service Vulnerability
13472| [57407] Oracle Sun Products Suite CVE-2013-0417 Remote Sun Storage Common Array Manager (CAM) Vulnerability
13473| [57382] Oracle Enterprise Manager Grid Control CVE-2013-0355 Cross Site Scripting Vulnerability
13474| [57378] Oracle Enterprise Manager Grid Control CVE-2013-0372 SQL Injection Vulnerability
13475| [57373] Oracle Enterprise Manager Grid Control CVE-2013-0353 SQL Injection Vulnerability
13476| [57370] Oracle Enterprise Manager Grid Control CVE-2013-0373 SQL Injection Vulnerability
13477| [57368] Oracle Enterprise Manager Grid Control CVE-2013-0374 Multiple SQL Injection Vulnerabilities
13478| [57365] Oracle Enterprise Manager Grid Control CVE-2013-0352 Cross Site Scripting Vulnerability
13479| [57361] Oracle Enterprise Manager Grid Control CVE-2013-0354 HTTP Response Splitting Vulnerability
13480| [57354] Oracle Enterprise Manager Grid Control CVE-2012-5062 Remote Security Vulnerability
13481| [57349] Oracle Enterprise Manager Grid Control CVE-2012-3219 Open Redirection Vulnerability
13482| [57348] Oracle Access Manager CVE-2012-5097 Remote Security Vulnerability
13483| [57336] Oracle Enterprise Manager Grid Control CVE-2013-0358 SQL Injection Vulnerability
13484| [57324] Siemens SIMATIC RF Manager ActiveX Control Remote Buffer Overflow Vulnerability
13485| [57208] Joomla! JEvents Component SQL Injection Vulnerability
13486| [57037] Novell iPrint Client CVE-2012-0411 Remote Code Execution Vulnerability
13487| [57005] EMC Avamar Backup Client Insecure File Permissions Vulnerability
13488| [56991] Free Hosting Manager Unspecified HTML Injection Vulnerability
13489| [56985] IBM Tivoli Storage Manager for Space Management Multiple Unauthorized Access Vulnerabilities
13490| [56954] Siemens Automation License Manager CVE-2012-4691 Denial of Service Vulnerability
13491| [56915] Symantec Enterprise Security Manager/Agent CVE-2012-4350 Local Privilege Escalation Vulnerability
13492| [56876] IBM eDiscovery Manager Unspecified Cross Site Scripting Vulnerability
13493| [56846] Symantec Endpoint Protection Manager CVE-2012-4348 Remote Code Execution Vulnerability
13494| [56825] Red Hat Enterprise Virtualization Manager Multiple Security Vulnerabilities
13495| [56822] HP Network Node Manager i CVE-2012-3275 Remote Unspecified Unauthorized Access Vulnerability
13496| [56802] Centrify Deployment Manager CVE-2012-6348 Insecure Temporary File Handling Vulnerability
13497| [56757] MODx Evolution Forgot Manager Login Plugin Security Bypass Vulnerability
13498| [56754] Free Hosting Manager 'id' Parameter SQL Injection Vulnerability
13499| [56682] EMC Smarts Network Configuration Manager (NCM) Multiple Security Bypass Vulnerabilities
13500| [56663] WordPress Zarzadzonie Kontem Plugin 'ajaxfilemanager.php' Script Arbitrary File Upload Vulnerability
13501| [56649] IBM Tivoli Endpoint Manager for Remote Control CVE-2012-4841 Denial of Service Vulnerability
13502| [56583] IBM Business Process Manager Multiple Cross Site Scripting Vulnerabilities
13503| [56576] Friends in War The FAQ Manager 'question' Parameter SQL Injection Vulnerability
13504| [56573] Hitachi Device Manager Unspecified Denial Of Service Vulnerability
13505| [56539] NetIQ Privileged User Manager 'ldapagnt_eval()' Remote Code Execution Vulnerability
13506| [56535] NetIQ Privileged User Manager Admin Password Change Authentication Bypass Vulnerability
13507| [56515] The FAQ Manager SQL Injection and Cross Site Scripting Vulnerabilities
13508| [56512] MYRE Realty Manager SQL Injection and Cross Site Scripting Vulnerabilities
13509| [56508] EMC RSA Data Protection Manager CVE-2012-4613 Authentication Bypass Vulnerability
13510| [56506] EMC RSA Data Protection Manager CVE-2012-4612 Cross Site Scripting Vulnerability
13511| [56497] OpenVAS Manager CVE-2012-5520 Remote Arbitrary Command Injection Vulnerability
13512| [56493] Eventy CMS Cross Site Scripting, HTML Injection, and SQL Injection Vulnerabilities
13513| [56478] WordPress PHP Event Calendar Plugin 'cid' Parameter SQL Injection Vulnerability
13514| [56391] IBM Tivoli Federated Identity Manager Management Console Access Bypass Vulnerability
13515| [56390] IBM Tivoli Federated Identity Manager 'OpenID' Attribute Validation Security Bypass Vulnerability
13516| [56348] Cisco Prime Data Center Network Manager Remote Command Execution Vulnerability
13517| [56342] SolarWinds Orion IP Address Manager (IPAM) 'search.aspx' Cross Site Scripting Vulnerability
13518| [56317] EMC Avamar Client for VMware Information Disclosure Vulnerability
13519| [56247] Apple Mac OS X Profile Manager Device Enumeration Weakness
13520| [56239] Microsoft Office Picture Manager Memory Corruption Denial of Service Vulnerability
13521| [56229] WordPress Cimy User Manager Plugin Arbitrary File Disclosure Vulnerability
13522| [56139] ManageEngine Security Manager Plus 'f' Directory Traversal Vulnerability
13523| [56138] ManageEngine Security Manager Plus Advanced Search SQL Injection Vulnerability
13524| [56134] IBM AIX FTP Client CVE-2012-4845 Security Bypass Vulnerability
13525| [56105] radsecproxy Client Certificate Verification Security Bypass Vulnerability
13526| [55934] Red Hat Network Configuration Client Insecure File Permissions Vulnerability
13527| [55874] Omnistar Document Manager Multiple Input Validation Vulnerabilities
13528| [55807] VMware vCenter Operations Manager Unspecified Cross-site Scripting Vulnerability
13529| [55783] Microsoft SQL Server Report Manager CVE-2012-2552 Cross Site Scripting Vulnerability
13530| [55773] HP Network Node Manager i CVE-2012-3267 Unspecified Information Disclosure Vulnerability
13531| [55767] Novell Sentinel Log Manager Unauthorized Access Vulnerability
13532| [55765] CYME ChartFX Client Server ActiveX Control Remote Code Execution Vulnerability
13533| [55732] IBM Tivoli Federated Identity Manager XML Signature Validation Security Bypass Vulnerability
13534| [55729] Novell Groupwise Client CVE-2012-0418 Unspecified Remote Code Execution Vulnerability
13535| [55717] WordPress Multisite Plugin Manager Multiple Cross Site Scripting Vulnerabilities
13536| [55706] Trend Micro Control Manager 'id' Parameter SQL Injection Vulnerability
13537| [55697] Cisco IOS and Unified Communications Manager (CVE-2012-3949) Denial of Service Vulnerability
13538| [55664] WordPress Token Manager Plugin 'tid' Parameter Cross Site Scripting Vulnerability
13539| [55645] Microsoft Internet Explorer Event Listener Use-After-Free Remote Code Execution Vulnerability
13540| [55607] iFOBS 'regclientmain.jsp' Multiple HTML Injection Vulnerabilities
13541| [55589] AxisInternet VoIP Manager Multiple Cross Site Scripting Vulnerabilities
13542| [55561] IFOBS 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities
13543| [55515] Cisco ASA CX Context-Aware Security and Prime Security Manager Denial of Service Vulnerability
13544| [55486] F5 Networks BIG-IP Application Security Manager (ASM) Cross-Site Scripting Vulnerability
13545| [55430] Microsoft System Center Configuration Manager CVE-2012-2536 Cross Site Scripting Vulnerability
13546| [55408] Microsoft System Center Operations Manager CVE-2013-0010 Cross Site Scripting Vulnerability
13547| [55401] Microsoft System Center Operations Manager CVE-2013-0009 Cross Site Scripting Vulnerability
13548| [55368] Internet Download Manager '.ef2' File Buffer Overflow Vulnerability
13549| [55300] PHP iManager Multiple HTML Injection Vulnerabilities
13550| [55203] PHP Web Scripts Ad Manager Pro Multiple HTML Injection and SQL Injection Vulnerabilities
13551| [55189] PHP Web Scripts Ad Manager Pro 'page' Parameter Local File Include Vulnerability
13552| [55187] McAfee Enterprise Mobility Manager Cross Site Scripting and Information Disclosure Vulnerabilities
13553| [55185] Multiple IBM products GSKit Client Hello Message Remote Denial of Service Vulnerability
13554| [55083] T-dah Webmail Client Multiple HTML Injection Vulnerabilities
13555| [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
13556| [55004] HP Service Manager and Service Center CVE-2012-3251 Unspecified Cross Site Scripting Vulnerability
13557| [55003] HP Service Manager and Service Center CVE-2012-3250 Unspecified Denial of Service Vulnerability
13558| [54992] GalaxyScripts Mini File Host and DaddyScripts Daddy's File Host Local File Include Vulnerability
13559| [54956] Chef 'clients.rb' Security Bypass Vulnerability
13560| [54893] T-dah Webmail Client HTML Injection Vulnerability
13561| [54847] Cisco AnyConnect Secure Mobility Client CVE-2012-2498 Certificate Validation Vulnerability
13562| [54841] Cisco AnyConnect Secure Mobility Client CVE-2012-1370 Denial of Service Vulnerability
13563| [54826] Cisco AnyConnect Secure Mobility Client Certificate Validation Security Bypass Vulnerabilities
13564| [54815] HP Network Node Manager i CVE-2012-2022 Unspecified Cross Site Scripting vulnerability
13565| [54778] Novell Remote Manager 'ProcessAuthorizationFailure()' Denial of Service Vulnerability
13566| [54774] Joomla Joomgalaxy Component SQL Injection and Arbitrary File Upload Vulnerabilities
13567| [54767] WordPress G-Lock Double Opt-in Manager Plugin SQL Injection Vulnerability
13568| [54760] Kaspersky Password Manager HTML Injection Vulnerability
13569| [54759] ManageEngine Applications Manager Multiple Cross Site Scripting and SQL Injection Vulnerabilities
13570| [54756] ManageEngine Applications Manager Multiple SQL Injection Vulnerabilities
13571| [54640] Sun Update Manager Insecure Temporary File Creation Vulnerability
13572| [54569] Oracle Enterprise Manager for Oracle Database CVE-2012-1737 Multiple SQL Injection Vulnerabilities
13573| [54492] Oracle Fusion Middleware CVE-2012-1741 Remote Enterprise Manager for Fusion Middleware Vulnerabilty
13574| [54489] WordPress LeagueManager Plugin Multiple Cross-Site Scripting Vulnerabilities
13575| [54455] Event Calender PHP Multiple Input Validation Vulnerabilities
13576| [54438] HP AssetManager Multiple HTML Injection Vulnerabilities
13577| [54417] RSA Authentication Manager Multiple Security Vulnerabilities
13578| [54336] Eclydre Web Manager 'upload.php' Arbitrary File Upload Vulnerability
13579| [54301] RSA Access Manager Server Session Replay Security Bypass Vulnerability
13580| [54296] Event Script PHP 'eventscript.php' Multiple SQL Injection Vulnerabilities
13581| [54283] Linux Kernel 'fs/eventpoll.c' Local Denial of Service Vulnerability
13582| [54261] HP Network Node Manager i CVE-2012-2018 Unspecified Cross Site Scripting vulnerability
13583| [54255] GetSimple CMS Items Manager Plugin 'php.php' Arbitrary File Upload Vulnerability
13584| [54248] PowerNet Twin Client Remote Denial of Service Vulnerability
13585| [54226] WordPress Job Manager Plugin Multiple Cross Site Scripting Vulnerabilities
13586| [54211] GNOME NetworkManager CVE-2012-2736 AdHoc Wireless Security Vulnerability
13587| [54182] SoftPerfect Bandwidth Manager Authentication Bypass Vulnerability
13588| [54119] SBLIM CIM Client Predictable Hash Collisions Denial Of Service Vulnerability
13589| [54112] IBM System Storage Manager Profiler SQL Injection and Cross Site Scripting Vulnerabilities
13590| [54108] Cisco AnyConnect Secure Mobility Client Downgrade Security Weaknesses
13591| [54107] Cisco AnyConnect Secure Mobility Client VPN Downloader Arbitrary Code Execution Vulnerabilities
13592| [54092] e107 Filemanager Plugin 'ajaxfilemanager.php' Arbitrary File Upload Vulnerability
13593| [54090] e107 Hupsis Media Gallery Plugin 'ajaxfilemanager.php' Arbitrary File Upload Vulnerability
13594| [54085] e107 Tap Plugin 'ajaxfilemanager.php' Arbitrary File Upload Vulnerability
13595| [54072] vBulletin 'event.php' HTML Injection Vulnerability
13596| [54028] Wyse Thin Client CVE-2009-0695 Remote Security Bypass Vulnerability
13597| [54015] Wyse Device Manager 'HAgent' Remote Command Execution Vulnerability
13598| [53945] XOOPS Cube PROJECT FileManager 'xupload.php' Arbitrary File Upload Vulnerability
13599| [53919] WordPress Custom Content Type Manager Plugin 'upload_form.php' Arbitrary File Upload Vulnerability
13600| [53891] WordPress Front File Manager Plugin 'Upload.php' Arbitrary File Upload Vulnerability
13601| [53871] Microsoft Internet Explorer Scrolling Events Cross Domain Information Disclosure Vulnerability
13602| [53870] Microsoft Internet Explorer CVE-2012-1881 'OnRowsInserted' Event Remote Code Execution Vulnerability
13603| [53867] Microsoft Internet Explorer CVE-2012-1878 'OnBeforeDeactivate' Event Code Execution Vulnerability
13604| [53859] IBM WebSphere Sensor Events Multiple Input Validation Vulnerabilities
13605| [53829] Ubuntu 'ubuntu-sso-client' Package SSL Certificate Validation Information Disclosure Vulnerability
13606| [53828] Ubuntu 'ubuntuone-client' Package SSL Certificate Validation Information Disclosure Vulnerability
13607| [53809] WordPress Asset Manager Plugin 'upload.php' Arbitrary File Upload Vulnerability
13608| [53804] WordPress HTML5 AV Manager Plugin 'custom.php' Arbitrary File Upload Vulnerability
13609| [53735] Sony VAIO Wireless Manager ActiveX Control 'WifiMan.dll' Multiple Buffer Overflow Vulnerabilities
13610| [53642] PHP 'com_event_sink()' Function Arbitrary Code Execution Vulnerability
13611| [53615] Linux Kernel NFS Client 'decode_getacl()' Incomplete Fix Remote Denial of Service Vulnerability
13612| [53605] Ubuntu Update Manager CVE-2012-0949 Information Disclosure Vulnerability
13613| [53604] Ubuntu Update Manager Insecure File Permissions Local Information Disclosure Vulnerability
13614| [53525] LeagueManager Multiple Cross Site Scripting Vulnerabilities
13615| [53523] WordPress Newsletter Manager Plugin Multiple Cross Site Scripting Vulnerabilities
13616| [53517] Download Manager 'cid' Parameter Cross Site Scripting Vulnerability
13617| [53435] Horde IMP Webmail Client Multiple Cross Site Scripting Vulnerabilities
13618| [53378] Microsoft Windows Partition Manager Local Privilege Escalation Vulnerability
13619| [53315] HP Systems Insight Manager Unspecified Multiple Remote Security Vulnerabilities
13620| [53311] MyClientBase Multiple SQL Injection and HTML Injection Vulnerabilities
13621| [53290] Nokia PC Suite Video Manager '.mp4' File Denial Of Service Vulnerability
13622| [53189] Mega File Manager 'name' Parameter Directory Traversal Vulnerability
13623| [53176] WordPress Download Manager Plugin 'cid' Parameter Cross Site Scripting Vulnerability
13624| [53175] Hitachi JP1/IT Desktop Management - Manager Multiple Vulnerabilities
13625| [53092] Oracle Enterprise Manager CVE-2012-0512 SQL Injection Vulnerability
13626| [53081] Oracle Database Server CVE-2012-0520 Remote Enterprise Manager Base Platform Vulnerability
13627| [53079] Oracle Identity Manager Connector CVE-2012-0515 Remote Vulnerability
13628| [53063] Oracle Enterprise Manager CVE-2012-0525 SQL Injection Vulnerability
13629| [53060] Oracle Identity Manager CVE-2012-0532 Remote Vulnerability
13630| [52986] WordPress All-in-One Event Calendar Plugin Multiple Cross Site Scripting Vulnerabilities
13631| [52883] IBM Event Pump for z/OS Password Information Disclosure Vulnerability
13632| [52792] Typo3 Event Board ('kb_eventboard') Extension Unspecified SQL Injection Vulnerability
13633| [52785] TYPO3 Realty Manager Extension Unspecified Security Vulnerability
13634| [52749] HP OpenView Performance Manager CVE-2012-0127 Remote Code Execution Vulnerability
13635| [52747] Novell iManager Unspecified Cross Site Scripting, HTML Injection and SQL Injection Vulnerabilities
13636| [52724] IBM WebSphere Application Server 'SSLClientAuth' Security Bypass Vulnerability
13637| [52723] IBM WebSphere Application Server Virtual Member Manager Security Bypass Vulnerability
13638| [52718] FlexNet License Server Manager 'lmgrd' Component Stack Buffer Overflow Vulnerability
13639| [52701] Event Calendar PHP 'cal_year' Parameter Cross Site Scripting Vulnerability
13640| [52526] VMware View Manager Portal Cross-site Scripting Vulnerability
13641| [52514] IBM Tivoli Endpoint Manager 'ScheduleParam' Cross Site Scripting Vulnerability
13642| [52503] Presto! PageManager Multiple Security Vulnerabilities
13643| [52482] Cisco Adaptive Security Appliances (ASA) 5500 Clientless VPN Remote Code Execution Vulnerability
13644| [52429] LTSP Display Manager Keybindings Security Bypass Vulnerability
13645| [52427] osFileManager Multiple Input Validation Vulnerabilities
13646| [52376] VMware vCenter Chargeback Manager Information Disclosure and Denial of Service Vulnerabilities
13647| [52373] Holdem Manager Multiple Memory Corruption Vulnerabilities
13648| [52359] 2X Client TuxClientSystem ActiveX Control 'InstallClient()' Insecure Method Vulnerability
13649| [52298] AjaXplorer 'class.AJXP_ClientDriver.php' Multiple Local File Include Vulnerabilities
13650| [52252] IBM Tivoli Provisioning Manager Express ActiveX Control Remote Code Execution Vulnerability
13651| [52248] Tivoli Provisioning Manager Express for Software Distribution Multiple SQL Injection Vulnerabilities
13652| [52233] Novell Groupwise Client CVE-2011-4189 Address Book Parsing Remote Code Execution Vulnerability
13653| [52213] Cisco Unified Communications Manager SCCP (CVE-2011-4487) SQL Injection Vulnerability
13654| [52211] Cisco Unified Communications Manager SCCP (CVE-2011-4486) Denial of Service Vulnerability
13655| [52206] GNOME NetworkManager Local Arbitrary File Access Vulnerability
13656| [52205] Hitachi JP1/Cm2/Network Node Manager i Multiple Unspecified Remote Code Execution Vulnerabilities
13657| [52080] Mitra Iranian CMS 'manager.php' Remote Arbitrary File Upload Vulnerability
13658| [52062] Novell GroupWise Messenger Client '.nmx' File Stack-Based Buffer Overflow Vulnerability
13659| [51994] Sonexis ConferenceManager Multiple Information Disclosure and Security Bypass Vulnerabilities
13660| [51965] Symantec pcAnywhere Client/Server Input Handling Denial of Service Vulnerability
13661| [51926] Novell iPrint Client Multiple Remote Code Execution Vulnerabilities
13662| [51893] ManageEngine ADManager Plus Multiple Cross Site Scripting Vulnerabilities
13663| [51796] ManageEngine Applications Manager Multiple Cross Site Scripting and SQL Injection Vulnerabilities
13664| [51767] Mindjet MindManager 2012 DLL Loading Arbitrary Code Execution Vulnerabilities
13665| [51747] Hitachi JP1/IT Desktop Management Manager Unspecified Cross Site Scripting Vulnerability
13666| [51725] phux Download Manager 'file' Parameter SQL Injection Vulnerability
13667| [51703] Wicd 'wicd/configmanager.py' Local Information Disclosure Vulnerability
13668| [51639] SolarWinds Storage Manager Server SQL Injection Vulnerability
13669| [51575] Drupal CKEditor EventHandler HTML Injection Vulnerability
13670| [51561] Tucan Manager CVE-2012-0063 Plugin Update Security Bypass Vulnerability
13671| [51537] Cisco Digital Media Manager (CVE-2012-0329) Remote Privilege Escalation Vulnerability
13672| [51471] Oracle Web Services Manager CVE-2011-3531 Remote Oracle Web Services Manager Vulnerability
13673| [51463] Oracle Web Services Manager CVE-2011-3568 Remote Oracle Web Services Manager Vulnerability
13674| [51431] Giveaway Manager 'members.php' Cross Site Scripting Vulnerability
13675| [51416] PHP Membership Site Manager Script 'index.php' Cross Site Scripting Vulnerability
13676| [51294] SQLiteManager Multiple Cross Site Scripting Vulnerabilities
13677| [51104] Novell Sentinel Log Manager 'filename' Parameter Directory Traversal Vulnerability
13678| [51079] Hitachi JP1/ServerConductor/DeploymentManager Directory Traversal Vulnerability
13679| [51064] IBM Tivoli Federated Identity Manager SAML Signature Validation Security Bypass Vulnerability
13680| [51049] HP OpenView Network Node Manager 'nnmRptConfig.exe' Remote Code Execution Vulnerability
13681| [50993] acpid Power Button Events Local Privilege Escalation Vulnerability
13682| [50965] Trend Micro Control Manager 'CmdProcessor.exe' Remote Code Execution Vulnerability
13683| [50945] acpid Event Scripts Local Information Disclosure Vulnerability
13684| [50930] Red Hat Identity Management 'ipa-client' Cross Site Request Forgery Vulnerability
13685| [50919] EPractize Labs Subscription Manager 'showImg.php' PHP Code Injection Vulnerability
13686| [50895] HP Device Access Manager for HP ProtectTools Heap Memory Corruption Vulnerability
13687| [50833] Ubuntu Update Manager GPG Signature Verification Security Bypass Vulnerability
13688| [50832] Ubuntu Update Manager Insecure Temporary Directory Creation Vulnerability
13689| [50831] Siemens Automation License Manager 'almaxcx.dll' ActiveX Arbitrary File Overwrite Vulnerability
13690| [50830] Siemens Automation License Manager Buffer Overflow and Denial of Service Vulnerabilities
13691| [50806] HP Network Node Manager i Multiple Cross Site Scripting Vulnerabilities
13692| [50794] Pro Clan Manager SQL Injection Vulnerability
13693| [50766] GNOME NetworkManager (CVE-2006-7246) SSL Certificate Validation Security Bypass Vulnerability
13694| [50731] Blogs Manager 'SearchField' Parameter Multiple SQL Injection Vulnerabilities
13695| [50724] Zenprise Device Manager Cross Site Request Forgery Vulnerability
13696| [50704] HP-UX System Administration Manager Local Privilege Escalation Vulnerability
13697| [50691] Attachmate Reflection FTP Client LIST Command Remote Heap Buffer Overflow Vulnerability
13698| [50655] Linux Kernel NFS Client 'decode_getacl()' Remote Denial of Service Vulnerability
13699| [50635] HP Network Node Manager i Multiple Cross Site Scripting Vulnerabilities
13700| [50603] Apache Tomcat Manager Application Security Bypass Vulnerability
13701| [50559] IBM Rational Asset Manager Security Bypass Vulnerability
13702| [50556] IBM Rational Asset Manager Unspecified Cross Site Scripting Vulnerability
13703| [50537] Parallel::ForkManager Insecure Temporary File Creation Vulnerability
13704| [50523] Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability
13705| [50519] RSA Key Manager Appliance Session Handling Local Security Bypass Vulnerability
13706| [50504] Citrix XenDesktop Client Drive Mapping Policy Local Security Bypass Vulnerability
13707| [50503] Serv-U Web Client Unspecified Cross Site Scripting Vulnerability
13708| [50471] HP OpenView Network Node Manager Multiple Remote Code Execution Vulnerabilities
13709| [50418] Empathy 'nickname' Field 'me-type' Event Cross Site Scripting Vulnerability
13710| [50398] Enspire eClient Unspecified SQL Injection Vulnerability
13711| [50367] Novell iPrint Client 'nipplib.dll' Remote Code Execution Vulnerability
13712| [50358] Symantec Endpoint Protection Manager Remote Denial of Service Vulnerability
13713| [50337] Radius Manager 'admin.php' SQL Injection Vulnerability
13714| [50308] Skype Technologies Skype Client for Windows File Transfer Remote Buffer Overflow Vulnerability
13715| [50256] Oracle Siebel CRM CVE-2011-3518 Siebel Core - UIF Client Remote Vulnerability
13716| [50212] Oracle Fusion Middleware CVE-2011-2237 Remote Oracle Web Services Manager Vulnerability
13717| [50209] Oracle Fusion Middleware CVE-2011-3523 Remote Oracle Web Services Manager Vulnerability
13718| [50191] Joomla NoNumber! Extension Manager Plugin Local File Include and PHP code Injection Vulnerabilities
13719| [50079] Hitachi JP1/Cm2/Network Node Manager Multiple Unspecified Remote Vulnerabilities
13720| [50009] WordPress Eventify Plugin 'npath' Parameter Remote File Include Vulnerability
13721| [50007] VLC Media Player 'httpd_ClientRecv()' Heap Based Buffer Overflow Vulnerability
13722| [49983] Microsoft Forefront Unified Access Gateway 'MicrosoftClient.Jar' Remote Code Execution Vulnerability
13723| [49962] Microsoft Internet Explorer OnLoad Event CVE-2011-1997 Memory Corruption Vulnerability
13724| [49935] Novell Identity Manager 'apwaDetail' Multiple Cross Site Scripting Vulnerabilities
13725| [49831] TYPO3 Hut-Manager Unspecified SQL Injection Vulnerability
13726| [49820] Cisco IOS and Unified Communications Manager (CVE-2011-2072) Denial of Service Vulnerability
13727| [49785] GNOME NetworkManager Local Privilege Escalation Vulnerability
13728| [49742] Symantec IM Manager Code Injection Vulnerability
13729| [49739] Symantec IM Manager Cross Site Scripting Vulnerability
13730| [49738] Symantec IM Manager SQL Injection Vulnerability
13731| [49662] iManager 'crop.php' Arbitrary File Deletion Vulnerability
13732| [49546] RETIRED: WordPress Event Registration 'event_id' Parameter SQL Injection Vulnerability
13733| [49538] Spring Security 'RunAsManager' Local Privilege Escalation Vulnerability
13734| [49505] WordPress Community Events Plugin 'id' Parameter SQL Injection Vulnerability
13735| [49501] WordPress WP-Filebase Download Manager 'base' Parameter SQL Injection Vulnerability
13736| [49498] Juniper IDP Appliance Configuration Manager Unspecified Cross Site Scripting Vulnerability
13737| [49485] WordPress Eventify Simple Events 'fetcheventdetails.php' SQL Injection Vulnerability
13738| [49456] Hitachi JP1/Cm2/Network Node Manager Multiple Unspecified Denial Of Service Vulnerabilities
13739| [49443] 1C-Bitrix Site Manager Multiple HTML Injection Vulnerabilities
13740| [49432] Novell Cloud Manager/PlateSpin RPC Methods Remote Code Execution Vulnerability
13741| [49428] BroadWin WebAccess Client 'bwocxrun.ocx ' Multiple Remote Vulnerabilities
13742| [49372] IBM Tivolio Federated Identity Manager Multiple Unspecified Vulnerabilities
13743| [49368] Event Registration Plugin for WordPress 'id' Parameter SQL Injection Vulnerability
13744| [49309] Zazavi 'filemanager/controller.php' Arbitrary File Upload Vulnerability
13745| [49302] Cisco Unified Communications Manager (CUCM) Multiple Denial of Service Vulnerabilities
13746| [49299] Cisco Unified Communications Manager and Presence Server Information Disclosure Vulnerability
13747| [49281] WordPress WP Events Calendar 'ec_management.class.php' Cross Site Scripting Vulnerability
13748| [49251] OTRS 'AdminPackageManager.pm' Local File Disclosure Vulnerability
13749| [49191] FlexNet License Server Manager Remote Code Execution Vulnerability
13750| [49152] Linux Kernel 'perf_count_sw_cpu_clock' Event Denial of Service Vulnerability
13751| [49128] QT client qtnx '~/.qtnx/*.nxml' Insecure File Permissions Vulnerability
13752| [49110] HP ProLiant SL Advanced Power Manager Unspecified Remote Security Bypass Vulnerability
13753| [49070] Intel Active System Console and Multi-Server Manager Remote Denial of Service Vulnerability
13754| [49023] Microsoft Internet Explorer Event Handlers Cross Domain Information Disclosure Vulnerability
13755| [48956] Avaya Media Application Server Client Remote Code Execution Vulnerability
13756| [48937] SCO UnixWare License Policy Manager Daemon 'sco_pmd' Unspecified Denial Of Service Vulnerability
13757| [48927] FlexNet License Server Manager 'lmadmin' Component Heap Buffer Overflow Vulnerability
13758| [48891] ClamAV Hash Manager Off-By-One Denial of Service Vulnerability
13759| [48794] Oracle Enterprise Manager Grid Control CVE-2011-0845 Remote Database Control Vulnerability
13760| [48760] Oracle Oracle Enterprise Manager Grid Control CVE-2011-0875 Remote EMCTL Vulnerability
13761| [48756] Oracle Fusion Middleware CVE-2011-0884 Remote Oracle BPEL Process Manager Vulnerability
13762| [48742] Oracle Database Server and Enterprise Manager Grid CVE-2011-2244 Security Framework Vulnerability
13763| [48740] Oracle Database Server CVE-2011-0830 Remote Event Management Vulnerability
13764| [48739] Oracle Enterprise Manager Grid Control Security Framework Session Modification Vulnerability
13765| [48738] Oracle Enterprise Manager Grid Control CVE-2011-0816 CMDB Metadata &
13766| [48737] Oracle Database Server Enterprise Manager Console CVE-2011-0876 Remote Security Vulnerability
13767| [48732] Oracle Database Server and Enterprise Grid Manager CVE-2011-0882 Content Management Vulnerability
13768| [48662] Trend Micro Control Manager 'module' Parameter Directory Traversal Vulnerability
13769| [48652] Trend Micro Control Manager 'CASProcessor.exe' BLOB Remote Code Execution Vulnerability
13770| [48638] Trend Micro Control Manager 'Cas_LogDirectInsert.aspx' Arbitrary Account Creation Vulnerability
13771| [48625] Hitachi HiRDB Control Manager Agent Unspecified Remote Command Execution Vulnerability
13772| [48609] LuxCal Event Calendar SQL Injection Vulnerability
13773| [48580] Linux Kernel 'x86_assign_hw_event()' Local Denial of Service Vulnerability
13774| [48549] DMXReady Account List Manager 'inc_accountlistmanager.asp' SQL Injection Vulnerability
13775| [48547] DMXReady Catalog Manager 'CatalogManager/inc_catalogmanager.asp' SQL Injection Vulnerability
13776| [48481] HP Operations Manager 'Register' Request Arbitrary File Deletion Vulnerability
13777| [48462] Ubisoft CoGSManager ActiveX Control 'Initialize()' Method Stack Buffer Overflow Vulnerability
13778| [48449] JomSocial Event Module HTML Injection Vulnerability
13779| [48396] GNOME NetworkManager 'auth_admin' Security Bypass Vulnerability
13780| [48391] Eshop Manager Multiple SQL Injection Vulnerabilities
13781| [48331] Helium Music Manager DLL Loading Arbitrary Code Execution Vulnerability
13782| [48313] Trend Micro Control Manager 'ApHost' Parameter Cross Site Scripting Vulnerability
13783| [48303] AMHSHOP 'event' Parameter SQL Injection Vulnerability
13784| [48272] Avaya IP Office Manager TFTP Server Remote Directory Traversal Vulnerability
13785| [48225] Trend Micro Data Loss Prevention Directory Traversal Vulnerability
13786| [48218] GNOME NetworkManager '/var/log/messages' Information Disclosure Vulnerability
13787| [48184] Microsoft Windows Server Message Block Client Remote Code Execution Vulnerability
13788| [48181] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Memory Corruption Vulnerability
13789| [48168] HP Service Manager and Service Center Multiple Vulnerabilities
13790| [48127] ACDSee Picture Frame Manager DLL Loading Arbitrary Code Execution Vulnerability
13791| [48124] Novell iPrint Client Multiple Remote Code Execution Vulnerabilities
13792| [48093] mcCMS 'manager.php' Arbitrary File Upload Vulnerability
13793| [48084] GNOME Display Manager URI Scheme Handler Local Privilege Escalation Vulnerability
13794| [48081] Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability
13795| [48077] Cisco AnyConnect Secure Mobility Client Local Privilege Escalation Vulnerability
13796| [48038] Fortinet FortiClient SSL VPN Insecure Temporary File Creation Vulnerability
13797| [48002] WebDefend Enterprise Manager Appliance Hard Coded Authentication Security Bypass Vulnerability
13798| [47923] Open Handset Alliance Android Event Model Security Bypass Weakness
13799| [47903] Cisco Unified Operations Manager Common Services Device Center Cross Site Scripting Vulnerability
13800| [47901] Cisco Unified Operations Manager Multiple Cross Site Scripting Vulnerabilities
13801| [47900] IBM Virtualization Manager Unspecified Security Vulnerability
13802| [47898] Cisco Unified Operations Manager Multiple SQL Injection Vulnerabilities
13803| [47896] MDaemon Server WorldClient Email Subject HTML Injection Vulnerability
13804| [47855] osCommerce 'banner_manager.php' Arbitrary File Upload Vulnerability
13805| [47803] HP Network Node Manager i Local Security Bypass Vulnerability
13806| [47765] PassmanLite Password Manager for Android Information Disclosure Vulnerability
13807| [47744] VMware vSphere Client Installer Package Digital Signature Security Weakness
13808| [47743] WP-DBManager Arbitrary File Download Vulnerability and Cross Site Request Forgery Vulnerability
13809| [47689] WP-DBManager 'wp-config.php' Arbitrary File Download Vulnerability
13810| [47674] LDAP Account Manager 'selfserviceSaveOk' Parameter Cross Site Scripting Vulnerability
13811| [47652] OProfile 'opcontrol' Utility 'set_event()' Local Privilege Escalation Vulnerability
13812| [47621] cPanel X3 File Manager Module Cross-Site Scripting Vulnerability
13813| [47611] Cisco Unified Communications Manager SIP Message (CVE-2011-1606) Denial of Service Vulnerability
13814| [47610] Cisco Unified Communications Manager SIP Message (CVE-2011-1605) Denial of Service Vulnerability
13815| [47609] Cisco Unified Communications Manager SIP Message (CVE-2011-1604) Denial of Service Vulnerability
13816| [47608] Cisco Unified Communications Manager (CVE-2011-1607) Directory Traversal Vulnerability
13817| [47607] Cisco Unified Communications Manager 'xmldirectorylist.jsp' Multiple SQL Injection Vulnerabilities
13818| [47605] Cisco Unified Communications Manager (CVE-2011-1609) SQL Injection Vulnerability
13819| [47593] Football Website Manager SQL Injection and Multiple HTML Injection Vulnerabilities
13820| [47559] 360 Web Manager 'assetmanager.php' Multiple Arbitrary File Access Vulnerabilities
13821| [47537] Asterisk Manager Interface Arbitrary Command Execution Security Bypass Vulnerability
13822| [47513] HP Systems Insight Manager CVE-2011-1543 Unspecified Cross Site Request Forgery Vulnerability
13823| [47511] HP Systems Insight Manager CVE-2011-1542 Unspecified Cross Site Scripting Vulnerability
13824| [47498] OpenVAS Manager Report Format Plugin Code Execution Vulnerability
13825| [47490] Oracle OpenSSO & Java System Access Manager CVE-2011-0844 Remote Vulnerability
13826| [47487] Oracle Java System Access Manager Policy Agent CVE-2011-0846 Remote Web Proxy Agent Vulnerability
13827| [47481] Oracle OpenSSO & Java System Access Manager CVE-2011-0847 Remote Vulnerability
13828| [47451] Oracle Database and Enterprise Manager Grid Control Multiple SQL Injection Vulnerabilities
13829| [47445] Oracle PeopleSoft Enterprise HRMS CVE-2011-0858 Remote Talent Acquisition Manager Vulnerability
13830| [47426] Universal Post Manager WordPress Plugin Cross Site Scripting and SQL Injection Vulnerabilities
13831| [47420] HP Network Node Manager i Unspecified Local Security Bypass Vulnerability
13832| [47418] XOOPS 'imagemanager.php' Local File Include Vulnerability
13833| [47372] Sonexis ConferenceManager 'AudioResourceContainer.asp' SQL Injection Vulnerability
13834| [47358] Dotclear Media Manager Arbitrary File Upload Vulnerability
13835| [47347] Open Text FirstClass Client 'FCP://' URI and DLL Loading Arbitrary Code Execution Vulnerabilities
13836| [47341] HP Network Node Manager i Unspecified Cross Site Scripting and Unauthorized Access Vulnerabilities
13837| [47324] BlackBerry Enterprise Server Web Desktop Manager Component Cross Site Scripting Vulnerability
13838| [47297] ManageEngine Applications Manager 'Upload.do' Arbitrary File Upload Vulnerability
13839| [47289] Sonexis ConferenceManager 'hostlogin.asp' SQL Injection Vulnerability
13840| [47239] Microsoft Windows SMB Client Remote Code Execution Vulnerability
13841| [47221] Sonexis ConferenceManager Multiple Cross Site Scripting and HTML Injection Vulnerabilities
13842| [47176] ISC DHCP 'dhclient' Shell Characters in Response Remote Code Execution Vulnerability
13843| [47162] HP Network Node Manager i Unspecified Information Disclosure Vulnerability
13844| [47076] Joomla Joomanager Component Unspecified Parameter SQL Injection Vulnerability
13845| [47064] rsync Client Incremental File List Remote Memory Corruption Vulnerability
13846| [47063] GNOME Display Manager Race Condition Local Privilege Escalation Vulnerability
13847| [47021] Avaya IP Office Manager TFTP Server Remote Denial of Service Vulnerability
13848| [47017] Ripe Website Manager Cross Site Scripting and Multiple SQL Injection Vulnerabilities
13849| [47014] MC Content Manager Multiple Cross Site Scripting Vulnerabilities
13850| [46974] Apache HttpComponents 'HttpClient' Information Disclosure Vulnerability
13851| [46897] Asterisk Manager Interface Remote Denial of Service Vulnerability
13852| [46877] CMS WebManager-Pro 'menu_id' Parameter Cross Site Scripting Vulnerability
13853| [46875] RSA Access Manager Server CVE-2011-0322 Security Bypass Vulnerability
13854| [46862] HP Client Automation Remote Code Execution Vulnerability
13855| [46830] HP Power Manager Unspecified Cross Site Scripting Vulnerability
13856| [46678] Microsoft Remote Desktop Connection Client DLL Loading Arbitrary Code Execution Vulnerability
13857| [46630] Linux Kernel epoll Subsystem 'eventpoll.c' Multiple Local Denial of Service Vulnerabilities
13858| [46590] WordPress ComicPress Manager Plugin 'lang' Parameter Cross Site Scripting Vulnerability
13859| [46578] libcgroup 'cgrulesengd' Daemon Netlink Messages Event Spoofing Vulnerability
13860| [46552] Sybase Afaria Data Security Manager for Symbian Login Security Bypass Vulnerability
13861| [46547] F-Secure Policy Manager 'WebReporting' Module Cross Site Scripting Vulnerability
13862| [46539] CA Host-Based Intrusion Prevention System 'XMLSecDB' ActiveX Control Code Execution Vulnerability
13863| [46526] Cisco TelePresence Manager Multiple Vulnerabilities
13864| [46513] GNOME Display Manager 'PostLogin' script Security Bypass Weakness
13865| [46456] MySQL Eventum 'full_name' Field HTML Injection Vulnerability
13866| [46424] IBM FileNet Content Manager Rendition Engine Unspecified Security Bypass Vulnerability
13867| [46380] MySQL Eventum Multiple HTML Injection Vulnerabilities
13868| [46264] OpenSSL OCSP Stapling 'ClientHello' Handshake Message Parsing Security Vulnerability
13869| [46261] HP-UX 'rpc.cmsd' Calendar Manager Daemon Remote Buffer Overflow Vulnerability
13870| [46258] HP Power Manager Unspecified Cross Site Request Forgery Vulnerability
13871| [46253] Computer Associates eTrust Secure Content Manager Remote Code Execution Vulnerability
13872| [46177] Apache Tomcat SecurityManager Security Bypass Vulnerability
13873| [46175] Hitachi Tuning Manager Unspecified Cross Site Scripting Vulnerability
13874| [46174] Apache Tomcat HTML Manager Interface HTML Injection Vulnerability
13875| [46156] Moxa Device Manager 'MDMUtil.dll' Remote Buffer Overflow Vulnerability
13876| [46099] Terminal Server Client '.rdp' File Processing Remote Denial of Service Vulnerability
13877| [46010] WordPress ImageManager Plugin 'manager.php' Arbitrary File Upload Vulnerability
13878| [45987] OpenVAS Manager Remote Arbitrary Command Injection Vulnerability
13879| [45967] MC Content Manager 'article.php' SQL Injection Vulnerability
13880| [45946] Symantec IM Manager 'eval()' Code Injection Vulnerability
13881| [45929] HP OpenView Storage Data Protector Cell Manager 'crs.exe' Remote Code Execution Vulnerability
13882| [45894] OpenJDK 'IcedTea' plugin JNLPSecurityManager Remote Code Execution Vulnerability
13883| [45883] Oracle Database and Enterprise Manager Grid Control Remote Code Execution Vulnerability
13884| [45875] Oracle Transportation Manager CVE-2010-4432 Remote Security Vulnerability
13885| [45874] Oracle Enterprise Manager Real User Experience Insight (RUEI) SQL Injection Vulnerability
13886| [45853] Oracle Solaris CDE Calendar Manager Service Daemon Remote Buffer Overflow Vulnerability
13887| [45843] Trend Micro Control Manager Server Agent Communication Stack Buffer Overflow Vulnerability
13888| [45841] Ruby Version Manager Escape Sequence Command Injection Vulnerability
13889| [45836] IBM Tivoli Access Manager for e-business Unspecified Directory Traversal Vulnerability
13890| [45765] Cisco IOS CallManager Express (CME) (CVE-2009-5040) Denial of Service Vulnerability
13891| [45762] HP OpenView Network Node Manager Multiple Remote Code Execution Vulnerabilities
13892| [45751] Newv SmartClient 'NewvCommon.ocx' ActiveX Control Multiple Vulnerabilities
13893| [45728] NetSupport Manager Remote Buffer Overflow Vulnerability
13894| [45725] HP Data Protector Manager Remote Denial of Service Vulnerability
13895| [45692] Novell Identity Manager Unspecified Cross Site Scripting Vulnerability
13896| [45676] Linux Kernel 'kvm_vcpu_events.interrupt.pad' Field Local Information Disclosure Vulnerability
13897| [45665] IBM Tivoli Access Manager for e-business (CVE-2010-4623) Remote Denial Of Service Vulnerability
13898| [45644] ChurchInfo 'ListEvents.php' SQL Injection Vulnerability
13899| [45582] IBM Tivoli Access Manager for e-business Directory Traversal Vulnerability
13900| [45559] Joomla! 'com_adsmanager' Component Remote File Include Vulnerability
13901| [45525] S9Y Serendipity 'manager.php' Arbitrary File Upload Vulnerability
13902| [45519] PHP Web Scripts Ad Manager Pro 'pageId' Parameter SQL Injection Vulnerability
13903| [45499] Elcom CommunityManager.NET Session Cookie Authentication Bypass Vulnerability
13904| [45481] Radius Manager Multiple Cross Site Scripting Vulnerabilities
13905| [45396] SAP NetWeaver Business Client ActiveX Control Multiple Remote Code Execution Vulnerabilities
13906| [45334] ManageEngine EventLog Analyzer 6.1 Multiple Cross Site Scripting Vulnerabilities
13907| [45331] ManageEngine EventLog Analyzer Syslog Buffer Overflow Vulnerability
13908| [45301] Novell iPrint Client Multiple Remote Code Execution Vulnerabilities
13909| [45245] RDM Embedded Lock Manager 'lm_tcp' Service Buffer Overflow Vulnerability
13910| [45202] Techno Dreams FAQ Manager Package 'faqlist.asp' SQL Injection Vulnerability
13911| [45199] WebEx Meeting Manager WebexUCFObject ActiveX DLL Loading Arbitrary Code Execution Vulnerability
13912| [45128] HP Data Protector Manager Remote Denial of Service Vulnerability
13913| [45050] JE Ajax Event Calendar 'event_id' Parameter SQL Injection Vulnerability
13914| [45031] Juniper NetScreen-Remote VPN Client Security Bypass Vulnerability
13915| [44966] Novell iPrint Client 'ienipp.ocx' ActiveX 'GetDriverSettings()' Buffer Overflow Vulnerability
13916| [44861] Linux Kernel 'perf_event_mmap()' Local Denial of Service Vulnerability
13917| [44851] Event Registration Plugin for WordPress 'event_id' Parameter SQL Injection Vulnerability
13918| [44672] Cisco Unified Communications Manager Invalid Argument Privilege Escalation Vulnerability
13919| [44629] NetSupport Manager Gateway HTTP Protocol Information disclosure vulnerability
13920| [44591] CMS WebManager-Pro Cross Site Scripting and SQL Injection Vulnerabilities
13921| [44480] Internet Download Manager 'Schannel.dll' DLL Loading Arbitrary Code Execution Vulnerability
13922| [44474] ACDSee Photo Manager DLL Loading Arbitrary Code Execution Vulnerability
13923| [44438] Profile Manager Basic Insecure Cookie Authentication Bypass Vulnerability
13924| [44431] HP Version Control Repository Manager Unspecified Cross Site Scripting Vulnerability
13925| [44396] DM FileManager Insecure Cookie Authentication Bypass Vulnerability
13926| [44382] IBM Tivoli Access Manager for e-business Multiple Cross Site Scripting Vulnerabilities
13927| [44377] Virtue News Manager 'news_detail.php' SQL Injection and Cross Site Scripting Vulnerabilities
13928| [44326] HP Virtual Connect Enterprise Manager Arbitrary File Download Vulnerability
13929| [44311] TheGreenBow IPSec VPN Client 'tgbvpn.sys' NULL Pointer Dereference Denial of Service Vulnerability
13930| [44299] Symantec IM Manager Multiple SQL Injection Vulnerabilities
13931| [44274] PHP eMail Manager 'ID' Parameter SQL Injection Vulnerability
13932| [44265] HP Systems Insight Manager Unspecified Remote Privilege Escalation Vulnerability
13933| [44263] HP Systems Insight Manager CVE-2010-3288 Unspecified Cross Site Request Forgery Vulnerability
13934| [44262] HP Systems Insight Manager CVE-2010-3289 Unspecified Cross Site Scripting Vulnerability
13935| [44261] HP AssetCenter and AssetManager Unspecified Cross Site Scripting Vulnerability
13936| [44198] Phoenix Project Manager DLL Loading Arbitrary Code Execution Vulnerability
13937| [44178] Sahar Money Manager 'unicows.dll' DLL Loading Arbitrary Code Execution Vulnerability
13938| [44176] Document Manager Unspecified Security Vulnerability
13939| [44172] IBM Rational Quality Manager and Test Lab Manager Remote Code Execution Vulnerability
13940| [44165] AdvertisementManager 'req' Parameter Local and Remote File Include Vulnerabilities
13941| [44143] Roxio CinePlayer 'IAManager.dll' ActiveX Control Remote Heap Buffer Overflow Vulnerability
13942| [44120] Heartlogic HL-SiteManager Unspecified SQL Injection Vulnerability
13943| [44108] Cisco AnyConnect VPN Trial Client Insecure Temporary File Creation Vulnerability
13944| [44098] HP Systems Insight Manager Arbitrary File Download Vulnerability
13945| [44088] Electrasoft 32Bit FTP Client 'LIST' Command Remote Buffer Overflow Vulnerability
13946| [44084] FTPShell Client 'PWD' Command Remote Buffer Overflow Vulnerability
13947| [44049] Oracle Siebel Core CVE-2010-2406 Remote Siebel Core - Highly Interactive Client Vulnerabilities
13948| [44039] Oracle Siebel Suite CVE-2010-3500 Remote Siebel Core - Highly Interactive Client Vulnerability
13949| [44033] Oracle Siebel Suite CVE-2010-2405 Remote Siebel Core - Highly Interactive Client Vulnerability
13950| [44001] Oracle E-Business Suite CVE-2010-2388 Remote Oracle Applications Manager Vulnerability
13951| [43967] Oracle Sun Java System Identity Manager CVE-2010-3546 Unspecified Remote Vulnerability
13952| [43945] Oracle Enterprise Manager Grid Control CVE-2010-2390 Remote EM Console Vulnerability
13953| [43935] Oracle Database Server CVE-2010-2419 Java SecurityManager Vulnerability
13954| [43931] Oracle WebLogic Server Node Manager UNC Path Remote Security Vulnerability
13955| [43900] Site2Nite Auto e-Manager 'detail.asp' SQL Injection Vulnerability
13956| [43896] IBM Tivoli Provisioning Manager TCP to ODBC Gateway Component SQL Injection Vulnerability
13957| [43859] Feindura File Manager Arbitrary File Upload Vulnerability
13958| [43851] Trend Micro Client/Server Security Agent Unspecified Local Denial Of Service Vulnerability
13959| [43825] Mega File Manager Local File Include and SQL Injection Vulnerabilities
13960| [43821] Joomla Club Manager Component 'cm_id' Parameter SQL Injection Vulnerability
13961| [43805] DM FileManager 'album.php' Remote File Include Vulnerability
13962| [43804] DM FileManager 'dm-albums.php' Local File Disclosure Vulnerability
13963| [43795] RSA Authentication Client SENSITIVE and NON-EXTRACTABLE Objects Information Disclosure Vulnerability
13964| [43635] Novell iManager 'getMultiPartParameters()' Arbitrary File Upload Vulnerability
13965| [43542] Synology DiskStation Manager FTP Log Multiple HTML Injection Vulnerabilities
13966| [43533] Siemens SIMATIC Manager Step7 Project Folder DLL Loading Arbitrary Code Execution Vulnerability
13967| [43466] Collaborative Passwords Manager (cPassMan) Multiple Local File Include Vulnerabilities
13968| [43426] HP OpenView Network Node Manager Unspecified Denial of Service Vulnerability
13969| [43394] Cisco IOS And Unified Communications Manager (CVE-2010-2834) Denial of Service Vulnerability
13970| [43391] Cisco IOS And Unified Communications Manager (CVE-2010-2835) Denial of Service Vulnerability
13971| [43295] NitroSecurity NitroView Enterprise Security Manager (ESM) Local Privilege Escalation Vulnerability
13972| [43289] BACnet OPC Client Buffer Overflow Vulnerability
13973| [43283] gnome-power-manager Logout Multiple Local Information Disclosure Vulnerabilities
13974| [43179] NCP Secure Entry Client DLL Loading Arbitrary Code Execution Vulnerabilities
13975| [43136] IBM Records Manager Multiple Unspecified Remote Vulnerabilities
13976| [43126] FTPShell Client Name Session Remote Stack Buffer Overflow Vulnerability
13977| [43089] RSA Access Manager Agent Security Bypass Vulnerability
13978| [43085] RSA Access Manager Server Cache Update Security Bypass Vulnerability
13979| [43071] openSUSE Novell Client 'novfs' Local Buffer Overflow Vulnerability
13980| [43024] DMXReady Members Area Manager 'membersareamanager.asp' Multiple HTML Injection Vulnerabilities
13981| [43003] Webformatique Reservation Manager `index.php' Cross Site Scripting Vulnerability
13982| [42995] Bip `bip_on_event()` NULL Pointer Dereference Remote Denial Of Service Vulnerability
13983| [42990] DMXReady Polling Booth Manager 'inc_pollingboothmanager.asp' SQL Injection Vulnerability
13984| [42971] MYRE Holiday Rental Manager SQL Injection and Cross Site Scripting Vulnerabilities
13985| [42968] T-HTB manager 'index.php' Multiple SQL Injection Vulnerabilities
13986| [42951] CMS WebManager-Pro 'c.php' SQL Injection Vulnerability
13987| [42919] Model Agency Manager PRO Multiple SQL Injection Vulnerabilities
13988| [42877] Hitachi JP1/Integrated Manager Unspecified Denial Of Service Vulnerability
13989| [42876] Hitachi JP1/ServerConductor/Control Manager Unexpected Data Denial Of Service Vulnerability
13990| [42849] Internet Download Manager 'idmmkb.dll' DLL Loading Arbitrary Code Execution Vulnerability
13991| [42834] Novell Identity Manager '/tmp/idmInstall.log' Information Disclosure Vulnerability
13992| [42780] Red Hat GNOME Display Manager 64-Bit Operation Security Bypass Vulnerability
13993| [42745] Adobe Extension Manager CS5 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability
13994| [42734] BlastChat Client Cross Site Scripting Vulnerability
13995| [42711] Red Hat qspice-client Race Condition Vulnerability
13996| [42698] Cisco Unified Communications Manager SIP Message (CVE-2010-2838) Denial of Service Vulnerability
13997| [42696] Cisco Unified Communications Manager SIP Message (CVE-2010-2837) Denial of Service Vulnerability
13998| [42639] Red Hat Enterprise Virtualization Manager SSL Certificate Verification Security Bypass Vulnerability
13999| [42636] HP OpenView Network Node Manager Unspecified Remote Code Execution Vulnerability
14000| [42611] DeskShare Auto FTP Manager Directory Traversal Vulnerability
14001| [42609] netStartEnterprise 'previeweventdetail.aspx' SQL Injection Vulnerability
14002| [42576] Novell iPrint Client Multiple Security Vulnerabilities
14003| [42549] IBM Tivoli Storage Manager FastBack Remote Code Execution and Denial of Service Vulnerabilities
14004| [42483] TT Web Site Manager 'index.php' SQL Injection Vulnerability
14005| [42468] KnowledgeTree 'KTUploadManager.inc.php' Security Bypass Vulnerability
14006| [42441] Porta+ FTP Client Directory Traversal Vulnerability
14007| [42438] SoftX FTP Client Directory Traversal Vulnerability
14008| [42417] Zmanda Recovery Manager for MySQL Multiple Local Privilege Escalation Vulnerabilities
14009| [42380] TYPO3 Event Extension Unspecified SQL Injection Vulnerability
14010| [42328] Tencent QQ Computer Manager 'TSKsp.sys' Driver IOCTL Handling Local Denial of Service Vulnerability
14011| [42271] Novell Sentinel Log Manager Multiple Tomcat Servlet Remote Code Execution Vulnerabilities
14012| [42258] Microsoft Internet Explorer Event Handler Cross Domain Information Disclosure Vulnerability
14013| [42154] HP OpenView Network Node Manager 'OvJavaLocale' Cookie Value Remote Code Execution Vulnerability
14014| [42150] Citrix Online Plug-In and ICA Client Heap Overflow Remote Code Execution Vulnerability
14015| [42122] 32bit FTP Client Directory Traversal Vulnerability
14016| [42104] Akamai Download Manager Arbitrary File Download Vulnerability
14017| [42101] JP1/Cm2/Network Node Manager Remote Code Execution and Denial of Service Vulnerabilities
14018| [42100] Novell iPrint Client Multiple Security Vulnerabilities
14019| [42072] EMO Breeder Manager 'video.php' SQL Injection Vulnerability
14020| [42062] Quartz Concept Content Manager Admin Login Multiple SQL Injection Vulnerabilities
14021| [42016] GNOME Display Manager '/var/log/messages' Information Disclosure Vulnerability
14022| [41996] Event Horizon 'modfile.php' Multiple Cross Site Scripting Vulnerabilities
14023| [41949] MC Content Manager SQL Injection and Cross Site Scripting Vulnerabilities
14024| [41921] Mandos Client Password Information Disclosure Vulnerability
14025| [41850] RSA Federated Identity Manager URI Redirection Vulnerability
14026| [41839] HP OpenView Network Node Manager CVE-2010-2704 Multiple Code Execution Vulnerabilities
14027| [41829] HP OpenView Network Node Manager 'execvp_nc()' Code Execution Vulnerability
14028| [41798] IBM FileNet Content Manager 'InheritParentPermissions' Flag Security Bypass Vulnerability
14029| [41654] HP Client Automation Enterprise Infrastructure (Radia) Information Disclosure Vulnerability
14030| [41645] Oracle PeopleSoft Enterprise HCM CVE-2010-2401 Remote eProfile Manager Vulnerability
14031| [41636] Oracle Transportation Manager CVE-2010-2371 Unspecified Local Vulnerability
14032| [41633] Oracle Access Manager/OpenSSO CVE-2009-3763 Authentication Remote Vulnerability
14033| [41631] Oracle Transportation Manager CVE-2010-2372 Remote Vulnerability
14034| [41628] Oracle E-Business Suite CVE-2010-0913 Remote Oracle Applications Manager Vulnerability
14035| [41614] Oracle E-Business Suite CVE-2010-0905 Remote Oracle Applications Manager Vulnerability
14036| [41600] Oracle Enterprise Manager Grid Control 10g CVE-2010-2373 Remote Console Vulnerability
14037| [41580] Event Horizon 'modfile.php' Multiple SQL Injection Vulnerabilities
14038| [41579] HP Virtual Connect Enterprise Manager Unspecified Cross Site Scripting Vulnerability
14039| [41573] WebKit Geolocation Events Use After Free Memory Corruption Vulnerability
14040| [41564] CMS Made Simple Download Manager Module Arbitrary File Upload Vulnerability
14041| [41509] Model Agency Manager 'search_process.php' Cross-Site Scripting Vulnerability
14042| [41507] Real Estate Manager 'index.php' Cross-Site Scripting Vulnerability
14043| [41485] Joomla! Music Manager Component 'album.html' Local File Include Vulnerability
14044| [41438] Datenator 'event.php' SQL Injection Vulnerability
14045| [41379] HTC Touch Viva (T2223) Unspecified Client-Side Remote Vulnerability
14046| [41378] Apple iPad Unspecified Client-Side Remote Vulnerability
14047| [41373] Online Contact Manager 'view.php' Multiple Input Validation Vulnerabilities
14048| [41369] eventCal Component for Joomla! 'Itemid' Parameter SQL Injection Vulnerability
14049| [41361] Multiple Tripwire Interactive Games 'STEAMCLIENTBLOB' Multiple Denial Of Service Vulnerabilities
14050| [41351] Joomla! Front-End Article Manager System Component Arbitrary File Upload Vulnerability
14051| [41337] Novell Identity Manager Roles Based Provisioning Multiple Cross Site Scripting Vulnerabilities
14052| [41288] ALPHA Ethernet Adapter II Web-Manager Security Bypass Vulnerability
14053| [41256] Joomanager Joomla Component 'catid' Parameter SQL Injection Vulnerability
14054| [41219] Hitachi JP1/ServerConductor/DeploymentManager DPM Denial Of Service Vulnerability
14055| [41168] Joomla! JE Event Calendar Component 'view' Parameter Local File Include Vulnerability
14056| [41121] Dynamic DNS Update Client Credentials Obfuscation Vulnerability
14057| [41062] Simple File Manager 'filename' Parameter Directory Traversal Vulnerability
14058| [41058] Joomla! JE Ajax Event Calendar Component 'view' Parameter SQL Injection Vulnerability
14059| [41045] Red Hat Enterprise Virtualization Manager Postzero Parameter Information Disclosure Vulnerability
14060| [41043] SoftComplex PHP Event Calendar Multiple Remote Vulnerabilities
14061| [41040] Skype Technologies Skype Client for Mac Chat Feature Remote Denial of Service Vulnerability
14062| [41004] UFO: Alien Invasion IRC Client Multiple Remote Buffer Overflow Vulnerabilities
14063| [40931] Novell Access Manager Administration Console 'getEntry()' Arbitrary File Upload Vulnerability
14064| [40887] Apple Mac OS X Folder Manager Symbolic Link Handling Security Bypass Vulnerability
14065| [40873] HP OpenView Network Node Manager CVE-2010-1964 Remote Buffer Overflow Vulnerability
14066| [40775] ISC DHCP Server find_length() Zero-Length Client Identifier Remote Denial Of Service Vulnerability
14067| [40692] DMXReady Online Notebook Manager 'onlinenotebookmanager.asp' SQL Injection Vulnerability
14068| [40687] Virtual Real Estate Manager 'listing_detail.asp' SQL Injection Vulnerability
14069| [40662] WebKit Hover Event Handling Remote Code Execution Vulnerability
14070| [40649] WebKit 'ConditionEventListener' Remote Code Execution Vulnerability
14071| [40645] WebKit Marquee Event 'SelectionController' Remote Code Execution Vulnerability
14072| [40638] HP OpenView Network Node Manager 'ovutil.dll' Stack Buffer Overflow Vulnerability
14073| [40637] HP OpenView Network Node Manager 'ovwebsnmpsrv.exe' Bad Option Stack Buffer Overflow Vulnerability
14074| [40625] EMO Realty Manager 'cat1' Parameter SQL Injection Vulnerability
14075| [40622] cPanel Image Manager 'target' Parameter Local File Include Vulnerability
14076| [40514] Trend Micro Data Loss Prevention Web Chat Content Filtering Security Bypass Vulnerability
14077| [40496] Kodak Gallery Easy Upload Manager ActiveX Control Unspecified Security Vulnerability
14078| [40492] Red Hat Client Tools 'loginAuth.pkl' Local Security Bypass Vulnerability
14079| [40485] Novell iManager Long TREE Field Off-By-One Denial of Service Vulnerability
14080| [40480] Novell iManager Schema Create Class Stack Buffer Overflow Vulnerability
14081| [40456] osCommerce Online Merchant 'file_manager.php' Remote Arbitrary File Upload Vulnerability
14082| [40427] Novell Access Manager Identity Server X.509 Authentication Security Bypass Vulnerability
14083| [40387] TheGreenBow VPN Client Stack Buffer Overflow Vulnerability
14084| [40378] 360 Web Manager 'webpages-form-led-edit.php' SQL Injection Vulnerability
14085| [40355] ManageEngine ADManager Plus 'computerName' Parameter Cross Site Scripting Vulnerability
14086| [40325] IBM WebSphere Application Server Nodeagent/Deployment Manager Remote Denial Of Service Vulnerability
14087| [40309] Rumba FTP Client 'FTPSFtp.dll' ActiveX Control Buffer Overflow Vulnerability
14088| [40214] Joomla! 'com_event' Component 'id' Parameter SQL Injection Vulnerability
14089| [40200] 'com_event' Joomla! Component SQL Injection and Local File Include Vulnerabilities
14090| [40196] WebSAM DeploymentManager Denial of Service Vulnerability
14091| [40179] JE Ajax Event Calendar 'index.php' Local File Include Vulnerability
14092| [40174] Cisco Router and Security Device Manager Unspecified Cross Site Scripting Vulnerability
14093| [40152] Free Download Manager Metalink File Directory Traversal Vulnerability
14094| [40151] AdvertisementManager 'usr' Parameter Cross Site Scripting Vulnerability
14095| [40146] Free Download Manager Multiple Remote Buffer Overflow Vulnerabilities
14096| [40111] HP Systems Insight Manager CVE-2010-1556 Unspecified Unauthorized Access Vulnerability
14097| [40072] HP OpenView Network Node Manager 'getnnmdata.exe' Code Execution Vulnerability
14098| [40071] HP OpenView Network Node Manager 'getnnmdata.exe' Stack Buffer Overflow Vulnerability
14099| [40070] HP OpenView Network Node Manager 'getnnmdata.exe' Remote Code Execution Vulnerability
14100| [40068] HP OpenView Network Node Manager (CVE-2010-1552) 'doLoad()' Remote Buffer Overflow Vulnerability
14101| [40067] HP OpenView Network Node Manager (CVE-2010-1551) '_OVParseLLA()' Remote Code Execution Vulnerability
14102| [40065] HP OpenView Network Node Manager ovet_demandpoll Format String Remote Code Execution Vulnerability
14103| [39973] Site Manager 'id' Parameter SQL Injection Vulnerability
14104| [39960] phpunity.newsmanager 'misc/tell_a_friend/tell.php' Local File Include Vulnerability
14105| [39895] RealVNC 4.1.3 'ClientCutText' Message Remote Denial of Service Vulnerability
14106| [39882] Password Manager Daemon (pwmd) Binary Key File Insecure Encryption Vulnerability
14107| [39843] Event Horizon Multiple SQL Injection Vulnerabilities
14108| [39822] Internet Download Manager FTP Buffer Overflow Vulnerability
14109| [39736] HP Systems Insight Manager Unspecified Cross Site Request Forgery Vulnerability
14110| [39735] HP Systems Insight Manager Unspecified Cross Site Scripting Vulnerability
14111| [39734] HP Systems Insight Manager Unspecified Remote Privilege Escalation Vulnerability
14112| [39683] Rumba FTP Client File Name Remote Stack Buffer Overflow Vulnerability
14113| [39637] HP Virtual Machine Manager for Windows Unspecified Remote Privilege Escalation Vulnerability
14114| [39615] Adobe Download Manager 'gp.ocx' ActiveX Control Buffer Overflow Vulnerability
14115| [39582] Joomla! Online News Paper Manager Component Multiple SQL Injection Vulnerabilities
14116| [39578] HP Operations Manager Buffer Overflow Vulnerability
14117| [39568] Flex File Manager Arbitrary File Upload Vulnerability
14118| [39546] ZiMB Manager Joomla! Component 'controller' Parameter Local File Include Vulnerability
14119| [39539] e107 'content_manager.php' HTML Injection Vulnerability
14120| [39519] Joomla! 'com_manager' Component 'Itemid' Parameter SQL Injection Vulnerability
14121| [39481] Network Vulnerabilities Scan system 'roleManager.jsp' SQL Injection Vulnerability
14122| [39474] Iomega Home Media Network Hard Drive 'smbwebclient.php' Authentication Bypass Vulnerability
14123| [39457] Oracle Java System Access Manager CVE-2010-0894 Remote Vulnerability
14124| [39438] Oracle Transportation Manager CVE-2010-0869 Oracle Transportation Management Remote Vulnerability
14125| [39387] Preventive and Reservation Joomla! Component 'controller' Parameter Local File Include Vulnerability
14126| [39383] JProject Manager Joomla! Component 'controller' Parameter Local File Include Vulnerability
14127| [39382] Multi-Venue Restaurant Menu Manager Joomla! Component 'mid' Parameter SQL Injection Vulnerability
14128| [39370] Aladdin eToken PKI Client ETV File Remote Code Execution Vulnerability
14129| [39357] 'am-utils' Package 'amqsvc_is_client_allowed()' Security Bypass Vulnerability
14130| [39340] Microsoft Windows SMB Client Message Size Remote Code Execution Vulnerability
14131| [39339] Microsoft Windows SMB Client Transaction Response Remote Stack Buffer Overflow Vulnerability
14132| [39336] Microsoft Windows SMB Client Response Parsing Remote Code Execution Vulnerability
14133| [39312] Microsoft Windows SMB Client Memory Allocation Remote Code Execution Vulnerability
14134| [39158] phpunity.newsmanager 'id' Parameter Local File Include Vulnerability
14135| [39056] IBM WebSphere Application Server Orb Client Remote Denial Of Service Vulnerability
14136| [39027] Microsoft Internet Explorer 'onreadystatechange' Event Handler Remote Code Execution Vulnerability
14137| [38954] E-Php Scripts CMS 'event_desc.php' SQL Injection Vulnerability
14138| [38940] Cisco IOS For Communication Manager Express SCCP (CVE-2010-0586) Denial of Service Vulnerability
14139| [38936] Cisco IOS For Communication Manager Express SCCP (CVE-2010-0585) Denial of Service Vulnerability
14140| [38928] Sun Connection Update Manager for Solaris Multiple Insecure Temporary File Creation Vulnerabilities
14141| [38833] IBM DB2 Content Manager Web Services Unspecified Vulnerability
14142| [38811] TYPO3 Power Extension Manager Unspecified Information Disclosure Vulnerability
14143| [38774] RogioBiz PHP File Manager 'file_manager.php' Multiple SQL Injection Vulnerabilities
14144| [38719] Zigurrat Farsi CMS 'manager/textbox.asp' SQL Injection Vulnerability
14145| [38667] EasyBits Extras Manager 'skype-plugin' URI Handler Arbitrary XML File Deletion Vulnerability
14146| [38573] Spectrum Software WebManager CMS 'pojam' Parameter Cross Site Scripting Vulnerability
14147| [38572] Nabernet Content Manager 'articles.php' SQL Injection Vulnerability
14148| [38546] WordPress Events Registration with PayPal IPN Component Multiple SQL Injection Vulnerabilities
14149| [38503] Cisco Digital Media Manager Default Credentials Authentication Bypass Vulnerability
14150| [38502] Cisco Digital Media Manager Information Disclosure Vulnerability
14151| [38501] Cisco Unified Communications Manager SCCP (CVE-2010-0588) Denial of Service Vulnerability
14152| [38500] Cisco Digital Media Manager (CVE-2010-0571) Remote Privilege Escalation Vulnerability
14153| [38498] Cisco Unified Communications Manager SIP Message (CVE-2010-0591) Denial of Service Vulnerability
14154| [38497] Cisco Unified Communications Manager CTI Manager Service Denial of Service Vulnerability
14155| [38496] Cisco Unified Communications Manager SCCP (CVE-2010-0587) Denial of Service Vulnerability
14156| [38495] Cisco Unified Communications Manager SIP Message (CVE-2010-0590) Denial of Service Vulnerability
14157| [38428] Hitachi JP1/Cm2/Network Node Manager Insecure File Permissions Vulnerability
14158| [38410] Symantec Altiris Deployment Solution 'dbmanager.exe' Denial Of Service Vulnerability
14159| [38392] Bispage Content Manager Admin Page SQL Injection Vulnerability
14160| [38376] Computer Associates eHealth Performance Manager Web Interface Cross-Site Scripting Vulnerability
14161| [38333] Infragistics NetAdvantage for Web Client Directory Traversal Vulnerability
14162| [38326] Samba 'client/mount.cifs.c' Local Denial of Service Vulnerability
14163| [38252] Portrait Software Portrait Campaign Manager Multiple Cross Site Scripting Vulnerabilities
14164| [38241] Symantec IM Manager Console HTML Injection Vulnerability
14165| [38222] Symantec Client Proxy ActiveX Control Buffer Overflow Vulnerability
14166| [38186] Interspire Knowledge Manager 'callback.snipshot.php' Arbitrary File Creation Vulnerability
14167| [38174] HP OpenView Network Node Manager Remote Command Execution Vulnerability
14168| [38100] Microsoft Windows SMB Client Race Condition Remote Code Execution Vulnerability
14169| [38098] Microsoft Windows Client/Server Run-time Subsystem Local Privilege Escalation Vulnerability
14170| [38095] Interspire Knowledge Manager 'admin/remote.php' PHP Code Injection Vulnerability
14171| [38093] Microsoft Windows SMB Client Pool Corruption Remote Code Execution Vulnerability
14172| [38090] Interspire Knowledge Manager 5.1.3 and Prior Multiple Remote Vulnerabilities
14173| [38089] Oracle OpenSolaris Insecure Default Configuration kclient(1M)) and CIFS Security Vulnerability
14174| [38050] Joomla! JEvents Search Plugin 'eventsearch.php' SQL Injection Vulnerability
14175| [38046] Multiple Vendors Email Clients DNS prefetching Domain Name Information Disclosure Vulnerability
14176| [38033] Joomla! 'com_gambling' Component 'gamblingEvent' Parameter SQL Injection Vulnerability
14177| [38012] Joomla! 'com_jeeventcalendar' Component 'event_id' Parameter SQL Injection Vulnerability
14178| [38003] ejabberd 'client2server' Message Remote Denial of Service Vulnerability
14179| [37959] NetSupport Manager Denial of Service Vulnerability
14180| [37926] Oracle WebLogic Server Node Manager 'beasvc.exe' Remote Command Execution Vulnerability
14181| [37873] HP Power Manager 'formExportDataLogs' Directory Traversal Remote Code Execution Vulnerability
14182| [37867] HP Power Manager 'formExportDataLogs' Buffer Overflow Remote Code Execution Vulnerability
14183| [37866] HP Power Manager Script Login URI Buffer Overflow Remote Code Execution Vulnerability
14184| [37829] Zeus Web Server 'SSL2_CLIENT_HELLO' Remote Buffer Overflow Vulnerability
14185| [37799] Joomla! 'com_articlemanager' Component 'artid' Parameter SQL Injection Vulnerability
14186| [37797] Public Media Manager Multiple SQL Injection Vulnerabilities
14187| [37781] TYPO3 MJS Event Pro (mjseventpro) Unspecified SQL Injection Vulnerability
14188| [37780] Mozilla Firefox Yoono Extension 'img' Tag DOM Event Handler Remote Code Injection Vulnerability
14189| [37755] Sun Java System Identity Manager Privilege Escalation Vulnerability
14190| [37739] Oracle Application Server CVE-2010-0066 Access Manager Identity Server Remote Vulnerability
14191| [37672] Novell iManager Importing/Exporting Schema Stack Buffer Overflow Vulnerability
14192| [37607] WP Events Calendar Plugin for WordPress 'event_id' Parameter SQL Injection Vulnerability
14193| [37580] NetworkManager Security Bypass and Information Disclosure Vulnerabilities
14194| [37458] Webformatique Car Manager Joomla! Component 'msg' Parameter Cross Site Scripting Vulnerability
14195| [37386] HP OpenView Storage Data Protector Cell Manager Database Service Integer Overflow Vulnerability
14196| [37348] HP OpenView Network Node Manager 'snmpviewer.exe' Remote Code Execution Vulnerability
14197| [37347] HP OpenView Network Node Manager 'ovalarm.exe' Remote Buffer Overflow Vulnerability
14198| [37345] HP OpenView Network Node Manager Unspecified Remote Code Execution Vulnerability
14199| [37343] HP OpenView Network Node Manager 'ovwebsnmpsrv.exe' Remote Stack Buffer Overflow Vulnerability
14200| [37341] HP OpenView Network Node Manager 'webappmon.exe' Remote Buffer Overflow Vulnerability
14201| [37340] HP OpenView Network Node Manager 'OvWebHelp.exe' Remote Heap Buffer Overflow Vulnerability
14202| [37336] ManageEngine Password Manager Pro Cross Site Scripting Vulnerability
14203| [37330] HP OpenView Network Node Manager 'ovsessionmgr.exe ' Remote Heap Buffer Overflow Vulnerability
14204| [37313] GNOME NetworkManager Applet SSL Certificate Validation Security Bypass Vulnerability
14205| [37300] HP OpenView Network Node Manager Perl CGI Executables Remote Code Execution Vulnerability
14206| [37299] HP OpenView Network Node Manager 'Oid' Parameter Remote Buffer Overflow Vulnerability
14207| [37298] HP OpenView Network Node Manager 'nnmRptConfig.exe' 'strcat()' Remote Code Execution Vulnerability
14208| [37296] HP OpenView Network Node Manager 'nnmRptConfig.exe' Remote Code Execution Vulnerability
14209| [37295] HP OpenView Network Node Manager 'ovlogin.exe' Multiple Remote Code Execution Vulnerabilities
14210| [37294] HP OpenView Network Node Manager Unspecified Stack Buffer Overflow Vulnerability
14211| [37289] ManageEngine OpManager 'overview.do' SQL Injection Vulnerability
14212| [37284] Sun Ray Server Authentication Manager Remote Code Execution Vulnerability
14213| [37261] RETIRED: HP OpenView Network Node Manager Multiple Remote Code Execution Vulnerabilities
14214| [37250] HP OpenView Data Protector Application Recovery Manager Stack Buffer Overflow Vulnerability
14215| [37242] Novell iPrint Client Remote Buffer Overflow Vulnerabilities
14216| [37152] Multiple Vendor Clientless SSL VPN Products Same Origin Policy Bypass Vulnerability
14217| [37143] Robo-FTP Client Server Response Handling Unspecified Remote Buffer Overflow Vulnerability
14218| [37129] Sun Solaris LDAP Client Configuration Cache Daemon Local Denial of Service Vulnerability
14219| [37123] Mozilla Firefox Yoono Extension DOM Event Handler Cross Domain Scripting Vulnerability
14220| [37086] HP Operations Manager Remote Unauthorized Access Vulnerability
14221| [37077] Cisco VPN Client for Windows 'StartServiceCtrlDispatche' Local Denial of Service Vulnerability
14222| [37046] HP OpenView Network Node Manager 'ovdbrun.exe' Denial of Service Vulnerability
14223| [37004] McAfee Network Security Manager Information Disclosure Vulnerability
14224| [37003] McAfee Network Security Manager Multiple Cross Site Scripting Vulnerabilities
14225| [36985] Apple Mac OS X QuickDraw Manager Remote Code Execution Vulnerability
14226| [36966] Apple Mac OS X Event Monitor Log Parsing Denial of Service Vulnerability
14227| [36964] Apple Mac OS X Screen Sharing Client Multiple Remote Code Execution Vulnerabilities
14228| [36961] Apple Mac OS X AFP Client Multiple Remote Code Execution Vulnerabilities
14229| [36933] HP Power Manager Management Web Server Login Remote Code Execution Vulnerability
14230| [36916] IBM Tivoli Storage Manager Multiple Remote Vulnerabilities
14231| [36903] BlackBerry Desktop Manager ActiveX Control Remote Code Execution Vulnerability
14232| [36895] RhinoSoft Serv-U Web Client HTTP Request Remote Buffer Overflow Vulnerability
14233| [36852] Mozilla Firefox Download Manager World Writable File Local Privilege Escalation Vulnerability
14234| [36794] Linux Kernel NFSV4 CallbackClient NULL Pointer Dereference Local Denial of Service Vulnerability
14235| [36765] Oracle Database CVE-2009-1018 Workspace Manager Unspecified Vulnerability
14236| [36755] Oracle Database CVE-2009-1964 Remote Workspace Manager Vulnerability
14237| [36740] Websense Email Security and Email Manager 'STEMWADM.EXE' Remote Denial of Service Vulnerability
14238| [36716] QEMU VNC Client Disconnect Use After Free Remote Code Execution Vulnerability
14239| [36692] Adobe Reader and Acrobat Trust Manager Remote Security Bypass Vulnerability
14240| [36620] Microsoft Internet Explorer 'Event' Object Copy Constructor Remote Code Execution Vulnerability
14241| [36612] BulletProof FTP Client Malformed '.bps' File Stack Buffer Overflow Vulnerability
14242| [36596] Apache HTTP Server Solaris Event Port Pollset Support Remote Denial Of Service Vulnerability
14243| [36575] BackupPC 'ClientNameAlias()' Security Bypass Vulnerability
14244| [36551] IBM Tivoli Composite Application Manager for WebSphere Unspecified Cross-Site Scripting
14245| [36549] IBM Installation Manager 'iim://' URI Handling Remote Code Execution Vulnerability
14246| [36541] Interspire Knowledge Manager 'p' Parameter Directory Traversal Vulnerability
14247| [36509] Lyris ListManager Multiple Remote Vulnerabilities
14248| [36498] Cisco Unified Communications Manager Express Extension Mobility Buffer Overflow Vulnerability
14249| [36496] Cisco Unified Communications Manager SIP Message Denial of Service Vulnerability
14250| [36464] Joomla! Survey Manager Component SQL Injection Vulnerability
14251| [36462] HP ProCurve Identity Driven Manager (IDM) Unspecified Privilege Escalation Vulnerability
14252| [36459] EasyBits Extras Manager Unspecified Vulnerability
14253| [36422] SaphpLesson 'CLIENT_IP' Parameter SQL Injection Vulnerability
14254| [36398] Novell GroupWise Client 'gxmim1.dll' ActiveX Control Buffer Overflow Vulnerability
14255| [36354] Apple Mac OS X Alias Manager Buffer Overflow Vulnerability
14256| [36329] Drupal Subdomain Manager Module Multiple Unspecified Vulnerabilities
14257| [36327] FTPShell Client 'CWD' Command Remote Buffer Overflow Vulnerability
14258| [36293] IBM Tivoli Identity Manager User Profile HTML Injection Vulnerability
14259| [36264] Novell ZENworks Asset Manager 7.5 Multiple Unspecified Vulnerabilities
14260| [36258] HP Operations Dashboard Portal Default Manager Account Remote Security Vulnerability
14261| [36253] HP Operations Manager Default Manager Account Remote Security Vulnerability
14262| [36248] HP OpenView Network Node Manager Multiple Remote Vulnerabilities
14263| [36231] Novell iPrint Client ActiveX Control Unspecified Buffer Overflow Vulnerability
14264| [36219] Red Hat GNOME Display Manager Security Bypass Vulnerability
14265| [36198] Basic PHP Events Lister 2 Multiple Administrative Scripts Authentication Bypass Vulnerabilities
14266| [36190] Hitachi Device Manager IPv6 Security Bypass Vulnerability
14267| [36152] Cisco Unified Communications Manager Multiple Denial of Service Vulnerabilities
14268| [36139] Novell Client ActiveX Control 'nwsetup.dll' Unspecified Remote Denial of Service Vulnerability
14269| [36136] TYPO3 Event Registration Extension Unspecified SQL Injection Vulnerability
14270| [36111] Symantec Altiris Deployment Solution 'Aclient' Local Privilege Escalation Vulnerability
14271| [36110] Symantec Altiris Deployment Solution 'DBManager' Authentication Bypass Vulnerability
14272| [36102] IBM AFS Client Denial of Service Vulnerability
14273| [36101] Multiple Vendor BSD 'kevent()' Race Condition Vulnerability
14274| [36078] Computer Associates Host-Based Intrusion Prevention System Remote Denial Of Service Vulnerability
14275| [36034] SAP NetWeaver Application Server 'uddiclient/process' HTML Injection Vulnerability
14276| [36002] SQLiteManager 'main.php' Cross Site Scripting Vulnerability
14277| [35971] Microsoft Remote Desktop Connection Client Heap Based Buffer Overflow Vulnerability
14278| [35963] Sun Java System Access Manager Debug Files Local Information Disclosure Vulnerability
14279| [35961] Sun Java System Access Manager CDCServlet Component Information Disclosure Vulnerability
14280| [35940] SILC Client Format String Vulnerability
14281| [35938] IBM Tivoli Key Lifecycle Manager Password Unspecified Vulnerability
14282| [35933] SAP Business One 2005 License Manager 'NT_Naming_Service.exe' Buffer Overflow Vulnerability
14283| [35892] Modeling Agency Manager 'photos.php' SQL Injection Vulnerability
14284| [35788] Sun Java System Access Manager Policy Agent Denial of Service Vulnerability
14285| [35779] IBM Tivoli Identity Manager Session Fixation Vulnerability
14286| [35778] Akamai Download Manager ActiveX Control Redswoosh Download Stack Buffer Overflow Vulnerability
14287| [35752] Novell Privileged User Manager Remote Library Injection Vulnerability
14288| [35740] NOS getPlus Download Manager Insecure File Permissions Local Privilege Escalation Vulnerability
14289| [35734] Novell Access Manager Administration Console Information Disclosure Vulnerability
14290| [35720] dB Masters Multimedia Content Manager 'id' Parameter SQL Injection Vulnerability
14291| [35698] Oracle Highly Interactive Client CVE-2009-1981 Unspecified Local Vulnerability
14292| [35696] Oracle PeopleSoft Enterprise HRMS eProfile Manager CVE-2009-1988 Remote Vulnerability
14293| [35695] Oracle E-Business Suite CVE-2009-1986 Remote Oracle Applications Manager Vulnerability
14294| [35675] RETIRED: Oracle Complex Event Processing CVE-2009-1523 Remote Vulnerability
14295| [35668] ISC DHCP 'dhclient' 'script_write_params()' Stack Buffer Overflow Vulnerability
14296| [35665] Hitachi Web Server Client SSL Certificate Handling Unspecified Vulnerability
14297| [35650] Wyse Thin Client 'hagent.exe' Unspecified Buffer Overflow Vulnerability
14298| [35649] Wyse Device Manager Unspecified Remote Buffer Overflow Vulnerability
14299| [35639] Pirch IRC Client Remote Buffer Overflow Vulnerability
14300| [35566] IBM Tivoli Identity Manager Multiple Cross Site Scripting Vulnerabilities
14301| [35527] Sun Java System Access Manager Cross-Domain Controller (CDC) Cross Site Scripting Vulnerability
14302| [35479] Cisco Video Surveillance Stream Manager Firmware Denial of Service Vulnerability
14303| [35437] Sun Solaris Event Port API Multiple Local Denial of Service Vulnerabilities
14304| [35434] Apple iPhone and iPod touch Mail Client Information Disclosure Weakness
14305| [35413] Mozilla Firefox 'nsViewManager.cpp' Denial of Service Vulnerability
14306| [35404] McAfee Policy Manager 'naPolicyManager.dll' Arbitrary File Overwrite Vulnerability
14307| [35400] Sun Solaris 'lp' Client Local Denial Of Service Vulnerability
14308| [35315] WebKit JavaScript 'onload()' Event Cross Domain Scripting Vulnerability
14309| [35286] Drupal Taxonomy Manager Administrative Page HTML Injection Vulnerability
14310| [35272] WebKit Drag Event Remote Information Disclosure Vulnerability
14311| [35271] WebKit DOM Event Handler Remote Memory Corruption Vulnerability
14312| [35267] HP OpenView Network Node Manager 'rping' Stack Buffer Overflow Vulnerability
14313| [35228] IBM FileNet Content Manager Cached Subject Security Bypass Vulnerability
14314| [35224] Microsoft Internet Explorer Event Handler Uninitialized Memory Remote Code Execution Vulnerability
14315| [35177] AlstraSoft Article Manager Pro 'article/register.php' Remote File Upload Vulnerability
14316| [35133] Citrix Password Manager Secondary Credentials Local Information Disclosure Vulnerability
14317| [35094] SonicWALL Global Security Client Local Privilege Escalation Vulnerability
14318| [35093] SonicWALL Global VPN Client Log File Remote Format String Vulnerability
14319| [35092] SonicWALL Global VPN Client 'RampartSvc' Local Privilege Escalation Vulnerability
14320| [35039] DMXReady Registration Manager 'assetmanager.asp' Arbitrary File Upload Vulnerability
14321| [35035] DM FileManager 'Username' and 'Password' SQL Injection Vulnerabilities
14322| [34964] Nortel Contact Center Manager Administration Password Disclosure Vulnerability
14323| [34933] Dream Windows Max CMS 'admin_manager.asp' SQL Injection Vulnerability
14324| [34889] LuxBum 'manager.php' Multiple SQL Injection Vulnerabilities
14325| [34812] HP OpenView Network Node Manager Remote Unspecified Code Execution Vulnerability
14326| [34803] IBM Tivoli Storage Manager Multiple Vulnerabilities
14327| [34738] HP OpenView Network Node Manager 'ovalarmsrv.exe' Remote Code Execution Vulnerability
14328| [34642] Trend Micro OfficeScan Client Denial of Service Vulnerability
14329| [34626] Online Contact Manager Multiple Cross Site Scripting Vulnerabilities
14330| [34608] Seditio Events Plugin 'c' Parameter SQL Injection Vulnerability
14331| [34591] Online Email Manager Insecure Cookie Authentication Bypass Vulnerability
14332| [34555] Online Password Manager Insecure Cookie Authentication Bypass Vulnerability
14333| [34546] Localization Client Drupal Module HTML Injection Vulnerability
14334| [34454] Cisco Subscriber Edge Services Manager Cross Site Scripting And HTML Injection Vulnerabilities
14335| [34451] HP ProCurve Manager and ProCurve Manager Plus Unauthorized Access Vulnerability
14336| [34407] OpenAFS Unix Cache Manager Heap-Based Buffer Overflow Vulnerability
14337| [34343] Fortinet FortiClient VPN Connection Name Local Format String Vulnerability
14338| [34313] Hitachi JP1/Cm2/Network Node Manager Shared Trace Service Denial Of Service Vulnerability
14339| [34294] HP OpenView Network Node Manager 'OvOSLocale' Cookie Parameter Heap Buffer Overflow Vulnerability
14340| [34289] Diskos CMS Manager Multiple SQL Injection Vulnerabilities
14341| [34285] IBM Tivoli Storage Manager Multiple Vulnerabilities
14342| [34226] HP-UX VERITAS File System and VERITAS Oracle Disk Manager Local Privilege Escalation Vulnerability
14343| [34191] Sun Java System Identity Manager Multiple Vulnerabilities
14344| [34142] cPanel Legacy File Manager File Name HTML Injection Vulnerability
14345| [34135] HP OpenView Network Node Manager 'Accept-Language' HTTP Header Heap Buffer Overflow Vulnerability
14346| [34134] HP OpenView Network Node Manager 'OvAcceptLang' Parameter Heap Buffer Overflow Vulnerability
14347| [34082] Cisco Unified Communications Manager PAB Synchronizer Privilege Escalation Vulnerability
14348| [34078] Hewlett-Packard WMI Mapper for HP Systems Insight Manager Unauthorized Access Vulnerabilities
14349| [34077] IBM Tivoli Storage Manager Express and Enterprise Server Remote Buffer Overflow Vulnerability
14350| [34040] Nucleus CMS Media Manager Unspecified Directory Traversal Vulnerability
14351| [33998] TYPO3 Flat Manager Unspecified SQL Injection Vulnerability
14352| [33978] Webformatique Car Manager Joomla! Component 'ItemID' Parameter SQL Injection Vulnerability
14353| [33976] Webformatique Reservation Manager Joomla! Component 'ItemID' Parameter SQL Injection Vulnerability
14354| [33966] NetworkManager Permission Enforcement Multiple Local Vulnrabilities
14355| [33934] Internet Download Manager Language File Parsing Buffer Overflow Vulnerability
14356| [33925] BannerManager 'default.asp' Multiple SQL Injection Vulnerabilities
14357| [33919] RETIRED: Newsletter Manager Plus.Attach 'admin/index.asp' Multiple SQL Injection Vulnerabilities
14358| [33918] HP Virtual Rooms Client ActiveX Control Insecure Method Remote Code Execution Vulnerability
14359| [33903] Cisco Application Network Manager and Application Control Engine Multiple Vulnerabilities
14360| [33857] IBM WebSphere MQ Queue Manager Multiple Local Privilege Escalation Vulnerabilities
14361| [33835] A4Desk Event Calendar 'eventid' Parameter SQL Injection Vulnerability
14362| [33821] Apple Mac OS X 'FSEvents' Local Information Disclosure Vulnerability
14363| [33816] Apple Mac OS X Remote Apple Events Uninitialized Buffer Information Disclosure Vulnerability
14364| [33814] Apple Mac OS X Remote Apple Events Out of Bounds Memory Access Security Vulnerability
14365| [33813] Apple Mac OS X Server Manager Authentication Bypass Security Vulnerability
14366| [33808] Apple Mac OS X Resource Manager Remote Code Execution Vulnerability
14367| [33795] RETIRED: University of Washington IMAP c-client Remote Format String Vulnerability
14368| [33689] Bitrix Site Manager Multiple Input Validation Vulnerabilities
14369| [33668] HP OpenView Network Node Manager 'ovlaunch' Buffer Overflow Vulnerability
14370| [33667] HP OpenView Network Node Manager Multiple Information Disclosure Vulnerabilities
14371| [33666] HP OpenView Network Node Manager Multiple Remote Command Execution Vulnerabilities
14372| [33651] HP OpenView Network Node Manager Unspecified Remote Code Execution Vulnerability
14373| [33600] RETIRED: DMXReady Online Notebook Manager Login Parameters SQL Injection Vulnerabilities
14374| [33568] Multiple VNC Clients Multiple Integer Overflow Vulnerabilities
14375| [33555] Free Download Manager Torrent File Parsing Multiple Remote Buffer Overflow Vulnerabilities
14376| [33554] Free Download Manager Remote Control Server Stack Buffer Overflow Vulnerability
14377| [33512] Personal Site Manager 0.3 Multiple Remote Vulnerabilities
14378| [33499] ASP-DEV XM Events Diary 'diary_viewC.asp' SQL Injection Vulnerability
14379| [33496] Domain Technologie Control 'client/new_account.php' Multiple SQL Injection Vulnerabilities
14380| [33492] Horde IMP Webmail Client Cross Site Scripting And HTML Injection Vulnerabilities
14381| [33489] Sun Java System Access Manager Username Enumeration Weakness
14382| [33476] Flaxweb Article Manager Avatar Arbitrary File Upload Vulnerability
14383| [33422] Flaxweb Article Manager 'category.php' SQL Injection Vulnerability
14384| [33379] Cisco Unified Communications Manager CAPF Service Denial of Service Vulnerability
14385| [33314] DMXReady Blog Manager 'inc_weblogmanager.asp' Cross-Site Scripting and SQL Injection Vulnerabilities
14386| [33296] Eventing Component for Joomla! 'com_eventing' SQL Injection Vulnerability
14387| [33295] DMXReady Billboard Manager 'upload_document.asp' Arbitrary File Upload Vulnerability
14388| [33266] Sun Java System Access Manager 'sub-realm' Privilege Escalation Vulnerability
14389| [33265] Sun Java System Access Manager Information Disclosure Vulnerability
14390| [33255] DMXReady Members Area Manager 'upload_image_security_level.asp' SQL Injection Vulnerability
14391| [33251] DMXReady Blog Manager Arbitrary File Deletion Vulnerability
14392| [33247] Symantec AppStream Client 'LaunchObj' ActiveX Control Arbitrary File Download Vulnerability
14393| [33153] Plunet BusinessManager ACL Security Bypass and HTML Injection Vulnerabilities
14394| [33147] HP OpenView Network Node Manager HTTP Request Multiple Buffer Overflow Vulnerabilities
14395| [33128] Sun Solaris NFS Version 4 Client Unspecified Local Denial Of Service Vulnerability
14396| [33112] Google Chrome FTP Client PASV Port Scan Information Disclosure Vulnerability
14397| [33024] BulletProof FTP Client '.bps' File Stack Buffer Overflow Vulnerability
14398| [33007] BulletProof FTP Client Bookmark File Heap Buffer Overflow Vulnerability
14399| [32958] University of Washington IMAP c-client Buffer Overflow Vulnerability
14400| [32924] Novell Identity Manager Multiple Cross Site Scripting Vulnerabilities
14401| [32880] Apple Mac OS X Managed Client Screen Saver Lock Bypass Vulnerability
14402| [32848] AM Events Module for XOOPS 'print.php' SQL Injection Vulnerability
14403| [32824] IBM Tivoli Provisioning Manager Security Bypass Vulnerability
14404| [32809] ASP-DEV XM Events Diary 'cat' Parameter SQL Injection Vulnerability
14405| [32776] MDaemon Server WorldClient 'IMG' Tag Script Injection Vulnerability
14406| [32766] CFMSource CF_Calendar 'calendarevent.cfm' SQL Injection Vulnerability
14407| [32609] Calendar MX Professional 'calendar_Eventupdate.asp' SQL Injection Vulnerability
14408| [32606] Pro Clan Manager 'PHPSESSID' Session Fixation Vulnerability
14409| [32587] Ocean12 Mailing List Manager Gold SQL Injection and Cross Site Scripting Vulnerabilities
14410| [32528] Ocean12 Mailing List Manager Gold 'Email' Parameter SQL Injection Vulnerability
14411| [32526] Ocean12 FAQ Manager Pro 'Keyword' Parameter Cross Site Scripting Vulnerability
14412| [32524] Ocean12 FAQ Manager Pro 'id' Parameter SQL Injection Vulnerability
14413| [32508] Ocean12 Membership Manager Pro 'login.asp' SQL Injection Vulnerability
14414| [32503] Ocean12 Contact Manager Pro 'DisplayFormat' Parameter Cross Site Scripting Vulnerability
14415| [32502] Ocean12 Contact Manager Pro 'default.asp' SQL Injection Vulnerability
14416| [32472] Werner Hilversum FAQ Manager 'include/header.php' Remote File Include Vulnerability
14417| [32466] Werner Hilversum FAQ Manager 'catagorie.php' SQL Injection Vulnerability
14418| [32461] IBM Tivoli Access Manager for e-business Remote Denial Of Service Vulnerability
14419| [32431] Ez Ringtone Manager Information Disclosure Vulnerability
14420| [32405] SMS Client 'mail2sms.sh' Insecure Temporary File Creation Vulnerability
14421| [32397] MicroHellas ToursManager 'tourview.php' SQL Injection Vulnerability
14422| [32392] EMC ControlCenter Manager for SAN 'msragent.exe' Remote Information Disclosure Vulnerability
14423| [32389] EMC ControlCenter SAN Manager 'msragent.exe' Remote Stack Buffer Overflow Vulnerability
14424| [32355] MDaemon Server WorldClient Script Injection Vulnerability
14425| [32344] No-IP Dynamic Update Client for Linux Remote Buffer Overflow Vulnerability
14426| [32328] E-topbiz AdManager 'view.php' SQL Injection Vulnerability
14427| [32286] Sun Logical Domain Manager Local Security Bypass Vulnerability
14428| [32276] AlstraSoft Article Manager Pro 'admin/admin.php' SQL Injection Vulnerability
14429| [32274] Linksys WRT160N DHCP Client Table HTML Injection Vulnerability
14430| [32272] HP Service Manager (HPSM) Unspecified Privilege Escalation Vulnerability
14431| [32262] Sun Java System Identity Manager Multiple Vulnerabilities
14432| [32253] RETIRED: Savvy Content Manager Multiple Cross Site Scripting Vulnerabilities
14433| [32250] WOW Raid Manager 'auth/auth_phpbb3.php' Security Bypass Vulnerability
14434| [32235] OTManager 'Admin/ADM_Pagina.php' Remote File Include Vulnerability
14435| [32233] IBM Tivoli Netcool Service Quality Manager Cross Site Scripting And HTML Injection Vulnerabilities
14436| [32148] Develop It Easy Event Calendar Multiple SQL Injection Vulnerabilities
14437| [32135] Joomla! Dada Mail Manager Component Remote File Include Vulnerability
14438| [32121] Novell Access Manager Local Browser Security Bypass Vulnerability
14439| [32110] MicroHellas ToursManager 'cityview.php' SQL Injection Vulnerability
14440| [32105] NOS Microsystems getPlus Download Manager ActiveX Control Buffer Overflow Vulnerability
14441| [32103] NOS Microsystems getPlus Download Manager Unauthorized Access Vulnerability
14442| [32080] Network-Client FTP Now Heap Buffer Overflow Vulnerability
14443| [32028] Absolute FAQ Manager .NET Cookie Authentication Bypass Vulnerability
14444| [32024] Absolute News Manager .Net Cookie Authentication Bypass Vulnerability
14445| [32023] Absolute Banner Manager .NET Cookie Authentication Bypass Vulnerability
14446| [32005] Absolute Poll Manager XE Cookie Authentication Bypass Vulnerability
14447| [31861] Sun Integrated Lights-Out Manager (ILOM) Authentication Bypass Vulnerability
14448| [31855] Multiple Vendor Web Browser FTP Client Cross Site Scripting Weakness
14449| [31777] Hewlett-Packard Systems Insight Manager Unspecified Unauthorized Access Vulnerability
14450| [31773] myEvent 'viewevent.php' SQL Injection Vulnerability
14451| [31766] Symantec Altiris Deployment Solution Client User Interface Local Privilege Escalation Vulnerability
14452| [31724] Absolute Poll Manager 'xlacomments.asp' SQL Injection Vulnerability
14453| [31671] Pre News Manager 'news_detail.php' SQL Injection Vulnerability
14454| [31669] HP OpenView Network Node Manager 'ovtopmd' Variant Unspecified Denial of Service Vulnerability
14455| [31661] WOW Raid Manager Unspecified Cross Site Scripting Vulnerability
14456| [31645] Avaya Communication Manager Web Administration Multiple Security Vulnerabilities
14457| [31639] Avaya Communication Manager Web Server Configuration Unauthorized Access Vulnerability
14458| [31628] Built2Go Real Estate Listings 'event_detail.php' SQL Injection Vulnerability
14459| [31616] Microsoft Internet Explorer Event Handling Cross Domain Security Bypass Vulnerability
14460| [31603] Internet Download Manager File Parsing Buffer Overflow Vulnerability
14461| [31507] A4Desk Event Calendar 'v' Parameter Remote File Include Vulnerability
14462| [31486] MySQL Command Line Client HTML Special Characters HTML Injection Vulnerability
14463| [31478] Easy PHP Calendar Add New Event HTML Injection Vulnerability
14464| [31471] Events Calendar 'header_setup.php' Multiple Remote File Include Vulnerabilities
14465| [31443] Conkurent Real Estate Manager 'cat_id' Parameter SQL Injection Vulnerability
14466| [31422] Libra File Manager Cookie Authentication Bypass Vulnerability
14467| [31415] Libra File Manager Security Bypass Vulnerability
14468| [31403] Libra File Manager 'fileadmin.php' Local File Include Vulnerability
14469| [31388] Drupal Plugin Manager Security Bypass Vulnerability
14470| [31367] Cisco Unified Communications Manager SIP Service Multiple Denial of Service Vulnerabilities
14471| [31294] Foxmail Email Client 'mailto' Buffer Overflow Vulnerability
14472| [31278] Mevin Productions Basic PHP Events Lister 'id' Parameter SQL Injection Vulnerability
14473| [31252] ISC BIND Windows UDP Client Handler Denial Of Service Vulnerability
14474| [31168] Horde Turba Contact Manager '/imp/test.php' Cross Site Scripting Vulnerability
14475| [30986] Novell iPrint Client 'IppCreateServerRef()' Remote Buffer Overflow Vulnerability
14476| [30984] HP OpenView Network Node Manager Multiple Denial of Service Vulnerabilities
14477| [30977] Postfix 'epoll' Linux Event Handler Local Denial of Service Vulnerability
14478| [30960] Reciprocal Links Manager 'site' Parameter SQL Injection Vulnerability
14479| [30948] HP TCP/IP Services for OpenVMS Finger Client Format String Vulnerability
14480| [30833] Civic Website Manager Multiple Cross-Site Scripting Vulnerabilities
14481| [30826] SoftArtisans XFile FileManager ActiveX Control Multiple Buffer Overflow Vulnerabilities
14482| [30813] Novell iPrint Client ActiveX Control Multiple Remote Vulnerabilities
14483| [30753] Sun Solaris NFSv4 Client Kernel Module Local Denial of Service Vulnerability
14484| [30749] Aurora Password Manager System Tray Icon Information Disclosure Vulnerability
14485| [30720] Ipswitch WS_FTP Client Format String Vulnerability
14486| [30697] HAVP 'sockethandler.cpp' Client Connect Infinite Loop Denial of Service Vulnerability
14487| [30693] PartyPoker Client Update Remote Code Execution Vulnerability
14488| [30630] McAfee Encrypted USB Manager Remote Security Bypass Vulnerability
14489| [30586] Microsoft Windows Event System Array Index Verification Remote Code Execution Vulnerability
14490| [30584] Microsoft Windows Event System User Subscription Request Remote Code Execution Vulnerability
14491| [30580] Free Hosting Manager Administrator Cookie Authentication Bypass Vulnerability
14492| [30578] WebEx Meeting Manager 'atucfobj.dll' ActiveX Control Remote Buffer Overflow Vulnerability
14493| [30532] OpenVPN Client 'lladdr' and 'iproute' Configuration Directive Remote Code Execution Vulnerability
14494| [30497] Novell iManager Property Book Page Deletion Security Bypass Vulnerability
14495| [30476] Hitachi JP1/Cm2/Network Node Manager Multiple Unspecified Remote Vulnerabilities
14496| [30469] Hitachi JP1/Cm2/Network Node Manager Unspecified Denial Of Service Vulnerability
14497| [30449] HP-UX System Administration Manager NFS Configuration Security Bypass Vulnerability
14498| [30365] WordPress Wp Downloads Manager Module 'upload.php' Arbitrary File Upload Vulnerability
14499| [30313] EMC Retrospect Backup Client NULL Pointer Remote Denial of Service Vulnerability
14500| [30308] EMC Retrospect Backup Client Password Hash Information Disclosure Vulnerability
14501| [30306] EMC Dantz Retrospect Backup Client 'retroclient.exe' Remote Memory Corruption Vulnerability
14502| [30290] SmbClientParser Perl Module Remote Command Execution Vulnerability
14503| [30274] AlstraSoft Article Manager Pro 'contact_author.php' SQL Injection Vulnerability
14504| [30256] Joomla! and Mambo DT Register Component 'eventId' Parameter SQL Injection Vulnerability
14505| [30247] Galatolo WebManager Cookie Authentication Bypass Vulnerability
14506| [30232] Galatolo Web Manager SQL Injection and Cross-Site Scripting Vulnerabilities
14507| [30196] Maian Events 'mevents_cookie' Authentication Bypass Vulnerability
14508| [30004] Online Booking Manager 'checkavail.php' SQL Injection Vulnerability
14509| [30001] Novell Client 'NWFS.SYS' IOCTL Request Local Privilege Escalation Vulnerability
14510| [29999] OTManager Cookie Authentication Bypass Vulnerability
14511| [29992] OTManager 'conteudo' Parameter Local File Include and Cross-Site Scripting Vulnerabilities
14512| [29988] Sun Java System Access Manager XSLT Stylesheets XML Signature Remote Code Execution Vulnerability
14513| [29987] Mask PHP File Manager Configuration Security Bypass Vulnerability
14514| [29939] Avaya Communication Manager Multiple Security Vulnerabilities
14515| [29938] Avaya Communication Manager Multiple Remote Command Execution Vulnerabilities
14516| [29935] Cisco Unified Communications Manager RIS Data Collector Service Authentication Bypass Vulnerability
14517| [29933] Cisco Unified Communications Manager CTI Service Denial of Service Vulnerability
14518| [29929] Page Manager 'upload.php' Arbitrary File Upload Vulnerability
14519| [29926] Mask PHP File Manager Cookie Authentication Bypass Vulnerability
14520| [29844] WISE-FTP FTP Client 'LIST' Command Directory Traversal Vulnerability
14521| [29837] TYPO3 Frontend Filemanager Extension Unspecified Code Execution Vulnerability
14522| [29791] Cisco Intrustion Prevention System (IPS) Platforms Inline Mode Denial of Service Vulnerability
14523| [29761] Lyris ListManager 'words' Parameter Cross Site Scripting Vulnerability
14524| [29758] No-IP DUC Client for Windows Local Information Disclosure Vulnerability
14525| [29743] Turba Contact Manager HTML Injection Vulnerability
14526| [29736] Novell iPrint Client ActiveX Control Multiple Stack Overflow Vulnerabilities
14527| [29718] GSC Client Privilege Escalation Vulnerability
14528| [29710] Pre News Manager 'index.php' Parameter SQL Injection Vulnerability
14529| [29680] Sun Solaris 10 Event Port Denial of Service Vulnerability
14530| [29676] Sun Java System Access Manager Authentication Bypass Vulnerability
14531| [29664] net2ftp FTP Client Request Archive Handling Directory Traversal Vulnerability
14532| [29636] Motion 'read_client()' Off-By-One Buffer Overflow Vulnerability
14533| [29613] proManager 'config.php' Local File Include Vulnerability
14534| [29602] Novell GroupWise Messenger Client Buffer Overflow Vulnerabilities
14535| [29598] BrowserCRM 'clients.php' Remote File Include Vulnerability
14536| [29595] Galatolo WebManager 'com' Parameter Local File Include Vulnerability
14537| [29594] JiRo's FAQ Manager eXperience 'fID' Parameter SQL Injection Vulnerability
14538| [29587] Akamai Red Swoosh Client Web Server Cross-Site Request Forgery Vulnerability
14539| [29585] ALFTP FTP Client 'LIST' Command Directory Traversal Vulnerability
14540| [29536] HP Instant Support 'HPISDataManager.dll' ActiveX Control Arbitrary File Delete Vulnerability
14541| [29535] HP Instant Support 'HPISDataManager.dll' ActiveX Control Arbitrary File Creation Vulnerability
14542| [29534] HP Instant Support 'HPISDataManager.dll' 'RegistryString' Buffer Overflow Vulnerability
14543| [29533] HP Instant Support 'HPISDataManager.dll' 'StartApp' ActiveX Control Insecure Method Vulnerability
14544| [29532] HP Instant Support 'HPISDataManager.dll' 'MoveFile' ActiveX Control Buffer Overflow Vulnerability
14545| [29531] HP Instant Support 'HPISDataManager.dll' 'GetFileTime' ActiveX Control Buffer Overflow Vulnerability
14546| [29530] HP Instant Support 'HPISDataManager.dll' ActiveX Control Arbitrary File Download Vulnerability
14547| [29529] HP Instant Support 'HPISDataManager.dll' 'ExtractCab' ActiveX Control Buffer Overflow Vulnerability
14548| [29528] Computer Associates eTrust Secure Content Manager Multiple Buffer Overflow Vulnerabilities
14549| [29526] RETIRED: HP Instant Support 'HPISDataManager.dll' ActiveX Control Unspecified Code Execution
14550| [29502] Apache Tomcat Host Manager Cross Site Scripting Vulnerability
14551| [29493] Apple Mac OS X CFNetwork SSL Client Certificate Handling Information Disclosure Vulnerability
14552| [29445] Apple Safari and Microsoft Windows Client-side Code Execution Vulnerability
14553| [29406] CA Internet Security Suite 'UmxEventCli.dll' ActiveX Control Arbitrary File Overwrite Vulnerability
14554| [29398] EMC AlphaStor Library Manager 'CreateProcess()' Function Remote Code Execution Vulnerability
14555| [29350] Symantec Backup Exec System Recovery Manager Directory Traversal Vulnerability
14556| [29266] CMS WebManager-Pro Multiple SQL Injection Vulnerabilities
14557| [29251] News Manager Multiple Remote Vulnerabilities
14558| [29221] Cisco Unified Communications Manager Multiple Denial of Service Vulnerabilities
14559| [29202] EMO Realty Manager 'news.php' SQL Injection Vulnerability
14560| [29180] TYPO3 Event Database Extension Unspecified Cross Site Scripting Vulnerability
14561| [29170] CMS Made Simple 'modules/FileManager/postlet/javaUpload.php' Arbitrary File Upload Vulnerability
14562| [29164] PhpMyAgenda 'infoevent.php3' Remote File Include Vulnerability
14563| [29109] Novell Client for Windows Forgotten Password Local Privilege Escalation Vulnerability
14564| [29072] QTO File Manager 'qtofm.php' Arbitrary File Upload Vulnerability
14565| [29022] Animal Shelter Manager Improper Access Restriction Security Bypass Vulnerability
14566| [29016] Robocode AWT Event Queue Security Bypass Vulnerability
14567| [28994] Nortel Multimedia PC Client Remote Packet Flood Denial of Service Vulnerability
14568| [28993] Akamai Download Manager ActiveX Control Remote Code Execution Vulnerability
14569| [28898] Horde Webmail 'addevent.php' Cross-Site Scripting Vulnerability
14570| [28888] Computer Associates eTrust Secure Content Manager 'eCSqdmn' Remote Denial of Service Vulnerability
14571| [28803] ICQ 'Personal Status Manager' Remote Buffer Overflow Vulnerability
14572| [28745] HP OpenView Network Node Manager Directory Traversal and Multiple Denial Of Service Vulnerabilities
14573| [28740] WiKID wClient-PHP 'sample.php' Cross-Site Scripting Vulnerability
14574| [28728] EMC DiskXtender File System Manager Stack Based Buffer Overflow Vulnerability
14575| [28707] Symantec Altiris Deployment Solution AClient Password Disclosure Vulnerability
14576| [28690] Cisco Unified Communication Manager Multiple Vulnerabilities
14577| [28689] HP OpenView Network Node Manager 'ovspmd' Buffer Overflow Vulnerability
14578| [28684] Avaya Communication Manager Web Interface Multiple Input Validation Vulnerabilities
14579| [28682] Avaya SIP Enablement Services and Communications Manager Multiple SQL Injection Vulnerabilities
14580| [28669] iScripts SocialWare 'events.php' SQL Injection Vulnerability
14581| [28668] HP OpenView Network Node Manager 'ovalarmsrv.exe' Multiple Remote Vulnerabilities
14582| [28569] HP OpenView Network Node Manager 'OVAS.EXE' Buffer Overflow Vulnerability
14583| [28567] IBM DB2 Content Manager Unspecified Security Vulnerability
14584| [28553] Microsoft Windows DNS Client Service Response Spoofing Vulnerability
14585| [28538] Sava's Place Sava's Link Manager 'category' Parameter SQL Injection Vulnerability
14586| [28537] Sava's Place Sava's Link Manager 'index.php' Local File Include Vulnerability
14587| [28529] PHP Spam Manager 'body.php' Local File Include Vulnerability
14588| [28504] 2X ThinClientServer TFTP service Directory Traversal Vulnerability
14589| [28488] ManageEngine Applications Manager 'Search.do' Cross-Site Scripting Vulnerability
14590| [28450] SILC Server 'NEW_CLIENT' Remote Denial of Service Vulnerability
14591| [28373] SILC Client and Server Key Negotiation Protocol Remote Buffer Overflow Vulnerability
14592| [28357] Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability
14593| [28343] Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability
14594| [28320] Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability
14595| [28316] Asterisk Predictable HTTP Manager Session ID Security Bypass Vulnerability
14596| [28311] Asterisk Logger and Manager Format String Vulnerabilities
14597| [28265] Novell GroupWise Windows Client API Shared Folder Email Information Disclosure Vulnerability
14598| [28210] Adobe Form Designer and Adobe Form Client Multiple Buffer-Overflow Vulnerabilities
14599| [28200] Savvy Content Manager 'searchterms' Parameter Multiple Cross Site Scripting Vulnerabilities
14600| [28160] Argon Technology Client Management Services TFTP Server Directory Traversal Vulnerability
14601| [28113] Sun Java System Access Manager Administration Console Multiple Cross-Site Scripting Vulnerabilities
14602| [28110] Symantec Altiris Deployment Server Agents 'AClient.exe' Privilege Escalation Vulnerability
14603| [28066] ADI Convergence Galaxy FTP Server Password Remote Denial of Service Vulnerability
14604| [28035] Barryvan Compo Manager 'main.php' Remote File Include Vulnerability
14605| [28015] Symark PowerBroker Client Multiple Local Buffer Overflow Vulnerabilities
14606| [27999] Plume CMS 'manager/xmedia.php' Cross-Site Scripting Vulnerability
14607| [27996] DrBenHur.com DBHcms 'mod.extmanager.php' Remote File Include Vulnerability
14608| [27961] LWS php Download Manager 'body.inc.php' Local File Include Vulnerability
14609| [27948] Citrix MetaFrame Web Manager 'login.asp' Cross-Site Scripting Vulnerability
14610| [27939] Novell iPrint Client 'ienipp.ocx' ActiveX Control Buffer Overflow Vulnerability
14611| [27931] XOOPS Tiny Event 'print' Option SQL Injection Vulnerability
14612| [27899] Hitachi EUR Print Manager Remote Denial of Service Vulnerability
14613| [27890] XOOPS 'events' Module 'id' Parameter SQL Injection Vulnerability
14614| [27877] Google Hack Honeypot File Upload Manager 'delall' Unauthorized File Access Vulnerability
14615| [27849] Joomla! and Mambo Portfolio Manager Component 'categoryId' Parameter SQL Injection Vulnerability
14616| [27776] Fortinet FortiClient 'fortimon.sys' Local Privilege Escalation Vulnerability
14617| [27775] Cisco Unified Communications Manager 'key' Parameter SQL Injection Vulnerability
14618| [27742] RPM Remote Print Manager Service Remote Buffer Overflow Vulnerability
14619| [27741] Novell Client 'nwspool.dll' EnumPrinters RPC Request Buffer Overflow Vulnerability
14620| [27675] Check Point VPN SecureClient/SecuRemote Local Login Credentials Information Disclosure Vulnerability
14621| [27654] WS_FTP Server Manager Authentication Bypass and Information Disclosure Vulnerabilities
14622| [27631] Novell Challenge Response Client Local Clipboard Disclosure Weakness
14623| [27629] HP OpenView Network Node Manager 'ovtopmd' Denial of Service Vulnerability
14624| [27604] Print Manager Plus PQCore Remote Denial of Service Vulnerability
14625| [27561] UltraVNC VNCViewer 'ClientConnection.cpp' Remote Buffer Overflow Vulnerability
14626| [27515] SQLiteManager 'confirm.php' Remote File Include Vulnerability
14627| [27487] Symantec Backup Exec System Recovery Manager FileUpload Class Unauthorized File Upload Vulnerability
14628| [27485] IBM Informix Storage Manager Multiple Buffer Overflow Vulnerabilities
14629| [27472] Mambo MOStlyCE Module Image Manager Utility Arbitrary File Upload Vulnerability
14630| [27462] F5 BIG-IP Application Security Manager 'report_type' Cross-Site Scripting Vulnerability
14631| [27443] ManageEngine Applications Manager Multiple Cross Site Scripting and Security Vulnerabilities
14632| [27433] IBM AIX WebSM Remote Client For Linux Local Insecure File Permissions Vulnerability
14633| [27431] IBM AIX Logical Volume Manager Multiple Commands Local Buffer Overflow Vulnerabilities
14634| [27388] IBM Tivoli Business Service Manager Password Disclosure Vulnerability
14635| [27387] IBM Tivoli Provisioning Manager for OS Deployment Remote Buffer Overflow Vulnerability
14636| [27366] Galaxy Scripts Mini File Host 'upload.php' POST Parameter Local File Include Vulnerability
14637| [27364] 360 Web Manager 'form.php' SQL Injection Vulnerability
14638| [27327] GalaxyScripts Mini File Host 'upload.php' Local File Include Vulnerability
14639| [27316] IBM Lotus Sametime Client Chat Message Cross-Site Scripting Vulnerability
14640| [27313] Cisco Unified Communications Manager CTL Provider Heap Buffer Overflow Vulnerability
14641| [27289] Cisco VPN Client for Windows Local Denial of Service Vulnerability
14642| [27247] StreamAudio ProxyManager 'InternalTuneIn()' ActiveX Control Buffer Overflow Vulnerability
14643| [27235] IBM Tivoli Storage Manager Express Remote Heap Overflow Vulnerability
14644| [27214] Sun Java System Identity Manager Multiple Input Validation Vulnerabilities
14645| [27209] Novell Client for Windows 'nicm.sys 'Local Privilege Escalation Vulnerability
14646| [27191] SSH Tectia Client and Server ssh-signer Local Privilege Escalation Vulnerability
14647| [27152] RunCMS Newbb_plus Module Client-IP SQL Injection Vulnerability
14648| [27151] WordPress Plugin Wp-FileManager 'ajaxfilemanager.php' Arbitrary File Upload Vulnerability
14649| [27146] Novell ZENworks ESM Security Client 'STEngine.exe' Local Privilege Escalation Vulnerability
14650| [27059] SkyFex Client ActiveX Control 'start' Method Stack Buffer Overflow Vulnerability
14651| [26944] Sun Ray Device Manager Daemon Multiple Vulnerabilities
14652| [26914] St. Bernard Open File Manager Remote Heap Based Buffer Overflow Vulnerability
14653| [26826] Prolog Manager Insecure Encryption Username and Password Information Disclosure Vulnerability
14654| [26792] Lyris ListManager Multiple Remote Vulnerabilities
14655| [26754] XIGLA SOFTWARE Absolute Banner Manager .NET SQL Injection Vulnerability
14656| [26741] HP OpenView Network Node Manager CGI Buffer Overflow Vulnerabilities
14657| [26733] Novell BorderManager Multiple Vulnerabilities
14658| [26724] IBM Tivoli Provisioning Manager Express Username User Enumeration Weakness
14659| [26715] IBM Tivoli Provisioning Manager Express Multiple Cross Site Scripting Vulnerabilities
14660| [26692] Absolute News Manager .NET Multiple Input Validation and Information Disclosure Vulnerabilities
14661| [26689] SonicWALL Global VPN Client Remote Format String Vulnerability
14662| [26673] IBM Tivoli Netcool Security Manager Unspecified Cross-Site Scripting Vulnerability
14663| [26667] Hitachi JP1/Cm2/Network Node Manager Unspecified Cross-Site Scripting Vulnerability
14664| [26643] VUNET Case Manager Default.ASP Username Parameter SQL Injection Vulnerability
14665| [26637] HP OpenView Network Node Manager Unspecified Cross-Site Scripting Vulnerability
14666| [26563] WorkingOnWeb Events.PHP SQL Injection Vulnerability
14667| [26523] VUNET Case Manager 'default.asp' SQL Injection Vulnerability
14668| [26519] AlstraSoft E-Friends Events Module SQL Injection Vulnerability
14669| [26503] ISPmanager Responder Local Privilege Escalation Vulnerability
14670| [26446] Apple Safari Unspecified Frame Events Same-Origin Policy Bypass Vulnerability
14671| [26420] Novell Client for Windows NWFILTER.SYS Local Privilege Escalation Vulnerability
14672| [26376] Sun Solaris Volume Manager Local Denial of Service Vulnerability
14673| [26368] ManageEngine OpManager JSP/Login.DO Multiple Cross Site Scripting Vulnerabilities
14674| [26304] AdventNet EventLog Analyzer Insecure Default MySQL Password Unauthorized Access Vulnerability
14675| [26288] SonicWALL SSL VPN Client Remote ActiveX Multiple Vulnerabilities
14676| [26265] Symantec Altiris Deployment Solution Aclient Local Privilege Escalation Vulnerability
14677| [26252] Ipswitch IMail SMTP Server IMail Client Remote Buffer Overflow Vulnerability
14678| [26192] CodeWidgets Online Event Registration Template Multiple SQL Injection Vulnerabilities
14679| [26155] Flatnuke3 File Manager Module Unauthorized Access Vulnerability
14680| [26134] Computer Associates Host-Based Intrusion Prevention System Server HTML Injection Vulnerability
14681| [26105] Cisco Unified Communications Manager Remote Denial of Service and Buffer Overflow Vulnerabilities
14682| [26098] Oracle Workspace Manager LT Package SQL Injection Vulnerability
14683| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
14684| [26061] DenyHosts Client Protocol Version Identification Remote Denial of Service Vulnerability
14685| [26057] Cisco CallManager and Openser SIP Remote Unauthorized Access Vulnerability
14686| [26034] CRS Manager Multiple Remote File Include Vulnerabilities
14687| [26026] Pindorama Client.php Remote File Include Vulnerability
14688| [26013] Computer Associates eTrust ITM (Threat Manager) Web Console URI Redirection Vulnerability
14689| [26012] Computer Associates Threat Manager Remote Information Disclosure Vulnerability
14690| [25995] Wesnoth Client UTF-8 Remote Denial of Service Vulnerability
14691| [25964] DB Manager Edit.ASP Cross-Site Scripting Vulnerability
14692| [25903] Altnet Download Manager ADM4 ActiveX Buffer Overflow Vulnerability
14693| [25881] eGov Manager Multiple Cross-Site Scripting Vulnerabilities
14694| [25860] Public Media Manager newstopic_inc.php Remote File Include Vulnerability
14695| [25851] Apple iPhone Safari Browser Frame Events Same-Origin Policy Bypass Vulnerability
14696| [25842] Sun Java System Access Manager Multiple Vulnerabilities
14697| [25823] Computer Associates BrightStor Hierarchical Storage Manager CsAgent Multiple Remote Vulnerabilities
14698| [25811] Freeside cust_bill_event.cgi Cross-Site Scripting Vulnerability
14699| [25761] NetSupport Manager Remote Authentication Bypass Vulnerability
14700| [25692] Omnistar Article Manager Article.PHP SQL Injection Vulnerability
14701| [25683] ewire Payment Client Command Execution Vulnerability
14702| [25656] Invision Power Board User Profile And Subscription Manager Multiple Input Validation Vulnerabilities
14703| [25581] Total Commander Client Side Directory Traversal Vulnerability
14704| [25520] Hitachi JP1/CM2/Network Node Manager Unspecified Code Execution Vulnerability
14705| [25503] Backup Manager FTP Server Information Disclosure Vulnerability
14706| [25492] Absolute Poll Manager XE xlaapmview.asp Cross Site Scripting Vulnerability
14707| [25480] Cisco CallManager/Communications Manager SQL Injection and Cross-Site Scripting Vulnerabilities
14708| [25474] Novell Client NWSPOOL.DLL RPC Request Multiple Buffer Overflow Vulnerabilities
14709| [25456] Dale Mooney Calendar Events Viewevent.PHP SQL Injection Vulnerability
14710| [25406] Ripe Website Manager Multiple SQL and HTML Injection Vulnerabilities
14711| [25383] eCentrex VOIP Client UACOMX.OCX ActiveX Control Buffer Overflow Vulnerability
14712| [25332] Cisco VPN Client for Windows Multiple Local Privilege Escalation Vulnerabilities
14713| [25314] Apache Tomcat Host Manager Servlet Cross Site Scripting Vulnerability
14714| [25312] Motive Service Activation Manager And Service Manager Remote Code Execution Vulnerabilities
14715| [25281] Multiple IRC Client Now Playing Scripts Input Validation Vulnerability
14716| [25260] Adobe ActionScript SecurityErrorEvent Security Bypass Vulnerability
14717| [25239] Cisco IOS and Unified Communications Manager Multiple Voice Vulnerabilities
14718| [25195] Next Gen Portfolio Manager Default.ASP Multiple SQL Injection Vulnerabilities
14719| [25191] GNOME Display Manager G_Strsplit Function Local Denial Of Service Vulnerability
14720| [25184] Mozilla Firefox and Minimo Password Manager Information Disclosure Weakness
14721| [25148] WebEvent Webevent.CGI Cross-Site Scripting Vulnerability
14722| [25111] Online Event Registration Template Sign_In.ASPX SQL Injection Vulnerability
14723| [25092] Novell Client NWSPOOL.DLL Unspecified Buffer Overflow Vulnerability
14724| [25077] IBM AIX FTP Client Local Buffer Overflow Vulnerability
14725| [25068] BakBone NetVault Report Manager Multiple Heap Buffer Overflow Vulnerabilities
14726| [25000] Discovery and Asset Manager Local Privilege Escalation Vulnerability
14727| [24942] IBM Tivoli Provisioning Manager for OS Deployment Divide By Zero Denial of Service Vulnerability
14728| [24903] Hitachi JP1/NETM/DM Manager Products Unspecified SQL Injection Vulnerability
14729| [24898] ActiveWeb Contentserver CMS Client Side Filtering Bypass Vulnerability
14730| [24881] Belkin G Plus Router DHCP Client List HTML Injection Vulnerability
14731| [24868] Cisco Unified Communications Manager Multiple Heap Buffer Overflow Vulnerabilities
14732| [24867] Cisco Unified Communications Manager and Presence Server Unauthorized Access Vulnerabilities
14733| [24859] Sun Java System Access Manager Logging Output Password Disclosure Vulnerability
14734| [24802] Symantec Client Security Internet E-mail Auto-Protect Stack Overflow Vulnerability
14735| [24795] SILC Toolkit and SILC Client NICK_CHANGE Remote Buffer Overflow Vulnerability
14736| [24794] Levent Veysi Portal Oku.ASP SQL Injection Vulnerability
14737| [24790] Citrix Presentation Server Client Content-Redirection Denial Of Service Vulnerability
14738| [24774] SAP Internet Communication Manager Long URI Handling Denial of Service Vulnerability
14739| [24767] OpManager Multiple Cross-Site Scripting Vulnerabilities
14740| [24725] Mozilla Firefox OnKeyDown Event File Upload Vulnerability
14741| [24722] Ripe Website Manager Multiple Remote File Include and Information Disclosure Vulnerabilities
14742| [24721] PHPEventCalendar Eventdisplay.PHP Script SQL Injection Vulnerability
14743| [24716] TotalCalendar View_Event Script SQL Injection Vulnerability
14744| [24536] Nortel Networks PC Client Soft Phone SIP Message Parsing Module Denial of Service Vulnerability
14745| [24531] Nortel Networks PC Client Soft Phone Message Parsing Module Buffer Overflow Vulnerability
14746| [24521] Xythos Enterprise Document Manager Multiple Input Validation Vulnerabilities
14747| [24475] Apache Tomcat Manager and Host Manager Upload Script Cross-Site Scripting Vulnerability
14748| [24453] Menu Manager Module System Command Remote Command Execution Vulnerability
14749| [24403] Ace-FTP Client Structured Exception Handler Overwrite Buffer Overflow Vulnerability
14750| [24387] RETIRED: Joomla JEvents Component Comutils.PHP Remote File Include Vulnerability
14751| [24240] IBM Web-based System Manager Unspecified Denial of Service Vulnerability
14752| [24233] F-Secure Policy Manager FSMSH.DLL Remote Denial of Service Vulnerability
14753| [24155] Avast! Managed Client SIS File Handling Remote Heap Overflow Vulnerability
14754| [24145] Sun Solaris NFS Client Module ACL(2) Packets Denial of Service Vulnerability
14755| [24132] Avast! Managed Client CAB File Handling Remote Heap Overflow Vulnerability
14756| [24123] Symantec Enterprise Security Manager Misinterpreted Information Denial of Service Vulnerability
14757| [24119] Cisco CallManager Search Form Cross Site Scripting Vulnerability
14758| [24085] ol' bookmarks manager Index.PHP SQL Injection Vulnerability
14759| [24061] ClientExec Index.PHP Multiple Cross-Site Scripting Vulnerabilities
14760| [24051] Globus Toolkit Nexus Globus-Job-Manager Denial of Service Vulnerability
14761| [24041] Citrix MetaFrame Password Manager Information Disclosure Vulnerability
14762| [23997] XOOPS ResManager Module Edit_day.PHP SQL Injection Vulnerability
14763| [23988] HP Systems Insight Manager JSessionID Session Fixation Vulnerability
14764| [23928] PHP Todo List Manager Regular Expressions Multiple Security Bypass Vulnerabilities
14765| [23912] Thyme Calendar Event_View.PHP SQL Injection Vulnerability
14766| [23869] SmartCode VNC Manager ActiveX Control Scvncctrl.DLL Denial of Service Vulnerability
14767| [23857] LDAP Account Manager Modified Path Local Privilege Escalation Vulnerability
14768| [23774] 1024 CMS Upload Manager Download.PHP Directory Traversal Vulnerability
14769| [23757] Motobit ASP Upload Manager Download.ASP Directory Traversal Vulnerability
14770| [23703] HP Power Manager Remote Agent Local Privilege Escalation Vulnerability
14771| [23693] ManageEngine Password Manager Pro Database Remote Unauthorized Access Vulnerability
14772| [23673] PHPBandManager Index.PHP Remote File Include Vulnerability
14773| [23663] HYIP Manager Pro Multiple Remote File Include Vulnerabilities
14774| [23653] ABC-View Manager PSP File Buffer Overflow Vulnerability
14775| [23649] Asterisk ManagerInterface Manager.Conf Remote Denial of Service Vulnerability
14776| [23597] Ripe Website Manager Multiple Input Validation Vulnerabilities
14777| [23592] WEBinsta FM Manager Admin Cookies Remote File Include Vulnerability
14778| [23559] BMC Performance Manager PatrolAgent.EXE Memory Corruption Vulnerability
14779| [23522] Akamai Download Manager ActiveX Control Multiple Buffer Overflow Vulnerabilities
14780| [23499] Web Service Deluxe News Manager Deluxe Footer.PHP Local File Include Vulnerability
14781| [23480] Openads Max Media Manager CK.PHP HTTP Response Splitting Vulnerability
14782| [23407] Inout Mailing List Manager Multiple Vulnerabilities
14783| [23398] MyNews Week_Events.PHP Remote File Include Vulnerability
14784| [23391] AOL AIM and ICQ Clients Directory Traversal Vulnerability
14785| [23317] ACDSee 9.0 Photo Manager Multiple BMP Denial of Service Vulnerabilities
14786| [23298] IBM Tivoli Business Service Manager NCISETUP.DB and MSI.LOG Password Disclosure Vulnerability
14787| [23287] Symantec Enterprise Security Manager Remote Upgrade Remote Code Execution Vulnerability
14788| [23264] IBM Tivoli Provisioning Manager OS Deployment Multiple Stack Buffer Overflow Vulnerabilities
14789| [23238] PHP Memory Manager Sign Comparison Multiple Buffer Overflow Vulnerabilities
14790| [23225] PHP-Fusion Calendar_Panel Module Show_Event.PHP SQL Injection Vulnerability
14791| [23190] LDAP Account Manager Unspecified HTML Injection Vulnerability
14792| [23181] Cisco Unified CallManager And Unified Server Multiple Remote Denial Of Service Vulnerabilities
14793| [23163] HP OpenView Network Node Manager Unspecified Remote Unauthorized Access Vulnerability
14794| [23138] Inkscape Client Malicious Jabber Server Format String Vulnerability
14795| [23131] WebFormatique Car Manager Joomla Component Index.PHP SQL Injection Vulnerability
14796| [23101] 0IRC IRC Client Null Pointer Dereference Remote Denial of Service Vulnerability
14797| [23023] F-Secure Anti-Virus Client Security Local Format String Vulnerability
14798| [22975] Horde IMP Webmail Client Multiple Input Validation Vulnerabilities
14799| [22961] RETIRED:Symantec Norton Personal Firewall 2006 SymEvent Driver Local Denial of Service Vulnerability
14800| [22952] McAfee EPolicy Orchestrator SiteManager.DLL ActiveX Control Remote Buffer Overflow Vulnerabilities
14801| [22866] Avaya Communications Manager Javascript Remote Code Execution Vulnerability
14802| [22829] EPortfolio Client Side Input Validation Vulnerability
14803| [22790] RETIRED: VBulletin Event Admincp/Index.PHP RSS HTML Injection Vulnerability
14804| [22786] Netrek Vanilla Server EVENTLOG Format String Vulnerability
14805| [22783] Built2Go News Manager Blog Multiple Cross-Site Scripting Vulnerabilities
14806| [22762] Citrix Presentation Server Client Unspecified Remote Code Execution Vulnerability
14807| [22731] SQLiteManager Main.PHP Multiple HTML Injection Vulnerabilities
14808| [22727] SQLiteManager Local File Include Vulnerability
14809| [22687] Hitachi JP1/CM2/Network Node Manager Multiple Unspecified Vulnerabilities
14810| [22632] Nortel SSL VPN Net Direct Client Local Privilege Escalation Vulnerability
14811| [22606] Libevent DNS Parsing Denial Of Service Vulnerability
14812| [22600] Vivvo Article Manager DBConn.PHP Remote File Include Vulnerability
14813| [22585] Trend Micro OfficeScan Client ActiveX Control Remote Buffer Overflow Vulnerability
14814| [22554] MailEnable Web Mail Client Multiple HTML Injection and Cross-Site Scripting Vulnerabilities
14815| [22549] Cisco IOS Intrusion Prevention System Multiple Vulnerabilities
14816| [22475] HP OpenView Network Node Manager Insecure Permissions Vulnerability
14817| [22455] Cpanel Web Hosting Manager OBJCache.PHP Remote File Include Vulnerability
14818| [22424] X-Kryptor Secure Client Privilege Escalation Vulnerability
14819| [22358] PHPEventMan Multiple Remote File Include Vulnerabilities
14820| [22302] Sun Java System Access Manager Undisclosed Cross-Site Scripting Vulnerability
14821| [22301] SSC DiskAccess NFS Client DAPCNFSD.DLL Stack Buffer Overflow Vulnerability
14822| [22287] Php Generic MembreManager.PHP Remote File Include Vulnerability
14823| [22263] PHP Membership Manager Admin.PHP Cross-Site Scripting Vulnerability
14824| [22233] Multiple Check Point Products Integrity Clientless Security Security Bypass Vulnerability
14825| [22142] Easebay Resources Login Manager Multiple Input Validation Vulnerabilities
14826| [22141] Easebay Resources Paypal Subscription Manager Multiple Input Validation Vulnerabilities
14827| [22128] BitDefender Client Professional Plus Settings Local Format String Vulnerability
14828| [22013] Hewlett Packard OpenView Network Node Manager Remote Code Execution Vulnerability
14829| [22009] Hewlett Packard OpenView Network Node Manager Information Disclosure Vulnerability
14830| [21994] EIQ Networks Security Analyzer Null Pointer Dereference Client Denial of Service Vulnerability
14831| [21931] Microsoft Outlook VEVENT Record Remote Code Execution Vulnerability
14832| [21921] Novell Access Manager Identity Server IssueInstant Parameter Cross-Site Scripting Vulnerability
14833| [21897] Eudora WorldMail Mail Manager Server MAILMA.exe Remote Heap-Based Buffer Overflow Vulnerability
14834| [21886] Novell Client NWGINA.DLL User Profile Security Bypass Vulnerability
14835| [21798] Limbo CMS Event Module Remote File Include Vulnerability
14836| [21790] KSirc IRC Client Remote PRIVMSG Denial of Service Vulnerability
14837| [21788] DMXReady Secure Login Manager Sent Parameter Multiple SQL Injection Vulnerabilities
14838| [21786] Hosting Controller FolderManager.ASPX Directory Traversal Vulnerability
14839| [21754] Mxmania File Upload Manager Detail.ASP SQL Injection Vulnerability
14840| [21606] ScriptMate User Manager Multiple SQL Injection Vulnerabilities
14841| [21597] GNOME Display Manager GDMChooser Local Format String Vulnerability
14842| [21570] IBM Tivoli Identity Manager Local Information Disclosure Vulnerability
14843| [21498] Web Hosting Manager Multiple Cross-Site Scripting Vulnerabilities
14844| [21479] Novell Client NDPPNT.DLL Unspecified Buffer Overflow Vulnerability
14845| [21472] ScriptMate User Manager Default.ASP Multiple HTML Injection Vulnerabilities
14846| [21458] Citrix Presentation Server Client WFICA.OCX ActiveX Component Heap Buffer Overflow Vulnerability
14847| [21453] Adobe Download Manager AOM Buffer Overflow Vulnerability
14848| [21440] IBM Tivoli Storage Manager Multiple Buffer Overflow Vulnerabilities
14849| [21430] Novell Client SRVLOC.SYS Remote Denial of Service Vulnerability
14850| [21408] Simple File Manager Multiple Input Validation Vulnerabilities
14851| [21400] Novell ZENworks Asset Management Collection Client Remote Integer Overflow Vulnerability
14852| [21385] Novell Client Username Information Disclosure and Denial Of Service Vulnerabilities
14853| [21329] Apple Safari Password Manager Cross-Site Information Disclosure Weakness
14854| [21300] 2X ThinClientServer Unauthorized Administrative Account Creation Vulnerability
14855| [21288] WebHost Manager Multiple Cross-Site Scripting Vulnerabilities
14856| [21271] JiRo's FAQ Manager Login.ASP SQL Injection Vulnerability
14857| [21240] Mozilla Firefox 2 Password Manager Cross-Site Information Disclosure Weakness
14858| [21226] JiRos Links Manager Multiple Input Validation Vulnerabilities
14859| [21220] Novell Client NWSPOOL.DLL Remote Buffer Overflow Vulnerability
14860| [21167] Active News Manager Multiple Input Validation Vulnerabilities
14861| [21103] I Systems UK Estate Agent Manager Default.ASP SQL Injection Vulnerability
14862| [21098] Dragon Event Listing Multiple SQL Injection Vulnerabilities
14863| [21082] Links, ELinks 'smbclient' Remote Command Execution Vulnerability
14864| [21073] MGInternet Property Site Manager Multiple Input Validation Vulnerabilities
14865| [21069] Inventory Manager Multiple Input Validation Vulnerabilities
14866| [21066] Car Site Manager Multiple Input Validation Vulnerabilities
14867| [21064] DMXReady Site Engine Manager Index.ASP SQL Injection Vulnerability
14868| [21023] Microsoft Windows Client Service For Netware Remote Code Execution Vulnerability
14869| [21014] Novell BorderManager ISAKMP Predictable Cookie Vulnerability
14870| [20990] Omnistar Article Manager Multiple SQL Injection Vulnerabilities
14871| [20984] Microsoft Client Service for Netware Denial of Service Vulnerability
14872| [20981] Unicore Client Keystore File Insecure File Permissions Vulnerability
14873| [20957] Mozilla Client Products Multiple Remote Vulnerabilities
14874| [20952] IPManager Index.PHP Cross-Site Scripting Vulnerability
14875| [20851] Zend Google Data Client Library Multiple Cross-Site Scripting Vulnerabilities
14876| [20841] Novell IManager Tomcat Denial of Service Vulnerability
14877| [20803] Easy NotesManager Multiple SQL Injection Vulnerabilities
14878| [20663] Novell eDirectory EvtFilteredMonitorEventsRequest Multiple Vulnerabilities
14879| [20632] Cluster Resources Torque Resource Manager PBS_MOM Insecure Temporary File Creation Vulnerability
14880| [20590] Dev Web Manager System Index.PHP Cross-Site Scripting Vulnerability
14881| [20497] BulletProof FTP Client Remote Buffer Overflow Vulnerability
14882| [20428] Novell BorderManager IPSec/IKE Remote Denial Of Service Vulnerability
14883| [20330] Trend Micro OfficeScan Client Removal and File Deletion Vulnerabilities
14884| [20246] OpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability
14885| [20155] PLESK Filemanager.PHP Directory Traversal Vulnerability
14886| [20074] Techno Dreams FAQ Manager Package Faqview.ASP SQL Injection Vulnerability
14887| [20051] Symantec Multiple Products SymEvent Driver Local Denial of Service Vulnerability
14888| [20016] Novell Identity Manager Fan-Out Linux and UNIX Receiver Script Code Injection Vulnerability
14889| [20001] PHP Event Calendar Index.PHP Multiple Cross Site Scripting Vulnerabilities
14890| [19816] Ixprim CMS Theme_Manager.Class.PHP Remote File Include Vulnerability
14891| [19784] Lyris ListManager Unauthorized Administrative User Addition Vulnerability
14892| [19773] Lanifex Database of Managed Objects Access_manager.PHP Remote File Include Vulnerability
14893| [19761] JetStat JS ASP Faq Manager Multiple SQL Injection Vulnerabilities
14894| [19728] ProManager Note.PHP SQL Injection Vulnerability
14895| [19688] Novell Identity Manager Arbitrary Command Execution Vulnerability
14896| [19677] SSH Tectia Manager Agent Process Local Privilege Escalation Vulnerability
14897| [19650] CloudNine Internet Solutions Links Manager Multiple Cross-Site Scripting Vulnerabilities
14898| [19649] CloudNine Internet Solutions Links Manager SQL Injection Vulnerability
14899| [19621] Mambo Display MOSBot Manager Component mosConfig_absolute_path Remote File Include Vulnerability
14900| [19580] Symantec Enterprise Security Manager Denial of Service Vulnerability
14901| [19539] Mensajeitor HTTP CLIENT IP HTML Injection Vulnerability
14902| [19526] WEBInsta Mailing List Manager InitDB.PHP Remote File Include Vulnerability
14903| [19499] Novell eDirectory eMBoxClient.JAR Information Disclosure Vulnerability
14904| [19491] Opera Web Browser IRC Chat Client Remote Denial of Service Vulnerability
14905| [19477] WEBinsta Mailing List Manager Install3.PHP Remote File Include Vulnerability
14906| [19433] Comet WebFileManager CheckUpload.PHP Remote File Include Vulnerability
14907| [19404] Microsoft Windows DNS Client Buffer Overrun Vulnerability
14908| [19395] Visual Events Calendar Calendar.PHP Remote File Include Vulnerability
14909| [19309] Cisco CallManager Express SIP User Directory Information Disclosure Vulnerability
14910| [19270] Knusperleicht FileManager DWL_Download Remote File Include Vulnerability
14911| [19265] McAfee SecurityCenter Subscription Manager ActiveX Buffer Overflow Vulnerability
14912| [19246] myEvent Myevent.PHP Remote File Include Vulnerability
14913| [19234] Liga Manager Online Joomla! Component Remote File Include Vulnerability
14914| [19224] Mambo Gallery Manager MosConfig_Absolute_Path Remote File Include Vulnerability
14915| [19194] Krusader Bookmark Manager Password Information Disclosure Vulnerability
14916| [19163] eIQnetworks Enterprise Security Analyzer License Manager Remote Buffer Overflow Vulnerability
14917| [19081] Sun Solaris Event Port API Denial of Service Vulnerability
14918| [19056] Various Citrix Applications MFEvent.DLL Privilege Escalation Vulnerabilities
14919| [19017] Plesk Control Panel File_Manager.PHP Cross-Site Scripting Vulnerability
14920| [18997] MyBB Client-IP SQL Injection Vulnerability
14921| [18965] PHP Event Calendar Calendar.PHP Remote File Include Vulnerability
14922| [18955] Cisco Intrusion Prevention System Malformed Packet Denial Of Service Vulnerability
14923| [18952] Cisco Unified CallManager Multiple Remote Vulnerabilities
14924| [18923] Microsoft Windows DHCP Client Service Remote Code Execution Vulnerability
14925| [18791] QTO File Manager Multiple Cross-Site Scripting Vulnerabilities
14926| [18777] Quake 3 Engine Client Multiple Stack Buffer Overflow Vulnerabilities
14927| [18716] Novell Groupwise Windows Client API Unauthorized Email Access Vulnerability
14928| [18619] Trend Micro Control Manager Access Log HTML Injection Vulnerability
14929| [18593] PHP Event Calendar SQL Injection Vulnerability
14930| [18589] Namo DeepSearch Mclient.CGI Cross-Site Scripting Vulnerability
14931| [18558] Ad Manager Pro IPath Multiple Remote File Include Vulnerabilities
14932| [18534] Simple File Manager FM.php Cross-Site Scripting Vulnerability
14933| [18510] Qto File Manager index.php Cross-Site Scripting Vulnerability
14934| [18504] Cisco CallManager Cross-Site Scripting Vulnerability
14935| [18457] HP-UX Support Tools Manager Unspecified Local Denial of Service Vulnerability
14936| [18420] Symantec Security Information Manager Authentication Bypass Vulnerability
14937| [18419] Cisco VPN3K/ASA WebVPN Clientless Mode Cross-Site Scripting Vulnerability
14938| [18340] ScriptsEZ Ez Ringtone Manager Player.PHP Cross-Site Scripting Vulnerability
14939| [18339] ScriptsEZ Easy Ad-Manager Details.PHP Cross-Site Scripting Vulnerability
14940| [18333] Pre News Manager Multiple Cross-Site Scripting Vulnerabilities
14941| [18332] GNOME Foundation GDM Configure Login Manager Authentication Bypass Vulnerability
14942| [18307] IAXClient Multiple Truncated IAX Frames Remote Buffer Overflow Vulnerabilities
14943| [18096] HP OpenView Network Node Manager Multiple Remote Vulnerabilities
14944| [18094] Cisco VPN Client Local Privilege Escalation Vulnerability
14945| [18064] EMC Retrospect Client Buffer Overflow Vulnerability
14946| [18036] Sybase EAServer J2EE Application Clients and Java GUI Applications Password Disclosure Vulnerability
14947| [18023] Sun N1 System Manager Local Password Disclosure Vulnerability
14948| [17998] EZUserManager EZusermanager_pwd_forgott.PHP Remote File Include Vulnerability
14949| [17972] FileZilla Client Unspecified Remote Buffer Overflow Vulnerability
14950| [17948] EMC Dantz Retrospect Backup Client Remote Buffer Overflow Vulnerability
14951| [17944] ManageEngine OpManager Search.DO Cross-Site Scripting Vulnerability
14952| [17931] Novell Client Unspecified Buffer Overflow Vulnerability
14953| [17891] FaktoryStudios EasyEvent Index.PHP Cross-Site Scripting Vulnerability
14954| [17877] Ocean12 Calendar Manager Pro Multiple Input Validation Vulnerabilities
14955| [17840] CA Resource Initialization Manager Local Privilege Escalation Vulnerability
14956| [17799] CGI:IRC Client.C Remote Buffer Overflow and Denial Of Service Vulnerabilities
14957| [17736] Artmedic Event Index.PHP Remote File Include Vulnerability
14958| [17712] Juniper SSL-VPN Client ActiveX Control Remote Buffer Overflow Vulnerability
14959| [17693] Juniper JUNOSe DNS Client Denial Of Service Vulnerability
14960| [17647] @1 Event Publisher Information Disclosure Vulnerability
14961| [17646] @1 Event Publisher Multiple HTML Injection Vulnerabilities
14962| [17580] myEvent Multiple Input Validation Vulnerabilities
14963| [17575] myEvent Multiple Remote File Include Vulnerabilities
14964| [17508] Sybase EAServer Manager Connection Cache Password Disclosure Vulnerability
14965| [17455] Microsoft Internet Explorer Erroneous IOleClientSite Data Zone Bypass Vulnerability
14966| [17392] OpenVPN Client Remote Code Execution Vulnerability
14967| [17313] Sun Cluster SunPlex Manager Unauthorized File Access Vulnerability
14968| [17301] PHPNewsManager Multiple SQL Injection Vulnerabilities
14969| [17242] Absolute FAQ Manager Cross-Site Scripting Vulnerability
14970| [17210] IBM Tivoli Business Systems Manager APWC_Win_Main.JSP Cross-Site Scripting Vulnerability
14971| [17085] IBM Tivoli Lightweight Client Framework Information Disclosure Vulnerability
14972| [17065] DokuWiki Mediamanager Cross-Site Scripting Vulnerability
14973| [17031] Novell BorderManager Remote Denial Of Service Vulnerability
14974| [16933] EMC Dantz Retrospect Backup Client Remote Denial of Service Vulnerability
14975| [16922] Linux Kernel NFS Client Denial of Service Vulnerability
14976| [16906] NCP Secure Client Multiple Vulnerabilities
14977| [16851] Calcium EventText Cross-Site Scripting Vulnerability
14978| [16636] Microsoft Windows Web Client Buffer Overflow Vulnerability
14979| [16588] PHP Event Calendar HTML Injection Vulnerability
14980| [16571] HP Systems Insight Manager Unspecified Directory Traversal Vulnerability
14981| [16544] Webeveyn Whomp! Real Estate Manager Login SQL Injection Vulnerability
14982| [16494] IBM Tivoli Access Manager Plugin Directory Traversal Vulnerability
14983| [16474] Sun Java System Access Manager Local Authentication Bypass Vulnerability
14984| [16453] AOL Client Software Unspecified Local Privilege Escalation Vulnerability
14985| [16439] Cerberus Helpdesk Clients.PHP Cross-Site Scripting Vulnerability
14986| [16313] Netrix X-Site Manager Product_Details.PHP Cross-Site Scripting Vulnerability
14987| [16312] My Amazon Store Manager Search.PHP Cross-Site Scripting Vulnerability
14988| [16295] Cisco CallManager Multiple Remote Denial Of Service Vulnerabilities
14989| [16293] Cisco CallManager CCMAdmin Remote Privilege Escalation Vulnerability
14990| [16290] Check Point VPN-1 SecureClient Path Specification Local Privilege Escalation Vulnerability
14991| [16226] SuSE Open Enterprise Server Novell Remote Manager HTTP Request Header Heap Overflow Vulnerability
14992| [16206] CaLogic Calendars Add Event Multiple HTML Injection Vulnerabilities
14993| [16116] VBulletin Event Title HTML Injection Vulnerability
14994| [16075] Juniper NetScreen-Security Manager Remote Denial of Service Vulnerability
14995| [15976] Ultraapps Issue Manager Privilege Escalation Vulnerability
14996| [15847] PHP Web Scripts Ad Manager Pro Advertiser_statistic.PHP SQL Injection Vulnerability
14997| [15815] Alt-N MDaemon WorldClient Denial Of Service Vulnerability
14998| [15789] Lyris ListManager Hidden Variable Information Disclosure Vulnerability
14999| [15788] Lyris Listmanager TCLHTTPd Service Multiple Information Disclosure Vulnerabilities
15000| [15787] Lyris ListManager Multiple SQL Injection Vulnerabilities
15001| [15786] Lyris ListManager Command Execution Vulnerability
15002| [15785] QNX RTOS Unspecified Local DHCP.Client Vulnerability
15003| [15757] Check Point VPN-1 SecureClient Policy Bypass Vulnerability
15004| [15717] Web4Future Affiliate Manager PRO Functions.PHP SQL Injection Vulnerability
15005| [15658] 88Scripts Event Calendar Index.PHP SQL Injection Vulnerability
15006| [15604] Helpdesk Issue Manager Multiple SQL Injection Vulnerabilities
15007| [15517] PHP Download Manager Files.PHP SQL Injection Vulnerability
15008| [15405] Stonesoft StoneGate Firewall/VPN Client IKEv1 Traffic Multiple Unspecified Vulnerabilities
15009| [15403] Secgo Software Crypto IP Gateway/Client IKEv1 Traffic Multiple Unspecified Vulnerabilities
15010| [15376] IBM DB2 Content Manager Multiple Denial of Service Vulnerabilities
15011| [15353] VERITAS NetBackup Volume Manager Daemon Buffer Overflow Vulnerability
15012| [15346] FileZilla Server Terminal Remote Client-Side Buffer Overflow Vulnerability
15013| [15330] Ocean12 ASP Calendar Manager SQL Injection Vulnerability
15014| [15329] Ocean12 ASP Calendar Manager Authentication Bypass Vulnerability
15015| [15244] PHPCafe Tutorial Manager Index.PHP SQL Injection Vulnerability
15016| [15239] OpenVPN Client Remote Format String Vulnerability
15017| [15237] PHP Advanced Transfer Manager Remote Unauthorized Access Vulnerability
15018| [15186] SiteTurn Domain Manager Pro Admin Panel Cross-Site Scripting Vulnerability
15019| [15144] Cisco 11500 Content Services Switch Malformed SSL Client Certificate Denial of Service Vulnerability
15020| [15097] Accelerated Mortgage Manager Password Field SQL Injection Vulnerability
15021| [15074] PHP Advanced Transfer Manager Arbitrary File Upload Vulnerability
15022| [15066] Microsoft Windows Client Service For Netware Buffer Overflow Vulnerability
15023| [15022] AspReady FAQ Manager SQL Injection Vulnerability
15024| [14977] Squid Proxy Client NTLM Authentication Denial Of Service Vulnerability
15025| [14952] Novell GroupWise Client Local Integer Overflow Vulnerability
15026| [14887] PHP Advanced Transfer Manager Multiple Cross-Site Scripting Vulnerabilities
15027| [14883] PHP Advanced Transfer Manager Multiple Directory Traversal Vulnerabilities
15028| [14880] Opera Web Browser Mail Client Multiple Vulnerabilities
15029| [14869] CutePHP CuteNews Flood Protection Client-IP PHP Code Injection Vulnerability
15030| [14830] LineControl Java Client Local Password Disclosure Vulnerability
15031| [14746] Land Down Under Events.PHP HTML Injection Vulnerability
15032| [14743] Microsoft Windows Keyboard Event Privilege Escalation Weakness
15033| [14737] HP OpenView Event Correlation Services Unspecified Remote Privilege Escalation Vulnerability
15034| [14730] FileZilla FTP Client Hard-Coded Cipher Key Vulnerability
15035| [14721] Apache Mod_SSL SSLVerifyClient Restriction Bypass Vulnerability
15036| [14708] Symantec LiveUpdate Client Local Information Disclosure Vulnerability
15037| [14693] UMN Gopher Client Remote Buffer Overflow Vulnerability
15038| [14690] BFCommand & Control Server Manager Multiple Remote Vulnerabilities
15039| [14687] Sun Solaris DHCP Client Remote Code Execution Vulnerability
15040| [14662] HP OpenView Network Node Manager Multiple Remote Command Execution Vulnerabilities
15041| [14655] LeapFTP Client LSQ File Remote Buffer Overflow Vulnerability
15042| [14633] Cisco Intrusion Prevention System Local Privilege Escalation Vulnerability
15043| [14610] OpenVPN Same Client Certificate Denial Of Service Vulnerability
15044| [14542] Nortel Contivity VPN Client Local Privilege Escalation Vulnerability
15045| [14530] AOL Client Software Local Privilege Escalation Vulnerability
15046| [14487] EMC Navisphere Manager Directory Traversal And Information Disclosure Vulnerabilities
15047| [14441] No-Brainer SMTP Client Log_Msg() Remote Format String Vulnerability
15048| [14437] MySQL Eventum Multiple SQL Injection Vulnerabilities
15049| [14436] MySQL Eventum Multiple Cross-Site Scripting Vulnerabilities
15050| [14409] Thomson Web Skill Vantage Manager SQL Injection Vulnerability
15051| [14398] Novell GroupWise Client Remote Buffer Overflow Vulnerability
15052| [14384] Fetchmail POP3 Client Remote Denial of Service Vulnerabilities
15053| [14349] Fetchmail POP3 Client Buffer Overflow Vulnerability
15054| [14347] Intruder Client Remote Denial of Service Vulnerability
15055| [14260] Microsoft Windows Network Connections Manager Library Local Denial of Service Vulnerability
15056| [14255] Cisco CallManager AUPair Service Remote Heap Buffer Overflow Vulnerability
15057| [14253] Cisco CallManager Multiple Failed Logins Remote Denial Of Service Vulnerability
15058| [14252] Cisco CallManager CCM.EXE Remote Denial Of Service Vulnerability
15059| [14251] Cisco CallManager CTI Manager Remote Denial Of Service Vulnerability
15060| [14250] Cisco CallManager RISDC Remote Denial Of Service Vulnerability
15061| [14230] Nokia Affix BTFTP Client Filename Remote Buffer Overflow Vulnerability
15062| [14210] Backup Manager Insecure Temporary File Creation Vulnerability
15063| [14178] Microsoft Windows MSRPC Eventlog Information Disclosure Vulnerability
15064| [14159] Internet Download Manager Buffer Overflow Vulnerability
15065| [14123] Prevx Pro 2005 Intrusion Prevention System Multiple Vulnerabilities
15066| [14031] Asterisk Manager Interface Command Processing Remote Buffer Overflow Vulnerability
15067| [13965] Bitrix Site Manager Remote File Include Vulnerability
15068| [13950] Microsoft Windows Web Client Service Remote Code Execution Vulnerability
15069| [13940] Multiple Vendor Telnet Client Remote Information Disclosure Vulnerability
15070| [13925] Macromedia eLicensing Client Activation Code Local Privilege Escalation Vulnerability
15071| [13901] Leafnode FetchFews Client Article Header Timeout Remote Denial of Service Vulnerability
15072| [13900] Loki Download Manager Catinfo.ASP SQL Injection Vulnerability
15073| [13898] Loki Download Manager Default.ASP SQL Injection Vulnerability
15074| [13892] Backup Manager Archive Repository Disclosure Vulnerability
15075| [13859] WWWeb Concepts Events System LOGIN.ASP SQL Injection Vulnerability
15076| [13759] Active News Manager LOGIN.ASP SQL Injection Vulnerability
15077| [13756] Apache Tomcat Java Security Manager Bypass Vulnerability
15078| [13691] PHP Advanced Transfer Manager Arbitrary File Include Vulnerability
15079| [13686] Groove Networks Groove Virtual Office Client Installation Insecure Default Permissions Vulnerability
15080| [13641] Mozilla Suite And Firefox Multiple Script Manager Security Bypass Vulnerabilities
15081| [13640] Sigma ISP Manager Sigmaweb.DLL SQL Injection Vulnerability
15082| [13580] ASP Virtual News Manager Admin_Login.ASP SQL Injection Vulnerability
15083| [13550] NiteEnterprises Remote File Manager Denial of Service Vulnerability
15084| [13547] Net56 Browser Based File Manager SQL Injection Authentication Bypass Vulnerability
15085| [13542] PHP Advanced Transfer Manager Arbitrary File Upload Vulnerability
15086| [13501] YusASP Web Asset Manager Unauthorized Access Vulnerability
15087| [13492] Leafnode fetchnews Client Article Body Remote Denial of Service Vulnerability
15088| [13489] Leafnode fetchnews Client Article Header Remote Denial of Service Vulnerability
15089| [13474] SmartList ListManager Arbitrary List Addition Vulnerability
15090| [13470] HP OpenView Network Node Manager Unspecified Remote Vulnerabilities
15091| [13469] HP OpenView Event Correlation Service Unspecified Remote Vulnerabilities
15092| [13460] Mtp-Target Client Remote Format String Vulnerability
15093| [13409] Altiris Client Service Local Privilege Escalation Vulnerability
15094| [13279] Ocean12 Calendar Manager Admin Form SQL Injection Vulnerability
15095| [13197] GOCR ReadPGM Remote Client-Side Buffer Overflow Vulnerability
15096| [13195] GOCR ReadPGM NetPBM Remote Client-Side Integer Overflow Vulnerability
15097| [13081] Citrix MetaFrame Web Client Access Restriction Bypass Vulnerability
15098| [13079] Centrinity FirstClass Client Bookmark Window File Execution Vulnerability
15099| [13052] Network-Client FTP Now Local Password Disclosure Vulnerability
15100| [13049] Ocean12 Membership Manager Pro SQL Injection Vulnerability
15101| [13046] Ocean12 Membership Manager Pro Cross-Site Scripting Vulnerability
15102| [13029] HP OpenView Network Node Manager Unspecified Remote Denial of Service Vulnerability
15103| [13022] IBM AIX NIS Client Unspecified Remote Vulnerability
15104| [12971] Linux Kernel Serial Driver Local Mouse And Keyboard Event Injection Vulnerability
15105| [12968] MaxWebPortal Events And Links Interface Multiple Input Validation Vulnerabilities
15106| [12919] Multiple Vendor Telnet Client Env_opt_add Heap-Based Buffer Overflow Vulnerability
15107| [12918] Multiple Vendor Telnet Client LINEMODE Sub-Options Remote Buffer Overflow Vulnerability
15108| [12871] Nortel Contivity VPN Client Local Password Disclosure Weakness
15109| [12773] WEBInsta Mailing Manager Remote File Include Vulnerability
15110| [12742] SafeNet Sentinel License Manager Remote Buffer Overflow Vulnerability
15111| [12730] Sylpheed Mail Client Buffer Overflow Vulnerability
15112| [12649] Cyclades AlterPath Manager Multiple Remote Vulnerabilities
15113| [12635] ProZilla Initial Server Response Remote Client-Side Format String Vulnerability
15114| [12614] Information Resource Manager LDAP Authentication Unspecified Vulnerability
15115| [12571] Check Point VPN-1 SecureClient Malformed IP Address Local Memory Access Vulnerability
15116| [12541] Microsoft Internet Explorer Mouse Event URI Status Bar Obfuscation Weakness
15117| [12528] Daily Strip Manager Multiple Unspecified Remote Vulnerabilities
15118| [12490] SafeNet SoftRemote VPN Client Local Password Disclosure Vulnerability
15119| [12415] IBM AIX NIS Client Unspecified Remote Code Execution Vulnerability
15120| [12363] PHPEventCalendar Multiple Remote HTML Injection Vulnerabilities
15121| [12312] Konversation IRC Client Multiple Remote Vulnerabilities
15122| [12287] ImageMagick Photoshop Document Parsing Remote Client-Side Buffer Overflow Vulnerability
15123| [12283] Mnet Soft Factory NodeManager Professional SNMP Trap Handling Buffer Overflow Vulnerability
15124| [12160] Microsoft Windows FTP Client Directory Traversal Vulnerability
15125| [12133] MySQL Eventum Multiple Input Validation Vulnerabilities
15126| [12111] E107 Image Manager Unauthorized File Upload Vulnerability
15127| [12106] NetCat Exec Mode Client Request Buffer Overflow Vulnerability
15128| [12098] HP-UX System Administration Manager Privilege Escalation Vulnerability
15129| [12076] MPlayer And Xine PNM_Get_Chunk Multiple Remote Client-Side Buffer Overflow Vulnerabilities
15130| [12038] Crystal Art Crystal FTP Remote Client-Side Buffer Overflow Vulnerability
15131| [12011] Junkie FTP Client Server Response Download Filename File Corruption Vulnerability
15132| [12002] RARLAB WinRAR File Name Remote Client-Side Buffer Overflow Vulnerability
15133| [11987] MPlayer And Xine-Lib Multiple Remote Client-Side Buffer Overflow Vulnerabilities
15134| [11986] DXFScope Remote Client-Side Buffer Overflow Vulnerability
15135| [11978] Junkie FTP Client Server Response Download Filename Command Execution Vulnerability
15136| [11970] XLReader Remote Client-Side Buffer Overflow Vulnerability
15137| [11969] Xine-Lib Remote Client-Side Buffer Overflow Vulnerability
15138| [11965] TNFTP FTP Client Directory Traversal Vulnerability
15139| [11962] MPlayer MMST Get_Header Remote Client-Side Buffer Overflow Vulnerability
15140| [11958] MPG123 Find Next File Remote Client-Side Buffer Overflow Vulnerability
15141| [11901] Opera Web Browser KDE KFMCLIENT Remote Command Execution Vulnerability
15142| [11869] F-Secure Policy Manager FSMSH.DLL CGI Application Installation Path Disclosure Vulnerability
15143| [11724] Gearbox Software Halo Game Client Remote Denial Of Service Vulnerability
15144| [11720] Citrix MetaFrame Presentation Server Client Debugging Utility Information Disclosure Vulnerability
15145| [11709] Altiris Deployment Solution Client Service Local Privilege Escalation Vulnerability
15146| [11693] Event Calendar Multiple Remote Vulnerabilities
15147| [11623] Nortel Contivity VPN Client Username Enumeration Vulnerability
15148| [11527] InetUtils TFTP Client Multiple Remote Buffer Overflow Vulnerabilities
15149| [11495] Nortel Contivity VPN Client Gateway Certificate Check Failure Vulnerability
15150| [11434] DMXReady Site Chassis Manager Cross-Site Scripting And SQL Injection Vulnerabilities
15151| [11433] Yak! Chat Client FTP Server Directory Traversal Vulnerability
15152| [11280] Freenet6 Client Default Installation Configuration File Permission Vulnerability
15153| [11217] J\xC3\xB6rg Schilling SDD Remote Tape Support Client Undisclosed Vulnerability
15154| [11194] Mozilla/Firefox Browsers PrivilegeManager EnablePrivilege Dialog Manipulation Vulnerability
15155| [11142] Cerulean Studios Trillian Client MSN Module Remote Buffer Overflow Vulnerability
15156| [11000] Novell NetWare Web Manager Unspecified Vulnerability
15157| [10907] HP-UX Process Resource Manager Potential Data Corruption Vulnerability
15158| [10903] Symantec Clientless VPN Gateway 4400 Series Multiple Vulnerabilities
15159| [10869] Neon WebDAV Client Library Unspecified Vulnerability
15160| [10813] phpMyFAQ Image Manager Authentication Bypass Vulnerability
15161| [10794] eSeSIX Thintune Thin Client Devices Multiple Vulnerabilities
15162| [10792] EasyWeb FileManager Module Directory Traversal Vulnerability
15163| [10747] Sun Solaris Volume Manager Denial Of Service Vulnerability
15164| [10727] Novell BorderManager Remote Denial Of Service Vulnerability
15165| [10707] Microsoft Windows Utility Manager Local Privilege Escalation Variant Vulnerability
15166| [10703] Mozilla Personal Security Manager Certificate Handling Denial Of Service Vulnerability
15167| [10690] Microsoft Internet Explorer Popup.show Mouse Event Hijacking Vulnerability
15168| [10664] PureFTPd Accept_Client Remote Denial of Service Vulnerability
15169| [10625] Popclient Email Message Buffer Overflow Vulnerability
15170| [10580] Sun Enterprise Storage Manager Local Unspecified Privilege Escalation Vulnerability
15171| [10385] Neon WebDAV Client Library ne_rfc1036_parse Function Heap Overflow Vulnerability
15172| [10364] osCommerce File Manager Directory Traversal Vulnerability
15173| [10336] Symantec Client Firewall Remote DNS Response Denial Of Service Vulnerability
15174| [10335] Symantec Client Firewall NetBIOS Handler Remote Heap Overflow Vulnerability
15175| [10334] Symantec Client Firewall DNS Response Buffer Overflow Vulnerability
15176| [10333] Symantec Client Firewall NetBIOS Name Service Response Buffer Overflow Vulnerability
15177| [10323] Microsoft Outlook Mail Client E-mail Address Verification Weakness
15178| [10314] Tutorials Manager Multiple Remote SQL Injection Vulnerabilities
15179| [10234] Citrix MetaFrame XP Client Drive Access Vulnerability
15180| [10155] Cisco IPsec VPN Client Group Password Disclosure Vulnerability
15181| [10138] CVS Client RCS Diff File Corruption Vulnerability
15182| [10136] Neon WebDAV Client Library Format String Vulnerabilities
15183| [10134] Novell Nsure Identity Manager Password Hint Plaintext Storage Weakness
15184| [10124] Microsoft Windows Utility Manager Local Privilege Escalation Vulnerability
15185| [10080] Sun Solaris Secure Shell Daemon Client Logging Weakness
15186| [10074] Centrinity FirstClass Desktop Client Local Buffer Overflow Vulnerability
15187| [10049] Citrix MetaFrame Password Manager Failure To Encrypt Application Password Vulnerability
15188| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
15189| [9977] Trend Micro Interscan WebManager Java TeleWindow Unspecified Credential Theft Vulnerability
15190| [9935] Expinion.net News Manager Lite Multiple Vulnerabilities
15191| [9933] Apache mod_disk_cache Module Client Authentication Credential Storage Weakness
15192| [9918] Clever's Games Terminator 3: War of the Machines Remote Client Buffer Overflow Vulnerability
15193| [9912] Symantec Client Firewall Products SYMNDIS.SYS Driver Remote Denial Of Service Vulnerability
15194| [9911] PHP-Nuke Error Manager Module Multiple Vulnerabilities
15195| [9886] WS_FTP Pro Client Remote Stack Buffer Overflow Vulnerability
15196| [9872] WS_FTP Pro Client Remote Buffer Overflow Vulnerability
15197| [9797] QMail-QMTPD RELAYCLIENT Environment Variable Integer Overflow Vulnerability
15198| [9785] Volition Freespace 2 Game Client Remote Buffer Overflow Vulnerability
15199| [9775] Volition Red Faction Game Client Remote Buffer Overflow Vulnerability
15200| [9763] Apple Mac OS X Apple Filing Protocol Client Multiple Vulnerabilities
15201| [9761] Microsoft Internet Explorer Cross-Domain Event Leakage Vulnerability
15202| [9720] phpNewsManager Functions Script File Disclosure Vulnerability
15203| [9671] Freeform Interactive Purge/Purge Jihad Game Client Remote Buffer Overflow Vulnerability
15204| [9602] The Palace Graphical Chat Client Remote Buffer Overflow Vulnerability
15205| [9590] Apache-SSL Client Certificate Forging Vulnerability
15206| [9571] Apache mod_digest Client-Supplied Nonce Verification Vulnerability
15207| [9550] 0verkill Game Client Multiple Local Buffer Overflow Vulnerabilities
15208| [9502] BEA WebLogic Server and Express SSL Client Privilege Escalation Vulnerability
15209| [9473] EA Black Box Need For Speed Hot Pursuit 2 Game Client Remote Buffer Overflow Vulnerability
15210| [9455] NetScreen Security Manager Insecure Default Remote Communication Vulnerability
15211| [9448] Veritas Net Backup Professional Open Transaction Manager Remote Drive Access Vulnerability
15212| [9331] Mozilla MailNews Client E-Mail Attachment Script Execution Vulnerability
15213| [9317] Alt-N MDaemon/WorldClient Form2Raw Raw Message Handler Buffer Overflow Vulnerability
15214| [9108] Microsoft Internet Explorer Method Caching Mouse Click Event Hijacking Vulnerability
15215| [9072] Yak! Chat Client FTP Server Default Username Credential Weakness
15216| [9053] phpWebFileManager index.php Directory Traversal Vulnerability
15217| [9052] Symantec PCAnywhere Chat Client Privilege Escalation Vulnerability
15218| [9042] HP-UX Partition Manager Unspecified Remote Vulnerability
15219| [9041] PeopleSoft PeopleTools IClient Servlet Arbitrary Code Execution Vulnerability
15220| [9009] Microsoft Internet Explorer Mouse Click Event Hijacking Vulnerability
15221| [9004] nCube Server Manager Directory Traversal Vulnerability
15222| [8892] Sun Microsystems Java Virtual Machine Security Manager Denial Of Service Vulnerability
15223| [8877] Sylpheed-Claws Mail Client SMTP Error Reporting Format String Vulnerability
15224| [8865] HP Servicecontrol Manager Unauthorized Access Vulnerability
15225| [8859] HP OpenView Network Node Manager Denial Of Service Vulnerabilities
15226| [8746] OpenSSL SSLv2 Client_Master_Key Remote Denial Of Service Vulnerability
15227| [8734] Gamespy 3d IRC Client Remote Buffer Overflow Vulnerability
15228| [8659] Flying Dog Powerslave Portalmanager sql_id Information Disclosure Vulnerability
15229| [8615] Sun Solaris SAdmin Client Credentials Remote Administrative Access Vulnerability
15230| [8581] Yak! Chat Client FTP Server Default Credentials Vulnerability
15231| [8557] Mah-Jong Client/Server Remote sscanf() Buffer Overflow Vulnerability
15232| [8541] Leafnode fetchnews Client Remote Denial of Service Vulnerability
15233| [8483] Whois Client Command Line Buffer Overrun Vulnerability
15234| [8463] Piolet Client Remote Denial Of Service Vulnerability
15235| [8445] eMule Client Servername Format String Vulnerability
15236| [8443] eMule Client OP_SERVERMESSAGE Format String Vulnerability
15237| [8440] eMule Client OP_SERVERIDENT Heap Overflow Vulnerability
15238| [8400] Netris Client-Side Buffer Overrun Vulnerability
15239| [8397] Microsoft Windows 2000 Subnet Bandwidth Manager RSVP Server Authority Hijacking Vulnerability
15240| [8310] Roundup Client.PY HTML Injection Vulnerability
15241| [8308] Novell BorderManager Multiple Vulnerabilities
15242| [8299] Valve Software Half-Life Client Connection Routine Buffer Overflow Vulnerability
15243| [8266] Apple Mac OS X Server Workgroup Manager Undisclosed Insecure Account Creation Vulnerability
15244| [8254] Opera M2 Mail Client Policy Circumvention Vulnerability
15245| [8180] Netscape Client Detection Tool Plug-In Buffer Overflow Vulnerability
15246| [8154] Microsoft Windows Accessibility Utility Manager Privilege Escalation Vulnerability
15247| [8123] BillingExplorer Multiple Remote Client Communication Integrity Vulnerabilities
15248| [8107] Cerulean Studios Trillian Client Malformed TypingUser Denial Of Service Vulnerability
15249| [8087] Microsoft Windows Security Accounts Manager API Denial Of Service Vulnerability
15250| [7996] WebJeff Filemanager Plain Text Password Storage Vulnerability
15251| [7995] WebJeff Filemanager File Disclosure Vulnerability
15252| [7934] Dantz Retrospect Client StartupItems Insecure Default Permissions Vulnerability
15253| [7887] MySQL libmysqlclient Library mysql_real_connect() Buffer Overrun Vulnerability
15254| [7874] RPM Package Manager FTP NLST Data Integer Overflow Remote Memory Corruption Vulnerability
15255| [7860] LeapFTP Client PASV Response Buffer Overflow Vulnerability
15256| [7859] FlashFXP Client Request Hostname Buffer Overflow Vulnerability
15257| [7810] Microsoft Internet Explorer Classic Mode FTP Client Cross Domain Scripting Vulnerability
15258| [7808] Computer Associates Unicenter Asset Manager Stored Secret Data Decryption Weakness
15259| [7781] Sun Management Center Change Manager PamVerifier Buffer Overflow Vulnerability
15260| [7703] Upclient Command Line Argument Buffer Overflow Vulnerability
15261| [7671] Prishtina FTP Client Remote Denial of Service Vulnerability
15262| [7665] Cisco VPN Client Privilege Escalation Variant Vulnerability
15263| [7622] Horde Turba Contact Manager Status.PHP Path Disclosure Vulnerability
15264| [7620] Venturi Client Unauthorized Connection Proxying Vulnerability
15265| [7603] Multiple IMAP Client Integer Overflow Vulnerabilities
15266| [7602] Multiple Vendor IMAP Client Mailbox Size Memory Corruption Vulnerability
15267| [7599] Cisco VPN Client Privilege Escalation Vulnerability
15268| [7463] Mirabilis ICQ POP3 Client Date Field Signed Integer Overflow Vulnerability
15269| [7462] Mirabilis ICQ POP3 Client Subject Field Signed Integer Overflow Vulnerability
15270| [7461] Mirabilis ICQ POP3 Client UIDL Command Format String Vulnerability
15271| [7460] Worker Filemanager Directory Creation Race Condition Vulnerability
15272| [7451] 3D-FTP Client Buffer Overflow Vulnerability
15273| [7379] NetScreen Global PRO Policy Manager IPSec Tunnel Security Configuration Weakness
15274| [7329] Ocean12 ASP Guestbook Manager Code Injection Vulnerability
15275| [7328] Ocean12 ASP Guestbook Manager Information Disclosure Vulnerability
15276| [7315] FileMaker Pro Client Authentication User Password Disclosure Vulnerability
15277| [7292] SETI@home Client Program Remote Buffer Overflow Vulnerability
15278| [7284] Entrust Authority Security Manager Multiple Authorization Circumvention Vulnerability
15279| [7281] SETI@home Client Program Information Disclosure Vulnerability
15280| [7276] Citrix ICA Client Server Key Verification Vulnerability
15281| [7190] Web Chat Manager HTML Code Injection Vulnerability
15282| [7170] PHPNuke Banners.PHP Banner Manager Password Disclosure Vulnerability
15283| [7164] eDonkey Clients Multiple Chat Dialog Resource Consumption Vulnerability
15284| [7095] ircII Client-Side Cannot_Join_Channel Memory Corruption Vulnerability
15285| [7094] ircII Client-Side Private Message Handling Memory Corruption Vulnerability
15286| [7040] DBTools DBManager Professional Information Disclosure Weakness
15287| [7035] Simple File Manager Filename Script Injection Vulnerability
15288| [6989] Sun Microsystems Solaris FTP Client Debug Mode Password Display Vulnerability
15289| [6933] phpWebFileManager File Disclosure Vulnerability
15290| [6924] Smart IRC Daemon Remote Client DNS Buffer Overflow Vulnerability
15291| [6828] APC apcupsd Client Syslog Format String Vulnerability
15292| [6822] RARLAB FAR File Manager Buffer Overflow Vulnerability
15293| [6821] Multiple Vendor Email Client JavaScript Information Leakage Vulnerability
15294| [6817] Microsoft Windows NT/2000/XP LAN Manager Password Hashing Weakness
15295| [6816] Alt-N MDaemon/WorldClient Form2Raw Mail Header Spoofing Vulnerability
15296| [6774] Epic Games Unreal Engine Client Unreal URL Denial Of Service Vulnerability
15297| [6765] Macromedia ColdFusion HTTP Client Sample Application Proxy Access Vulnerability
15298| [6764] Electrasoft 32Bit FTP Client Long Server Banner Buffer Overflow Vulnerability
15299| [6762] ByteCatcher FTP Client Long Server Banner Buffer Overflow Vulnerability
15300| [6736] HP Compaq Insight Manager/Compaq Web Agent Session Persistence Vulnerability
15301| [6673] Palm HotSync Manager Remote Denial of Service Vulnerability
15302| [6641] Citrix Metaframe ICA Client Privilege Inheritance Vulnerability
15303| [6582] Half-Life Client Server Message Format String Vulnerability
15304| [6553] TANne Session Manager SysLog Format String Vulnerability
15305| [6499] Netscape Email Client Message Deletion Weakness
15306| [6495] Microsoft Visual SourceSafe Client-Side Access Control Weakness
15307| [6381] Microsoft Java Virtual Machine Standard Security Manager Access Validation Vulnerability
15308| [6374] MySQL libmysqlclient Library Read_One_Row Buffer Overflow Vulnerability
15309| [6370] MySQL libmysqlclient Library Read_Rows Buffer Overflow Vulnerability
15310| [6360] Multiple Vendor FTP Client Side File Overwriting Vulnerability
15311| [6352] WGet NLST Client Side File Overwriting Vulnerability
15312| [6310] Aldap Contact Manager Authentication Bypass Vulnerability
15313| [6263] SSH Communications Secure Shell Windows Client URL Catcher Buffer Overflow Vulnerability
15314| [6095] Heysoft EventSave Event Log Notification Weakness
15315| [5974] Sabre Desktop Reservation Software Client Denial Of Service Vulnerability
15316| [5972] Microsoft Windows 2000/XP Full Event Log Administrative Alert Weakness
15317| [5817] Citrix MetaFrame Client-Specified Published Applications Vulnerability
15318| [5780] HP Compaq Insight Manager Web Interface Cross-Site Scripting Vulnerability
15319| [5736] Cisco Mac OS VPN 5000 Client Password Disclosure Vulnerability
15320| [5734] Cisco VPN 5000 Client Buffer Overrun Vulnerabilities
15321| [5705] Mac OS X NetInfo Manager Unauthorized Access Vulnerability
15322| [5668] Netscreen-Remote VPN Client IKE Packet Excessive Payloads Vulnerability
15323| [5653] Cisco VPN Client Predictable Sequence Number Vulnerability
15324| [5652] Cisco VPN Client Distinguished Name Validation Vulnerability
15325| [5651] Cisco VPN Client TCP Filter Information Leakage Vulnerability
15326| [5650] Cisco VPN Client Password Disclosure Vulnerability
15327| [5649] Cisco VPN Client NETBIOS TCP Packet Denial Of Service Vulnerability
15328| [5625] Cisco VPN Concentrator PPTP Client Remote Denial Of Service Vulnerability
15329| [5620] Cisco VPN 3000 Series Concentrator Client Authentication Denial Of Service Vulnerability
15330| [5594] RPM Package Manager Signature Verification Insufficient User Feedback Weakness
15331| [5533] Stephen Ball File Manager Source.PHP Directory Traversal Vulnerability
15332| [5512] Microsoft File Transfer Manager Arbitrary File Upload/Download Vulnerability
15333| [5508] Microsoft File Transfer Manager ActiveX Control Buffer Overflow Vulnerability
15334| [5480] Microsoft Windows 2000 Network Connection Manager Privilege Elevation Vulnerability
15335| [5474] Webscriptworld Web Shop Manager Remote Arbitrary Command Execution Vulnerability
15336| [5443] Cisco VPN Client IKE Packet Excessive Payloads Vulnerability
15337| [5441] Cisco VPN Client IKE Security Parameter Index Payload Buffer Overflow Vulnerability
15338| [5440] Cisco VPN Client Zero Length IKE Packet Denial Of Service Vulnerability
15339| [5371] Steve Horsburg Filemanager File Disclosure Vulnerability
15340| [5363] OpenSSL SSLv2 Malformed Client Key Remote Buffer Overflow Vulnerability
15341| [5351] Fake Identd Client Query Remote Buffer Overflow Vulnerability
15342| [5308] Microsoft Metadirectory Services Remote LDAP Client Administration Vulnerability
15343| [5290] Multiple Vendor Web Browser JavaScript Modifier Keypress Event Subversion Vulnerability
15344| [5284] Multiple SSH Client Protocol Change Default Warning Weakness
15345| [5207] Sun Solaris Volume Manager Local Buffer Overflow Vulnerability
15346| [5183] NcFTP Client PORT Allowed With Proxy Server Weakness
15347| [5169] WorldSpan Res Manager Malformed TCP Packet Denial Of Service Vulnerability
15348| [5143] HP-UX DCE Client IPv6 Denial of Service Vulnerability
15349| [5098] Inktomi Traffic Server Traffic_Manager Path Argument Buffer Overflow Vulnerability
15350| [5079] Pirch IRC Client Malformed Link Buffer Overrun Vulnerability
15351| [5056] Cisco VPN Client for Unix Local Buffer Overflow Vulnerability
15352| [5021] PHPEventCalendar Remote Command Execution Vulnerability
15353| [4974] Geeklog Calendar Event Form Script Injection Vulnerability
15354| [4930] Multiple Microsoft Product Gopher Client Buffer Overflow Vulnerability
15355| [4923] Caldera Volution Manager Default Cleartext Directory Administrator Password Vulnerability
15356| [4760] Cisco IDS Device Manager Arbitrary File Read Access Vulnerability
15357| [4759] Hosting Controller DSNManager Directory Traversal Vulnerability
15358| [4746] Swatch Throttled Event Reporting Vulnerability
15359| [4726] Novell BorderManager Connection Table Denial of Service Vulnerability
15360| [4698] Novell BorderManager RTSP Proxy Denial Of Service Vulnerability
15361| [4697] Novell BorderManager IP/IPX Gateway Denial of Service Vulnerability
15362| [4696] Novell BorderManager FTP-Proxy Denial Of Service Vulnerability
15363| [4689] MDaemon WorldClient Folder Creation Buffer Overflow Vulnerability
15364| [4687] WorldClient Arbitrary File Deletion Vulnerability
15365| [4676] Pascal Michaud ASP Client Check SQL Injection Vulnerability
15366| [4616] Admanager Script Injection Vulnerability
15367| [4615] Admanager Content Manipulation Vulnerability
15368| [4611] Cisco Systems VPN Client for Windows Dangerous Dialog Instructions Weakness
15369| [4595] Trend Micro InterScan eManager Bcc Disclosure Vulnerability
15370| [4592] KTH eBones Kerberos4 FTP Client Passive Mode Heap Overflow Vulnerability
15371| [4583] Internet Explorer Recursive JavaScript Event Denial of Service Vulnerability
15372| [4572] Matu FTP Client Buffer Overflow Vulnerability
15373| [4500] IBM Tivoli Storage Manager Long Username Buffer Overflow Vulnerability
15374| [4410] Windows 2000 DCOM Client Memory Disclosure Vulnerability
15375| [4405] Netware Remote Manager Authentication Buffer Overflow Vulnerability
15376| [4370] Cisco CallManager CTI Memory Leak Denial of Service Vulnerability
15377| [4348] NEWLOG NetSupport Manager Directory Traversal Vulnerability
15378| [4347] Gravity Storm Service Pack Manager 2000 Directory Permissions Vulnerability
15379| [4253] Check Point FW-1 SecuClient/SecuRemote Client Design Vulnerability
15380| [4177] KMail Client Denial Of Service Vulnerability
15381| [4031] ICQ For MacOS X Client Denial Of Service Vulnerability
15382| [3962] Ganglia PHP RRD Web Client Remote Command Execution Vulnerability
15383| [3812] FAQManager.CGI Directory Traversal Vulnerability
15384| [3810] FAQManager.CGI NULL Character Arbitrary File Disclosure Vulnerability
15385| [3781] BrowseFTP Client Buffer Overflow Vulnerability
15386| [3748] STunnel Client Negotiation Protocol Format String Vulnerability
15387| [3688] Citrix ICA Client Automatic Remote Code Execution Vulnerability
15388| [3651] Volition Red Faction Game Server/Client Denial Of Service Vulnerability
15389| [3587] Audiogalaxy Plaintext Password Storage Vulnerability
15390| [3482] Compaq Insight Manager XE Buffer Overflow Vulnerability
15391| [3479] Microsoft Windows 2000 NTFS With Macintosh Client Directory Permission Vulnerability
15392| [3439] MacOS X NetInfo Manager Privilege Escalation Vulnerability
15393| [3419] Cisco PIX Firewall Manager Plaintext Password Vulnerability
15394| [3399] HP OpenView Network Node Manager Arbitrary Privilege Elevation Vulnerability
15395| [3353] Half-Life Client Side Connect Buffer Overflow Vulnerability
15396| [3327] Trend Micro InterScan eManager Buffer Overflow Vulnerability
15397| [3316] MacOS X Client Apache Directory Contents Disclosure Vulnerability
15398| [3310] ProFTPD Client Hostname Resolving Vulnerability
15399| [3303] Check Point Firewall-1 GUI Client Log Viewer Symbolic Link Vulnerability
15400| [3288] Vibechild Directory Manager Command Execution Vulnerability
15401| [3267] Gnut Gnutella Client Arbitrary Script Code Execution Vulnerability
15402| [3249] HP Process Resource Manager Environment Variable Privilege Elevation Vulnerability
15403| [3234] UltraEdit FTP Client Weak Password Encryption Vulnerability
15404| [3140] Identix BioLogon Client Biometric Authentication Bypass Vulnerability
15405| [3120] Mathematica License Manager Connected Port Denial Of Service Vulnerability
15406| [3118] Mathematica License Manager Arbitrary License Retrieval Vulnerability
15407| [3033] Microsoft Windows 2000 Task Manager Process Termination Vulnerability
15408| [2959] Trend Micro InterScan WebManager HttpSave.dll Buffer Overflow Vulnerability
15409| [2907] Trend Micro InterScan WebManager RegGo.dll Buffer Overflow Vulnerability
15410| [2852] MacOS X Client Apache File Protection Bypass Vulnerability
15411| [2850] Volution Client Authentication Failure Hijacking Vulnerability
15412| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
15413| [2748] ARCservIT Client inetd.tmp Arbitrary File Overwrite Vulnerability
15414| [2741] ARCservIT Client asagent.tmp Arbitrary File Overwrite Vulnerability
15415| [2623] Novell BorderManager Remote DoS Vulnerability
15416| [2478] Alt-N WorldClient 2.2.2 DOS-Device Denial of Service Vulnerability
15417| [2463] Microsoft IE Telnet Client File Overwrite Vulnerability
15418| [2460] Microsoft Windows 2000 Event Viewer Buffer Overflow Vulnerability
15419| [2305] AT&T WinVNC Client Buffer Overflow Vulnerability
15420| [2296] Wu-Ftpd Debug Mode Client Hostname Format String Vulnerability
15421| [2264] Icecast print_client() Format String Vulnerability
15422| [2239] HP-UX Support Tools Manager Denial of Service Attack
15423| [2199] Microsoft Web Client Extender NTLM Authentication Vulnerability
15424| [2107] CoffeeCup FTP Clients Weak Password Encryption Vulnerability
15425| [1994] Lotus Notes Client R5 File Existence Verification Vulnerability
15426| [1958] Microsoft Exchange 2000 Server EUSR_EXSTOREEVENT Account Vulnerability
15427| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
15428| [1884] Microsoft Windows 95/WfW smbclient Directory Traversal Vulnerability
15429| [1823] Lotus Notes Client Unencrypted Sent Mail Vulnerability
15430| [1734] SmartWin CyberOffice Shopping Cart 2.0 Client Information Disclosure Vulnerability
15431| [1716] OpenView Network Node Manager ovalarmsrv Vulnerability
15432| [1713] HP Openview Node Manager SNMP DoS Vulnerability
15433| [1682] HP OpenView Network Node Manager Config Scripts Vulnerability
15434| [1653] Eudora Client and Path Disclosure Vulnerability
15435| [1646] University of Washington c-client DoS Vulnerability
15436| [1604] CGI Script Center Account Manager LITE / PRO Administrative Password Alteration Vulnerability
15437| [1584] Lyris List Manager Privilege Escalation Vulnerability
15438| [1581] HP OpenView Network Node Manager 6.1 Web Password Vulnerability
15439| [1533] Norton Antivirus with Novell Client Autoprotection Disabling Vulnerability
15440| [1523] CVS Client Server-Instructed File Create Vulnerability
15441| [1519] Computer Associates ARCserveIT ClientAgent Temporary File Vulnerability
15442| [1466] Microsoft SQL Server Enterprise Manager Password Disclosure Vulnerability
15443| [1462] Deerfield WorldClient 2.1 Directory Traversal Vulnerability
15444| [1440] Novell BorderManager User Impersonation Vulnerability
15445| [1436] BitchX IRC Client /INVITE Format String Vulnerability
15446| [1432] Novell BorderManager URL Rule Restriction Bypass Vulnerability
15447| [1392] Multiple Xwindows Client for 9x / Nt / 2000 Default Export Vulnerability
15448| [1388] ISC DHCP Client Remote Buffer Overflow Vulnerability
15449| [1356] Veritas Volume Manager 3.0.x File Permission Vulnerability
15450| [1329] Shiva Access Manager World Readable LDAP Password Vulnerability
15451| [1317] HP Openview Network Node Manager Alarm Service Buffer Overrun Vulnerability
15452| [1307] Mirabilis ICQ 2000A Mailclient Temporary Link Vulnerability
15453| [1216] Internet Security Systems ICECap Manager Default Username and Password Vulnerability
15454| [1058] Microsoft Windows Media License Manager DoS Vulnerability
15455| [1056] Atrium Software Mercur WebView WebMail-Client Buffer Overflow Vulnerability
15456| [1045] Multiple Firewall Vendor FTP ALG Client Vulnerability
15457| [1006] SSH client xauth Vulnerability
15458| [998] Sun Licensing Manager Symlink Vulnerability
15459| [976] Novell Border Manager Audit Trail Proxy DoS Vulnerability
15460| [953] Rightfax Webclient Predictable Session Number Vulnerability
15461| [900] IBM Network Station Manager Race Condition Vulnerability
15462| [823] Alt-N WorldClient Long URL DoS Vulnerability
15463| [794] Prosoft Netware Client for MacOS Inherited NDS Vulnerability
15464| [700] Novell Client Denial of Service Vulnerability
15465| [691] Cisco PIX Firewall Manager File Exposure
15466| [495] Cabletron Spectrum Enterprise Manager 5.0 Directory Permissions Vulnerability
15467| [492] MBone Session Directory Manager Package SDR Vulnerability
15468| [461] Solaris License Manager Vulnerability
15469| [233] NT Pass the Hash with Modified SMB Client Vulnerability
15470| [125] Multiple Vendor Buffer Overflow in MIME-aware Mail and News Clients Vulnerability
15471| [73] IRIX LicenseManager LICENSEMGR_FILE_ROOT Vulnerability
15472| [72] IRIX LicenseManager NETLS_LICENSE_FILE Vulnerability
15473| [56] Convex Storage Manager Vulnerability
15474|
15475| IBM X-Force - https://exchange.xforce.ibmcloud.com:
15476| [45984] Hitachi JP1/NETM/DM SubManager and JP1/NETM/DM Client JP1 events denial of service
15477| [84446] Events Manager plugin for WordPress multiple cross-site scripting
15478| [82613] Events Manager plugin for WordPress index.php, admin-ajax.php and post.php cross-site scripting
15479| [81421] Events Manager plugin for WordPress edit.php and index.php cross-site scripting
15480| [74033] Epson EventManager HTTP denial of service
15481| [73600] phxEventManager search.php SQL injection
15482| [69722] IBM Tivoli Security Information and Event Manager unspecified cross-site scripting
15483| [67998] Events Manager plugin for Wordpress admin.php SQL injection
15484| [67210] RSA Security Data Loss Prevention Enterprise Manager unspecified cross-site scripting
15485| [65205] EMC Replication Manager client irccd.exe code execution
15486| [64546] NetSupport Manager client buffer overflow
15487| [64064] IBM Tivoli Storage Manager (TSM) Client Hierarchical Storage Management command execution
15488| [64062] IBM Tivoli Storage Manager (TSM) Client Trusted Communications Agent privilege escalation
15489| [62546] Gekko Manager FTP Client LIST buffer overflow
15490| [62346] IBM Tivoli Storage Manager FastBack _Eventlog function format string
15491| [61620] Events Manager plugin for Wordpress admin.php cross-site scripting
15492| [59133] RSA Key Manager Client metadata SQL injection
15493| [58578] Events Manager plugin for Wordpress events page SQL injection
15494| [54944] Event Manager component for Joomla! SQL injection
15495| [54127] IBM Tivoli Storage Manager client acceptor daemon buffer overflow
15496| [52348] EMC Replication Manager Client irccd.exe code execution
15497| [49589] IBM DB2 Content Manager eClient unspecified
15498| [49176] IBM Tivoli Storage Manager HSM for Windows client buffer overflow
15499| [46208] IBM Tivoli Storage Manager (TSM) Backup-Archive client buffer overflow
15500| [43406] Nortel Multimedia Communications Server Wireless Client Manager (WiCM) SIP Proxy denial of server
15501| [40681] Lyris ListManager client privilege escalation
15502| [38207] Novell BorderManager Client Trust (clntrust.exe) buffer overflow
15503| [37400] HP OpenView Configuration Management and Client Configuration Manager unauthorized access
15504| [36963] NetSupport Manager Client and NetSupport School Student unspecified denial of service
15505| [36700] IBM Tivoli Storage Manager (TSM) Client Acceptor daemon buffer overflow
15506| [36215] Novell Identity Manager Client Login Extension information disclosure
15507| [35588] Bakbone NetVault Report Manager scheduler client and server buffer overflow
15508| [31470] IBM Client Security Password Manager information disclosure
15509| [30138] HP OpenView Client Configuration Manager (CCM) radexecd.exe unauthorized access
15510| [28568] iManager in eMBoxClient.jar in Novell eDirectory log file plaintext passwords
15511| [8817] IBM Tivoli Storage Manager client port 1581 buffer overflow
15512| [6429] Novell BorderManager VPN client SYN requests denial of service
15513| [2749] Event Log Manager Application Log Entries
15514|
15515| Exploit-DB - https://www.exploit-db.com:
15516| [26483] PHPList Mailing List Manager 2.x /admin/eventlog.php Multiple Parameter XSS
15517| [18602] Epson EventManager <= 2.50 Denial of Service
15518| [18549] phxEventManager 2.0 beta 5 search.php search_terms SQL Injection
15519| [16728] Gekko Manager FTP Client Stack Buffer Overflow
15520| [14923] Wordpress Events Manager Extended Plugin Persistent XSS Vulnerability
15521| [10549] Joomla Component Event Manager Blind SQL Injection Vulnerability
15522| [31072] Symantec Backup Exec System Recovery Manager 7.0 FileUpload Class Unauthorized File Upload Vulnerability
15523| [31068] Mambo MOStlyCE Module 2.4 Image Manager Utility Arbitrary File Upload Vulnerability
15524| [31065] F5 BIG-IP Application Security Manager 9.4.3 'report_type' Cross-Site Scripting Vulnerability
15525| [31007] Sun Java System Identity Manager 6.0/7.0/7.1 /idm/user/main.jsp activeControl Parameter XSS
15526| [31006] Sun Java System Identity Manager 6.0/7.0/7.1 /idm/help/index.jsp helpUrl Variable Remote Frame Injection
15527| [31005] Sun Java System Identity Manager 6.0/7.0/7.1 /idm/account/findForSelect.jsp resultsForm Parameter XSS
15528| [31004] Sun Java System Identity Manager 6.0/7.0/7.1 /idm/login.jsp Multiple Parameter XSS
15529| [30913] PHPJabbers Event Booking Calendar 2.0 - Multiple Vulnerabilities
15530| [30845] Absolute News Manager .NET 5.1 getpath.aspx Direct Request Error Message Information
15531| [30844] Absolute News Manager .NET 5.1 pages/default.aspx template Parameter XSS
15532| [30843] Absolute News Manager .NET 5.1 xlaabsolutenm.aspx rmore Parameter XSS
15533| [30842] Absolute News Manager .NET 5.1 xlaabsolutenm.aspx Multiple Parameter SQL Injection
15534| [30841] Absolute News Manager .NET 5.1 pages/default.aspx template Variable Remote File Access
15535| [30840] SonicWALL Global VPN Client 4.0.782 Remote Format String Vulnerability
15536| [30794] VUNET Case Manager 3.4 'default.asp' SQL Injection Vulnerability
15537| [30780] ISPmanager 4.2.15 Responder Local Privilege Escalation Vulnerability
15538| [30698] Flatnuke3 File Manager Module Unauthorized Access Vulnerability
15539| [30658] CRS Manager Multiple Remote File Include Vulnerabilities
15540| [30588] ewire Payment Client 1.60/1.70 Command Execution Vulnerability
15541| [30545] Absolute Poll Manager XE 4.1 xlaapmview.asp Cross Site Scripting Vulnerability
15542| [30541] Cisco CallManager <= 4.2 / CUCM 4.2 Logon Page lang Parameter SQL Injection
15543| [30533] Dale Mooney Calendar Events Viewevent.PHP SQL Injection Vulnerability
15544| [30518] Ripe Website Manager 0.8.x pages/delete_page.php id Parameter SQL Injection
15545| [30495] Apache Tomcat <= 6.0.13 Host Manager Servlet Cross Site Scripting Vulnerability
15546| [30470] Synology DiskStation Manager - SLICEUPLOAD Remote Command Execution
15547| [30451] Next Gen Portfolio Manager Default.ASP Multiple SQL Injection Vulnerabilities
15548| [30440] WebEvent <= 4.03 Webevent.CGI Cross-Site Scripting Vulnerability
15549| [30400] IBM AIX 5.2/5.3 FTP Client Local Buffer Overflow Vulnerability
15550| [30299] ActiveWeb Contentserver 5.6.2929 CMS Client Side Filtering Bypass Vulnerability
15551| [30282] Levent Veysi Portal 1.0 Oku.ASP SQL Injection Vulnerability
15552| [30276] OpManager 6/7 map/traceRoute.do name Parameter XSS
15553| [30275] OpManager 6/7 admin/DeviceAssociation.do Multiple Parameter XSS
15554| [30274] OpManager 6/7 admin/ServiceConfiguration.do operation Parameter XSS
15555| [30273] OpManager 6/7 reports/ReportViewAction.do Multiple Parameter XSS
15556| [30272] OpManager 6/7 traceRoute.do name Parameter XSS
15557| [30271] OpManager 6/7 ping.do name Parameter XSS
15558| [30237] Cisco Unified Communications Manager - TFTP Service
15559| [30105] Wordpress Download Manager Free & Pro 2.5.8 - Persistent Cross Site Scripting
15560| [30104] F-Secure Policy Manager 7.00 FSMSH.DLL Remote Denial of Service Vulnerability
15561| [30077] Cisco CallManager 4.1 Search Form Cross Site Scripting Vulnerability
15562| [30053] ClientExec 3.0 Index.PHP Multiple Cross-Site Scripting Vulnerabilities
15563| [30008] Cisco Prime Data Center Network Manager - Arbitrary File Upload
15564| [29979] Campsite 2.6.1 Event.php g_documentRoot Parameter Remote File Inclusion
15565| [29931] ManageEngine Password Manager Pro Build 5401 Database Remote Unauthorized Access Vulnerability
15566| [29909] HYIP Manager Pro Multiple Remote File Include Vulnerabilities
15567| [29877] Ripe Website Manager 0.8.4 contact/index.php ripeformpost Parameter SQL Injection
15568| [29862] Web Service Deluxe News Manager 1.0.1 Deluxe Footer.PHP Local File Include Vulnerability
15569| [29830] MyNews 4.2.2 Week_Events.PHP Remote File Include Vulnerability
15570| [29818] ACDSee 9.0 Photo Manager Multiple BMP Denial of Service Vulnerabilities
15571| [29806] PHP-Fusion <= 6.1.5 Calendar_Panel Module Show_Event.PHP SQL Injection Vulnerability
15572| [29742] Horde IMP Webmail <= 4.0.4 Client Multiple Input Validation Vulnerabilities
15573| [29715] EPortfolio 1.0 Client Side Input Validation Vulnerability
15574| [29698] Built2go News Manager 1.0 Blog rating.php nid Parameter XSS
15575| [29697] Built2go News Manager 1.0 Blog news.php Multiple Parameter XSS
15576| [29680] SQLiteManager 1.2 Main.PHP Multiple HTML Injection Vulnerabilities
15577| [29665] SQLiteManager 1.2 - Local File Include Vulnerability
15578| [29653] Active Calendar 1.2 data/mysqlevents.php css Parameter XSS
15579| [29646] Active Calendar 1.2 data/flatevents.php css Parameter XSS
15580| [29538] SSC DiskAccess NFS Client DAPCNFSD.DLL Stack Buffer Overflow Vulnerability
15581| [29529] PHP Membership Manager 1.5 Admin.PHP Cross-Site Scripting Vulnerability
15582| [29513] VICIdial Manager Send OS Command Injection
15583| [29498] Easebay Resources Login Manager Multiple Input Validation Vulnerabilities
15584| [29497] Easebay Resources Paypal Subscription Manager Multiple Input Validation Vulnerabilities
15585| [29400] Novell Access Manager 3 Identity Server IssueInstant Parameter Cross-Site Scripting Vulnerability
15586| [29361] DMXReady Secure Login Manager 1.0 applications/SecureLoginManager/inc_secureloginmanager.asp sent Parameter SQL Injection
15587| [29360] DMXReady Secure Login Manager 1.0 members.asp sent Parameter SQL Injection
15588| [29359] DMXReady Secure Login Manager 1.0 content.asp sent Parameter SQL Injection
15589| [29358] DMXReady Secure Login Manager 1.0 login.asp sent Parameter SQL Injection
15590| [29357] Hosting Controller 7C FolderManager.ASPX Directory Traversal Vulnerability
15591| [29238] cPanel Web Hosting Manager 3.1 - Multiple Cross-Site Scripting Vulnerabilities
15592| [29230] Citrix Presentation Server Client 9.200 WFICA.OCX ActiveX Component Heap Buffer Overflow Vulnerability
15593| [29188] cPanel WebHost Manager 3.1 park ndomain Parameter XSS
15594| [29187] cPanel WebHost Manager 3.1 dofeaturemanager feature Parameter XSS
15595| [29186] cPanel WebHost Manager 3.1 editzone domain Parameter XSS
15596| [29185] cPanel WebHost Manager 3.1 domts2 domain Parameter XSS
15597| [29184] cPanel WebHost Manager 3.1 editpkg pkg Parameter XSS
15598| [29183] cPanel WebHost Manager 3.1 addon_configsupport.cgi supporturl Parameter XSS
15599| [29182] cPanel WebHost Manager 3.1 dochangeemail email Parameter XSS
15600| [29153] JiRos Link Manager 1.0 viewlinks.asp CategoryID Parameter SQL Injection
15601| [29152] JiRos Link Manager 1.0 openlink.asp LinkID Parameter SQL Injection
15602| [29146] Novell Client 4.91 NWSPOOL.DLL Remote Buffer Overflow Vulnerability
15603| [29090] Active News Manager activeNews_comments.asp articleID Parameter SQL Injection
15604| [29089] Active News Manager activeNews_categories.asp catID Parameter SQL Injection
15605| [29088] ActiveNews Manager activenews_search.asp query Parameter XSS
15606| [29087] ActiveNews Manager default.asp page Parameter SQL Injection
15607| [29086] ActiveNews Manager activenews_view.asp articleID Parameter SQL Injection
15608| [29044] Dragon Internet Events Listing 2.0.01 admin_login.asp Multiple Field SQL Injection
15609| [29043] Dragon Internet Events Listing 2.0.01 event_searchdetail.asp ID Parameter SQL Injection
15610| [29042] Dragon Internet Events Listing 2.0.01 venue_detail.asp VenueID Parameter SQL Injection
15611| [29033] Links, ELinks 'smbclient' Remote Command Execution Vulnerability
15612| [29031] MGinternet Property Site Manager admin_login.asp Multiple Field SQL Injection
15613| [29030] MGinternet Property Site Manager listings.asp Multiple Parameter SQL Injection
15614| [29029] MGinternet Property Site Manager detail.asp p Parameter SQL Injection
15615| [29028] MGinternet Property Site Manager listings.asp s Parameter XSS
15616| [29024] Inventory Manager Multiple Input Validation Vulnerabilities
15617| [29016] Car Site Manager csm/asp/listings.asp Multiple Parameter XSS
15618| [29015] Car Site Manager csm/asp/detail.asp p Parameter SQL Injection
15619| [29014] Car Site Manager csm/asp/listings.asp Multiple Parameter SQL Injection
15620| [29012] DMXReady Site Engine Manager 1.0 Index.ASP SQL Injection Vulnerability
15621| [28977] UbiDisk File Manager 2.0 iOS - Multiple Web Vulnerabilities
15622| [28969] Beetel Connection Manager PCW_BTLINDV1.0.0B04 - SEH Buffer Overflow
15623| [28952] Omnistar Article Manager Multiple SQL Injection Vulnerabilities
15624| [28938] IPManager 2.3 Index.PHP Cross-Site Scripting Vulnerability
15625| [28879] Evandor Easy notesManager 0.0.1 Search Page SQL Injection
15626| [28878] Evandor Easy notesManager 0.0.1 login.php username Parameter SQL Injection
15627| [28853] Indusoft Thin Client 7.1 ActiveX - Buffer Overflow
15628| [28825] Dev Web Manager System 1.5 Index.PHP Cross-Site Scripting Vulnerability
15629| [28792] MamboLaiThai ExtCalThai 0.9.1 admin_events.php CONFIG_EXT[LANGUAGES_DIR] Parameter Remote File Inclusion
15630| [28743] osCommerce 2.2 admin/banner_manager.php page Parameter XSS
15631| [28726] OpenSSL SSLv2 - Null Pointer Dereference Client Denial of Service Vulnerability
15632| [28647] PLESK 7.5/7.6 Filemanager.PHP Directory Traversal Vulnerability
15633| [28642] CA eSCC r8/1.0,eTrust Audit r8/1.5 Audit Event System Unspecified Replay Attack
15634| [28588] Symantec Multiple Products SymEvent Driver Local Denial of Service Vulnerability
15635| [28565] PHP Event Calendar 1.4/1.5 Index.PHP Multiple Cross Site Scripting Vulnerabilities
15636| [28453] ezContents 2.0.3 event_list.php GLOBALS[admin_home] Parameter Remote File Inclusion
15637| [28427] Novell Identity Manager Arbitrary Command Execution Vulnerability
15638| [28410] Mambo Display MOSBot Manager Component mosConfig_absolute_path Remote File Include Vulnerability
15639| [28379] WEBinsta Mailing List Manager 1.3 Install3.PHP Remote File Include Vulnerability
15640| [28377] Wordpress Plugin Complete Gallery Manager 3.3.3 - Arbitrary File Upload Vulnerability
15641| [28337] HP ProCurve Manager SNAC UpdateCertificatesServlet File Upload
15642| [28336] HP ProCurve Manager SNAC UpdateDomainControllerServlet File Upload
15643| [28311] myEvent 1.2/1.3 Myevent.PHP Remote File Include Vulnerability
15644| [28302] Liga Manager Online 2.0 Joomla! Component Remote File Include Vulnerability
15645| [28243] Synology DiskStation Manager (DSM) 4.3-3776 - Multiple Vulnerabilities
15646| [28215] PHP Event Calendar 1.4 Calendar.PHP Remote File Include Vulnerability
15647| [28183] eM Client e-mail client 5.0.18025.0 - Stored XSS vulnerability
15648| [28158] QTO File Manager 1.0 - Multiple Cross-Site Scripting Vulnerabilities
15649| [28149] Plume CMS 1.0.4 search.php _PX_config[manager_path] Parameter Remote File Inclusion
15650| [28148] Plume CMS 1.0.4 rss.php _PX_config[manager_path] Parameter Remote File Inclusion
15651| [28147] Plume CMS 1.0.4 index.php _PX_config[manager_path] Parameter Remote File Inclusion
15652| [28122] vCard PRO 0 search.php event_id Parameter SQL Injection
15653| [28088] PHP Event Calendar 4.2 - SQL Injection Vulnerability
15654| [28064] Qto File Manager 1.0 index.php Cross-Site Scripting Vulnerability
15655| [28062] Cisco CallManager 3.x/4.x Web Interface ccmuser/logon.asp XSS
15656| [28061] Cisco CallManager 3.x/4.x Web Interface ccmadmin/phonelist.asp pattern Parameter XSS
15657| [27894] obotix IP Camera M1 1.9.4 .7/M10 2.0.5 .2 eventplayer get_image_info_abspath Parameter XSS
15658| [27893] obotix IP Camera M1 1.9.4 .7/M10 2.0.5 .2 events.tar source_ip Parameter XSS
15659| [27834] Creative Software UK Community Portal 1.1 EventView.php event_id Parameter SQL Injection
15660| [27828] Ocean12 Technologies Calendar Manager Pro 1.0 1 admin/main.asp date Parameter XSS
15661| [27827] Ocean12 Technologies Calendar Manager Pro 1.0 1 admin/edit.asp ID Parameter SQL Injection
15662| [27826] Ocean12 Technologies Calendar Manager Pro 1.0 1 admin/view.asp SearchFor Parameter SQL Injection
15663| [27825] Ocean12 Technologies Calendar Manager Pro 1.0 1 admin/main.asp date Parameter SQL Injection
15664| [27805] dreamMail e-mail client 4.6.9.2 - Stored XSS
15665| [27767] Artmedic Event Index.PHP Remote File Include Vulnerability
15666| [27610] Joomla Media Manager File Upload Vulnerability
15667| [27463] IBM Tivoli Business Systems Manager 3.1 APWC_Win_Main.JSP Cross-Site Scripting Vulnerability
15668| [27455] 1WebCalendar 4.0 viewEvent.cfm EventID Parameter SQL Injection
15669| [27429] Firefox onreadystatechange Event DocumentViewerImpl Use After Free
15670| [27191] Novell Client 2 SP3 - Privilege Escalation Exploit
15671| [27169] Webeveyn Whomp! Real Estate Manager 2005 Login SQL Injection Vulnerability
15672| [27163] IBM Tivoli Access Manager Plugin Directory Traversal Vulnerability
15673| [27153] Cerberus Helpdesk 2.7 Clients.PHP Cross-Site Scripting Vulnerability
15674| [27046] VMware vCenter Chargeback Manager ImageUploadServlet Arbitrary File Upload
15675| [27019] VBulletin 3.5.2 Event Title HTML Injection Vulnerability
15676| [26963] Quantum Art QP7.Enterprise news_and_events_new.asp p_news_id Parameter SQL Injection
15677| [26890] Olive File Manager 1.0.1 iOS - Multiple Vulnerabilities
15678| [26812] PHP Web Scripts Ad Manager Pro 2.0 Advertiser_statistic.PHP SQL Injection Vulnerability
15679| [26779] Alt-N MDaemon WorldClient 8.1.3 - Denial of Service Vulnerability
15680| [26754] Check Point VPN-1 SecureClient 4.0/4.1 Policy Bypass Vulnerability
15681| [26729] Web4Future Affiliate Manager PRO 4.1 Functions.PHP SQL Injection Vulnerability
15682| [26684] 88Scripts Event Calendar 2.0 Index.PHP SQL Injection Vulnerability
15683| [26638] Helpdesk Issue Manager 0.x find.php Multiple Parameter SQL Injection
15684| [26637] Helpdesk Issue Manager 0.x issue.php id Parameter SQL Injection
15685| [26578] Realtek Sound Manager AvRack (.wav) - Crash PoC
15686| [26544] PHP Download Manager 1.1.x Files.PHP SQL Injection Vulnerability
15687| [26496] eFile Wifi Transfer Manager 1.0 - Multiple Vulnerabilities
15688| [26485] PHPList Mailing List Manager 2.x /admin/users.php find Parameter XSS
15689| [26484] PHPList Mailing List Manager 2.x /admin/configure.php id Parameter XSS
15690| [26482] PHPList Mailing List Manager 2.x /admin/editattributes.php id Parameter SQL Injection
15691| [26481] PHPList Mailing List Manager 2.x /admin/admin.php id Parameter SQL Injection
15692| [26473] Ocean12 ASP Calendar Manager 1.0 Authentication Bypass Vulnerability
15693| [26452] Novell Client 2 SP3 nicm.sys Local Privilege Escalation
15694| [26440] PHPCafe Tutorial Manager Index.PHP SQL Injection Vulnerability
15695| [26437] PHP Advanced Transfer Manager 1.30 Remote Unauthorized Access Vulnerability
15696| [26421] LibrettoCMS File Manager Arbitary File Upload Vulnerability
15697| [26418] Novell Client 4.91 SP4 nwfs.sys Local Privilege Escalation
15698| [26408] phpEventCalendar 0.2.3 - Multiple Vulnerabilities
15699| [26391] SiteTurn Domain Manager Pro Admin Panel Cross-Site Scripting Vulnerability
15700| [26346] Accelerated Mortgage Manager Password Field SQL Injection Vulnerability
15701| [26301] Novell GroupWise 6.5.3 Client Local Integer Overflow Vulnerability
15702| [26287] PHP Advanced Transfer Manager 1.30 Multiple Cross-Site Scripting Vulnerabilities
15703| [26286] PHP Advanced Transfer Manager 1.30 Multiple Directory Traversal Vulnerabilities
15704| [26246] Simple File Manager v.024 - Login Bypass Vulnerability
15705| [26223] Land Down Under 601/602/700/701/800/801 Events.PHP HTML Injection Vulnerability
15706| [26222] Microsoft Windows 2000/2003/XP Keyboard Event Privilege Escalation Weakness
15707| [26220] FileZilla 2.2.15 FTP Client Hard-Coded Cipher Key Vulnerability
15708| [26210] bfcommand & control server 1.22/2.0/2.14 manager Multiple Vulnerabilities
15709| [26206] Land Down Under 700/701/800/801 events.php c Parameter SQL Injection
15710| [26194] LeapFTP Client 2.7.3/2.7.4 LSQ File Remote Buffer Overflow Vulnerability
15711| [26136] Simple PHP Agenda 2.2.8 (edit_event.php, eventid param) - SQL Injection
15712| [26135] Java Applet Driver Manager Privileged toString() Remote Code Execution
15713| [26131] Linux kernel perf_swevent_init - Local root Exploit
15714| [26101] EMC Navisphere Manager 6.x Directory Traversal And Information Disclosure Vulnerabilities
15715| [26089] Jax PHP Scripts 1.0/1.34/2.14/3.31 guestbook File Client IP Disclosure
15716| [26058] MySQL AB Eventum 1.x get_jsrs_data.php F Parameter XSS
15717| [26057] MySQL AB Eventum 1.x list.php release Parameter XSS
15718| [26056] MySQL AB Eventum 1.x view.php id Parameter XSS
15719| [25977] Imperva SecureSphere Operations Manager 9.0.0.5 - Multiple Vulnerabilities
15720| [25967] Cisco CallManager 1.0/2.0/3.x/4.0 CTI Manager Remote Denial of Service Vulnerability
15721| [25883] BOINC Manager (Seti@home) 7.0.64 Field SEH based BOF
15722| [25805] Loki Download Manager 2.0 Catinfo.ASP SQL Injection Vulnerability
15723| [25804] Loki Download Manager 2.0 Default.ASP SQL Injection Vulnerability
15724| [25790] WWWeb Concepts Events System 1.0 LOGIN.ASP SQL Injection Vulnerability
15725| [25723] Wordpress Spider Event Calendar Plugin 1.3.0 - Multiple Vulnerabilities
15726| [25714] SAS Integration Technologies Client 9.31_M1 (SASspk.dll) - Stack-Based Overflow
15727| [25703] Active News Manager LOGIN.ASP SQL Injection Vulnerability
15728| [25686] PHP Advanced Transfer Manager 1.21 Arbitrary File Include Vulnerability
15729| [25668] Sigma ISP Manager 6.6 Sigmaweb.DLL SQL Injection Vulnerability
15730| [25627] PHP Advanced Transfer Manager 1.21 Arbitrary File Upload Vulnerability
15731| [25574] Mtp-Target 1.2.2 Client Remote Format String Vulnerability
15732| [25554] Altiris Client 6.0.88 Service Local Privilege Escalation Vulnerability
15733| [25469] Ocean12 Calendar Manager 1.0 Admin Form SQL Injection Vulnerability
15734| [25444] Linux PERF_EVENTS - Local Root Exploit
15735| [25440] Wordpress wp-FileManager - Arbitrary File Download Vulnerability
15736| [25411] No-IP Dynamic Update Client (DUC) 2.1.9 - Local IP Address Stack Overflow
15737| [25354] Ocean12 Membership Manager Pro Cross-Site Scripting Vulnerability
15738| [25303] Multiple Vendor Telnet Client Env_opt_add Heap-Based Buffer Overflow Vulnerability
15739| [25159] cyclades alterpath manager 1.1 - Multiple Vulnerabilities
15740| [25107] Check Point VPN-1 SecureClient Malformed IP Address Local Memory Access Vulnerability
15741| [25095] Microsoft Internet Explorer 5.0.1 Mouse Event URI Status Bar Obfuscation Weakness
15742| [25054] konversation irc client 0.15 Multiple Vulnerabilities
15743| [24995] DXFScope 0.2 - Remote Client-Side Buffer Overflow Vulnerability
15744| [24992] WordPress 1.2.1/1.2.2 link-manager.php Multiple Parameter XSS
15745| [24979] XLReader 0.9 - Remote Client-Side Buffer Overflow Vulnerability
15746| [24978] Xine-Lib 0.9/1 Remote Client-Side Buffer Overflow Vulnerability
15747| [24879] Free Hosting Manager 2.0.2 - Multiple SQLi
15748| [24877] OpenCart 1.5.5.1 (filemanager.php) - Directory Traversal Arbitrary File Access
15749| [24868] WordPress IndiaNIC FAQs Manager Plugin 1.0 - Blind SQL Injection
15750| [24867] WordPress IndiaNIC FAQs Manager Plugin 1.0 - Multiple Vulnerabilities
15751| [24853] MPlayer 0.9/1.0 MMST Get_Header Remote Client-Side Buffer Overflow Vulnerability
15752| [24852] MPG123 0.59 Find Next File Remote Client-Side Buffer Overflow Vulnerability
15753| [24828] Opera Web Browser 7.54 KDE KFMCLIENT Remote Command Execution Vulnerability
15754| [24811] F-Secure Policy Manager 5.11 FSMSH.DLL CGI Application Installation Path Disclosure Vulnerability
15755| [24789] WordPress LeagueManager Plugin 3.8 - SQL Injection
15756| [24786] Cisco Video Surveillance Operations Manager 6.3.2 - Multiple vulnerabilities
15757| [24761] Gearbox Software Halo Game 1.x Client Remote Denial of Service Vulnerability
15758| [24754] Altiris Deployment Solution 5.6 Client Service Local Privilege Escalation Vulnerability
15759| [24748] event calendar Multiple Vulnerabilities
15760| [24684] Yak! Chat Client 2.x FTP Server Directory Traversal Vulnerability
15761| [24603] Remote File Manager 1.2 iOS - Multiple Vulnerabilities
15762| [24584] Cerulean Studios Trillian Client 0.74 MSN Module Remote Buffer Overflow Vulnerability
15763| [24535] Alt-N MDaemon WorldClient 13.0.3 - Multiple Vulnerabilities
15764| [24490] Novell GroupWise Client gwcls1.dll ActiveX Remote Code Execution
15765| [24474] Schneider Electric Accutech Manager Heap Overflow PoC
15766| [24458] Oracle Automated Service Manager 1.3 Installation Local Privilege Escalation
15767| [24351] Free Web Chat Initial Release UserManager.java Null Pointer DoS
15768| [24320] SQLiteManager 1.2.4 - Remote PHP Code Injection Vulnerability
15769| [24306] EasyWeb 1.0 FileManager Module Directory Traversal Vulnerability
15770| [24266] Microsoft Internet Explorer 5.0.1 Popup.show Mouse Event Hijacking Vulnerability
15771| [24157] Cydia Repo Manager CSRF Vulnerability
15772| [24126] osCommerce 2.x File Manager Directory Traversal Vulnerability
15773| [24114] Microsoft Outlook 2003Mail Client E-mail Address Verification Weakness
15774| [24104] Tutorials Manager 1.0 - Multiple Remote SQL Injection Vulnerabilities
15775| [23999] Neon WebDAV Client Library 0.2x Format String Vulnerabilities
15776| [23921] Centrinity FirstClass Desktop Client 7.1 - Local Buffer Overflow Vulnerability
15777| [23863] Expinion.net News Manager Lite 2.5 NEWS_LOGIN Cookie ADMIN Parameter Manipulation Admin Authentication Bypass
15778| [23862] Expinion.net News Manager Lite 2.5 news_sort.asp filter Parameter SQL Injection
15779| [23861] Expinion.net News Manager Lite 2.5 category_news.asp ID Parameter SQL Injection
15780| [23860] Expinion.net News Manager Lite 2.5 more.asp ID Parameter SQL Injection
15781| [23859] Expinion.net News Manager Lite 2.5 category_news_headline.asp XSS
15782| [23858] Expinion.net News Manager Lite 2.5 search.asp XSS
15783| [23857] Expinion.net News Manager Lite 2.5 comment_add.asp XSS
15784| [23846] Symantec Client Firewall Products 5 SYMNDIS.SYS Driver Remote Denial of Service Vulnerability
15785| [23845] PHP-Nuke Error Manager Module 2.1 error.php Multiple Variables XSS
15786| [23844] PHP-Nuke Error Manager Module 2.1 error.php language Variable Path Disclosure
15787| [23766] Microsoft Internet Explorer 5/6 Cross-Domain Event Leakage Vulnerability
15788| [23742] phpNewsManager 1.36 Functions Script File Disclosure Vulnerability
15789| [23707] Freeform Interactive Purge 1.4.7/Purge Jihad 2.0.1 Game Client Remote Buffer Overflow Vulnerability
15790| [23652] WordPress Asset-Manager PHP File Upload Vulnerability
15791| [23650] IBM Lotus Notes Client URL Handler Command Injection
15792| [23634] 0verkill 0.16 Game Client Multiple Local Buffer Overflow Vulnerabilities
15793| [23502] Alt-N MDaemon 6.x/WorldClient Form2Raw Raw Message Handler Buffer Overflow Vulnerability (2)
15794| [23501] Alt-N MDaemon 6.x/WorldClient Form2Raw Raw Message Handler Buffer Overflow Vulnerability (1)
15795| [23381] phpWebFileManager 2.0 index.php Directory Traversal Vulnerability
15796| [23370] ncube server manager 1.0 - Directory Traversal vulnerability
15797| [23292] Sun Microsystems Java Virtual Machine 1.x Security Manager Denial of Service Vulnerability
15798| [23251] Centrify Deployment Manager 2.1.0.283 - Local Root
15799| [23218] EternalMart Mailing List Manager 1.32 Remote File Include Vulnerabilities
15800| [23200] Gamespy 3d 2.62/2.63 IRC Client Remote Buffer Overflow Vulnerability
15801| [23163] Flying Dog Software Powerslave 4.3 Portalmanager sql_id Information Disclosure Vulnerability
15802| [23115] Mah-Jong 1.4 Client/Server Remote sscanf() Buffer Overflow Vulnerability
15803| [23038] eMule 0.2x Client OP_SERVERIDENT Heap Overflow Vulnerability
15804| [23028] Free Hosting Manager 2.0 (packages.php, id param) SQL Injection Vulnerability
15805| [23019] Microsoft Windows 2000 Subnet Bandwidth Manager RSVP Server Authority Hijacking Vulnerability
15806| [22967] Valve Software Half-Life 1.1 Client Connection Routine Buffer Overflow Vulnerability (2)
15807| [22966] Valve Software Half-Life 1.1 Client Connection Routine Buffer Overflow Vulnerability (1)
15808| [22951] Opera 7.20 Mail Client Policy Circumvention Vulnerability
15809| [22903] NetIQ Privileged User Manager 2.3.1 ldapagnt_eval() Remote Perl Code Execution
15810| [22812] WebJeff Filemanager 1.6 File Disclosure Vulnerability
15811| [22766] friendsinwar FAQ Manager (view_faq.php, question param) SQL Injection Vulnerability
15812| [22738] Novell NetIQ Privileged User Manager 2.3.1 ldapagnt.dll ldapagnt_eval() Perl Code Evaluation RCE
15813| [22737] Novell NetIQ Privileged User Manager 2.3.1 auth.dll pa_modify_accounts() RCE
15814| [22728] Microsoft Internet Explorer 5 Classic Mode FTP Client Cross Domain Scripting Vulnerability
15815| [22727] Computer Associates Unicenter Asset Manager Stored Secret Data Decryption Weakness
15816| [22714] Oracle Database Client System Analyzer Arbitrary File Upload
15817| [22713] MYRE Realty Manager Multiple Vulnerabilities
15818| [22710] friendsinwar FAQ Manager SQL Injection (authbypass) Vulnerability
15819| [22684] Eventy CMS 1.8 Plus - Multiple Vulnerabilities
15820| [22661] Upclient 5.0 b7 Command Line Argument Buffer Overflow Vulnerability
15821| [22637] Prishtina FTP Client 1.x Remote Denial of Service Vulnerability
15822| [22551] 3D-FTP Client 4.0 - Buffer Overflow Vulnerability
15823| [22484] Ocean12 ASP Guestbook Manager 1.0 Information Disclosure Vulnerability
15824| [22421] Web Chat Manager 2.0 HTML Code Injection Vulnerability
15825| [22411] PHPNuke 5.6/6.x Banners.PHP Banner Manager Password Disclosure Vulnerability
15826| [22395] eDonkey Clients 0.44/0.45 Multiple Chat Dialog Resource Consumption Vulnerability
15827| [22304] ManageEngine Security Manager Plus 5.5 build 5505 SQL Injection
15828| [22243] RARLAB FAR 1.65/1.70 File Manager Buffer Overflow Vulnerability
15829| [22237] Microsoft Office Picture Manager 2010 Crash PoC
15830| [22223] Epic Games Unreal Engine 436 Client Unreal URL Denial of Service Vulnerability
15831| [22221] Electrasoft 32Bit FTP 9.49.1 Client Long Server Banner Buffer Overflow Vulnerability
15832| [22220] ByteCatcher FTP Client 1.0.4 Long Server Banner Buffer Overflow Vulnerability
15833| [22142] Half-Life 1.1 Client Server Message Format String Vulnerability
15834| [22135] TANne 0.6.17 Session Manager SysLog Format String Vulnerability
15835| [22094] ManageEngine Security Manager Plus <= 5.5 build 5505 Remote SYSTEM SQLi (MSF)
15836| [22093] ManageEngine Security Manager Plus <= 5.5 build 5505 Remote SYSTEM/root SQLi
15837| [22092] ManageEngine Security Manager Plus <= 5.5 build 5505 Path Traversal
15838| [21890] Omnistar Document Manager 8.0 - Multiple Vulnerabilities
15839| [21850] Samba SetInformationPolicy AuditEventsInfo Heap Overflow
15840| [21827] HP Compaq Insight Manager Web Interface Cross-Site Scripting Vulnerability
15841| [21806] Cisco VPN 5000 Client Buffer Overrun Vulnerabilities (2)
15842| [21805] Cisco VPN 5000 Client Buffer Overrun Vulnerabilities (1)
15843| [21770] Cisco VPN 3000 Series Concentrator Client Authentication Denial of Service Vulnerability
15844| [21744] Novell Sentinel Log Manager <= 1.2.0.2 - Retention Policy Vulnerability
15845| [21737] Cyme ChartFX Client Server ActiveX Control Array Indexing Vulnerability
15846| [21672] OpenSSL SSLv2 - Malformed Client Key Remote Buffer Overflow Vulnerability (2)
15847| [21671] OpenSSL SSLv2 - Malformed Client Key Remote Buffer Overflow Vulnerability (1)
15848| [21663] Fake Identd 0.9/1.x Client Query Remote Buffer Overflow Vulnerability
15849| [21636] Opera 6.0.1,MS IE 5/6 JavaScript Modifier Keypress Event Subversion Vulnerability
15850| [21594] WorldSpan Res Manager 4.1 Malformed TCP Packet Denial of Service Vulnerability
15851| [21580] Inktomi Traffic Server 4/5 Traffic_Manager Path Argument Buffer Overflow
15852| [21574] Pirch IRC Client 98 Malformed Link Buffer Overrun Vulnerability
15853| [21568] Cisco VPN Client for Unix 3.5.1 - Local Buffer Overflow Vulnerability
15854| [21546] Trend Micro Control Manager 5.5/6.0 AdHocQuery BlindSQL Injection (post-auth)
15855| [21528] Geeklog 1.3.5 Calendar Event Form Script Injection Vulnerability
15856| [21510] MS IE 5/6,MS ISA Server 2000,MS Proxy Server 2.0 Gopher Client Buffer Overflow
15857| [21456] Cisco IDS Device Manager 3.1.1 Arbitrary File Read Access Vulnerability
15858| [21455] Hosting Controller 1.x DSNManager Directory Traversal Vulnerability
15859| [21439] MDaemon WorldClient 5.0.x Folder Creation Buffer Overflow Vulnerability
15860| [21438] WorldClient 5.0.x Arbitrary File Deletion Vulnerability
15861| [21424] Admanager 1.1 Content Manipulation Vulnerability
15862| [21416] Internet Explorer 5/6 Recursive JavaScript Event Denial of Service Vulnerability
15863| [21410] Matu FTP 1.74 Client Buffer Overflow Vulnerability
15864| [21320] Internet Download Manager All Versions - SEH Based Buffer Overflow
15865| [21318] Internet Download Manager All Versions - Stack Based Buffer Overflow
15866| [21275] ICQ For MacOS X 2.6 Client Denial of Service Vulnerability
15867| [21201] BrowseFTP Client 1.62 Buffer Overflow Vulnerability
15868| [21192] STunnel 3.x Client Negotiation Protocol Format String Vulnerability
15869| [21170] Volition Red Faction 1.0/1.1 Game Server/Client Denial of Service Vulnerability
15870| [21139] ActiveFax (ActFax) 4.3 Client Importer Buffer Overflow
15871| [21132] Cannonbolt Portfolio Manager 1.0 - Multiple Vulnerabilities
15872| [21091] UltraEdit 8.2 FTP Client Weak Password Encryption Vulnerability
15873| [21082] novell sentinel log manager <= 1.2.0.1 - Directory Traversal
15874| [20955] Internet Download Manager All Versions - Memory Corruption Vulnerability
15875| [20868] ARCservIT 6.61/6.63 Client inetd.tmp Arbitrary File Overwrite Vulnerability
15876| [20867] ARCservIT 6.61/6.63 Client asagent.tmp Arbitrary File Overwrite Vulnerability
15877| [20864] Elcom CMS 7.4.10 Community Manager Insecure File Upload
15878| [20785] Ad Manager Pro Multiple Vulnerabilities
15879| [20761] Ad Manager Pro 4 - LFI
15880| [20680] Microsoft IE 5.0.1/5.5/6.0 Telnet Client File Overwrite Vulnerability
15881| [20594] Wu-Ftpd 2.4.2/2.5/2.6 Debug Mode Client Hostname Format String Vulnerability
15882| [20582] Icecast 1.3.7/1.3.8 print_client() Format String Vulnerability
15883| [20490] BitchX IRC Client 1.0 c17 DNS Buffer Overflow Vulnerability
15884| [20485] OS X Viscosity OpenVPN Client - Local Root Exploit
15885| [20371] Microsoft Windows 95/WfW smbclient Directory Traversal Vulnerability
15886| [20364] t-dah webmail client 3.2.0-2.3 - Stored XSS
15887| [20248] SmartWin CyberOffice Shopping Cart 2.0 Client Information Disclosure Vulnerability
15888| [20245] TalentSoft Web+ Client/Monitor/server 4.6 Source Code Disclosure Vulnerability
15889| [20244] TalentSoft Web+ Client/Monitor/server 4.6 Internal IP Address Disclosure
15890| [20239] HP OpenView Network Node Manager 6.10 SNMP DoS Vulnerability
15891| [20197] joomla joomgalaxy 1.2.0.4 - Multiple Vulnerabilities
15892| [20172] ManageEngine Mobile Application Manager 10 - SQL Injection
15893| [20171] ManageEngine Application Manager 10 - Multiple Vulnerabilities
15894| [20165] CGI Script Center Account Manager 1.0 LITE / PRO Administrative Password Alteration (2)
15895| [20164] CGI Script Center Account Manager 1.0 LITE / PRO Administrative Password Alteration (1)
15896| [20070] alt-n worldclient standard 2.1 - Directory Traversal vulnerability
15897| [20060] "BitchX IRC Client 75p1/75p3/1.0 c16 ""/INVITE"" Format String Vulnerability"
15898| [20018] Veritas Software Volume Manager 3.0.2/3.0.3/3.0.4 File Permission Vulnerability
15899| [20003] Intel Corporation Shiva Access Manager 5.0 Solaris World Readable LDAP Password
15900| [19993] Mirabilis ICQ 2000.0 A Mailclient Temporary Link Vulnerability
15901| [19922] Internet Security Systems ICECap Manager 2.0.23 Default Username and Password
15902| [19810] Atrium Software Mercur WebView WebMail-Client 1.0 - Buffer Overflow
15903| [19800] "Check Point Software Firewall-1 3.0/1 4.0,Cisco PIX Firewall 4.x/5.x ""ALG"" Client Vulnerability"
15904| [19757] Sun Workshop 5.0 Licensing Manager Symlink Vulnerability
15905| [19746] Novell BorderManager 3.0/3.5 Audit Trail Proxy DoS Vulnerability
15906| [19697] IBM Network Station Manager 2.0 R1 Race Condition Vulnerability
15907| [19640] Alt-N WorldClient Pro 2.0 .0.0/2.0.1 .0/Standard 2.0 .0.0 Long URL DoS Vulnerability
15908| [19628] Event Script PHP 1.1 CMS - Multiple Vulnerabilities
15909| [19605] Linux Kernel fs/eventpoll.c Local Denial of Service
15910| [19541] Novell Client 3.0/3.0.1 - Denial of Service Vulnerability
15911| [19456] PowerNet Twin Client <= 8.9 (RFSync 1.0.0.1) Crash PoC
15912| [19350] Solaris <= 2.5.1 License Manager Vulnerability
15913| [19339] SoftPerfect Bandwidth Manager 2.9.10 Authentication Bypass
15914| [19321] IBM System Storage DS Storage Manager Profiler Multiple Vulnerabilities
15915| [19288] HP Data Protector Client EXEC_CMD Remote Code Execution
15916| [19225] Compaq Client Management Agents 3.70/4.0,Insight Management Agents 4.21 A/4.22 A/4.30 A,Intelligent Cluster Administrator 1.0,Management Agents for Workstations 4.20 A,Server Management Agents <= 4.23,Survey Utility 2.0 Web File Access Vulnerability
15917| [19197] "Microsoft Windows NT <= 4.0 SP5,Terminal Server 4.0 ""Pass the Hash"" with Modified SMB Client Vulnerability"
15918| [19080] Debian suidmanager 0.18 Vulnerability
15919| [19067] SGI IRIX <= 6.4,SGI license_oeo 3.0/3.1/3.1.1 LicenseManager LICENSEMGR_FILE_ROOT Vulnerability
15920| [19066] SGI IRIX 5.3/6.2,SGI license_oeo 1.0 LicenseManager NETLS_LICENSE_FILE Vulnerability
15921| [19058] Wordpress Custom Content Type Manager 0.9.5.13-pl Arbitrary File Upload Vulnerability
15922| [19012] Wordpress Front File Manager Plugin 0.1 - Arbitrary File Upload
15923| [18993] Wordpress Asset Manager Plugin 0.2 - Arbitrary File Upload
15924| [18990] Wordpress HTML5 AV Manager Plugin 0.2.7 - Arbitrary File Upload
15925| [18958] Sony VAIO Wireless Manager 4.0.0.0 - Buffer Overflows
15926| [18915] FlexNet License Server Manager lmgrd Buffer Overflow
15927| [18914] Novell Client 4.91 SP4 - Privilege Escalation Exploit
15928| [18910] PHP <= 5.4.3 (com_event_sink) Denial of Service
15929| [18877] FlexNet License Server Manager Stack Overflow In lmgrd
15930| [18833] Solarwinds Storage Manager 5.1.0 - SQL Injection
15931| [18818] Solarwinds Storage Manager 5.1.0 - Remote SYSTEM SQL Injection Exploit
15932| [18815] STRATO Newsletter Manager Directory Traversal
15933| [18814] MyClientBase 0.12 - Multiple Vulnerabilities
15934| [18795] Nokia PC Suite Video Manager 7.1.180.64 (.mp4) Denial of Service
15935| [18768] Mega File Manager - File Download Vulnerability
15936| [18727] IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile() Method Overflow
15937| [18716] BulletProof FTP Client 2010 - Buffer Overflow Vulnerability
15938| [18704] Quest vWorkspace 7.5 Connection Broker Client ActiveX Control (pnllmcli.dll 7.5.304.547) SaveMiniLaunchFile() Method Remote File Creation / Overwrite PoC
15939| [18697] NetOp Remote Control Client 9.5 - Buffer Overflow',
15940| [18694] Simple PHP Agenda <= 2.2.8 CSRF (Add Admin - Add Event)
15941| [18666] UltraVNC 1.0.2 Client (vncviewer.exe) Buffer Overflow
15942| [18624] 2X Client for RDP 10.1.1204 ClientSystem Class ActiveX Control Download and Execute Vulnerability
15943| [18600] presto! pagemanager <= 9.01 - Multiple Vulnerabilities
15944| [18490] Novell GroupWise Messenger Client <= 2.1.0 Unicode Stack Overflow
15945| [18432] phux Download Manager Blind SQL Injection Vulnerability
15946| [18426] MS12-004 midiOutPlayNextPolyEvent Heap Overflow
15947| [18389] Drupal CKEditor 3.0 - 3.6.2 - Persistent EventHandler XSS
15948| [18388] HP OpenView Network Node Manager ov.dll _OVBuildPath Buffer Overflow
15949| [18165] siemens automation license manager <= 500.0.122.1 - Multiple Vulnerabilities
15950| [18138] VMware Update Manager Directory Traversal
15951| [18129] Blogs manager <= 1.101 SQL Injection Vulnerability
15952| [18119] Attachmate Reflection FTP Client Heap Overflow
15953| [18081] WHMCS 3.x.x (clientarea.php) Local File Disclosure
15954| [18075] Ajax File and Image Manager 1.0 Final - Remote Code Execution Vulnerability
15955| [18051] BroadWin WebAccess SCADA/HMI Client Remote Code Execution
15956| [18015] HP Power Manager 'formExportDataLogs' Buffer Overflow
15957| [17852] iManager Plugin 1.2.8 (d) - Remote Arbitrary File Deletion Vulnerability
15958| [17851] iManager Plugin 1.2.8 (lang) - Local File Inclusion Vulnerability
15959| [17814] Wordpress Event Registration plugin <= 5.44 SQL Injection Vulnerability
15960| [17808] WordPress WP-Filebase Download Manager plugin <= 0.2.9 - SQL Injection Vulnerability
15961| [17806] Ubuntu <= 11.04 ftp client Local Buffer Overflow Crash PoC
15962| [17798] WordPress Community Events plugin <= 1.2.1 - SQL Injection Vulnerability
15963| [17794] WordPress Eventify - Simple Events plugin <= 1.7.f SQL Injection Vulnerability
15964| [17772] BroadWin WebAccess Client Multiple Vulnerabilities
15965| [17769] Linux Kernel 'perf_count_sw_cpu_clock' event Denial of Service
15966| [17751] WordPress Event Registration plugin <= 5.4.3 - SQL Injection
15967| [17554] Mevin Basic PHP Events Lister 2.03 - CSRF Vulnerabilities
15968| [17549] Lotus Domino SMTP router, EMAIL server and client DoS
15969| [17537] HP OpenView Network Node Manager Toolbar.exe CGI Cookie Handling Buffer Overflow
15970| [17536] HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow
15971| [17507] Avaya IP Office Manager TFTP Server Directory Traversal Vulnerability
15972| [17484] DmxReady Links Manager 1.2 - SQL Injection Vulnerability
15973| [17483] DMXReady Account List Manager 1.2 - SQL Injection Vulnerability
15974| [17482] DmxReady Document Library Manager 1.2 - SQL Injection Vulnerability
15975| [17480] DmxReady Faqs Manager 1.2 - SQL Injection Vulnerability
15976| [17479] DmxReady Contact Us Manager 1.2 - SQL Injection Vulnerability
15977| [17478] DMXReady Registration Manager 1.2 - SQL Injection Vulneratbility
15978| [17475] DmxReady News Manager 1.2 - SQL Injection Vulnerability
15979| [17472] DmxReady Catalog Manager 1.2 - SQL Injection Vulneratbility
15980| [17460] Kaillera Multiple Clients Buffer Overflow Vulnerabilities
15981| [17459] Valve Steam Client Application 1559/1559 - Local Privilege Escalation
15982| [17431] Same Team E-shop manager SQL Injection exploit
15983| [17392] IBM Tivoli Endpoint Manager POST Query Buffer Overflow
15984| [17388] trend micro data loss prevention virtual appliance 5.5 - Directory Traversal
15985| [17366] Cisco AnyConnect VPN Client ActiveX URL Property Download and Execute
15986| [17345] HP Data Protector Client EXEC_SETUP Remote Code Execution PoC (ZDI-11-056)
15987| [17339] HP Data Protector Client EXEC_CMD Remote Code Execution PoC (ZDI-11-055)
15988| [17304] Cisco Unified Operations Manager Multiple Vulnerabilities
15989| [17285] osCommerce 2.3.1 (banner_manager.php) Remote File Upload Vulnerability
15990| [17198] 360 Web Manager 3.0 - Multiple Vulnerabilities
15991| [17156] OpenText FirstClass Client 11.005 - Code Execution
15992| [17152] ManageEngine Applications Manager Authenticated Code Execution
15993| [17047] HP OpenView Network Node Manager getnnmdata.exe (Hostname) CGI Buffer Overflow
15994| [17045] Avaya IP Office Manager 8.1 TFTP DoS
15995| [17044] HP OpenView Network Node Manager ovwebsnmpsrv.exe ovutil Buffer Overflow
15996| [17043] HP OpenView Network Node Manager ovwebsnmpsrv.exe Unrecognized Option Buffer Overflow
15997| [17042] HP OpenView Network Node Manager getnnmdata.exe (MaxAge) CGI Buffer Overflow
15998| [17041] HP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow
15999| [17040] HP OpenView Network Node Manager getnnmdata.exe (ICount) CGI Buffer Overflow
16000| [17039] HP OpenView Network Node Manager snmpviewer.exe Buffer Overflow
16001| [16960] Linux NTP query client 4.2.6p1 - Heap Overflow Vulnerability
16002| [16956] Novell iPrint Client ActiveX Control <= 5.52 Buffer Overflow
16003| [16929] AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 Buffer Overflow
16004| [16865] Arkeia Backup Client Type 77 Overflow (Mac OS X)
16005| [16864] UFO: Alien Invasion IRC Client Buffer Overflow Exploit
16006| [16838] NetSupport Manager Agent Remote Buffer Overflow
16007| [16814] Novell GroupWise Messenger Client Buffer Overflow
16008| [16812] MDaemon <= 6.8.5 WorldClient form2raw.cgi Stack Buffer Overflow
16009| [16805] HP OpenView Network Node Manager OpenView5.exe CGI Buffer Overflow
16010| [16797] HP OpenView Network Node Manager ovalarm.exe CGI Buffer Overflow
16011| [16795] HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow
16012| [16792] HP OpenView Network Node Manager OvWebHelp.exe CGI Buffer Overflow
16013| [16785] Hewlett-Packard Power Manager Administration Buffer Overflow
16014| [16780] HP OpenView Network Node Manager Snmp.exe CGI Buffer Overflow
16015| [16777] Free Download Manager Remote Control Server Buffer Overflow
16016| [16764] IBM Tivoli Storage Manager Express CAD Service Buffer Overflow
16017| [16755] Novell iManager getMultiPartParameters Arbitrary File Upload
16018| [16744] Computer Associates License Client GETCONFIG Overflow
16019| [16743] 32bit FTP Client Stack Buffer Overflow
16020| [16739] Xftp FTP Client 3.0 PWD Remote Buffer Overflow Exploit
16021| [16722] Xlink FTP Client Buffer Overflow
16022| [16710] Trellian FTP Client 3.01 PASV Remote Buffer Overflow
16023| [16708] LeapWare LeapFTP 2.7.3.600 - PASV Reply Client Overflow
16024| [16678] VideoLAN Client (VLC) Win32 smb:// URI Buffer Overflow
16025| [16668] BACnet OPC Client Buffer Overflow
16026| [16639] McAfee Remediation Client ActiveX Control Buffer Overflow
16027| [16634] Free Download Manager Torrent Parsing Buffer Overflow
16028| [16592] SoftArtisans XFile FileManager ActiveX Control Buffer Overflow
16029| [16543] Novell iPrint Client ActiveX Control Date/Time Buffer Overflow
16030| [16535] Trend Micro OfficeScan Client ActiveX Control Buffer Overflow
16031| [16523] Novell iPrint Client ActiveX Control target-frame Buffer Overflow
16032| [16514] Novell iPrint Client ActiveX Control ExecuteRequest Buffer Overflow
16033| [16510] McAfee Subscription Manager Stack Buffer Overflow
16034| [16508] Novell iPrint Client ActiveX Control Buffer Overflow
16035| [16501] Novell iPrint Client ActiveX Control call-back-url Buffer Overflow
16036| [16496] Kazaa Altnet Download Manager ActiveX Control Buffer Overflow
16037| [16492] Novell iPrint Client ActiveX Control ExecuteRequest debug Buffer Overflow
16038| [16490] UltraVNC 1.0.1 Client Buffer Overflow
16039| [16489] RealVNC 3.3.7 Client Buffer Overflow
16040| [16466] Arkeia Backup Client Type 77 Overflow (Win32)
16041| [16451] eIQNetworks ESA License Manager LICMGR_ADDLICENSE Overflow
16042| [16446] UFO: Alien Invasion IRC Client Buffer Overflow Exploit
16043| [16439] NetTransport Download Manager 2.90.510 Buffer Overflow
16044| [16428] IBM Tivoli Storage Manager Express RCA Service Buffer Overflow
16045| [16423] SAP Business One License Manager 2005 Buffer Overflow
16046| [16421] IBM Tivoli Storage Manager Express CAD Service Buffer Overflow
16047| [16397] Lyris ListManager MSDE Weak sa Password
16048| [16384] DATAC RealWin SCADA Server SCPC_TXTEVENT Buffer Overflow
16049| [16381] MOXA Device Manager Tool 2.1 - Buffer Overflow
16050| [16343] Oracle Secure Backup NDMP_CONNECT_CLIENT_AUTH Buffer Overflow
16051| [16317] Apache Tomcat Manager Application Deployer Authenticated Code Execution
16052| [16228] iOS iDocManager 1.0.0 - Directory Traversal
16053| [16196] eventum issue tracking system 2.3.1 - Stored XSS
16054| [16137] Multiple Vendor Calendar Manager Remote Code Execution
16055| [16095] Terminal Server Client .rdp Denial of Service
16056| [16086] OpenVAS Manager Command Injection Vulnerability
16057| [16002] ActiveX UserManager 2.03 Buffer Overflow
16058| [15940] HP Data Protector Manager 6.11 - Remote DoS in RDS Service
16059| [15937] NetSupport Manager Agent Remote Buffer Overflow
16060| [15815] Joomla Component com_adsmanager Remote File Inclusion Vulnerability
16061| [15790] PHP Web Scripts Ad Manager Pro 3.0 - SQL Injection
16062| [15784] Elcom CommunityManager.NET Auth Bypass Vulnerability
16063| [15768] MCFileManager Plugin for TinyMCE 3.2.2.3 - Arbitrary File Upload Vulnerability
16064| [15766] Radius Manager 3.8.0 - Multiple XSS Vulnerabilities
16065| [15745] IBM Tivoli Storage Manager (TSM) Local Root
16066| [15705] GNU inetutils 1.8-1 - FTP Client Heap Overflow
16067| [15699] PhpMyAdmin Client Side 0Day Code Injection and Redirect Link Falsification
16068| [15649] HP Data Protector Manager A.06.11 MMD NULL Pointer Dereference Denial of Service
16069| [15610] Joomla JE Ajax Event Calendar Component (com_jeajaxeventcalendar) SQL Injection
16070| [15513] Wordpress Event Registration Plugin 5.32 SQL Injection Vulnerability
16071| [15313] Plesk Small Business Manager 10.2.0 and Site Editor Multiple Vulnerabilities
16072| [15281] Event Ticket Portal Script Admin Password Change CSRF Vulnerability
16073| [15230] Site2Nite Auto e-Manager SQL Injection Vulnerability
16074| [15217] Feindura File Manager 1.0(rc) - Remote File Upload
16075| [15194] TinyMCE MCFileManager 2.1.2 - Arbitrary File Upload Vulnerability
16076| [15093] Collaborative Passwords Manager 1.07 Multiple Local Include Vulnerabilities
16077| [15073] Novell iPrint Client ActiveX Control 'debug' Buffer Overflow Exploit
16078| [15072] Novell iPrint Client ActiveX Control call-back-url Buffer Overflow Exploit (meta)
16079| [15042] MOAUB #19 - Novell iPrint Client Browser Plugin call-back-url Stack Overflow
16080| [15026] BACnet OPC Client Buffer Overflow Exploit
16081| [15001] MOAUB #14 - Novell iPrint Client Browser Plugin ExecuteRequest debug Stack Overflow
16082| [14913] DMXReady Members Area Manager Persistent XSS Vulnerability
16083| [14908] DMXready Polling Booth Manager SQL Injection Vulnerability
16084| [14843] "Apple QuickTime ""_Marshaled_pUnk"" Backdoor Param Client-Side Arbitrary Code Execution"
16085| [14784] Adobe Extension Manager CS5 5.0.298 - DLL Hijacking Exploit (dwmapi.dll)
16086| [14643] sFileManager <= v.24a Local File Inclusion Vulnerability
16087| [14584] QQ Computer Manager TSKsp.sys Local Denial of Service Exploit
16088| [14457] DM Filemanager 3.9.11 Arbitrary File Upload Vulnerability
16089| [14452] Ubuntu 10.04 LTS - Lucid Lynx ftp Client 0.17-19build1 ACCT - Buffer Overflow
16090| [14295] Microsoft MSHTML.DLL CTIMEOUTEVENTLIST::INSERTINTOTIMEOUTLIST Memory Leak (0day)
16091| [14274] Joomla Music Manager Component LFI Vulnerability
16092| [14272] UFO: Alien Invasion 2.2.1 - IRC Client Remote Code Execution - OSX Snow Leopard (ROP)
16093| [14243] BS Events Directory (articlesdetails.php) SQL Injection Vulnerability Proof of Concept
16094| [14227] Bs Events_Locator Script SQL Injection Vulnerability
16095| [14209] Joomla Front-End Article Manager System Upload Vulnerability
16096| [14206] Esoftpro Online Contact Manager Multiple Vulnerabilities
16097| [14187] Joomla eventcal Component 1.6.4 com_eventcal Blind SQL Injection Vulnerability
16098| [14127] Joomla Joomanager SQL Injection Vulnerability
16099| [14062] Joomla JE Event Calendar LFI Vulnerability
16100| [14029] "NO-IP.com Dynamic DNS Update Client 2.2.1 - ""Request"" Insecure Encoding Algorithm"
16101| [14010] Novell iManager Multiple Vulnerabilities
16102| [13997] Joomla JE Ajax Event Calendar SQL Injection Vulnerability
16103| [13988] PHP Event Calendar <= 1.5 - Multiple Vulnerabilities
16104| [13840] VU Case Manager Authentication Bypass
16105| [13793] Online Notebook Manager SQLi Vulnerability
16106| [13789] Virtual Real Estate Manager 3.5 - SQLi Vulnerability
16107| [13775] Motorola SB5101 Hax0rware Event Reset Remote Overflow
16108| [13771] EMO Realty Manager SQLi Vulnerable
16109| [12693] Asset Manager Remote File upload Vulnerability
16110| [12677] Rumba FTP Client FTPSFtp.dll 4.2.0.0 - OpenSession() Buffer Overflow
16111| [12639] Joomla Component com_event another SQL Injection vuln
16112| [12633] Joomla Component com_event Multiple Vulnerabilities
16113| [12598] JE Ajax Event Calendar Local File Inclusion Vulnerability
16114| [12554] MiniManager For Mangos/Trinity Server DoS Vulnerability
16115| [12534] PHP Link Manager 1.7 - Url Redirection Bug
16116| [12380] Rumba ftp Client 4.2 PASV BoF (SEH)
16117| [12332] Xftp client 3.0 PWD Remote Exploit
16118| [12302] HP Operations Manager <= 8.16 - (srcvw4.dll) LoadFile()/SaveFile() Remote Unicode Stack Overflow PoC
16119| [12292] Flex File Manager Shell Upload Vulnerability
16120| [12284] Joomla Component ZiMB Manager com_zimbcore Local File Inclusion Vulnerability
16121| [12273] Windows 7/2008R2 SMB Client Trans2 Stack Overflow 10-020 PoC
16122| [12258] Proof of Concept for MS10-006 SMB Client-Side Bug
16123| [12257] joomla component com_manager 1.5.3 - (id) SQL Injection Vulnerability
16124| [12162] Joomla component mv_restaurantmenumanager SQL injection Vulnerability
16125| [12161] Aladdin eToken PKI Client 4.5 - Virtual File Handling Unspecified Memory Corruption PoC
16126| [12159] Joomla Component Multi-Venue Restaurant Menu Manager SQL Injection Vulnerability
16127| [12152] Trellian FTP Client PASV BOF exploit
16128| [12147] Joomla Component Preventive And Reservation LFI Vulnerability
16129| [12146] Joomla Component JProject Manager Local File Inclusion Vulnerability
16130| [12133] Asset Manager 1.0 Shell Upload Vulnerability
16131| [11731] RogioBiz PHP Fle Manager 1.2 - Bypass Admin Exploit
16132| [11613] PHP Advanced Transfer Manager 1.10 - Shell Upload Vulnerability
16133| [11450] File Upload Manager 1.3
16134| [11412] Trade Manager Script SQL injection Vulnerability
16135| [11292] Joomla Component JE Event Calendar SQL Injection Vulnerability
16136| [11290] phpunity.newsmanager LFI Vulnerability
16137| [11140] Joomla Component com_articlemanager SQL Injection Vulnerability
16138| [11136] Public Media Manager SQLi vulns
16139| [10929] Wordpress Events Plugin SQL Injection Vulnerability
16140| [10911] NetTransport Download Manager version:2.90.510 0day
16141| [10874] Pre News Manager (nid) Remote SQL Injection Vulnerability
16142| [10716] Datenator 0.3.0 (event.php id) SQL Injection
16143| [10715] HP Application Recovery Manager (OmniInet.exe) Buffer Overflow
16144| [10515] Basic PHP Events Lister 2 Add Admin Exploit
16145| [10510] Cisco ASA <= 8.x VPN SSL module Clientless URL-list control bypass
16146| [10452] Ez News Manager / Pro CSRF Change Admin Password
16147| [10438] AdManagerPro CSRF Create Administrator Account
16148| [10433] Mail Manager Pro - CSRF (Change Admin Password)
16149| [10425] Quartz Concept Content Manager 3.00 - Auth Bypass
16150| [10398] ZeeCareers 2.x - PHP HR Manager Website [ XSS / Auth Bypass ]
16151| [10372] OPMANAGER - Blind SQL/XPath injectio
16152| [10325] Wordpress Image Manager Plugins Shell Upload Vulnerability
16153| [10285] Public Media Manager
16154| [10235] Eureka Mail Client Remote Buffer Overflow Exploit
16155| [10190] Cisco VPN Client Integer Overflow (DOS)
16156| [10181] bitrix site manager 4.0.5 - Remote File Inclusion Vulnerability
16157| [10099] HP Power Manager Administration Universal Buffer Overflow Exploit
16158| [10070] IBM Informix Client SDK 3.0 nfx file integer overflow exploit
16159| [10061] McAfee Network Security Manager < 5.1.11.8.1 - Multiple Cross Site Scripting Vulnerabilities
16160| [10059] McAfee Network Security Manager < 5.1.11.8.1 - Information Disclosure Vulnerability
16161| [10015] ISC DHCP 'dhclient' 'script_write_params()' - Stack Buffer Overflow Vulnerability
16162| [10009] Free Download Manager Torrent File Parsing Multiple Remote Buffer Overflow Vulnerabilities
16163| [9998] BulletProof FTP 2.63 b56 Client Malformed '.bps' File Stack Buffer Overflow
16164| [9966] Serv-u web client 9.0.0.5 buffer overflow
16165| [9957] Pegasus Mail Client 4.51 PoC BoF
16166| [9930] Arkeia Backup Client <= 5.3.3 Type 77 Overflow (OS X)
16167| [9882] Firefox 3.5.3 - Local Download Manager Temp File Creation
16168| [9881] Eureka Mail Client 2.2q PoC BoF
16169| [9802] IBM Installation Manager <= 1.3.0 iim:// URI handler exploit
16170| [9800] Serv-u web client 9.0.0.5 buffer overflow
16171| [9721] Joomla com_surveymanager SQL injection vulnerability - (stype)
16172| [9683] Novell Groupwise Client 7.0.3.1294 ActiveX Denial of Service PoC
16173| [9637] T-HTB Manager 0.5 - Multiple Blind SQL Injection Vulnerabilities
16174| [9630] MYRE Holiday Rental Manager (action) SQL Injection Vulnerability
16175| [9613] FTPShell Client 4.1 RC2 Remote Buffer Overflow Exploit (univ)
16176| [9603] Model Agency Manager Pro (user_id) SQL Injection Vulnerability
16177| [9518] EMO Breader Manager (video.php movie) SQL Injection Vulnerability
16178| [9517] Lotus note connector for Blackberry Manager 5.0.0.11 ActiveX DoS Vuln
16179| [9516] Novell Client for Windows 2000/XP ActiveX Remote DoS Vulnerability
16180| [9470] PHP Email Manager (remove.php ID) SQL Injection Vulnerability
16181| [9449] TheGreenBow VPN Client tgbvpn.sys Local DoS Exploit
16182| [9426] FTPShell Client 4.1 RC2 Name Session Stack Overflow Exploit
16183| [9335] TT Web Site Manager 0.5 (Auth Bypass) SQL Injection Vulnerability
16184| [9319] SAP Business One 2005-A License Manager Remote BOF Exploit
16185| [9265] ISC DHCP dhclient < 3.1.2p1 Remote Buffer Overflow PoC
16186| [9176] dB Masters Multimedia's Content Manager 4.5 - SQL Injection Vulnerability
16187| [9156] Greenwood Content Manager 0.3.2 - Local File Inclusion Exploit
16188| [9128] Pirch IRC 98 Client (response) Remote BOF Exploit (SEH)
16189| [9049] DM FileManager 3.9.4 - Remote File Disclosure Vulnerability
16190| [9044] dm filemanager 3.9.4 - Remote File Inclusion Vulnerability
16191| [9025] Mega File Manager 1.0 (index.php page) LFI Vulnerability
16192| [8970] McAfee 3.6.0.608 naPolicyManager.dll ActiveX Arbitrary Data Write Vuln
16193| [8920] Joomla Component com_vehiclemanager 1.0 RFI Vulnerability
16194| [8919] Joomla Component com_realestatemanager 1.0 RFI Vulnerability
16195| [8916] Free Download Manager 2.5/3.0 (Control Server) Remote BOF Exploit
16196| [8903] DM FileManager 3.9.2 Insecure Cookie Handling Vulnerability
16197| [8895] Interlogy Profile Manager Basic Insecure Cookie Handling Vulnerability
16198| [8874] SuperCali PHP Event Calendar Arbitrary Change Admin Password Exploit
16199| [8857] WebCal (webCal3_detail.asp event_id) SQL Injection Vulnerability
16200| [8855] AlstraSoft Article Manager Pro Remote Shell Upload Vulnerability
16201| [8835] Roxio CinePlayer 3.2 (IAManager.dll) Remote BOF Exploit (heap spray)
16202| [8749] DMXReady Registration Manager 1.1 - Arbitrary File Upload Vulnerability
16203| [8741] DM FileManager 3.9.2 (Auth Bypass) SQL Injection Vulnerability
16204| [8705] DMXReady Registration Manager 1.1 Database Disclosure Vulnerability
16205| [8623] 32bit FTP (PASV) Reply Client Remote Overflow Exploit (meta)
16206| [8482] Seditio CMS Events Plugin (c) Remote SQL Injection Vulnerability
16207| [8476] Online Email Manager Insecure Cookie Handling Vulnerability
16208| [8450] Online Password Manager 4.1 Insecure Cookie Handling Vulnerability
16209| [8420] BulletProof FTP Client 2009 (.bps) Buffer Overflow Exploit (SEH)
16210| [8307] Diskos CMS Manager (SQL/DB/Auth Bypass) Multiple Vulnerabilities
16211| [8174] Realtek Sound Manager 1.15.0.0 PlayList SEH Overwrite Exploit
16212| [8120] SkyPortal Downloads Manager 1.1 - Remote Contents Change Vuln
16213| [8116] BannerManager 0.81 (Auth Bypass) SQL Injection Vulnerability
16214| [8113] DesignerfreeSolutions Newsletter Manager Pro Auth Bypass Vuln
16215| [8110] SkyPortal Picture Manager 0.11 Contents Change Vulnerability
16216| [7990] UltraVNC/TightVNC Multiple VNC Clients Multiple Integer Overflow PoC
16217| [7986] Free Download Manager 2.5/3.0 (Authorization) Stack BOF PoC
16218| [7957] Free Download Manager <= 3.0 Build 844 .torrent BOF Exploit
16219| [7905] Personal Site Manager <= 0.3 - Remote Command Execution Exploit
16220| [7884] Flax Article Manager 1.1 - Remote PHP Script Upload Vulnerability
16221| [7862] Flax Article Manager 1.1 (cat_id) SQL Injection Vulnerability
16222| [7793] Joomla com_Eventing 1.6.x Blind SQL Injection Exploit
16223| [7791] DMXReady Billboard Manager <= 1.1 - Remote File Upload Vulnerability
16224| [7788] DMXReady BillboardManager <= 1.1 Contents Change Vulnerability
16225| [7784] DMXReady Registration Manager <= 1.1 Contents Change Vulnerability
16226| [7783] DMXReady Photo Gallery Manager <= 1.1 Contents Change Vulnerability
16227| [7782] DMXReady PayPal Store Manager <= 1.1 Contents Change Vulnerability
16228| [7774] DMXReady Members Area Manager <= 1.2 - SQL Injection Vulnerability
16229| [7773] DMXReady Member Directory Manager <= 1.1 - SQL Injection Vulnerability
16230| [7772] DMXReady Links Manager <= 1.1 - Remote Contents Change Vulnerability
16231| [7770] DMXReady Faqs Manager <= 1.1 - Remote Contents Change Vulnerability
16232| [7769] DMXReady Document Library Manager <= 1.1 Contents Change Vuln
16233| [7768] DMXReady Contact Us Manager <= 1.1 - Remote Contents Change Vuln
16234| [7767] DMXReady Classified Listings Manager <= 1.1 - SQL Injection Vulnerability
16235| [7766] DMXReady Catalog Manager <= 1.1 - Remote Contents Change Vuln
16236| [7764] DMXReady Blog Manager <= 1.1 - Remote File Delete Vulnerability
16237| [7754] DMXReady Account List Manager <= 1.1 Contents Change Vulnerability
16238| [7752] DMXReady News Manager <= 1.1 Arbitrary Category Change Vuln
16239| [7589] BulletProof FTP Client (.bps File) Local Stack Overflow PoC
16240| [7571] BulletProof FTP Client 2.63 Local Heap Overflow PoC
16241| [7555] Psi Jabber Client (8010/tcp) Remote Denial of Service Exploit (win/lin)
16242| [7492] Realtek Sound Manager (rtlrack.exe 1.15.0.0) - PlayList BOF Exploit
16243| [7479] XOOPS Module Amevents (print.php id) SQL Injection Vulnerability
16244| [7420] MyCal Personal Events Calendar (mycal.mdb) Database Disclosure Vuln
16245| [7419] evCal Events Calendar Database Disclosure Vulnerability
16246| [7413] CF_Calendar (calendarevent.cfm) Remote SQL Injection Exploit
16247| [7376] QMail Mailing List Manager 1.2 Database Disclosure Vulnerability
16248| [7372] Ikon AdManager 2.1 - Remote Database Disclosure Vulnerability
16249| [7319] Ocean12 Mailing List Manager Gold (DD/SQL/XSS) Vulnerabilities
16250| [7271] Ocean12 FAQ Manager Pro (ID) Blind SQL Injection Vulnerabillity
16251| [7258] Ocean12 FAQ Manager Pro Database Disclosure Vulnerability
16252| [7254] Ocean12 Membership Manager Pro (Auth Bypass) SQL Injection Vuln
16253| [7249] i.Scribe SMTP Client <= 2.00b (wscanf) Remote Format String PoC
16254| [7247] Ocean12 Calendar Manager Gold Database Disclosure Vulnerability
16255| [7246] Ocean12 Poll Manager Pro Database Disclosure Vulnerability
16256| [7245] Ocean12 Membership Manager Pro Database Disclosure Vulnerability
16257| [7244] Ocean12 Contact Manager Pro (SQL/XSS/DDV) Multiple Vulnerabilities
16258| [7233] LoveCMS 1.6.2 Final (Download Manager 1.0) File Upload Exploit
16259| [7229] FAQ Manager 1.2 (config_path) Remote File Inclusion Vulnerability
16260| [7224] FAQ Manager 1.2 (categorie.php cat_id) SQL Injection Vulnerability
16261| [7190] Ez Ringtone Manager Multiple Remote File Disclosure Vulnerabilities
16262| [7182] Joomla Component Thyme 1.0 (event) SQL Injection Vulnerability
16263| [7176] ToursManager (tourview.php tourid) Blind SQL Injection Vulnerability
16264| [7138] E-topbiz AdManager 4 (group) Blind SQL Injection Vulnerability
16265| [7102] AlstraSoft Article Manager Pro (Auth Bypass) SQL Injection Vuln
16266| [7077] OTManager CMS 2.4 (Tipo) Remote File Inclusion Vulnerability
16267| [7034] U&M Software Event Lister 1.0 Auth Bypass Vulnerability
16268| [7013] DevelopItEasy Events Calendar 1.2 - Multiple SQL Injection Vulnerabilities
16269| [7002] Joomla Component Dada Mail Manager 2.6 RFI Vulnerability
16270| [6988] Tours Manager 1.0 - (cityview.php cityid) SQL Injection Vulnerability
16271| [6902] Absolute FAQ Manager 6.0 Insecure Cookie Handling Vulnerability
16272| [6900] Absolute News Manager 5.1 Insecure Cookie Handling Vulnerability
16273| [6890] Absolute Banner Manager Insecure Cookie Handling Vulnerability
16274| [6883] Absolute Poll Manager XE 4.1 Cookie Handling Vulnerability
16275| [6760] myEvent 1.6 (viewevent.php) Remote SQL Injection Vulnerability
16276| [6731] Absolute Poll Manager XE 4.1 (xlacomments.asp) SQL Injection Vuln
16277| [6697] Built2Go PHP RealEstate 1.5 (event_detail.php) SQL Injection Vuln
16278| [6623] events calendar 1.1 - Remote File Inclusion Vulnerability
16279| [6599] Real Estate Manager (cat_id) Remote SQL injection vulnerability
16280| [6579] Libra PHP File Manager <= 1.18 Insecure Cookie Handling Vulnerability
16281| [6567] Libra PHP File Manager <= 1.18/2.0 - Local File Inclusion Exploit
16282| [6547] Ol Bookmarks Manager 0.7.5 RFI / LFI / SQL Injection Vulnerabilities
16283| [6543] Ol Bookmarks Manager 0.7.5 - Local File Inclusion Vulnerability
16284| [6508] Basic PHP Events Lister 1.0 - Remote SQL Injection Vulnerability
16285| [6349] Reciprocal Links Manager 1.1 (site) SQL Injection Vulnerability
16286| [6257] WS_FTP Home/Professional FTP Client Remote Format String PoC
16287| [6220] Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
16288| [6213] Free Hosting Manager 1.2/2.0 Insecure Cookie Handling Vulnerability
16289| [6181] RealVNC Windows Client 4.1.2 - Remote DoS Crash PoC
16290| [6127] Wordpress Plugin Download Manager 0.2 - Arbitrary File Upload Exploit
16291| [6095] AlstraSoft Article Manager Pro 1.6 - Blind SQL Injection Exploit
16292| [6081] Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability
16293| [6075] Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability
16294| [6048] Maian Events 2.0 Insecure Cookie Handling Vulnerability
16295| [6035] DreamNews Manager (id) Remote SQL Injection Vulnerability
16296| [5964] Online Booking Manager 2.2 (id) SQL Injection Vulnerability
16297| [5959] OTManager CMS 2.4 Insecure Cookie Handling Vulnerability
16298| [5957] otmanager cms 24a (lfi/xss) Multiple Vulnerabilities
16299| [5936] Page Manager CMS Remote Arbitrary File Upload Vulnerability
16300| [5803] Pre News Manager <= 1.0 (index.php id) SQL Injection Vulnerability
16301| [5762] ProManager 0.73 (config.php) Local File Inclusion Vulnerability
16302| [5760] Galatolo Web Manager <= 1.0 - Remote SQL Injection Exploit
16303| [5758] Galatolo Web Manager 1.0 XSS / Local File Inclusion Vulnerability
16304| [5757] BrowserCRM 5.002.00 (clients.php) Remote File Inclusion Vulnerability
16305| [5753] JiRo?s FAQ Manager (read.asp fID) SQL Injection Vulnerability
16306| [5741] Akamai Download Manager < 2.2.3.7 ActiveX Remote Download Exploit
16307| [5712] Samba (client) receive_smb_raw() Buffer Overflow Vulnerability PoC
16308| [5641] CMS WebManager-Pro Multiple Remote SQL Injection Vulnerabilities
16309| [5625] Symantec Altiris Client Service 6.8.378 Local Privilege Escalation Exploit
16310| [5624] newsmanager 2.0 (rfi/rfd/sql/pb) Multiple Vulnerabilities
16311| [5609] EMO Realty Manager (news.php ida) SQL Injection Vulnerability
16312| [5600] CMS Made Simple <= 1.2.4 (FileManager module) File Upload Exploit
16313| [5430] HP OpenView Network Node Manager <= 7.53 Multiple Vulnerabilities
16314| [5328] phpSpamManager 0.53b (body.php) Remote File Disclosure Vulnerability
16315| [5230] argon client management services <= 1.31 - Directory Traversal vuln
16316| [5210] Galaxy FTP Server 1.0 (Neostrada Livebox DSL Router) DoS Exploit
16317| [5202] barryvan compo manager 0.5pre-1 - Remote File Inclusion Vulnerability
16318| [5183] php Download Manager <= 1.1 - Local File Inclusion Vulnerability
16319| [5121] LookStrike Lan Manager 0.9 - Remote / Local File Inclusion Vulnerabilities
16320| [5106] Citrix Presentation Server Client WFICA.OCX ActiveX - Heap BOF Exploit
16321| [5078] Backup Exec System Recovery Manager <= 7.0.1 File Upload Exploit
16322| [4992] Wordpress Plugin WP-Cal 0.3 editevent.php SQL Injection Vulnerability
16323| [4979] Move Networks Upgrade Manager Control Buffer Overflow Exploit
16324| [4944] 360 Web Manager 3.0 (IDFM) SQL Injection Vulnerability
16325| [4911] Cisco VPN Client IPSec Driver Local kernel system pool Corruption PoC
16326| [4909] Macrovision FlexNet DownloadManager Insecure Methods Exploit
16327| [4894] StreamAudio ChainCast ProxyManager ccpm_0237.dll BoF Exploit
16328| [4845] RunCMS Newbb_plus <= 0.92 Client IP Remote SQL Injection Exploit
16329| [4844] Wordpress Plugin Wp-FileManager 1.2 - Remote Upload Vulnerability
16330| [4801] SkyFex Client 1.0 ActiveX Start() Method Remote Stack Overflow
16331| [4773] OpenSSL < 0.9.7l / 0.9.8d - SSLv2 Client Crash Exploit
16332| [4757] hp software update client 3.0.8.4 - Multiple Vulnerabilities
16333| [4724] HP OpenView Network Node Manager 07.50 CGI Remote BoF Exploit
16334| [4653] WorkingOnWeb 2.0.1400 events.php Remote SQL Injection Vulnerability
16335| [4573] IBM Tivoli Storage Manager 5.3 Express CAD Service BoF Exploit
16336| [4519] Pindorama 0.1 client.php Remote File Inclusion Vulnerability
16337| [4465] public media manager <= 1.3 - Remote File Inclusion Vulnerability
16338| [4418] Omnistar Article Manager Software (article.php) SQL Injection Exploit
16339| [4372] GlobalLink 2.7.0.8 glitemflat.dll SetClientInfo() Heap Overflow Exploit
16340| [4309] Joomla Component EventList <= 0.8 (did) SQL Injection Vulnerability
16341| [4299] eCentrex VOIP Client module (uacomx.ocx 2.0.1) Remote BOF Exploit
16342| [4141] SuperCali PHP Event Calendar 0.4.0 - SQL Injection Vulnerability
16343| [4135] phpEventCalendar <= 0.2.3 (eventdisplay.php) SQL Injection Exploit
16344| [4133] ArcadeBuilder Game Portal Manager 1.7 - Remote SQL Injection Vuln
16345| [4130] TotalCalendar <= 2.402 (view_event.php) Remote SQL Injection Vulns
16346| [4129] Ripe Website Manager (CMS) <= 0.8.9 - Remote File Inclusion Vulns
16347| [4058] Ace-FTP Client 1.24a Remote Buffer Overflow PoC
16348| [4027] IBM Tivoli Provisioning Manager PRE AUTH Remote Exploit
16349| [3964] Ol Bookmarks Manager 0.7.4 - Remote SQL Injection Vulnerability
16350| [3962] Ol Bookmarks Manager 0.7.4 (root) Remote File Inclusion Vulnerabilities
16351| [3931] XOOPS Module resmanager <= 1.21 - Blind SQL Injection Exploit
16352| [3873] SmartCode VNC Manager 3.6 (scvncctrl.dll) Denial of Service Exploit
16353| [3841] Pre News Manager 1.0 - Remote SQL Injection Vulnerability
16354| [3802] phpBandManager 0.8 (index.php pg) Remote File Inclusion Vulnerability
16355| [3797] ABC-View Manager 1.42 (.PSP File) Buffer Overflow Exploit
16356| [3719] MyBulletinBoard (MyBB) <= 1.2.2 (CLIENT-IP) SQL Injection Exploit
16357| [3702] InoutMailingListManager <= 3.1 - Remote Command Execution Exploit
16358| [3649] Ipswitch WS_FTP 5.05 Server Manager Local Site Buffer Overflow Exploit
16359| [3625] XOOPS Module Tiny Event <= 1.01 (id) Remote SQL Injection Exploit
16360| [3564] Joomla Component Car Manager <= 1.1 - Remote SQL Injection Exploit
16361| [3547] 0irc-client 1345 build20060823 - Denial of Service Exploit
16362| [3546] aspWebCalendar 4.5 (calendar.asp eventid) SQL Injection Vulnerability
16363| [3356] Nortel SSL VPN Linux Client <= 6.0.3 - Local Privilege Escalation Exploit
16364| [3326] Vivvo Article Manager 3.4 (root) Local File Inclusion Vulnerability
16365| [3310] Jupiter CMS 1.1.5 (Client-IP) Remote SQL Injection Exploit
16366| [3277] SmartFTP Client 2.0.1002 Remote Heap Overflow DoS Exploit
16367| [3246] phpEventMan 1.0.2 (level) Remote File Include Vulnerabilities
16368| [3028] Limbo CMS Module event 1.0 - Remote File Include Vulnerability
16369| [2997] File Upload Manager <= 1.0.6 (detail.asp) Remote SQL Injection Exploit
16370| [2968] PHP Advanced Transfer Manager <= 1.30 Source Code Disclosure Exploit
16371| [2896] Tucows Client Code Suite (CSS) <= 1.2.1015 File Include Vulnerability
16372| [2883] simple file manager 0.24a Multiple Vulnerabilities
16373| [2836] JiRos FAQ Manager 1.0 (index.asp) Remote SQL Injection Vulnerability
16374| [2790] Etomite CMS <= 0.6.1.2 (manager/index.php) Local File Include Exploit
16375| [2784] Links 1.00pre12 (smbclient) Remote Code Execution Exploit
16376| [2773] Estate Agent Manager <= 1.3 - (default.asp) Login Bypass Vulnerability
16377| [2772] Online Event Registration <= 2.0 (save_profile.asp) Pass Change Exploit
16378| [2769] Quick.Cart <= 2.0 (actions_client/gallery.php) Local File Include Exploit
16379| [2709] Creasito E-Commerce Content Manager (admin) Authentication Bypass
16380| [2576] Specimen Image Database (client.php) Remote File Include Vulnerability
16381| [2548] phpBB RPG Events 1.0 functions_rpg_events Remote File Include Exploit
16382| [2530] BulletProof FTP Client 2.45 Remote Buffer Overflow Exploit (PoC)
16383| [2385] Techno Dreams FAQ Manager 1.0 - Remote SQL Injection Vulnerability
16384| [2339] Vivvo Article Manager <= 3.2 (classified_path) File Include Vulnerability
16385| [2337] Vivvo Article Manager <= 3.2 (id) Remote SQL Injection Vulnerability
16386| [2259] proManager <= 0.73 (note.php) Remote SQL Injection Vulnerability
16387| [2180] Opera 9 IRC Client Remote Denial of Service Exploit (py)
16388| [2179] Opera 9 IRC Client Remote Denial of Service Exploit (c)
16389| [2141] Visual Events Calendar 1.1 (cfg_dir) Remote Include Vulnerability
16390| [2140] eIQnetworks License Manager Remote Buffer Overflow Exploit (multi)
16391| [2104] k_fileManager <= 1.2 (dwl_include_path) Remote Inclusion Vulnerability
16392| [2080] eIQnetworks License Manager Remote Buffer Overflow Exploit (multi)
16393| [2075] eIQnetworks License Manager Remote Buffer Overflow Exploit (494)
16394| [2074] eIQnetworks License Manager Remote Buffer Overflow Exploit (1262)
16395| [2054] MS Windows DHCP Client Broadcast Attack Exploit (MS06-036)
16396| [2012] MyBulletinBoard (MyBB) <= 1.1.5 (CLIENT-IP) SQL Injection Exploit
16397| [1977] Quake 3 Engine Client CS_ITEMS Remote Overflow Exploit (Win32)
16398| [1976] Quake 3 Engine Client CG_ServerCommand() Remote Overflow Exploit
16399| [1923] Ad Manager Pro 2.6 (ipath) Remote File Include Vulnerability
16400| [1832] Plume CMS <= 1.0.3 (manager_path) Remote File Include Vulnerability
16401| [1795] ezusermanager <= 1.6 - Remote File Inclusion Vulnerability
16402| [1750] Quake 3 Engine 1.32b R_RemapShader() Remote Client BoF Exploit
16403| [1687] MyEvent <= 1.3 (myevent_path) Remote File Inclusion Vulnerability
16404| [1664] Ultr@VNC <= 1.0.1 client Log::ReallyPrint Buffer Overflow Exploit
16405| [1643] Ultr@VNC <= 1.0.1 client Log::ReallyPrint Buffer Overflow PoC
16406| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
16407| [1558] LieroX <= 0.62b Remote Server/Client Denial of Service Exploit
16408| [1421] Veritas NetBackup 4/5 Volume Manager Daemon Remote BoF Exploit
16409| [1366] Lyris ListManager Read Message Attachment SQL Injection Exploit
16410| [1286] GO-Global Windows Clients <= 3.1.0.3270 Buffer Overflow (PoC)
16411| [1282] Blitzkrieg 2 <= 1.21 - (server/client) Denial of Service Exploit
16412| [1201] FTP Internet Access Manager <= 1.2 Command Execution Exploit
16413| [1197] MS Windows (keybd_event) Local Privilege Elevation Exploit
16414| [1190] DameWare Mini Remote Control 4.0 < 4.9 (Client Agent) Remote Exploit
16415| [1188] HP OpenView Network Node Manager <= 7.50 Remote Exploit
16416| [1187] Gopher <= 3.0.9 (+VIEWS) Remote (Client Side) Buffer Overflow Exploit
16417| [1138] nbSMTP <= 0.99 (util.c) Client-Side Command Execution Exploit
16418| [1134] MySQL Eventum <= 1.5.5 (login.php) SQL Injection Exploit
16419| [1115] Intruder Client 1.00 Remote Command Execution & DoS Exploit
16420| [1091] Internet Download Manager <= 4.05 Input URL Stack Overflow Exploit
16421| [1081] Nokia Affix < 3.2.0 btftp Remote Client Exploit
16422| [988] Remote File Manager 1.0 - Denial of Service Exploit
16423| [839] Avaya IP Office Phone Manager Local Password Disclosure Exploit
16424| [780] Xpand Rally <= 1.0.0.0 (Server/Clients) Crash Exploit
16425| [761] NodeManager Professional 2.00 Buffer Overflow Vulnerability
16426| [679] Battlefield 1942 <= 1.6.19 + Vietnam <= 1.2 - Broadcast Client Crash
16427| [662] 3Dmax 6.x backburner Manager <= 2.2 - Denial of Service Exploit
16428| [653] Soldier of Fortune II <= 1.3 Server/Client Denial of Service Exploit
16429| [651] Halo <= 1.05 Broadcast Client Crash Exploit
16430| [650] CoffeeCup FTP Clients (Direct <= 6.2.0.62) (Free <= 3.0.0.10) BoF Exploit
16431| [649] wodFtpDLX Client ActiveX Control Buffer Overflow Crash Exploit
16432| [429] Ground Control <= 1.0.0.7 (Server/Client) Denial of Service Exploit
16433| [421] Gaucho 1.4 Mail Client Buffer Overflow Vulnerability
16434| [355] MS Windows 2k Utility Manager (All-In-One) Exploit (MS04-019)
16435| [352] MS Windows 2000 Universal Language Utility Manager Exploit (MS04-019)
16436| [350] MS Windows 2000 Utility Manager Privilege Elevation Exploit (MS04-019)
16437| [271] MS Windows Utility Manager Local SYSTEM Exploit (MS04-011)
16438| [264] Novell BorderManager Enterprise Edition 3.5 - Denial of Service Exploit
16439| [147] Need for Speed 2 Remote Client Buffer Overflow Exploit
16440| [95] Roger Wilco 1.x Client Data Buffer Overflow Exploit
16441| [82] Piolet Client 1.05 Remote Denial of Service Exploit
16442| [8] SETI@home Clients Buffer Overflow Exploit
16443|
16444| OpenVAS (Nessus) - http://www.openvas.org:
16445| [902824] Epson EventManager 'x-protocol-version' Denial of Service Vulnerability
16446| [802852] Novell iManager jclient 'EnteredAttrName' Buffer Overflow Vulnerability
16447| [801398] AutoFTP Manager FTP Client Directory Traversal Vulnerability
16448| [103457] VMSA-2012-0005 VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, ESXi and ESX address several security issues
16449| [902902] SolarWinds Orion Data Storage Manager SQL Injection and XSS Vulnerabilities
16450| [902726] ClamAV Hash Manager Off-By-One Denial of Service Vulnerability (Win)
16451| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
16452| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
16453| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
16454| [902674] Novell iPrint Client Multiple Remote Code Execution Vulnerabilities
16455| [902643] Windows Client/Server Run-time Subsystem Privilege Elevation Vulnerability (2620712)
16456| [902499] MS Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2646524)
16457| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
16458| [902448] SmartFTP Client Information Disclosure Vulnerability
16459| [902447] SmartFTP Client Version Detection
16460| [902444] MS Windows Threat Management Gateway Firewall Client Remote Code Execution Vulnerability (2520426
16461| [902422] Oracle Java Access Manager and OpenSSO Unspecified Vulnerability - April11
16462| [902345] MOXA Device Manager MDM Tool Buffer Overflow Vulnerability
16463| [902338] AR Web Content Manager Multiple Directory Traversal Vulnerabilities
16464| [902328] Novell iPrint Client 'ienipp.ocx' ActiveX Buffer Overflow Vulnerability
16465| [902301] Windows Client/Server Runtime Subsystem Privilege Elevation Vulnerability (2121546)
16466| [902297] Terminal Server Client RDP File Processing BOF Vulnerabilities
16467| [902282] Oracle Java Access Manager And OpenSSO Unspecified Vulnerability
16468| [902234] 3D FTP Client Directory Traversal Vulnerability
16469| [902233] FTPGetter FTP Client Directory Traversal Vulnerability
16470| [902170] Iswitch WS-FTP Client Version Detection
16471| [902165] Sun JS Access Manager And OpenSSO Unspecified Vulnerability
16472| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
16473| [902135] TT Web Site Manager 'tt_name' Remote SQL Injection Vulnerability
16474| [902134] TT Web Site Manager Version Detection
16475| [902132] Symantec IM Manager Console Cross Site Scripting Vulnerability
16476| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
16477| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
16478| [902104] TheGreenBow IPSec VPN Client Local Stack Overflow Vulnerability
16479| [902103] Tor Clients Information Disclosure Vulnerability (Linux)
16480| [902102] Tor Clients Information Disclosure Vulnerability (win)
16481| [902098] Novell iPrint Client Multiple Vulnerabilities (windows)
16482| [902088] Event Horizon 'modfile.php' Cross Site Scripting and SQL Injection Vulnerabilities
16483| [902081] Event Horizon Version Detection
16484| [902076] HP OpenView Network Node Manager Multiple Vulnerabilities
16485| [901186] Symantec IM Manager 'eval()' Code Injection Vulnerability
16486| [901181] Windows Client/Server Run-time Subsystem Privilege Elevation Vulnerability (2476687)
16487| [901173] Windows Backup Manager Remote Code Execution Vulnerability (2478935)
16488| [901079] IBM DB2 Self Tuning Memory Manager (STMM) DOS Vulnerability (Linux)
16489| [901078] IBM DB2 Self Tuning Memory Manager (STMM) DOS Vulnerability (Win)
16490| [901077] IBM DB2 Client Interfaces component Unspecified Vulnerabilities (Linux)
16491| [901076] IBM DB2 Client Interfaces component Unspecified Vulnerabilities (Win)
16492| [900962] FTPShell Client PASV Command Buffer Overflow Vulnerability
16493| [900961] FTPShell Client Version Detection
16494| [900958] SILC Client Channel Name Format String Vulnerability
16495| [900951] SILC Client Nickname Field Format String Vulnerability
16496| [900922] TheGreenBow IPSec VPN Client Denial Of Service Vulnerability
16497| [900921] TheGreenBow IPSec VPN Client Version Detection
16498| [900852] Novell iPrint Client ActiveX Control Buffer Overflow Vulnerability
16499| [900825] Google Chrome 'tooltip_manager.cc' Denial Of Service Vulnerability
16500| [900818] Sun JS Access Manager And OpenSSO Information Disclosure vulnerability
16501| [900729] Novell iPrint Client Multiple BOF Vulnerabilities (Win)
16502| [900728] Novell iPrint Client Multiple BOF Vulnerabilities (Linux)
16503| [900715] Transmission Client Cross Site Request Forgery Vulnerability
16504| [900694] ISC DHCP Client Buffer Overflow Vulnerability
16505| [900634] Trend Micro OfficeScan Client Denial Of Service Vulnerability
16506| [900515] WoW Raid Manager Cross-Site Scripting Vulnerability
16507| [900514] WOW Raid Manager Version Detection
16508| [900475] TightVNC ClientConnection Multiple Integer Overflow Vulnerabilities (Linux)
16509| [900473] TightVNC ClientConnection Multiple Integer Overflow Vulnerabilities (Win)
16510| [900471] UltraVNC ClientConnection Multiple Integer Overflow Vulnerabilities (Win)
16511| [900452] ASP-Dev XM Event Diary Multiple Vulnerabilities
16512| [900451] WS_FTP Server Manager Security Bypass Vulnerability
16513| [900405] MDaemon Server WordClient Script Insertion Vulnerability
16514| [900403] HP OpenView Network Node Manager XSS Vulnerability
16515| [900291] HP Data Protector Manager RDS Service Denial of Service Vulnerability
16516| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
16517| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
16518| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
16519| [900243] HP OpenView Network Node Manager Multiple Vulnerabilities - May10
16520| [900242] HP OpenView Network Node Manager Version Detection
16521| [900211] HP OpenView Network Node Manager Denial of Service Vulnerabilities
16522| [900206] Ipswitch WS FTP Client Format String Vulnerability
16523| [900195] Sun Java System Access Manager Information Disclosure vulnerability
16524| [900194] Sun Java System Access Manager Version Detection
16525| [900169] IBM TSM Client Remote Heap BOF Vulnerability
16526| [900040] Novell iPrint Client ActiveX Control Multiple Vulnerabilities
16527| [900035] Vulnerabilities in Event System Could Allow Remote Code Execution (950974)
16528| [900026] McAfee Encrypted USB Manager Remote Security Bypass Vulnerability
16529| [900024] OpenVPN Client Remote Code Execution Vulnerability
16530| [881463] CentOS Update for dhclient CESA-2012:1141 centos6
16531| [881457] CentOS Update for dhclient CESA-2012:1140 centos5
16532| [881412] CentOS Update for krb5-appl-clients CESA-2011:1852 centos6
16533| [881401] CentOS Update for dhclient CESA-2011:1160 centos4 x86_64
16534| [881369] CentOS Update for dhclient CESA-2011:1160 centos5 x86_64
16535| [881336] CentOS Update for libsmbclient CESA-2011:0305 centos5 x86_64
16536| [881301] CentOS Update for rgmanager CESA-2011:1000 centos5 x86_64
16537| [881285] CentOS Update for libsmbclient CESA-2011:1219 centos5 x86_64
16538| [881281] CentOS Update for dhclient CESA-2011:0428 centos4 x86_64
16539| [881277] CentOS Update for dhclient CESA-2011:0428 centos5 x86_64
16540| [881271] CentOS Update for dhclient CESA-2011:1819 centos6
16541| [881220] CentOS Update for sblim-cim-client2 CESA-2012:0987 centos6
16542| [881194] CentOS Update for libsmbclient CESA-2012:0465 centos5
16543| [881179] CentOS Update for libsmbclient CESA-2012:0465 centos6
16544| [881081] CentOS Update for libsmbclient CESA-2012:0533 centos6
16545| [881001] CentOS Update for dhclient CESA-2011:1160 centos5 i386
16546| [881000] CentOS Update for rgmanager CESA-2011:1000 centos5 i386
16547| [880981] CentOS Update for libsmbclient CESA-2011:1219 centos5 i386
16548| [880964] CentOS Update for dhclient CESA-2011:1160 centos4 i386
16549| [880933] CentOS Update for NetworkManager CESA-2009:0362 centos4 i386
16550| [880835] CentOS Update for NetworkManager CESA-2009:0361 centos5 i386
16551| [880743] CentOS Update for rgmanager CESA-2009:1339 centos5 i386
16552| [880710] CentOS Update for dhclient CESA-2009:1154 centos3 i386
16553| [880642] CentOS Update for libsmbclient CESA-2010:0488 centos5 i386
16554| [880619] CentOS Update for libsmbclient CESA-2010:0697 centos5 i386
16555| [880609] CentOS Update for NetworkManager CESA-2010:0616 centos5 i386
16556| [880580] CentOS Update for NetworkManager CESA-2010:0108 centos5 i386
16557| [880550] CentOS Update for libsmbclient CESA-2011:0305 centos5 i386
16558| [880543] CentOS Update for dhclient CESA-2011:0428 centos5 i386
16559| [880486] CentOS Update for dhclient CESA-2011:0428 centos4 i386
16560| [870771] RedHat Update for sblim-cim-client2 RHSA-2012:0987-04
16561| [870703] RedHat Update for NetworkManager RHSA-2011:0930-01
16562| [870686] RedHat Update for NetworkManager RHSA-2011:1338-01
16563| [870273] RedHat Update for rhn-client-tools RHSA-2010:0449-01
16564| [870219] RedHat Update for NetworkManager RHSA-2010:0108-01
16565| [864739] Fedora Update for libguac-client-rdp FEDORA-2012-14179
16566| [864736] Fedora Update for libguac-client-vnc FEDORA-2012-14097
16567| [864735] Fedora Update for libguac-client-vnc FEDORA-2012-14179
16568| [864421] Fedora Update for kde-partitionmanager FEDORA-2012-5873
16569| [864182] Fedora Update for kde-partitionmanager FEDORA-2012-5919
16570| [864053] Fedora Update for ykclient FEDORA-2011-15580
16571| [863941] Fedora Update for NetworkManager FEDORA-2011-13425
16572| [863569] Fedora Update for NetworkManager FEDORA-2011-13401
16573| [863548] Fedora Update for NetworkManager FEDORA-2011-13388
16574| [863418] Fedora Update for NetworkManager FEDORA-2011-8612
16575| [863326] Fedora Update for NetworkManager FEDORA-2011-9005
16576| [863286] Fedora Update for httpcomponents-client FEDORA-2011-7747
16577| [863271] Fedora Update for NetworkManager FEDORA-2011-7919
16578| [862336] Fedora Update for NetworkManager FEDORA-2010-12911
16579| [862331] Fedora Update for ModemManager FEDORA-2010-12911
16580| [861604] Fedora Update for NetworkManager FEDORA-2009-13642
16581| [861316] Fedora Update for NetworkManager FEDORA-2007-0186
16582| [861103] Fedora Update for xfce-mcs-manager FEDORA-2007-4368
16583| [861018] Fedora Update for xfce-mcs-manager FEDORA-2007-4385
16584| [860733] Fedora Update for rgmanager FEDORA-2008-9458
16585| [860526] Fedora Update for rgmanager FEDORA-2008-9042
16586| [855705] Solaris Update for Sun Update Connection System Client 1.0.10 121118-16
16587| [855703] Solaris Update for Sun Update Connection System Client 1.0.10 121119-16
16588| [855616] Solaris Update for Gnome Multi-protocol instant messaging client 119549-13
16589| [855445] Solaris Update for User Manager CLI 113750-02
16590| [855357] Solaris Update for Sun Update Connection Client Foundation 121453-02
16591| [855117] Solaris Update for Sun Update Connection Client Foundation 121454-02
16592| [855062] Solaris Update for Mozilla Thunderbird email client 125542-04
16593| [855046] Solaris Update for User Manager CLI 113749-02
16594| [850172] SuSE Update for NetworkManager, wpa_supplicant, NetworkManager-gnome SUSE-SA:2011:045
16595| [841058] Ubuntu Update for network-manager-applet USN-1483-2
16596| [841056] Ubuntu Update for network-manager USN-1483-1
16597| [841033] Ubuntu Update for ubuntu-sso-client USN-1464-1
16598| [841031] Ubuntu Update for update-manager USN-1443-2
16599| [841030] Ubuntu Update for ubuntuone-client USN-1465-1
16600| [841027] Ubuntu Update for ubuntuone-client USN-1465-3
16601| [841009] Ubuntu Update for update-manager USN-1443-1
16602| [840901] Ubuntu Update for update-manager USN-1284-2
16603| [840827] Ubuntu Update for update-manager USN-1284-1
16604| [840665] Ubuntu Update for modemmanager USN-1138-2
16605| [840367] Ubuntu Update for network-manager-applet vulnerabilities USN-883-1
16606| [835249] HP-UX Update for CDE Calendar Manager HPSBUX02628
16607| [835196] HP-UX Update for VERITAS File System (VRTSvxfs) or VERITAS Oracle Disk Manager (VRTSodm) HPSBUX02409
16608| [835171] HP-UX Update for System Administration Manager (SAM) HPSBUX02286
16609| [835072] HP-UX Update for Process Resource Manager (PRM) HPSBUX01065
16610| [835066] HP-UX Update for Partition Manager parmgr (1M) HPSBUX00296
16611| [835038] HP-UX Update for Support Tools Manager HPSBUX00137
16612| [835015] HP-UX Update for System Administration Manager (SAM) HPSBUX01104
16613| [830864] Mandriva Update for virt-manager MDVA-2010:055 (virt-manager)
16614| [830805] Mandriva Update for virt-manager MDVA-2010:029 (virt-manager)
16615| [830427] Mandriva Update for gnome-power-manager MDVA-2008:165 (gnome-power-manager)
16616| [803110] Novell Sentinel Log Manager Retention Policy Security Bypass Vulnerability
16617| [803022] Fake Identd Client Query Remote Buffer Overflow Vulnerability
16618| [803019] Ad Manager Pro Multiple SQL Injection And XSS Vulnerabilities
16619| [802905] PowerNet Twin Client 'RFSynC' Denial of Service Vulnerability
16620| [802876] Trend Micro Control Manager 'CmdProcessor.exe' Buffer Overflow Vulnerability
16621| [802838] Asterisk HTTP Manager Buffer Overflow Vulnerability
16622| [802629] FlexNet License Server Manager 'lmgrd' Component Stack BOF Vulnerability
16623| [802620] Presto! PageManager Multiple Vulnerabilities
16624| [802587] Zoho ManageEngine ADManager Plus Multiple Cross Site Scripting Vulnerabilities
16625| [802586] phux Download Manager 'file' Parameter SQL Injection Vulnerability
16626| [802483] Zoho ManageEngine Security Manager Plus Multiple Vulnerabilities
16627| [802467] Omnistar Document Manager Software Multiple Vulnerabilities
16628| [802424] Zoho ManageEngine Applications Manager Multiple XSS and SQL Injection Vulnerabilities
16629| [802373] SQLiteManager 'dbsel' And 'nsextt' Parameters Multiple XSS Vulnerabilities
16630| [802371] Attachmate Reflection FTP Client LIST Command Remote Heap Buffer Overflow Vulnerability
16631| [802342] EMO Realty Manager 'cat1' Parameter SQL Injection Vulnerability
16632| [802253] ColdGen ColdCalendar 'EventID' SQL Injection Vulnerability
16633| [802252] Symantec IM Manager Multiple Vulnerabilities
16634| [802242] Symantec Endpoint Protection Manager XSS and CSRF Vulnerabilities
16635| [802163] Calendar Manager Service rpc.cmsd Service Detection
16636| [802043] Novell NetIQ Privileged User Manager Remote Code Execution Vulnerability
16637| [802027] Avaya IP Office Manager TFTP Server Directory Traversal Vulnerability
16638| [802011] Avaya IP Office Manager TFTP Denial of Service Vulnerability
16639| [801951] Novell iPrint Client 'printer-url' Multiple BOF Vulnerabilities (Windows)
16640| [801946] HP Data Protector Client 'EXEC_CMD' Remote Code Execution Vulnerability
16641| [801932] Xoops 'imagemanager.php' Local File Inclusion Vulnerability
16642| [801923] Collaborative Passwords Manager (cPassMan) 'path' Local File Inclusion Vulnerability
16643| [801920] OpenVAS Manager OMP Request Handling Command Injection Vulnerability
16644| [801911] AR Web Content Manager (AWCM) 'search.php' Cross Site Scripting Vulnerability
16645| [801858] CA Host-Based Intrusion Prevention System 'XMLSecDB' ActiveX Control Code Execution Vulnerability
16646| [801852] F-Secure Policy Manager 'WebReporting' Module XSS And Path Disclosure Vulnerabilities
16647| [801810] NetSupport Manager Remote Buffer Overflow Vulnerability
16648| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
16649| [801593] Oracle MySQL Eventum Multiple Cross Site Scripting Vulnerabilities
16650| [801591] HP Power Manager Cross Site Request Forgery (CSRF) and XSS Vulnerability
16651| [801579] HP Data Protector Manager Remote Denial of Service Vulnerability
16652| [801574] ICQ 7 Instant Messaging Client Remote Code Execution Vulnerability
16653| [801569] HP Power Manager Login Form Buffer Overflow Vulnerability
16654| [801537] TeamSpeak Client Arbitrary command execution vulnerability (Win)
16655| [801509] Adobe Extension Manager CS5 Insecure Library Loading Vulnerability (Win)
16656| [801424] Novell iPrint Client Multiple Security Vulnerabilities (Linux)
16657| [801423] Novell iPrint Client Multiple Security Vulnerabilities (Windows)
16658| [801389] HP OpenView Network Node Manager Code Execution Vulnerability
16659| [801388] HP OpenView Network Node Manager Multiple Code Execution Vulnerabilities
16660| [801339] Free Download Manager Multiple Buffer Overflow Vulnerabilities
16661| [801302] Skype Extras Manager Unspecified Vulnerability (Windows)
16662| [801107] BackupPC 'ClientNameAlias' Function Security Bypass Vulnerability
16663| [801053] Robo-FTP Client Version Detection
16664| [801011] IBM Installation Manager URI Handling Argument Injection Vulnerability (Win)
16665| [801010] IBM Installation Manager Version Detection (Win)
16666| [800973] Novell Groupwise Client ActiveX Control Buffer Overflow Vulnerability
16667| [800836] DM FileManager 'album.php' Remote File Inclusion Vulnerability
16668| [800819] DM FileManager 'login.php' Security Bypass Vulnerability
16669| [800818] DM FileManager Version Detection
16670| [800776] Internet Download Manager FTP Buffer Overflow Vulnerability
16671| [800484] Phpunity Newsmanager Local File Inclusion Vulnerability
16672| [800478] Document Manager Information Disclosure Vulnerability
16673| [800477] Document Manager Version Detection
16674| [800349] Multiple Buffer Overflow Vulnerabilities in Free Download Manager
16675| [800348] Free Download Manager Version Detection
16676| [800331] Microsoft Windows Live Messenger Client Version Detection
16677| [800330] BulletProof FTP Client '.bps' File Buffer Overflow Vulnerability
16678| [800281] SQLiteManager Cross-Site Scripting Vulnerability
16679| [800280] Sqlitemanager Version Detection
16680| [800220] FoxMail Client Buffer Overflow vulnerability
16681| [800193] IBM Rational Quality Manager and Rational Test Lab Manager Tomcat Default Account Vulnerability
16682| [800121] Google Chrome Web Browser FTP Client XSS Vulnerability
16683| [800043] Firefox Web Browser FTP Client XSS Vulnerability (Linux)
16684| [800042] Firefox Web Browser FTP Client XSS Vulnerability (Win)
16685| [800034] HP Systems Insight Manager Unauthorized Access Vulnerability (Linux)
16686| [800033] HP Systems Insight Manager Unauthorized Access Vulnerability (Win)
16687| [103500] SoftPerfect Bandwidth Manager Authentication Bypass Vulnerability
16688| [103477] Mega File Manager 'name' Parameter Directory Traversal Vulnerability
16689| [103454] VMSA-2011-0003.2 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
16690| [103452] VMSA-2011-0009.3 VMware hosted product updates, ESX patches and VI Client update resolve multiple security issues
16691| [103451] VMSA-2011-0013.2 VMware third party component updates for VMware vCenter Server, vSphere Update Manager, ESXi and ESX
16692| [103436] Collaborative Passwords Manager (cPassMan) Remote Command Execution
16693| [103420] Sonexis ConferenceManager Multiple Information Disclosure and Security Bypass Vulnerabilities
16694| [103401] EPractize Labs Subscription Manager 'showImg.php' PHP Code Injection Vulnerability
16695| [103364] HP OpenView Network Node Manager Multiple Remote Code Execution Vulnerabilities
16696| [103334] Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability
16697| [103308] Joomla NoNumber! Extension Manager Plugin Local File Include and PHP code Injection Vulnerabilities
16698| [103216] OTRS 'AdminPackageManager.pm' Local File Disclosure Vulnerability
16699| [103182] Trend Micro Data Loss Prevention Directory Traversal Vulnerability
16700| [103181] Trend Micro Data Loss Prevention Detection
16701| [103159] LDAP Account Manager 'selfserviceSaveOk' Parameter Cross Site Scripting Vulnerability
16702| [103158] LDAP Account Manager Detection
16703| [103116] HP Power Manager Unspecified Cross Site Scripting Vulnerability
16704| [103026] HP OpenView Network Node Manager Multiple Remote Code Execution Vulnerabilities
16705| [102006] CISCO IDS Manager Detection
16706| [100876] Symantec IM Manager Multiple SQL Injection Vulnerabilities
16707| [100873] HP Systems Insight Manager Arbitrary File Download Vulnerability
16708| [100835] Novell iManager 'getMultiPartParameters()' Arbitrary File Upload Vulnerability
16709| [100828] Collaborative Passwords Manager (cPassMan) Multiple Local File Include Vulnerabilities
16710| [100786] HP OpenView Network Node Manager 'execvp_nc()' Code Execution Vulnerability
16711| [100724] Horde Turba Contact Manager '/imp/test.php' Cross Site Scripting Vulnerability
16712| [100692] Novell iManager < 2.7.4 Multiple Vulnerabilities
16713| [100661] osCommerce Online Merchant 'file_manager.php' Remote Arbitrary File Upload Vulnerability
16714| [100622] RealVNC 4.1.3 'ClientCutText' Message Remote Denial of Service Vulnerability
16715| [100499] Samba 'client/mount.cifs.c' Remote Denial of Service Vulnerability
16716| [100494] Oracle WebLogic Server Node Manager 'beasvc.exe' Remote Command Execution Vulnerability
16717| [100487] ejabberd 'client2server' Message Remote Denial of Service Vulnerability
16718| [100457] HP Power Manager Multiple Remote Code Execution Vulnerabilities
16719| [100456] HP Power Manager Detection
16720| [100452] Zeus Web Server 'SSL2_CLIENT_HELLO' Remote Buffer Overflow Vulnerability
16721| [100435] Novell iManager Importing/Exporting Schema Stack Buffer Overflow Vulnerability
16722| [100357] Cisco VPN Client for Windows 'StartServiceCtrlDispatche' Local Denial of Service Vulnerability
16723| [100350] HP Power Manager Management default credentials
16724| [100346] HP Power Manager Management Web Server Login Remote Code Execution Vulnerability
16725| [100332] Serv-U Web Client HTTP Request Remote Buffer Overflow Vulnerability
16726| [100037] Ocean12 Membership Manager Pro 'login.asp' SQL Injection Vulnerability
16727| [100006] A4Desk Event Calendar 'eventid' Parameter SQL Injection Vulnerability
16728| [96204] Get Windows Eventlog Entries over WMI
16729| [90020] Windows vulnerability in DNS Client Could Allow Spoofing (945553)
16730| [80074] Multiple Remote Vulnerabilities in myEvent
16731| [80061] F-Secure Policy Manager Server fsmsh.dll module DoS
16732| [80054] Directory Manager's edit_image.php
16733| [80044] SonicWall Global VPN Client Detection
16734| [80037] Cisco VPN Client Version Detection
16735| [71164] FreeBSD Ports: postgresql-client
16736| [70781] Gentoo Security Advisory GLSA 201110-18 (rgmanager)
16737| [70253] FreeBSD Ports: apache, apache-event, apache-itk, apache-peruser, apache-worker
16738| [69601] FreeBSD Ports: isc-dhcp31-client
16739| [69010] Gentoo Security Advisory GLSA 201006-07 (silc-toolkit silc-client)
16740| [67507] FreeBSD Security Advisory (FreeBSD-SA-10:06.nfsclient.asc)
16741| [66611] FreeBSD Ports: postgresql-client, postgresql-server
16742| [66593] Debian Security Advisory DSA 1955-1 (network-manager/network-manager-applet)
16743| [66333] Gentoo Security Advisory GLSA 200911-03 (c-client uw-imap)
16744| [65896] SLES10: Security update for the OpenLDAP client
16745| [65847] SLES10: Security update for NetworkManager-gnome
16746| [65828] SLES10: Security update for NetworkManager
16747| [65774] SLES10: Security update for knetworkmanager
16748| [65772] SLES10: Security update for dhclient
16749| [65690] SLES11: Security update for dhcp-client
16750| [65652] SLES11: Security update for NetworkManager
16751| [65601] SLES9: Security update for openldap2-client,openldap2-devel
16752| [65322] SLES9: Security update for dhcp-client
16753| [65317] SLES9: Security update for openldap2-client
16754| [64937] CentOS Security Advisory CESA-2009:1339 (rgmanager)
16755| [64822] Debian Security Advisory DSA 1879-1 (silc-client/silc-toolkit)
16756| [64578] FreeBSD Ports: silc-client, silc-irssi-client
16757| [64499] Mandrake Security Advisory MDVSA-2009:166 (c-client)
16758| [64447] FreeBSD Ports: isc-dhcp31-client
16759| [64425] SuSE Security Advisory SUSE-SA:2009:037 (dhcp-client)
16760| [64056] CentOS Security Advisory CESA-2009:0362 (NetworkManager)
16761| [63930] Fedora Core 10 FEDORA-2009-3931 (prelude-manager)
16762| [63929] Fedora Core 9 FEDORA-2009-4044 (prelude-manager)
16763| [63820] CentOS Security Advisory CESA-2009:0361 (NetworkManager)
16764| [63611] SuSE Security Advisory SUSE-SA:2009:013 (dbus-1, hal, NetworkManager, PackageKit, ...)
16765| [63527] Fedora Core 10 FEDORA-2009-2419 (knetworkmanager)
16766| [63526] Fedora Core 9 FEDORA-2009-2420 (NetworkManager)
16767| [63507] Ubuntu USN-727-2 (network-manager)
16768| [63505] Ubuntu USN-727-1 (network-manager-applet)
16769| [63332] Fedora Core 10 FEDORA-2009-0587 (boinc-client)
16770| [63325] Fedora Core 9 FEDORA-2009-0578 (boinc-client)
16771| [61699] FreeBSD Ports: mysql-client
16772| [60871] Gentoo Security Advisory GLSA 200804-27 (silc-toolkit silc-client silc-server)
16773| [60631] FreeBSD Ports: silc-irssi-client, silc-client
16774| [60570] Debian Security Advisory DSA 1518-1 (backup-manager)
16775| [58338] Debian Security Advisory DSA 1287-1 (ldap-account-manager (0.4.9-2sarge1))
16776| [55538] Slackware Advisory SSA:2005-278-01 Thunderbird email client
16777| [55167] Debian Security Advisory DSA 787-1 (backup manager)
16778| [54459] Slackware Advisory SSA:2005-210-01 telnet client
16779| [54209] FreeBSD Ports: nwclient
16780| [52459] FreeBSD Ports: mysql-client
16781| [52442] FreeBSD Ports: xorg-clients
16782| [52375] FreeBSD Ports: mysql-server, mysql-client
16783| [25550] Cisco VPN Client Privilege Escalation Vulnerability
16784| [20388] Juniper NetScreen-Security Manager Remote DoS flaw
16785| [19507] TFTP file detection (Cisco CallManager)
16786| [18591] Plaxo Client Is Installed
16787| [18219] Clearswift MIMEsweeper manager console detection
16788| [18192] YusASP Web Asset Manager Vulnerability
16789| [17585] ISS deployment manager detection
16790| [16093] MySQL Eventum Multiple flaws
16791| [15937] PunBB IMG Tag Client Side Scripting XSS
16792| [14668] Mozilla/Firefox security manager certificate handling DoS
16793| [14597] WS_FTP client weak stored password
16794| [13839] eSeSIX Thintune Thin Client Multiple Vulnerabilities
16795| [13752] Denial of Service (DoS) in Microsoft SMS Client
16796| [12242] File Disclosure in osCommerce's File Manager
16797| [12122] Novell Groupwise Servlet Manager default password
16798| [11762] StoneGate client authentication detection
16799| [11747] Trend Micro Emanager software check
16800| [11343] OpenSSH Client Unauthorized Remote Forwarding
16801| [11091] Windows Network Manager Privilege Elevation (Q326886)
16802| [10891] X Display Manager Control Protocol (XDMCP)
16803| [10851] Oracle 9iAS Java Process Manager
16804| [10837] FAQManager Arbitrary File Reading Vulnerability
16805| [10819] PIX Firewall Manager Directory Traversal
16806| [10751] Kazaa / Morpheus Client Detection
16807| [10745] WorldClient for MDaemon Server Detection
16808| [10528] Nortel Networks passwordless router (manager level)
16809| [10462] Amanda client version
16810| [10441] AFS client version
16811| [10102] HotSync Manager Denial of Service attack
16812|
16813| SecurityTracker - https://www.securitytracker.com:
16814| [1026894] Novell iManager JClient Buffer Overflow Lets Remote Authenticated Users Deny Service
16815| [1026032] IBM Tivoli Security Information and Event Manager Input Validation Flaw in Custom Reports Permits Cross-Site Scripting Attacks
16816| [1025741] IBM Tivoli Storage Manager Buffer Overflows in Journal Based Backup Clients Let Local Users Gain Elevated Privileges
16817| [1025522] RSA Data Loss Prevention Enterprise Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16818| [1024989] RSA Key Manager C Client Input Validation Flaw Lets Remote Users Inject SQL Commands
16819| [1023622] Symantec Client Security Event Management Flaw Lets Remote Users Bypass On-Demand Scanning
16820| [1023136] IBM Tivoli Storage Manager Client Buffer Overflows Let Remote Users Execute Arbitrary Code
16821| [1022704] EMC Replication Manager Client 'irccd.exe' Process Lets Remote Users Execute Arbitrary Code
16822| [1018858] HP OpenView Configuration Management (CM) Infrastructure (Radia) and Client Configuration Manager Lets Remote Users Access Data
16823| [1018774] NetSupport Manager Client Buffer Overflow Lets Remote Users Deny Service
16824| [1018732] NetSupport Manager Client Lets Remote Users Execute Commands
16825| [1018725] IBM Tivoli Storage Manager Bugs Let Remote Users Execute Arbitrary Code and Access Client Data
16826| [1017471] Novell Client NWGINA Bug May Prevent User Profiles from Being Deleted
16827| [1017197] HP OpenView Client Configuration Manager Lets Remote Users Reboot the System or Execute Arbitrary Code
16828| [1016895] Symantec Client Security SymEvent Driver Lets Local Users Deny Service
16829| [1016743] SSH Tectia Client/Server/Connector/Manager Pathname Parsing Flaw Lets Local Users Gain Elevated Privileges
16830| [1028880] Cisco Unified Communications Manager Discloses Stack Trace Information to Remote Users
16831| [1028879] Cisco Unified Communications Manager Web Page Flaw Permits Cross-Site Request Forgery Attacks
16832| [1028877] Cisco Unified Communications Manager User Web Dialer Flaw Permits Cross-Site Request Forgery Attacks
16833| [1028835] CA Service Desk Manager Query Parameter Input Validation Flaw Permits Cross-Site Scripting Attacks
16834| [1028827] Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information
16835| [1028825] Cisco Unified Operations Manager Input Validation Flaw Permits HTTP Header Injection Attacks
16836| [1028819] Cisco Unified Operations Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16837| [1028813] (IBM Issues Fix for IBM Content Manager Enterprise Edition) IBM Rational Directory Server Error Message Flaw Discloses Potentially Sensitive Information to Remote Users
16838| [1028812] (IBM Issues Fix for IBM Content Manager Enterprise Edition) IBM SPSS Data Collection Bugs in Eclipse Help System Permits Cross-Site Scripting Attacks and Discloses Source Code
16839| [1028806] Cisco Intrusion Prevention System Packet Processing Flaws Let Remote Users Deny Service
16840| [1028805] Cisco Unified Communications Manager Bugs Let Remote Users Inject SQL Commands and Local Users Gain Elevated Privileges
16841| [1028795] Oracle Enterprise Manager Bugs Let Remote Users Partially Modify Data
16842| [1028779] Novell GroupWise Client Input Validation Flaw Permits Cross-Site Scripting Attacks
16843| [1028773] HP Network Node Manager I (NNMi) Unspecified Flaw Lets Remote Users Gain Access
16844| [1028767] Cisco Unified Communications Domain Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16845| [1028765] Cisco Unified Operations Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16846| [1028764] Cisco Virtualization Experience Client Permissions Error Lets Local Users Gain Elevated Privileges
16847| [1028742] RSA Authentication Manager Lets Local Users View the Administrative Account Password
16848| [1028741] EMC Replication Manager Lets Local Users View Passwords to Gain Elevated Privileges
16849| [1028739] IBM Business Process Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16850| [1028735] Red Hat Enterprise Virtualization Manager Permission Check Flaw Lets Local Users Deny Service
16851| [1028727] Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks
16852| [1028697] HP Smart Zero Client Unspecified Flaw Lets Local Users Gain Unauthorized Access
16853| [1028683] Symantec Endpoint Protection Manager Buffer Overflow in 'Secars.dll' Lets Remote Users Execute Arbitrary Code
16854| [1028675] Cisco Video Surveillance Operations Manager Software Flaw Lets Remote Users Load Arbitrary HTML on the Target User's System
16855| [1028653] VMware vCenter Chargeback Manager File Upload Flaw Lets Remote Users Execute Arbitrary Code
16856| [1028644] HP Service Manager Input Validation Hole Permits Cross-Site Scripting and Information Disclosure Attacks
16857| [1028638] RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files
16858| [1028633] Cisco WebEx Meetings Server Discloses Event Passwords and Host Keys to Remote Users
16859| [1028600] Novell Client 'nicm.sys' and 'nwfs.sys' Lets Local Users Gain Elevated Privileges
16860| [1028594] NetIQ Access Manager Input Validation Flaw in 'Ecom_User_ID' Permits Cross-Site Scripting Attacks
16861| [1028590] X Window Client Library Protocol Handling Flaws Let Remote Authenticated or Local Users Gain Elevated Privileges
16862| [1028567] Cisco Unified Communications Manager Authentication Request Processing Lets Remote Users Deny Service
16863| [1028520] Red Hat Subscription Manager Certificate Validation Flaw Lets Remote Users Obtain Credentials
16864| [1028518] Cisco Unified Communications Manager Input Validation Flaw in CLI Lets Local Users Read Arbitrary Files
16865| [1028511] EMC Avamar Client Certificate Validation Flaw Lets Remote Users Spoof the System
16866| [1028506] Novell iPrint Client Stack Overflow Lets Remote Users Execute Arbitrary Code
16867| [1028504] IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets
16868| [1028501] FortiClient VPN Client Discloses Password to Remote Users in Certain Cases
16869| [1028496] HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
16870| [1028485] Cisco Intrusion Prevention System Regex Processing Flaw Lets Remote Authenticated Users Deny Service
16871| [1028484] Cisco Unified Communications Domain Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16872| [1028467] Cisco Device Manager JNLP Input Validation Flaw Lets Remote Users Execute Arbitrary Code
16873| [1028425] Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges
16874| [1028424] Novell iManager Tomcat Bug Permits Cross-Site Request Forgery Attacks
16875| [1028407] Windows Client-Server Run-time Subsystem Lets Local Users Gain Elevated Privileges
16876| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
16877| [1028396] IBM Tivoli Federated Identity Manager Business Gateway Input Validation Flaw in Macros Permits Cross-Site Scripting Attacks
16878| [1028392] Cisco Tivoli Business Service Manager Bug Lets Remote Users Deny Service
16879| [1028388] Xen Event Channel Tracking Pointer Bug Local Privilege Escalation
16880| [1028342] EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control
16881| [1028334] IBM Tivoli Endpoint Manager Input Validation Hole in Web Reports Permits Cross-Site Scripting Attacks
16882| [1028333] IBM Rational ClearQuest Input Validation Hole in Web Client Permits Cross-Site Scripting Attacks
16883| [1028311] McAfee Vulnerability Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16884| [1028310] Oracle Automated Service Manager Unsafe Temporary Files Let Local Users Modify Files on the Target System.
16885| [1028284] Novell Identity Manager Roles Based Provisioning Module Flaw with Reporting Manager Has Unspecified Impact
16886| [1028218] Cisco Unified Communications Manager Resource Exhaustion Flaws Let Remote Users Deny Service
16887| [1028151] Cisco Application Networking Manager Command Line Interface Flaw Lets Local Users Gain Root Privileges
16888| [1028127] Windows Client-Server Run-time Subsystem Lets Local Users Gain Elevated Privileges
16889| [1028098] Cisco Unified Communications Domain Manager Parameter Input Validation Flaw Permits Cross-Site Scripting Attacks
16890| [1028076] Red Hat Enterprise Virtualization Manager Lets Local Users Obtain Passwords and Remote Authenticated Users Deny Service
16891| [1028070] Oracle Automated Service Manager Lets Local Users Gain Elevated Privileges
16892| [1028069] HP Network Node Manager i (NNMi) Input Validation Flaw Permits Cross-Site Scripting Attacks
16893| [1028066] VMware vSphere Client Authentication Protocol Implementation Flaw Lets Remote Users Execute Arbitrary Code
16894| [1028061] Novell GroupWise Client Lets Remote Users Execute Arbitrary Code
16895| [1028015] Cisco VPN Client Driver Bug Lets Local Users Deny Service
16896| [1028011] IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes
16897| [1027998] Oracle Enterprise Manager Grid Control Multiple Bugs Let Remote Users Partially Access and Modify Data and Cause Partial Denial of Service Conditions
16898| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
16899| [1027928] cPanel Input Validation Flaws in 'clientconf.html' and 'detailbw.html' Permit Cross-Site Scripting Attacks
16900| [1027919] Novell iPrint Unspecified 'op-client-interface-version' Flaw Lets Remote Users Execute Arbitrary Code
16901| [1027909] Novell NetIQ Privileged User Manager Bug Lets Remote Users Change the Administrative Password
16902| [1027902] IBM Tivoli Storage Manager for Space Management Lets Local Users Gain Elevated Privileges
16903| [1027901] IBM Tivoli Storage Manager for Space Management Lets Remote Users Access and Modify Files
16904| [1027888] IBM Rational ClearQuest Input Validation Flaw in Web Client Lets Remote Users Inject SQL Commands
16905| [1027874] Symantec Enterprise Security Manager Unquoted Search Path Lets Local Users Gain Elevated Privileges
16906| [1027848] IBM eDiscovery Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16907| [1027843] HP Network Node Manager i Bug Lets Remote Users Gain Access
16908| [1027838] Red Hat Enterprise Virtualization Manager Bugs Let Local Users Gain Elevated Privileges and Remote Authenticated Users Access Data
16909| [1027834] Apache Tomcat Bug Lets Remote Users Bypass Cross-Site Request Forgery Prevention Filter
16910| [1027812] EMC Smarts Network Configuration Manager Lets Local Users Gain Elevated Privileges
16911| [1027789] IBM Business Process Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16912| [1027781] RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions
16913| [1027712] Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands
16914| [1027705] EMC Avamar Client for VMware Discloses Server Password to Local Users
16915| [1027681] IBM AIX FTP Client Lets Remote Authenticated Users Access Restricted Files
16916| [1027677] Sun SPARC Server Bug in Integrated Lights Out Manager Lets Local Users Access Data
16917| [1027661] Red Hat Network Configuration Client Discloses Potentially Sensitive Information to Local Users
16918| [1027605] HP Network Node Manager i Discloses Potentially Sensitive Information to Remote Users
16919| [1027603] Novell Sentinel Log Manager Bug Lets Remote Users Modify Retention Policy
16920| [1027584] Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands
16921| [1027580] Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service
16922| [1027574] Cisco Unified Communications Manager SIP Processing Flaw Lets Remote Users Deny Service
16923| [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
16924| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16925| [1027509] FreeRADIUS Client Certificate Stack Overflow Lets Remote Users Execute Arbitrary Code
16926| [1027486] IBM Tivoli Federated Identity Manager LTPA Token Management Flaw Lets Remote Authenticated Users Gain Elevated Privileges
16927| [1027447] Oracle Java setSecurityManager() Flaw Lets Remote Users Execute Arbitrary Code
16928| [1027399] HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
16929| [1027397] HP Service Manager Unspecified Flaw Lets Remote Users Deny Service
16930| [1027354] Cisco AnyConnect Secure Mobility Client Bugs Let Remote Users Spoof Servers
16931| [1027345] HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks
16932| [1027343] Novell Remote Manager Off-by-one Error in 'httpstkd' Lets Remote Users Deny Service
16933| [1027306] IBM WebSphere MQ Bug Lets Remote Users Access the Queue Manager
16934| [1027299] ISC DHCP Client Identifier Infinite Loop Lets Remote Users Deny Service
16935| [1027298] ISC DHCP Client Identifier Buffer Overflow Lets Remote Users Deny Service
16936| [1027275] SPARC T-Series Sun Integrated Lights-Out Manager Lets Local Users Access and Modify Data and Deny Service
16937| [1027247] RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks
16938| [1027246] HP AssetManager Input Validation Flaw Permits Cross-Site Scripting Attacks
16939| [1027241] Cisco TelePresence Manager and Multipoint Switch Bugs Lets Remote Users Deny Service and Remote Users on the Adjacent Network Execute Arbitrary Code
16940| [1027220] RSA Access Manager Session Replay Flaw Lets Remote Users Access the System
16941| [1027215] HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks
16942| [1027194] IBM System Storage Input Validation Flaws in Manager Profiler Permit Cross-Site Scripting and SQL Injection Attacks
16943| [1027189] Cisco AnyConnect Secure Mobility Client Software Update Bugs Let Remote Users Execute Arbitrary Code
16944| [1027134] IBM WebSphere Sensor Events Input Validation Flaws Permit Cross-Site Scripting Attacks
16945| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
16946| [1026987] HP Systems Insight Manager Multiple Flaws Let Remote Users Gain Access and Local Users Obtain Information
16947| [1026961] Asterisk Manager Interface Lets Remote Authenticated Users Execute Shell Commands
16948| [1026886] Wonderware Historian Client Bugs Permit Cross-Site Scripting, SQL Injection, and Denial of Service Attacks
16949| [1026882] RPM Package Manager Header Processing and Signature Validation Bugs Let Remote Users Execute Arbitrary Code
16950| [1026872] Novell iManager Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks
16951| [1026869] HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Code
16952| [1026848] Red Hat Enterprise Virtualization Manager XML External Entity Processing Lets Remote Users Obtain Potentially Sensitive Information
16953| [1026817] VMware vSphere Client Input Validation Flaw Permits Script Injection Attacks
16954| [1026815] VMware vShield Manager Permits Cross-Site Request Attacks
16955| [1026813] Asterisk Stack Overflow in HTTP Manager Lets Remote Users Execute Arbitrary Code
16956| [1026799] Cisco ASA Clientless VPN ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
16957| [1026778] VMware vCenter Chargeback Manager Lets Remote Users Deny Service and Download Files
16958| [1026753] Novell GroupWise Client Address Book Buffer Overflow Lets Remote Users Execute Arbitrary Code
16959| [1026749] Cisco Unified Communications Manager Lets Remote Users Deny Service and Inject SQL Commands
16960| [1026718] Novell GroupWise Messenger Client Stack Overflow Lets Remote Users Execute Arbitrary Code
16961| [1026638] HP Operations Manager Unspecified Bug Lets Remote Users Execute Arbitrary Code
16962| [1026541] Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges
16963| [1026495] Windows Client-Server Run-time Subsystem Unicode Processing Flaw Lets Local Users Gain Elevated Privileges
16964| [1026437] Novell Sentinel Log Manager Directory Traversal Flaw Lets Remote Authenticated Users View Files
16965| [1026434] Novell Access Manager Lets Remote Users Decrypt SSL/TLS Traffic
16966| [1026427] Hitachi JP1/ServerConductor/Deployment Manager Directory Traversal Flaw Lets Remote Users Obtain Files
16967| [1026417] Windows Client-Server Run-time Subsystem Lets Local Users Gain Elevated Privileges
16968| [1026390] Trend Micro Control Manager Buffer Overflow in 'CmdProcessor.exe' Lets Remote Users Execute Arbitrary Code
16969| [1026367] HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code
16970| [1026354] Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code
16971| [1026341] VMware vCenter Update Manager Directory Traversal Flaw in Jetty Component Lets Remote Users View Files
16972| [1026340] Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code
16973| [1026331] HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges
16974| [1026309] HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks
16975| [1026286] IBM Rational Asset Manager Access Control Error Lets Remote Authenticated Users
16976| [1026285] IBM Rational Asset Manager Input Validation Hole Permits Cross-Site Scripting Attacks
16977| [1026276] RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions
16978| [1026275] Citrix XenDesktop Lets Remote Authenticated Users Bypass Client Drive Mapping Restrictions
16979| [1026260] HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code
16980| [1026243] Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files
16981| [1026221] Sun Integrated Lights-Out Manager Lets Local Users Partially Access Data
16982| [1026157] Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service
16983| [1026142] Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information
16984| [1026138] Novell Identity Manager Roles Based Provisioning Module Input Validation Flaw in 'apwaDetailId' Permits Cross-Site Scripting Attacks
16985| [1026134] RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code
16986| [1026130] Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks
16987| [1026110] Cisco Unified Communications Manager SIP Processing Memory Leak Lets Remote Users Interrupt Voice Services
16988| [1026097] GNOME NetworkManager Input Validation Flaw in ifcfg-rh Plugin Lets Local Users Gain Elevated Privileges
16989| [1026046] Cisco Unified Operations Manager Flaw Lets Remote Users Execute Arbitrary Code
16990| [1026006] Novell Cloud Manager RPC Processing Error Lets Remote Users Execute Arbitrary Code
16991| [1025971] Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents
16992| [1025970] Cisco Unified Communications Manager Flaws Let Remote Users Deny Service
16993| [1025952] FlexNet License Server Manager Directory Traversal and File Renaming Bugs Let Remote Users Execute Arbitrary Code
16994| [1025936] Linux Kernel Event Overflow Monitoring Bug Lets Local Users Deny Service
16995| [1025919] Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks
16996| [1025915] HP ProLiant SL Advanced Power Manager Lets Remote Users Deny Service
16997| [1025906] Check Point Endpoint Security On-Demand Client Lets Remote Users Execute Arbitrary Code
16998| [1025899] Windows Client-Server Run-time Subsystem 'Winsrv.dll' Lets Local Users Gain Elevated Privileges
16999| [1025885] Windows Client-Server Run-time Subsystem SrvGetConsoleTitle() Flaw Lets Local Users Deny Service
17000| [1025863] FlexNet License Server Manager Buffer Overflow in 'lmadmin' Lets Remote Users Execute Arbitrary Code
17001| [1025806] Sun Integrated Lights-Out Manager Lets Remote Users Gain Root Access and Local Users Partially Access Data
17002| [1025800] Oracle Enterprise Manager Grid Control Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
17003| [1025790] EMC Documentum eRoom Indexing Server HummingBird Client Connector Buffer Overflow Lets Remote Users Execute Arbitrary Code
17004| [1025774] Trend Micro Control Manager 'proxy_request.php' Input Validation Flaw Lets Remote Users Traverse the Directory
17005| [1025762] Windows Client-Server Run-time Subsystem Bugs Let Local Users Gain Elevated Privileges
17006| [1025759] Trend Micro Control Manager 'CasLogDirectInsertHandler.cs' Lets Remote Users Create Accounts and Execute Arbitrary Code
17007| [1025747] Cisco VPN Client Unsafe Permissions Lets Local Users Gain Elevated Privileges
17008| [1025711] GNOME NetworkManager Lets Local Users Bypass PolicyKit Settings
17009| [1025669] Trend Micro Control Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
17010| [1025664] Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory
17011| [1025611] HP Service Manager Multiple Bugs Let Remote Authenticated Users Gain Access and Inject Scripting Code, Remote Users Conduct Cross-Site Scripting Attacks, Hijack Sessions, and Obtain Information
17012| [1025602] VMware VI Client ActiveX Control Lets Remote Users Execute Arbitrary Code
17013| [1025596] Symantec Data Loss Prevention Buffer Overflow in KeyView Filter Lets Remote Users Deny Service
17014| [1025591] Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges
17015| [1025544] MDaemon Input Validation Flaw in WorldClient LookOut Theme Summary View Permits Cross-Site Scripting Attacks
17016| [1025543] Cisco Unified Operations Manager Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks
17017| [1025540] IBM Informix Storage Manager 'librpc.dll' Spoofing Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
17018| [1025520] HP Network Node Manager i (NNMi) Lets Local Users Read and Write Data
17019| [1025449] Cisco Unified Communications Manager Multiple Bugs Let Remote Users Deny Service, Inject SQL Commands, and Upload Arbitrary Files
17020| [1025446] Trustwave WebDefend Enterprise Manager Appliance Lets Remote Authenticated 'bgoperator' Users Gain Root Privileges
17021| [1025433] Asterisk Manager Security Check Bypass Lets Remote Authenticated Users Gain Elevated Privileges
17022| [1025415] HP Systems Insight Manager Input Validation Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks
17023| [1025411] Sun Java System Access Manager Policy Agent Bug Let Remote Users Partially Deny Service
17024| [1025408] Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data
17025| [1025386] HP Network Node Manager i (NNMi) Lets Remote Authenticated Users Gain Elevated Access to the Target System
17026| [1025356] BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks
17027| [1025354] HP Network Node Manager i Lets Local Users Access Files and Input Validation Hole Permits Cross-Site Scripting Attacks
17028| [1025300] ISC DHCP Meta-Character Filtering Flaw in dhclient Lets Remote Users Execute Arbitrary Code
17029| [1025288] HP Network Node Manager i Bug Lets Remote Authenticated Users Obtain Information
17030| [1025264] GNOME Display Manager Cache Directory Symlink Flaw Lets Local Users Gain Elevated Privileges
17031| [1025223] Asterisk Manager Interface Bug Lets Remote Users Consume Excessive Resources
17032| [1025214] RSA Access Manager Flaw Lets Remote Users Access Protected Resources
17033| [1025205] HP Client Automation Enterprise Unspecified Configuration Flaw Lets Remote Users Execute Arbitrary Code
17034| [1025172] Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code
17035| [1025124] F-Secure Policy Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17036| [1025111] Cisco TelePresence Manager Bugs Let Remote Users Invoke SOAP Methods, Inject Arbitrary Commands, and Execute Arbitrary Code
17037| [1025077] Eventum Input Validation Holes Permit Cross-Site Scripting Attacks
17038| [1025052] CA Secure Content Manager Heap Overflow in 'ECSQdmn.exe' Lets Remote Users Execute Arbitrary Code
17039| [1025050] OpenSSL ClientHello Parsing Flaw Lets Remote Users Deny Service
17040| [1025045] Windows Client-Server Run-time Subsystem Lets Local Users Gain Elevated Privileges
17041| [1025032] HP Power Manager Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks
17042| [1025026] Apache Tomcat Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17043| [1025025] Apache Tomcat Security Manager Lets Local Users Bypass File Permissions
17044| [1024979] Oracle Enterprise Manager Bug Lets Remote Users Partially Access and Modify Data
17045| [1024951] HP OpenView Network Node Manager Multiple Bugs Let Remote Users Execute Arbitrary Code
17046| [1024948] Windows Backup Manager May Load DLLs Unsafely and Remotely Execute Arbitrary Code
17047| [1024943] NetSupport Manager Agent Stack Overflow Lets Remote Users Execute Arbitrary Code
17048| [1024942] TIBCO Collaborative Information Manager Flaws Permit Cross-Site Scripting, SQL Injection, and Session Hijacking Attacks
17049| [1024941] Novell Identity Manager Input Validation Flaw in Approval Form Permits Cross-Site Scripting Attacks
17050| [1024927] IBM Tivoli Access Manager for e-Business Lets Remote Users Traverse the Directory
17051| [1024902] HP Power Manager Unspecified Flaw Lets Remote Users Execute Arbitrary Code
17052| [1024901] IBM Tivoli Storage Manager Lets Local Users Gain Elevated Privileges
17053| [1024890] SAP NetWeaver Business Client Buffer Overflow in 'sapwdpcd.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
17054| [1024825] Red Hat Enterprise Virtualization Manager Race Condition Lets Local Users Gain Elevated Privileges
17055| [1024764] Apache Tomcat Manager Input Validation Hole in 'sessionList.jsp' Permits Cross-Site Scripting Attacks
17056| [1024759] Novell iPrint Client 'server-address' Flaw Lets Remote Users Execute Arbitrary Code
17057| [1024694] Cisco Unified Communications Manager setuid Binary Lets Local Users Gain Root Privileges
17058| [1024648] Symantec IM Manager Input Validation Flaws Let Remote Users Inject SQL Commands
17059| [1024644] HP Version Control Repository Manager Hole Permits Cross-Site Scripting Attacks
17060| [1024633] IBM Tivoli Access Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
17061| [1024631] HP Virtual Connect Enterprise Manager Discloses Files to Remote Users
17062| [1024622] HP System Insight Manager Flaws Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Conduct Cross-Site Scripting and Cross-Site Request Forgery Attacks
17063| [1024621] HP Systems Insight Manager Flaws Let Remote Users Modify Data, Deny Service, or Execute Arbitrary Code on the Target System
17064| [1024615] HP AssetManager and HP AssetCenter Input Validation Hole Permits Cross-Site Scripting Attacks
17065| [1024601] IBM Rational Quality Manager Default Administrative Account Lets Remote Users Execute Arbitrary Code
17066| [1024575] HP Systems Insight Manager Bug Lets Remote Users View Files
17067| [1024569] Oracle WebLogic Node Manager Remote Configuration Capability Lets Remote Users Execute Arbitrary Commands
17068| [1024561] Oracle Enterprise Manager Grid Control EM Console Flaw Lets Remote Users Partially Obtain and Modify Data and Cause Partial Denial of Service Conditions
17069| [1024539] IBM Tivoli Provisioning Manager for OS Deployment Input Validation Flaw in ODBC Gateway Lets Remote Users Inject SQL Commands
17070| [1024538] HP Data Protector Manager Null Pointer Dereference Lets Remote Users Deny Service
17071| [1024516] RSA Authentication Client Access Control Flaw Lets Local Users Extract Certain Key Material
17072| [1024497] Novell iManager Lets Remote Users Upload Arbitrary Files
17073| [1024493] IBM Tivoli Storage Manager Fastback Lets Remote Users Deny Service and Execute Arbitrary Code
17074| [1024480] HP OpenView Network Node Manager Unspecified Bug Lets Remote Users Deny Service
17075| [1024470] Cisco Unified Communications Manager SIP Processing Flaws Let Remote Users Interrupt Voice Services
17076| [1024444] Windows Client-Server Runtime Subsystem Lets Local Users Gain Elevated Privileges
17077| [1024423] IBM Records Manager Permits Cross-Site Scripting and Redirection Attacks
17078| [1024420] RSA Access Manager Server Unspecified Bug Lets Remote Users Bypass Security Restrictions
17079| [1024419] RSA Access Manager Agent Authentication Flaw Lets Remote Users Access Potentially Sensitive Information
17080| [1024394] Red Hat Package Manager (rpm) setuid/setgid Setting Errors When Upgrading Packages May Let Local Users Gain Elevated Privileges
17081| [1024373] Novell Identity Manager Lets Local Users Obtain Passwords
17082| [1024363] Cisco Unified Communications Manager SIP Processing Flaws Let Remote Users Interrupt Voice Services
17083| [1024347] Red Hat Virtual Desktop Server Manager (VDSM) SSL Connection Handling Flaw Lets Remote Users Deny Service
17084| [1024335] Cisco IOS TCP Connection Establishment Flaw Lets Remote Users Prevent TCP Connections to the Device
17085| [1024278] Citrix Online Plug-in and ICA Client Connection Flaw Lets Remote Users Execute Arbitrary Code
17086| [1024274] HP OpenView Network Node Manager Bug Lets Remote Users Execute Arbitrary Code
17087| [1024270] Novell iPrint Client Browser Plugin Bugs Let Remote Users Delete Files and Execute Arbitrary Code
17088| [1024263] Symantec Data Loss Prevention KeyView Filter Memory Corruption Errors Let Remote Users Deny Service
17089| [1024258] LVM2 Missing Authentication in Cluster Local Volume Manager Lets Local Users Manage Volumes in the Cluster
17090| [1024239] RSA Federated Identity Manager URL Redirection Flaw Lets Remote Users Bypass Security Controls
17091| [1024238] HP OpenView Network Node Manager Buffer Overflow in 'nnmrptconfig.exe' Lets Remote Users Execute Arbitrary Code
17092| [1024224] HP OpenView Network Node Manager Buffer Overflow in 'ov.dll' Lets Remote Users Execute Arbitary Code
17093| [1024198] Oracle Enterprise Manager Grid Control Console Flaw Lets Remote Users Modify Data
17094| [1024191] HP Client Automation Enterprise Infrastructure (Radia) Discloses Potentially Sensitive Information to Remote Users
17095| [1024181] HP Virtual Connect Enterprise Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17096| [1024171] Novell Identity Manager Input Validation Holes in Roles Based Provisioning Module Permit Cross-Site Scripting Attacks
17097| [1024167] Cisco Content Services Switch HTTP and ClientCert Headers Can Be Spoofed or Modified By Remote USers
17098| [1024152] Novell iManager Bugs Let Remote Users Deny Service and Remote Authenticated Users Execute Arbitrary Code
17099| [1024144] F-Secure Policy Manager Input Validation Bug Permits Cross-Site Scripting Attacks Via the Expect Header
17100| [1024137] Red Hat Virtual Desktop Server Manager Lets Local Users Obtain Potentially Sensitive Information From Deleted Virtual Machines
17101| [1024132] Novell Access Manager Directory Traversal Flaw Lets Remote Users Upload Arbitrary Files
17102| [1024093] ISC DHCP Zero Length Client ID Processing Error Lets Remote Users Deny Service
17103| [1024071] HP OpenView Network Node Manager 'jovgraph.exe' Lets Remote Users Execute Arbitrary Code
17104| [1024059] RSA Key Manager Input Validation Flaw Lets Remote Users Inject SQL Commands
17105| [1024049] Red Hat Network Client Tools Lets Local Users Obtain RHN Access Password
17106| [1024039] FreeBSD Parameter Validation Flaw in nfsclient Lets Local Users Gain Elevated Privileges
17107| [1023981] HP System Insight Manager Bug Lets Remote Users Access Data
17108| [1023976] HP OpenView Network Node Manager Unspecified Bugs Let Remote Users Execute Arbitrary Commands
17109| [1023933] Internet Download Manager Stack Overflow in Sending Certain Command Sequences Lets Remote Users Execute Arbitrary Code
17110| [1023927] HP System Insight Manager Flaws Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Conduct Cross-Site Scripting and Cross-Site Request Forgery Attacks
17111| [1023913] HP Virtual Machine Manager for Windows Lets Remote Authenticated Users Gain Elevated Privileges
17112| [1023908] Adobe Download Manager Buffer Overflow in 'gp.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
17113| [1023894] HP Operations Manager Unspecified Flaw Lets Remote Users Execute Arbitrary Code
17114| [1023883] KDE Display Manager Lets Local Users Gain Elevated Privileges
17115| [1023865] Sun Java System Access Manager Input Validation Holes Permit Cross-Site Scripting Attacks
17116| [1023847] Windows Server Message Block Client Message Processing Bugs Let Remote Users Execute Arbitrary Code
17117| [1023726] IBM DB2 Content Manager Web Services Single Sign-on Flaw Has Unspecified Impact
17118| [1023686] Symantec Data Loss Prevention Integer Overflow in KeyView Filter in Processing OLE Documents Lets Remote Users Execute Arbitrary Code
17119| [1023675] Novell iManager Stack Overflow in eDirectory Plugin Lets Remote Users Execute Arbitrary Code
17120| [1023671] Cisco Digital Media Manager Lets Remote Users Access the System and Remote Authenticated Users Modify the Configuration and View Passwords
17121| [1023670] Cisco Unified Communications Manager SIP/SCCP/CTI Processing Bugs Let Remote Users Deny Service
17122| [1023651] Adobe Download Manager Flaw Lets Remote Users Download and Install Arbitrary Software
17123| [1023648] CA eHealth Performance Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17124| [1023631] Symantec Client Security Buffer Overflow in SYMLTCOM.dll ActiveX Control Lets Remote Users Execute Arbitrary Code in Certain Limited Cases
17125| [1023625] Symantec Client Security Buffer Overflow in Client Proxy ActiveX Control Lets Remote Users Execute Arbitrary Code
17126| [1023624] Symantec AntiVirus Buffer Overflow in Client Proxy ActiveX Control Lets Remote Users Execute Arbitrary Code
17127| [1023623] Symantec Endpoint Protection Event Management Flaw Lets Remote Users Bypass On-Demand Scanning
17128| [1023621] Symantec AntiVirus Event Management Flaw Lets Remote Users Bypass On-Demand Scanning
17129| [1023603] GNOME NetworkManager nm-connection-editor D-Bus Interface Discloses Configuration Data to Local Users
17130| [1023602] GNOME NetworkManager Missing Certificate Validation Check Lets Remote Users Spoof Valid Networks
17131| [1023580] HP OpenView Network Node Manager Unspecified Bug Lets Remote Users Execute Arbitrary Commands
17132| [1023569] Windows Client-Server Run-time Subsystem Process Termination Flaw Lets Local Users Gain Elevated Privileges
17133| [1023559] Windows Server Message Block Client Validation and Race Condition Flaws Let Remote Users Execute Arbitrary Code
17134| [1023545] OpenSolaris Flaw in kclient and smbadm When Joining a Windows Domain Has Unspecified Impact
17135| [1023508] NetSupport Manager Flaw in Gateway Component Lets Remote Users Deny Service
17136| [1023502] Oracle WebLogic Node Manager Lets Remote Users Execute Commands
17137| [1023470] HP Power Manager Username and Password Buffer Overflow Lets Remote Users Execute Arbitrary Code
17138| [1023447] Sun Java System Identity Manager Flaw Grants Remote Users Administrative Access
17139| [1023396] F5 Data Manager Directory Traversal Flaw Discloses Files to Remote Authenticated Administrators
17140| [1023328] VMware Server, Lab Manager, and vCenter Input Validation Flaw in WebWorks Help Permits Cross-Site Scripting Attacks
17141| [1023321] Sun Ray Server Software Authentication Manager Flaw Lets Remote Users Execute Arbitrary Code
17142| [1023317] HP OpenView Network Node Manager Multiple Flaws Let Remote Users Execute Arbitrary Code
17143| [1023312] Symantec Veritas NetBackup Manager Input Validation Flaw in VRTSweb Component Lets Remote Users Execute Arbitrary Code
17144| [1023290] Novell iPrint Client Buffer Overflow in Parsing Date-Time Values Lets Remote Users Execute Arbitrary Code
17145| [1023289] Novell iPrint Client Buffer Overflow in 'target-frame' Parameter Lets Remote Users Execute Arbitrary Code
17146| [1023288] HP OpenView Data Protector Application Recovery Manager MSG_PROTOCOL Stack Overflow Lets Remote Users Execute Arbitrary Code
17147| [1023271] Cisco Application Networking Manager Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
17148| [1023255] Cisco ASA Clientless SSL VPN Feature Lets Remote Users Bypass Web Browser Same-Origin Policy Restrictions
17149| [1023222] HP Operations Manager Hidden Account Lets Remote Users Access the System
17150| [1023221] Cisco VPN Client StartServiceCtrlDispatcher() Function Lets Local Users Deny Service
17151| [1023220] MySQL Client Fails to Check Server Certificates in Certain Cases
17152| [1023213] Cisco Digital Media Media Player and Digital Media Manager Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
17153| [1023191] HP OpenView Network Node Manager Bugs in Database Service Let Remote Users Execute Arbitrary Code
17154| [1023172] McAfee IntruShield Network Security Manager Permits Session Hijacking Attacks
17155| [1023140] HP Power Manager Stack Overflow Lets Remote Users Execute Arbitrary Code
17156| [1023137] BlackBerry Desktop Manager Flaw in Lotus Notes Intellisync DLL Lets Remote Users Execute Arbitrary Code
17157| [1023127] Solaris Trusted Extensions May Prevent XScreenSaver Screen From Locking
17158| [1023016] Skype Unspecified Flaw in Extras Manager Has Unspecified Impact
17159| [1022985] IBM Informix Client SDK Integer Overflow in Processing '.nfx' Files Lets Remote Users Execute Arbitrary Code
17160| [1022970] IBM Tivoli Composite Application Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17161| [1022932] Cisco Unified Communications Manager Express Buffer Overflow Lets Remote Users Execute Arbitrary Code
17162| [1022931] Cisco Unified Communications Manager SIP Processing Bug Lets Remote Users Deny Service
17163| [1022915] HP ProCurve Identity Driven Manager Lets Local Users Gain Elevated Privileges
17164| [1022837] IBM Tivoli Identity Manager Input Validation Flaw in SSUI Permits Cross-Site Scripting Attacks
17165| [1022830] Akamai Download Manager Unspecified Flaw Has Unspecified Impact
17166| [1022810] GNOME Display Manager on Red Hat Does Not Include tcp_wrappers
17167| [1022783] Symantec Client Security E-mail Processing Flaw Lets Remote Users Deny Service
17168| [1022775] Cisco Unified Communications Manager SIP and SCCP Processing Bugs Let Remote Users Deny Service
17169| [1022772] Symantec Data Loss Prevention Buffer Overflow in Autonomy KeyView Module Lets Remote Users Execute Arbitrary Code
17170| [1022744] CA Host-Based Intrusion Prevention System 'kmxIds.sys' Driver Bug Lets Remote Users Deny Service
17171| [1022731] SAP NetWeaver Input Validation Flaw in UDDI Client Permits Cross-Site Scripting Attacks
17172| [1022676] Sun Java System Access Manager Flaw in CDCServlet Component May Let Remote Users Obtain Other User Data
17173| [1022675] Sun Java System Access Manager Discloses Passwords to Local Users
17174| [1022670] IBM Tivoli Key Lifecycle Manager Default Password Lets Remote Users Gain Administrative Access
17175| [1022654] Palm webOS E-mail Notification and Calendar Event Filtering Flaws Let Remote Users Execute Arbitrary HTML Code
17176| [1022598] Sun Java System Access Manager Policy Agent Bug Lets Remote Users Deny Service to the Web Proxy Server
17177| [1022597] IBM Tivoli Identity Manager Console and Self Service Interface Session Fixation Bug Lets Remote Users Hijack Sessions
17178| [1022592] Akamai Download Manager Stack Overflow in Processing HTTP Responses Lets Remote Users Execute Arbitrary Code
17179| [1022584] Novell Privileged User Manager 'unifid.exe' Service Bug Lets Remote Users Execute Arbitrary Code
17180| [1022581] Novell Access Manager Administration Console Lets Remote Autheticated Users Access System Files
17181| [1022563] Oracle Complex Event Processing Bug Lets Remote Users Access Data
17182| [1022548] DHCP dhclient Stack Overflow in script_write_params() Lets Remote Users Execute Arbitrary Code
17183| [1022537] Wyse Device Manager Buffer Overflow in WDM Server and WDM Agent Lets Remote Users Execute Arbitrary Code
17184| [1022508] IBM Tivoli Identity Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
17185| [1022483] Sun Java System Access Manager Input Validation Hole in Cross-Domain Controller Permits Cross-Site Scripting Attacks
17186| [1022441] Samba smbclient Format String Bug May Let Users Execute Arbitrary Code
17187| [1022422] Solaris Event Port API Race Condition Lets Local Users Deny Service
17188| [1022413] McAfee ePolicy Orchestrator 'naPolicyManager.dll' ActiveX Control Lets Remote Overwrite Files
17189| [1022410] Irssi Underflow in event_wallops() Lets Remote Users Deny Service
17190| [1022385] Mozilla Firefox Event Listener Null Document Owner Bug Lets Remote Users Execute Arbitrary Code with Chrome Privileges
17191| [1022360] HP OpenView Network Node Manager SNMP/MIB Bug Lets Remote Users Execute Arbitrary Code
17192| [1022338] IBM FileNet Content Manager Lets Remote Users Hijack Accounts in Certain Cases
17193| [1022298] Citrix Password Manager May Let Remote Authenticated Users Access Their Secondary Credentials
17194| [1022283] SonicWALL Global Security Client System Tray Icon Lets Local Users Gain Elevated Privileges
17195| [1022282] SonicWALL Global VPN Client Folder Permissions Lets Local Users Gain Elevated Privileges
17196| [1022281] SonicWALL Global VPN Client Format String Bug Lets Remote Users Execute Arbitrary Code
17197| [1022209] Mac OS X Bugs in CoreGraphics and QuickDraw Manager Let Remote Users Execute Arbitrary Code
17198| [1022163] HP OpenView Network Node Manager Bug Lets Remote Users Execute Arbitrary Code
17199| [1022137] Symantec Client Security Bug in Reporting Server Lets Remote Users Display Arbitrary Messages
17200| [1022131] Symantec Client Security Bugs in Alert Management System 2 Let Remote Users Execute Arbitrary Code
17201| [1022125] HP OpenView Network Node Manager Unspecified Bug Lets Remote Users Execute Arbitrary Code
17202| [1022122] Cisco ASA Input Validation Flaw in Clientless SSL VPN Feature Permits Cross-Site Scripting Attacks
17203| [1022109] Trend Micro OfficeScan Client Bug in Scanning Long Pathnames Lets Local Users Deny Service
17204| [1022030] Cisco Subscriber Edge Services Manager (SESM) Input Validation Hole Permits Cross-Site Scripting Attacks
17205| [1022022] HP ProCurve Manager Bug Lets Remote Users Access Data
17206| [1021990] Novell Client NetIdentity Agent Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
17207| [1021978] VMware VirtualCenter VI Client May Let Certain Local Users Obtain Passwords
17208| [1021966] FortiClient Format String Bug in VPN Connection Name Lets Local Users Gain Elevated Privileges
17209| [1021947] IBM Tivoli Storage Manager Lets Local Users Monitor Server Activities
17210| [1021946] IBM Tivoli Storage Manager Can Be Crashed By a Remote Port Scan
17211| [1021945] IBM Tivoli Storage Manager Administrative Command Line Bug Has Unspecified Impact
17212| [1021909] GNOME NetworkManager Lets Local Users Modify Network Configuration Settings.
17213| [1021908] GNOME NetworkManager Lets Local Users Obtain Passwords
17214| [1021891] HP-UX VERITAS File System and VERITAS Oracle Disk Manager Bug Lets Lets Local Users Gain Elevated Privileges
17215| [1021883] HP OpenView Network Node Manager Buffer Overflows Let Remote Users Execute Arbitrary Code
17216| [1021881] Sun Java System Identity Manager Bugs Let Local and Remote Users Gain Privileges
17217| [1021856] Symantec Data Loss Prevention Buffer Overflow in Autonomy KeyView Module Lets Remote Users Execute Arbitrary Code
17218| [1021839] Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Sends Passwords in Clear Text
17219| [1021837] IBM Tivoli Storage Manager Express Heap Overflow in 'adsmdll.dll' Lets Remote Users Execute Arbitrary Code
17220| [1021836] HP Systems Insight Manager WMI Mapper Bug Lets Remote Users Acess Data
17221| [1021835] HP Systems Insight Manager WMI Mapper Bug Lets Local Users Gain Elevated Privileges
17222| [1021820] IBM Tivoli Storage Manager HSM for Windows Buffer Overflow May Let Remote Users Execute Arbitrary Code
17223| [1021772] Cisco Application Networking Manager Java Agent Lets Remote Users Gain Elevated Privileges
17224| [1021771] Cisco Application Networking Manager Default Passwords Let Remote Users Access the System
17225| [1021770] Cisco Application Networking Manager Incorrect Directory Permissions Let Remote Users View/Modify Files
17226| [1021751] Adobe Flash Player Settings Manager May Let Remote Users Conduct Clickjacking Attacks
17227| [1021727] Mac OS X Server Manager Authentication Flaw Lets Remote Users Access the System
17228| [1021726] Mac OS X Remote Apple Events Server Memory Access Flaws Let Remote Users Deny Service or Obtain Potentially Sensitive Information
17229| [1021724] Mac OS X FSEvents Framework Bug Discloses Filesystem Activity to Local Users
17230| [1021723] Mac OS X Folder Manager Directory Permission Error May Let Local Users Obtain the Contents of the Downloads Folder
17231| [1021719] Mac OS X Resource Manager Memory Corruption Error Lets Remote Users Execute Arbitrary Code
17232| [1021691] HP OpenView Network Node Manager Buffer Overflow Lets Remote Users Execute Arbitrary Code
17233| [1021646] Sun Fire Embedded Lights Out Manager Lets Remote Users Gain Access
17234| [1021620] Cisco Unified Communications Manager Input Validation Flaw in Certificate Authority Proxy Function Lets Remote Users Deny Service
17235| [1021619] Cisco Security Manager Lets Remote Users Access the Database
17236| [1021605] Sun Java System Access Manager Discloses Passwords to Remote Authenticated Administrative Users
17237| [1021604] Sun Java System Access Manager Lets Remote Authenticated Users Gain Elevated Privileges
17238| [1021569] Oracle Enterprise Manager Flaw Lets Remote Authenticated Users Access and Modify Data
17239| [1021521] HP OpenView Network Node Manager Buffer Overflows Let Remote Users Execute Arbitrary Code
17240| [1021519] Solaris NFS Client nfs4rename_persistent_fh() Recursion Error Lets Local Users Deny Service
17241| [1021489] KVM VNC Server Bug in protocol_client_msg() Lets Remote Users Deny Service
17242| [1021488] Qemu VNC Server Bug in protocol_client_msg() Lets Remote Users Deny Service
17243| [1021485] uw-imap Client Library Bug Lets Remote Users Deny Service
17244| [1021480] Novell Identity Manager Input Validation Flaw in Page Navigation Permits Cross-Site Scripting Attacks
17245| [1021479] Novell Identity Manager Input Validation Flaw in UIQuery Permits Cross-Site Scripting Attacks
17246| [1021407] Mac OS X Managed Client May Let Local Users Bypass the Screen Saver Lock
17247| [1021394] IBM Tivoli Provisioning Manager LDAP Access Control Bug Lets Remote Users Execute SOAP Commands
17248| [1021388] Symantec Client Security Input Validation Flaw in SPBBCDRV.SYS Device Driver Lets Local Users Deny Service
17249| [1021263] EMC ControlCenter SAN Manager SST_SENDFILE Request Validation Flaw Lets Remote Users View Arbitrary Files
17250| [1021262] EMC ControlCenter SAN Manager Buffer Overflow in Processing SST_CTGTRANS Requests Lets Remote Users Execute Arbitrary Code
17251| [1021188] Mozilla Firefox nsXMLHttpRequest::NotifyEventListeners() Flaw Lets Remote Users Bypass Same-Origin Policies
17252| [1021186] Mozilla Firefox nsFrameManager Memory Access Bug Lets Remote Users Execute Arbitrary Code
17253| [1021171] HP Service Manager Bug Lets Remote Authenticated Users Gain Elevated Privileges
17254| [1021170] Sun Java System Identity Manager Bugs Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks and Disclose Files to Remote Users
17255| [1021122] IBM Tivoli Storage Manager Buffer Overflows Let Remote Users Execute Arbitrary Code
17256| [1021103] Sun Java System Access Manager Bug in LDAP JDK Search Function Lets Local Users Obtain Information
17257| [1021094] Sun Integrated Lights-Out Manager Bug Grants Access to Remote Users
17258| [1021092] HP OpenView Reporter, Network Node Manager, and Performance Agent Trace Service Memory Error Lets Remote Users Deny Service
17259| [1021071] Symantec Altiris Deployment Solution Client GUI Lets Local Users Gain Elevated Privileges
17260| [1021064] HP Systems Insight Manager Lets Remote Users Access Data
17261| [1021014] HP OpenView Network Node Manager Unspecified Bugs Let Remote Users Deny Service
17262| [1020975] TrendMicro OfficeScan Client Module Input Validation Flaw in 'OfficeScanNT Listener' Service Lets Remote Users Traverse the Directory
17263| [1020942] Cisco Unified Communications Manager SIP Processing Bugs Let Remote Users Deny Service
17264| [1020933] Cisco IOS Intrusion Prevention System Bug in 'SERVICE.DNS' Signature Engine Lets Remote Users Deny Service
17265| [1020901] BIND Windows UDP Client Handler Bug Lets Remote Users Deny Service
17266| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
17267| [1020879] Apple QuickDraw Manager Integer Overflow in Processing PICT Images Lets Remote Users Execute Arbitrary Code
17268| [1020813] Cisco ASA Clientless VPN Feature May Disclose Sensitive Information to Remote Users
17269| [1020802] Nortel Business Communications Manager DNS Query Port Entropy Weakness Lets Remote Users Spoof the System
17270| [1020795] HP OpenView Network Node Manager Unspecified Bugs Let Remote Users Deny Service
17271| [1020793] Novell Identity Manager Input Validation Hole in Roles Based Provisioning Module Permits Cross-Site Scripting Attacks
17272| [1020736] Novell iPrint Client Buffer Overflows in ActiveX Control Lets Remote Users Execute Arbitrary Code
17273| [1020723] Opera Subscription Feed Address Bug May Prevent the Correct Address From Being Displayed
17274| [1020698] yum-rhn-plugin Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Prevent Updates
17275| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
17276| [1020661] CA Host-Based Intrusion Prevention System 'kmxfw.sys' Driver Bug Lets Remote Users Deny Service
17277| [1020658] CA Host-Based Intrusion Prevention System 'kmxfw.sys' IOCTL Validation Flaw Lets Local Users Gain Elevated Privileges
17278| [1020648] McAfee Encrypted USB Manager Bug Lets Users Conduct Password Guessing Attacks
17279| [1020641] Webex Meeting Manager Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
17280| [1020626] OpenVPN Client 'lladdr' or 'iproute' Configuration Directive Processing Bug Lets Remote Servers Execute Arbitrary Code
17281| [1020624] Tomcat Input Validation Hole in Host Manager Permits Cross-Site Scripting Attacks
17282| [1020611] Novell iManager Bug Lets Users Delete Certain Property Book Pages
17283| [1020580] HP-UX System Administration Manager May Grant Users Remote Access to NFS Servers
17284| [1020496] Oracle Enterprise Manager Bugs Let Remote Users Modify Data
17285| [1020390] Mac OS X Alias Manager Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
17286| [1020385] Novell Client Unspecified Bug in NWFS.SYS Has Unspecified Impact
17287| [1020380] Sun Java System Access Manager XML Signature Processing Bug Lets Remote Users Execute Arbitrary Code
17288| [1020374] Avaya Communication Manager Bugs Let Remote Users Access Information and Utiliites and Let Remote Authenticated Users Execute Arbitrary Code
17289| [1020371] Nortel SIP Multimedia PC Client Lets Remote Users Deny Service
17290| [1020361] Cisco Unified Communications Manager Lets Remote Users Access Statistics
17291| [1020360] Cisco Unified Communications Manager CTI Manager Service Lets Remote Users Deny Service
17292| [1020326] Cisco Intrusion Prevention System Can Be Crashed By Remote Users Sending Jumbo Ethernet Packets
17293| [1020323] ListManager Input Validation Hole in 'words' Parameter Permits Cross-Site Scripting Attacks
17294| [1020303] Novell iPrint Client Stack Overflows Let Remote Users Execute Arbitrary Code
17295| [1020301] Adobe Flex Input Validation Hole in History Manager Permits Cross-Site Scripting Attacks
17296| [1020274] Solaris Event Port Implementation Null Pointer Dereference Lets Local Users Deny Service
17297| [1020273] Sun Java System Access Manager Grants Administrator Access to Remote Users
17298| [1020208] Akamai Client Software Authentication Flaw Lets Remote Users Execute Arbitrary Code
17299| [1020194] Akamai Download Manager ActiveX Control Lets Remote Users Execute Arbitrary Code
17300| [1020167] CA Secure Content Manager Buffer Overflow in Processing FTP Packets Lets Remote Users Execute Arbitrary Code
17301| [1020165] HP Instant Support ActiveX Controls in 'HPISDataManager.dll' Let Remote Users Execute Arbitrary Code
17302| [1020134] Mac OS X CFNetwork Certificate Processing Bug Discloses Client Certificates to Remote Users
17303| [1020129] CA Internet Security 'UmxEventCliLib' ActiveX Control Lets Remote Users Corrupt Files
17304| [1020128] Symantec Backup Exec System Recovery Manager Directory Traversal Bug Lets Remote Users Gain Access to the Target System
17305| [1020122] OpenSSL TLS Handshake Bug Lets Remote Servers Crash the Connected Client
17306| [1020116] EMC AlphaStor Library Manager 'robotd' Lets Remote Users Execute Arbitrary Code
17307| [1020058] GnuTLS Null Pointer Dereference in Processing Client Hello Messages Lets Remote Users Deny Service
17308| [1020022] Cisco Unified Communications Manager Bugs in CTL CAPF, SIP, and SNMP Services Let Remote Users Deny Service
17309| [1020020] Novell Client Buffer Overflow Lets Physically Local User Execute Arbitrary Code
17310| [1020018] Cisco Building Broadband Service Manager (BBSM) Input Validation Hole Permits Cross-Site Scripting Attacks
17311| [1019957] Nortel Multimedia Communication Server Buffer Overflow in Multimedia PC Client Lets Remote Users Deny Service
17312| [1019955] Akamai Download Manager Lets Remote Users Execute Arbitrary Code
17313| [1019953] SNMPc Network Manager Stack Overflow in Processing Community String Lets Remote Users Execute Arbitrary Code
17314| [1019934] Horde Kronolith Input Validation Hole in 'addevent.php' Permits Cross-Site Scripting Attacks
17315| [1019913] CA Secure Content Manager eCSqdmn Daemon Can Be Crashed By Remote Users
17316| [1019859] Cisco Network Admission Control Appliance Discloses Clean Access Server and Clean Access Manager Shared Secret
17317| [1019839] HP OpenView Network Node Manager ovalarmsrv and ovtopmd Bugs Let Remote Users Deny Service
17318| [1019838] HP OpenView Network Node Manager Input Validation Flaw in 'OpenView5.exe' Lets Remote Users Traverse the Directory
17319| [1019825] Symantec Altiris Deployment Solution Stores AClient Password in Memory in Clear Text
17320| [1019821] HP OpenView Network Node Manager Buffer Overflow in ovspmd Lets Remote Users Execute Arbitrary Code
17321| [1019802] Windows DNS Client Lets Remote Users Spoof the System
17322| [1019789] CA Threat Manager Buffer Overflows in 'Alert.exe' Let Remote Authenticated Users Execute Arbitrary Code
17323| [1019782] HP OpenView Network Node Manager Buffer Overflow in OVAS.EXE Lets Remote Users Execute Arbitrary Code
17324| [1019711] Secure Internet Live Conferencing (SILC) Can Be Crashed By Remote Users With a NEW_CLIENT Packet
17325| [1019704] Mozilla Firefox Discloses Client-Side Certificates to Remote Users
17326| [1019679] Asterisk Predictable Session IDs May Let Remote Users Hijack HTTP Manager Sessions
17327| [1019663] Mac OS X notifyd Lets Local Users Prevent Processes from Receiving Notifications
17328| [1019640] Apple File Protocol Client Stack Overflows Let Remote Users Execute Arbitrary Code
17329| [1019630] Asterisk Format String Bug in Logger and Manager Lets Remote Users Deny Service
17330| [1019616] GroupWise Windows Client API Bug Lets Remote Authenticated Users Access E-mail
17331| [1019605] Citrix Presentation Server Client for Windows May Disclose Credentials to Local Users
17332| [1019527] IBM WebSphere MQ Lets Local Users Bypass Queue Manager Access Restrictions
17333| [1019458] VERITAS Storage Foundation Volume Manager Scheduler Service Lets Remote Users Deny Service
17334| [1019436] ListManager Lets Remote Subscribed Users Gain Administrative Privileges
17335| [1019415] FortiClient DeviceExtension Lets Local Users Gain System Privileges
17336| [1019404] Cisco Unified Communications Manager Input Validation Flaw Lets Remote Authenticated Users Inject SQL Commands
17337| [1019366] Novell Client NWSPOOL.DLL Stack Overflow in EnumPrinters() Let Remote Users Execute Arbitrary Code
17338| [1019340] Mozilla Firefox Lets Remote Users Prevent the Browser From Opening Local Plain Text Files in Certain Cases
17339| [1019317] Check Point VPN-1 SecuRemote/SecureClient Auto Local Logon Feature Lets Local Users Authenticate as Other Users
17340| [1019306] HP OpenView Network Node Manager 'ovtopmd' Bug Lets Remote Users Deny Service
17341| [1019304] Novell Modular Authentication Service Challenge Response Client Discloses Clipboard Contents to Local Users
17342| [1019303] Symantec BackupExec System Recovery Manager Lets Remote Users Upload Arbitrary Files and Execute Arbitrary Code
17343| [1019281] Informix Storage Manager XDR Function Buffer Overflows Let Remote Users Execute Arbitrary Code
17344| [1019276] BIG-IP Application Security Manager Input Validation Hole in '/dms/policy/rep_request.php' Permits Cross-Site Scripting Attacks
17345| [1019250] IBM Tivoli Business Service Manager Discloses Passwords to Local Users
17346| [1019249] IBM Tivoli Provisioning Manager for OS Deployment Buffer Overflow Lets Remote Users Deny Service and Potentially Execute Arbitrary Code
17347| [1019240] Cisco VPN Client IOCTL Memory Corruption Error Lets Local Users Deny Service
17348| [1019224] Lotus Sametime Input Validation Hole in Chat Client Permits Cross-Site Scripting Attacks
17349| [1019223] Cisco Unified Communications Manager Buffer Overflow in Certificate Trust List Provider Service Lets Remote Users Execute Arbitrary Code
17350| [1019182] IBM Tivoli Storage Manager Express Server Heap Overflow Lets Remote Users Execute Arbitrary Code
17351| [1019175] Sun Java System Identity Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17352| [1019144] Novell Identity Manager 'asampsp' Process Can Be Crashed By Remote Users
17353| [1019139] IBM Content Manager for z/OS Input Validation Hole Permits Cross-Site Scripting Attacks
17354| [1019118] Sun Ray Device Manager Daemon Lets Remote Users Create/Delete Directories and Deny Service
17355| [1019055] HP OpenView Network Node Manager Buffer Overflows Let Remote Users Execute Arbitrary Code
17356| [1019051] IMail Client MIME Boundary Buffer Overflow Lets Remote Users Execute Arbitrary Code
17357| [1019045] IBM Tivoli Provisioning Manager Express Input Validation Hole Permits Cross-Site Scripting Attacks
17358| [1019038] SonicWALL Format String Bug in Global VPN Client Lets Users Execute Arbitrary Code
17359| [1019026] IBM Tivoli Netcool Security Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17360| [1019016] HP OpenView Network Node Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17361| [1018943] Novell Client Lets Local Users Gain Kernel Level Privileges
17362| [1018916] Solaris Volume Manager IOCTL Command Validation Flaw Lets Local Users Deny Service
17363| [1018891] SonicWALL SSL-VPN Client Buffer Overflows in WebCacheCleaner/NeLaunchCtrl ActiveX Controls Let Remote Users Execute Arbitrary Code
17364| [1018882] Novell BorderManager Buffer Overflow in clntrust.exe Lets Remote Users Execute
17365| [1018869] Sun Fire Server Embedded Lights Out Manager Software Lets Remote Users Execute Arbitrary Commands
17366| [1018868] IBM Tivoli Storage Manager Input Validation Hole in CAD Service Permits Script Injection Attacks
17367| [1018839] CA Host-Based Intrusion Prevention System Input Validation Hole Permits Script Injection Attacks
17368| [1018828] Cisco Unified Communications Manager SIP INVITE Processing Lets Remote Users Deny Service and TFTP Buffer Overflow Lets Remote Users Execute Arbitrary Code
17369| [1018756] Sun Fire Server Embedded Lights Out Manager Software Lets Remote Users Send SPAM via the System
17370| [1018753] Sun Java System Access Manager Bugs Let Remote Users Access Applications Without Authenticating and Execute Arbitrary Code
17371| [1018747] CA BrightStor Hierarchical Storage Manager Bugs Let Remote Users Inject SQL Commands or Execute Arbitrary Code
17372| [1018639] Backup Manager Discloses the Upload Site's FTP Password to Local Users
17373| [1018634] Absolute Poll Manager XE Input Validation Hole Permits Cross-Site Scripting Attacks
17374| [1018624] Cisco CallManager/Unified Communications Manager Input Validation Holes Permit Cross-Site Scripting and SQL Injection Attacks
17375| [1018623] Novell Client NWSPOOL.DLL Stack Overflows Let Remote Users Execute Arbitrary Code
17376| [1018619] WebLogic SSL Clients May Use Null Encryption
17377| [1018617] Subversion Windows Client Input Validation Flaw in filename Parameter Lets Remote Authenticated Users Create/Overwrite Files
17378| [1018602] Novell Identity Manager May Disclose Passwords to Local Users
17379| [1018573] Cisco VPN Client Dialup Networking and cvpnd.exe Bugs Let Local Users Gain Elevated Privileges
17380| [1018571] Motive Service Activation Manager Buffer Overflow in 'ActiveUtils.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
17381| [1018558] Tomcat Host Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17382| [1018538] Cisco Unified Communications Manager SIP Processing Flaw Lets Remote Users Deny Service or Execute Arbitrary Code
17383| [1018523] GNOME Display Manager g_strsplit() Bug Lets Local Users Deny Service
17384| [1018471] Novell Client 'NWSPOOL.DLL' Stack Overflow Lets Remote Users Execute Arbitrary Code
17385| [1018460] BakBone NetVault Report Manager Buffer Overflow
17386| [1018410] Mozilla Firefox addEventListener() or setTimeout() Functions Permit Cross-Site Scripting Attacks
17387| [1018409] Mozilla Firefox Event Handler Bug Lets Remote Users Execute Arbitrary Code
17388| [1018402] CA Threat Manager Stack Overflows in Alert Notification Service Let Remote Users Execute Arbitrary Code
17389| [1018401] IBM Tivoli Provisioning Manager Divide By Zero Error in TFTP Service Lets Remote Users Deny Service
17390| [1018386] TippingPoint Intrusion Prevention System Fragmented Packet Processing Lets Remote Users Evade Detection
17391| [1018371] Symantec Client Security Buffer Overflow in Realtime E-mail Scanning Lets Local Users Deny Service
17392| [1018370] Sun Java System Access Manager Discloses Passwords to Local Users
17393| [1018369] Cisco Unified Communications Manager Heap Overflows Let Remote Users Execute Arbitrary Code
17394| [1018368] Cisco Unified Communications Manager Lets Remote Users Deny Service and Obtain Sensitive Information
17395| [1018367] Symantec Client Security Buffer Overflow in Realtime E-mail Scanning Lets Local Users Deny Service
17396| [1018361] TippingPoint Intrusion Prevention System Alternate Unicode Character Encodings Lets Remote Users Evade Detection
17397| [1018343] Citrix Presentation Server Client Lets Remote Users Execute Arbitrary Code
17398| [1018336] SAP Internet Communication Manager Lets Remote Users Deny Service
17399| [1018292] Xythos Enterprise Document Manager Input Validation Holes Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks
17400| [1018245] Tomcat Input Validation Holes in the JSP Examples, Manager, and Host Manager Permit Cross-Site Scripting Attacks
17401| [1018161] Mozilla Seamonkey Input Validation Hole in addEventListener Method Permits Cross-Site Scripting Attacks
17402| [1018160] Mozilla Firefox Input Validation Hole in addEventListener Method Permits Cross-Site Scripting Attacks
17403| [1018149] F-Secure Policy Manager fsmsh.dll Lets Remote Users Deny Service With NTFS Reserved Words
17404| [1018129] Sun Solaris NFS Client Module acl(2) Lets Remote Users Deny Service
17405| [1018121] Mac OS X Alias Manager May Allow Users to Cause Arbitrary Code to Be Executed by the Target User
17406| [1018120] Symantec Enterprise Security Manager Race Condition Lets Remote Users Cause the Service to Hang
17407| [1018105] Cisco CallManager Input Validation Hole in Search Form Permits Cross-Site Scripting Attacks
17408| [1018094] Cisco IOS ClientHello, ChangeCipherSpec, and Finished SSL Messages Let Remote Users Deny Service
17409| [1018077] MetaFrame Password Manager Lets Remote Authenticated Users View Their Own Secondary Passwords
17410| [1018062] HP Systems Insight Manager Session Fixation Flaw Lets Remote Users Obtain Administrative Access
17411| [1018054] Cisco Intrusion Prevention System Lets Remote Users Evade Detection With Certain Character Encodings
17412| [1017977] HP Power Manager Remote Agent Lets Local Users Gain Root Privileges
17413| [1017955] Asterisk Manager Interface NULL Pointer Dereference Lets Remote Users Deny Service
17414| [1017944] Apple File Protocol Client Environment Variable Bug Lets Local Users Gain System Privileges
17415| [1017935] BMC Performance Manager Lets Remote Users Modify the 'masterAgentName' and 'masterAgentStartLine' Parameter to Execute Arbitrary Code
17416| [1017925] Akamai Download Manager ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
17417| [1017897] Windows Vista Client-Server Run-time Subsystem Lets Local Users Gain Elevated Privileges
17418| [1017881] Symantec Enterprise Security Manager Upgrade Interface Lets Remote Users Execute Arbitrary Code
17419| [1017869] IBM Tivoli Business Service Manager Discloses Passwords to Local Users
17420| [1017840] IBM Tivoli Provisioning Manager Memory Corruption Error in Processing HTTP POST Requests May Let Remote Users Execute Arbitrary Code
17421| [1017826] Cisco Unified CallManager SCCP, SCCPS, ICMP, and IPSec Processing Bugs Let Remote Users Deny Service
17422| [1017817] HP OpenView Network Node Manager Lets Remote Users Gain Access to Certain Services
17423| [1017777] Sun Java System Web Server May Let a Remote User With a Revoked Client Certificate Access the System
17424| [1017760] Apple QuickDraw Manager PICT Image Processing Heap Overflow Lets Remote Users Execute Arbitrary Code
17425| [1017757] McAfee ePolicy Orchestrator Buffer Overflow in 'SiteManager.Dll' Lets Remote Users Execute Arbitrary Code
17426| [1017727] GnuPG and Several E-mail Clients Let Remote Users Inject Unsigned Data into Signed Messages
17427| [1017722] Novell Access Manager SSL VPN 'policy.txt' File Can By Modified By Remote Authenticated Users to Bypass VPN Network Access Controls
17428| [1017712] Citrix Presentation Server Client for Windows Lets Remote Users Execute Arbitrary Code
17429| [1017701] Mozilla Firefox onUnload Event and document.write() Race Condition May Let Remote Users Execute Arbitrary Code
17430| [1017683] Cisco Secure Services Client Lets Local Users Gain System Privileges and Also View Passwords
17431| [1017678] Nortel Net Direct SSL VPN Client Race Condition Lets Local Users Gain Root Privileges
17432| [1017609] HP OpenView Network Node Manager Unsafe Folder Permissions Lets Local Windows Users Gain Elevated Privileges
17433| [1017570] Sun Java System Access Manager Input Validation Holes in 'goto' and 'gx-charset' Parameters Permit Cross-Site Scripting Attacks
17434| [1017560] Check Point Connectra Integrity Clientless Security Lets Users Bypass the Scanning Function
17435| [1017559] Check Point VPN-1 Integrity Clientless Security Lets Users Bypass the Scanning Function
17436| [1017535] Cisco Adaptive Security Device Manager Does Not Properly Validate Remote Device Certificates and Keys
17437| [1017504] HP OpenView Network Node Manager Lets Remote Users Execute Arbitrary Code
17438| [1017503] HP OpenView Network Node Manager Lets Remote Users View Files
17439| [1017483] Novell Access Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17440| [1017454] Windows Client-Server Run-time Subsystem NtRaiseHardError Discloses Memory to Local Users
17441| [1017453] KSirc Client PRIVMSG Buffer Overflow May Let Remote Users Execute Arbitrary Code
17442| [1017452] Limbo CMS Event Calendar Module Include File Bug in 'eventcal/mod_eventcal.php' Lets Remote Users Execute Arbitrary Code
17443| [1017448] Secure Login Manager Missing Input Validation Permits Cross-Site Scripting Attacks in Certain Cases
17444| [1017447] Hosting Controller 'FolderManager.aspx' Lets Remote Authenticated Users View and Modify Files
17445| [1017433] Windows Client-Server Run-time Subsystem Lets Remote Users Execute Arbitrary Code
17446| [1017384] ScriptMate User Manager Input Validation Holes Permit Cross-Site Scripting Attacks and SQL Command Injection
17447| [1017383] GNOME Display Manager Lets Local Users Gain Elevated Privileges
17448| [1017380] IBM Tivoli Identity Manager Discloses JKS Password to Local Users
17449| [1017370] Windows Client-Server Run-time Subsystem Lets Local Users Gain System Privileges
17450| [1017350] 2X ThinClientServer Lets Remote Users Gain Administrative Access
17451| [1017343] Citrix Presentation Server Client ActiveX Control Lets Remote Users Execute Arbitrary Code
17452| [1017340] Adobe Download Manager Stack Overflow Lets Remote Users Execute Arbitrary Code
17453| [1017333] IBM Tivoli Storage Manager Request Processing Buffer Overflows Let Remote Users Execute Arbitrary Code
17454| [1017315] NetWare Client Print Provider Buffer Overflows in EnumPrinters() and OpenPrinter() Let Remote Users Execute Arbitrary Code
17455| [1017280] JiRo's Link Manager Missing Input Validation Permits SQL Injection and Cross-Site Scripting Attacks
17456| [1017271] Mozilla Firefox Password Manager Can Disclose Passwords and Other Form Values to Remote Websites
17457| [1017270] VMware VirtualCenter Client Does Not Validate Server Certificates
17458| [1017263] Novell Client Buffer Overflow in NWSPOOL.DLL Has Unspecified Impact
17459| [1017248] CA Host-Based Intrusion Prevention System Lets Local Users Gain Kernel Privileges
17460| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
17461| [1017213] Novell BorderManager Predictable ISAKMP Cookies May Let Remote Users Conduct Denial of Service and Replay Attacks
17462| [1017139] Novell iManager TREE Parameter NULL Pointer Dereference Lets Remote Users Deny Service
17463| [1017109] Symantec Client Security SAVRT.SYS Device Driver Buffer Overflow Lets Local Users Gain Elevated Privileges
17464| [1017104] Novell eDirectory NCP Over IP and evtFilteredMonitorEventsRequest() Overflows Let Remote Users Execute Arbitrary Code
17465| [1017025] BorderManager IPSec/IKE Settings May Cause the Server to Crash
17466| [1017002] Symantec Client Security NAVEX15/NAVENG Device Drivers Let Local Users Gain Kernel Level Privileges
17467| [1016958] Mac OS X Workgroup Manager May Display the Incorrect Password Authentication Method
17468| [1016956] Apple QuickDraw Manager PICT Image Processing Bug Lets Remote Users Execute Arbitrary Code
17469| [1016943] OpenSSL ASN.1 Bugs, SSL_get_shared_ciphers() Buffer Overflow, and SSLv2 Client Error Lets Remote Users Denial of Service or Execute Arbitrary Code
17470| [1016898] Symantec Host IDS SymEvent Driver Lets Local Users Deny Service
17471| [1016897] Symantec Anti Virus SymEvent Driver Lets Local Users Deny Service
17472| [1016896] pcAnywhere SymEvent Driver Lets Local Users Deny Service
17473| [1016894] Norton System Works SymEvent Driver Lets Local Users Deny Service
17474| [1016893] Norton Internet Security SymEvent Driver Lets Local Users Deny Service
17475| [1016892] Norton Personal Firewall SymEvent Driver Lets Local Users Deny Service
17476| [1016891] Cisco Intrusion Prevention System Lets Remote Users Deny Service or Evade Detection
17477| [1016889] Norton Anti-Virus SymEvent Driver Lets Local Users Deny Service
17478| [1016853] Novell Identity Manager Environment Variable Validation Bug Lets Local Users Gain Elevated Privileges
17479| [1016771] Lyris ListManager Lets Remote Authenticated Administrators Add Users to Arbitrary Lists
17480| [1016744] SSH Tectia Manager Process Restart Flaw May Let Local Users Gain Elevated Privileges
17481| [1016741] Novell Identity Manager Input Validation Flaw May Let Remote Users Inject Shell Code
17482| [1016728] Symantec Enterprise Security Manager Race Condition Lets Remote Users Deny Service
17483| [1016717] AOL Client Insecure Default Permissions Lets Local Users Modify Files
17484| [1016693] myEvent Include File Flaw in 'myevent_path' and 'language' Parameters Lets Remote Users Execute Arbitrary Code
17485| [1016653] Windows Winsock and DNS Client Buffer Overflows Let Remote Users Execute Arbitrary Code
17486| [1016646] Visual Events Calendar Include File Bug in 'cfg_dir' Parameter Lets Remote Users Execute Arbitrary Code
17487| [1016627] Cisco CallManager Express Lets Remote Users Determine SIP User Names
17488| [1016616] myEvent Include File Error in 'initialize.php' Lets Remote Users Execute Arbitrary Code
17489| [1016562] TippingPoint Intrusion Prevention System Lets Remote Users Bypass the Detection Mechanism
17490| [1016542] Solaris Event Port API Bugs May Let Local or Remote Users Deny Service
17491| [1016508] Invision Power Board Lack of Validation of HTTP Client IP Value Lets Remote Users Inject SQL Commands
17492| [1016475] Cisco Unified CallManager Bugs Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges
17493| [1016474] Cisco Intrusion Prevention System Can Be Crashed By Remote Users
17494| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
17495| [1016445] eBay Picture Manager Buffer Overflow in EPUImageControl Object Lets Remote Users Execute Arbitrary Code
17496| [1016427] QTOFileManager Input Validation Flaws in 'qtofm.php' Permit Cross-Site Scripting Attacks
17497| [1016426] Plume CMS Include File Flaws in '_PX_config[manager_path]' in Multiple Scripts Lets Remote Users Execute Arbitrary Code
17498| [1016372] Trend Micro Control Manager Input Validation Hole Permits Cross-Site Scripting Attacks
17499| [1016364] PHP Event Calendar (ltwCalendar) Missing Input Validation in 'id' Parameter Permits SQL Injection Attacks
17500| [1016333] QTOFileManager Input Validation Hole Permits Cross-Site Scripting Attacks
17501| [1016328] Cisco CallManager 'Administration' and 'User Options' Input Validation Holes Permit Cross-Site Scripting Attacks
17502| [1016324] Calendarix Input Validation Flaws in 'cal_event.php' and 'cal_popup.php' Let Remote Users Inject SQL Commands
17503| [1016307] HP Support Tools Manager Lets Local Users Deny Service
17504| [1016296] Symantec Security Information Manager Rule Transformation Function Grants Shell Access to Local Users
17505| [1016248] Courier Mailing List Manager Lets Remote Users Deny Service
17506| [1016165] Plume CMS Include File Bug in 'manager_path' Parameter Permits Remote Code Execution
17507| [1016161] Symantec Client Security Stack Overflow Lets Remote Users Execute Arbitrary Code
17508| [1016156] Cisco VPN Client for Windows Lets Local Users Gain Elevated Privileges
17509| [1016137] HP OpenView Network Node Manager Lets Remote Users Execute Arbitrary Commands, Create Arbitrary Files, and Access the System
17510| [1016136] EMC Retrospect Client Buffer Overflow Lets Remote Users Deny Service
17511| [1016121] Bitrix Site Manager Discloses Information to Remote Users and Permits Cross-Site Scripting Attacks
17512| [1016119] Sun N1 System Manager Shell Scripts Let Local Users Access System Manager Passwords
17513| [1016105] easyEvent Input Validation Hole in 'curr_year' Parameter Permits Cross-Site Scripting Attacks
17514| [1016077] Apple MySQL Manager Database Initialization Bug May Let Local Users Access the Database
17515| [1016063] EMC Retrospect Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
17516| [1016052] Novell Client Buffer Overflow in 'DPRPCW32.DLL' Lets Remote Users Execute Arbitrary Code
17517| [1016028] CA Resource Initialization Manager LMP SVC Bug May Let Local Users Gain Supervisor State
17518| [1015975] Cisco Subscriber Edge Services Manager Can Be Crashed With Specially Crafted Compressed DNS Data
17519| [1015913] Sybase EAServer Manager May Disclose Passwords to Remote Authenticated Users
17520| [1015903] Sun Solaris LDAP Client May Disclose RootDN Password to Local Users
17521| [1015849] Sun Cluster SunPlex Manager May Let Certain Local Users Access Restricted Files
17522| [1015822] IBM Tivoli Business Systems Manager Input Validation Flaw in 'apwc_win_main.jsp' Permits Cross-Site Scripting Attacks
17523| [1015714] EMC Dantz Retrospect Client Lets Remote Users Disable Backup Services
17524| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
17525| [1015605] HP Insight Manager Directory Traversal Bugs Let Remote Users Obtain Files on the Target System
17526| [1015584] Hosting Controller Input Validation Holes in 'AddGatewaySettings.asp' and 'IPManager.asp' Permit SQL Injection
17527| [1015582] IBM Tivoli Access Manager Input Validation Hole in Web Server Plug-in 'pkmslogout' Script Lets Remote Authenticated Users Traverse the Directory
17528| [1015567] Sun Java System Access Manager May Let Local Users Obtain Elevated Privileges
17529| [1015511] TippingPoint Intrusion Prevention System HTTP Processing Lets Remote Users Deny Service
17530| [1015503] Cisco CallManager TCP Connection Management Handling Lets Remote Users Deny Service
17531| [1015502] Cisco CallManager Bug Lets Read-Only Administrators Gain Full Administrator Privileges
17532| [1015487] Novell Remote Manager for SUSE Linux Content-Length Heap Overflow Lets Remote Users Execute Arbitrary Code
17533| [1015417] Juniper NetScreen-Security Manager 'guiSrv' and 'devSrv' Bugs Let Remote Users Deny Service
17534| [1015375] Cisco Clean Access Lack of Authentication in Secure Smart Manager Lets Remote Users Deny Service
17535| [1015373] Citrix Program Neighborhood Client Buffer Overflow in Processing Application Names May Let Remote Users Execute Arbitrary Code
17536| [1015372] Citrix Program Neighborhood Client Lets Local Users Obtain Cached Passwords
17537| [1015326] Check Point VPN-1 SecureClient Lets Local Users Bypass Security Policy
17538| [1015304] Citrix MetaFrame Secure Access Manager Input Validation Flaw in Login Pages Permits Cross-Site Scripting Attacks
17539| [1015134] IBM WebSphere Session Manager Tracing May Disclose Potentially Sensitive Information
17540| [1015124] Mac OS X Software Update Bug May Prevent Updates from Installing
17541| [1015081] Cisco 11500 Content Services Switch Lets Remote Users Deny Service With Malformed SSL Client Certificates
17542| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
17543| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
17544| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
17545| [1015021] PHP Advanced Transfer Manager HTML Files Let Remote Users Conduct Cross-Site Scripting Attacks
17546| [1015015] aspReady FAQ Manager Missing Input Validation Lets Remote Users Inject SQL Commands
17547| [1014997] Hitachi JP1/Cm2/Network Node Manager Unspecified Bugs Let Remote Users Deny Service or Execute Arbitrary Commands
17548| [1014994] Citrix MetaFrame Presentation Server ClientName Policies Can Be Bypassed By Remote Authenticated Users
17549| [1014987] NateOn Messenger Buffer Overflow in 'NateonDownloadManager.ocx' Lets Remote Users Upload Files and Also Deny Service
17550| [1014977] Novell GroupWise Client Integer Overflow in Processing 'IP Port' Registry Key May Let Local Users Execute Arbitrary Code
17551| [1014961] Apple QuickDraw Manager Buffer Overflow in Processing PICT Images Lets Remote Users Execute Arbitrary Code
17552| [1014943] Opera Mail Client Bugs May Let Remote Users Spoof Attachment Types and Inject Arbitrary Scripting Code
17553| [1014930] PHP Advanced Transfer Manager Lets Remote Users Traverse the Directory and Also Conduct Cross-Site Scripting Attacks
17554| [1014926] CuteNews Input Validation Hole in 'Client-IP' Lets Remote Users Execute Arbitrary Code
17555| [1014851] HP OpenView Event Correlation Services Input Validation Hole in 'ecscmg.ovpl' Lets Remote Users Execute Arbitrary Commands
17556| [1014833] Apache ssl_hook_Access() Function May Fail to Verify Client Certificates
17557| [1014791] HP OpenView Network Node Manager Input Validation Hole in 'connectedNodes.ovpl' Lets Remote Users Execute Arbitrary Commands
17558| [1014787] Symantec Client Security Help Function Lets Local Users Gain Elevated Privileges
17559| [1014782] Solaris DHCP Client Reply Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed on the DHCP Client System
17560| [1014773] BrightStor SAN Manager Buffer Overflow and Other Bugs in Message Queueing Software Let Remote Users Execute Arbitrary Code or Deny Service
17561| [1014769] Unicenter Enterprise Job Manager Buffer Overflow and Other Bugs in Message Queueing Software Lets Remote Users Execute Arbitrary Code or Deny Service
17562| [1014757] Cisco Intrusion Prevention System Command Line Interface Bug Lets Authenticated Users Gain Elevated Privileges
17563| [1014732] Nortel VPN Client Entrust Certificate Profile Implementation Lets Local Users Gain Elevated Privileges
17564| [1014711] HP-UX Ignite-UX File Permission Flaw May Let Remote Users Access and Modify Ignite-UX Client Data
17565| [1014708] Apple Mac OS X Bug in servermgr_ipfilter May Prevent Certain Firewall Rules From Being Enforced
17566| [1014629] EMC Navisphere Manager Input Validation Bug Discloses Files to Remote Users
17567| [1014603] MySQL Eventum Input Validation Hole in 'class.auth.php' Permits SQL Injection and Other Input Validation Bugs Permit Cross-Site Scripting Attacks
17568| [1014599] Gopher Client Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
17569| [1014565] Novell GroupWise Client Buffer Overflow in Processing Post Office Information May Let Remote Authenticated Administrators Execute Arbitrary Code
17570| [1014456] MIMEsweeper for Web May Let Remote Code Bypass the Portable Code Manager
17571| [1014455] Cisco CallManager Memory Management Bugs Let Remote Users Deny Service and Execute Arbitrary Code
17572| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
17573| [1014404] Internet Download Manager Buffer Overflow in Processing Long URLs Lets Remote Users Execute Arbitrary Code
17574| [1014268] Asterisk Buffer Overflow in Manager Interface Lets Remote Authenticated Users Execute Arbitrary Code
17575| [1014267] HP Version Control Repository Manager May Disclose Proxy Password to Local Users
17576| [1014247] Novell GroupWise Client Discloses Password to Local Users
17577| [1014203] Telnet Client NEW-ENVIRON Command Discloses Information to Remote Users
17578| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
17579| [1014148] Apple's Managed Client for OS X (MCX) Discloses Portable Home Directory Credentials to Local Users
17580| [1014147] Loki Download Manager Input Validation Holes Permit SQL Injection Attacks
17581| [1014138] Apple File Protocol (AFP) Server Buffer Overflow in Legacy Client Support Lets Remote Users Execute Arbitrary Code
17582| [1014137] Apple File Protocol (AFP) Server May Prevent Users From Accessing Certain Files
17583| [1014124] Backup Manager Discloses '/etc' Files to Local Users
17584| [1014104] WWWeb Concepts Events System 'login.asp' Input Validation Hole Permits SQL Injection
17585| [1014057] Active News Manager Input Validation Hole in 'password' Parameter Lets Remote Users Inject SQL Commands
17586| [1014008] PHP Advanced Transfer Manager Include File Error Lets Remote Users Execute Arbitrary Commands
17587| [1013979] Sigma ISP Manager Input Validation Flaw in 'sigmaweb.dll' Permits SQL Injection
17588| [1013933] ASP Virtual News Manager Lets Remote Users Inject SQL Commands
17589| [1013917] PHP Advanced Transfer Manager Lets Remote Users Execute Arbitrary Commands
17590| [1013858] HP OpenView Event Correlation Services Unspecified Flaws Let Remote Users Execute Arbitrary Code or Deny Service
17591| [1013857] HP OpenView Network Node Manager Unspecified Flaws Let Remote Users Execute Arbitrary Code or Deny Service
17592| [1013833] Ocean12 Mailing List Manager Lets Remote Users Inject SQL Commands
17593| [1013815] Citrix WinCE MetaFrame Presentation Server Client Stack Overflow Lets Remote Users Execute Arbitrary Code and Another Bug Lets Remote Users Create Arbitrary Shortcuts
17594| [1013762] Ocean12 Calendar Manager Input Validation Errors Permit SQL Injection Attacks
17595| [1013667] Ocean12 Membership Manager Input Validation Holes Permit SQL Injection and Cross-Site Scripting Attacks
17596| [1013651] HP OpenView Network Node Manager Has Unspecified Flaw That Lets Remote Users Deny Service
17597| [1013617] MaxWebPortal Input Validation Holes in 'events_functions' and 'links_add_form' Permit SQL Injection and Cross-Site Scripting Attacks
17598| [1013575] Telnet Client Buffer Overflow in slc_add_reply() and env_opt_add() Lets Remote Servers Execute Arbitrary Code
17599| [1013512] Nortel Contivity VPN Client Discloses Passwords to Local Users
17600| [1013457] Citrix MetaFrame Conferencing Manager May Let Remote Users Gain Keyboard and Mouse Control
17601| [1013409] WEBinsta Website Mailing list manager Include File Flaw Lets Remote Users Execute Arbitrary Commands
17602| [1013355] Trillian Buffer Overflow in Processing PNG Images Lets Remote Users Crash the Client
17603| [1013306] Gaim Has Another HTML Processing Error That Lets Remote Users Crash the Client
17604| [1013283] Information Resource Manager LDAP Error Grants Access to Remote Users
17605| [1013282] AlterPath Manager Discloses System Information and Lets Remote Authenticated Users View Consoles or Gain Administrative Privileges
17606| [1013235] Gaim HTML Processing Error Lets Remote Users Crash the Client
17607| [1013134] SafeNet SoftRemote VPN Client Discloses Key to Local Users
17608| [1012998] phpEventCalendar Input Validation Holes in Title and Event Text Lets Remote Users Cross-Site Scripting
17609| [1012915] NodeManager SNMP Buffer Overflow Lets Remote Users Execute Arbitrary Code
17610| [1012793] Jakarta Tomcat Manager Input Validation Holes Permit Cross-Site Scripting Attacks
17611| [1012737] Eventum Input Validation Holes Let Remote Users Conduct Cross-Site Scripting Attacks
17612| [1012736] Eventum Has Undocumented System Account
17613| [1012657] e107 website system Include File Flaw in ImageManager Lets Remote Users Execute Arbitrary Code
17614| [1012589] tnftp Input Validation Hole in mget() Lets Remote Servers Write Arbitrary Files on the Client
17615| [1012588] IglooFTP Input Validation Hole in download_selection_recursive() Lets Remote Servers Write Arbitrary Files on the Client
17616| [1012491] Opera Default 'kfmclient exec' Configuration May Let Remote Users Execute Arbitrary Commands
17617| [1012473] F-Secure Policy Manager Discloses Installation Path to Remote Users
17618| [1012280] Citrix ICA Client Lets Local Users Monitor Keystrokes
17619| [1012271] Altiris AClient Service Windows Tray Icon Lets Local Users Gain System Privileges
17620| [1012245] Event Calendar Input Validation Holes Let Remote Users Inject SQL Commands
17621| [1012130] Nortel Contivity VPN Client Lets Remote Users Determine Valid User Account Names
17622| [1011970] Apple Remote Desktop Client Lets Local Users Run Applications With Root Privileges
17623| [1011943] inetutils TFTP Client Has Buffer Overflows in Processing Resolved Host Data
17624| [1011891] HP Cluster Object Manager May Let Remote Users Gain Root Privileges
17625| [1011862] Altiris Deployment Server Client Authentication Hole Lets Remote Users Gain Full Control of the Client
17626| [1011846] Nortel Contivity VPN Client May Let Remote Users Hijack Sessions
17627| [1011737] ClientExec Default Installation Discloses System Configuration Information to Remote Users
17628| [1011736] File Upload Manager Lets Remote Users Execute Commands on the Target System
17629| [1011532] Postfix Buffer Error May Prevent Remote Users from Being Able to Authenticate Using SMTPD AUTH
17630| [1011530] NetInfo Manager Incorrectly Displays the Status of the Root Account
17631| [1011513] DMXReady Site Chassis Manager Input Validation Bugs Let Remote Users Inject SQL Commands and Conduct Cross-Site Scripting Attacks
17632| [1011408] MySQL libmysqlclient Buffer Overflow in Executing Prepared Statements Has Unspecified Impact
17633| [1011214] Squid Null Pointer Dereference in clientAbortBody() Lets Remote Users Crash the Proxy
17634| [1011155] Altnet Download Manager Buffer Overflow in bstrFilepath Lets Remote Users Execute Arbitrary Code
17635| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
17636| [1011134] dasBlog Input Validation Hole in Event and Activity Viewer Lets Remote Users Conduct Cross-Site Scripting Attacks
17637| [1011110] Oracle Enterprise Manager Has Local Vulnerabilities With Unspecified Impact
17638| [1011055] RQ Buffer Overflow Lets Remote Systems Crash the Client
17639| [1011029] Bird Chat Clients Can Be Crashed By a Remote User
17640| [1011012] Novell Web Manager May Grant Remote Users Access to the WEB-INF Folder
17641| [1010925] Sun Solaris X Display Manager Can Be Crashed By Remote Users
17642| [1010918] Symantec Clientless VPN Gateway 4400 Lets Remote Authentication Users Modify Other User Credentials
17643| [1010914] HP-UX Process Resource Manager Bug Lets Local Users Corrupt Files
17644| [1010849] PuTTY Lets Remote Servers Execute Arbitrary Code on Connecting Clients
17645| [1010795] phpMyFAQ Lets Remote Users Access the Image Manager Without Authorization
17646| [1010768] EasyWeb FileManager Discloses Files to Remote User
17647| [1010736] Sun Solaris Volume Manager Input Validation Error Lets Local Users Panic the Kernel
17648| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
17649| [1010702] Novell BorderManager 'IKE.NLM' VPN Module Can Be Crashed By Remote Users
17650| [1010701] PureFTPd Logic Bug in accept_client() Lets Remote Users Crash the FTP Daemon
17651| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
17652| [1010678] Half-Life Game Server and Client Can Be Crashed With Specially Crafted Packet Spliting Data
17653| [1010616] popclient Off-By-One Overflow Lets Remote Users Crash the Application
17654| [1010607] HP Object Action Manager WebAdmin Flaw May Yield Access to Remote Users
17655| [1010578] ZWS Newsletter and Mailing List Manager Discloses User Passwords to Remote Users
17656| [1010557] Sun StorEdge Enterprise Storage Manager Lets Local ESMUsers Gain Root Access
17657| [1010530] Sun Kerberos Security Patch May Disclose Kerberos Client Passwords to Local Users
17658| [1010437] HP-UX FTP Client Pipe Character Input Validation Flaw Lets Remote Server Execute Arbitrary Commands
17659| [1010379] IBM Tivoli Access Manager Cookie Authentication Weakness May Let Remote Users Hijack Sessions
17660| [1010378] IBM Tivoli Configuration Manager Cookie Authentication Weakness May Let Remote Users Hijack Sessions
17661| [1010290] FreeBSD msync MS_INVALIDATE Error May Let Local Users Prevent File Changes
17662| [1010177] PHP-Nuke Input Validation Flaw in Union Tap Prevention Feature Permits Cross-Site Scripting Attacks
17663| [1010176] osCommerce Directory Traversal Flaw in 'admin/file_manager.php' Discloses Files to Remote Authenticated Administrators
17664| [1010145] Symantec Client Security SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System
17665| [1010144] Symantec Client Firewall SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System
17666| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
17667| [1009973] IBM AIX Logical Volume Manager Temporary File Flaws and Buffer Overflows Let Local Users Modify Files and Execute Arbitrary Code
17668| [1009970] Citrix MetaFrame Presentation Server Lets Remote Authenticated Administrators Access a Target User's Client Drives
17669| [1009927] Symantec Client Firewall SYMNDIS.SYS TCP Options Parsing Flaw Lets Remote Users Deny Service
17670| [1009926] Symantec Client Security SYMNDIS.SYS TCP Options Parsing Flaw Lets Remote Users Deny Service
17671| [1009914] Yahoo Messenger 'yinsthelper.dll' Overflow Lets Remote Users Crash the Client
17672| [1009818] Cisco IPsec VPN Client Discloses Group Password to Certain Local Users
17673| [1009816] SCT Campus Pipeline Javascript Event Input Validation Holes Let Remote Users Execute Arbitrary Commands
17674| [1009795] cadaver Format String Flaws Let Remote WebDAV Servers Execute Arbitrary Code on Connected Clients
17675| [1009794] neon Format String Flaws Let Remote WebDAV Servers Execute Arbitrary Code on Connected Clients
17676| [1009781] CVS Path Validation Flaw in RCS Diff Files Lets Remote Servers Create Arbitrary Files on the Target Client's System
17677| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
17678| [1009765] BEA WebLogic Custom Trust Manager Flaw May Let Remote Users Impersonate Target Users or Servers
17679| [1009736] Novell Nsure Identity Manager User Password Hint is Stored in Clear Text
17680| [1009717] FirstClass Client Buffer Overflow in Processing PROXYADDR Parameter Lets Local Users Execute Arbitrary Code
17681| [1009708] Sun Solaris sshd May Fail to Log SSH Client IP Addresses
17682| [1009659] Citrix MetaFrame Password Manager May Disclose Passwords to Local Users
17683| [1009615] Clam AntiVirus Unsafe VirusEvent Directive May Let Local Users Gain Root Privileges
17684| [1009507] Expinion News Manager Authentication Flaw Lets Remote Users Gain Administrator Access
17685| [1009498] 'Terminator 3: War of the Machines' Game Buffer Overflow Lets Servers Execute Arbitrary Code on Connected Clients
17686| [1009485] Error Manager Input Validation Holes Let Remote Users Conduct Cross-Site Scripting Attacks
17687| [1009306] Qmail-qmtpd Buffer Overflow in RELAYCLIENT May Let Local Users Gain Elevated Privileges
17688| [1009286] FreeSpace 2 Game Client Buffer Overflow Lets Remote Servers Execute Arbitrary Code
17689| [1009284] Novell Client Firewall Tray Icon Lets Local Users Execute Commands With SYSTEM Privileges
17690| [1009273] Red Faction Game Server Can Execute Arbitary Code on a Connected Client
17691| [1009250] Apple Mail Client Has Unspecified Vulnerabilities
17692| [1009209] Mozilla Event Handler Document Transition Flaw Permits Cross-Site Scripting Attacks
17693| [1009177] phpNewsManager Directory Traversal Hole Discloses Files to Remote Users
17694| [1009171] hsftp Format String Bug Lets Remote Servers Execute Arbitrary Code on a Connected Client
17695| [1009019] Mutt Index Menu Code Lets Remote Users Crash the Client
17696| [1008977] The Palace Client URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
17697| [1008967] Apache-SSL 'SSLFakeBasicAuth' Lets Remote Users Forge Client Certificates to Be Authenticated
17698| [1008948] Check Point VPN-1 and SecuRemote/Secure Client ISAKMP Certificate Request Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM/Root Privileges
17699| [1008920] Apache mod_digest May Validate Replayed Client Responses
17700| [1008811] Cisco CallManager Default Configuration on IBM Servers Grants Administrative Access to Remote Users
17701| [1008769] NetScreen-Security Manager Default Configuration Discloses Information Via Clear Text Communications
17702| [1008688] Cisco CallManager H.323 Processing Flaws Let Remote Users Deny Service
17703| [1008687] Nortel Business Communications Manager H.323 Flaws Let Remote Users Deny Service
17704| [1008668] VERITAS NetBackup Professional Open Transaction Manager Grants Remote Access to Files on the System During Backup
17705| [1008624] vBulletin Input Validation Flaw in calendar.php 'eventid' Field Permits SQL Injection
17706| [1008609] FirstClass Desktop Client 'file://' URLs Execute Local Files Without Presenting a Warning Dialog
17707| [1008452] irssi Client Extraneous format_send_to_gui() Function Call Parameter Lets Remote Users Crash the Client
17708| [1008215] phpWebFileManager Input Validation Flaw in 'f' Variable Discloses Files to Remote Users
17709| [1008179] HP-UX Partition Manager (parmgr) Certification Validation Flaw May Grant Access to Remote Users
17710| [1008177] PeopleSoft PeopleTools iClient Lets Remote Users Upload and Execute Arbitrary Commands
17711| [1008161] BEA WebLogic Node Manager Can Be Crashed By Remote Users
17712| [1008113] HP-UX libc Flaw Prevents NLSPATH From Being Appropriately Restricted
17713| [1008081] Unichat Character Processing Flaw Lets Remote Users Crash a Target User's Client
17714| [1008028] Apache mod_cgid May Disclose CGI Output to Another Client
17715| [1008008] Yahoo! Messenger File Transfer Flaw Lets Remote Users Crash the Target User's Client
17716| [1007985] Sylpheed alertpanel_error_log() Format String Flaw Lets Remote Server Execute Arbitrary Code on the Client
17717| [1007983] HP Insight Manager and Other Management Agents May Let Remote Users Gain Access to the System
17718| [1007972] HP Servicecontrol Manager May Yield Access to Local Users
17719| [1007942] GNOME Display Manager (gdm) Can Be Crashed By Local Users
17720| [1007884] EternalMart Mailing List Manager Include File Validation Flaw Lets Remote Users Execute Arbitrary Code
17721| [1007831] mIRC Client Buffer Overflow in Processing USERHOST Responses Lets Remote Servers Execute Arbitrary Code
17722| [1007765] Powerslave Portalmanager Discloses Database Information to Remote Users
17723| [1007721] KDE Display Manager pam_setcred() Failure May Grant Root Access to Remote Authenticated Users
17724| [1007706] ChatZilla Client Can Be Crashed By IRC Servers Sending Long Requests
17725| [1007703] SCO Internet Manager (mana) Environment Variable Validation Flaw Lets Local Users Grab Root Privileges
17726| [1007691] VSNL POP E-mail Client Discloses Account Authentication Information Via the Referer Field
17727| [1007672] Pine E-mail Client Buffer Overflows in Parsing Message Attributes Permit Remote Code Execution
17728| [1007550] GNOME Display Manager (gdm) Lets Local Users View Files With Root Privileges
17729| [1007545] netris Client Buffer Overflow May Let Remote Servers Execute Arbitrary Code on the Client
17730| [1007539] Piolet File Sharing Client Can Be Crashed By a Remote User Send a Data Flood
17731| [1007416] Everybuddy Messaging Client Can Be Crashed By Remote Users
17732| [1007390] Compaq Insight Manager Format String Flaw May Let Remote Users Execute Arbitrary Code
17733| [1007291] Opera M2 Mail Client Embedded Image Viewing Restrictions Can Be Bypassed By Remote Users
17734| [1007286] Apple Mac OS X Workgroup Manager May Let Remote Users Access New Accounts
17735| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
17736| [1007191] Netscape Client Detection Tool Buffer Overflow Lets Remote Users Execute Arbitrary Code
17737| [1007164] aMSN Client May Disclose the User's Password to Local Users
17738| [1007163] TurboFTP Client Buffer Overflow in Processing Server Responses May Crash the Client
17739| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
17740| [1007135] BEA WebLogic Server May Disclose the Node Manager Password to Local Users
17741| [1007114] IglooFTP Client Buffer Overflows Let Remote FTP Servers Execute Arbitrary Code on the Client
17742| [1007102] Roger Wilco Buffer Overflow Lets Remote Users Execute Arbitrary Code on Unsuspecting Clients
17743| [1007005] Retrospect Client Default File Permissions Let Local Users Gain Elevated Privileges
17744| [1007002] BNC Chat Client File Locking Flaw Lets Remote Users Deny Service
17745| [1006976] MySQL Buffer Overflow in 'mysql_real_connect()' Client Function May Let Remote or Local Users Execute Arbitrary Code
17746| [1006958] LeapFTP PASV Command Response Buffer Overflow Lets Remote FTP Servers Execute Arbitrary Code on the Client
17747| [1006956] SmartFTP PWD Response Buffer Overflow Lets Remote FTP Servers Execute Arbitrary Code on the Client
17748| [1006903] Sun Management Center (SunMC) Change Manager Buffer Overflow in 'pamverifier' Yields Root Privileges to Local and Remote Users
17749| [1006851] UpClient Command Line Buffer Overflow Grants 'kmem' Privileges to Local Users
17750| [1006832] Prishtina FTP Client Can Be Crashed By Remote FTP Servers With Long Banners
17751| [1006819] Cisco VPN Client Lets Local Users Gain Administrator Privileges on the Operating System
17752| [1006773] Eudora E-mail Client Integer Overflow May Let Remote IMAP Servers Execute Arbitrary Code on the Client
17753| [1006772] Sylpheed Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
17754| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
17755| [1006769] Balsa E-mail Client Integer Overflow Lets Remote IMAP Servers Crash the Client
17756| [1006768] Mutt E-mail Client Integer Overflow Lets Remote IMAP Servers Crash the Client
17757| [1006767] Mozilla E-mail Client Integer Overflow Lets Remote IMAP Servers Execute Arbitrary Code on the Client
17758| [1006765] Ximian Evolution E-mail Client Integer Overflow Lets Remote IMAP Servers Execute Arbitrary Code on the Client
17759| [1006764] UW-IMAP Client Integer Overflow Lets Remote IMAP Servers Execute Arbitrary Code on the Client
17760| [1006762] Pine Integer Overflow Lets Remote IMAP Servers Execute Arbitrary Code on the Client
17761| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
17762| [1006702] Worker filemanager Access Control Flaw May Let Local Users Gain Unauthorized Read/Execute Access to Directories Being Copied
17763| [1006659] 3D-FTP Client Can Be Crashed By a Remote Server Sending a Long Banner
17764| [1006639] GKrellM Newsticker Lets Remote Users Execute Arbitrary Shell Commands on the Target User's Client
17765| [1006607] Windows XP Service Control Manager Timing Flaw in Service Shutdown May Disclose Sensitive Information to Local Users
17766| [1006590] NetScreen Global PRO Policy Manager May Configure VPNs With a Weaker Cryptographic Algorithm
17767| [1006569] Ximian Evolution Bug in GtkHTML Library Allows Remote Users to Crash a Client
17768| [1006560] Ocean12 ASP Guestbook Manager Discloses Database, Including the Administrator's Password, to Remote Users
17769| [1006558] Gaim-Encryption Plugin May Let Remote Users Crash the GAIM Client
17770| [1006486] Entrust Authority Security Manager Command Line Lets Local Authenticated Master Users Bypass the Multiple Authorization Feature
17771| [1006453] Compaq Insight Manager Discloses File Existence to Remote Users and May Allow Denial of Service Attacks
17772| [1006244] DBManager Pro Discloses Database Usernames and Passwords to Local Users
17773| [1006227] Eudora E-mail Client Can Be Crashed By a Remote User Sending an Attachment With a Long Filename
17774| [1006195] Sun Solaris FTP Client Displays The User Password When in Debug Mode
17775| [1006172] VERITAS Bare Metal Restore for Tivoli Storage Manager Has Unspecified Flaw That Yields Root Privileges to Remote Users
17776| [1006156] Moxftp Client Buffer Overflow Lets Remote Servers Execute Arbitrary Code on the Client
17777| [1006112] BitchX IRC Chat Client Can Be Crashed By Remote Users
17778| [1006077] FAR File Manager Shell Overflow May Let Local Users Execute Arbitrary Code
17779| [1006058] Alt-N WorldClient Default CGI Configuration Lets Remote Users Send Forged Mail Via the Server
17780| [1006039] Compaq Insight Manager Web Agent Session Security Hole May Yield Access to Remote Users
17781| [1006014] PuTTY SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory
17782| [1006013] AbsoluteTelnet SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory
17783| [1006012] VanDyke Entunnel SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory
17784| [1006011] VanDyke SecureFX SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory
17785| [1006010] VanDyke SecureCRT SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory
17786| [1006006] Kerberos and Other FTP Clients Allow Malicious FTP Servers to Execute Arbitrary Code on the Client
17787| [1005997] Rediff Bol Instant Messaging Client Sends Authentication Data in the Clear and Permits Remote Users to Terminate Sessions
17788| [1005982] Palm HotSync Manager Can Be Crashed By Remote Users
17789| [1005942] CuteFTP Client Buffer Overflow in Processing Command Responses May Let Remote Users Execute Code
17790| [1005926] D-Link AirPlus Access Point Manager Allows Remote Users to Upgrade Firmware Without Authentication
17791| [1005885] CuteFTP Client Buffer Overflow in Processing FTP Banners May Let Remote Users Execute Code
17792| [1005871] Netscape E-mail Client Fails to Delete Messages When 'Empty Trash' is Selected
17793| [1005813] SSH Communications SSH Client and Server SSH2 Implementation Bugs Allow Only Limited Denial of Service
17794| [1005812] F-Secure SSH Client and Server SSH2 Implementation Bugs Allow Only Limited Remote Denial of Service Issues
17795| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
17796| [1005794] Several FTP Clients Have an Input Validation Flaw That May Let Malicious Servers Write Files to Arbitrary Locations
17797| [1005793] Wget FTP Client Input Validation Flaw May Let Malicious Servers Write Files to Arbitrary Locations
17798| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
17799| [1005755] Netscape Enterprise Server Manager Input Validation Flaw Lets Remote Users Execute Application Commands
17800| [1005751] SMB2WWW Web-Based Windows Networking Client Bug Lets Remote Users Execute Arbitrary Programs
17801| [1005727] Aldap Contact Manager Authentication Flaw Lets Remote Users Obtain Administrative Privileges on the Application
17802| [1005723] OpenWindows mailtool(1) Client for Sun Solaris Can Be Crashed By Remote Users
17803| [1005704] SSH Communications SSH Secure Shell Client Buffer Overflow in Processing URLs May Let Remote Users Execute Arbitrary Code
17804| [1005664] Eudora E-mail Client May Execute Remotely Supplied Scripting Code in the Local Computer Zone
17805| [1005562] Pine E-mail Client Input Validation Bug Lets Remote Users Crash the Client
17806| [1005559] Window Maker Window Manager Buffer Overflow May Let Remote Users Execute Arbitrary Code
17807| [1005517] EventSave/EventSave+ File Access Error May Cause Events to Be Lost in Certain Cases
17808| [1005497] GTetrinet Game Client Buffer Overflows Let Remote Users Execute Arbitrary Code
17809| [1005440] Sun Solaris NFS Bug Lets Remote Users Deny Service to NFS Clients By Killing the 'lockd' Daemon
17810| [1005427] Sabre Desktop Reservation Client Can Be Crashed By Remote Users
17811| [1005347] Compaq Insight Manager Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks
17812| [1005292] Trillian Chat Client Can Be Crashed By Remote Users Sending Special Characters Via AIM Service
17813| [1005291] Trillian IRC Chat Client Has More Bugs That Let Remote Servers Crash the Client
17814| [1005264] Trillian Chat Client Buffer Overflow in Processing 'JOIN' Command Allows Remote Code Execution
17815| [1005261] Trilliam Instant Messaging Client Buffer Overflow in Processing PRIVMSG Commands Allows Remote Code Execution
17816| [1005249] Cisco VPN 5000 Client Software for Mac OS May Disclose Passwords to Local Users
17817| [1005248] Cisco VPN 5000 Client Buffer Overflows Let Local Users Gain Root Privileges on Linux or Solaris Systems
17818| [1005236] Trillian Chat Client Buffer Overflow in 'ident' Daemon Lets Remote Users Crash the Client
17819| [1005187] Cisco VPN Client Software Has Multiple Bugs That, Among Other Things, Allow a Remote User to Crash the Client
17820| [1005166] Trillian Chat Client Software Has a Buffer Overflow in the XML Parser
17821| [1005165] Gaim Instant Messaging Client Input Validation Flaw Lets Remote Users Execute Arbitrary Commands
17822| [1005148] mIRC Chat Client Buffer Overflow in Scripting Function May Let Remote Users Execute Arbitrary Code on the System If a Vulnerable Script is Installed on the Target System
17823| [1005131] AOL Instant Messenger (AIM) Heap Overflow May Let Remote Users Crash a Target User's AIM Client When the Target User Clicks on a URL
17824| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
17825| [1005113] Aquonics File Manager Input Validation Hole Lets Remote Users View Files on the Server and Lets Some Remote Users Obtain Elevated Privileges
17826| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
17827| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
17828| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
17829| [1005048] Oracle Enterprise Manager Web Service Component of Oracle 9i Application Server Discloses the Web Cache Administrator Password to Local Users
17830| [1005022] Cisco VPN Client Software Buffer Overflows Let Remote Users Cause Denial of Service Conditions
17831| [1004975] Gaim Instant Messaging Client Buffer Overflow in Jabber Module May Allow Remote Users to Execute Arbitrary Code
17832| [1004974] Trillian Chat Client Buffer Overflow in Processing PING Messages Allows Remote Users to Execute Arbitrary Code
17833| [1004972] Trillian Chat Client Format String Flaw and DCC Message Buffer Overflow May Allow Remote Users to Execute Arbitrary Code
17834| [1004969] Web Shop Manager Input Validation Bug Lets Remote Users Execute Commands on the System
17835| [1004952] Qualcomm Eudora E-mail Client Software Buffer Overflow in Processing MIME Boundaries Lets Remote Users Execute Arbitrary Code
17836| [1004845] ICQ Instant Messaging Client Software Can Be Crashed By a Remote User Sending a Message With a Large Number of Graphical 'Smiles'
17837| [1004826] Pegasus Mail Bug in Processing 'From' and 'To' Headers Lets Remote Users Send Mail to Crash the Recipient's Pegasus Mail Client
17838| [1004816] VanDyke Software's SecureCRT SSH Client Buffer Overflow Lets Malicious Remote Servers Execute Arbitrary Code on the Client
17839| [1004756] MyNewsGroups :) PHP-based USENET News Client Bug Lets Remote Users Execute Arbitrary Code on the Server
17840| [1004753] Ultrafunk's Popcorn E-mail Client Has Various Bugs That Allow a Remote User to Crash the E-mail Client
17841| [1004720] XiRCON Internet Relay Chat (IRC) Client Connections Can Be Disabled By Remote Users Via an IRC Server
17842| [1004708] 'nn' News Reader Format String Hole Lets Remote Malicious News Server Execute Arbitrary Code on the Client
17843| [1004684] HP DCE Client Software Has Unspecified Security Hole That Allows Remote Users to Crash the DCE Daemon
17844| [1004625] SGI NetVisualyzer 'nveventd' Configuration Flaw May Allow Local Users to Write to Any File on the System to Gain Root Access
17845| [1004624] HP-UX Samba Common Internet File System (CIFS) Client Buffer Overflow May Let Local Users Obtain Elevated Privileges on the System
17846| [1004612] Pirch 98 Internet Relay Chat (IRC) Client Buffer Overflow May Execute Remotely Supplied Arbitrary Code
17847| [1004592] IRSSI IRC Client Can Be Crashed By Remote Users Sending a Specially Crafted Channel Topic Name
17848| [1004589] Cisco VPN Client (Linux/UNIX) Buffer Overflow Lets Local Users Gain Root Privileges on the System
17849| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
17850| [1004524] IRCIT Internet Relay Chat (IRC) Client Buffer Overflow Lets Remote IRC Servers Execute Arbitrary Code on the Client
17851| [1004461] LogiSense DNS Manager System Has Input Validation Flaw That Allows Remote Users to Gain Access to the Application and Possibly Execute Arbitrary Commands
17852| [1004448] Caldera Volution Manager Discloses LDAP Directory Administrator's Password to Local Users
17853| [1004425] Sun Ray Server With Non-Smartcard Mobility Feature May Allow Remote Users with XDMCP Clients to Login to an Arbitrary Users' Sun Ray Server Account
17854| [1004389] Yahoo! Messenger Buffer Overflows and Scripting Flaws Let Remote Users Execute Arbitrary Code on Another User's Messenger Client
17855| [1004374] IRSSI IRC Client for UNIX May Contain a Backdoor in a Certain Version of the Source Code Distribution
17856| [1004370] Cisco Intrusion Detection System (IDS) Device Manager Bug in Web Access Feature Lets Remote Users View Files on the Sensors
17857| [1004342] Fetchmail Client Buffer Overflow May Allow a Remote Mail Server to Execute Arbitrary Code on the Client System
17858| [1004321] Swatch Log File Monitor Has Bug in the Throttling Code That May Cause Some Events to Be Missed
17859| [1004319] Hosting Controller Software for Web Hosting Companies Has Input Validation Errors in 'dsnmanager.asp' and 'imp_rootdir.asp' Scripts That Allow Remote Users to View Files on the System and Upload and Copy Files With Administrator Privileges
17860| [1004308] Lukemftp FTP Client Buffer Overflow in Processing Server-Supplied PASV Commands May Allow Remote FTP Servers To Cause Arbitrary Code to Be Executed on the FTP Client
17861| [1004287] NOCC PHP-based Webmail Client Software Displays Message Text as HTML Without Filtering, Allowing a Remote User to Access the Victim's Mailbox Using a Cross-Site Scripting Attack
17862| [1004283] Gaim Instant Messaging Client Lets Local Users Access the Hotmail Accounts of Other Active Gaim Users
17863| [1004280] AOL Instant Messenger (AIM) Bug in 'aim:AddBuddy' Link Processing May Let Remote Users Cause the AIM Client to Crash
17864| [1004269] Yahoo! Messenger Client Discloses Buddy List Contents to Local Users
17865| [1004265] Cisco IP Manager Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device or Execute Arbitrary Code
17866| [1004241] Novel Border Manager Firewall Can Be Crashed By Remote Users Sending Specially Crafted Packets to the FTP Proxy, IP/IPX Gateway, or RTSP Proxy Ports
17867| [1004239] Novell NetWare Client Has Buffer Overflows in the Resolution of Long Host Names
17868| [1004233] MDaemon Mail Server WorldClient Buffer Overflow Lets Authenticated Remote Users Execute Arbitrary Code on the Server with SYSTEM Privileges
17869| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
17870| [1004222] 'ASP Client Check' SQL Injection Hole Lets Remote Users Bypass Authentication and Gain Access to Restricted Pages
17871| [1004220] Another AOL Instant Messenger (AIM) TLV Buffer Overflow Lets Remote Users Execute Arbitrary Code on Another User's AIM Client
17872| [1004212] Nautilus GNOME Shell and File Manager Symlink Hole May Let Local Users Cause Other Users' to Overwrite Files on the System
17873| [1004145] Kerberos4 FTP Client Heap Overflow Lets Malicious Servers Execute Arbitrary Code on the FTP Client
17874| [1004134] ICQ Instant Messaging Client Can Be Crashed When Malformed '.hpf' Files are Loaded
17875| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
17876| [1004129] Matu FTP Client Buffer Overflow Allows Remote Malicious FTP Servers to Execute Arbitrary Code on the Client
17877| [1004120] ICQ Chat Client Can Be Crashed By Remote Users Sending Malformed Contact Packets
17878| [1004116] GNU Screen Window Manager Lets Local Users Execute Arbitrary Code With Root Privileges to Gain Root Access on the System
17879| [1004100] Buffer Overflow in Solaris Event Detector Daemon (edd) for Enterprise 10000 SSP Server May Let Remote Users Gain Root Access to the System
17880| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
17881| [1004023] Tivoli Storage Manager Buffer Overflows May Let Remote Users Execute Arbitrary Code on the System
17882| [1003988] Tarantella Native Client Password Saving Restriction Can Be Circumvented
17883| [1003951] Symatec Computer 'popper_mod' PHP-based E-mail Client Default Configuration Allows Remote Users to Access the System's Administrative Pages
17884| [1003947] Novell Netware Remote Manager Buffer Overlow Lets Remote Users Crash the Manager and Possibly Execute Arbitrary Code
17885| [1003906] Xchat '/dns' Command Bug May Let Remote Users Execute Arbitrary Commands on the Client Software
17886| [1003905] Cisco CallManager Memory Leak Lets Remote Users Cause the Server to Crash and Reload.
17887| [1003894] Instant Web Mail PHP-based Mail Client May Let Remote Users Cause Arbitrary POP Commands to Be Executed on Another User's Mail System
17888| [1003887] PCI NetSupport Manager Directory Traversal Flaw Lets Remote Users View Files Located Anywhere on the Managed Host
17889| [1003881] Gravity Software's Service Pack Manager 2000 Default Directory Permissions Let Local Users Modify Operating System Files and Gain Full Control of the System.
17890| [1003864] Internet Security Systems RealSecure Intrusion Detection System for Nokia Appliances Inadvertently Includes a Built-in KeyManager Account That Could Allow a Remote User to Control the System
17891| [1003862] Caldera/SCO Calendar Manager Service (rpc.cmsd) Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With Root Privileges
17892| [1003832] X Display Manager Control Protocol (XDMCP) Default Configuration Lets Remote Users Determine Valid User Names on the System and Gain Access to a Remote Console Login Screen
17893| [1003830] Windows NT and 2000 Session Manager Debug Hole Lets Local Users Obtain Handles to Any Process or Thread to Obtain Elevated Privileges on the System
17894| [1003774] Check Point FireWall-1 SecuRemote/SecureClient Authentication Timeout Restrictions Can Be Circumvented By Users
17895| [1003760] mIRC Chat Client Discloses User Nickname and Other Information to Remote Users via Direct Client-to-Client Protocol
17896| [1003713] AOL Instant Messenger (AIM) Short Message Feature Buffer Overflow Lets Remote Users Crash the AIM Client Software
17897| [1003706] Xtell Messaging Client Buffer Overflows Let Remote Users Execute Arbitrary Code on the System
17898| [1003691] KMail E-mail Client Bug Lets Remote Users Send Large Messages to Cause the Client to Crash
17899| [1003678] The Bat! E-mail Client MS-DOS Device Access Flaw Lets Remote Users Send Special E-mail to Cause the Recipient's E-mail Client to Crash
17900| [1003640] Yahoo Messenger Client Can Be Crashed By Remote Users and Spoofed Messages Can Be Sent By Remote Users
17901| [1003557] Add2it Mailman Mailing List Manager Input Validation Flaw Lets Remote Users Execute Arbitrary Commands and Write Arbitrary Files on the System
17902| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
17903| [1003483] Licq Instant Messaging Client Can Be Crashed By Remote Users
17904| [1003449] ICQ Instant Messaging Client for Mac OS X Can Be Crashed By Remote Users
17905| [1003436] Windows Messenger (aka MSN Messenger) Instant Messaging Client Discloses Display Name and Contacts to Remote Users
17906| [1003429] mIRC Internet Relay Chat (IRC) Windows Client Buffer Overflow Lets Malicious IRC Servers Execute Arbitrary Code on the Client and Take Full Control of the Client's Host
17907| [1003425] 'kicq' ICQ Client for KDE Can Be Crashed By Remote Users
17908| [1003376] Ganglia Clustering Environment Web Client Lets Remote Users Execute Arbitrary Commands on the Server
17909| [1003344] XFree86 X Display Manager Authentication Error Lets Remote Users Connect Without Authentication
17910| [1003199] Kerberos FTP Client Has Buffer Overflow That May Allows an FTP Server to Cause the Client to Crash
17911| [1003184] Legato NetWorker Configuration Error Lets Any NetWorker Server Backup or Restore a Host Running the NetWorker Client
17912| [1003178] Xchat IRC Client Character Expansion Bug Lets a Remote User Hijack Another User's Session and Cause Commands to Be Sent to the IRC Server from the Hijacked Client
17913| [1003143] ICQ Messaging Client Buffer Overflow Lets Remote Users Execute Arbitrary Code on the User's Host
17914| [1003141] FAQManager Perl-based FAQ Page Management Software Discloses Files on the Server to Remote Users
17915| [1003130] BrowseFTP File Transfer Client Buffer Overflow Lets Malicious FTP Server Execute Arbitrary Code on the Client
17916| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
17917| [1003111] Pine E-mail Client Allows Remote Users to Send Malicious URLs Within a Message That Will Execute Arbitrary Shell Commands on the Recipient's Host When the URL is Loaded
17918| [1003085] Mutt E-mail Client Buffer Overflow May Let Remote Users Cause Arbitary Commands to Be Executed on the Mutt User's Host
17919| [1003058] Mozilla Personal Security Manager Uses Unsafe Temporary Files and May Allow Local Users to Overwrite Critical Files on the Server
17920| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
17921| [1003031] PFinger Client and Server Have Format String Bugs That Allow Remote and Local Users to Execute Arbitrary Code
17922| [1002995] Novell GroupWise Common Default Password May Let Remote Users Access the Servlet Manager and Modify the Configuration
17923| [1002968] Citrix ICA Client for Windows Allows Remote Malicious Code to Execute on a User's PC Without Warning
17924| [1002950] HP OpenView Network Node Manager May Let Local Users Obtain Elevated Privileges
17925| [1002939] Sun Solaris on Enterprise 10000 May Allow Local Users to Prevent the System from Booting or Potentially Obtain Root Access
17926| [1002882] RhinoSoft FTP Serv-U Remote Administration Client Discloses Administrator Passwords When Using S/KEY One-Time Passwords
17927| [1002804] Yahoo Messenger Instant Messaging Client Uses Weak Authentication Allowing a Remote User to Gain Access to Another User's Account
17928| [1002753] NeoMail Web-based Mail Client Package for Sun Cobalt RaQ and Cube Appliances Contains Suidperl Vulnerability That Lets Remote Users Gain Root Privileges
17929| [1002655] Compaq Insight Manager XE Buffer Overflow Lets Remote Users Execute Arbitrary Code and Obtain System Level Privileges on the Server
17930| [1002635] Red Hat Package Manager (RPM) Archives May Execute Arbitrary Code With Printer (lp) Privileges When Queried, Allowing a Local User to Gain Elevated Privileges on the Host
17931| [1002612] Lotus Notes E-mail Client Automatically Executes Arbitrary LotusScript Code
17932| [1002596] Apple's Claris Emailer Buffer Overflow Lets Remote Users Crash the E-mail Client and May Allow Arbitrary Code to be Executed
17933| [1002566] Mac OS X NetInfo Manager Lets Local Users Log in as Root Level Users
17934| [1002530] PIX Firewall Manager Discloses PIX Firewall Passwords to Local Users
17935| [1002497] Phorecast PHP-based Personal Information Manager Application Executes Remotely Supplied Arbitrary Code
17936| [1002475] HP OpenView Network Node Manager Component Lets Local Users Gain Elevated Privileges
17937| [1002436] Half-Life Gaming Server Can Execute Arbitrary Code on the Client
17938| [1002416] Cisco Internet Content Distribution Network (iCDN) Products May Let Remote Users Masquerade as Valid Authenticated Clients Due to Security Flaw in RSA BSAFE Library
17939| [1002415] TrendMicro InterScan eManager for InterScan VirusWall Lets Remote Users Reconfigure the System and Also Execute Arbitrary Code with System Level Privileges
17940| [1002409] RSA's BSAFE SSL-J Secure Sockets Layer Java Toolkit Has Session Caching Bug That May Allow Remote Users to Masquerade as Other Valid SSL Clients
17941| [1002363] GNU Mailman Mailing List Manager Gives Remote Users Administrative Access When the Global Password is Null
17942| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
17943| [1002355] KDE KMail E-mail Client May Corrupt Mail Folders Due to UNIX Date Rollover
17944| [1002339] SafeNet Soft-PK VPN Client Software Allows Local Users to Modify Locked VPN Policies
17945| [1002334] Directory Manager PHP Application Lets Remote Users Execute Commands on the Server
17946| [1002316] POP3Lite E-mail Server Lets Remote Users Cause POP3 Clients to Lose Messages or Receive Fake Mail
17947| [1002312] Gnut Gnutella Client Allows Remote Users to Cause the Client to Execute Arbitrary Javascript
17948| [1002301] HP-UX Process Resource Manager (PRM) and Workload Manager (WLM) Allow Local Users to Obtain Root Level Privileges on the Host
17949| [1002273] Starfish Software's TrueSync Desktop Software for Personal Information Managers Discloses the Password and Backed Up Files to Local Users
17950| [1002260] ICQ Instant Messaging Client Lets Remote Users Cause an ICQ User ID to be Automatically Added to Another ICQ User's Contact List Using Malicious HTML Code
17951| [1002250] KDE Konqueror File Manager Can Be Crashed With Long Filenames
17952| [1002214] Remedy Action Request System Client Installer Temporary File Vulnerability Lets Local Users Obtain Root Level Privileges on the System
17953| [1002173] CuteFTP Client Uses Weak Password Encryption Method That Allows Local Users to Decode the Passwords
17954| [1002134] Identix BioLogon Client for Windows Fails to Secure Screen Saver Logins in Certain Multi-monitor Configurations, Allowing Physically Local Users to Access the System Without Requiring Biometric Authentication
17955| [1002119] Mathematica Can Be Crashed By Remote Users and May Grant Valid Licenses to Unauthorized Mathematica Clients
17956| [1002101] Window Maker X11 Window Manager Contains a Buffer Overflow that May Execute Arbitrary Code or Crash When Viewing a Malicious Web Page or E-mail Message
17957| [1002073] Solaris Dtmail E-mail Client Buffer Overflow Lets Local Users Gain Elevated Group Privileges
17958| [1002018] Elm E-mail Client Lets Mail from Remote Users Overwrite Other Elm E-mail Display Fields
17959| [1001958] HP OpenView Event Correlation Services (ECS)
17960| [1001928] Lmail E-mail Client Gives Local Users Root Level Access
17961| [1001899] Another Buffer Overflow in TrendMicro's InterScan Web Manager Gateway Lets Remote Users Execute Arbitrary Code with System Level Privileges
17962| [1001805] TrendMicro's InterScan Web Manager Gateway Lets Remote Users Obtain System-Level Access to the Server
17963| [1001719] Apache Web Server on Mac OS X Client Fails to Enforce File and Directory Access Protections, Giving Remote Users Access to Restricted Pages
17964| [1001712] Caldera's Volution Web-Based Management System May Permit a Rogue Volution System to Take Control of Volution Clients on the Network
17965| [1001711] HP's OpenView Network Node Manager Gives Remote Users Shell Access with User-level (bin) Privileges
17966| [1001686] Netscape Messenger E-mail Client Discloses Some User Information to Remote Web Sites
17967| [1001638] Xchat Internet Relay Chat (IRC) Client Allows Remote Users to Cause the Client to Execute Arbitrary Code
17968| [1001610] HyperTerminal Telnet Client for Windows Allows Local Users to Cause Arbitrary Code to be Executed by the Client
17969| [1001598] HP's OpenView Network Node Manager Allows Local Users to Get Root Access
17970| [1001539] Becky! Internet Mail Client May Allow Remote Users to Cause Arbitrary Commands to Be Executed By the Client
17971| [1001529] IncrediMail E-mail Client Allows Remote Users to Overwrite Files on the Host
17972| [1001494] DSL_Vdns Virtual DNS Client for Dynamic IP Address Allows Remote Users to Crash the Software
17973| [1001472] Mailx Client for Sun Solaris Allows Local Users to Execute Code with Mail Group Privileges
17974| [1001459] BearShare File Sharing Gnutella Client Allows Remote Users to Obtain Files on the BearShare Host
17975| [1001454] Rpmdrake Package Manager for Linux-Mandrake Contains Temporary File Vulnerability
17976| [1001443] gFTP Client May Allow Remote FTP Servers to Cause the FTP Client to Execute Arbitrary Code on the User's Host
17977| [1001396] mIRC Internet Relay Chat Client for Windows Allows Remote Users to Control Other Users' Clients
17978| [1001393] Novell BorderManager VPN Services Can Be Crashed Remotely
17979| [1001378] RitLab's The Bat! E-Mail Client Allows a User's E-Mail to Be Made Unretrievable When Downloading a Specifically Formatted E-Mail Message
17980| [1001370] KDE File Manager (kfm) Allows Local Users to Access Files of Other Users
17981| [1001355] Qualcomm's Eudora E-mail Client Can Send Attachments In Certain Cases Without the User's Knowledge
17982| [1001268] Veritas NetBackup Client Can Be Made to Consume All of the Host's CPU Resources
17983| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
17984| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
17985| [1001220] The Bat! E-mail Client Does Not Warn Before Executing Certain Disguised In-line Attachments
17986| [1001188] O'Reilly WebSite Pro's Remote Manager Service Can Be Crashed Via the Network
17987| [1001120] Mutt E-mail Client Could Execute Malicious Code From a Compromised IMAP Mail Server
17988| [1001117] Eudora E-mail Client May Silently Install and Execute Malicious Trojan Software
17989| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
17990| [1001055] HP-UX Ships With A Vulnerable Version of the Elm Mail Client That May Allow Access to the Mail of Other Users
17991|
17992| OSVDB - http://www.osvdb.org:
17993| [53434] IBM Tivoli Storage Manager (TSM) Client Event Message Remote Overflow DoS
17994| [94767] IBM Tivoli Federated Identity Manager Event Page Template File Macro XSS
17995| [93558] Events Manager Plugin for WordPress Event Editing redirect_to Parameter XSS
17996| [93557] Events Manager Plugin for WordPress wp-admin/edit.php author Parameter XSS
17997| [93556] Events Manager Plugin for WordPress Event Search Form em_search Parameter XSS
17998| [92783] Oracle Multiple Products Enterprise Manager Console Alert Event Handling commentInput Field XSS
17999| [92403] Oracle E-Business Suite Applications Manager Component HTML OAM Client Subcomponent Unspecified Remote Issue
18000| [91674] Free Hosting Manager /free/clients/register.php Multiple Parameter SQL Injection
18001| [91673] Free Hosting Manager /free/clients/home.php clientuser Cookie Parameter SQL Injection
18002| [91672] Free Hosting Manager /free/clients/viewaccount.php id Parameter SQL Injection
18003| [91671] Free Hosting Manager /free/clients/tickets.php id Parameter SQL Injection
18004| [91670] Free Hosting Manager /free/clients/reset.php code Parameter SQL Injection
18005| [90915] Events Manager Plugin for WordPress wp-admin/post.php Multiple Parameter XSS
18006| [90914] Events Manager Plugin for WordPress index.php event_owner_name Parameter XSS
18007| [90913] Events Manager Plugin for WordPress wp-admin/admin-ajax.php dbem_phone Parameter XSS
18008| [89835] IBM Tivoli Storage Manager (TSM) Client Traditional Scheduler Service Remote DoS
18009| [89834] IBM Tivoli Storage Manager (TSM) Client Web GUI Unspecified Remote Access
18010| [89488] Events Manager Plugin for WordPress templates/forms/bookingform/booking-fields.php Multiple Parameter XSS
18011| [89487] Events Manager Plugin for WordPress templates/templates/events-search.php Multiple Parameter XSS
18012| [89486] Events Manager Plugin for WordPress XSS classes/em-bookings-table.php wp_nonce Parameter XSS
18013| [88773] cPanel WebHost Manager (WHM) /webmail/x3/mail/clientconf.html acct Parameter XSS
18014| [87747] IBM Content Manager eClient Multiple HTTP Method Cleartext Password Disclosure
18015| [87726] IBM Content Manager eClient Unspecified CSRF
18016| [87724] IBM Content Manager eClient GET Request Remote Cleartext Password Disclosure
18017| [87665] Event Manager Extension for TYPO3 Unspecified SQL Injection
18018| [84409] Zenoss zport/dmd/ZenEventManager/listEventCommands sortedSence Parameter XSS
18019| [81026] Novell iManager Web Interface jclient Create Attribute Function EnteredAttrName Parameter Parsing Remote Overflow
18020| [80132] Epson Event Manager Net Scan Monitor Component HTTP Request Parsing Remote DoS
18021| [79738] phxEventManager search.php search_terms Parameter SQL Injection
18022| [77892] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/view/ cmd Parameter XSS
18023| [77891] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/rename/ Multiple Parameter XSS
18024| [77890] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/permissions/ fname Parameter XSS
18025| [77889] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/edit/ Multiple Parameter XSS
18026| [77888] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/create-dir/ cmd Parameter XSS
18027| [77887] Parallels Plesk Panel Control Panel /plesk/client@3/domain@2/hosting/file-manager/ cmd Parameter XSS
18028| [77847] Parallels Plesk Small Business Panel /plesk/client@1/domain@1/hosting/file-manager/view/ Multiple Parameter SQL Injection
18029| [77846] Parallels Plesk Small Business Panel /plesk/client@1/domain@1/hosting/file-manager/rename/ Multiple Parameter SQL Injection
18030| [77845] Parallels Plesk Small Business Panel /plesk/client@1/domain@1/hosting/file-manager/permissions/ Multiple Cookie SQL Injection
18031| [77844] Parallels Plesk Small Business Panel /plesk/client@1/domain@1/hosting/file-manager/edit/ Referer HTTP Header SQL Injection
18032| [77843] Parallels Plesk Small Business Panel /plesk/client@1/domain@1/hosting/file-manager/create-file/ Multiple Parameter SQL Injection
18033| [77842] Parallels Plesk Small Business Panel /plesk/client@1/domain@1/hosting/file-manager/create-dir/ Multiple Parameter SQL Injection
18034| [77841] Parallels Plesk Small Business Panel /plesk/client@1/domain@1/hosting/file-manager/ Multiple Cookie SQL Injection
18035| [77816] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/ cmd Parameter XSS
18036| [77811] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/view/ certificateslist Cookie SQL Injection
18037| [77810] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/edit/ PLESKSESSID Cookie SQL Injection
18038| [77809] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/create-file/ psaContext Cookie SQL Injection
18039| [77808] Parallels Plesk Panel Control Panel /plesk/client@2/domain@1/hosting/file-manager/ no_frames_login_page Cookie SQL Injection
18040| [75395] IBM Tivoli Security Information and Event Manager Custom Reports Unspecified XSS
18041| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
18042| [73939] Oracle Enterprise Manager Grid Control Event Management Unspecified Remote Issue
18043| [73553] IBM Tivoli Storage Manager Client Alternate Data Streams (ADS) Function Overflow
18044| [73552] IBM Tivoli Storage Manager Client Journal Based Backup (JBB) Function Overflow
18045| [72419] Cisco Unified Operations Manager iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp Multiple Parameter XSS
18046| [72418] Cisco Unified Operations Manager iptm/eventmon Multiple Parameter XSS
18047| [72297] RSA Data Loss Prevention (DLP) Enterprise Manager Unspecified XSS
18048| [71092] Batavi admin/templates/pages/event_manager/edit.php mID Parameter XSS
18049| [70547] Oracle Enterprise Manager Grid Control Client System Analyzer Remote Code Execution
18050| [70408] NetSupport Manager Client Control Hostname Remote Overflow
18051| [70185] IBM Tivoli Storage Manager (TSM) Client Hierarchical Storage Management Client Unspecified Arbitrary Command Execution
18052| [70184] IBM Tivoli Storage Manager (TSM) Client Backup-archive Clients Unspecified File Overwrite
18053| [70183] IBM Tivoli Storage Manager (TSM) Client dsmtca GeneratePassword() Function Overflow
18054| [70094] IBM Lotus Mobile Connect Connection Manager HTTP-AS iNotes Logoff LTPA Token Cookie Domain Mismatch Client Access
18055| [69681] Red Hat Enterprise Virtualization Manager SPICE Plugin for IE ImpersonateNamedPipeClient Function Race Condition Local Privilege Escalation
18056| [68397] IBM Tivoli Storage Manager (TSM) FastBack Server FastBackServer.exe _Eventlog Function Format String Arbitrary Code Execution
18057| [67940] Events Manager Extended Plugin for WordPress Unspecified Script Multiple Parameter XSS
18058| [67291] IBM Tivoli Storage Manager (TSM) FastBack Server Client Message Handling Overflow
18059| [67290] IBM Tivoli Storage Manager (TSM) FastBack Server Client Message Handling Remote DoS
18060| [65833] Hitachi JP1/ServerConductor / DeploymentManager DPM Client Service Unspecified DoS
18061| [65245] RSA Key Manager Client Encrypted Key Metadata Section SQL Injection
18062| [61478] Events Manager Plugin for WordPress Events Page event_id Parameter SQL Injection
18063| [61223] Event Manager Component for Joomla! index.php id Parameter SQL Injection
18064| [60416] Cisco VPN Client Service Control Manager (cvpnd.exe) Service StartServiceCtrlDispatcher Function Local DoS
18065| [59634] IBM Tivoli Storage Manager Client on *nix MAILPROG Option Unspecified Unauthorized Access
18066| [59633] IBM Tivoli Storage Manager Client Traditional Scheduler Unspecified Overflow
18067| [59632] IBM Tivoli Storage Manager Client CAD Service Unspecified Remote Overflow
18068| [57704] Docebo class.module/class.event_manager.php Direct Request Path Disclosure
18069| [55274] OpenAFS Client on Unix Cache Manager RX Response Handling Remote Overflow
18070| [55273] OpenAFS Client on Linux Cache Manager RX Response Handling Remote DoS
18071| [55138] Mozilla Multiple Products Browser Engine nsEventStateManager::GetContentState / nsNativeTheme::CheckBooleanAttr Memory Corruption
18072| [54235] IBM Tivoli Storage Manager (TSM) Client SSL Unspecified MiTM Weakness
18073| [54234] IBM Tivoli Storage Manager (TSM) Client Java GUI Unspecified Privilege Escalation
18074| [54233] IBM Tivoli Storage Manager (TSM) Agent Client (dsmagent.exe) WebGUI Unspecified Overflow
18075| [54232] IBM Tivoli Storage Manager (TSM) Agent Client (dsmagent.exe) dicuGetIdentifyRequest Request Packet NodeName Overflow
18076| [54231] IBM Tivoli Storage Manager (TSM) Agent Client (dsmagent.exe) Request Packet String Handling Overflow
18077| [53437] IBM Tivoli Storage Manager (TSM) Client IP Address Handling Overflow DoS
18078| [53431] IBM Tivoli Storage Manager (TSM) Web Admin Client Unspecified Memory Access Violation Remote DoS
18079| [53067] IBM DB2 Content Manager eClient Unspecified Issue
18080| [52316] Cisco Security Manager IPS Event Viewer (IEV) Unspecified TCP Port Exposure Remote Privilege Escalation
18081| [49103] Nortel Multimedia Communication Server 5100 Client Manager UNIStim FTP Multiple Method Remote DoS
18082| [47628] Phlatline's Personal Information Manager (pPIM) events.php date Parameter XSS
18083| [42362] IBM WebSphere SVRCONN MQ Client Queue Manager Security Bypass
18084| [41874] Macrovision FLEXnet Connect MSVNClientDownloadManager61Lib.DownloadManager ActiveX (ISDM.exe) Multiple Method Arbitrary File Download
18085| [41624] IBM DB2 Content Manager (CM) Toolkit eClient Unspecified Scripting Issue
18086| [41254] IBM Client Security Password Manager Credential Fixation
18087| [40866] Novell BorderManager Client Trust Application (clntrust.exe) Validation Request Remote Overflow
18088| [40587] NetSupport Manager Client Spoofing Authentication Bypass
18089| [38618] BakBone NetVault Reporter Manager Scheduler Client (clsscheduler.exe) Remote Overflow
18090| [38281] IBM Tivoli Storage Manager (TSM) Client CAD Service XSS
18091| [38162] IBM Tivoli Storage Manager (TSM) Client Server-initiated Prompted Scheduling Unspecified Issue
18092| [38161] IBM Tivoli Storage Manager (TSM) Client Client Acceptor Daemon (CAD, dsmcad.exe) Remote Overflow
18093| [37320] Novell Identity Manager Client Login Extension (CLE) Cleartext Credential Local Disclosure
18094| [36822] Logitech VideoCall CallManager ActiveX (StarClient.dll) Multiple Method Overflow
18095| [30273] HP OpenView Client Configuration Manager (CCM) radexecd.exe Arbitrary Command Execution
18096| [25545] BEA WebLogic Client Connection Manager QoS Protocol Downgrade
18097| [25329] Claroline init_event_manager.inc.php Multiple Parameter Remote File Inclusion
18098| [22644] X.Org X Window System (X11) on 64bit XClientMessageEvent Struct Manipulation DoS
18099| [21956] Cisco Clean Access Secure Smart Manager /admin/uploadclient.jsp Authentication Bypass File Upload DoS
18100| [20211] IBM Lotus Notes R5 Client Crafted Event Arbitrary Command Execution
18101| [19786] Multiple Java Package X509TrustManager isClientTrusted Method Trust Failure
18102| [11049] Oddspace Game Manager Creation Arbitrary Client Data Access
18103|_
181048403/tcp open admind?
1810537820/tcp open unknown
1810649923/tcp open unknown
1810756459/tcp open unknown
1810856742/tcp open unknown
1810959092/tcp open rpcbind
18110Device type: general purpose|storage-misc|broadband router|router|media device|WAP
18111Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Infomir embedded (89%), Ubiquiti embedded (89%), Ubiquiti AirOS 5.X (89%)
18112OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/h:hp:p2000_g3 cpe:/o:mikrotik:routeros:6.32.1 cpe:/o:linux:linux_kernel:2.6 cpe:/h:infomir:mag-250 cpe:/h:ubnt:airmax_nanostation cpe:/o:ubnt:airos:5.5.9
18113Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 - 3.1 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.39 (91%), Linux 3.10 (91%), Linux 3.2 (91%), HP P2000 G3 NAS device (90%), Linux 3.8 (90%), Linux 2.6.32 - 3.10 (89%)
18114No exact OS matches for host (test conditions non-ideal).
18115Uptime guess: 26.343 days (since Mon Sep 9 04:49:52 2019)
18116Network Distance: 24 hops
18117TCP Sequence Prediction: Difficulty=261 (Good luck!)
18118IP ID Sequence Generation: All zeros
18119Service Info: Host: c15t2a7n.mwprem.net; OSs: Unix, Windows; CPE: cpe:/o:microsoft:windows
18120
18121TRACEROUTE (using port 1720/tcp)
18122HOP RTT ADDRESS
181231 30.05 ms 10.251.204.1
181242 49.31 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
181253 49.35 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
181264 49.31 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
181275 49.36 ms ix-xe-11-1-1-0.tcore1.w6c-montreal.as6453.net (66.198.96.98)
181286 49.44 ms if-ae-12-2.tcore1.mtt-montreal.as6453.net (64.86.31.26)
181297 49.44 ms if-ae-0-2.tcore2.mtt-montreal.as6453.net (216.6.115.90)
181308 49.44 ms if-ae-5-2.tcore2.n0v-new-york.as6453.net (64.86.226.58)
181319 49.50 ms if-ae-2-2.tcore1.n0v-new-york.as6453.net (216.6.90.21)
1813210 49.57 ms if-ae-7-2.tcore1.nto-new-york.as6453.net (63.243.128.25)
1813311 39.15 ms if-ae-9-2.tcore1.n75-new-york.as6453.net (63.243.128.122)
1813412 36.62 ms ae-8.a01.nycmny17.us.bb.gin.ntt.net (129.250.9.113)
1813513 246.00 ms ae-4.r01.nycmny17.us.bb.gin.ntt.net (129.250.4.174)
1813614 ... 15
1813716 270.93 ms ae-13.r30.tokyjp05.jp.bb.gin.ntt.net (129.250.4.143)
1813817 270.93 ms ae-2.r02.tokyjp05.jp.bb.gin.ntt.net (129.250.3.22)
1813918 270.91 ms ae-1.ocn.tokyjp05.jp.bb.gin.ntt.net (120.88.53.22)
1814019 270.92 ms 122.1.245.130
1814120 270.87 ms 114.147.63.126
1814221 250.67 ms 122.28.179.202
1814322 310.04 ms 180.8.125.226
1814423 237.40 ms 153.146.149.89
1814524 241.32 ms c15t2a7n.mwprem.net (60.43.151.164)
18146
18147NSE: Script Post-scanning.
18148Initiating NSE at 13:03
18149Completed NSE at 13:03, 0.00s elapsed
18150Initiating NSE at 13:03
18151Completed NSE at 13:03, 0.00s elapsed
18152Read data files from: /usr/bin/../share/nmap
18153OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
18154Nmap done: 1 IP address (1 host up) scanned in 1731.75 seconds
18155 Raw packets sent: 70550 (3.108MB) | Rcvd: 165212 (25.486MB)
18156#######################################################################################################################################
18157Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-05 13:03 EDT
18158NSE: Loaded 47 scripts for scanning.
18159NSE: Script Pre-scanning.
18160Initiating NSE at 13:03
18161Completed NSE at 13:03, 0.00s elapsed
18162Initiating NSE at 13:03
18163Completed NSE at 13:03, 0.00s elapsed
18164Initiating Parallel DNS resolution of 1 host. at 13:03
18165Completed Parallel DNS resolution of 1 host. at 13:03, 0.02s elapsed
18166Initiating UDP Scan at 13:03
18167Scanning c15t2a7n.mwprem.net (60.43.151.164) [15 ports]
18168Completed UDP Scan at 13:04, 1.68s elapsed (15 total ports)
18169Initiating Service scan at 13:04
18170Scanning 13 services on c15t2a7n.mwprem.net (60.43.151.164)
18171Service scan Timing: About 7.69% done; ETC: 13:25 (0:19:24 remaining)
18172Completed Service scan at 13:05, 102.59s elapsed (13 services on 1 host)
18173Initiating OS detection (try #1) against c15t2a7n.mwprem.net (60.43.151.164)
18174Retrying OS detection (try #2) against c15t2a7n.mwprem.net (60.43.151.164)
18175Initiating Traceroute at 13:05
18176Completed Traceroute at 13:05, 7.05s elapsed
18177Initiating Parallel DNS resolution of 1 host. at 13:05
18178Completed Parallel DNS resolution of 1 host. at 13:05, 0.00s elapsed
18179NSE: Script scanning 60.43.151.164.
18180Initiating NSE at 13:05
18181Completed NSE at 13:06, 7.12s elapsed
18182Initiating NSE at 13:06
18183Completed NSE at 13:06, 1.01s elapsed
18184Nmap scan report for c15t2a7n.mwprem.net (60.43.151.164)
18185Host is up (0.045s latency).
18186
18187PORT STATE SERVICE VERSION
1818853/udp open|filtered domain
1818967/udp open|filtered dhcps
1819068/udp open|filtered dhcpc
1819169/udp open|filtered tftp
1819288/udp open|filtered kerberos-sec
18193123/udp open|filtered ntp
18194137/udp filtered netbios-ns
18195138/udp filtered netbios-dgm
18196139/udp open|filtered netbios-ssn
18197161/udp open|filtered snmp
18198162/udp open|filtered snmptrap
18199389/udp open|filtered ldap
18200500/udp open|filtered isakmp
18201|_ike-version: ERROR: Script execution failed (use -d to debug)
18202520/udp open|filtered route
182032049/udp open|filtered nfs
18204Too many fingerprints match this host to give specific OS details
18205
18206TRACEROUTE (using port 138/udp)
18207HOP RTT ADDRESS
182081 29.51 ms 10.251.204.1
182092 ... 3
182104 18.19 ms 10.251.204.1
182115 39.96 ms 10.251.204.1
182126 39.96 ms 10.251.204.1
182137 39.95 ms 10.251.204.1
182148 39.95 ms 10.251.204.1
182159 39.94 ms 10.251.204.1
1821610 22.02 ms 10.251.204.1
1821711 ... 18
1821819 44.60 ms 10.251.204.1
1821920 37.54 ms 10.251.204.1
1822021 ... 27
1822128 72.02 ms 10.251.204.1
1822229 ...
1822330 18.53 ms 10.251.204.1
18224
18225NSE: Script Post-scanning.
18226Initiating NSE at 13:06
18227Completed NSE at 13:06, 0.00s elapsed
18228Initiating NSE at 13:06
18229Completed NSE at 13:06, 0.00s elapsed
18230Read data files from: /usr/bin/../share/nmap
18231OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
18232Nmap done: 1 IP address (1 host up) scanned in 124.12 seconds
18233 Raw packets sent: 142 (9.866KB) | Rcvd: 168 (22.789KB)
18234#######################################################################################################################################
18235Hosts
18236=====
18237
18238address mac name os_name os_flavor os_sp purpose info comments
18239------- --- ---- ------- --------- ----- ------- ---- --------
1824060.43.151.164 c15t2a7n.mwprem.net Linux 2.6.X server
18241
18242Services
18243========
18244
18245host port proto name state info
18246---- ---- ----- ---- ----- ----
1824760.43.151.164 21 tcp ftp open vsftpd 2.2.2
1824860.43.151.164 53 udp domain unknown
1824960.43.151.164 67 udp dhcps unknown
1825060.43.151.164 68 udp dhcpc unknown
1825160.43.151.164 69 udp tftp unknown
1825260.43.151.164 80 tcp http open Apache httpd 2.2.15 (CentOS)
1825360.43.151.164 88 udp kerberos-sec unknown
1825460.43.151.164 110 tcp tcpwrapped open
1825560.43.151.164 123 udp ntp unknown
1825660.43.151.164 137 udp netbios-ns filtered
1825760.43.151.164 138 udp netbios-dgm filtered
1825860.43.151.164 139 udp netbios-ssn unknown
1825960.43.151.164 143 tcp tcpwrapped open
1826060.43.151.164 161 udp snmp unknown
1826160.43.151.164 162 udp snmptrap unknown
1826260.43.151.164 389 udp ldap unknown
1826360.43.151.164 443 tcp ssl/https open
1826460.43.151.164 500 udp isakmp unknown
1826560.43.151.164 520 udp route unknown
1826660.43.151.164 587 tcp smtp open Postfix smtpd
1826760.43.151.164 993 tcp tcpwrapped open
1826860.43.151.164 995 tcp tcpwrapped open
1826960.43.151.164 2049 udp nfs unknown
1827060.43.151.164 2100 tcp amiganetfs open
1827160.43.151.164 4190 tcp sieve open Dovecot Pigeonhole sieve 1.0
1827260.43.151.164 8400 tcp cvd open
1827360.43.151.164 8402 tcp galaxy open Galaxy Client Event Manager
1827460.43.151.164 8403 tcp admind open
1827560.43.151.164 37820 tcp open
1827660.43.151.164 49923 tcp open
1827760.43.151.164 56459 tcp open
1827860.43.151.164 56742 tcp open
1827960.43.151.164 59092 tcp rpcbind open
18280#######################################################################################################################################
18281 Anonymous JTSEC #OpWhales Full Recon #48