· 6 years ago · Feb 29, 2020, 12:33 AM
1#####################################################################################################################################
2=====================================================================================================================================
3 Hostname www.mercadopublico.cl ISP TIVIT CHILE TERCERIZACIÓN DE PROCESOS, SERVICIOS Y TECNOLOGÍA SpA
4Continent North America Flag
5US
6Country United States Country Code US
7Region Unknown Local time 28 Feb 2020 16:59 CST
8City Unknown Postal Code Unknown
9IP Address 206.48.140.40 Latitude 37.751
10 Longitude -97.822
11======================================================================================================================================
12#####################################################################################################################################
13> www.mercadopublico.cl
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18Name: www.mercadopublico.cl
19Address: 206.48.140.40
20>
21#####################################################################################################################################
22Domain name: mercadopublico.cl
23Registrant name: DIRECCION DE COMPRAS Y CONTRATACION PUBLICA
24Registrant organisation:
25Registrar name: NIC Chile
26Registrar URL: https://www.nic.cl
27Creation date: 2007-08-03 13:36:55 CLST
28Expiration date: 2025-08-29 09:36:55 CLST
29Name server: ns1.mercadopublico.cl (206.48.140.82)
30Name server: ns2.mercadopublico.cl (206.48.140.83)
31#####################################################################################################################################
32[+] Target : www.mercadopublico.cl
33
34[+] IP Address : 206.48.140.40
35
36[+] Headers :
37
38[+] Content-Type : text/html
39[+] Last-Modified : Mon, 05 May 2008 13:26:02 GMT
40[+] Accept-Ranges : bytes
41[+] ETag : "0111990b3aec81:0"
42[+] Server : Microsoft-IIS/7.5
43[+] X-Powered-By : ASP.NET
44[+] X-Frame-Options : SAMEORIGIN
45[+] Date : Fri, 28 Feb 2020 23:04:00 GMT
46[+] Content-Length : 71
47
48[+] SSL Certificate Information :
49
50[-] SSL is not Present on Target URL...Skipping...
51
52[+] Whois Lookup :
53
54[+] NIR : None
55[+] ASN Registry : arin
56[+] ASN : 27735
57[+] ASN CIDR : 206.48.140.0/24
58[+] ASN Country Code : US
59[+] ASN Date : 1995-06-16
60[+] ASN Description : TIVIT CHILE TERCERIZACI\195\147N DE PROCESOS, SERVICIOS Y TECNOLOG\195\141A SpA, CL
61[+] cidr : 206.48.0.0/16
62[+] name : EQUANT-BLK1
63[+] handle : NET-206-48-0-0-1
64[+] range : 206.48.0.0 - 206.48.255.255
65[+] description : Equant, Inc.
66[+] country : US
67[+] state : VA
68[+] city : Oak Hill
69[+] address : 13775 McLearen Road
70[+] postal_code : 20171
71[+] emails : ['SIRT@EQUANT.COM', 'soc@orange-ftgroup.com', 'juan.vadillo@orange.com', 'german.martinez@orange.com', 'Internet_Admin_Mailin@orange-ftgroup.com']
72[+] created : 1995-06-16
73[+] updated : 2019-10-29
74
75[+] Crawling Target...
76
77[+] Looking for robots.txt........[ Not Found ]
78[+] Looking for sitemap.xml.......[ Not Found ]
79[+] Extracting CSS Links..........[ 0 ]
80[+] Extracting Javascript Links...[ 0 ]
81[+] Extracting Internal Links.....[ 0 ]
82[+] Extracting External Links.....[ 0 ]
83[+] Extracting Images.............[ 0 ]
84
85[+] Total Links Extracted : 0
86
87[+] Completed!
88#####################################################################################################################################
89[i] Scanning Site: https://206.48.140.40
90
91
92
93B A S I C I N F O
94====================
95
96
97[+] Site Title:
98[+] IP address: 206.48.140.40
99[+] Web Server: Could Not Detect
100[+] CMS: Could Not Detect
101[+] Cloudflare: Not Detected
102[+] Robots File: Could NOT Find robots.txt!
103
104
105
106
107W H O I S L O O K U P
108========================
109
110 % This is the RIPE Database query service.
111% The objects are in RPSL format.
112%
113% The RIPE Database is subject to Terms and Conditions.
114% See http://www.ripe.net/db/support/db-terms-conditions.pdf
115
116% Note: this output has been filtered.
117% To receive output for a database update, use the "-B" flag.
118
119% Information related to '205.220.218.0 - 206.167.32.255'
120
121% No abuse contact registered for 205.220.218.0 - 206.167.32.255
122
123inetnum: 205.220.218.0 - 206.167.32.255
124netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
125descr: IPv4 address block not managed by the RIPE NCC
126remarks: ------------------------------------------------------
127remarks:
128remarks: For registration information,
129remarks: you can consult the following sources:
130remarks:
131remarks: IANA
132remarks: http://www.iana.org/assignments/ipv4-address-space
133remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
134remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
135remarks:
136remarks: AFRINIC (Africa)
137remarks: http://www.afrinic.net/ whois.afrinic.net
138remarks:
139remarks: APNIC (Asia Pacific)
140remarks: http://www.apnic.net/ whois.apnic.net
141remarks:
142remarks: ARIN (Northern America)
143remarks: http://www.arin.net/ whois.arin.net
144remarks:
145remarks: LACNIC (Latin America and the Carribean)
146remarks: http://www.lacnic.net/ whois.lacnic.net
147remarks:
148remarks: ------------------------------------------------------
149country: EU # Country is really world wide
150admin-c: IANA1-RIPE
151tech-c: IANA1-RIPE
152status: ALLOCATED UNSPECIFIED
153mnt-by: RIPE-NCC-HM-MNT
154created: 2019-01-07T10:48:33Z
155last-modified: 2019-01-07T10:48:33Z
156source: RIPE
157
158% This query was served by the RIPE Database Query Service version 1.96 (WAGYU)
159
160
161
162
163
164
165G E O I P L O O K U P
166=========================
167
168[i] IP Address: 206.48.140.40
169[i] Country: United States
170[i] State:
171[i] City:
172[i] Latitude: 37.751
173[i] Longitude: -97.822
174
175
176
177
178S U B N E T C A L C U L A T I O N
179====================================
180
181Address = 206.48.140.40
182Network = 206.48.140.40 / 32
183Netmask = 255.255.255.255
184Broadcast = not needed on Point-to-Point links
185Wildcard Mask = 0.0.0.0
186Hosts Bits = 0
187Max. Hosts = 1 (2^0 - 0)
188Host Range = { 206.48.140.40 - 206.48.140.40 }
189
190
191
192N M A P P O R T S C A N
193============================
194
195Starting Nmap 7.70 ( https://nmap.org ) at 2020-02-28 23:06 UTC
196Nmap scan report for 206.48.140.40
197Host is up (0.14s latency).
198
199PORT STATE SERVICE
20021/tcp filtered ftp
20122/tcp filtered ssh
20280/tcp open http
203443/tcp open https
204
205Nmap done: 1 IP address (1 host up) scanned in 2.27 seconds
206####################################################################################################################################
207[INFO] ------TARGET info------
208[*] TARGET: https://www.mercadopublico.cl/Home
209[*] TARGET IP: 206.48.140.40
210[INFO] NO load balancer detected for www.mercadopublico.cl...
211[*] DNS servers: ns1.mercadopublico.cl.
212[*] TARGET server: Microsoft-IIS/7.5
213[*] CC: US
214[*] Country: United States
215[*] RegionCode: FL
216[*] RegionName: Florida
217[*] City: Miami
218[*] ASN: AS5511
219[*] BGP_PREFIX: 206.48.0.0/16
220[*] ISP: Opentransit Orange S.A., FR
221[INFO] SSL/HTTPS certificate detected
222[*] Issuer: issuer=C = US, ST = Illinois, L = Chicago, O = "Trustwave Holdings, Inc.", CN = "Trustwave Organization Validation SHA256 CA, Level 1", emailAddress = ca@trustwave.com
223[*] Subject: subject=CN = *.mercadopublico.cl, O = Direccion de Compras y Contratacion Publica, L = Santiago, ST = Santiago, C = CL
224[INFO] DNS enumeration:
225[*] api.mercadopublico.cl 206.48.140.116
226[*] ns1.mercadopublico.cl 206.48.140.82
227[*] ns2.mercadopublico.cl 206.48.140.83
228[*] webportal.mercadopublico.cl 198.41.36.203
229[INFO] Possible abuse mails are:
230[*] abuse@mercadopublico.cl
231[*] abuse@www.mercadopublico.cl
232[INFO] NO PAC (Proxy Auto Configuration) file FOUND
233[INFO] Starting FUZZing in http://www.mercadopublico.cl/FUzZzZzZzZz...
234[INFO] Status code Folders
235[ALERT] Look in the source code. It may contain passwords
236[INFO] SAME content in http://www.mercadopublico.cl/ AND http://206.48.140.40/
237[INFO] Links found from https://www.mercadopublico.cl/Home:
238[*] http://capacitacion.chilecompra.cl/
239[*] http://datosabiertos.chilecompra.cl/
240[*] https://chilecompraatualcance.cl/casos-de-exito/
241[*] https://www.googletagmanager.com/ns.html?id=GTM-WLFTMTX
242[*] https://www.mercadopublico.cl/Contratos/Ciudadania
243[*] https://www.mercadopublico.cl/Home
244[*] https://www.mercadopublico.cl/Home/Contenidos/QueEsMercadoPublico?esNuevaHome=true
245[*] https://www.mercadopublico.cl/Home/IndicadorDeGestion?esNuevaHome=true
246[*] https://www.mercadopublico.cl/Home/Plandecompra?esNuevaHome=true
247[*] https://www.mercadopublico.cl/Home/RecuperacionContrasena?esNuevaHome=true
248[*] http://www.mercadopublico.cl/Home/
249[*] http://www.mercadopublico.cl/Portal/Modules/Site/Busquedas/BuscadorAvanzado.aspx?qs=2
250[*] http://www.mercadopublico.cl/Portal/Modules/Site/Busquedas/BuscadorAvanzado.aspx?qs=8
251[*] http://www.mercadopublico.cl/Portal/Modules/Site/Busquedas/BuscadorAvanzado.aspx?qs=9
252[*] http://www.mercadopublico.cl/TiendaHome/
253cut: intervalle de champ incorrecte
254Saisissez « cut --help » pour plus d'informations.
255[INFO] Shodan detected the following opened ports on 206.48.140.40:
256[*] 443
257[*] 80
258[INFO] ------VirusTotal SECTION------
259[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
260[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
261[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
262[INFO] ------Alexa Rank SECTION------
263[INFO] Percent of Visitors Rank in Country:
264[INFO] Percent of Search Traffic:
265[INFO] Percent of Unique Visits:
266[INFO] Total Sites Linking In:
267[*] Total Sites
268[INFO] Useful links related to www.mercadopublico.cl - 206.48.140.40:
269[*] https://www.virustotal.com/pt/ip-address/206.48.140.40/information/
270[*] https://www.hybrid-analysis.com/search?host=206.48.140.40
271[*] https://www.shodan.io/host/206.48.140.40
272[*] https://www.senderbase.org/lookup/?search_string=206.48.140.40
273[*] https://www.alienvault.com/open-threat-exchange/ip/206.48.140.40
274[*] http://pastebin.com/search?q=206.48.140.40
275[*] http://urlquery.net/search.php?q=206.48.140.40
276[*] http://www.alexa.com/siteinfo/www.mercadopublico.cl
277[*] http://www.google.com/safebrowsing/diagnostic?site=www.mercadopublico.cl
278[*] https://censys.io/ipv4/206.48.140.40
279[*] https://www.abuseipdb.com/check/206.48.140.40
280[*] https://urlscan.io/search/#206.48.140.40
281[*] https://github.com/search?q=206.48.140.40&type=Code
282[INFO] Useful links related to AS5511 - 206.48.0.0/16:
283[*] http://www.google.com/safebrowsing/diagnostic?site=AS:5511
284[*] https://www.senderbase.org/lookup/?search_string=206.48.0.0/16
285[*] http://bgp.he.net/AS5511
286[*] https://stat.ripe.net/AS5511
287[INFO] Date: 28/02/20 | Time: 18:09:21
288[INFO] Total time: 1 minute(s) and 50 second(s)
289#####################################################################################################################################
290Trying "mercadopublico.cl"
291;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53483
292;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 2
293
294;; QUESTION SECTION:
295;mercadopublico.cl. IN ANY
296
297;; ANSWER SECTION:
298mercadopublico.cl. 1800 IN TXT "_globalsign-domain-verification=fniHNrOzjG1tSWFwGOW1WnS3SQLCd4kNCdNSRrfvpT"
299mercadopublico.cl. 1800 IN TXT "globalsign-domain-verification=fniHNrOzjG1tSWFwGOW1WnS3SQLCd4kNCdNSRrfvpT"
300mercadopublico.cl. 1800 IN TXT "bebfffed-7d84-4811-8b33-9170c8e79a99"
301mercadopublico.cl. 1800 IN TXT "v=spf1 ip4:206.48.140.82 mx ~all"
302mercadopublico.cl. 1800 IN MX 10 mx1.mercadopublico.cl.
303mercadopublico.cl. 1800 IN SOA ns1.mercadopublico.cl. hostmaster. 2019092754 900 600 86400 1800
304mercadopublico.cl. 1800 IN NS ns1.mercadopublico.cl.
305mercadopublico.cl. 1800 IN NS ns2.mercadopublico.cl.
306
307;; ADDITIONAL SECTION:
308ns1.mercadopublico.cl. 3099 IN A 206.48.140.82
309ns2.mercadopublico.cl. 3099 IN A 206.48.140.83
310
311Received 436 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 167 ms
312#####################################################################################################################################
313; <<>> DiG 9.11.14-3-Debian <<>> +trace mercadopublico.cl any
314;; global options: +cmd
315. 38195 IN NS k.root-servers.net.
316. 38195 IN NS d.root-servers.net.
317. 38195 IN NS f.root-servers.net.
318. 38195 IN NS m.root-servers.net.
319. 38195 IN NS l.root-servers.net.
320. 38195 IN NS i.root-servers.net.
321. 38195 IN NS g.root-servers.net.
322. 38195 IN NS c.root-servers.net.
323. 38195 IN NS j.root-servers.net.
324. 38195 IN NS h.root-servers.net.
325. 38195 IN NS a.root-servers.net.
326. 38195 IN NS e.root-servers.net.
327. 38195 IN NS b.root-servers.net.
328. 38195 IN RRSIG NS 8 0 518400 20200312170000 20200228160000 33853 . udYY8Pc/ETXD5GcrBffyyPEEB1gTP190SPNqRuBvIkIbPE6G8IHsuS7T rNofE3TL9qaK03OBH2UVVS8xe18oK381XiAQ7+DuawqNI0ztgsOHDTEB 4Da7ghI04yfUHYDzL1jBRm4VJPwUHphJAc9+0ey97784hRZkS2hvq13e Vy7kGqo5zPqFbU6djXhCF8hDNn/mIoshtci9aRxr8ucECPns5dRykpB3 LC8F4O9nOtnX9BS/5gHpFjLPwGu1PqdzsL0sdRX+CTOH6owdhvJETyfl w0ickVy6WCjsoYcXyQf0luzg8lDeQIAc5woIQstp4N8SI//A+HYZkY6n 4vz46w==
329;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 204 ms
330
331cl. 172800 IN NS a.nic.cl.
332cl. 172800 IN NS b.nic.cl.
333cl. 172800 IN NS c.nic.cl.
334cl. 172800 IN NS cl1.dnsnode.net.
335cl. 172800 IN NS cl-ns.anycast.pch.net.
336cl. 172800 IN NS cl1-tld.d-zone.ca.
337cl. 172800 IN NS cl2-tld.d-zone.ca.
338cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
339cl. 86400 IN RRSIG DS 8 1 86400 20200312210000 20200228200000 33853 . MSRA7YcRVXOA+EwCxHp1o2fZDzqs/bgRPG7PMHdNYyCilDr3VRdWPHHx N1JswqEe7aAyhL36Y5zNH4XEGDIuiqGXvP2gj4py+GGTbmkLtQZ06B8I ZDDCJ0uppESHUQNwMMy4fMQNuWazVipGbPBMlvC3EDyDyVdAtN89CPRE Qb4aHHYjX+q0GaEt99n5c8pw5UblmloZedZKpo1m5QM4LNpDmk5dzy/B +RH5LTL1FSEJCepiZM1RXj2b3UjGeNzDGaHhs9dxxwKOMGtnqmKER2gr bQ8nvPZWYj6hUFOuVTdsMkSskcVT19yQNPQ60mBzrRPCaNfHIDUNYxIw rt1v7Q==
340;; Received 827 bytes from 199.7.83.42#53(l.root-servers.net) in 181 ms
341
342mercadopublico.cl. 3600 IN NS ns1.mercadopublico.cl.
343mercadopublico.cl. 3600 IN NS ns2.mercadopublico.cl.
344qpmshennmlkkd1kg1ncol4ogqf5g3gsi.cl. 900 IN NSEC3 1 1 2 05320594F252489EFF8BE62F4D5DCDDB QSOI55U8SQE4ONOK6MJS9UJ3NBDM1BB1 NS SOA TXT RRSIG DNSKEY NSEC3PARAM
345qpmshennmlkkd1kg1ncol4ogqf5g3gsi.cl. 900 IN RRSIG NSEC3 8 2 900 20200413022628 20200228220023 24384 cl. UAwQRTYDnoZkZmAxuO7EaSiFIcfCEjuMvwMlU314CPdAh7xe9lxUftNn awp5QvOrk5Eapne76pOXcgJa2c2vdPzvdRzmxIoZbqiyMyrckyY3VfxB zUJ7kQMPr6beccB8AN3YGyvgv2E4KcpiqgJF7AtADruWmCIbSNUsDcVr Ohk=
34649po6qq75bde8qmt43ohraa7qc15bbbc.cl. 900 IN NSEC3 1 1 2 05320594F252489EFF8BE62F4D5DCDDB 4AHG7F8D5VBFV2UK4V1H1JF8UF5D385P NS DS RRSIG
34749po6qq75bde8qmt43ohraa7qc15bbbc.cl. 900 IN RRSIG NSEC3 8 2 900 20200409121610 20200228220023 24384 cl. xH5x0ZwmCIMC2TNcgd1qLsWVO8z6CiwYT3pu0SOstf6uV7HssLykBEsQ LjmkzLjuGaQAUqca1SmYzDhuctIC2kJUEVrVNPpFwkXrWK4V59uRtJXA T4RPAzX6cLmdwoGGYNS2NIuSPDBmEsjMZwoMsOHHbRtz+baoYfaljQTa CFo=
348;; Received 629 bytes from 200.7.4.7#53(b.nic.cl) in 169 ms
349
350;; Received 58 bytes from 206.48.140.82#53(ns1.mercadopublico.cl) in 370 ms
351#####################################################################################################################################
352[*] Performing General Enumeration of Domain: mercadopublico.cl
353[-] DNSSEC is not configured for mercadopublico.cl
354[*] SOA ns1.mercadopublico.cl 206.48.140.82
355[*] NS ns1.mercadopublico.cl 206.48.140.82
356[-] Recursion enabled on NS Server 206.48.140.82
357[*] Bind Version for 206.48.140.82 Microsoft DNS 6.1.7601 (1DB15F75)
358[*] NS ns2.mercadopublico.cl 206.48.140.83
359[-] Recursion enabled on NS Server 206.48.140.83
360[*] Bind Version for 206.48.140.83 Microsoft DNS 6.1.7601 (1DB15F75)
361[*] MX mx1.mercadopublico.cl 190.96.72.12
362[*] TXT mercadopublico.cl globalsign-domain-verification=fniHNrOzjG1tSWFwGOW1WnS3SQLCd4kNCdNSRrfvpT
363[*] TXT mercadopublico.cl v=spf1 ip4:206.48.140.82 mx ~all
364[*] TXT mercadopublico.cl _globalsign-domain-verification=fniHNrOzjG1tSWFwGOW1WnS3SQLCd4kNCdNSRrfvpT
365[*] TXT mercadopublico.cl bebfffed-7d84-4811-8b33-9170c8e79a99
366[*] Enumerating SRV Records
367[-] No SRV Records Found for mercadopublico.cl
368[+] 0 Records Found
369#####################################################################################################################################
370
371 AVAILABLE PLUGINS
372 -----------------
373
374 EarlyDataPlugin
375 HeartbleedPlugin
376 RobotPlugin
377 OpenSslCipherSuitesPlugin
378 OpenSslCcsInjectionPlugin
379 SessionResumptionPlugin
380 SessionRenegotiationPlugin
381 CertificateInfoPlugin
382 CompressionPlugin
383 FallbackScsvPlugin
384 HttpHeadersPlugin
385
386
387
388 CHECKING HOST(S) AVAILABILITY
389 -----------------------------
390
391 206.48.140.40:443 => 206.48.140.40
392
393
394
395
396 SCAN RESULTS FOR 206.48.140.40:443 - 206.48.140.40
397 --------------------------------------------------
398
399 * TLSV1_3 Cipher Suites:
400 Server rejected all cipher suites.
401
402 * OpenSSL Heartbleed:
403 OK - Not vulnerable to Heartbleed
404
405 * Certificate Information:
406 Content
407 SHA1 Fingerprint: 12dccbce3241d39931d99dcb0f470b5f08356a3d
408 Common Name: *.mercadopublico.cl
409 Issuer: Trustwave Organization Validation SHA256 CA, Level 1
410 Serial Number: 156998563397449775800187407813451756065886050
411 Not Before: 2019-10-01 21:07:13
412 Not After: 2021-09-30 03:07:13
413 Signature Algorithm: sha256
414 Public Key Algorithm: RSA
415 Key Size: 2048
416 Exponent: 65537 (0x10001)
417 DNS Subject Alternative Names: ['*.mercadopublico.cl', 'mercadopublico.cl']
418
419 Trust
420 Hostname Validation: FAILED - Certificate does NOT match 206.48.140.40
421 Android CA Store (9.0.0_r9): OK - Certificate is trusted
422 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
423 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
424 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
425 Windows CA Store (2019-05-27): OK - Certificate is trusted
426 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
427 Received Chain: *.mercadopublico.cl --> Trustwave Organization Validation SHA256 CA, Level 1
428 Verified Chain: *.mercadopublico.cl --> Trustwave Organization Validation SHA256 CA, Level 1 --> SecureTrust CA
429 Received Chain Contains Anchor: OK - Anchor certificate not sent
430 Received Chain Order: OK - Order is valid
431 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
432
433 Extensions
434 OCSP Must-Staple: NOT SUPPORTED - Extension not found
435 Certificate Transparency: OK - 3 SCTs included
436
437 OCSP Stapling
438 NOT SUPPORTED - Server did not send back an OCSP response
439
440 * OpenSSL CCS Injection:
441 OK - Not vulnerable to OpenSSL CCS injection
442
443 * TLSV1_1 Cipher Suites:
444 Forward Secrecy OK - Supported
445 RC4 INSECURE - Supported
446
447 Preferred:
448 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
449 Accepted:
450 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 200 OK
451 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 200 OK
452 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
453 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
454 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
455 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
456 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
457 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
458 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
459
460 * TLSV1 Cipher Suites:
461 Forward Secrecy OK - Supported
462 RC4 INSECURE - Supported
463
464 Preferred:
465 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
466 Accepted:
467 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 200 OK
468 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 200 OK
469 TLS_RSA_WITH_DES_CBC_SHA 56 bits HTTP 200 OK
470 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
471 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
472 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
473 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
474 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
475 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
476 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
477
478 * TLS 1.2 Session Resumption Support:
479 With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
480 With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
481
482 * TLSV1_2 Cipher Suites:
483 Forward Secrecy OK - Supported
484 RC4 INSECURE - Supported
485
486 Preferred:
487 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
488 Accepted:
489 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 200 OK
490 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 200 OK
491 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
492 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
493 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
494 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
495 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
496 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
497 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
498 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
499 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
500 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
501 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
502 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
503 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
504 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
505 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
506 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
507 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
508 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
509
510 * Session Renegotiation:
511 Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
512 Secure Renegotiation: OK - Supported
513
514 * Deflate Compression:
515 OK - Compression disabled
516
517 * Downgrade Attacks:
518 TLS_FALLBACK_SCSV: OK - Supported
519
520 * SSLV2 Cipher Suites:
521 Server rejected all cipher suites.
522
523 * SSLV3 Cipher Suites:
524 Forward Secrecy OK - Supported
525 RC4 INSECURE - Supported
526
527 Preferred:
528 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
529 Accepted:
530 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 200 OK
531 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 200 OK
532 TLS_RSA_WITH_DES_CBC_SHA 56 bits HTTP 200 OK
533 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
534 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
535 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
536 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
537 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
538
539 * ROBOT Attack:
540 OK - Not vulnerable
541
542
543 SCAN COMPLETED IN 56.02 S
544 -------------------------
545#####################################################################################################################################
546traceroute to www.mercadopublico.cl (206.48.140.40), 30 hops max, 60 byte packets
547 1 _gateway (10.203.32.1) 130.359 ms 130.330 ms 135.279 ms
548 2 * * *
549 3 te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49) 135.606 ms 135.589 ms 135.574 ms
550 4 be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249) 135.510 ms 135.377 ms 135.377 ms
551 5 be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190) 140.828 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194) 140.956 ms 140.955 ms
552 6 be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105) 159.875 ms 158.784 ms 158.691 ms
553 7 be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205) 167.891 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209) 167.809 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205) 171.306 ms
554 8 be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93) 241.877 ms 242.180 ms be12266.ccr42.par01.atlas.cogentco.com (154.54.56.174) 244.137 ms
555 9 be2099.ccr31.bos01.atlas.cogentco.com (154.54.82.34) 242.714 ms be2101.ccr32.bos01.atlas.cogentco.com (154.54.82.38) 239.891 ms be2317.ccr41.jfk02.atlas.cogentco.com (154.54.30.185) 237.470 ms
55610 be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126) 246.228 ms 248.337 ms 240.761 ms
55711 38.104.72.218 (38.104.72.218) 368.918 ms be3362.ccr31.jfk04.atlas.cogentco.com (154.54.3.10) 237.595 ms 241.162 ms
55812 38.104.72.218 (38.104.72.218) 372.348 ms 190.208.9.30 (190.208.9.30) 359.192 ms 38.104.72.218 (38.104.72.218) 371.516 ms
55913 190.208.4.50 (190.208.4.50) 360.430 ms 190.208.9.30 (190.208.9.30) 364.498 ms 190.208.4.50 (190.208.4.50) 368.296 ms
56014 190.208.4.50 (190.208.4.50) 360.059 ms 364.338 ms 366.039 ms
561#####################################################################################################################################
562Domains still to check: 1
563 Checking if the hostname mercadopublico.cl. given is in fact a domain...
564
565Analyzing domain: mercadopublico.cl.
566 Checking NameServers using system default resolver...
567 IP: 206.48.140.83 (United States)
568 HostName: ns2.mercadopublico.cl Type: NS
569 IP: 206.48.140.82 (United States)
570 HostName: ns1.mercadopublico.cl Type: NS
571 HostName: smtp.mercadopublico.cl Type: PTR
572
573 Checking MailServers using system default resolver...
574 IP: 190.96.72.12 (Chile)
575 HostName: mx1.mercadopublico.cl Type: MX
576 HostName: correo.chilecompra.cl Type: PTR
577
578 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
579 No zone transfer found on nameserver 206.48.140.82
580 No zone transfer found on nameserver 206.48.140.83
581
582 Checking SPF record...
583
584 Checking 192 most common hostnames using system default resolver...
585 IP: 206.48.140.40 (United States)
586 HostName: www.mercadopublico.cl. Type: A
587 IP: 206.48.140.82 (United States)
588 HostName: ns1.mercadopublico.cl Type: NS
589 HostName: smtp.mercadopublico.cl Type: PTR
590 Type: SPF
591 HostName: ns1.mercadopublico.cl. Type: A
592 IP: 206.48.140.83 (United States)
593 HostName: ns2.mercadopublico.cl Type: NS
594 HostName: ns2.mercadopublico.cl. Type: A
595 IP: 206.48.140.82 (United States)
596 HostName: ns1.mercadopublico.cl Type: NS
597 HostName: smtp.mercadopublico.cl Type: PTR
598 Type: SPF
599 HostName: ns1.mercadopublico.cl. Type: A
600 HostName: smtp.mercadopublico.cl. Type: A
601
602 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
603 Checking netblock 206.48.140.0
604 Checking netblock 190.96.72.0
605
606 Searching for mercadopublico.cl. emails in Google
607
608 Checking 4 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
609 Host 206.48.140.82 is up (udp-response ttl 107)
610 Host 206.48.140.83 is up (udp-response ttl 108)
611 Host 206.48.140.40 is up (syn-ack ttl 107)
612 Host 190.96.72.12 is up (host-unreach ttl 235)
613
614 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
615 Scanning ip 206.48.140.82 (smtp.mercadopublico.cl.):
616 53/tcp open domain syn-ack ttl 107 Microsoft DNS 6.1.7601 (1DB15F75) (Windows Server 2008 R2 SP1)
617 | dns-nsid:
618 |_ bind.version: Microsoft DNS 6.1.7601 (1DB15F75)
619 80/tcp open http syn-ack ttl 107 Microsoft IIS httpd 7.5
620 | http-methods:
621 | Supported Methods: OPTIONS TRACE GET HEAD POST
622 |_ Potentially risky methods: TRACE
623 |_http-server-header: Microsoft-IIS/7.5
624 |_http-title: Site doesn't have a title.
625 Device type: general purpose|WAP
626 Running (JUST GUESSING): Microsoft Windows 2008|7|Vista|8.1|2012 (92%), FreeBSD 6.X (87%), AirSpan embedded (86%)
627 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
628 Scanning ip 206.48.140.83 (ns2.mercadopublico.cl.):
629 53/tcp open domain syn-ack ttl 107 Microsoft DNS 6.1.7601 (1DB15F75) (Windows Server 2008 R2 SP1)
630 | dns-nsid:
631 |_ bind.version: Microsoft DNS 6.1.7601 (1DB15F75)
632 80/tcp open http syn-ack ttl 107 Microsoft IIS httpd 7.5
633 | http-methods:
634 | Supported Methods: OPTIONS TRACE GET HEAD POST
635 |_ Potentially risky methods: TRACE
636 |_http-server-header: Microsoft-IIS/7.5
637 |_http-title: Dirección de ChileCompra
638 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
639 Scanning ip 206.48.140.40 (www.mercadopublico.cl.):
640 80/tcp open http syn-ack ttl 107 Microsoft IIS httpd 7.5
641 |_http-favicon: Unknown favicon MD5: D6C129C186632CD8C728375F6F34D191
642 | http-methods:
643 | Supported Methods: OPTIONS TRACE GET HEAD POST
644 |_ Potentially risky methods: TRACE
645 |_http-server-header: Microsoft-IIS/7.5
646 |_http-title: Site doesn't have a title (text/html).
647 443/tcp open ssl/http syn-ack ttl 108 Microsoft IIS httpd 7.5
648 | ssl-cert: Subject: commonName=*.mercadopublico.cl/organizationName=Direccion de Compras y Contratacion Publica/stateOrProvinceName=Santiago/countryName=CL
649 | Subject Alternative Name: DNS:*.mercadopublico.cl, DNS:mercadopublico.cl
650 | Issuer: commonName=Trustwave Organization Validation SHA256 CA, Level 1/organizationName=Trustwave Holdings, Inc./stateOrProvinceName=Illinois/countryName=US
651 | Public Key type: rsa
652 | Public Key bits: 2048
653 | Signature Algorithm: sha256WithRSAEncryption
654 | Not valid before: 2019-10-01T21:07:13
655 | Not valid after: 2021-09-30T03:07:13
656 | MD5: 0222 7f27 987b dace f9ec 8a56 467c a2a4
657 |_SHA-1: 12dc cbce 3241 d399 31d9 9dcb 0f47 0b5f 0835 6a3d
658 |_ssl-date: TLS randomness does not represent time
659 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
660 Scanning ip 190.96.72.12 (correo.chilecompra.cl (PTR)):
661 WebCrawling domain's web servers... up to 50 max links.
662
663 + URL to crawl: http://smtp.mercadopublico.cl.
664 + Date: 2020-02-28
665
666 + Crawling URL: http://smtp.mercadopublico.cl.:
667 + Links:
668 + Crawling http://smtp.mercadopublico.cl. (400 Bad Request)
669 + Searching for directories...
670 + Searching open folders...
671
672
673 + URL to crawl: http://ns1.mercadopublico.cl.
674 + Date: 2020-02-28
675
676 + Crawling URL: http://ns1.mercadopublico.cl.:
677 + Links:
678 + Crawling http://ns1.mercadopublico.cl. (400 Bad Request)
679 + Searching for directories...
680 + Searching open folders...
681
682
683 + URL to crawl: http://ns1.mercadopublico.cl
684 + Date: 2020-02-28
685
686 + Crawling URL: http://ns1.mercadopublico.cl:
687 + Links:
688 + Crawling http://ns1.mercadopublico.cl (404 Not Found)
689 + Searching for directories...
690 + Searching open folders...
691
692
693 + URL to crawl: http://ns2.mercadopublico.cl
694 + Date: 2020-02-28
695
696 + Crawling URL: http://ns2.mercadopublico.cl:
697 + Links:
698 + Crawling http://ns2.mercadopublico.cl
699 + Crawling http://ns2.mercadopublico.cl/
700 + Crawling http://ns2.mercadopublico.cl/noticias/2008-07-29-usabilidad_cp.html (404 Not Found)
701 + Crawling http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_1.wmv (404 Not Found)
702 + Crawling http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_2.wmv (404 Not Found)
703 + Crawling http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_3.wmv (404 Not Found)
704 + Crawling http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_4.wmv (404 Not Found)
705 + Crawling http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_5.wmv (404 Not Found)
706 + Crawling http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_6.wmv (404 Not Found)
707 + Crawling http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_7.wmv (404 Not Found)
708 + Searching for directories...
709 - Found: http://ns2.mercadopublico.cl/noticias/
710 - Found: http://ns2.mercadopublico.cl/Reuniones_Informativas/
711 - Found: http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/
712 - Found: http://ns2.mercadopublico.cl/documentos/
713 + Searching open folders...
714 - http://ns2.mercadopublico.cl/noticias/ (404 Not Found)
715 - http://ns2.mercadopublico.cl/Reuniones_Informativas/ (404 Not Found)
716 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/ (404 Not Found)
717 - http://ns2.mercadopublico.cl/documentos/ (404 Not Found)
718 + Crawl finished successfully.
719----------------------------------------------------------------------
720Summary of http://http://ns2.mercadopublico.cl
721----------------------------------------------------------------------
722+ Links crawled:
723 - http://ns2.mercadopublico.cl
724 - http://ns2.mercadopublico.cl/
725 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_1.wmv (404 Not Found)
726 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_2.wmv (404 Not Found)
727 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_3.wmv (404 Not Found)
728 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_4.wmv (404 Not Found)
729 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_5.wmv (404 Not Found)
730 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_6.wmv (404 Not Found)
731 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/impresos_parte_7.wmv (404 Not Found)
732 - http://ns2.mercadopublico.cl/noticias/2008-07-29-usabilidad_cp.html (404 Not Found)
733 Total links crawled: 10
734
735+ Links to files found:
736 - http://ns2.mercadopublico.cl/documentos/BdeLicitacion_ServiciosdeImpresion.pdf
737 - http://ns2.mercadopublico.cl/documentos/Simulacion_de_Oferta.pdf
738 Total links to files: 2
739
740+ Externals links found:
741 - http://200.55.222.219/aylegal/formularios_ASP/paso2.asp?T=2
742 - http://foros.chilecompra.cl/forolegal/
743 - http://foros.chilecompra.cl/mail/portal2008/secciones/legal/manualesyguias.html
744 - http://www.chilecompra.cl/secciones/chilecompra_express/images/impresos.jpg
745 - http://www.google.com/coop/cse/brand?form=searchbox_016144822804721184437%3Afwo87oshoee&lang=es
746 Total external links: 5
747
748+ Email addresses found:
749 Total email address found: 0
750
751+ Directories found:
752 - http://ns2.mercadopublico.cl/Reuniones_Informativas/ (404 Not Found)
753 - http://ns2.mercadopublico.cl/Reuniones_Informativas/Impresos/ (404 Not Found)
754 - http://ns2.mercadopublico.cl/documentos/ (404 Not Found)
755 - http://ns2.mercadopublico.cl/noticias/ (404 Not Found)
756 Total directories: 4
757
758+ Directory indexing found:
759 Total directories with indexing: 0
760
761----------------------------------------------------------------------
762
763
764 + URL to crawl: http://ns2.mercadopublico.cl.
765 + Date: 2020-02-28
766
767 + Crawling URL: http://ns2.mercadopublico.cl.:
768 + Links:
769 + Crawling http://ns2.mercadopublico.cl. (400 Bad Request)
770 + Searching for directories...
771 + Searching open folders...
772
773
774 + URL to crawl: http://www.mercadopublico.cl.
775 + Date: 2020-02-28
776
777 + Crawling URL: http://www.mercadopublico.cl.:
778 + Links:
779 + Crawling http://www.mercadopublico.cl. (400 Bad Request)
780 + Searching for directories...
781 + Searching open folders...
782
783
784 + URL to crawl: https://www.mercadopublico.cl.
785 + Date: 2020-02-28
786
787 + Crawling URL: https://www.mercadopublico.cl.:
788 + Links:
789 + Crawling https://www.mercadopublico.cl. ([SSL: WRONG_SIGNATURE_TYPE] wrong signature type (_ssl.c:727))
790 + Searching for directories...
791 + Searching open folders...
792
793--Finished--
794Summary information for domain mercadopublico.cl.
795-----------------------------------------
796
797 Domain Ips Information:
798 IP: 206.48.140.82
799 HostName: ns1.mercadopublico.cl Type: NS
800 HostName: smtp.mercadopublico.cl Type: PTR
801 Type: SPF
802 HostName: ns1.mercadopublico.cl. Type: A
803 HostName: smtp.mercadopublico.cl. Type: A
804 Country: United States
805 Is Active: True (udp-response ttl 107)
806 Port: 53/tcp open domain syn-ack ttl 107 Microsoft DNS 6.1.7601 (1DB15F75) (Windows Server 2008 R2 SP1)
807 Script Info: | dns-nsid:
808 Script Info: |_ bind.version: Microsoft DNS 6.1.7601 (1DB15F75)
809 Port: 80/tcp open http syn-ack ttl 107 Microsoft IIS httpd 7.5
810 Script Info: | http-methods:
811 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
812 Script Info: |_ Potentially risky methods: TRACE
813 Script Info: |_http-server-header: Microsoft-IIS/7.5
814 Script Info: |_http-title: Site doesn't have a title.
815 Script Info: Device type: general purpose|WAP
816 Script Info: Running (JUST GUESSING): Microsoft Windows 2008|7|Vista|8.1|2012 (92%), FreeBSD 6.X (87%), AirSpan embedded (86%)
817 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
818 IP: 206.48.140.83
819 HostName: ns2.mercadopublico.cl Type: NS
820 HostName: ns2.mercadopublico.cl. Type: A
821 Country: United States
822 Is Active: True (udp-response ttl 108)
823 Port: 53/tcp open domain syn-ack ttl 107 Microsoft DNS 6.1.7601 (1DB15F75) (Windows Server 2008 R2 SP1)
824 Script Info: | dns-nsid:
825 Script Info: |_ bind.version: Microsoft DNS 6.1.7601 (1DB15F75)
826 Port: 80/tcp open http syn-ack ttl 107 Microsoft IIS httpd 7.5
827 Script Info: | http-methods:
828 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
829 Script Info: |_ Potentially risky methods: TRACE
830 Script Info: |_http-server-header: Microsoft-IIS/7.5
831 Script Info: |_http-title: Dirección de ChileCompra
832 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
833 IP: 206.48.140.40
834 HostName: www.mercadopublico.cl. Type: A
835 Country: United States
836 Is Active: True (syn-ack ttl 107)
837 Port: 80/tcp open http syn-ack ttl 107 Microsoft IIS httpd 7.5
838 Script Info: |_http-favicon: Unknown favicon MD5: D6C129C186632CD8C728375F6F34D191
839 Script Info: | http-methods:
840 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
841 Script Info: |_ Potentially risky methods: TRACE
842 Script Info: |_http-server-header: Microsoft-IIS/7.5
843 Script Info: |_http-title: Site doesn't have a title (text/html).
844 Port: 443/tcp open ssl/http syn-ack ttl 108 Microsoft IIS httpd 7.5
845 Script Info: | ssl-cert: Subject: commonName=*.mercadopublico.cl/organizationName=Direccion de Compras y Contratacion Publica/stateOrProvinceName=Santiago/countryName=CL
846 Script Info: | Subject Alternative Name: DNS:*.mercadopublico.cl, DNS:mercadopublico.cl
847 Script Info: | Issuer: commonName=Trustwave Organization Validation SHA256 CA, Level 1/organizationName=Trustwave Holdings, Inc./stateOrProvinceName=Illinois/countryName=US
848 Script Info: | Public Key type: rsa
849 Script Info: | Public Key bits: 2048
850 Script Info: | Signature Algorithm: sha256WithRSAEncryption
851 Script Info: | Not valid before: 2019-10-01T21:07:13
852 Script Info: | Not valid after: 2021-09-30T03:07:13
853 Script Info: | MD5: 0222 7f27 987b dace f9ec 8a56 467c a2a4
854 Script Info: |_SHA-1: 12dc cbce 3241 d399 31d9 9dcb 0f47 0b5f 0835 6a3d
855 Script Info: |_ssl-date: TLS randomness does not represent time
856 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
857 IP: 190.96.72.12
858 HostName: mx1.mercadopublico.cl Type: MX
859 HostName: correo.chilecompra.cl Type: PTR
860 Country: Chile
861 Is Active: True (host-unreach ttl 235)
862
863--------------End Summary --------------
864-----------------------------------------
865######################################################################################################################################
866----- mercadopublico.cl -----
867
868
869Host's addresses:
870__________________
871
872
873
874Name Servers:
875______________
876
877ns2.mercadopublico.cl. 2186 IN A 206.48.140.83
878ns1.mercadopublico.cl. 3600 IN A 206.48.140.82
879
880
881Mail (MX) Servers:
882___________________
883
884mx1.mercadopublico.cl. 1800 IN A 190.96.72.12
885
886
887Trying Zone Transfers and getting Bind Versions:
888_________________________________________________
889
890
891Trying Zone Transfer for mercadopublico.cl on ns1.mercadopublico.cl ...
892AXFR record query failed: REFUSED
893
894Trying Zone Transfer for mercadopublico.cl on ns2.mercadopublico.cl ...
895AXFR record query failed: REFUSED
896
897
898Scraping mercadopublico.cl subdomains from Google:
899___________________________________________________
900
901
902 ---- Google search page: 1 ----
903
904 webportal
905 pre
906
907 ---- Google search page: 2 ----
908
909 webportal
910 webportal
911 webportal
912 webportal
913
914 ---- Google search page: 3 ----
915
916 testqa
917 webportal
918 webportal
919 webportal
920 webportal
921 webportal
922 webportal
923 webportal
924 webportal
925
926
927Google Results:
928________________
929
930webportal.mercadopublico.cl. 1800 IN A 198.41.36.203
931testqa.mercadopublico.cl. 1800 IN A 206.48.140.90
932pre.mercadopublico.cl. 1800 IN A 206.48.140.93
933
934
935Brute forcing with /usr/share/dnsenum/dns.txt:
936_______________________________________________
937
938mx1.mercadopublico.cl. 1247 IN A 190.96.72.12
939ns1.mercadopublico.cl. 3351 IN A 206.48.140.82
940ns2.mercadopublico.cl. 2078 IN A 206.48.140.83
941smtp.mercadopublico.cl. 1800 IN A 206.48.140.82
942test2.mercadopublico.cl. 1800 IN A 10.34.71.253
943test3.mercadopublico.cl. 1800 IN A 10.34.71.253
944web2.mercadopublico.cl. 1800 IN A 206.48.140.112
945www.mercadopublico.cl. 666 IN A 206.48.140.40
946
947
948Launching Whois Queries:
949_________________________
950
951 whois ip result: 206.48.140.0 -> 206.48.0.0/16
952 whois ip result: 198.41.36.0 -> 198.41.32.0/21
953 whois ip result: 190.96.72.0 -> 190.96.72.0/24
954
955
956mercadopublico.cl_________________
957
958 198.41.32.0/21
959 190.96.72.0/24
960 206.48.0.0/16
961
962
963Performing reverse lookup on 67840 ip addresses:
964_________________________________________________
965
96611.72.96.190.in-addr.arpa. 3600 IN PTR mp2.mercadopublico.cl.
96711.72.96.190.in-addr.arpa. 3600 IN PTR manualesyguias.mercadopublico.cl.
96812.72.96.190.in-addr.arpa. 3600 IN PTR mx1.mercadopublico.cl.
969#####################################################################################################################################
970Source:
971whois.arin.net
972IP Address:
973206.48.140.40
974Name:
975EQUANT-BLK1
976Handle:
977NET-206-48-0-0-1
978Registration Date:
9796/16/95
980Range:
981206.48.0.0-206.48.255.255
982Org:
983Equant, Inc.
984Org Handle:
985EQUANT-1
986Address:
98713775 McLearen Road
988City:
989Oak Hill
990State/Province:
991VA
992Postal Code:
99320171
994Country:
995United States
996Name Servers:
997####################################################################################################################################
998URLCrazy Domain Report
999Domain : www.mercadopublico.cl
1000Keyboard : qwerty
1001At : 2020-02-28 18:15:49 -0500
1002
1003# Please wait. 244 hostnames to process
1004
1005Typo Type Typo DNS-A CC-A DNS-MX Extn
1006------------------------------------------------------------------------------------------------------------
1007Character Omission ww.mercadopublico.cl ? cl
1008Character Omission www.ercadopublico.cl ? cl
1009Character Omission www.mecadopublico.cl ? cl
1010Character Omission www.meradopublico.cl ? cl
1011Character Omission www.mercadopblico.cl ? cl
1012Character Omission www.mercadopubico.cl ? cl
1013Character Omission www.mercadopublco.cl ? cl
1014Character Omission www.mercadopublic.cl ? cl
1015Character Omission www.mercadopublio.cl ? cl
1016Character Omission www.mercadopulico.cl ? cl
1017Character Omission www.mercadoublico.cl ? cl
1018Character Omission www.mercadpublico.cl ? cl
1019Character Omission www.mercaopublico.cl ? cl
1020Character Omission www.mercdopublico.cl ? cl
1021Character Omission www.mrcadopublico.cl ? cl
1022Character Omission wwwmercadopublico.cl ? cl
1023Character Repeat www.meercadopublico.cl ? cl
1024Character Repeat www.mercaadopublico.cl ? cl
1025Character Repeat www.mercaddopublico.cl ? cl
1026Character Repeat www.mercadoopublico.cl ? cl
1027Character Repeat www.mercadoppublico.cl ? cl
1028Character Repeat www.mercadopubblico.cl ? cl
1029Character Repeat www.mercadopublicco.cl ? cl
1030Character Repeat www.mercadopublicoo.cl ? cl
1031Character Repeat www.mercadopubliico.cl ? cl
1032Character Repeat www.mercadopubllico.cl ? cl
1033Character Repeat www.mercadopuublico.cl ? cl
1034Character Repeat www.merccadopublico.cl ? cl
1035Character Repeat www.merrcadopublico.cl ? cl
1036Character Repeat www.mmercadopublico.cl ? cl
1037Character Repeat wwww.mercadopublico.cl ? cl
1038Character Swap ww.wmercadopublico.cl ? cl
1039Character Swap www.emrcadopublico.cl ? cl
1040Character Swap www.mecradopublico.cl ? cl
1041Character Swap www.meracdopublico.cl ? cl
1042Character Swap www.mercadopbulico.cl ? cl
1043Character Swap www.mercadopubilco.cl ? cl
1044Character Swap www.mercadopublcio.cl ? cl
1045Character Swap www.mercadopublico.lc ? lc
1046Character Swap www.mercadopublioc.cl ? cl
1047Character Swap www.mercadopulbico.cl ? cl
1048Character Swap www.mercadoupblico.cl ? cl
1049Character Swap www.mercadpoublico.cl ? cl
1050Character Swap www.mercaodpublico.cl ? cl
1051Character Swap www.mercdaopublico.cl ? cl
1052Character Swap www.mrecadopublico.cl ? cl
1053Character Swap wwwm.ercadopublico.cl ? cl
1054Character Replacement eww.mercadopublico.cl ? cl
1055Character Replacement qww.mercadopublico.cl ? cl
1056Character Replacement wew.mercadopublico.cl ? cl
1057Character Replacement wqw.mercadopublico.cl ? cl
1058Character Replacement wwe.mercadopublico.cl ? cl
1059Character Replacement wwq.mercadopublico.cl ? cl
1060Character Replacement www.meecadopublico.cl ? cl
1061Character Replacement www.mercadipublico.cl ? cl
1062Character Replacement www.mercadooublico.cl ? cl
1063Character Replacement www.mercadopiblico.cl ? cl
1064Character Replacement www.mercadopubkico.cl ? cl
1065Character Replacement www.mercadopublici.cl ? cl
1066Character Replacement www.mercadopublicp.cl ? cl
1067Character Replacement www.mercadopublivo.cl ? cl
1068Character Replacement www.mercadopublixo.cl ? cl
1069Character Replacement www.mercadopubloco.cl ? cl
1070Character Replacement www.mercadopubluco.cl ? cl
1071Character Replacement www.mercadopunlico.cl ? cl
1072Character Replacement www.mercadopuvlico.cl ? cl
1073Character Replacement www.mercadopyblico.cl ? cl
1074Character Replacement www.mercadppublico.cl ? cl
1075Character Replacement www.mercafopublico.cl ? cl
1076Character Replacement www.mercasopublico.cl ? cl
1077Character Replacement www.mercsdopublico.cl ? cl
1078Character Replacement www.mervadopublico.cl ? cl
1079Character Replacement www.merxadopublico.cl ? cl
1080Character Replacement www.metcadopublico.cl ? cl
1081Character Replacement www.mrrcadopublico.cl ? cl
1082Character Replacement www.mwrcadopublico.cl ? cl
1083Character Replacement www.nercadopublico.cl ? cl
1084Double Character Replacement eew.mercadopublico.cl ? cl
1085Double Character Replacement qqw.mercadopublico.cl ? cl
1086Double Character Replacement wee.mercadopublico.cl ? cl
1087Double Character Replacement wqq.mercadopublico.cl ? cl
1088Character Insertion weww.mercadopublico.cl ? cl
1089Character Insertion wqww.mercadopublico.cl ? cl
1090Character Insertion wwew.mercadopublico.cl ? cl
1091Character Insertion wwqw.mercadopublico.cl ? cl
1092Character Insertion www.mercadfopublico.cl ? cl
1093Character Insertion www.mercadoipublico.cl ? cl
1094Character Insertion www.mercadopoublico.cl ? cl
1095Character Insertion www.mercadopublicoi.cl ? cl
1096Character Insertion www.mercadopublicop.cl ? cl
1097Character Insertion www.mercadopublicvo.cl ? cl
1098Character Insertion www.mercadopublicxo.cl ? cl
1099Character Insertion www.mercadopublioco.cl ? cl
1100Character Insertion www.mercadopubliuco.cl ? cl
1101Character Insertion www.mercadopublkico.cl ? cl
1102Character Insertion www.mercadopubnlico.cl ? cl
1103Character Insertion www.mercadopubvlico.cl ? cl
1104Character Insertion www.mercadopuiblico.cl ? cl
1105Character Insertion www.mercadopuyblico.cl ? cl
1106Character Insertion www.mercadsopublico.cl ? cl
1107Character Insertion www.mercasdopublico.cl ? cl
1108Character Insertion www.mercvadopublico.cl ? cl
1109Character Insertion www.mercxadopublico.cl ? cl
1110Character Insertion www.merecadopublico.cl ? cl
1111Character Insertion www.mertcadopublico.cl ? cl
1112Character Insertion www.mewrcadopublico.cl ? cl
1113Character Insertion www.mnercadopublico.cl ? cl
1114Character Insertion wwwe.mercadopublico.cl ? cl
1115Character Insertion wwwq.mercadopublico.cl ? cl
1116Missing Dot wwwwww.mercadopublico.cl ? cl
1117Singular or Pluralise mercadopublico.cl ? mx1.mercadopublico.cl cl
1118Singular or Pluralise mercadopublicos.cl ? cl
1119Vowel Swap www.marcadopublico.cl ? cl
1120Vowel Swap www.mercadapublica.cl ? cl
1121Vowel Swap www.mercadepublice.cl ? cl
1122Vowel Swap www.mercadipublici.cl ? cl
1123Vowel Swap www.mercadopablico.cl ? cl
1124Vowel Swap www.mercadopeblico.cl ? cl
1125Vowel Swap www.mercadopoblico.cl ? cl
1126Vowel Swap www.mercadopublaco.cl ? cl
1127Vowel Swap www.mercadopubleco.cl ? cl
1128Vowel Swap www.mercadupublicu.cl ? cl
1129Vowel Swap www.mercedopublico.cl ? cl
1130Vowel Swap www.mercidopublico.cl ? cl
1131Vowel Swap www.mercodopublico.cl ? cl
1132Vowel Swap www.mercudopublico.cl ? cl
1133Vowel Swap www.mircadopublico.cl ? cl
1134Vowel Swap www.morcadopublico.cl ? cl
1135Vowel Swap www.murcadopublico.cl ? cl
1136Homophones www.mercadewpublico.cl ? cl
1137Homophones www.mercadieupublico.cl ? cl
1138Homophones www.mercadopublayeco.cl ? cl
1139Homophones www.mercadopubleyeco.cl ? cl
1140Homophones www.mercaduepublico.cl ? cl
1141Bit Flipping 7ww.mercadopublico.cl ? cl
1142Bit Flipping gww.mercadopublico.cl ? cl
1143Bit Flipping sww.mercadopublico.cl ? cl
1144Bit Flipping uww.mercadopublico.cl ? cl
1145Bit Flipping vww.mercadopublico.cl ? cl
1146Bit Flipping w7w.mercadopublico.cl ? cl
1147Bit Flipping wgw.mercadopublico.cl ? cl
1148Bit Flipping wsw.mercadopublico.cl ? cl
1149Bit Flipping wuw.mercadopublico.cl ? cl
1150Bit Flipping wvw.mercadopublico.cl ? cl
1151Bit Flipping ww7.mercadopublico.cl ? cl
1152Bit Flipping wwg.mercadopublico.cl ? cl
1153Bit Flipping wws.mercadopublico.cl ? cl
1154Bit Flipping wwu.mercadopublico.cl ? cl
1155Bit Flipping wwv.mercadopublico.cl ? cl
1156Bit Flipping www.-ercadopublico.cl ? cl
1157Bit Flipping www.eercadopublico.cl ? cl
1158Bit Flipping www.iercadopublico.cl ? cl
1159Bit Flipping www.lercadopublico.cl ? cl
1160Bit Flipping www.mdrcadopublico.cl ? cl
1161Bit Flipping www.me2cadopublico.cl ? cl
1162Bit Flipping www.mebcadopublico.cl ? cl
1163Bit Flipping www.mepcadopublico.cl ? cl
1164Bit Flipping www.meraadopublico.cl ? cl
1165Bit Flipping www.merbadopublico.cl ? cl
1166Bit Flipping www.mercadgpublico.cl ? cl
1167Bit Flipping www.mercadkpublico.cl ? cl
1168Bit Flipping www.mercadmpublico.cl ? cl
1169Bit Flipping www.mercadnpublico.cl ? cl
1170Bit Flipping www.mercado0ublico.cl ? cl
1171Bit Flipping www.mercadop5blico.cl ? cl
1172Bit Flipping www.mercadopqblico.cl ? cl
1173Bit Flipping www.mercadoptblico.cl ? cl
1174Bit Flipping www.mercadopubdico.cl ? cl
1175Bit Flipping www.mercadopubhico.cl ? cl
1176Bit Flipping www.mercadopublhco.cl ? cl
1177Bit Flipping www.mercadopubliao.cl ? cl
1178Bit Flipping www.mercadopublibo.cl ? cl
1179Bit Flipping www.mercadopublicg.cl ? cl
1180Bit Flipping www.mercadopublick.cl ? cl
1181Bit Flipping www.mercadopublicm.cl ? cl
1182Bit Flipping www.mercadopublicn.cl ? cl
1183Bit Flipping www.mercadopublico.cd ? cd
1184Bit Flipping www.mercadopublico.ch ? ch
1185Bit Flipping www.mercadopublico.cm ? cm
1186Bit Flipping www.mercadopublico.cn ? cn
1187Bit Flipping www.mercadopublico.gl ? gl
1188Bit Flipping www.mercadopublico.sl ? sl
1189Bit Flipping www.mercadopubligo.cl ? cl
1190Bit Flipping www.mercadopubliko.cl ? cl
1191Bit Flipping www.mercadopubliso.cl ? cl
1192Bit Flipping www.mercadopublkco.cl ? cl
1193Bit Flipping www.mercadopublmco.cl ? cl
1194Bit Flipping www.mercadopublyco.cl ? cl
1195Bit Flipping www.mercadopubmico.cl ? cl
1196Bit Flipping www.mercadopubnico.cl ? cl
1197Bit Flipping www.mercadopuclico.cl ? cl
1198Bit Flipping www.mercadopuflico.cl ? cl
1199Bit Flipping www.mercadopujlico.cl ? cl
1200Bit Flipping www.mercadopurlico.cl ? cl
1201Bit Flipping www.mercadopwblico.cl ? cl
1202Bit Flipping www.mercadoqublico.cl ? cl
1203Bit Flipping www.mercadorublico.cl ? cl
1204Bit Flipping www.mercadotublico.cl ? cl
1205Bit Flipping www.mercadoxublico.cl ? cl
1206Bit Flipping www.mercaeopublico.cl ? cl
1207Bit Flipping www.mercalopublico.cl ? cl
1208Bit Flipping www.mercatopublico.cl ? cl
1209Bit Flipping www.merccdopublico.cl ? cl
1210Bit Flipping www.mercqdopublico.cl ? cl
1211Bit Flipping www.mergadopublico.cl ? cl
1212Bit Flipping www.merkadopublico.cl ? cl
1213Bit Flipping www.mersadopublico.cl ? cl
1214Bit Flipping www.mescadopublico.cl ? cl
1215Bit Flipping www.mevcadopublico.cl ? cl
1216Bit Flipping www.mezcadopublico.cl ? cl
1217Bit Flipping www.mgrcadopublico.cl ? cl
1218Bit Flipping www.mmrcadopublico.cl ? cl
1219Bit Flipping www.oercadopublico.cl ? cl
1220Bit Flipping wwwnmercadopublico.cl ? cl
1221Homoglyphs vvvvvv.mercadopublico.cl ? cl
1222Homoglyphs vvvvw.mercadopublico.cl ? cl
1223Homoglyphs vvwvv.mercadopublico.cl ? cl
1224Homoglyphs vvww.mercadopublico.cl ? cl
1225Homoglyphs wvvvv.mercadopublico.cl ? cl
1226Homoglyphs wvvw.mercadopublico.cl ? cl
1227Homoglyphs wwvv.mercadopublico.cl ? cl
1228Homoglyphs www.mercaclopublico.cl ? cl
1229Homoglyphs www.mercad0public0.cl ? cl
1230Homoglyphs www.mercad0publico.cl ? cl
1231Homoglyphs www.mercadopub1ico.cl ? cl
1232Homoglyphs www.mercadopublic0.cl ? cl
1233Homoglyphs www.mercadopubllco.cl ? cl
1234Homoglyphs www.rnercadopublico.cl ? cl
1235Wrong TLD mercadopublico.ca ? ca
1236Wrong TLD mercadopublico.ch ? ch
1237Wrong TLD mercadopublico.com 103.224.182.245 com
1238Wrong TLD mercadopublico.de ? de
1239Wrong TLD mercadopublico.edu ? edu
1240Wrong TLD mercadopublico.es ? es
1241Wrong TLD mercadopublico.fr ? fr
1242Wrong TLD mercadopublico.it ? it
1243Wrong TLD mercadopublico.jp ? jp
1244Wrong TLD mercadopublico.net ? net
1245Wrong TLD mercadopublico.nl ? nl
1246Wrong TLD mercadopublico.no ? no
1247Wrong TLD mercadopublico.org 104.196.120.179 aspmx.l.google.com org
1248Wrong TLD mercadopublico.ru ? ru
1249Wrong TLD mercadopublico.se ? se
1250Wrong TLD mercadopublico.us ? us
1251####################################################################################################################################
1252
1253[3/25] https://www.mercadopublico.cl/portal/mp2/descargables/Circ_01_chileproveedores.pdf
1254 [x] Error downloading https://www.mercadopublico.cl/portal/mp2/descargables/Circ_01_chileproveedores.pdf
1255[4/25] http://www.mercadopublico.cl/PlanDeCompras/GuiaPlandeCompras2010.pdf
1256[5/25] https://www.mercadopublico.cl/Portal/MP2/descargables/manual_proveedores.pdf
1257 [x] Error downloading https://www.mercadopublico.cl/Portal/MP2/descargables/manual_proveedores.pdf
1258[6/25] http://www.mercadopublico.cl/portal/includes/files/rss_descargable.pdf
1259[7/25] https://www.mercadopublico.cl/portal/mp2/descargables/guia_nueva_apertura.pdf
1260 [x] Error downloading https://www.mercadopublico.cl/portal/mp2/descargables/guia_nueva_apertura.pdf
1261[8/25] https://www.mercadopublico.cl/Portal/MP2/descargables/manual_compradores.pdf
1262 [x] Error downloading https://www.mercadopublico.cl/Portal/MP2/descargables/manual_compradores.pdf
1263[9/25] http://www.mercadopublico.cl/MicroCompra/Content/pdf/Condiciones_de_uso.pdf
1264[10/25] http://www.mercadopublico.cl/Contenido/Includes/Documentos/Nuevo_Escritorio_y_Contrato.pdf
1265[11/25] https://www.mercadopublico.cl/portal/MP2/descargables/Instructivo_Medida_23.pdf
1266 [x] Error downloading https://www.mercadopublico.cl/portal/MP2/descargables/Instructivo_Medida_23.pdf
1267[12/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3D677AC208-58C2-4605-8BDE-B199B520E4AB
1268 [x] Error in the parsing process
1269[13/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3DB82dmWGUs50uSCKBKYcQI5dLz3ednnkKl7WWHWzOTxFlQng241gESFwyhRegLALg
1270 [x] Error in the parsing process
1271[14/25] http://www.mercadopublico.cl/Portal/MP2/descargables/Manual-Contratacion_de_servicios.pdf
1272[15/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3D3Sf7iNPFktu21bXxfr86lWuVfcEyvN0oasDUpXTIKuv9MYC9PdybDCJvzbyaVStW
1273 [x] Error in the parsing process
1274[16/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3DW9Ln61hupkLJOO5TKbPN9YCJG0TwTmAaO1PJ5xmMFJ5l9gnFoJ4JG2AJB1eoLG0r
1275 [x] Error in the parsing process
1276[17/25] https://www.mercadopublico.cl/portal/MP2/descargables/ley-compras_actualizado_2011.pdf
1277 [x] Error downloading https://www.mercadopublico.cl/portal/MP2/descargables/ley-compras_actualizado_2011.pdf
1278[18/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3DTTJM8GjIZec7oGVlEPbrjBscNFf7fm4EVVm331urFzp6sFOM0N5H8jDtwdnxZsXm
1279 [x] Error in the parsing process
1280[19/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3DgQ6oyVJdKq0Jk1cfxwH7984T4TOX0TOeLeS6cyXS7EgZXU88NOPOLEMyqEnsYrgf
1281 [x] Error in the parsing process
1282[20/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3DbNzCUoOjnGx8cYGu9ypBC3iWoW8fF1dWwb7GSdl1aAsrRaRiJ2qD1xu8ThYychht
1283 [x] Error in the parsing process
1284[21/25] https://www.mercadopublico.cl/Portal/MP2/descargables/GR-Otras_Modificaciones.pdf
1285 [x] Error downloading https://www.mercadopublico.cl/Portal/MP2/descargables/GR-Otras_Modificaciones.pdf
1286[22/25] https://www.mercadopublico.cl/Portal/MP2/descargables/ley-compras_actualizado_2010.pdf
1287 [x] Error downloading https://www.mercadopublico.cl/Portal/MP2/descargables/ley-compras_actualizado_2010.pdf
1288[23/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3Djpz9gec26xu5R5ItUkIkXWMUZpZOpCtYc0FjJPkjkcBh3cWHIaGJ0dFgHJxbq9KL
1289 [x] Error in the parsing process
1290[24/25] http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx%3Ffile%3DazVVzZ0VuMEaeganLk59VtKQeoSI03Wzt03kG7NCwaZbnUdDWiKGrD2tLsdTsQYv
1291 [x] Error in the parsing process
1292[25/25] https://www.mercadopublico.cl/Portal/MP2/descargables/0839-BRESMODIFICACONDICIONESDEUSO.pdf
1293 [x] Error downloading https://www.mercadopublico.cl/Portal/MP2/descargables/0839-BRESMODIFICACONDICIONESDEUSO.pdf
1294------------------------------------------------------------------------------------------------------------------
1295
1296[+] List of users found:
1297--------------------------
1298AnitaCid
1299darcyvergara
1300Felipe Medina Romero
1301Alicia Manquilef
1302Esteban Saavedra Nilo
1303
1304[+] List of software found:
1305-----------------------------
1306��Microsoft� Word 2010
1307��Microsoft� Office PowerPoint� 2007
1308��Microsoft� Word 2013
1309��Microsoft� Word 2016
1310��Microsoft� Office Word 2007
1311
1312[+] List of paths and servers found:
1313---------------------------------------
1314
1315[+] List of e-mails found:
1316----------------------------
1317maria.fernandez@servicio.cl
1318julio.rodriguez@servicio.cl
1319####################################################################################################################################
1320[+] www.mercadopublico.cl has no SPF record!
1321[*] No DMARC record found. Looking for organizational record
1322[+] No organizational DMARC record
1323[+] Spoofing possible for www.mercadopublico.cl!
1324#####################################################################################################################################
1325WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1326Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:27 EST
1327Nmap scan report for www.mercadopublico.cl (206.48.140.40)
1328Host is up (0.37s latency).
1329Not shown: 494 filtered ports
1330Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1331PORT STATE SERVICE
133280/tcp open http
1333443/tcp open https
1334
1335Nmap done: 1 IP address (1 host up) scanned in 16.07 seconds
1336#####################################################################################################################################
1337Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:27 EST
1338Nmap scan report for www.mercadopublico.cl (206.48.140.40)
1339Host is up.
1340
1341PORT STATE SERVICE
134253/udp open|filtered domain
134367/udp open|filtered dhcps
134468/udp open|filtered dhcpc
134569/udp open|filtered tftp
134688/udp open|filtered kerberos-sec
1347123/udp open|filtered ntp
1348137/udp open|filtered netbios-ns
1349138/udp open|filtered netbios-dgm
1350139/udp open|filtered netbios-ssn
1351161/udp open|filtered snmp
1352162/udp open|filtered snmptrap
1353389/udp open|filtered ldap
1354500/udp open|filtered isakmp
1355520/udp open|filtered route
13562049/udp open|filtered nfs
1357
1358Nmap done: 1 IP address (1 host up) scanned in 5.26 seconds
1359#####################################################################################################################################
1360HTTP/1.1 200 OK
1361Content-Length: 71
1362Content-Type: text/html
1363Last-Modified: Mon, 05 May 2008 13:26:02 GMT
1364Accept-Ranges: bytes
1365ETag: "0111990b3aec81:0"
1366Server: Microsoft-IIS/7.5
1367X-Powered-By: ASP.NET
1368X-Frame-Options: SAMEORIGIN
1369Date: Fri, 28 Feb 2020 23:26:36 GMT
1370
1371Allow: OPTIONS, TRACE, GET, HEAD, POST
1372#####################################################################################################################################
1373
1374wig - WebApp Information Gatherer
1375
1376
1377Scanning http://www.mercadopublico.cl...
1378______________________ SITE INFO _______________________
1379IP Title
1380206.48.140.40
1381
1382_______________________ VERSION ________________________
1383Name Versions Type
1384ASP.NET 2.0.50727 Platform
1385IIS 7.5 Platform
1386Microsoft Windows Server 2008 R2 OS
1387
1388________________________________________________________
1389Time: 58.5 sec Urls: 599 Fingerprints: 40401
1390
1391#####################################################################################################################################
1392------------------------------------------------------------------------------------------------------------------------
1393
1394[ ! ] Starting SCANNER INURLBR 2.1 at [28-02-2020 18:29:49]
1395[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
1396It is the end user's responsibility to obey all applicable local, state and federal laws.
1397Developers assume no liability and are not responsible for any misuse or damage caused by this program
1398
1399[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.mercadopublico.cl/output/inurlbr-www.mercadopublico.cl ]
1400[ INFO ][ DORK ]::[ site:www.mercadopublico.cl ]
1401[ INFO ][ SEARCHING ]:: {
1402[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.jm ]
1403
1404[ INFO ][ SEARCHING ]::
1405-[:::]
1406[ INFO ][ ENGINE ]::[ GOOGLE API ]
1407
1408[ INFO ][ SEARCHING ]::
1409-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
1410[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.tm ID: 007843865286850066037:b0heuatvay8 ]
1411
1412[ INFO ][ SEARCHING ]::
1413-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
1414
1415[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
1416
1417
1418 _[ - ]::--------------------------------------------------------------------------------------------------------------
1419|_[ + ] [ 0 / 100 ]-[18:30:09] [ - ]
1420|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/ ]
1421|_[ + ] Exploit::
1422|_[ + ] Information Server:: , , IP:206.48.140.40:443
1423|_[ + ] More details:: / - / , ISP:
1424|_[ + ] Found:: UNIDENTIFIED
1425
1426 _[ - ]::--------------------------------------------------------------------------------------------------------------
1427|_[ + ] [ 1 / 100 ]-[18:30:11] [ - ]
1428|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaHome/ ]
1429|_[ + ] Exploit::
1430|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1431|_[ + ] More details:: / - / , ISP:
1432|_[ + ] Found:: UNIDENTIFIED
1433
1434 _[ - ]::--------------------------------------------------------------------------------------------------------------
1435|_[ + ] [ 2 / 100 ]-[18:30:14] [ - ]
1436|_[ + ] Target:: [ http://www.mercadopublico.cl/Home/BusquedaLicitacion ]
1437|_[ + ] Exploit::
1438|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1439|_[ + ] More details:: / - / , ISP:
1440|_[ + ] Found:: UNIDENTIFIED
1441
1442 _[ - ]::--------------------------------------------------------------------------------------------------------------
1443|_[ + ] [ 3 / 100 ]-[18:30:16] [ - ]
1444|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/RecuperacionContrasena ]
1445|_[ + ] Exploit::
1446|_[ + ] Information Server:: , , IP:206.48.140.40:443
1447|_[ + ] More details:: / - / , ISP:
1448|_[ + ] Found:: UNIDENTIFIED
1449
1450 _[ - ]::--------------------------------------------------------------------------------------------------------------
1451|_[ + ] [ 4 / 100 ]-[18:30:17] [ - ]
1452|_[ + ] Target:: [ https://www.mercadopublico.cl/portal/mp2/descargables/Circ_01_chileproveedores.pdf ]
1453|_[ + ] Exploit::
1454|_[ + ] Information Server:: , , IP:206.48.140.40:443
1455|_[ + ] More details:: / - / , ISP:
1456|_[ + ] Found:: UNIDENTIFIED
1457
1458 _[ - ]::--------------------------------------------------------------------------------------------------------------
1459|_[ + ] [ 5 / 100 ]-[18:30:19] [ - ]
1460|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/ComoCompraEstado ]
1461|_[ + ] Exploit::
1462|_[ + ] Information Server:: , , IP:206.48.140.40:443
1463|_[ + ] More details:: / - / , ISP:
1464|_[ + ] Found:: UNIDENTIFIED
1465
1466 _[ - ]::--------------------------------------------------------------------------------------------------------------
1467|_[ + ] [ 6 / 100 ]-[18:30:21] [ - ]
1468|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/QueEsCM ]
1469|_[ + ] Exploit::
1470|_[ + ] Information Server:: , , IP:206.48.140.40:443
1471|_[ + ] More details:: / - / , ISP:
1472|_[ + ] Found:: UNIDENTIFIED
1473
1474 _[ - ]::--------------------------------------------------------------------------------------------------------------
1475|_[ + ] [ 7 / 100 ]-[18:30:23] [ - ]
1476|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/ComoEmpiezo ]
1477|_[ + ] Exploit::
1478|_[ + ] Information Server:: , , IP:206.48.140.40:443
1479|_[ + ] More details:: / - / , ISP:
1480|_[ + ] Found:: UNIDENTIFIED
1481
1482 _[ - ]::--------------------------------------------------------------------------------------------------------------
1483|_[ + ] [ 8 / 100 ]-[18:30:25] [ - ]
1484|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/Modules/Site/Reclamos/EstadoReclamo.aspx ]
1485|_[ + ] Exploit::
1486|_[ + ] Information Server:: , , IP:206.48.140.40:443
1487|_[ + ] More details:: / - / , ISP:
1488|_[ + ] Found:: UNIDENTIFIED
1489
1490 _[ - ]::--------------------------------------------------------------------------------------------------------------
1491|_[ + ] [ 9 / 100 ]-[18:30:27] [ - ]
1492|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/auxiliares/rss.html ]
1493|_[ + ] Exploit::
1494|_[ + ] Information Server:: , , IP:206.48.140.40:443
1495|_[ + ] More details:: / - / , ISP:
1496|_[ + ] Found:: UNIDENTIFIED
1497
1498 _[ - ]::--------------------------------------------------------------------------------------------------------------
1499|_[ + ] [ 10 / 100 ]-[18:30:29] [ - ]
1500|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/Modules/Site/Reclamos/BusquedaReclamos.aspx ]
1501|_[ + ] Exploit::
1502|_[ + ] Information Server:: , , IP:206.48.140.40:443
1503|_[ + ] More details:: / - / , ISP:
1504|_[ + ] Found:: UNIDENTIFIED
1505
1506 _[ - ]::--------------------------------------------------------------------------------------------------------------
1507|_[ + ] [ 11 / 100 ]-[18:30:31] [ - ]
1508|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1610305 ]
1509|_[ + ] Exploit::
1510|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1511|_[ + ] More details:: / - / , ISP:
1512|_[ + ] Found:: UNIDENTIFIED
1513
1514 _[ - ]::--------------------------------------------------------------------------------------------------------------
1515|_[ + ] [ 12 / 100 ]-[18:30:34] [ - ]
1516|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1637750 ]
1517|_[ + ] Exploit::
1518|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1519|_[ + ] More details:: / - / , ISP:
1520|_[ + ] Found:: UNIDENTIFIED
1521
1522 _[ - ]::--------------------------------------------------------------------------------------------------------------
1523|_[ + ] [ 13 / 100 ]-[18:30:36] [ - ]
1524|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1540078 ]
1525|_[ + ] Exploit::
1526|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1527|_[ + ] More details:: / - / , ISP:
1528|_[ + ] Found:: UNIDENTIFIED
1529
1530 _[ - ]::--------------------------------------------------------------------------------------------------------------
1531|_[ + ] [ 14 / 100 ]-[18:30:38] [ - ]
1532|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/Portal2008/probidad_activa.html ]
1533|_[ + ] Exploit::
1534|_[ + ] Information Server:: , , IP:206.48.140.40:443
1535|_[ + ] More details:: / - / , ISP:
1536|_[ + ] Found:: UNIDENTIFIED
1537
1538 _[ - ]::--------------------------------------------------------------------------------------------------------------
1539|_[ + ] [ 15 / 100 ]-[18:30:41] [ - ]
1540|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1358292 ]
1541|_[ + ] Exploit::
1542|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1543|_[ + ] More details:: / - / , ISP:
1544|_[ + ] Found:: UNIDENTIFIED
1545
1546 _[ - ]::--------------------------------------------------------------------------------------------------------------
1547|_[ + ] [ 16 / 100 ]-[18:30:43] [ - ]
1548|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1125808 ]
1549|_[ + ] Exploit::
1550|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1551|_[ + ] More details:: / - / , ISP:
1552|_[ + ] Found:: UNIDENTIFIED
1553
1554 _[ - ]::--------------------------------------------------------------------------------------------------------------
1555|_[ + ] [ 17 / 100 ]-[18:30:46] [ - ]
1556|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1114714 ]
1557|_[ + ] Exploit::
1558|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1559|_[ + ] More details:: / - / , ISP:
1560|_[ + ] Found:: UNIDENTIFIED
1561
1562 _[ - ]::--------------------------------------------------------------------------------------------------------------
1563|_[ + ] [ 18 / 100 ]-[18:30:49] [ - ]
1564|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1266173 ]
1565|_[ + ] Exploit::
1566|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1567|_[ + ] More details:: / - / , ISP:
1568|_[ + ] Found:: UNIDENTIFIED
1569
1570 _[ - ]::--------------------------------------------------------------------------------------------------------------
1571|_[ + ] [ 19 / 100 ]-[18:30:51] [ - ]
1572|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1273421 ]
1573|_[ + ] Exploit::
1574|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1575|_[ + ] More details:: / - / , ISP:
1576|_[ + ] Found:: UNIDENTIFIED
1577
1578 _[ - ]::--------------------------------------------------------------------------------------------------------------
1579|_[ + ] [ 20 / 100 ]-[18:30:54] [ - ]
1580|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1269413 ]
1581|_[ + ] Exploit::
1582|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1583|_[ + ] More details:: / - / , ISP:
1584|_[ + ] Found:: UNIDENTIFIED
1585
1586 _[ - ]::--------------------------------------------------------------------------------------------------------------
1587|_[ + ] [ 21 / 100 ]-[18:30:56] [ - ]
1588|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1431972 ]
1589|_[ + ] Exploit::
1590|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1591|_[ + ] More details:: / - / , ISP:
1592|_[ + ] Found:: UNIDENTIFIED
1593
1594 _[ - ]::--------------------------------------------------------------------------------------------------------------
1595|_[ + ] [ 22 / 100 ]-[18:30:59] [ - ]
1596|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1562620 ]
1597|_[ + ] Exploit::
1598|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1599|_[ + ] More details:: / - / , ISP:
1600|_[ + ] Found:: UNIDENTIFIED
1601
1602 _[ - ]::--------------------------------------------------------------------------------------------------------------
1603|_[ + ] [ 23 / 100 ]-[18:31:01] [ - ]
1604|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1450609 ]
1605|_[ + ] Exploit::
1606|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1607|_[ + ] More details:: / - / , ISP:
1608|_[ + ] Found:: UNIDENTIFIED
1609
1610 _[ - ]::--------------------------------------------------------------------------------------------------------------
1611|_[ + ] [ 24 / 100 ]-[18:31:04] [ - ]
1612|_[ + ] Target:: [ http://www.mercadopublico.cl/Home/Autenticacion?esNuevaHome=true ]
1613|_[ + ] Exploit::
1614|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1615|_[ + ] More details:: / - / , ISP:
1616|_[ + ] Found:: UNIDENTIFIED
1617
1618 _[ - ]::--------------------------------------------------------------------------------------------------------------
1619|_[ + ] [ 25 / 100 ]-[18:31:07] [ - ]
1620|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1526698 ]
1621|_[ + ] Exploit::
1622|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1623|_[ + ] More details:: / - / , ISP:
1624|_[ + ] Found:: UNIDENTIFIED
1625
1626 _[ - ]::--------------------------------------------------------------------------------------------------------------
1627|_[ + ] [ 26 / 100 ]-[18:31:08] [ - ]
1628|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/auxiliares/nuestras-plataformas.html ]
1629|_[ + ] Exploit::
1630|_[ + ] Information Server:: , , IP:206.48.140.40:443
1631|_[ + ] More details:: / - / , ISP:
1632|_[ + ] Found:: UNIDENTIFIED
1633
1634 _[ - ]::--------------------------------------------------------------------------------------------------------------
1635|_[ + ] [ 27 / 100 ]-[18:31:10] [ - ]
1636|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/como-vender/licitaciones-convenio-marco.html ]
1637|_[ + ] Exploit::
1638|_[ + ] Information Server:: , , IP:206.48.140.40:443
1639|_[ + ] More details:: / - / , ISP:
1640|_[ + ] Found:: UNIDENTIFIED
1641
1642 _[ - ]::--------------------------------------------------------------------------------------------------------------
1643|_[ + ] [ 28 / 100 ]-[18:31:12] [ - ]
1644|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/manual_proveedores.pdf ]
1645|_[ + ] Exploit::
1646|_[ + ] Information Server:: , , IP:206.48.140.40:443
1647|_[ + ] More details:: / - / , ISP:
1648|_[ + ] Found:: UNIDENTIFIED
1649
1650 _[ - ]::--------------------------------------------------------------------------------------------------------------
1651|_[ + ] [ 29 / 100 ]-[18:31:15] [ - ]
1652|_[ + ] Target:: [ http://www.mercadopublico.cl/Home/Contenidos/TiendaBuscador?esNuevaHome=true ]
1653|_[ + ] Exploit::
1654|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1655|_[ + ] More details:: / - / , ISP:
1656|_[ + ] Found:: UNIDENTIFIED
1657
1658 _[ - ]::--------------------------------------------------------------------------------------------------------------
1659|_[ + ] [ 30 / 100 ]-[18:31:17] [ - ]
1660|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/manual_compradores.pdf ]
1661|_[ + ] Exploit::
1662|_[ + ] Information Server:: , , IP:206.48.140.40:443
1663|_[ + ] More details:: / - / , ISP:
1664|_[ + ] Found:: UNIDENTIFIED
1665
1666 _[ - ]::--------------------------------------------------------------------------------------------------------------
1667|_[ + ] [ 31 / 100 ]-[18:31:20] [ - ]
1668|_[ + ] Target:: [ http://www.mercadopublico.cl/MicroCompra/Content/pdf/Condiciones_de_uso.pdf ]
1669|_[ + ] Exploit::
1670|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1671|_[ + ] More details:: / - / , ISP:
1672|_[ + ] Found:: UNIDENTIFIED
1673
1674 _[ - ]::--------------------------------------------------------------------------------------------------------------
1675|_[ + ] [ 32 / 100 ]-[18:31:22] [ - ]
1676|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/QueEsMercadoPublico?esNuevaHome=true ]
1677|_[ + ] Exploit::
1678|_[ + ] Information Server:: , , IP:206.48.140.40:443
1679|_[ + ] More details:: / - / , ISP:
1680|_[ + ] Found:: UNIDENTIFIED
1681
1682 _[ - ]::--------------------------------------------------------------------------------------------------------------
1683|_[ + ] [ 33 / 100 ]-[18:31:24] [ - ]
1684|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/QueEsConsultaMercado?esNuevaHome=true ]
1685|_[ + ] Exploit::
1686|_[ + ] Information Server:: , , IP:206.48.140.40:443
1687|_[ + ] More details:: / - / , ISP:
1688|_[ + ] Found:: UNIDENTIFIED
1689
1690 _[ - ]::--------------------------------------------------------------------------------------------------------------
1691|_[ + ] [ 34 / 100 ]-[18:31:25] [ - ]
1692|_[ + ] Target:: [ https://www.mercadopublico.cl/portal/MP2/descargables/Instructivo_Medida_23.pdf ]
1693|_[ + ] Exploit::
1694|_[ + ] Information Server:: , , IP:206.48.140.40:443
1695|_[ + ] More details:: / - / , ISP:
1696|_[ + ] Found:: UNIDENTIFIED
1697
1698 _[ - ]::--------------------------------------------------------------------------------------------------------------
1699|_[ + ] [ 35 / 100 ]-[18:31:27] [ - ]
1700|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/auxiliares/que-es-mercado-publico.html ]
1701|_[ + ] Exploit::
1702|_[ + ] Information Server:: , , IP:206.48.140.40:443
1703|_[ + ] More details:: / - / , ISP:
1704|_[ + ] Found:: UNIDENTIFIED
1705
1706 _[ - ]::--------------------------------------------------------------------------------------------------------------
1707|_[ + ] [ 36 / 100 ]-[18:31:30] [ - ]
1708|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=677AC208-58C2-4605-8BDE-B199B520E4AB ]
1709|_[ + ] Exploit::
1710|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1711|_[ + ] More details:: / - / , ISP:
1712|_[ + ] Found:: UNIDENTIFIED
1713
1714 _[ - ]::--------------------------------------------------------------------------------------------------------------
1715|_[ + ] [ 37 / 100 ]-[18:31:34] [ - ]
1716|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/MP2/descargables/Manual-Contratacion_de_servicios.pdf ]
1717|_[ + ] Exploit::
1718|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1719|_[ + ] More details:: / - / , ISP:
1720|_[ + ] Found:: UNIDENTIFIED
1721
1722 _[ - ]::--------------------------------------------------------------------------------------------------------------
1723|_[ + ] [ 38 / 100 ]-[18:31:40] [ - ]
1724|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=TTJM8GjIZec7oGVlEPbrjBscNFf7fm4EVVm331urFzp6sFOM0N5H8jDtwdnxZsXm ]
1725|_[ + ] Exploit::
1726|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1727|_[ + ] More details:: / - / , ISP:
1728|_[ + ] Found:: UNIDENTIFIED
1729
1730 _[ - ]::--------------------------------------------------------------------------------------------------------------
1731|_[ + ] [ 39 / 100 ]-[18:31:42] [ - ]
1732|_[ + ] Target:: [ http://www.mercadopublico.cl/FichaLicitacion.html?idLicitacion=869591-1-LP17 ]
1733|_[ + ] Exploit::
1734|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1735|_[ + ] More details:: / - / , ISP:
1736|_[ + ] Found:: UNIDENTIFIED
1737
1738 _[ - ]::--------------------------------------------------------------------------------------------------------------
1739|_[ + ] [ 40 / 100 ]-[18:31:46] [ - ]
1740|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=bNzCUoOjnGx8cYGu9ypBC3iWoW8fF1dWwb7GSdl1aAsrRaRiJ2qD1xu8ThYychht ]
1741|_[ + ] Exploit::
1742|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1743|_[ + ] More details:: / - / , ISP:
1744|_[ + ] Found:: UNIDENTIFIED
1745
1746 _[ - ]::--------------------------------------------------------------------------------------------------------------
1747|_[ + ] [ 41 / 100 ]-[18:31:48] [ - ]
1748|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/GR-Otras_Modificaciones.pdf ]
1749|_[ + ] Exploit::
1750|_[ + ] Information Server:: , , IP:206.48.140.40:443
1751|_[ + ] More details:: / - / , ISP:
1752|_[ + ] Found:: UNIDENTIFIED
1753
1754 _[ - ]::--------------------------------------------------------------------------------------------------------------
1755|_[ + ] [ 42 / 100 ]-[18:31:49] [ - ]
1756|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/ley-compras_actualizado_2010.pdf ]
1757|_[ + ] Exploit::
1758|_[ + ] Information Server:: , , IP:206.48.140.40:443
1759|_[ + ] More details:: / - / , ISP:
1760|_[ + ] Found:: UNIDENTIFIED
1761
1762 _[ - ]::--------------------------------------------------------------------------------------------------------------
1763|_[ + ] [ 43 / 100 ]-[18:31:51] [ - ]
1764|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/0839-BRESMODIFICACONDICIONESDEUSO.pdf ]
1765|_[ + ] Exploit::
1766|_[ + ] Information Server:: , , IP:206.48.140.40:443
1767|_[ + ] More details:: / - / , ISP:
1768|_[ + ] Found:: UNIDENTIFIED
1769
1770 _[ - ]::--------------------------------------------------------------------------------------------------------------
1771|_[ + ] [ 44 / 100 ]-[18:31:53] [ - ]
1772|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/leyes-y-reglamento/leyes-y-reglamento.html ]
1773|_[ + ] Exploit::
1774|_[ + ] Information Server:: , , IP:206.48.140.40:443
1775|_[ + ] More details:: / - / , ISP:
1776|_[ + ] Found:: UNIDENTIFIED
1777
1778 _[ - ]::--------------------------------------------------------------------------------------------------------------
1779|_[ + ] [ 45 / 100 ]-[18:31:55] [ - ]
1780|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DownloadCertificate.aspx ]
1781|_[ + ] Exploit::
1782|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1783|_[ + ] More details:: / - / , ISP:
1784|_[ + ] Found:: UNIDENTIFIED
1785
1786 _[ - ]::--------------------------------------------------------------------------------------------------------------
1787|_[ + ] [ 46 / 100 ]-[18:31:57] [ - ]
1788|_[ + ] Target:: [ http://www.mercadopublico.cl/PurchaseOrder/Modules/Help/HelpSupplierAcceptPurchaseOrder.htm ]
1789|_[ + ] Exploit::
1790|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1791|_[ + ] More details:: / - / , ISP:
1792|_[ + ] Found:: UNIDENTIFIED
1793
1794 _[ - ]::--------------------------------------------------------------------------------------------------------------
1795|_[ + ] [ 47 / 100 ]-[18:31:58] [ - ]
1796|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/Modules/Site/AdvancedSearch/newAdvancedSearchPage.aspx ]
1797|_[ + ] Exploit::
1798|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1799|_[ + ] More details:: / - / , ISP:
1800|_[ + ] Found:: UNIDENTIFIED
1801
1802 _[ - ]::--------------------------------------------------------------------------------------------------------------
1803|_[ + ] [ 48 / 100 ]-[18:32:01] [ - ]
1804|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=XJ6TeEGnCxyiluBxnYcIEg== ]
1805|_[ + ] Exploit::
1806|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1807|_[ + ] More details:: / - / , ISP:
1808|_[ + ] Found:: UNIDENTIFIED
1809
1810 _[ - ]::--------------------------------------------------------------------------------------------------------------
1811|_[ + ] [ 49 / 100 ]-[18:32:03] [ - ]
1812|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=Efa9PV6CAevmY5qqwVmqYg== ]
1813|_[ + ] Exploit::
1814|_[ + ] Information Server:: , , IP:206.48.140.40:443
1815|_[ + ] More details:: / - / , ISP:
1816|_[ + ] Found:: UNIDENTIFIED
1817
1818 _[ - ]::--------------------------------------------------------------------------------------------------------------
1819|_[ + ] [ 50 / 100 ]-[18:32:06] [ - ]
1820|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=VoM57nQDhq6W57Tw65hUeQ== ]
1821|_[ + ] Exploit::
1822|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1823|_[ + ] More details:: / - / , ISP:
1824|_[ + ] Found:: UNIDENTIFIED
1825
1826 _[ - ]::--------------------------------------------------------------------------------------------------------------
1827|_[ + ] [ 51 / 100 ]-[18:32:08] [ - ]
1828|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=KaeegnkhRIEcwLZB581KLA== ]
1829|_[ + ] Exploit::
1830|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1831|_[ + ] More details:: / - / , ISP:
1832|_[ + ] Found:: UNIDENTIFIED
1833
1834 _[ - ]::--------------------------------------------------------------------------------------------------------------
1835|_[ + ] [ 52 / 100 ]-[18:32:11] [ - ]
1836|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=HeWEwM3snPKTkNzqr67WSw== ]
1837|_[ + ] Exploit::
1838|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1839|_[ + ] More details:: / - / , ISP:
1840|_[ + ] Found:: UNIDENTIFIED
1841
1842 _[ - ]::--------------------------------------------------------------------------------------------------------------
1843|_[ + ] [ 53 / 100 ]-[18:32:13] [ - ]
1844|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=A2aRtPKMyE83r35TcwFiZg== ]
1845|_[ + ] Exploit::
1846|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1847|_[ + ] More details:: / - / , ISP:
1848|_[ + ] Found:: UNIDENTIFIED
1849
1850 _[ - ]::--------------------------------------------------------------------------------------------------------------
1851|_[ + ] [ 54 / 100 ]-[18:32:16] [ - ]
1852|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=0Utkhv5BCcfgkGwKLfC1RA== ]
1853|_[ + ] Exploit::
1854|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1855|_[ + ] More details:: / - / , ISP:
1856|_[ + ] Found:: UNIDENTIFIED
1857
1858 _[ - ]::--------------------------------------------------------------------------------------------------------------
1859|_[ + ] [ 55 / 100 ]-[18:32:19] [ - ]
1860|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=WTT6tm52HczREU0BjeY7FA== ]
1861|_[ + ] Exploit::
1862|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1863|_[ + ] More details:: / - / , ISP:
1864|_[ + ] Found:: UNIDENTIFIED
1865
1866 _[ - ]::--------------------------------------------------------------------------------------------------------------
1867|_[ + ] [ 56 / 100 ]-[18:32:21] [ - ]
1868|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=S6AJ8EqYFHtHT3H0vcFpMg== ]
1869|_[ + ] Exploit::
1870|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1871|_[ + ] More details:: / - / , ISP:
1872|_[ + ] Found:: UNIDENTIFIED
1873
1874 _[ - ]::--------------------------------------------------------------------------------------------------------------
1875|_[ + ] [ 57 / 100 ]-[18:32:23] [ - ]
1876|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=F5lplMKL7eRWKJCV7FI9EQ== ]
1877|_[ + ] Exploit::
1878|_[ + ] Information Server:: , , IP:206.48.140.40:443
1879|_[ + ] More details:: / - / , ISP:
1880|_[ + ] Found:: UNIDENTIFIED
1881
1882 _[ - ]::--------------------------------------------------------------------------------------------------------------
1883|_[ + ] [ 58 / 100 ]-[18:32:26] [ - ]
1884|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=HkNLLnW46AVsOKD5EjmSbQ== ]
1885|_[ + ] Exploit::
1886|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1887|_[ + ] More details:: / - / , ISP:
1888|_[ + ] Found:: UNIDENTIFIED
1889
1890 _[ - ]::--------------------------------------------------------------------------------------------------------------
1891|_[ + ] [ 59 / 100 ]-[18:32:28] [ - ]
1892|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=3Ksk53ViV8RacbNYTLDPxg== ]
1893|_[ + ] Exploit::
1894|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1895|_[ + ] More details:: / - / , ISP:
1896|_[ + ] Found:: UNIDENTIFIED
1897
1898 _[ - ]::--------------------------------------------------------------------------------------------------------------
1899|_[ + ] [ 60 / 100 ]-[18:32:31] [ - ]
1900|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=jpW8oBKif7lnfYg8GZrWiQ== ]
1901|_[ + ] Exploit::
1902|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1903|_[ + ] More details:: / - / , ISP:
1904|_[ + ] Found:: UNIDENTIFIED
1905
1906 _[ - ]::--------------------------------------------------------------------------------------------------------------
1907|_[ + ] [ 61 / 100 ]-[18:32:33] [ - ]
1908|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-4-LR16 ]
1909|_[ + ] Exploit::
1910|_[ + ] Information Server:: , , IP:206.48.140.40:443
1911|_[ + ] More details:: / - / , ISP:
1912|_[ + ] Found:: UNIDENTIFIED
1913
1914 _[ - ]::--------------------------------------------------------------------------------------------------------------
1915|_[ + ] [ 62 / 100 ]-[18:32:35] [ - ]
1916|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=xVEScanlWBuUskVI7HRbfA== ]
1917|_[ + ] Exploit::
1918|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1919|_[ + ] More details:: / - / , ISP:
1920|_[ + ] Found:: UNIDENTIFIED
1921
1922 _[ - ]::--------------------------------------------------------------------------------------------------------------
1923|_[ + ] [ 63 / 100 ]-[18:32:38] [ - ]
1924|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=aRp7D7WqzItxvyuRwFdVQQ== ]
1925|_[ + ] Exploit::
1926|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1927|_[ + ] More details:: / - / , ISP:
1928|_[ + ] Found:: UNIDENTIFIED
1929
1930 _[ - ]::--------------------------------------------------------------------------------------------------------------
1931|_[ + ] [ 64 / 100 ]-[18:32:41] [ - ]
1932|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=temHsr2xqaFMVW3EPLesMw== ]
1933|_[ + ] Exploit::
1934|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1935|_[ + ] More details:: / - / , ISP:
1936|_[ + ] Found:: UNIDENTIFIED
1937
1938 _[ - ]::--------------------------------------------------------------------------------------------------------------
1939|_[ + ] [ 65 / 100 ]-[18:32:43] [ - ]
1940|_[ + ] Target:: [ https://www.mercadopublico.cl/portal/MP2/descargables/0705-BRes_AprDirectiva_N-12_Proempleo.pdf ]
1941|_[ + ] Exploit::
1942|_[ + ] Information Server:: , , IP:206.48.140.40:443
1943|_[ + ] More details:: / - / , ISP:
1944|_[ + ] Found:: UNIDENTIFIED
1945
1946 _[ - ]::--------------------------------------------------------------------------------------------------------------
1947|_[ + ] [ 66 / 100 ]-[18:32:44] [ - ]
1948|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-17-LP11 ]
1949|_[ + ] Exploit::
1950|_[ + ] Information Server:: , , IP:206.48.140.40:443
1951|_[ + ] More details:: / - / , ISP:
1952|_[ + ] Found:: UNIDENTIFIED
1953
1954 _[ - ]::--------------------------------------------------------------------------------------------------------------
1955|_[ + ] [ 67 / 100 ]-[18:32:47] [ - ]
1956|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=5UCoeTkvrDV2Mlna3bNG0Q== ]
1957|_[ + ] Exploit::
1958|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1959|_[ + ] More details:: / - / , ISP:
1960|_[ + ] Found:: UNIDENTIFIED
1961
1962 _[ - ]::--------------------------------------------------------------------------------------------------------------
1963|_[ + ] [ 68 / 100 ]-[18:32:50] [ - ]
1964|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=sSPcrfjesYCjDUsUW48Pmw== ]
1965|_[ + ] Exploit::
1966|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1967|_[ + ] More details:: / - / , ISP:
1968|_[ + ] Found:: UNIDENTIFIED
1969
1970 _[ - ]::--------------------------------------------------------------------------------------------------------------
1971|_[ + ] [ 69 / 100 ]-[18:32:52] [ - ]
1972|_[ + ] Target:: [ https://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=UHOnpMUWKGX3OWUiRNUVbYjnW YNYIRTOGrJjtpqvN9B31kiKRI4QI7s74bFn5V9 ]
1973|_[ + ] Exploit::
1974|_[ + ] Information Server:: , , IP:206.48.140.40:443
1975|_[ + ] More details:: / - / , ISP:
1976|_[ + ] Found:: UNIDENTIFIED
1977
1978 _[ - ]::--------------------------------------------------------------------------------------------------------------
1979|_[ + ] [ 70 / 100 ]-[18:32:55] [ - ]
1980|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=4S5QCH1499tR2NUJkjdA5MqjxoKRakYwZAdcK3UI8PQWDgJjKqAae5jDVG9RMihF ]
1981|_[ + ] Exploit::
1982|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
1983|_[ + ] More details:: / - / , ISP:
1984|_[ + ] Found:: UNIDENTIFIED
1985
1986 _[ - ]::--------------------------------------------------------------------------------------------------------------
1987|_[ + ] [ 71 / 100 ]-[18:32:57] [ - ]
1988|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-10-LR16 ]
1989|_[ + ] Exploit::
1990|_[ + ] Information Server:: , , IP:206.48.140.40:443
1991|_[ + ] More details:: / - / , ISP:
1992|_[ + ] Found:: UNIDENTIFIED
1993
1994 _[ - ]::--------------------------------------------------------------------------------------------------------------
1995|_[ + ] [ 72 / 100 ]-[18:32:59] [ - ]
1996|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-11-lp14 ]
1997|_[ + ] Exploit::
1998|_[ + ] Information Server:: , , IP:206.48.140.40:443
1999|_[ + ] More details:: / - / , ISP:
2000|_[ + ] Found:: UNIDENTIFIED
2001
2002 _[ - ]::--------------------------------------------------------------------------------------------------------------
2003|_[ + ] [ 73 / 100 ]-[18:33:01] [ - ]
2004|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-6-LR16 ]
2005|_[ + ] Exploit::
2006|_[ + ] Information Server:: , , IP:206.48.140.40:443
2007|_[ + ] More details:: / - / , ISP:
2008|_[ + ] Found:: UNIDENTIFIED
2009
2010 _[ - ]::--------------------------------------------------------------------------------------------------------------
2011|_[ + ] [ 74 / 100 ]-[18:33:03] [ - ]
2012|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-5-LP14 ]
2013|_[ + ] Exploit::
2014|_[ + ] Information Server:: , , IP:206.48.140.40:443
2015|_[ + ] More details:: / - / , ISP:
2016|_[ + ] Found:: UNIDENTIFIED
2017
2018 _[ - ]::--------------------------------------------------------------------------------------------------------------
2019|_[ + ] [ 75 / 100 ]-[18:33:07] [ - ]
2020|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=BCy3fxEzALSc8MOKBVJp2B5PxduKUQAvN2oBtbGIprpj73zREtYsb7t7XPzHlQs4 ]
2021|_[ + ] Exploit::
2022|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2023|_[ + ] More details:: / - / , ISP:
2024|_[ + ] Found:: UNIDENTIFIED
2025
2026 _[ - ]::--------------------------------------------------------------------------------------------------------------
2027|_[ + ] [ 76 / 100 ]-[18:33:09] [ - ]
2028|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-10-LP14 ]
2029|_[ + ] Exploit::
2030|_[ + ] Information Server:: , , IP:206.48.140.40:443
2031|_[ + ] More details:: / - / , ISP:
2032|_[ + ] Found:: UNIDENTIFIED
2033
2034 _[ - ]::--------------------------------------------------------------------------------------------------------------
2035|_[ + ] [ 77 / 100 ]-[18:33:11] [ - ]
2036|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=352bX7CkkydLlNYvMCuM6A== ]
2037|_[ + ] Exploit::
2038|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2039|_[ + ] More details:: / - / , ISP:
2040|_[ + ] Found:: UNIDENTIFIED
2041
2042 _[ - ]::--------------------------------------------------------------------------------------------------------------
2043|_[ + ] [ 78 / 100 ]-[18:33:13] [ - ]
2044|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-3-LP15 ]
2045|_[ + ] Exploit::
2046|_[ + ] Information Server:: , , IP:206.48.140.40:443
2047|_[ + ] More details:: / - / , ISP:
2048|_[ + ] Found:: UNIDENTIFIED
2049
2050 _[ - ]::--------------------------------------------------------------------------------------------------------------
2051|_[ + ] [ 79 / 100 ]-[18:33:15] [ - ]
2052|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=GLNfZeVV3xYfsPghMC5Gfw== ]
2053|_[ + ] Exploit::
2054|_[ + ] Information Server:: , , IP:206.48.140.40:443
2055|_[ + ] More details:: / - / , ISP:
2056|_[ + ] Found:: UNIDENTIFIED
2057
2058 _[ - ]::--------------------------------------------------------------------------------------------------------------
2059|_[ + ] [ 80 / 100 ]-[18:33:17] [ - ]
2060|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-2-lp15 ]
2061|_[ + ] Exploit::
2062|_[ + ] Information Server:: , , IP:206.48.140.40:443
2063|_[ + ] More details:: / - / , ISP:
2064|_[ + ] Found:: UNIDENTIFIED
2065
2066 _[ - ]::--------------------------------------------------------------------------------------------------------------
2067|_[ + ] [ 81 / 100 ]-[18:33:21] [ - ]
2068|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=VACM/SV3fX9bsq5rKc9eDfrBsQxhgFjarPvk55djQT9Q3MtUcsQhJFY3RsRfcUdn ]
2069|_[ + ] Exploit::
2070|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2071|_[ + ] More details:: / - / , ISP:
2072|_[ + ] Found:: UNIDENTIFIED
2073
2074 _[ - ]::--------------------------------------------------------------------------------------------------------------
2075|_[ + ] [ 82 / 100 ]-[18:33:23] [ - ]
2076|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=zt003sQfpWcdO2xmlMD7aQ== ]
2077|_[ + ] Exploit::
2078|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2079|_[ + ] More details:: / - / , ISP:
2080|_[ + ] Found:: UNIDENTIFIED
2081
2082 _[ - ]::--------------------------------------------------------------------------------------------------------------
2083|_[ + ] [ 83 / 100 ]-[18:33:26] [ - ]
2084|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=5GsVtNHszIy0N1wPMUde/Q== ]
2085|_[ + ] Exploit::
2086|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2087|_[ + ] More details:: / - / , ISP:
2088|_[ + ] Found:: UNIDENTIFIED
2089
2090 _[ - ]::--------------------------------------------------------------------------------------------------------------
2091|_[ + ] [ 84 / 100 ]-[18:33:28] [ - ]
2092|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=qvZF6D31bLWkI9Nb7eaCKnSYNMIiN3D9XqtBa5FefckWk7sKBvdYN2upZE ToNDI ]
2093|_[ + ] Exploit::
2094|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:206.48.140.40:80
2095|_[ + ] More details:: / - / , ISP:
2096|_[ + ] Found:: UNIDENTIFIED
2097
2098 _[ - ]::--------------------------------------------------------------------------------------------------------------
2099|_[ + ] [ 85 / 100 ]-[18:33:29] [ - ]
2100|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-4-LR17 ]
2101|_[ + ] Exploit::
2102|_[ + ] Information Server:: , , IP:206.48.140.40:443
2103|_[ + ] More details:: / - / , ISP:
2104|_[ + ] Found:: UNIDENTIFIED
2105
2106 _[ - ]::--------------------------------------------------------------------------------------------------------------
2107|_[ + ] [ 86 / 100 ]-[18:33:31] [ - ]
2108|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/GR-Contratacion_de_servicios-Prov.pdf ]
2109|_[ + ] Exploit::
2110|_[ + ] Information Server:: , , IP:206.48.140.40:443
2111|_[ + ] More details:: / - / , ISP:
2112|_[ + ] Found:: UNIDENTIFIED
2113
2114 _[ - ]::--------------------------------------------------------------------------------------------------------------
2115|_[ + ] [ 87 / 100 ]-[18:33:35] [ - ]
2116|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=ADN37I10GMy2zq7ns1CUMLnWgc8bNedILJOZ50BTWDqNyYrXEN8vHUMXci5b2mAP ]
2117|_[ + ] Exploit::
2118|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2119|_[ + ] More details:: / - / , ISP:
2120|_[ + ] Found:: UNIDENTIFIED
2121
2122 _[ - ]::--------------------------------------------------------------------------------------------------------------
2123|_[ + ] [ 88 / 100 ]-[18:33:38] [ - ]
2124|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=FM80YsTcYMtnYZ98LhD1qLDPDGYJTAeSwbYW2HmwtKDg6YzlomtI1TXlh63ITx5w ]
2125|_[ + ] Exploit::
2126|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2127|_[ + ] More details:: / - / , ISP:
2128|_[ + ] Found:: UNIDENTIFIED
2129
2130 _[ - ]::--------------------------------------------------------------------------------------------------------------
2131|_[ + ] [ 89 / 100 ]-[18:33:41] [ - ]
2132|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=uf0l0FllennfkIVDXje6Tr65CnPL95vmaoSkRjR81KdKu9fFotftfDTtgWlYo1KQ ]
2133|_[ + ] Exploit::
2134|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2135|_[ + ] More details:: / - / , ISP:
2136|_[ + ] Found:: UNIDENTIFIED
2137
2138 _[ - ]::--------------------------------------------------------------------------------------------------------------
2139|_[ + ] [ 90 / 100 ]-[18:33:44] [ - ]
2140|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=qUjG9JoF7uykmRuszdsR5w== ]
2141|_[ + ] Exploit::
2142|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2143|_[ + ] More details:: / - / , ISP:
2144|_[ + ] Found:: UNIDENTIFIED
2145
2146 _[ - ]::--------------------------------------------------------------------------------------------------------------
2147|_[ + ] [ 91 / 100 ]-[18:33:47] [ - ]
2148|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=Ly057BUWLiKgYqY7E0q1dEpDS1sWSWbnFyfPho2EIVlFf/TrxTLdXVXhZvkH1HWr ]
2149|_[ + ] Exploit::
2150|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2151|_[ + ] More details:: / - / , ISP:
2152|_[ + ] Found:: UNIDENTIFIED
2153
2154 _[ - ]::--------------------------------------------------------------------------------------------------------------
2155|_[ + ] [ 92 / 100 ]-[18:33:50] [ - ]
2156|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=13yZWNx6Cac1fh/TP3Lt9Q== ]
2157|_[ + ] Exploit::
2158|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2159|_[ + ] More details:: / - / , ISP:
2160|_[ + ] Found:: UNIDENTIFIED
2161
2162 _[ - ]::--------------------------------------------------------------------------------------------------------------
2163|_[ + ] [ 93 / 100 ]-[18:33:51] [ - ]
2164|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=uA 9eO9RsExrBBji2XDfuw== ]
2165|_[ + ] Exploit::
2166|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:206.48.140.40:80
2167|_[ + ] More details:: / - / , ISP:
2168|_[ + ] Found:: UNIDENTIFIED
2169
2170 _[ - ]::--------------------------------------------------------------------------------------------------------------
2171|_[ + ] [ 94 / 100 ]-[18:33:54] [ - ]
2172|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=Wz09/zRih4IfGeYlMf0OVA== ]
2173|_[ + ] Exploit::
2174|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2175|_[ + ] More details:: / - / , ISP:
2176|_[ + ] Found:: UNIDENTIFIED
2177
2178 _[ - ]::--------------------------------------------------------------------------------------------------------------
2179|_[ + ] [ 95 / 100 ]-[18:33:55] [ - ]
2180|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=CpcAEj ZR80zzL2MZ2d36g== ]
2181|_[ + ] Exploit::
2182|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:206.48.140.40:80
2183|_[ + ] More details:: / - / , ISP:
2184|_[ + ] Found:: UNIDENTIFIED
2185
2186 _[ - ]::--------------------------------------------------------------------------------------------------------------
2187|_[ + ] [ 96 / 100 ]-[18:33:57] [ - ]
2188|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=EnolzjY CqUM8ekZS4OjMw== ]
2189|_[ + ] Exploit::
2190|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:206.48.140.40:80
2191|_[ + ] More details:: / - / , ISP:
2192|_[ + ] Found:: UNIDENTIFIED
2193
2194 _[ - ]::--------------------------------------------------------------------------------------------------------------
2195|_[ + ] [ 97 / 100 ]-[18:34:03] [ - ]
2196|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=vlwFiYr125dIeOaOb/r4/MwJ7R8kTq549QqFBTEYepOX7UEfhYUV5wvYtZJrBLyt ]
2197|_[ + ] Exploit::
2198|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2199|_[ + ] More details:: / - / , ISP:
2200|_[ + ] Found:: UNIDENTIFIED
2201
2202 _[ - ]::--------------------------------------------------------------------------------------------------------------
2203|_[ + ] [ 98 / 100 ]-[18:34:06] [ - ]
2204|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=cBMkGEBvG9Fk5NvLJlMnQA== ]
2205|_[ + ] Exploit::
2206|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2207|_[ + ] More details:: / - / , ISP:
2208|_[ + ] Found:: UNIDENTIFIED
2209
2210 _[ - ]::--------------------------------------------------------------------------------------------------------------
2211|_[ + ] [ 99 / 100 ]-[18:34:08] [ - ]
2212|_[ + ] Target:: [ https://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=tjSEnbDIbZk3i8VAto3wng== ]
2213|_[ + ] Exploit::
2214|_[ + ] Information Server:: , , IP:206.48.140.40:443
2215|_[ + ] More details:: / - / , ISP:
2216|_[ + ] Found:: UNIDENTIFIED
2217
2218[ INFO ] [ Shutting down ]
2219[ INFO ] [ End of process INURLBR at [28-02-2020 18:34:08]
2220[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
2221[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.mercadopublico.cl/output/inurlbr-www.mercadopublico.cl ]
2222|_________________________________________________________________________________________
2223
2224\____________________________________________
2225#####################################################################################################################################
2226Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:34 EST
2227NSE: Loaded 161 scripts for scanning.
2228NSE: Script Pre-scanning.
2229Initiating NSE at 18:34
2230Completed NSE at 18:34, 0.00s elapsed
2231Initiating NSE at 18:34
2232Completed NSE at 18:34, 0.00s elapsed
2233Initiating Parallel DNS resolution of 1 host. at 18:34
2234Completed Parallel DNS resolution of 1 host. at 18:34, 0.02s elapsed
2235Initiating SYN Stealth Scan at 18:34
2236Scanning www.mercadopublico.cl (206.48.140.40) [1 port]
2237Discovered open port 443/tcp on 206.48.140.40
2238Completed SYN Stealth Scan at 18:34, 0.41s elapsed (1 total ports)
2239Initiating Service scan at 18:34
2240Scanning 1 service on www.mercadopublico.cl (206.48.140.40)
2241Completed Service scan at 18:34, 14.57s elapsed (1 service on 1 host)
2242Initiating OS detection (try #1) against www.mercadopublico.cl (206.48.140.40)
2243Retrying OS detection (try #2) against www.mercadopublico.cl (206.48.140.40)
2244Initiating Traceroute at 18:34
2245Completed Traceroute at 18:34, 3.15s elapsed
2246Initiating Parallel DNS resolution of 12 hosts. at 18:34
2247Completed Parallel DNS resolution of 12 hosts. at 18:34, 0.37s elapsed
2248NSE: Script scanning 206.48.140.40.
2249Initiating NSE at 18:34
2250NSE: [http-wordpress-enum 206.48.140.40:443] got no answers from pipelined queries
2251Completed NSE at 18:36, 90.51s elapsed
2252Initiating NSE at 18:36
2253Completed NSE at 18:36, 1.75s elapsed
2254Nmap scan report for www.mercadopublico.cl (206.48.140.40)
2255Host is up (0.36s latency).
2256
2257PORT STATE SERVICE VERSION
2258443/tcp open ssl/http Microsoft IIS httpd 7.5
2259|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
2260| http-brute:
2261|_ Path "/" does not require authentication
2262|_http-csrf: Couldn't find any CSRF vulnerabilities.
2263|_http-dombased-xss: Couldn't find any DOM based XSS.
2264|_http-errors: Couldn't find any error pages.
2265|_http-feed: Couldn't find any feeds.
2266|_http-fetch: Please enter the complete path of the directory to save data in.
2267| http-headers:
2268| Content-Type: text/html
2269| Last-Modified: Mon, 05 May 2008 13:26:02 GMT
2270| Accept-Ranges: bytes
2271| ETag: "0111990b3aec81:0"
2272| Server: Microsoft-IIS/7.5
2273| X-Powered-By: ASP.NET
2274| X-Frame-Options: SAMEORIGIN
2275| Date: Fri, 28 Feb 2020 23:35:27 GMT
2276| Connection: close
2277| Content-Length: 71
2278|
2279|_ (Request type: GET)
2280|_http-mobileversion-checker: No mobile version detected.
2281| http-security-headers:
2282| Strict_Transport_Security:
2283|_ HSTS not configured in HTTPS Server
2284| http-sitemap-generator:
2285| Directory structure:
2286| /
2287| Other: 1
2288| Longest directory structure:
2289| Depth: 0
2290| Dir: /
2291| Total files found (by extension):
2292|_ Other: 1
2293|_http-traceroute: ERROR: Script execution failed (use -d to debug)
2294| http-vhosts:
2295|_127 names had status ERROR
2296|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
2297|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2298|_http-xssed: No previously reported XSS vuln.
2299Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2300OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
2301No OS matches for host
2302Uptime guess: 187.425 days (since Sun Aug 25 09:24:02 2019)
2303Network Distance: 15 hops
2304TCP Sequence Prediction: Difficulty=263 (Good luck!)
2305IP ID Sequence Generation: Randomized
2306Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2307
2308TRACEROUTE (using port 443/tcp)
2309HOP RTT ADDRESS
23101 133.24 ms 10.203.32.1
23112 ...
23123 134.02 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
23134 133.63 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
23145 139.28 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
23156 161.46 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
23167 207.29 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
23178 240.96 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
23189 234.15 ms be2099.ccr31.bos01.atlas.cogentco.com (154.54.82.34)
231910 236.39 ms be3471.ccr41.jfk02.atlas.cogentco.com (154.54.40.154)
232011 364.66 ms 38.104.72.218
232112 368.87 ms 38.104.72.218
232213 360.67 ms 190.208.4.50 (190.208.4.50)
232314 ...
232415 363.03 ms 206.48.140.40
2325
2326NSE: Script Post-scanning.
2327Initiating NSE at 18:36
2328Completed NSE at 18:36, 0.00s elapsed
2329Initiating NSE at 18:36
2330Completed NSE at 18:36, 0.00s elapsed
2331#######################################################################################################################################
2332Version: 1.11.13-static
2333OpenSSL 1.0.2-chacha (1.0.2g-dev)
2334
2335Connected to 206.48.140.40
2336
2337Testing SSL server www.mercadopublico.cl on port 443 using SNI name www.mercadopublico.cl
2338
2339 TLS Fallback SCSV:
2340Server supports TLS Fallback SCSV
2341
2342 TLS renegotiation:
2343Secure session renegotiation supported
2344
2345 TLS Compression:
2346Compression disabled
2347
2348 Heartbleed:
2349TLS 1.2 not vulnerable to heartbleed
2350TLS 1.1 not vulnerable to heartbleed
2351TLS 1.0 not vulnerable to heartbleed
2352
2353 Supported Server Cipher(s):
2354Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
2355Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2356Accepted TLSv1.2 256 bits AES256-GCM-SHA384
2357Accepted TLSv1.2 256 bits AES256-SHA256
2358Accepted TLSv1.2 256 bits AES256-SHA
2359Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
2360Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
2361Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2362Accepted TLSv1.2 128 bits AES128-GCM-SHA256
2363Accepted TLSv1.2 128 bits AES128-SHA256
2364Accepted TLSv1.2 128 bits AES128-SHA
2365Accepted TLSv1.2 128 bits RC4-SHA
2366Accepted TLSv1.2 128 bits RC4-MD5
2367Accepted TLSv1.2 112 bits DES-CBC3-SHA
2368Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 1024 bits
2369Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 1024 bits
2370Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
2371Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 1024 bits
2372Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 1024 bits
2373Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
2374Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2375Accepted TLSv1.1 256 bits AES256-SHA
2376Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2377Accepted TLSv1.1 128 bits AES128-SHA
2378Accepted TLSv1.1 128 bits RC4-SHA
2379Accepted TLSv1.1 128 bits RC4-MD5
2380Accepted TLSv1.1 112 bits DES-CBC3-SHA
2381Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
2382Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
2383Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2384Accepted TLSv1.0 256 bits AES256-SHA
2385Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2386Accepted TLSv1.0 128 bits AES128-SHA
2387Accepted TLSv1.0 128 bits RC4-SHA
2388Accepted TLSv1.0 128 bits RC4-MD5
2389Accepted TLSv1.0 112 bits DES-CBC3-SHA
2390Accepted TLSv1.0 56 bits DES-CBC-SHA
2391Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
2392Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
2393Preferred SSLv3 256 bits AES256-SHA
2394Accepted SSLv3 128 bits AES128-SHA
2395Accepted SSLv3 128 bits RC4-SHA
2396Accepted SSLv3 128 bits RC4-MD5
2397Accepted SSLv3 112 bits DES-CBC3-SHA
2398Accepted SSLv3 56 bits DES-CBC-SHA
2399Accepted SSLv3 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
2400Accepted SSLv3 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
2401
2402 SSL Certificate:
2403Signature Algorithm: sha256WithRSAEncryption
2404RSA Key Strength: 2048
2405
2406Subject: *.mercadopublico.cl
2407Altnames: DNS:*.mercadopublico.cl, DNS:mercadopublico.cl
2408Issuer: Trustwave Organization Validation SHA256 CA, Level 1
2409
2410Not valid before: Oct 1 21:07:13 2019 GMT
2411Not valid after: Sep 30 03:07:13 2021 GMT
2412#####################################################################################################################################
2413------------------------------------------------------------------------------------------------------------------------
2414
2415[ ! ] Starting SCANNER INURLBR 2.1 at [28-02-2020 18:38:33]
2416[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2417It is the end user's responsibility to obey all applicable local, state and federal laws.
2418Developers assume no liability and are not responsible for any misuse or damage caused by this program
2419
2420[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.mercadopublico.cl/output/inurlbr-www.mercadopublico.cl ]
2421[ INFO ][ DORK ]::[ site:www.mercadopublico.cl ]
2422[ INFO ][ SEARCHING ]:: {
2423[ INFO ][ ENGINE ]::[ GOOGLE - www.google.fr ]
2424
2425[ INFO ][ SEARCHING ]::
2426-[:::]
2427[ INFO ][ ENGINE ]::[ GOOGLE API ]
2428
2429[ INFO ][ SEARCHING ]::
2430-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2431[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.bh ID: 005911257635119896548:iiolgmwf2se ]
2432
2433[ INFO ][ SEARCHING ]::
2434-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2435
2436[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2437
2438
2439 _[ - ]::--------------------------------------------------------------------------------------------------------------
2440|_[ + ] [ 0 / 100 ]-[18:38:52] [ - ]
2441|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/ ]
2442|_[ + ] Exploit::
2443|_[ + ] Information Server:: , , IP:206.48.140.40:443
2444|_[ + ] More details:: / - / , ISP:
2445|_[ + ] Found:: UNIDENTIFIED
2446
2447 _[ - ]::--------------------------------------------------------------------------------------------------------------
2448|_[ + ] [ 1 / 100 ]-[18:38:55] [ - ]
2449|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaHome/ ]
2450|_[ + ] Exploit::
2451|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2452|_[ + ] More details:: / - / , ISP:
2453|_[ + ] Found:: UNIDENTIFIED
2454
2455 _[ - ]::--------------------------------------------------------------------------------------------------------------
2456|_[ + ] [ 2 / 100 ]-[18:38:58] [ - ]
2457|_[ + ] Target:: [ http://www.mercadopublico.cl/Home/BusquedaLicitacion ]
2458|_[ + ] Exploit::
2459|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2460|_[ + ] More details:: / - / , ISP:
2461|_[ + ] Found:: UNIDENTIFIED
2462
2463 _[ - ]::--------------------------------------------------------------------------------------------------------------
2464|_[ + ] [ 3 / 100 ]-[18:38:59] [ - ]
2465|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/RecuperacionContrasena ]
2466|_[ + ] Exploit::
2467|_[ + ] Information Server:: , , IP:206.48.140.40:443
2468|_[ + ] More details:: / - / , ISP:
2469|_[ + ] Found:: UNIDENTIFIED
2470
2471 _[ - ]::--------------------------------------------------------------------------------------------------------------
2472|_[ + ] [ 4 / 100 ]-[18:39:01] [ - ]
2473|_[ + ] Target:: [ https://www.mercadopublico.cl/portal/mp2/descargables/Circ_01_chileproveedores.pdf ]
2474|_[ + ] Exploit::
2475|_[ + ] Information Server:: , , IP:206.48.140.40:443
2476|_[ + ] More details:: / - / , ISP:
2477|_[ + ] Found:: UNIDENTIFIED
2478
2479 _[ - ]::--------------------------------------------------------------------------------------------------------------
2480|_[ + ] [ 5 / 100 ]-[18:39:03] [ - ]
2481|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/ComoCompraEstado ]
2482|_[ + ] Exploit::
2483|_[ + ] Information Server:: , , IP:206.48.140.40:443
2484|_[ + ] More details:: / - / , ISP:
2485|_[ + ] Found:: UNIDENTIFIED
2486
2487 _[ - ]::--------------------------------------------------------------------------------------------------------------
2488|_[ + ] [ 6 / 100 ]-[18:39:05] [ - ]
2489|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/QueEsCM ]
2490|_[ + ] Exploit::
2491|_[ + ] Information Server:: , , IP:206.48.140.40:443
2492|_[ + ] More details:: / - / , ISP:
2493|_[ + ] Found:: UNIDENTIFIED
2494
2495 _[ - ]::--------------------------------------------------------------------------------------------------------------
2496|_[ + ] [ 7 / 100 ]-[18:39:07] [ - ]
2497|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/ComoEmpiezo ]
2498|_[ + ] Exploit::
2499|_[ + ] Information Server:: , , IP:206.48.140.40:443
2500|_[ + ] More details:: / - / , ISP:
2501|_[ + ] Found:: UNIDENTIFIED
2502
2503 _[ - ]::--------------------------------------------------------------------------------------------------------------
2504|_[ + ] [ 8 / 100 ]-[18:39:09] [ - ]
2505|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/QueEsTratoDirecto ]
2506|_[ + ] Exploit::
2507|_[ + ] Information Server:: , , IP:206.48.140.40:443
2508|_[ + ] More details:: / - / , ISP:
2509|_[ + ] Found:: UNIDENTIFIED
2510
2511 _[ - ]::--------------------------------------------------------------------------------------------------------------
2512|_[ + ] [ 9 / 100 ]-[18:39:10] [ - ]
2513|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/Modules/Site/Reclamos/EstadoReclamo.aspx ]
2514|_[ + ] Exploit::
2515|_[ + ] Information Server:: , , IP:206.48.140.40:443
2516|_[ + ] More details:: / - / , ISP:
2517|_[ + ] Found:: UNIDENTIFIED
2518
2519 _[ - ]::--------------------------------------------------------------------------------------------------------------
2520|_[ + ] [ 10 / 100 ]-[18:39:12] [ - ]
2521|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/auxiliares/rss.html ]
2522|_[ + ] Exploit::
2523|_[ + ] Information Server:: , , IP:206.48.140.40:443
2524|_[ + ] More details:: / - / , ISP:
2525|_[ + ] Found:: UNIDENTIFIED
2526
2527 _[ - ]::--------------------------------------------------------------------------------------------------------------
2528|_[ + ] [ 11 / 100 ]-[18:39:14] [ - ]
2529|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/Modules/Site/Reclamos/BusquedaReclamos.aspx ]
2530|_[ + ] Exploit::
2531|_[ + ] Information Server:: , , IP:206.48.140.40:443
2532|_[ + ] More details:: / - / , ISP:
2533|_[ + ] Found:: UNIDENTIFIED
2534
2535 _[ - ]::--------------------------------------------------------------------------------------------------------------
2536|_[ + ] [ 12 / 100 ]-[18:39:17] [ - ]
2537|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1540078 ]
2538|_[ + ] Exploit::
2539|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2540|_[ + ] More details:: / - / , ISP:
2541|_[ + ] Found:: UNIDENTIFIED
2542
2543 _[ - ]::--------------------------------------------------------------------------------------------------------------
2544|_[ + ] [ 13 / 100 ]-[18:39:19] [ - ]
2545|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/Portal2008/probidad_activa.html ]
2546|_[ + ] Exploit::
2547|_[ + ] Information Server:: , , IP:206.48.140.40:443
2548|_[ + ] More details:: / - / , ISP:
2549|_[ + ] Found:: UNIDENTIFIED
2550
2551 _[ - ]::--------------------------------------------------------------------------------------------------------------
2552|_[ + ] [ 14 / 100 ]-[18:39:21] [ - ]
2553|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1359157 ]
2554|_[ + ] Exploit::
2555|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2556|_[ + ] More details:: / - / , ISP:
2557|_[ + ] Found:: UNIDENTIFIED
2558
2559 _[ - ]::--------------------------------------------------------------------------------------------------------------
2560|_[ + ] [ 15 / 100 ]-[18:39:23] [ - ]
2561|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/IndicadorDeGestion?esNuevaHome=true ]
2562|_[ + ] Exploit::
2563|_[ + ] Information Server:: , , IP:206.48.140.40:443
2564|_[ + ] More details:: / - / , ISP:
2565|_[ + ] Found:: UNIDENTIFIED
2566
2567 _[ - ]::--------------------------------------------------------------------------------------------------------------
2568|_[ + ] [ 16 / 100 ]-[18:39:26] [ - ]
2569|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1114714 ]
2570|_[ + ] Exploit::
2571|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2572|_[ + ] More details:: / - / , ISP:
2573|_[ + ] Found:: UNIDENTIFIED
2574
2575 _[ - ]::--------------------------------------------------------------------------------------------------------------
2576|_[ + ] [ 17 / 100 ]-[18:39:28] [ - ]
2577|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1266173 ]
2578|_[ + ] Exploit::
2579|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2580|_[ + ] More details:: / - / , ISP:
2581|_[ + ] Found:: UNIDENTIFIED
2582
2583 _[ - ]::--------------------------------------------------------------------------------------------------------------
2584|_[ + ] [ 18 / 100 ]-[18:39:31] [ - ]
2585|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1273421 ]
2586|_[ + ] Exploit::
2587|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2588|_[ + ] More details:: / - / , ISP:
2589|_[ + ] Found:: UNIDENTIFIED
2590
2591 _[ - ]::--------------------------------------------------------------------------------------------------------------
2592|_[ + ] [ 19 / 100 ]-[18:39:33] [ - ]
2593|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1269413 ]
2594|_[ + ] Exploit::
2595|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2596|_[ + ] More details:: / - / , ISP:
2597|_[ + ] Found:: UNIDENTIFIED
2598
2599 _[ - ]::--------------------------------------------------------------------------------------------------------------
2600|_[ + ] [ 20 / 100 ]-[18:39:36] [ - ]
2601|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1431972 ]
2602|_[ + ] Exploit::
2603|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2604|_[ + ] More details:: / - / , ISP:
2605|_[ + ] Found:: UNIDENTIFIED
2606
2607 _[ - ]::--------------------------------------------------------------------------------------------------------------
2608|_[ + ] [ 21 / 100 ]-[18:39:39] [ - ]
2609|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1562620 ]
2610|_[ + ] Exploit::
2611|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2612|_[ + ] More details:: / - / , ISP:
2613|_[ + ] Found:: UNIDENTIFIED
2614
2615 _[ - ]::--------------------------------------------------------------------------------------------------------------
2616|_[ + ] [ 22 / 100 ]-[18:39:41] [ - ]
2617|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1450609 ]
2618|_[ + ] Exploit::
2619|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2620|_[ + ] More details:: / - / , ISP:
2621|_[ + ] Found:: UNIDENTIFIED
2622
2623 _[ - ]::--------------------------------------------------------------------------------------------------------------
2624|_[ + ] [ 23 / 100 ]-[18:39:43] [ - ]
2625|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1515046 ]
2626|_[ + ] Exploit::
2627|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2628|_[ + ] More details:: / - / , ISP:
2629|_[ + ] Found:: UNIDENTIFIED
2630
2631 _[ - ]::--------------------------------------------------------------------------------------------------------------
2632|_[ + ] [ 24 / 100 ]-[18:39:46] [ - ]
2633|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1359857 ]
2634|_[ + ] Exploit::
2635|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2636|_[ + ] More details:: / - / , ISP:
2637|_[ + ] Found:: UNIDENTIFIED
2638
2639 _[ - ]::--------------------------------------------------------------------------------------------------------------
2640|_[ + ] [ 25 / 100 ]-[18:39:49] [ - ]
2641|_[ + ] Target:: [ http://www.mercadopublico.cl/Home/Autenticacion?esNuevaHome=true ]
2642|_[ + ] Exploit::
2643|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2644|_[ + ] More details:: / - / , ISP:
2645|_[ + ] Found:: UNIDENTIFIED
2646
2647 _[ - ]::--------------------------------------------------------------------------------------------------------------
2648|_[ + ] [ 26 / 100 ]-[18:39:51] [ - ]
2649|_[ + ] Target:: [ http://www.mercadopublico.cl/TiendaFicha/Ficha?idProducto=1526698 ]
2650|_[ + ] Exploit::
2651|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2652|_[ + ] More details:: / - / , ISP:
2653|_[ + ] Found:: UNIDENTIFIED
2654
2655 _[ - ]::--------------------------------------------------------------------------------------------------------------
2656|_[ + ] [ 27 / 100 ]-[18:39:53] [ - ]
2657|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/auxiliares/nuestras-plataformas.html ]
2658|_[ + ] Exploit::
2659|_[ + ] Information Server:: , , IP:206.48.140.40:443
2660|_[ + ] More details:: / - / , ISP:
2661|_[ + ] Found:: UNIDENTIFIED
2662
2663 _[ - ]::--------------------------------------------------------------------------------------------------------------
2664|_[ + ] [ 28 / 100 ]-[18:39:55] [ - ]
2665|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/como-vender/como-vender.html ]
2666|_[ + ] Exploit::
2667|_[ + ] Information Server:: , , IP:206.48.140.40:443
2668|_[ + ] More details:: / - / , ISP:
2669|_[ + ] Found:: UNIDENTIFIED
2670
2671 _[ - ]::--------------------------------------------------------------------------------------------------------------
2672|_[ + ] [ 29 / 100 ]-[18:39:57] [ - ]
2673|_[ + ] Target:: [ https://www.mercadopublico.cl/portal/MP2/secciones/leyes-y-reglamento/directivas.html ]
2674|_[ + ] Exploit::
2675|_[ + ] Information Server:: , , IP:206.48.140.40:443
2676|_[ + ] More details:: / - / , ISP:
2677|_[ + ] Found:: UNIDENTIFIED
2678
2679 _[ - ]::--------------------------------------------------------------------------------------------------------------
2680|_[ + ] [ 30 / 100 ]-[18:39:59] [ - ]
2681|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/como-vender/licitaciones-convenio-marco.html ]
2682|_[ + ] Exploit::
2683|_[ + ] Information Server:: , , IP:206.48.140.40:443
2684|_[ + ] More details:: / - / , ISP:
2685|_[ + ] Found:: UNIDENTIFIED
2686
2687 _[ - ]::--------------------------------------------------------------------------------------------------------------
2688|_[ + ] [ 31 / 100 ]-[18:40:00] [ - ]
2689|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/manual_proveedores.pdf ]
2690|_[ + ] Exploit::
2691|_[ + ] Information Server:: , , IP:206.48.140.40:443
2692|_[ + ] More details:: / - / , ISP:
2693|_[ + ] Found:: UNIDENTIFIED
2694
2695 _[ - ]::--------------------------------------------------------------------------------------------------------------
2696|_[ + ] [ 32 / 100 ]-[18:40:03] [ - ]
2697|_[ + ] Target:: [ http://www.mercadopublico.cl/Home/Contenidos/TiendaBuscador?esNuevaHome=true ]
2698|_[ + ] Exploit::
2699|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2700|_[ + ] More details:: / - / , ISP:
2701|_[ + ] Found:: UNIDENTIFIED
2702
2703 _[ - ]::--------------------------------------------------------------------------------------------------------------
2704|_[ + ] [ 33 / 100 ]-[18:40:05] [ - ]
2705|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/manual_compradores.pdf ]
2706|_[ + ] Exploit::
2707|_[ + ] Information Server:: , , IP:206.48.140.40:443
2708|_[ + ] More details:: / - / , ISP:
2709|_[ + ] Found:: UNIDENTIFIED
2710
2711 _[ - ]::--------------------------------------------------------------------------------------------------------------
2712|_[ + ] [ 34 / 100 ]-[18:40:08] [ - ]
2713|_[ + ] Target:: [ http://www.mercadopublico.cl/MicroCompra/Content/pdf/Condiciones_de_uso.pdf ]
2714|_[ + ] Exploit::
2715|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2716|_[ + ] More details:: / - / , ISP:
2717|_[ + ] Found:: UNIDENTIFIED
2718
2719 _[ - ]::--------------------------------------------------------------------------------------------------------------
2720|_[ + ] [ 35 / 100 ]-[18:40:10] [ - ]
2721|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/QueEsMercadoPublico?esNuevaHome=true ]
2722|_[ + ] Exploit::
2723|_[ + ] Information Server:: , , IP:206.48.140.40:443
2724|_[ + ] More details:: / - / , ISP:
2725|_[ + ] Found:: UNIDENTIFIED
2726
2727 _[ - ]::--------------------------------------------------------------------------------------------------------------
2728|_[ + ] [ 36 / 100 ]-[18:40:12] [ - ]
2729|_[ + ] Target:: [ https://www.mercadopublico.cl/Home/Contenidos/QueEsConsultaMercado?esNuevaHome=true ]
2730|_[ + ] Exploit::
2731|_[ + ] Information Server:: , , IP:206.48.140.40:443
2732|_[ + ] More details:: / - / , ISP:
2733|_[ + ] Found:: UNIDENTIFIED
2734
2735 _[ - ]::--------------------------------------------------------------------------------------------------------------
2736|_[ + ] [ 37 / 100 ]-[18:40:14] [ - ]
2737|_[ + ] Target:: [ https://www.mercadopublico.cl/portal/MP2/descargables/Instructivo_Medida_23.pdf ]
2738|_[ + ] Exploit::
2739|_[ + ] Information Server:: , , IP:206.48.140.40:443
2740|_[ + ] More details:: / - / , ISP:
2741|_[ + ] Found:: UNIDENTIFIED
2742
2743 _[ - ]::--------------------------------------------------------------------------------------------------------------
2744|_[ + ] [ 38 / 100 ]-[18:40:16] [ - ]
2745|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/auxiliares/que-es-mercado-publico.html ]
2746|_[ + ] Exploit::
2747|_[ + ] Information Server:: , , IP:206.48.140.40:443
2748|_[ + ] More details:: / - / , ISP:
2749|_[ + ] Found:: UNIDENTIFIED
2750
2751 _[ - ]::--------------------------------------------------------------------------------------------------------------
2752|_[ + ] [ 39 / 100 ]-[18:40:18] [ - ]
2753|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=677AC208-58C2-4605-8BDE-B199B520E4AB ]
2754|_[ + ] Exploit::
2755|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2756|_[ + ] More details:: / - / , ISP:
2757|_[ + ] Found:: UNIDENTIFIED
2758
2759 _[ - ]::--------------------------------------------------------------------------------------------------------------
2760|_[ + ] [ 40 / 100 ]-[18:40:23] [ - ]
2761|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=TTJM8GjIZec7oGVlEPbrjBscNFf7fm4EVVm331urFzp6sFOM0N5H8jDtwdnxZsXm ]
2762|_[ + ] Exploit::
2763|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2764|_[ + ] More details:: / - / , ISP:
2765|_[ + ] Found:: UNIDENTIFIED
2766
2767 _[ - ]::--------------------------------------------------------------------------------------------------------------
2768|_[ + ] [ 41 / 100 ]-[18:40:25] [ - ]
2769|_[ + ] Target:: [ http://www.mercadopublico.cl/FichaLicitacion.html?idLicitacion=869591-1-LP17 ]
2770|_[ + ] Exploit::
2771|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2772|_[ + ] More details:: / - / , ISP:
2773|_[ + ] Found:: UNIDENTIFIED
2774
2775 _[ - ]::--------------------------------------------------------------------------------------------------------------
2776|_[ + ] [ 42 / 100 ]-[18:40:28] [ - ]
2777|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=bNzCUoOjnGx8cYGu9ypBC3iWoW8fF1dWwb7GSdl1aAsrRaRiJ2qD1xu8ThYychht ]
2778|_[ + ] Exploit::
2779|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2780|_[ + ] More details:: / - / , ISP:
2781|_[ + ] Found:: UNIDENTIFIED
2782
2783 _[ - ]::--------------------------------------------------------------------------------------------------------------
2784|_[ + ] [ 43 / 100 ]-[18:40:30] [ - ]
2785|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/GR-Otras_Modificaciones.pdf ]
2786|_[ + ] Exploit::
2787|_[ + ] Information Server:: , , IP:206.48.140.40:443
2788|_[ + ] More details:: / - / , ISP:
2789|_[ + ] Found:: UNIDENTIFIED
2790
2791 _[ - ]::--------------------------------------------------------------------------------------------------------------
2792|_[ + ] [ 44 / 100 ]-[18:40:32] [ - ]
2793|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/ley-compras_actualizado_2010.pdf ]
2794|_[ + ] Exploit::
2795|_[ + ] Information Server:: , , IP:206.48.140.40:443
2796|_[ + ] More details:: / - / , ISP:
2797|_[ + ] Found:: UNIDENTIFIED
2798
2799 _[ - ]::--------------------------------------------------------------------------------------------------------------
2800|_[ + ] [ 45 / 100 ]-[18:40:34] [ - ]
2801|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/secciones/leyes-y-reglamento/leyes-y-reglamento.html ]
2802|_[ + ] Exploit::
2803|_[ + ] Information Server:: , , IP:206.48.140.40:443
2804|_[ + ] More details:: / - / , ISP:
2805|_[ + ] Found:: UNIDENTIFIED
2806
2807 _[ - ]::--------------------------------------------------------------------------------------------------------------
2808|_[ + ] [ 46 / 100 ]-[18:40:36] [ - ]
2809|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DownloadCertificate.aspx ]
2810|_[ + ] Exploit::
2811|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2812|_[ + ] More details:: / - / , ISP:
2813|_[ + ] Found:: UNIDENTIFIED
2814
2815 _[ - ]::--------------------------------------------------------------------------------------------------------------
2816|_[ + ] [ 47 / 100 ]-[18:40:38] [ - ]
2817|_[ + ] Target:: [ http://www.mercadopublico.cl/PurchaseOrder/Modules/Help/HelpSupplierAcceptPurchaseOrder.htm ]
2818|_[ + ] Exploit::
2819|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2820|_[ + ] More details:: / - / , ISP:
2821|_[ + ] Found:: UNIDENTIFIED
2822
2823 _[ - ]::--------------------------------------------------------------------------------------------------------------
2824|_[ + ] [ 48 / 100 ]-[18:40:40] [ - ]
2825|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=XJ6TeEGnCxyiluBxnYcIEg== ]
2826|_[ + ] Exploit::
2827|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2828|_[ + ] More details:: / - / , ISP:
2829|_[ + ] Found:: UNIDENTIFIED
2830
2831 _[ - ]::--------------------------------------------------------------------------------------------------------------
2832|_[ + ] [ 49 / 100 ]-[18:40:43] [ - ]
2833|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=yBeXQiePQyaylBSW05QnZw== ]
2834|_[ + ] Exploit::
2835|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2836|_[ + ] More details:: / - / , ISP:
2837|_[ + ] Found:: UNIDENTIFIED
2838
2839 _[ - ]::--------------------------------------------------------------------------------------------------------------
2840|_[ + ] [ 50 / 100 ]-[18:40:45] [ - ]
2841|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=KaeegnkhRIEcwLZB581KLA== ]
2842|_[ + ] Exploit::
2843|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2844|_[ + ] More details:: / - / , ISP:
2845|_[ + ] Found:: UNIDENTIFIED
2846
2847 _[ - ]::--------------------------------------------------------------------------------------------------------------
2848|_[ + ] [ 51 / 100 ]-[18:40:48] [ - ]
2849|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=HeWEwM3snPKTkNzqr67WSw== ]
2850|_[ + ] Exploit::
2851|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2852|_[ + ] More details:: / - / , ISP:
2853|_[ + ] Found:: UNIDENTIFIED
2854
2855 _[ - ]::--------------------------------------------------------------------------------------------------------------
2856|_[ + ] [ 52 / 100 ]-[18:40:51] [ - ]
2857|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=CZSL4iA2HaNCkwdpX1CWSQ== ]
2858|_[ + ] Exploit::
2859|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2860|_[ + ] More details:: / - / , ISP:
2861|_[ + ] Found:: UNIDENTIFIED
2862
2863 _[ - ]::--------------------------------------------------------------------------------------------------------------
2864|_[ + ] [ 53 / 100 ]-[18:40:53] [ - ]
2865|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=A2aRtPKMyE83r35TcwFiZg== ]
2866|_[ + ] Exploit::
2867|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2868|_[ + ] More details:: / - / , ISP:
2869|_[ + ] Found:: UNIDENTIFIED
2870
2871 _[ - ]::--------------------------------------------------------------------------------------------------------------
2872|_[ + ] [ 54 / 100 ]-[18:40:56] [ - ]
2873|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=0Utkhv5BCcfgkGwKLfC1RA== ]
2874|_[ + ] Exploit::
2875|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2876|_[ + ] More details:: / - / , ISP:
2877|_[ + ] Found:: UNIDENTIFIED
2878
2879 _[ - ]::--------------------------------------------------------------------------------------------------------------
2880|_[ + ] [ 55 / 100 ]-[18:40:58] [ - ]
2881|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=WTT6tm52HczREU0BjeY7FA== ]
2882|_[ + ] Exploit::
2883|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2884|_[ + ] More details:: / - / , ISP:
2885|_[ + ] Found:: UNIDENTIFIED
2886
2887 _[ - ]::--------------------------------------------------------------------------------------------------------------
2888|_[ + ] [ 56 / 100 ]-[18:41:01] [ - ]
2889|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=D6qJou0yz9cti6u6ExUQ3g== ]
2890|_[ + ] Exploit::
2891|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2892|_[ + ] More details:: / - / , ISP:
2893|_[ + ] Found:: UNIDENTIFIED
2894
2895 _[ - ]::--------------------------------------------------------------------------------------------------------------
2896|_[ + ] [ 57 / 100 ]-[18:41:04] [ - ]
2897|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=S6AJ8EqYFHtHT3H0vcFpMg== ]
2898|_[ + ] Exploit::
2899|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2900|_[ + ] More details:: / - / , ISP:
2901|_[ + ] Found:: UNIDENTIFIED
2902
2903 _[ - ]::--------------------------------------------------------------------------------------------------------------
2904|_[ + ] [ 58 / 100 ]-[18:41:05] [ - ]
2905|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=F5lplMKL7eRWKJCV7FI9EQ== ]
2906|_[ + ] Exploit::
2907|_[ + ] Information Server:: , , IP:206.48.140.40:443
2908|_[ + ] More details:: / - / , ISP:
2909|_[ + ] Found:: UNIDENTIFIED
2910
2911 _[ - ]::--------------------------------------------------------------------------------------------------------------
2912|_[ + ] [ 59 / 100 ]-[18:41:08] [ - ]
2913|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=HkNLLnW46AVsOKD5EjmSbQ== ]
2914|_[ + ] Exploit::
2915|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2916|_[ + ] More details:: / - / , ISP:
2917|_[ + ] Found:: UNIDENTIFIED
2918
2919 _[ - ]::--------------------------------------------------------------------------------------------------------------
2920|_[ + ] [ 60 / 100 ]-[18:41:11] [ - ]
2921|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=3Ksk53ViV8RacbNYTLDPxg== ]
2922|_[ + ] Exploit::
2923|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2924|_[ + ] More details:: / - / , ISP:
2925|_[ + ] Found:: UNIDENTIFIED
2926
2927 _[ - ]::--------------------------------------------------------------------------------------------------------------
2928|_[ + ] [ 61 / 100 ]-[18:41:13] [ - ]
2929|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=jpW8oBKif7lnfYg8GZrWiQ== ]
2930|_[ + ] Exploit::
2931|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2932|_[ + ] More details:: / - / , ISP:
2933|_[ + ] Found:: UNIDENTIFIED
2934
2935 _[ - ]::--------------------------------------------------------------------------------------------------------------
2936|_[ + ] [ 62 / 100 ]-[18:41:15] [ - ]
2937|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-4-LR16 ]
2938|_[ + ] Exploit::
2939|_[ + ] Information Server:: , , IP:206.48.140.40:443
2940|_[ + ] More details:: / - / , ISP:
2941|_[ + ] Found:: UNIDENTIFIED
2942
2943 _[ - ]::--------------------------------------------------------------------------------------------------------------
2944|_[ + ] [ 63 / 100 ]-[18:41:18] [ - ]
2945|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=xVEScanlWBuUskVI7HRbfA== ]
2946|_[ + ] Exploit::
2947|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2948|_[ + ] More details:: / - / , ISP:
2949|_[ + ] Found:: UNIDENTIFIED
2950
2951 _[ - ]::--------------------------------------------------------------------------------------------------------------
2952|_[ + ] [ 64 / 100 ]-[18:41:20] [ - ]
2953|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=aRp7D7WqzItxvyuRwFdVQQ== ]
2954|_[ + ] Exploit::
2955|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2956|_[ + ] More details:: / - / , ISP:
2957|_[ + ] Found:: UNIDENTIFIED
2958
2959 _[ - ]::--------------------------------------------------------------------------------------------------------------
2960|_[ + ] [ 65 / 100 ]-[18:41:23] [ - ]
2961|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=temHsr2xqaFMVW3EPLesMw== ]
2962|_[ + ] Exploit::
2963|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2964|_[ + ] More details:: / - / , ISP:
2965|_[ + ] Found:: UNIDENTIFIED
2966
2967 _[ - ]::--------------------------------------------------------------------------------------------------------------
2968|_[ + ] [ 66 / 100 ]-[18:41:25] [ - ]
2969|_[ + ] Target:: [ https://www.mercadopublico.cl/portal/MP2/descargables/0705-BRes_AprDirectiva_N-12_Proempleo.pdf ]
2970|_[ + ] Exploit::
2971|_[ + ] Information Server:: , , IP:206.48.140.40:443
2972|_[ + ] More details:: / - / , ISP:
2973|_[ + ] Found:: UNIDENTIFIED
2974
2975 _[ - ]::--------------------------------------------------------------------------------------------------------------
2976|_[ + ] [ 67 / 100 ]-[18:41:27] [ - ]
2977|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-17-LP11 ]
2978|_[ + ] Exploit::
2979|_[ + ] Information Server:: , , IP:206.48.140.40:443
2980|_[ + ] More details:: / - / , ISP:
2981|_[ + ] Found:: UNIDENTIFIED
2982
2983 _[ - ]::--------------------------------------------------------------------------------------------------------------
2984|_[ + ] [ 68 / 100 ]-[18:41:29] [ - ]
2985|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=5UCoeTkvrDV2Mlna3bNG0Q== ]
2986|_[ + ] Exploit::
2987|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2988|_[ + ] More details:: / - / , ISP:
2989|_[ + ] Found:: UNIDENTIFIED
2990
2991 _[ - ]::--------------------------------------------------------------------------------------------------------------
2992|_[ + ] [ 69 / 100 ]-[18:41:32] [ - ]
2993|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=sSPcrfjesYCjDUsUW48Pmw== ]
2994|_[ + ] Exploit::
2995|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
2996|_[ + ] More details:: / - / , ISP:
2997|_[ + ] Found:: UNIDENTIFIED
2998
2999 _[ - ]::--------------------------------------------------------------------------------------------------------------
3000|_[ + ] [ 70 / 100 ]-[18:41:34] [ - ]
3001|_[ + ] Target:: [ https://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=UHOnpMUWKGX3OWUiRNUVbYjnW YNYIRTOGrJjtpqvN9B31kiKRI4QI7s74bFn5V9 ]
3002|_[ + ] Exploit::
3003|_[ + ] Information Server:: , , IP:206.48.140.40:443
3004|_[ + ] More details:: / - / , ISP:
3005|_[ + ] Found:: UNIDENTIFIED
3006
3007 _[ - ]::--------------------------------------------------------------------------------------------------------------
3008|_[ + ] [ 71 / 100 ]-[18:41:36] [ - ]
3009|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-22-LR15 ]
3010|_[ + ] Exploit::
3011|_[ + ] Information Server:: , , IP:206.48.140.40:443
3012|_[ + ] More details:: / - / , ISP:
3013|_[ + ] Found:: UNIDENTIFIED
3014
3015 _[ - ]::--------------------------------------------------------------------------------------------------------------
3016|_[ + ] [ 72 / 100 ]-[18:41:37] [ - ]
3017|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-11-lp14 ]
3018|_[ + ] Exploit::
3019|_[ + ] Information Server:: , , IP:206.48.140.40:443
3020|_[ + ] More details:: / - / , ISP:
3021|_[ + ] Found:: UNIDENTIFIED
3022
3023 _[ - ]::--------------------------------------------------------------------------------------------------------------
3024|_[ + ] [ 73 / 100 ]-[18:41:39] [ - ]
3025|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-6-LR16 ]
3026|_[ + ] Exploit::
3027|_[ + ] Information Server:: , , IP:206.48.140.40:443
3028|_[ + ] More details:: / - / , ISP:
3029|_[ + ] Found:: UNIDENTIFIED
3030
3031 _[ - ]::--------------------------------------------------------------------------------------------------------------
3032|_[ + ] [ 74 / 100 ]-[18:41:41] [ - ]
3033|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-5-LP14 ]
3034|_[ + ] Exploit::
3035|_[ + ] Information Server:: , , IP:206.48.140.40:443
3036|_[ + ] More details:: / - / , ISP:
3037|_[ + ] Found:: UNIDENTIFIED
3038
3039 _[ - ]::--------------------------------------------------------------------------------------------------------------
3040|_[ + ] [ 75 / 100 ]-[18:41:43] [ - ]
3041|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-10-LP14 ]
3042|_[ + ] Exploit::
3043|_[ + ] Information Server:: , , IP:206.48.140.40:443
3044|_[ + ] More details:: / - / , ISP:
3045|_[ + ] Found:: UNIDENTIFIED
3046
3047 _[ - ]::--------------------------------------------------------------------------------------------------------------
3048|_[ + ] [ 76 / 100 ]-[18:41:46] [ - ]
3049|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=352bX7CkkydLlNYvMCuM6A== ]
3050|_[ + ] Exploit::
3051|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3052|_[ + ] More details:: / - / , ISP:
3053|_[ + ] Found:: UNIDENTIFIED
3054
3055 _[ - ]::--------------------------------------------------------------------------------------------------------------
3056|_[ + ] [ 77 / 100 ]-[18:41:48] [ - ]
3057|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-3-LP15 ]
3058|_[ + ] Exploit::
3059|_[ + ] Information Server:: , , IP:206.48.140.40:443
3060|_[ + ] More details:: / - / , ISP:
3061|_[ + ] Found:: UNIDENTIFIED
3062
3063 _[ - ]::--------------------------------------------------------------------------------------------------------------
3064|_[ + ] [ 78 / 100 ]-[18:41:49] [ - ]
3065|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=GLNfZeVV3xYfsPghMC5Gfw== ]
3066|_[ + ] Exploit::
3067|_[ + ] Information Server:: , , IP:206.48.140.40:443
3068|_[ + ] More details:: / - / , ISP:
3069|_[ + ] Found:: UNIDENTIFIED
3070
3071 _[ - ]::--------------------------------------------------------------------------------------------------------------
3072|_[ + ] [ 79 / 100 ]-[18:41:51] [ - ]
3073|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-2-lp15 ]
3074|_[ + ] Exploit::
3075|_[ + ] Information Server:: , , IP:206.48.140.40:443
3076|_[ + ] More details:: / - / , ISP:
3077|_[ + ] Found:: UNIDENTIFIED
3078
3079 _[ - ]::--------------------------------------------------------------------------------------------------------------
3080|_[ + ] [ 80 / 100 ]-[18:41:55] [ - ]
3081|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=VACM/SV3fX9bsq5rKc9eDfrBsQxhgFjarPvk55djQT9Q3MtUcsQhJFY3RsRfcUdn ]
3082|_[ + ] Exploit::
3083|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3084|_[ + ] More details:: / - / , ISP:
3085|_[ + ] Found:: UNIDENTIFIED
3086
3087 _[ - ]::--------------------------------------------------------------------------------------------------------------
3088|_[ + ] [ 81 / 100 ]-[18:41:58] [ - ]
3089|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=zt003sQfpWcdO2xmlMD7aQ== ]
3090|_[ + ] Exploit::
3091|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3092|_[ + ] More details:: / - / , ISP:
3093|_[ + ] Found:: UNIDENTIFIED
3094
3095 _[ - ]::--------------------------------------------------------------------------------------------------------------
3096|_[ + ] [ 82 / 100 ]-[18:42:01] [ - ]
3097|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=5GsVtNHszIy0N1wPMUde/Q== ]
3098|_[ + ] Exploit::
3099|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3100|_[ + ] More details:: / - / , ISP:
3101|_[ + ] Found:: UNIDENTIFIED
3102
3103 _[ - ]::--------------------------------------------------------------------------------------------------------------
3104|_[ + ] [ 83 / 100 ]-[18:42:02] [ - ]
3105|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=qvZF6D31bLWkI9Nb7eaCKnSYNMIiN3D9XqtBa5FefckWk7sKBvdYN2upZE ToNDI ]
3106|_[ + ] Exploit::
3107|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:206.48.140.40:80
3108|_[ + ] More details:: / - / , ISP:
3109|_[ + ] Found:: UNIDENTIFIED
3110
3111 _[ - ]::--------------------------------------------------------------------------------------------------------------
3112|_[ + ] [ 84 / 100 ]-[18:42:04] [ - ]
3113|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/FichaLicitacion.html?idlicitacion=2239-4-LR17 ]
3114|_[ + ] Exploit::
3115|_[ + ] Information Server:: , , IP:206.48.140.40:443
3116|_[ + ] More details:: / - / , ISP:
3117|_[ + ] Found:: UNIDENTIFIED
3118
3119 _[ - ]::--------------------------------------------------------------------------------------------------------------
3120|_[ + ] [ 85 / 100 ]-[18:42:06] [ - ]
3121|_[ + ] Target:: [ https://www.mercadopublico.cl/Portal/MP2/descargables/GR-Contratacion_de_servicios-Prov.pdf ]
3122|_[ + ] Exploit::
3123|_[ + ] Information Server:: , , IP:206.48.140.40:443
3124|_[ + ] More details:: / - / , ISP:
3125|_[ + ] Found:: UNIDENTIFIED
3126
3127 _[ - ]::--------------------------------------------------------------------------------------------------------------
3128|_[ + ] [ 86 / 100 ]-[18:42:09] [ - ]
3129|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=N9vx0ZZdC2E11NfEQOAD8vOCcCNqL4B6OA16vmlVkrYztobg6y69MLMJdHHOR7Un ]
3130|_[ + ] Exploit::
3131|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3132|_[ + ] More details:: / - / , ISP:
3133|_[ + ] Found:: UNIDENTIFIED
3134
3135 _[ - ]::--------------------------------------------------------------------------------------------------------------
3136|_[ + ] [ 87 / 100 ]-[18:42:13] [ - ]
3137|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=FM80YsTcYMtnYZ98LhD1qLDPDGYJTAeSwbYW2HmwtKDg6YzlomtI1TXlh63ITx5w ]
3138|_[ + ] Exploit::
3139|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3140|_[ + ] More details:: / - / , ISP:
3141|_[ + ] Found:: UNIDENTIFIED
3142
3143 _[ - ]::--------------------------------------------------------------------------------------------------------------
3144|_[ + ] [ 88 / 100 ]-[18:42:16] [ - ]
3145|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=uf0l0FllennfkIVDXje6Tr65CnPL95vmaoSkRjR81KdKu9fFotftfDTtgWlYo1KQ ]
3146|_[ + ] Exploit::
3147|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3148|_[ + ] More details:: / - / , ISP:
3149|_[ + ] Found:: UNIDENTIFIED
3150
3151 _[ - ]::--------------------------------------------------------------------------------------------------------------
3152|_[ + ] [ 89 / 100 ]-[18:42:19] [ - ]
3153|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=qUjG9JoF7uykmRuszdsR5w== ]
3154|_[ + ] Exploit::
3155|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3156|_[ + ] More details:: / - / , ISP:
3157|_[ + ] Found:: UNIDENTIFIED
3158
3159 _[ - ]::--------------------------------------------------------------------------------------------------------------
3160|_[ + ] [ 90 / 100 ]-[18:42:23] [ - ]
3161|_[ + ] Target:: [ http://www.mercadopublico.cl/CMII/Archivos/AttchPC.aspx?file=Ly057BUWLiKgYqY7E0q1dEpDS1sWSWbnFyfPho2EIVlFf/TrxTLdXVXhZvkH1HWr ]
3162|_[ + ] Exploit::
3163|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3164|_[ + ] More details:: / - / , ISP:
3165|_[ + ] Found:: UNIDENTIFIED
3166
3167 _[ - ]::--------------------------------------------------------------------------------------------------------------
3168|_[ + ] [ 91 / 100 ]-[18:42:25] [ - ]
3169|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=13yZWNx6Cac1fh/TP3Lt9Q== ]
3170|_[ + ] Exploit::
3171|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3172|_[ + ] More details:: / - / , ISP:
3173|_[ + ] Found:: UNIDENTIFIED
3174
3175 _[ - ]::--------------------------------------------------------------------------------------------------------------
3176|_[ + ] [ 92 / 100 ]-[18:42:27] [ - ]
3177|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=5ZX qpyv1AfSulmMC2J0jA== ]
3178|_[ + ] Exploit::
3179|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:206.48.140.40:80
3180|_[ + ] More details:: / - / , ISP:
3181|_[ + ] Found:: UNIDENTIFIED
3182
3183 _[ - ]::--------------------------------------------------------------------------------------------------------------
3184|_[ + ] [ 93 / 100 ]-[18:42:29] [ - ]
3185|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=Wz09/zRih4IfGeYlMf0OVA== ]
3186|_[ + ] Exploit::
3187|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3188|_[ + ] More details:: / - / , ISP:
3189|_[ + ] Found:: UNIDENTIFIED
3190
3191 _[ - ]::--------------------------------------------------------------------------------------------------------------
3192|_[ + ] [ 94 / 100 ]-[18:42:31] [ - ]
3193|_[ + ] Target:: [ http://www.mercadopublico.cl/Portal/FeedOrg.aspx?qs=CpcAEj ZR80zzL2MZ2d36g== ]
3194|_[ + ] Exploit::
3195|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:206.48.140.40:80
3196|_[ + ] More details:: / - / , ISP:
3197|_[ + ] Found:: UNIDENTIFIED
3198
3199 _[ - ]::--------------------------------------------------------------------------------------------------------------
3200|_[ + ] [ 95 / 100 ]-[18:42:34] [ - ]
3201|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/StepsProcessAward/PreviewAwardAct.aspx?qs=arXGISlPC9pEE4kygmhRMFpnXcMGuk0sLQnDK8LasyE= ]
3202|_[ + ] Exploit::
3203|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3204|_[ + ] More details:: / - / , ISP:
3205|_[ + ] Found:: UNIDENTIFIED
3206
3207 _[ - ]::--------------------------------------------------------------------------------------------------------------
3208|_[ + ] [ 96 / 100 ]-[18:42:39] [ - ]
3209|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=wSkrJTRsm5qHSZzpeCdZ7w== ]
3210|_[ + ] Exploit::
3211|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3212|_[ + ] More details:: / - / , ISP:
3213|_[ + ] Found:: UNIDENTIFIED
3214
3215 _[ - ]::--------------------------------------------------------------------------------------------------------------
3216|_[ + ] [ 97 / 100 ]-[18:42:42] [ - ]
3217|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/StepsProcessAward/PreviewAwardAct.aspx?qs=hIcLy8ElIb5wgEa2CfHRiiQJ5RjGhROYAagT9meqnNo= ]
3218|_[ + ] Exploit::
3219|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3220|_[ + ] More details:: / - / , ISP:
3221|_[ + ] Found:: UNIDENTIFIED
3222
3223 _[ - ]::--------------------------------------------------------------------------------------------------------------
3224|_[ + ] [ 98 / 100 ]-[18:42:46] [ - ]
3225|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=H99ugFl3Vr443U2p0I4nDw== ]
3226|_[ + ] Exploit::
3227|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3228|_[ + ] More details:: / - / , ISP:
3229|_[ + ] Found:: UNIDENTIFIED
3230
3231 _[ - ]::--------------------------------------------------------------------------------------------------------------
3232|_[ + ] [ 99 / 100 ]-[18:42:50] [ - ]
3233|_[ + ] Target:: [ http://www.mercadopublico.cl/Procurement/Modules/RFB/DetailsAcquisition.aspx?qs=LtX9V8Kgmi1TxyX15CVZ1w== ]
3234|_[ + ] Exploit::
3235|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:206.48.140.40:80
3236|_[ + ] More details:: / - / , ISP:
3237|_[ + ] Found:: UNIDENTIFIED
3238
3239[ INFO ] [ Shutting down ]
3240[ INFO ] [ End of process INURLBR at [28-02-2020 18:42:50]
3241[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3242[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.mercadopublico.cl/output/inurlbr-www.mercadopublico.cl ]
3243|_________________________________________________________________________________________
3244
3245\_________________________________________________________________________________________/
3246#####################################################################################################################################
3247Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:23 EST
3248Nmap scan report for 206.48.140.40
3249Host is up (0.33s latency).
3250Not shown: 474 filtered ports
3251Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3252PORT STATE SERVICE VERSION
325380/tcp open http Microsoft IIS httpd 7.5
3254| http-methods:
3255|_ Potentially risky methods: TRACE
3256|_http-server-header: Microsoft-IIS/7.5
3257|_http-title: Site doesn't have a title (text/html).
3258443/tcp open ssl/http Microsoft IIS httpd 7.5
3259| ssl-cert: Subject: commonName=*.mercadopublico.cl/organizationName=Direccion de Compras y Contratacion Publica/stateOrProvinceName=Santiago/countryName=CL
3260| Subject Alternative Name: DNS:*.mercadopublico.cl, DNS:mercadopublico.cl
3261| Not valid before: 2019-10-01T21:07:13
3262|_Not valid after: 2021-09-30T03:07:13
3263|_ssl-date: TLS randomness does not represent time
3264Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3265OS fingerprint not ideal because: Timing level 5 (Insane) used
3266No OS matches for host
3267Network Distance: 16 hops
3268Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
3269
3270TRACEROUTE (using port 443/tcp)
3271HOP RTT ADDRESS
32721 133.96 ms 10.203.32.1
32732 ...
32743 134.54 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
32754 134.40 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
32765 140.60 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
32776 162.64 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
32787 167.63 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
32798 241.73 ms be12265.ccr41.par01.atlas.cogentco.com (130.117.2.142)
32809 243.88 ms be3627.ccr41.jfk02.atlas.cogentco.com (66.28.4.197)
328110 244.96 ms be3362.ccr31.jfk04.atlas.cogentco.com (154.54.3.10)
328211 364.00 ms 38.104.72.218
328312 357.85 ms 190.208.9.30 (190.208.9.30)
328413 368.85 ms 190.208.9.30 (190.208.9.30)
328514 ... 15
328616 363.47 ms 206.48.140.40
3287#####################################################################################################################################
3288Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:27 EST
3289Nmap scan report for 206.48.140.40
3290Host is up.
3291Not shown: 14 filtered ports
3292Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3293PORT STATE SERVICE VERSION
329453/udp open|filtered domain
329567/udp open|filtered dhcps
329668/udp open|filtered dhcpc
329769/udp open|filtered tftp
329888/udp open|filtered kerberos-sec
3299123/udp open|filtered ntp
3300137/udp open|filtered netbios-ns
3301138/udp open|filtered netbios-dgm
3302139/udp open|filtered netbios-ssn
3303161/udp open|filtered snmp
3304162/udp open|filtered snmptrap
3305389/udp open|filtered ldap
3306520/udp open|filtered route
33072049/udp open|filtered nfs
3308Too many fingerprints match this host to give specific OS details
3309
3310TRACEROUTE (using proto 1/icmp)
3311HOP RTT ADDRESS
33121 133.59 ms 10.203.32.1
33132 ...
33143 134.43 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
33154 134.47 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
33165 139.66 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
33176 162.09 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
33187 166.88 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
33198 246.56 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
33209 242.66 ms be2101.ccr32.bos01.atlas.cogentco.com (154.54.82.38)
332110 242.72 ms be3472.ccr42.jfk02.atlas.cogentco.com (154.54.46.34)
332211 243.16 ms be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126)
332312 364.70 ms 38.104.72.218
332413 363.89 ms 190.208.9.30 (190.208.9.30)
332514 363.52 ms 190.208.4.50 (190.208.4.50)
332615 ... 30
3327#####################################################################################################################################
3328Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:33 EST
3329Nmap scan report for 206.48.140.40
3330Host is up.
3331
3332PORT STATE SERVICE VERSION
333367/tcp filtered dhcps
333467/udp open|filtered dhcps
3335|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
3336Too many fingerprints match this host to give specific OS details
3337
3338TRACEROUTE (using proto 1/icmp)
3339HOP RTT ADDRESS
33401 136.29 ms 10.203.32.1
33412 ...
33423 136.74 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
33434 136.67 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
33445 142.34 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
33456 164.16 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
33467 169.08 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
33478 247.74 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
33489 244.42 ms be2101.ccr32.bos01.atlas.cogentco.com (154.54.82.38)
334910 237.47 ms be3472.ccr42.jfk02.atlas.cogentco.com (154.54.46.34)
335011 240.88 ms be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126)
335112 364.19 ms 38.104.72.218
335213 361.33 ms 190.208.9.30 (190.208.9.30)
335314 364.93 ms 190.208.4.50 (190.208.4.50)
335415 ... 30
3355#####################################################################################################################################
3356Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:34 EST
3357Nmap scan report for 206.48.140.40
3358Host is up.
3359
3360PORT STATE SERVICE VERSION
336168/tcp filtered dhcpc
336268/udp open|filtered dhcpc
3363Too many fingerprints match this host to give specific OS details
3364
3365TRACEROUTE (using proto 1/icmp)
3366HOP RTT ADDRESS
33671 133.05 ms 10.203.32.1
33682 ...
33693 133.71 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
33704 133.66 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
33715 139.48 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
33726 161.12 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
33737 166.50 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
33748 241.68 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
33759 237.39 ms be2101.ccr32.bos01.atlas.cogentco.com (154.54.82.38)
337610 237.87 ms be3472.ccr42.jfk02.atlas.cogentco.com (154.54.46.34)
337711 241.01 ms be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126)
337812 366.23 ms 38.104.72.218
337913 361.84 ms 190.208.9.30 (190.208.9.30)
338014 361.79 ms 190.208.4.50 (190.208.4.50)
338115 ... 30
3382#####################################################################################################################################
3383Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:36 EST
3384Nmap scan report for 206.48.140.40
3385Host is up.
3386
3387PORT STATE SERVICE VERSION
338869/tcp filtered tftp
338969/udp open|filtered tftp
3390Too many fingerprints match this host to give specific OS details
3391
3392TRACEROUTE (using proto 1/icmp)
3393HOP RTT ADDRESS
33941 129.75 ms 10.203.32.1
33952 ...
33963 130.62 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
33974 130.58 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
33985 135.52 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
33996 157.43 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
34007 163.64 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
34018 241.12 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
34029 237.68 ms be2101.ccr32.bos01.atlas.cogentco.com (154.54.82.38)
340310 237.68 ms be3472.ccr42.jfk02.atlas.cogentco.com (154.54.46.34)
340411 241.01 ms be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126)
340512 363.96 ms 38.104.72.218
340613 361.76 ms 190.208.9.30 (190.208.9.30)
340714 365.44 ms 190.208.4.50 (190.208.4.50)
340815 ... 30
3409#####################################################################################################################################
3410
3411wig - WebApp Information Gatherer
3412
3413
3414Scanning http://206.48.140.40...
3415______________________ SITE INFO _______________________
3416IP Title
3417206.48.140.40
3418
3419_______________________ VERSION ________________________
3420Name Versions Type
3421ASP.NET 2.0.50727 Platform
3422IIS 7.5 Platform
3423Microsoft Windows Server 2008 R2 OS
3424
3425________________________________________________________
3426Time: 49.4 sec Urls: 599 Fingerprints: 40401
3427#####################################################################################################################################
3428HTTP/1.1 200 OK
3429Content-Length: 71
3430Content-Type: text/html
3431Last-Modified: Mon, 05 May 2008 13:26:02 GMT
3432Accept-Ranges: bytes
3433ETag: "0111990b3aec81:0"
3434Server: Microsoft-IIS/7.5
3435X-Powered-By: ASP.NET
3436X-Frame-Options: SAMEORIGIN
3437Date: Fri, 28 Feb 2020 23:39:20 GMT
3438
3439HTTP/1.1 200 OK
3440Content-Length: 71
3441Content-Type: text/html
3442Last-Modified: Mon, 05 May 2008 13:26:02 GMT
3443Accept-Ranges: bytes
3444ETag: "0111990b3aec81:0"
3445Server: Microsoft-IIS/7.5
3446X-Powered-By: ASP.NET
3447X-Frame-Options: SAMEORIGIN
3448Date: Fri, 28 Feb 2020 23:39:20 GMT
3449#####################################################################################################################################
3450Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:40 EST
3451Nmap scan report for 206.48.140.40
3452Host is up.
3453
3454PORT STATE SERVICE VERSION
3455123/tcp filtered ntp
3456123/udp open|filtered ntp
3457Too many fingerprints match this host to give specific OS details
3458
3459TRACEROUTE (using proto 1/icmp)
3460HOP RTT ADDRESS
34611 134.65 ms 10.203.32.1
34622 ...
34633 134.70 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
34644 134.70 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
34655 139.67 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
34666 157.83 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
34677 163.68 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
34688 242.34 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
34699 238.14 ms be2101.ccr32.bos01.atlas.cogentco.com (154.54.82.38)
347010 238.75 ms be3472.ccr42.jfk02.atlas.cogentco.com (154.54.46.34)
347111 242.73 ms be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126)
347212 365.48 ms 38.104.72.218
347313 362.91 ms 190.208.9.30 (190.208.9.30)
347414 362.88 ms 190.208.4.50 (190.208.4.50)
347515 ... 30
3476#####################################################################################################################################
3477Version: 1.11.13-static
3478OpenSSL 1.0.2-chacha (1.0.2g-dev)
3479
3480Connected to 206.48.140.40
3481
3482Testing SSL server 206.48.140.40 on port 443 using SNI name 206.48.140.40
3483
3484 TLS Fallback SCSV:
3485Server supports TLS Fallback SCSV
3486
3487 TLS renegotiation:
3488Secure session renegotiation supported
3489
3490 TLS Compression:
3491Compression disabled
3492
3493 Heartbleed:
3494TLS 1.2 not vulnerable to heartbleed
3495TLS 1.1 not vulnerable to heartbleed
3496TLS 1.0 not vulnerable to heartbleed
3497
3498 Supported Server Cipher(s):
3499Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
3500Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3501Accepted TLSv1.2 256 bits AES256-GCM-SHA384
3502Accepted TLSv1.2 256 bits AES256-SHA256
3503Accepted TLSv1.2 256 bits AES256-SHA
3504Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
3505Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
3506Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3507Accepted TLSv1.2 128 bits AES128-GCM-SHA256
3508Accepted TLSv1.2 128 bits AES128-SHA256
3509Accepted TLSv1.2 128 bits AES128-SHA
3510Accepted TLSv1.2 128 bits RC4-SHA
3511Accepted TLSv1.2 128 bits RC4-MD5
3512Accepted TLSv1.2 112 bits DES-CBC3-SHA
3513Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 1024 bits
3514Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 1024 bits
3515Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
3516Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 1024 bits
3517Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 1024 bits
3518Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
3519Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3520Accepted TLSv1.1 256 bits AES256-SHA
3521Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3522Accepted TLSv1.1 128 bits AES128-SHA
3523Accepted TLSv1.1 128 bits RC4-SHA
3524Accepted TLSv1.1 128 bits RC4-MD5
3525Accepted TLSv1.1 112 bits DES-CBC3-SHA
3526Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
3527Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
3528Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3529Accepted TLSv1.0 256 bits AES256-SHA
3530Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3531Accepted TLSv1.0 128 bits AES128-SHA
3532Accepted TLSv1.0 128 bits RC4-SHA
3533Accepted TLSv1.0 128 bits RC4-MD5
3534Accepted TLSv1.0 112 bits DES-CBC3-SHA
3535Accepted TLSv1.0 56 bits DES-CBC-SHA
3536Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
3537Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
3538Preferred SSLv3 256 bits AES256-SHA
3539Accepted SSLv3 128 bits AES128-SHA
3540Accepted SSLv3 128 bits RC4-SHA
3541Accepted SSLv3 128 bits RC4-MD5
3542Accepted SSLv3 112 bits DES-CBC3-SHA
3543Accepted SSLv3 56 bits DES-CBC-SHA
3544Accepted SSLv3 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
3545Accepted SSLv3 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
3546
3547 SSL Certificate:
3548Signature Algorithm: sha256WithRSAEncryption
3549RSA Key Strength: 2048
3550
3551Subject: *.mercadopublico.cl
3552Altnames: DNS:*.mercadopublico.cl, DNS:mercadopublico.cl
3553Issuer: Trustwave Organization Validation SHA256 CA, Level 1
3554
3555Not valid before: Oct 1 21:07:13 2019 GMT
3556Not valid after: Sep 30 03:07:13 2021 GMT
3557####################################################################################################################################
3558Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 19:01 EST
3559Nmap scan report for 206.48.140.40
3560Host is up.
3561
3562PORT STATE SERVICE VERSION
356353/tcp filtered domain
356467/tcp filtered dhcps
356568/tcp filtered dhcpc
356669/tcp filtered tftp
356788/tcp filtered kerberos-sec
3568123/tcp filtered ntp
3569137/tcp filtered netbios-ns
3570138/tcp filtered netbios-dgm
3571139/tcp filtered netbios-ssn
3572161/tcp filtered snmp
3573162/tcp filtered snmptrap
3574389/tcp filtered ldap
3575520/tcp filtered efs
35762049/tcp filtered nfs
357753/udp open|filtered domain
357867/udp open|filtered dhcps
357968/udp open|filtered dhcpc
358069/udp open|filtered tftp
358188/udp open|filtered kerberos-sec
3582123/udp open|filtered ntp
3583137/udp open|filtered netbios-ns
3584138/udp open|filtered netbios-dgm
3585139/udp open|filtered netbios-ssn
3586161/udp open|filtered snmp
3587162/udp open|filtered snmptrap
3588389/udp open|filtered ldap
3589520/udp open|filtered route
35902049/udp open|filtered nfs
3591Too many fingerprints match this host to give specific OS details
3592
3593TRACEROUTE (using proto 1/icmp)
3594HOP RTT ADDRESS
35951 133.56 ms 10.203.32.1
35962 ...
35973 134.36 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
35984 135.06 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
35995 139.79 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
36006 162.41 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
36017 162.61 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
36028 241.07 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
36039 237.49 ms be2101.ccr32.bos01.atlas.cogentco.com (154.54.82.38)
360410 237.68 ms be3472.ccr42.jfk02.atlas.cogentco.com (154.54.46.34)
360511 242.96 ms be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126)
360612 366.70 ms 38.104.72.218
360713 363.48 ms 190.208.9.30 (190.208.9.30)
360814 363.42 ms 190.208.4.50 (190.208.4.50)
360915 ... 30
3610#####################################################################################################################################
3611Hosts
3612=====
3613
3614address mac name os_name os_flavor os_sp purpose info comments
3615------- --- ---- ------- --------- ----- ------- ---- --------
361637.1.207.121 teens-sins.net 2-Series 3.X device
361745.88.202.111 Linux 3.X server
361864.69.94.253 Unknown device
361969.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
362074.117.180.192 embedded device
362182.94.222.131 Unknown device
362292.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
362392.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
3624104.244.76.231 Linux 3.X server
3625104.244.77.188 Linux 3.X server
3626104.244.79.89 Linux 3.X server
3627149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
3628151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
3629158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
3630162.244.35.13 xnlog.com FreeBSD 7.X device
3631169.239.218.20 cp10.domains.co.za Linux 2.6.X server
3632173.214.244.169 173.214.244.169.serverel.net Unknown device
3633174.142.53.51 mail.marineland.ca Linux 3.X server
3634190.153.219.254 mail.evopoli.cl Linux 3.X server
3635200.73.54.34 mail.maxtel.cl Linux 2.6.X server
3636206.48.140.40 Unknown device
3637207.246.147.189 2-Series device
3638207.246.147.190 Linux 4.X server
3639207.246.147.247 Linux 4.X server
3640207.246.147.248 Linux 4.X server
3641211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
3642218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
3643#####################################################################################################################################
3644Services
3645========
3646
3647host port proto name state info
3648---- ---- ----- ---- ----- ----
364937.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
365037.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
365137.1.207.121 67 tcp dhcps filtered
365237.1.207.121 67 udp dhcps unknown
365337.1.207.121 68 tcp dhcpc filtered
365437.1.207.121 68 udp dhcpc filtered
365537.1.207.121 69 tcp tftp filtered
365637.1.207.121 69 udp tftp unknown
365737.1.207.121 88 tcp kerberos-sec filtered
365837.1.207.121 88 udp kerberos-sec filtered
365937.1.207.121 123 tcp ntp filtered
366037.1.207.121 123 udp ntp unknown
366137.1.207.121 137 tcp netbios-ns filtered
366237.1.207.121 137 udp netbios-ns unknown
366337.1.207.121 138 tcp netbios-dgm filtered
366437.1.207.121 138 udp netbios-dgm unknown
366537.1.207.121 139 tcp netbios-ssn filtered
366637.1.207.121 139 udp netbios-ssn unknown
366737.1.207.121 161 tcp snmp filtered
366837.1.207.121 161 udp snmp unknown
366937.1.207.121 162 tcp snmptrap filtered
367037.1.207.121 162 udp snmptrap unknown
367137.1.207.121 389 tcp ldap filtered
367237.1.207.121 389 udp ldap unknown
367337.1.207.121 520 tcp efs filtered
367437.1.207.121 520 udp route unknown
367537.1.207.121 2049 tcp nfs filtered
367637.1.207.121 2049 udp nfs filtered
367745.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
367845.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
367945.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
368045.88.202.111 67 tcp dhcps closed
368145.88.202.111 67 udp dhcps unknown
368245.88.202.111 68 tcp dhcpc closed
368345.88.202.111 68 udp dhcpc unknown
368445.88.202.111 69 tcp tftp closed
368545.88.202.111 69 udp tftp closed
368645.88.202.111 80 tcp http open nginx
368745.88.202.111 88 tcp kerberos-sec closed
368845.88.202.111 88 udp kerberos-sec unknown
368945.88.202.111 123 tcp ntp closed
369045.88.202.111 123 udp ntp closed
369145.88.202.111 137 tcp netbios-ns closed
369245.88.202.111 137 udp netbios-ns filtered
369345.88.202.111 138 tcp netbios-dgm closed
369445.88.202.111 138 udp netbios-dgm filtered
369545.88.202.111 139 tcp netbios-ssn closed
369645.88.202.111 139 udp netbios-ssn closed
369745.88.202.111 161 tcp snmp closed
369845.88.202.111 161 udp snmp closed
369945.88.202.111 162 tcp snmptrap closed
370045.88.202.111 162 udp snmptrap closed
370145.88.202.111 179 tcp bgp filtered
370245.88.202.111 389 tcp ldap closed
370345.88.202.111 389 udp ldap unknown
370445.88.202.111 443 tcp ssl/http open nginx
370545.88.202.111 520 tcp efs closed
370645.88.202.111 520 udp route unknown
370745.88.202.111 2049 tcp nfs closed
370845.88.202.111 2049 udp nfs closed
370945.88.202.111 10050 tcp tcpwrapped open
371064.69.94.253 53 tcp domain filtered
371164.69.94.253 53 udp domain unknown
371264.69.94.253 67 tcp dhcps filtered
371364.69.94.253 67 udp dhcps unknown
371464.69.94.253 68 tcp dhcpc filtered
371564.69.94.253 68 udp dhcpc unknown
371664.69.94.253 69 tcp tftp filtered
371764.69.94.253 69 udp tftp unknown
371864.69.94.253 88 tcp kerberos-sec filtered
371964.69.94.253 88 udp kerberos-sec unknown
372064.69.94.253 123 tcp ntp filtered
372164.69.94.253 123 udp ntp unknown
372264.69.94.253 137 tcp netbios-ns filtered
372364.69.94.253 137 udp netbios-ns unknown
372464.69.94.253 138 tcp netbios-dgm filtered
372564.69.94.253 138 udp netbios-dgm unknown
372664.69.94.253 139 tcp netbios-ssn filtered
372764.69.94.253 139 udp netbios-ssn unknown
372864.69.94.253 161 tcp snmp filtered
372964.69.94.253 161 udp snmp unknown
373064.69.94.253 162 tcp snmptrap filtered
373164.69.94.253 162 udp snmptrap unknown
373264.69.94.253 389 tcp ldap filtered
373364.69.94.253 389 udp ldap unknown
373464.69.94.253 520 tcp efs filtered
373564.69.94.253 520 udp route unknown
373664.69.94.253 2049 tcp nfs filtered
373764.69.94.253 2049 udp nfs unknown
373869.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
373969.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
374069.163.233.4 25 tcp open
374169.163.233.4 53 tcp domain closed
374269.163.233.4 53 udp domain unknown
374369.163.233.4 67 tcp dhcps closed
374469.163.233.4 67 udp dhcps closed
374569.163.233.4 68 tcp dhcpc closed
374669.163.233.4 68 udp dhcpc unknown
374769.163.233.4 69 tcp tftp closed
374869.163.233.4 69 udp tftp closed
374969.163.233.4 88 tcp kerberos-sec closed
375069.163.233.4 88 udp kerberos-sec unknown
375169.163.233.4 123 tcp ntp closed
375269.163.233.4 123 udp ntp unknown
375369.163.233.4 137 tcp netbios-ns closed
375469.163.233.4 137 udp netbios-ns closed
375569.163.233.4 138 tcp netbios-dgm closed
375669.163.233.4 138 udp netbios-dgm closed
375769.163.233.4 139 tcp netbios-ssn closed
375869.163.233.4 139 udp netbios-ssn unknown
375969.163.233.4 161 tcp snmp closed
376069.163.233.4 161 udp snmp closed
376169.163.233.4 162 tcp snmptrap closed
376269.163.233.4 162 udp snmptrap closed
376369.163.233.4 389 tcp ldap closed
376469.163.233.4 389 udp ldap unknown
376569.163.233.4 520 tcp efs closed
376669.163.233.4 520 udp route closed
376769.163.233.4 2049 tcp nfs closed
376869.163.233.4 2049 udp nfs unknown
376974.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
377074.117.180.192 22 tcp ssh filtered
377174.117.180.192 25 tcp smtp filtered
377274.117.180.192 53 tcp domain closed
377374.117.180.192 53 udp domain unknown
377474.117.180.192 67 tcp dhcps closed
377574.117.180.192 67 udp dhcps unknown
377674.117.180.192 68 tcp dhcpc closed
377774.117.180.192 68 udp dhcpc closed
377874.117.180.192 69 tcp tftp closed
377974.117.180.192 69 udp tftp closed
378074.117.180.192 80 tcp http filtered
378174.117.180.192 88 tcp kerberos-sec closed
378274.117.180.192 88 udp kerberos-sec closed
378374.117.180.192 110 tcp pop3 filtered
378474.117.180.192 111 tcp rpcbind filtered
378574.117.180.192 123 tcp ntp closed
378674.117.180.192 123 udp ntp unknown
378774.117.180.192 137 tcp netbios-ns closed
378874.117.180.192 137 udp netbios-ns closed
378974.117.180.192 138 tcp netbios-dgm closed
379074.117.180.192 138 udp netbios-dgm unknown
379174.117.180.192 139 tcp netbios-ssn closed
379274.117.180.192 139 udp netbios-ssn unknown
379374.117.180.192 143 tcp imap filtered
379474.117.180.192 161 tcp snmp closed
379574.117.180.192 161 udp snmp closed
379674.117.180.192 162 tcp snmptrap closed
379774.117.180.192 162 udp snmptrap unknown
379874.117.180.192 323 tcp rpki-rtr filtered
379974.117.180.192 389 tcp ldap closed
380074.117.180.192 389 udp ldap closed
380174.117.180.192 443 tcp https filtered
380274.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
380374.117.180.192 520 tcp efs closed
380474.117.180.192 520 udp route unknown
380574.117.180.192 587 tcp submission filtered
380674.117.180.192 873 tcp rsync filtered
380774.117.180.192 993 tcp imaps filtered
380874.117.180.192 995 tcp pop3s filtered
380974.117.180.192 2049 tcp nfs closed
381074.117.180.192 2049 udp nfs closed
381174.117.180.192 2525 tcp smtp open Exim smtpd
381274.117.180.192 3306 tcp mysql filtered
381374.117.180.192 4949 tcp tcpwrapped open
381474.117.180.192 5666 tcp tcpwrapped open
381574.117.180.192 6380 tcp filtered
381674.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
381774.117.180.192 11211 tcp memcache filtered
381882.94.222.131 53 udp domain unknown
381982.94.222.131 67 udp dhcps unknown
382082.94.222.131 68 udp dhcpc unknown
382182.94.222.131 69 udp tftp unknown
382282.94.222.131 88 udp kerberos-sec unknown
382382.94.222.131 123 udp ntp unknown
382482.94.222.131 137 udp netbios-ns unknown
382582.94.222.131 138 udp netbios-dgm unknown
382682.94.222.131 139 udp netbios-ssn unknown
382782.94.222.131 161 udp snmp unknown
382882.94.222.131 162 udp snmptrap unknown
382982.94.222.131 389 udp ldap unknown
383082.94.222.131 520 udp route unknown
383182.94.222.131 2049 udp nfs unknown
383292.123.250.35 53 tcp domain closed
383392.123.250.35 53 udp domain closed
383492.123.250.35 67 tcp dhcps filtered
383592.123.250.35 67 udp dhcps unknown
383692.123.250.35 68 tcp dhcpc filtered
383792.123.250.35 68 udp dhcpc unknown
383892.123.250.35 69 tcp tftp filtered
383992.123.250.35 69 udp tftp unknown
384092.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
384192.123.250.35 88 tcp kerberos-sec filtered
384292.123.250.35 88 udp kerberos-sec unknown
384392.123.250.35 123 tcp ntp filtered
384492.123.250.35 123 udp ntp unknown
384592.123.250.35 137 tcp netbios-ns filtered
384692.123.250.35 137 udp netbios-ns unknown
384792.123.250.35 138 tcp netbios-dgm filtered
384892.123.250.35 138 udp netbios-dgm unknown
384992.123.250.35 139 tcp netbios-ssn filtered
385092.123.250.35 139 udp netbios-ssn unknown
385192.123.250.35 161 tcp snmp filtered
385292.123.250.35 161 udp snmp unknown
385392.123.250.35 162 tcp snmptrap filtered
385492.123.250.35 162 udp snmptrap unknown
385592.123.250.35 389 tcp ldap filtered
385692.123.250.35 389 udp ldap unknown
385792.123.250.35 443 tcp ssl/https open
385892.123.250.35 520 tcp efs filtered
385992.123.250.35 520 udp route unknown
386092.123.250.35 2049 tcp nfs filtered
386192.123.250.35 2049 udp nfs unknown
386292.123.250.35 8883 tcp secure-mqtt open
386392.123.250.65 53 tcp domain filtered
386492.123.250.65 53 udp domain unknown
386592.123.250.65 67 tcp dhcps filtered
386692.123.250.65 67 udp dhcps unknown
386792.123.250.65 68 tcp dhcpc filtered
386892.123.250.65 68 udp dhcpc unknown
386992.123.250.65 69 tcp tftp filtered
387092.123.250.65 69 udp tftp unknown
387192.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
387292.123.250.65 88 tcp kerberos-sec filtered
387392.123.250.65 88 udp kerberos-sec unknown
387492.123.250.65 123 tcp ntp filtered
387592.123.250.65 123 udp ntp unknown
387692.123.250.65 137 tcp netbios-ns filtered
387792.123.250.65 137 udp netbios-ns unknown
387892.123.250.65 138 tcp netbios-dgm filtered
387992.123.250.65 138 udp netbios-dgm unknown
388092.123.250.65 139 tcp netbios-ssn filtered
388192.123.250.65 139 udp netbios-ssn unknown
388292.123.250.65 161 tcp snmp filtered
388392.123.250.65 161 udp snmp unknown
388492.123.250.65 162 tcp snmptrap filtered
388592.123.250.65 162 udp snmptrap unknown
388692.123.250.65 389 tcp ldap filtered
388792.123.250.65 389 udp ldap unknown
388892.123.250.65 443 tcp ssl/https open
388992.123.250.65 520 tcp efs filtered
389092.123.250.65 520 udp route unknown
389192.123.250.65 2049 tcp nfs filtered
389292.123.250.65 2049 udp nfs unknown
389392.123.250.65 8883 tcp secure-mqtt open
3894104.244.76.231 53 tcp domain filtered
3895104.244.76.231 53 udp domain unknown
3896104.244.76.231 67 tcp dhcps filtered
3897104.244.76.231 67 udp dhcps unknown
3898104.244.76.231 68 tcp dhcpc filtered
3899104.244.76.231 68 udp dhcpc unknown
3900104.244.76.231 69 tcp tftp filtered
3901104.244.76.231 69 udp tftp unknown
3902104.244.76.231 80 tcp http open nginx
3903104.244.76.231 88 tcp kerberos-sec filtered
3904104.244.76.231 88 udp kerberos-sec unknown
3905104.244.76.231 123 tcp ntp filtered
3906104.244.76.231 123 udp ntp unknown
3907104.244.76.231 137 tcp netbios-ns filtered
3908104.244.76.231 137 udp netbios-ns unknown
3909104.244.76.231 138 tcp netbios-dgm filtered
3910104.244.76.231 138 udp netbios-dgm unknown
3911104.244.76.231 139 tcp netbios-ssn filtered
3912104.244.76.231 139 udp netbios-ssn unknown
3913104.244.76.231 161 tcp snmp filtered
3914104.244.76.231 161 udp snmp unknown
3915104.244.76.231 162 tcp snmptrap filtered
3916104.244.76.231 162 udp snmptrap unknown
3917104.244.76.231 389 tcp ldap filtered
3918104.244.76.231 389 udp ldap unknown
3919104.244.76.231 443 tcp ssl/http open nginx
3920104.244.76.231 520 tcp efs filtered
3921104.244.76.231 520 udp route unknown
3922104.244.76.231 2049 tcp nfs filtered
3923104.244.76.231 2049 udp nfs unknown
3924104.244.76.231 5040 tcp unknown closed
3925104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
3926104.244.76.231 16221 tcp closed
3927104.244.76.231 23022 tcp closed
3928104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
3929104.244.77.188 53 tcp domain filtered
3930104.244.77.188 53 udp domain unknown
3931104.244.77.188 67 tcp dhcps filtered
3932104.244.77.188 67 udp dhcps unknown
3933104.244.77.188 68 tcp dhcpc filtered
3934104.244.77.188 68 udp dhcpc unknown
3935104.244.77.188 69 tcp tftp filtered
3936104.244.77.188 69 udp tftp unknown
3937104.244.77.188 80 tcp http open nginx
3938104.244.77.188 88 tcp kerberos-sec filtered
3939104.244.77.188 88 udp kerberos-sec unknown
3940104.244.77.188 123 tcp ntp filtered
3941104.244.77.188 123 udp ntp unknown
3942104.244.77.188 137 tcp netbios-ns filtered
3943104.244.77.188 137 udp netbios-ns unknown
3944104.244.77.188 138 tcp netbios-dgm filtered
3945104.244.77.188 138 udp netbios-dgm unknown
3946104.244.77.188 139 tcp netbios-ssn filtered
3947104.244.77.188 139 udp netbios-ssn unknown
3948104.244.77.188 161 tcp snmp filtered
3949104.244.77.188 161 udp snmp unknown
3950104.244.77.188 162 tcp snmptrap filtered
3951104.244.77.188 162 udp snmptrap unknown
3952104.244.77.188 389 tcp ldap filtered
3953104.244.77.188 389 udp ldap unknown
3954104.244.77.188 443 tcp ssl/http open nginx
3955104.244.77.188 520 tcp efs filtered
3956104.244.77.188 520 udp route unknown
3957104.244.77.188 2049 tcp nfs filtered
3958104.244.77.188 2049 udp nfs unknown
3959104.244.77.188 5040 tcp unknown closed
3960104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
3961104.244.77.188 16221 tcp closed
3962104.244.77.188 23022 tcp closed
3963104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
3964104.244.79.89 53 tcp domain filtered
3965104.244.79.89 53 udp domain unknown
3966104.244.79.89 67 tcp dhcps filtered
3967104.244.79.89 67 udp dhcps unknown
3968104.244.79.89 68 tcp dhcpc filtered
3969104.244.79.89 68 udp dhcpc unknown
3970104.244.79.89 69 tcp tftp filtered
3971104.244.79.89 69 udp tftp unknown
3972104.244.79.89 80 tcp http open nginx
3973104.244.79.89 88 tcp kerberos-sec filtered
3974104.244.79.89 88 udp kerberos-sec unknown
3975104.244.79.89 123 tcp ntp filtered
3976104.244.79.89 123 udp ntp unknown
3977104.244.79.89 137 tcp netbios-ns filtered
3978104.244.79.89 137 udp netbios-ns unknown
3979104.244.79.89 138 tcp netbios-dgm filtered
3980104.244.79.89 138 udp netbios-dgm unknown
3981104.244.79.89 139 tcp netbios-ssn filtered
3982104.244.79.89 139 udp netbios-ssn unknown
3983104.244.79.89 161 tcp snmp filtered
3984104.244.79.89 161 udp snmp unknown
3985104.244.79.89 162 tcp snmptrap filtered
3986104.244.79.89 162 udp snmptrap unknown
3987104.244.79.89 389 tcp ldap filtered
3988104.244.79.89 389 udp ldap unknown
3989104.244.79.89 443 tcp ssl/http open nginx
3990104.244.79.89 520 tcp efs filtered
3991104.244.79.89 520 udp route unknown
3992104.244.79.89 2049 tcp nfs filtered
3993104.244.79.89 2049 udp nfs unknown
3994104.244.79.89 7910 tcp ssl/http open nginx
3995104.244.79.89 7920 tcp unknown closed
3996104.244.79.89 7930 tcp closed
3997104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
3998104.244.79.89 16010 tcp ssl/http open nginx
3999104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
4000104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
4001149.126.72.220 25 tcp smtp closed
4002149.126.72.220 51 tcp tcpwrapped open
4003149.126.72.220 53 tcp domain open
4004149.126.72.220 53 udp domain open
4005149.126.72.220 65 tcp tcpwrapped open
4006149.126.72.220 66 tcp tcpwrapped open
4007149.126.72.220 67 tcp dhcps filtered
4008149.126.72.220 67 udp dhcps unknown
4009149.126.72.220 68 tcp dhcpc filtered
4010149.126.72.220 68 udp dhcpc unknown
4011149.126.72.220 69 tcp tftp filtered
4012149.126.72.220 69 udp tftp unknown
4013149.126.72.220 80 tcp tcpwrapped open
4014149.126.72.220 81 tcp tcpwrapped open
4015149.126.72.220 82 tcp tcpwrapped open
4016149.126.72.220 83 tcp tcpwrapped open
4017149.126.72.220 84 tcp tcpwrapped open
4018149.126.72.220 85 tcp tcpwrapped open
4019149.126.72.220 86 tcp tcpwrapped open
4020149.126.72.220 88 tcp http open Incapsula CDN httpd
4021149.126.72.220 88 udp kerberos-sec unknown
4022149.126.72.220 89 tcp tcpwrapped open
4023149.126.72.220 90 tcp tcpwrapped open
4024149.126.72.220 91 tcp tcpwrapped open
4025149.126.72.220 92 tcp tcpwrapped open
4026149.126.72.220 98 tcp tcpwrapped open
4027149.126.72.220 99 tcp tcpwrapped open
4028149.126.72.220 123 tcp ntp filtered
4029149.126.72.220 123 udp ntp unknown
4030149.126.72.220 137 tcp netbios-ns filtered
4031149.126.72.220 137 udp netbios-ns filtered
4032149.126.72.220 138 tcp netbios-dgm filtered
4033149.126.72.220 138 udp netbios-dgm filtered
4034149.126.72.220 139 tcp netbios-ssn closed
4035149.126.72.220 139 udp netbios-ssn unknown
4036149.126.72.220 160 tcp sgmp-traps closed
4037149.126.72.220 161 tcp snmp filtered
4038149.126.72.220 161 udp snmp unknown
4039149.126.72.220 162 tcp snmptrap filtered
4040149.126.72.220 162 udp snmptrap unknown
4041149.126.72.220 189 tcp tcpwrapped open
4042149.126.72.220 190 tcp tcpwrapped open
4043149.126.72.220 192 tcp tcpwrapped open
4044149.126.72.220 243 tcp tcpwrapped open
4045149.126.72.220 285 tcp tcpwrapped open
4046149.126.72.220 314 tcp tcpwrapped open
4047149.126.72.220 343 tcp tcpwrapped open
4048149.126.72.220 347 tcp tcpwrapped open
4049149.126.72.220 385 tcp tcpwrapped open
4050149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
4051149.126.72.220 389 udp ldap unknown
4052149.126.72.220 400 tcp tcpwrapped open
4053149.126.72.220 440 tcp tcpwrapped open
4054149.126.72.220 441 tcp tcpwrapped open
4055149.126.72.220 442 tcp tcpwrapped open
4056149.126.72.220 443 tcp ssl/tcpwrapped open
4057149.126.72.220 444 tcp tcpwrapped open
4058149.126.72.220 445 tcp microsoft-ds closed
4059149.126.72.220 446 tcp tcpwrapped open
4060149.126.72.220 447 tcp tcpwrapped open
4061149.126.72.220 448 tcp tcpwrapped open
4062149.126.72.220 449 tcp tcpwrapped open
4063149.126.72.220 452 tcp tcpwrapped open
4064149.126.72.220 461 tcp tcpwrapped open
4065149.126.72.220 462 tcp tcpwrapped open
4066149.126.72.220 480 tcp tcpwrapped open
4067149.126.72.220 485 tcp tcpwrapped open
4068149.126.72.220 487 tcp tcpwrapped open
4069149.126.72.220 488 tcp tcpwrapped open
4070149.126.72.220 491 tcp tcpwrapped open
4071149.126.72.220 520 tcp efs filtered
4072149.126.72.220 520 udp route unknown
4073149.126.72.220 555 tcp tcpwrapped open
4074149.126.72.220 556 tcp tcpwrapped open
4075149.126.72.220 587 tcp tcpwrapped open
4076149.126.72.220 631 tcp tcpwrapped open
4077149.126.72.220 632 tcp tcpwrapped open
4078149.126.72.220 636 tcp tcpwrapped open
4079149.126.72.220 743 tcp tcpwrapped open
4080149.126.72.220 772 tcp tcpwrapped open
4081149.126.72.220 777 tcp tcpwrapped open
4082149.126.72.220 782 tcp tcpwrapped open
4083149.126.72.220 785 tcp tcpwrapped open
4084149.126.72.220 800 tcp tcpwrapped open
4085149.126.72.220 801 tcp tcpwrapped open
4086149.126.72.220 805 tcp tcpwrapped open
4087149.126.72.220 806 tcp tcpwrapped open
4088149.126.72.220 809 tcp tcpwrapped open
4089149.126.72.220 843 tcp tcpwrapped open
4090149.126.72.220 853 tcp tcpwrapped open
4091149.126.72.220 885 tcp tcpwrapped open
4092149.126.72.220 886 tcp tcpwrapped open
4093149.126.72.220 887 tcp tcpwrapped open
4094149.126.72.220 888 tcp tcpwrapped open
4095149.126.72.220 943 tcp tcpwrapped open
4096149.126.72.220 947 tcp tcpwrapped open
4097149.126.72.220 953 tcp tcpwrapped open
4098149.126.72.220 990 tcp tcpwrapped open
4099149.126.72.220 995 tcp tcpwrapped open
4100149.126.72.220 998 tcp tcpwrapped open
4101149.126.72.220 999 tcp tcpwrapped open
4102149.126.72.220 1000 tcp tcpwrapped open
4103149.126.72.220 1002 tcp tcpwrapped open
4104149.126.72.220 1024 tcp tcpwrapped open
4105149.126.72.220 1025 tcp tcpwrapped open
4106149.126.72.220 1028 tcp tcpwrapped open
4107149.126.72.220 1080 tcp tcpwrapped open
4108149.126.72.220 1103 tcp tcpwrapped open
4109149.126.72.220 1111 tcp tcpwrapped open
4110149.126.72.220 1180 tcp tcpwrapped open
4111149.126.72.220 1181 tcp tcpwrapped open
4112149.126.72.220 1207 tcp tcpwrapped open
4113149.126.72.220 1234 tcp tcpwrapped open
4114149.126.72.220 1250 tcp tcpwrapped open
4115149.126.72.220 1283 tcp tcpwrapped open
4116149.126.72.220 1291 tcp tcpwrapped open
4117149.126.72.220 1292 tcp tcpwrapped open
4118149.126.72.220 1293 tcp tcpwrapped open
4119149.126.72.220 1337 tcp tcpwrapped open
4120149.126.72.220 1344 tcp tcpwrapped open
4121149.126.72.220 1355 tcp tcpwrapped open
4122149.126.72.220 1364 tcp tcpwrapped open
4123149.126.72.220 1366 tcp tcpwrapped open
4124149.126.72.220 1377 tcp tcpwrapped open
4125149.126.72.220 1387 tcp tcpwrapped open
4126149.126.72.220 1388 tcp tcpwrapped open
4127149.126.72.220 1433 tcp tcpwrapped open
4128149.126.72.220 1443 tcp tcpwrapped open
4129149.126.72.220 1447 tcp tcpwrapped open
4130149.126.72.220 1450 tcp tcpwrapped open
4131149.126.72.220 1451 tcp tcpwrapped open
4132149.126.72.220 1452 tcp tcpwrapped open
4133149.126.72.220 1453 tcp tcpwrapped open
4134149.126.72.220 1454 tcp tcpwrapped open
4135149.126.72.220 1455 tcp tcpwrapped open
4136149.126.72.220 1456 tcp tcpwrapped open
4137149.126.72.220 1457 tcp tcpwrapped open
4138149.126.72.220 1458 tcp tcpwrapped open
4139149.126.72.220 1459 tcp tcpwrapped open
4140149.126.72.220 1460 tcp tcpwrapped open
4141149.126.72.220 1494 tcp tcpwrapped open
4142149.126.72.220 1935 tcp tcpwrapped open
4143149.126.72.220 1950 tcp tcpwrapped open
4144149.126.72.220 1951 tcp tcpwrapped open
4145149.126.72.220 1952 tcp tcpwrapped open
4146149.126.72.220 1953 tcp tcpwrapped open
4147149.126.72.220 1954 tcp tcpwrapped open
4148149.126.72.220 1955 tcp tcpwrapped open
4149149.126.72.220 1956 tcp tcpwrapped open
4150149.126.72.220 1957 tcp tcpwrapped open
4151149.126.72.220 1958 tcp tcpwrapped open
4152149.126.72.220 1959 tcp tcpwrapped open
4153149.126.72.220 1960 tcp tcpwrapped open
4154149.126.72.220 1964 tcp tcpwrapped open
4155149.126.72.220 1965 tcp tcpwrapped open
4156149.126.72.220 1966 tcp tcpwrapped open
4157149.126.72.220 1967 tcp tcpwrapped open
4158149.126.72.220 1968 tcp tcpwrapped open
4159149.126.72.220 1969 tcp tcpwrapped open
4160149.126.72.220 1970 tcp tcpwrapped open
4161149.126.72.220 1971 tcp tcpwrapped open
4162149.126.72.220 1972 tcp tcpwrapped open
4163149.126.72.220 1973 tcp tcpwrapped open
4164149.126.72.220 1974 tcp tcpwrapped open
4165149.126.72.220 1975 tcp tcpwrapped open
4166149.126.72.220 1976 tcp tcpwrapped open
4167149.126.72.220 1977 tcp tcpwrapped open
4168149.126.72.220 1978 tcp tcpwrapped open
4169149.126.72.220 1979 tcp tcpwrapped open
4170149.126.72.220 1980 tcp tcpwrapped open
4171149.126.72.220 1981 tcp tcpwrapped open
4172149.126.72.220 1982 tcp tcpwrapped open
4173149.126.72.220 1983 tcp tcpwrapped open
4174149.126.72.220 1984 tcp tcpwrapped open
4175149.126.72.220 1985 tcp tcpwrapped open
4176149.126.72.220 1986 tcp tcpwrapped open
4177149.126.72.220 1987 tcp tcpwrapped open
4178149.126.72.220 1988 tcp tcpwrapped open
4179149.126.72.220 1989 tcp tcpwrapped open
4180149.126.72.220 2000 tcp tcpwrapped open
4181149.126.72.220 2001 tcp tcpwrapped open
4182149.126.72.220 2006 tcp tcpwrapped open
4183149.126.72.220 2012 tcp tcpwrapped open
4184149.126.72.220 2020 tcp tcpwrapped open
4185149.126.72.220 2048 tcp tcpwrapped open
4186149.126.72.220 2049 tcp http open Incapsula CDN httpd
4187149.126.72.220 2049 udp nfs unknown
4188149.126.72.220 2050 tcp tcpwrapped open
4189149.126.72.220 2051 tcp tcpwrapped open
4190149.126.72.220 2052 tcp tcpwrapped open
4191149.126.72.220 2053 tcp tcpwrapped open
4192149.126.72.220 2054 tcp tcpwrapped open
4193149.126.72.220 2055 tcp tcpwrapped open
4194149.126.72.220 2056 tcp tcpwrapped open
4195149.126.72.220 2057 tcp tcpwrapped open
4196149.126.72.220 2058 tcp tcpwrapped open
4197149.126.72.220 2059 tcp tcpwrapped open
4198149.126.72.220 2060 tcp tcpwrapped open
4199149.126.72.220 2061 tcp tcpwrapped open
4200149.126.72.220 2062 tcp tcpwrapped open
4201149.126.72.220 2063 tcp tcpwrapped open
4202149.126.72.220 2064 tcp tcpwrapped open
4203149.126.72.220 2065 tcp tcpwrapped open
4204149.126.72.220 2066 tcp tcpwrapped open
4205149.126.72.220 2067 tcp tcpwrapped open
4206149.126.72.220 2068 tcp tcpwrapped open
4207149.126.72.220 2069 tcp tcpwrapped open
4208149.126.72.220 2070 tcp tcpwrapped open
4209149.126.72.220 2072 tcp tcpwrapped open
4210149.126.72.220 2082 tcp tcpwrapped open
4211149.126.72.220 2083 tcp tcpwrapped open
4212149.126.72.220 2087 tcp tcpwrapped open
4213149.126.72.220 2096 tcp tcpwrapped open
4214149.126.72.220 2100 tcp tcpwrapped open
4215149.126.72.220 2108 tcp tcpwrapped open
4216149.126.72.220 2200 tcp tcpwrapped open
4217149.126.72.220 2209 tcp tcpwrapped open
4218149.126.72.220 2222 tcp tcpwrapped open
4219149.126.72.220 2226 tcp tcpwrapped open
4220149.126.72.220 2248 tcp tcpwrapped open
4221149.126.72.220 2344 tcp tcpwrapped open
4222149.126.72.220 2345 tcp tcpwrapped open
4223149.126.72.220 2353 tcp tcpwrapped open
4224149.126.72.220 2363 tcp tcpwrapped open
4225149.126.72.220 2423 tcp tcpwrapped open
4226149.126.72.220 2433 tcp tcpwrapped open
4227149.126.72.220 2435 tcp tcpwrapped open
4228149.126.72.220 2443 tcp tcpwrapped open
4229149.126.72.220 2453 tcp tcpwrapped open
4230149.126.72.220 2480 tcp tcpwrapped open
4231149.126.72.220 2548 tcp tcpwrapped open
4232149.126.72.220 2549 tcp tcpwrapped open
4233149.126.72.220 2550 tcp tcpwrapped open
4234149.126.72.220 2551 tcp tcpwrapped open
4235149.126.72.220 2552 tcp tcpwrapped open
4236149.126.72.220 2553 tcp tcpwrapped open
4237149.126.72.220 2554 tcp tcpwrapped open
4238149.126.72.220 2555 tcp tcpwrapped open
4239149.126.72.220 2556 tcp tcpwrapped open
4240149.126.72.220 2557 tcp tcpwrapped open
4241149.126.72.220 2558 tcp tcpwrapped open
4242149.126.72.220 2559 tcp tcpwrapped open
4243149.126.72.220 2560 tcp tcpwrapped open
4244149.126.72.220 2561 tcp tcpwrapped open
4245149.126.72.220 2562 tcp tcpwrapped open
4246149.126.72.220 2563 tcp tcpwrapped open
4247149.126.72.220 2566 tcp tcpwrapped open
4248149.126.72.220 2567 tcp tcpwrapped open
4249149.126.72.220 2568 tcp tcpwrapped open
4250149.126.72.220 2569 tcp tcpwrapped open
4251149.126.72.220 2570 tcp tcpwrapped open
4252149.126.72.220 2572 tcp tcpwrapped open
4253149.126.72.220 2598 tcp tcpwrapped open
4254149.126.72.220 2599 tcp tcpwrapped open
4255149.126.72.220 2850 tcp tcpwrapped open
4256149.126.72.220 2985 tcp tcpwrapped open
4257149.126.72.220 2995 tcp tcpwrapped open
4258149.126.72.220 3000 tcp tcpwrapped open
4259149.126.72.220 3001 tcp tcpwrapped open
4260149.126.72.220 3002 tcp tcpwrapped open
4261149.126.72.220 3003 tcp tcpwrapped open
4262149.126.72.220 3004 tcp tcpwrapped open
4263149.126.72.220 3005 tcp tcpwrapped open
4264149.126.72.220 3006 tcp tcpwrapped open
4265149.126.72.220 3007 tcp tcpwrapped open
4266149.126.72.220 3008 tcp tcpwrapped open
4267149.126.72.220 3009 tcp tcpwrapped open
4268149.126.72.220 3010 tcp tcpwrapped open
4269149.126.72.220 3011 tcp tcpwrapped open
4270149.126.72.220 3012 tcp tcpwrapped open
4271149.126.72.220 3013 tcp tcpwrapped open
4272149.126.72.220 3014 tcp tcpwrapped open
4273149.126.72.220 3015 tcp tcpwrapped open
4274149.126.72.220 3016 tcp tcpwrapped open
4275149.126.72.220 3017 tcp tcpwrapped open
4276149.126.72.220 3018 tcp tcpwrapped open
4277149.126.72.220 3019 tcp tcpwrapped open
4278149.126.72.220 3020 tcp tcpwrapped open
4279149.126.72.220 3021 tcp tcpwrapped open
4280149.126.72.220 3022 tcp tcpwrapped open
4281149.126.72.220 3030 tcp tcpwrapped open
4282149.126.72.220 3047 tcp tcpwrapped open
4283149.126.72.220 3048 tcp tcpwrapped open
4284149.126.72.220 3049 tcp tcpwrapped open
4285149.126.72.220 3050 tcp tcpwrapped open
4286149.126.72.220 3051 tcp tcpwrapped open
4287149.126.72.220 3052 tcp tcpwrapped open
4288149.126.72.220 3053 tcp tcpwrapped open
4289149.126.72.220 3054 tcp tcpwrapped open
4290149.126.72.220 3055 tcp tcpwrapped open
4291149.126.72.220 3056 tcp tcpwrapped open
4292149.126.72.220 3057 tcp tcpwrapped open
4293149.126.72.220 3058 tcp tcpwrapped open
4294149.126.72.220 3059 tcp tcpwrapped open
4295149.126.72.220 3060 tcp tcpwrapped open
4296149.126.72.220 3061 tcp tcpwrapped open
4297149.126.72.220 3062 tcp tcpwrapped open
4298149.126.72.220 3063 tcp tcpwrapped open
4299149.126.72.220 3064 tcp tcpwrapped open
4300149.126.72.220 3065 tcp tcpwrapped open
4301149.126.72.220 3066 tcp tcpwrapped open
4302149.126.72.220 3067 tcp tcpwrapped open
4303149.126.72.220 3068 tcp tcpwrapped open
4304149.126.72.220 3069 tcp tcpwrapped open
4305149.126.72.220 3070 tcp tcpwrapped open
4306149.126.72.220 3071 tcp tcpwrapped open
4307149.126.72.220 3072 tcp tcpwrapped open
4308149.126.72.220 3073 tcp tcpwrapped open
4309149.126.72.220 3074 tcp tcpwrapped open
4310149.126.72.220 3075 tcp tcpwrapped open
4311149.126.72.220 3076 tcp tcpwrapped open
4312149.126.72.220 3077 tcp tcpwrapped open
4313149.126.72.220 3078 tcp tcpwrapped open
4314149.126.72.220 3079 tcp tcpwrapped open
4315149.126.72.220 3080 tcp tcpwrapped open
4316149.126.72.220 3081 tcp tcpwrapped open
4317149.126.72.220 3082 tcp tcpwrapped open
4318149.126.72.220 3083 tcp tcpwrapped open
4319149.126.72.220 3084 tcp tcpwrapped open
4320149.126.72.220 3085 tcp tcpwrapped open
4321149.126.72.220 3086 tcp tcpwrapped open
4322149.126.72.220 3087 tcp tcpwrapped open
4323149.126.72.220 3088 tcp tcpwrapped open
4324149.126.72.220 3089 tcp tcpwrapped open
4325149.126.72.220 3090 tcp tcpwrapped open
4326149.126.72.220 3091 tcp tcpwrapped open
4327149.126.72.220 3092 tcp tcpwrapped open
4328149.126.72.220 3093 tcp tcpwrapped open
4329149.126.72.220 3094 tcp tcpwrapped open
4330149.126.72.220 3095 tcp tcpwrapped open
4331149.126.72.220 3096 tcp tcpwrapped open
4332149.126.72.220 3097 tcp tcpwrapped open
4333149.126.72.220 3098 tcp tcpwrapped open
4334149.126.72.220 3099 tcp tcpwrapped open
4335149.126.72.220 3100 tcp tcpwrapped open
4336149.126.72.220 3101 tcp tcpwrapped open
4337149.126.72.220 3102 tcp tcpwrapped open
4338149.126.72.220 3103 tcp tcpwrapped open
4339149.126.72.220 3104 tcp tcpwrapped open
4340149.126.72.220 3105 tcp tcpwrapped open
4341149.126.72.220 3106 tcp tcpwrapped open
4342149.126.72.220 3107 tcp tcpwrapped open
4343149.126.72.220 3108 tcp tcpwrapped open
4344149.126.72.220 3109 tcp tcpwrapped open
4345149.126.72.220 3110 tcp tcpwrapped open
4346149.126.72.220 3111 tcp tcpwrapped open
4347149.126.72.220 3112 tcp tcpwrapped open
4348149.126.72.220 3113 tcp tcpwrapped open
4349149.126.72.220 3114 tcp tcpwrapped open
4350149.126.72.220 3115 tcp tcpwrapped open
4351149.126.72.220 3116 tcp tcpwrapped open
4352149.126.72.220 3117 tcp tcpwrapped open
4353149.126.72.220 3118 tcp tcpwrapped open
4354149.126.72.220 3119 tcp tcpwrapped open
4355149.126.72.220 3120 tcp tcpwrapped open
4356149.126.72.220 3121 tcp tcpwrapped open
4357149.126.72.220 3150 tcp tcpwrapped open
4358149.126.72.220 3155 tcp tcpwrapped open
4359149.126.72.220 3160 tcp tcpwrapped open
4360149.126.72.220 3165 tcp tcpwrapped open
4361149.126.72.220 3270 tcp tcpwrapped open
4362149.126.72.220 3299 tcp tcpwrapped open
4363149.126.72.220 3306 tcp tcpwrapped open
4364149.126.72.220 3333 tcp tcpwrapped open
4365149.126.72.220 3389 tcp tcpwrapped open
4366149.126.72.220 3391 tcp tcpwrapped open
4367149.126.72.220 3400 tcp tcpwrapped open
4368149.126.72.220 3401 tcp tcpwrapped open
4369149.126.72.220 3402 tcp tcpwrapped open
4370149.126.72.220 3403 tcp tcpwrapped open
4371149.126.72.220 3404 tcp tcpwrapped open
4372149.126.72.220 3405 tcp tcpwrapped open
4373149.126.72.220 3406 tcp tcpwrapped open
4374149.126.72.220 3407 tcp tcpwrapped open
4375149.126.72.220 3408 tcp tcpwrapped open
4376149.126.72.220 3409 tcp tcpwrapped open
4377149.126.72.220 3410 tcp tcpwrapped open
4378149.126.72.220 3412 tcp tcpwrapped open
4379149.126.72.220 3443 tcp tcpwrapped open
4380149.126.72.220 3500 tcp tcpwrapped open
4381149.126.72.220 3510 tcp tcpwrapped open
4382149.126.72.220 3521 tcp tcpwrapped open
4383149.126.72.220 3522 tcp tcpwrapped open
4384149.126.72.220 3523 tcp tcpwrapped open
4385149.126.72.220 3524 tcp tcpwrapped open
4386149.126.72.220 3530 tcp tcpwrapped open
4387149.126.72.220 3531 tcp tcpwrapped open
4388149.126.72.220 3540 tcp tcpwrapped open
4389149.126.72.220 3548 tcp tcpwrapped open
4390149.126.72.220 3549 tcp tcpwrapped open
4391149.126.72.220 3550 tcp tcpwrapped open
4392149.126.72.220 3551 tcp tcpwrapped open
4393149.126.72.220 3552 tcp tcpwrapped open
4394149.126.72.220 3553 tcp tcpwrapped open
4395149.126.72.220 3554 tcp tcpwrapped open
4396149.126.72.220 3555 tcp tcpwrapped open
4397149.126.72.220 3556 tcp tcpwrapped open
4398149.126.72.220 3557 tcp tcpwrapped open
4399149.126.72.220 3558 tcp tcpwrapped open
4400149.126.72.220 3559 tcp tcpwrapped open
4401149.126.72.220 3560 tcp tcpwrapped open
4402149.126.72.220 3561 tcp tcpwrapped open
4403149.126.72.220 3562 tcp tcpwrapped open
4404149.126.72.220 3563 tcp tcpwrapped open
4405149.126.72.220 3566 tcp tcpwrapped open
4406149.126.72.220 3567 tcp tcpwrapped open
4407149.126.72.220 3568 tcp tcpwrapped open
4408149.126.72.220 3569 tcp tcpwrapped open
4409149.126.72.220 3570 tcp tcpwrapped open
4410149.126.72.220 3572 tcp tcpwrapped open
4411149.126.72.220 3580 tcp tcpwrapped open
4412149.126.72.220 3590 tcp tcpwrapped open
4413149.126.72.220 3790 tcp tcpwrapped open
4414149.126.72.220 3791 tcp tcpwrapped open
4415149.126.72.220 3792 tcp tcpwrapped open
4416149.126.72.220 3793 tcp tcpwrapped open
4417149.126.72.220 3794 tcp tcpwrapped open
4418149.126.72.220 3838 tcp tcpwrapped open
4419149.126.72.220 3841 tcp tcpwrapped open
4420149.126.72.220 3842 tcp tcpwrapped open
4421149.126.72.220 3950 tcp tcpwrapped open
4422149.126.72.220 3951 tcp tcpwrapped open
4423149.126.72.220 3952 tcp tcpwrapped open
4424149.126.72.220 3953 tcp tcpwrapped open
4425149.126.72.220 3954 tcp adrep open
4426149.126.72.220 4000 tcp tcpwrapped open
4427149.126.72.220 4001 tcp newoak open
4428149.126.72.220 4002 tcp mlchat-proxy open
4429149.126.72.220 4021 tcp nexus-portal open
4430149.126.72.220 4022 tcp dnox open
4431149.126.72.220 4023 tcp esnm-zoning open
4432149.126.72.220 4043 tcp nirp open
4433149.126.72.220 4072 tcp zieto-sock open
4434149.126.72.220 4080 tcp lorica-in open
4435149.126.72.220 4085 tcp ezmessagesrv open
4436149.126.72.220 4120 tcp minirem open
4437149.126.72.220 4147 tcp vrxpservman open
4438149.126.72.220 4148 tcp hhb-handheld open
4439149.126.72.220 4150 tcp poweralert-nsa open
4440149.126.72.220 4155 tcp bzr open
4441149.126.72.220 4160 tcp jini-discovery open
4442149.126.72.220 4165 tcp altcp open
4443149.126.72.220 4172 tcp pcoip open
4444149.126.72.220 4243 tcp vrml-multi-use open
4445149.126.72.220 4244 tcp vrml-multi-use open
4446149.126.72.220 4250 tcp vrml-multi-use open
4447149.126.72.220 4300 tcp corelccam open
4448149.126.72.220 4333 tcp msql open
4449149.126.72.220 4343 tcp unicall open
4450149.126.72.220 4344 tcp vinainstall open
4451149.126.72.220 4400 tcp ds-srv open
4452149.126.72.220 4401 tcp tcpwrapped open
4453149.126.72.220 4402 tcp tcpwrapped open
4454149.126.72.220 4430 tcp tcpwrapped open
4455149.126.72.220 4431 tcp tcpwrapped open
4456149.126.72.220 4432 tcp tcpwrapped open
4457149.126.72.220 4434 tcp tcpwrapped open
4458149.126.72.220 4435 tcp tcpwrapped open
4459149.126.72.220 4436 tcp tcpwrapped open
4460149.126.72.220 4437 tcp tcpwrapped open
4461149.126.72.220 4439 tcp tcpwrapped open
4462149.126.72.220 4440 tcp tcpwrapped open
4463149.126.72.220 4443 tcp tcpwrapped open
4464149.126.72.220 4444 tcp tcpwrapped open
4465149.126.72.220 4445 tcp tcpwrapped open
4466149.126.72.220 4451 tcp tcpwrapped open
4467149.126.72.220 4455 tcp tcpwrapped open
4468149.126.72.220 4457 tcp tcpwrapped open
4469149.126.72.220 4459 tcp tcpwrapped open
4470149.126.72.220 4461 tcp tcpwrapped open
4471149.126.72.220 4463 tcp tcpwrapped open
4472149.126.72.220 4477 tcp tcpwrapped open
4473149.126.72.220 4482 tcp tcpwrapped open
4474149.126.72.220 4500 tcp tcpwrapped open
4475149.126.72.220 4502 tcp tcpwrapped open
4476149.126.72.220 4505 tcp tcpwrapped open
4477149.126.72.220 4572 tcp tcpwrapped open
4478149.126.72.220 4602 tcp tcpwrapped open
4479149.126.72.220 4620 tcp tcpwrapped open
4480149.126.72.220 4643 tcp tcpwrapped open
4481149.126.72.220 4848 tcp tcpwrapped open
4482149.126.72.220 4933 tcp tcpwrapped open
4483149.126.72.220 4993 tcp tcpwrapped open
4484149.126.72.220 5000 tcp tcpwrapped open
4485149.126.72.220 5001 tcp tcpwrapped open
4486149.126.72.220 5002 tcp tcpwrapped open
4487149.126.72.220 5003 tcp tcpwrapped open
4488149.126.72.220 5004 tcp tcpwrapped open
4489149.126.72.220 5005 tcp tcpwrapped open
4490149.126.72.220 5006 tcp tcpwrapped open
4491149.126.72.220 5007 tcp tcpwrapped open
4492149.126.72.220 5008 tcp tcpwrapped open
4493149.126.72.220 5009 tcp tcpwrapped open
4494149.126.72.220 5010 tcp tcpwrapped open
4495149.126.72.220 5011 tcp tcpwrapped open
4496149.126.72.220 5022 tcp tcpwrapped open
4497149.126.72.220 5050 tcp tcpwrapped open
4498149.126.72.220 5053 tcp tcpwrapped open
4499149.126.72.220 5060 tcp tcpwrapped open
4500149.126.72.220 5061 tcp tcpwrapped open
4501149.126.72.220 5080 tcp tcpwrapped open
4502149.126.72.220 5083 tcp tcpwrapped open
4503149.126.72.220 5089 tcp tcpwrapped open
4504149.126.72.220 5090 tcp tcpwrapped open
4505149.126.72.220 5100 tcp tcpwrapped open
4506149.126.72.220 5105 tcp tcpwrapped open
4507149.126.72.220 5119 tcp tcpwrapped open
4508149.126.72.220 5120 tcp tcpwrapped open
4509149.126.72.220 5130 tcp tcpwrapped open
4510149.126.72.220 5140 tcp tcpwrapped open
4511149.126.72.220 5150 tcp tcpwrapped open
4512149.126.72.220 5160 tcp tcpwrapped open
4513149.126.72.220 5180 tcp tcpwrapped open
4514149.126.72.220 5201 tcp tcpwrapped open
4515149.126.72.220 5222 tcp tcpwrapped open
4516149.126.72.220 5223 tcp tcpwrapped open
4517149.126.72.220 5224 tcp tcpwrapped open
4518149.126.72.220 5225 tcp tcpwrapped open
4519149.126.72.220 5226 tcp tcpwrapped open
4520149.126.72.220 5227 tcp tcpwrapped open
4521149.126.72.220 5228 tcp tcpwrapped open
4522149.126.72.220 5229 tcp tcpwrapped open
4523149.126.72.220 5230 tcp tcpwrapped open
4524149.126.72.220 5231 tcp tcpwrapped open
4525149.126.72.220 5232 tcp tcpwrapped open
4526149.126.72.220 5233 tcp tcpwrapped open
4527149.126.72.220 5234 tcp tcpwrapped open
4528149.126.72.220 5235 tcp tcpwrapped open
4529149.126.72.220 5236 tcp tcpwrapped open
4530149.126.72.220 5237 tcp tcpwrapped open
4531149.126.72.220 5238 tcp tcpwrapped open
4532149.126.72.220 5239 tcp tcpwrapped open
4533149.126.72.220 5240 tcp tcpwrapped open
4534149.126.72.220 5241 tcp tcpwrapped open
4535149.126.72.220 5242 tcp tcpwrapped open
4536149.126.72.220 5243 tcp tcpwrapped open
4537149.126.72.220 5244 tcp tcpwrapped open
4538149.126.72.220 5245 tcp tcpwrapped open
4539149.126.72.220 5246 tcp tcpwrapped open
4540149.126.72.220 5247 tcp tcpwrapped open
4541149.126.72.220 5248 tcp tcpwrapped open
4542149.126.72.220 5249 tcp tcpwrapped open
4543149.126.72.220 5250 tcp tcpwrapped open
4544149.126.72.220 5251 tcp tcpwrapped open
4545149.126.72.220 5252 tcp tcpwrapped open
4546149.126.72.220 5253 tcp tcpwrapped open
4547149.126.72.220 5254 tcp tcpwrapped open
4548149.126.72.220 5255 tcp tcpwrapped open
4549149.126.72.220 5256 tcp tcpwrapped open
4550149.126.72.220 5257 tcp tcpwrapped open
4551149.126.72.220 5258 tcp tcpwrapped open
4552149.126.72.220 5259 tcp tcpwrapped open
4553149.126.72.220 5260 tcp tcpwrapped open
4554149.126.72.220 5261 tcp tcpwrapped open
4555149.126.72.220 5262 tcp tcpwrapped open
4556149.126.72.220 5263 tcp tcpwrapped open
4557149.126.72.220 5264 tcp tcpwrapped open
4558149.126.72.220 5265 tcp tcpwrapped open
4559149.126.72.220 5266 tcp tcpwrapped open
4560149.126.72.220 5267 tcp tcpwrapped open
4561149.126.72.220 5268 tcp tcpwrapped open
4562149.126.72.220 5269 tcp tcpwrapped open
4563149.126.72.220 5270 tcp tcpwrapped open
4564149.126.72.220 5271 tcp tcpwrapped open
4565149.126.72.220 5272 tcp tcpwrapped open
4566149.126.72.220 5273 tcp tcpwrapped open
4567149.126.72.220 5274 tcp tcpwrapped open
4568149.126.72.220 5275 tcp tcpwrapped open
4569149.126.72.220 5276 tcp tcpwrapped open
4570149.126.72.220 5277 tcp tcpwrapped open
4571149.126.72.220 5278 tcp tcpwrapped open
4572149.126.72.220 5279 tcp tcpwrapped open
4573149.126.72.220 5280 tcp tcpwrapped open
4574149.126.72.220 5440 tcp tcpwrapped open
4575149.126.72.220 5443 tcp tcpwrapped open
4576149.126.72.220 5456 tcp tcpwrapped open
4577149.126.72.220 5494 tcp tcpwrapped open
4578149.126.72.220 5495 tcp tcpwrapped open
4579149.126.72.220 5500 tcp tcpwrapped open
4580149.126.72.220 5503 tcp tcpwrapped open
4581149.126.72.220 5552 tcp tcpwrapped open
4582149.126.72.220 5555 tcp tcpwrapped open
4583149.126.72.220 5556 tcp tcpwrapped open
4584149.126.72.220 5557 tcp tcpwrapped open
4585149.126.72.220 5567 tcp tcpwrapped open
4586149.126.72.220 5568 tcp tcpwrapped open
4587149.126.72.220 5569 tcp tcpwrapped open
4588149.126.72.220 5590 tcp tcpwrapped open
4589149.126.72.220 5591 tcp tcpwrapped open
4590149.126.72.220 5592 tcp tcpwrapped open
4591149.126.72.220 5593 tcp tcpwrapped open
4592149.126.72.220 5594 tcp tcpwrapped open
4593149.126.72.220 5595 tcp tcpwrapped open
4594149.126.72.220 5596 tcp tcpwrapped open
4595149.126.72.220 5597 tcp tcpwrapped open
4596149.126.72.220 5598 tcp tcpwrapped open
4597149.126.72.220 5599 tcp tcpwrapped open
4598149.126.72.220 5600 tcp tcpwrapped open
4599149.126.72.220 5601 tcp tcpwrapped open
4600149.126.72.220 5602 tcp tcpwrapped open
4601149.126.72.220 5603 tcp tcpwrapped open
4602149.126.72.220 5604 tcp tcpwrapped open
4603149.126.72.220 5605 tcp tcpwrapped open
4604149.126.72.220 5606 tcp tcpwrapped open
4605149.126.72.220 5607 tcp tcpwrapped open
4606149.126.72.220 5608 tcp tcpwrapped open
4607149.126.72.220 5609 tcp tcpwrapped open
4608149.126.72.220 5613 tcp tcpwrapped open
4609149.126.72.220 5614 tcp tcpwrapped open
4610149.126.72.220 5620 tcp tcpwrapped open
4611149.126.72.220 5630 tcp tcpwrapped open
4612149.126.72.220 5640 tcp tcpwrapped open
4613149.126.72.220 5650 tcp tcpwrapped open
4614149.126.72.220 5660 tcp tcpwrapped open
4615149.126.72.220 5671 tcp tcpwrapped open
4616149.126.72.220 5672 tcp tcpwrapped open
4617149.126.72.220 5673 tcp tcpwrapped open
4618149.126.72.220 5680 tcp tcpwrapped open
4619149.126.72.220 5696 tcp tcpwrapped open
4620149.126.72.220 5698 tcp tcpwrapped open
4621149.126.72.220 5701 tcp tcpwrapped open
4622149.126.72.220 5721 tcp tcpwrapped open
4623149.126.72.220 5900 tcp tcpwrapped open
4624149.126.72.220 5901 tcp tcpwrapped open
4625149.126.72.220 5902 tcp tcpwrapped open
4626149.126.72.220 5903 tcp tcpwrapped open
4627149.126.72.220 5904 tcp tcpwrapped open
4628149.126.72.220 5905 tcp tcpwrapped open
4629149.126.72.220 5906 tcp tcpwrapped open
4630149.126.72.220 5907 tcp tcpwrapped open
4631149.126.72.220 5908 tcp tcpwrapped open
4632149.126.72.220 5909 tcp tcpwrapped open
4633149.126.72.220 5910 tcp tcpwrapped open
4634149.126.72.220 5911 tcp tcpwrapped open
4635149.126.72.220 5912 tcp tcpwrapped open
4636149.126.72.220 5913 tcp tcpwrapped open
4637149.126.72.220 5914 tcp tcpwrapped open
4638149.126.72.220 5915 tcp tcpwrapped open
4639149.126.72.220 5916 tcp tcpwrapped open
4640149.126.72.220 5917 tcp tcpwrapped open
4641149.126.72.220 5918 tcp tcpwrapped open
4642149.126.72.220 5919 tcp tcpwrapped open
4643149.126.72.220 5920 tcp tcpwrapped open
4644149.126.72.220 5984 tcp tcpwrapped open
4645149.126.72.220 5985 tcp tcpwrapped open
4646149.126.72.220 5986 tcp tcpwrapped open
4647149.126.72.220 5987 tcp tcpwrapped open
4648149.126.72.220 5988 tcp tcpwrapped open
4649149.126.72.220 5989 tcp tcpwrapped open
4650149.126.72.220 5990 tcp tcpwrapped open
4651149.126.72.220 5991 tcp tcpwrapped open
4652149.126.72.220 5992 tcp tcpwrapped open
4653149.126.72.220 5993 tcp tcpwrapped open
4654149.126.72.220 5994 tcp tcpwrapped open
4655149.126.72.220 5995 tcp tcpwrapped open
4656149.126.72.220 5996 tcp tcpwrapped open
4657149.126.72.220 5997 tcp tcpwrapped open
4658149.126.72.220 5998 tcp tcpwrapped open
4659149.126.72.220 5999 tcp tcpwrapped open
4660149.126.72.220 6000 tcp tcpwrapped open
4661149.126.72.220 6001 tcp tcpwrapped open
4662149.126.72.220 6002 tcp tcpwrapped open
4663149.126.72.220 6003 tcp tcpwrapped open
4664149.126.72.220 6004 tcp tcpwrapped open
4665149.126.72.220 6005 tcp tcpwrapped open
4666149.126.72.220 6006 tcp tcpwrapped open
4667149.126.72.220 6007 tcp tcpwrapped open
4668149.126.72.220 6008 tcp tcpwrapped open
4669149.126.72.220 6009 tcp tcpwrapped open
4670149.126.72.220 6010 tcp tcpwrapped open
4671149.126.72.220 6011 tcp tcpwrapped open
4672149.126.72.220 6021 tcp tcpwrapped open
4673149.126.72.220 6060 tcp tcpwrapped open
4674149.126.72.220 6061 tcp tcpwrapped open
4675149.126.72.220 6081 tcp tcpwrapped open
4676149.126.72.220 6100 tcp tcpwrapped open
4677149.126.72.220 6102 tcp tcpwrapped open
4678149.126.72.220 6134 tcp tcpwrapped open
4679149.126.72.220 6161 tcp tcpwrapped open
4680149.126.72.220 6331 tcp tcpwrapped open
4681149.126.72.220 6348 tcp tcpwrapped open
4682149.126.72.220 6379 tcp tcpwrapped open
4683149.126.72.220 6380 tcp tcpwrapped open
4684149.126.72.220 6433 tcp tcpwrapped open
4685149.126.72.220 6440 tcp tcpwrapped open
4686149.126.72.220 6443 tcp tcpwrapped open
4687149.126.72.220 6488 tcp tcpwrapped open
4688149.126.72.220 6500 tcp tcpwrapped open
4689149.126.72.220 6505 tcp tcpwrapped open
4690149.126.72.220 6510 tcp tcpwrapped open
4691149.126.72.220 6511 tcp tcpwrapped open
4692149.126.72.220 6512 tcp tcpwrapped open
4693149.126.72.220 6514 tcp tcpwrapped open
4694149.126.72.220 6543 tcp tcpwrapped open
4695149.126.72.220 6544 tcp tcpwrapped open
4696149.126.72.220 6560 tcp tcpwrapped open
4697149.126.72.220 6561 tcp tcpwrapped open
4698149.126.72.220 6565 tcp tcpwrapped open
4699149.126.72.220 6580 tcp tcpwrapped open
4700149.126.72.220 6581 tcp tcpwrapped open
4701149.126.72.220 6590 tcp tcpwrapped open
4702149.126.72.220 6601 tcp tcpwrapped open
4703149.126.72.220 6603 tcp tcpwrapped open
4704149.126.72.220 6605 tcp tcpwrapped open
4705149.126.72.220 6661 tcp tcpwrapped open
4706149.126.72.220 6662 tcp tcpwrapped open
4707149.126.72.220 6666 tcp tcpwrapped open
4708149.126.72.220 6686 tcp tcpwrapped open
4709149.126.72.220 6688 tcp tcpwrapped open
4710149.126.72.220 6700 tcp tcpwrapped open
4711149.126.72.220 6755 tcp tcpwrapped open
4712149.126.72.220 6775 tcp tcpwrapped open
4713149.126.72.220 6779 tcp tcpwrapped open
4714149.126.72.220 6789 tcp tcpwrapped open
4715149.126.72.220 6799 tcp tcpwrapped open
4716149.126.72.220 7000 tcp tcpwrapped open
4717149.126.72.220 7001 tcp tcpwrapped open
4718149.126.72.220 7002 tcp tcpwrapped open
4719149.126.72.220 7003 tcp tcpwrapped open
4720149.126.72.220 7004 tcp tcpwrapped open
4721149.126.72.220 7005 tcp tcpwrapped open
4722149.126.72.220 7007 tcp tcpwrapped open
4723149.126.72.220 7010 tcp tcpwrapped open
4724149.126.72.220 7011 tcp tcpwrapped open
4725149.126.72.220 7021 tcp tcpwrapped open
4726149.126.72.220 7070 tcp tcpwrapped open
4727149.126.72.220 7071 tcp tcpwrapped open
4728149.126.72.220 7079 tcp tcpwrapped open
4729149.126.72.220 7080 tcp tcpwrapped open
4730149.126.72.220 7081 tcp tcpwrapped open
4731149.126.72.220 7082 tcp tcpwrapped open
4732149.126.72.220 7083 tcp tcpwrapped open
4733149.126.72.220 7084 tcp tcpwrapped open
4734149.126.72.220 7085 tcp tcpwrapped open
4735149.126.72.220 7086 tcp tcpwrapped open
4736149.126.72.220 7087 tcp tcpwrapped open
4737149.126.72.220 7088 tcp tcpwrapped open
4738149.126.72.220 7090 tcp tcpwrapped open
4739149.126.72.220 7171 tcp tcpwrapped open
4740149.126.72.220 7172 tcp tcpwrapped open
4741149.126.72.220 7272 tcp tcpwrapped open
4742149.126.72.220 7348 tcp tcpwrapped open
4743149.126.72.220 7403 tcp tcpwrapped open
4744149.126.72.220 7433 tcp tcpwrapped open
4745149.126.72.220 7441 tcp tcpwrapped open
4746149.126.72.220 7443 tcp tcpwrapped open
4747149.126.72.220 7444 tcp tcpwrapped open
4748149.126.72.220 7445 tcp tcpwrapped open
4749149.126.72.220 7473 tcp tcpwrapped open
4750149.126.72.220 7500 tcp tcpwrapped open
4751149.126.72.220 7537 tcp tcpwrapped open
4752149.126.72.220 7687 tcp tcpwrapped open
4753149.126.72.220 7700 tcp tcpwrapped open
4754149.126.72.220 7771 tcp tcpwrapped open
4755149.126.72.220 7773 tcp tcpwrapped open
4756149.126.72.220 7774 tcp tcpwrapped open
4757149.126.72.220 7775 tcp tcpwrapped open
4758149.126.72.220 7776 tcp tcpwrapped open
4759149.126.72.220 7777 tcp tcpwrapped open
4760149.126.72.220 7778 tcp tcpwrapped open
4761149.126.72.220 7779 tcp tcpwrapped open
4762149.126.72.220 7788 tcp tcpwrapped open
4763149.126.72.220 7799 tcp tcpwrapped open
4764149.126.72.220 7998 tcp tcpwrapped open
4765149.126.72.220 7999 tcp tcpwrapped open
4766149.126.72.220 8000 tcp tcpwrapped open
4767149.126.72.220 8001 tcp tcpwrapped open
4768149.126.72.220 8002 tcp tcpwrapped open
4769149.126.72.220 8003 tcp tcpwrapped open
4770149.126.72.220 8004 tcp tcpwrapped open
4771149.126.72.220 8005 tcp tcpwrapped open
4772149.126.72.220 8006 tcp tcpwrapped open
4773149.126.72.220 8007 tcp tcpwrapped open
4774149.126.72.220 8008 tcp tcpwrapped open
4775149.126.72.220 8009 tcp tcpwrapped open
4776149.126.72.220 8010 tcp tcpwrapped open
4777149.126.72.220 8011 tcp tcpwrapped open
4778149.126.72.220 8012 tcp tcpwrapped open
4779149.126.72.220 8013 tcp tcpwrapped open
4780149.126.72.220 8014 tcp tcpwrapped open
4781149.126.72.220 8015 tcp tcpwrapped open
4782149.126.72.220 8016 tcp tcpwrapped open
4783149.126.72.220 8017 tcp tcpwrapped open
4784149.126.72.220 8018 tcp tcpwrapped open
4785149.126.72.220 8019 tcp tcpwrapped open
4786149.126.72.220 8020 tcp tcpwrapped open
4787149.126.72.220 8021 tcp tcpwrapped open
4788149.126.72.220 8022 tcp tcpwrapped open
4789149.126.72.220 8023 tcp tcpwrapped open
4790149.126.72.220 8024 tcp tcpwrapped open
4791149.126.72.220 8025 tcp tcpwrapped open
4792149.126.72.220 8026 tcp tcpwrapped open
4793149.126.72.220 8027 tcp tcpwrapped open
4794149.126.72.220 8028 tcp tcpwrapped open
4795149.126.72.220 8029 tcp tcpwrapped open
4796149.126.72.220 8030 tcp tcpwrapped open
4797149.126.72.220 8031 tcp tcpwrapped open
4798149.126.72.220 8032 tcp tcpwrapped open
4799149.126.72.220 8033 tcp tcpwrapped open
4800149.126.72.220 8034 tcp tcpwrapped open
4801149.126.72.220 8035 tcp tcpwrapped open
4802149.126.72.220 8036 tcp tcpwrapped open
4803149.126.72.220 8037 tcp tcpwrapped open
4804149.126.72.220 8038 tcp tcpwrapped open
4805149.126.72.220 8039 tcp tcpwrapped open
4806149.126.72.220 8040 tcp tcpwrapped open
4807149.126.72.220 8041 tcp tcpwrapped open
4808149.126.72.220 8042 tcp tcpwrapped open
4809149.126.72.220 8043 tcp tcpwrapped open
4810149.126.72.220 8044 tcp tcpwrapped open
4811149.126.72.220 8045 tcp tcpwrapped open
4812149.126.72.220 8046 tcp tcpwrapped open
4813149.126.72.220 8047 tcp tcpwrapped open
4814149.126.72.220 8048 tcp tcpwrapped open
4815149.126.72.220 8049 tcp tcpwrapped open
4816149.126.72.220 8050 tcp tcpwrapped open
4817149.126.72.220 8051 tcp tcpwrapped open
4818149.126.72.220 8052 tcp tcpwrapped open
4819149.126.72.220 8053 tcp tcpwrapped open
4820149.126.72.220 8054 tcp tcpwrapped open
4821149.126.72.220 8055 tcp tcpwrapped open
4822149.126.72.220 8056 tcp tcpwrapped open
4823149.126.72.220 8057 tcp tcpwrapped open
4824149.126.72.220 8058 tcp tcpwrapped open
4825149.126.72.220 8060 tcp tcpwrapped open
4826149.126.72.220 8064 tcp tcpwrapped open
4827149.126.72.220 8065 tcp tcpwrapped open
4828149.126.72.220 8069 tcp tcpwrapped open
4829149.126.72.220 8070 tcp tcpwrapped open
4830149.126.72.220 8071 tcp tcpwrapped open
4831149.126.72.220 8072 tcp tcpwrapped open
4832149.126.72.220 8074 tcp tcpwrapped open
4833149.126.72.220 8079 tcp tcpwrapped open
4834149.126.72.220 8080 tcp tcpwrapped open
4835149.126.72.220 8081 tcp tcpwrapped open
4836149.126.72.220 8082 tcp tcpwrapped open
4837149.126.72.220 8083 tcp tcpwrapped open
4838149.126.72.220 8084 tcp tcpwrapped open
4839149.126.72.220 8085 tcp tcpwrapped open
4840149.126.72.220 8086 tcp tcpwrapped open
4841149.126.72.220 8087 tcp tcpwrapped open
4842149.126.72.220 8088 tcp tcpwrapped open
4843149.126.72.220 8089 tcp tcpwrapped open
4844149.126.72.220 8090 tcp tcpwrapped open
4845149.126.72.220 8091 tcp tcpwrapped open
4846149.126.72.220 8092 tcp tcpwrapped open
4847149.126.72.220 8093 tcp tcpwrapped open
4848149.126.72.220 8094 tcp tcpwrapped open
4849149.126.72.220 8095 tcp tcpwrapped open
4850149.126.72.220 8096 tcp tcpwrapped open
4851149.126.72.220 8097 tcp tcpwrapped open
4852149.126.72.220 8098 tcp tcpwrapped open
4853149.126.72.220 8099 tcp tcpwrapped open
4854149.126.72.220 8100 tcp tcpwrapped open
4855149.126.72.220 8101 tcp tcpwrapped open
4856149.126.72.220 8102 tcp tcpwrapped open
4857149.126.72.220 8103 tcp tcpwrapped open
4858149.126.72.220 8104 tcp tcpwrapped open
4859149.126.72.220 8105 tcp tcpwrapped open
4860149.126.72.220 8106 tcp tcpwrapped open
4861149.126.72.220 8107 tcp tcpwrapped open
4862149.126.72.220 8108 tcp tcpwrapped open
4863149.126.72.220 8109 tcp tcpwrapped open
4864149.126.72.220 8110 tcp tcpwrapped open
4865149.126.72.220 8113 tcp tcpwrapped open
4866149.126.72.220 8114 tcp tcpwrapped open
4867149.126.72.220 8115 tcp tcpwrapped open
4868149.126.72.220 8118 tcp tcpwrapped open
4869149.126.72.220 8119 tcp tcpwrapped open
4870149.126.72.220 8120 tcp tcpwrapped open
4871149.126.72.220 8121 tcp tcpwrapped open
4872149.126.72.220 8123 tcp tcpwrapped open
4873149.126.72.220 8125 tcp tcpwrapped open
4874149.126.72.220 8126 tcp tcpwrapped open
4875149.126.72.220 8128 tcp tcpwrapped open
4876149.126.72.220 8129 tcp tcpwrapped open
4877149.126.72.220 8130 tcp tcpwrapped open
4878149.126.72.220 8131 tcp tcpwrapped open
4879149.126.72.220 8132 tcp tcpwrapped open
4880149.126.72.220 8133 tcp tcpwrapped open
4881149.126.72.220 8136 tcp tcpwrapped open
4882149.126.72.220 8140 tcp tcpwrapped open
4883149.126.72.220 8142 tcp tcpwrapped open
4884149.126.72.220 8143 tcp tcpwrapped open
4885149.126.72.220 8144 tcp tcpwrapped open
4886149.126.72.220 8147 tcp tcpwrapped open
4887149.126.72.220 8148 tcp tcpwrapped open
4888149.126.72.220 8149 tcp tcpwrapped open
4889149.126.72.220 8150 tcp tcpwrapped open
4890149.126.72.220 8154 tcp tcpwrapped open
4891149.126.72.220 8156 tcp tcpwrapped open
4892149.126.72.220 8157 tcp tcpwrapped open
4893149.126.72.220 8158 tcp tcpwrapped open
4894149.126.72.220 8160 tcp tcpwrapped open
4895149.126.72.220 8161 tcp tcpwrapped open
4896149.126.72.220 8162 tcp tcpwrapped open
4897149.126.72.220 8163 tcp tcpwrapped open
4898149.126.72.220 8164 tcp tcpwrapped open
4899149.126.72.220 8165 tcp tcpwrapped open
4900149.126.72.220 8166 tcp tcpwrapped open
4901149.126.72.220 8167 tcp tcpwrapped open
4902149.126.72.220 8168 tcp tcpwrapped open
4903149.126.72.220 8169 tcp tcpwrapped open
4904149.126.72.220 8170 tcp tcpwrapped open
4905149.126.72.220 8171 tcp tcpwrapped open
4906149.126.72.220 8172 tcp tcpwrapped open
4907149.126.72.220 8173 tcp tcpwrapped open
4908149.126.72.220 8175 tcp tcpwrapped open
4909149.126.72.220 8176 tcp tcpwrapped open
4910149.126.72.220 8178 tcp tcpwrapped open
4911149.126.72.220 8179 tcp tcpwrapped open
4912149.126.72.220 8180 tcp tcpwrapped open
4913149.126.72.220 8181 tcp tcpwrapped open
4914149.126.72.220 8182 tcp tcpwrapped open
4915149.126.72.220 8183 tcp tcpwrapped open
4916149.126.72.220 8184 tcp tcpwrapped open
4917149.126.72.220 8185 tcp tcpwrapped open
4918149.126.72.220 8186 tcp tcpwrapped open
4919149.126.72.220 8187 tcp tcpwrapped open
4920149.126.72.220 8188 tcp tcpwrapped open
4921149.126.72.220 8189 tcp tcpwrapped open
4922149.126.72.220 8190 tcp tcpwrapped open
4923149.126.72.220 8191 tcp tcpwrapped open
4924149.126.72.220 8192 tcp tcpwrapped open
4925149.126.72.220 8193 tcp tcpwrapped open
4926149.126.72.220 8194 tcp tcpwrapped open
4927149.126.72.220 8195 tcp tcpwrapped open
4928149.126.72.220 8198 tcp tcpwrapped open
4929149.126.72.220 8199 tcp tcpwrapped open
4930149.126.72.220 8200 tcp tcpwrapped open
4931149.126.72.220 8203 tcp tcpwrapped open
4932149.126.72.220 8222 tcp tcpwrapped open
4933149.126.72.220 8230 tcp tcpwrapped open
4934149.126.72.220 8236 tcp tcpwrapped open
4935149.126.72.220 8237 tcp tcpwrapped open
4936149.126.72.220 8238 tcp tcpwrapped open
4937149.126.72.220 8239 tcp tcpwrapped open
4938149.126.72.220 8241 tcp tcpwrapped open
4939149.126.72.220 8243 tcp tcpwrapped open
4940149.126.72.220 8248 tcp tcpwrapped open
4941149.126.72.220 8249 tcp tcpwrapped open
4942149.126.72.220 8250 tcp tcpwrapped open
4943149.126.72.220 8251 tcp tcpwrapped open
4944149.126.72.220 8252 tcp tcpwrapped open
4945149.126.72.220 8280 tcp tcpwrapped open
4946149.126.72.220 8282 tcp tcpwrapped open
4947149.126.72.220 8333 tcp tcpwrapped open
4948149.126.72.220 8340 tcp tcpwrapped open
4949149.126.72.220 8343 tcp tcpwrapped open
4950149.126.72.220 8350 tcp tcpwrapped open
4951149.126.72.220 8381 tcp tcpwrapped open
4952149.126.72.220 8382 tcp tcpwrapped open
4953149.126.72.220 8383 tcp tcpwrapped open
4954149.126.72.220 8384 tcp tcpwrapped open
4955149.126.72.220 8385 tcp tcpwrapped open
4956149.126.72.220 8388 tcp tcpwrapped open
4957149.126.72.220 8393 tcp tcpwrapped open
4958149.126.72.220 8401 tcp tcpwrapped open
4959149.126.72.220 8402 tcp tcpwrapped open
4960149.126.72.220 8403 tcp tcpwrapped open
4961149.126.72.220 8404 tcp tcpwrapped open
4962149.126.72.220 8405 tcp tcpwrapped open
4963149.126.72.220 8406 tcp tcpwrapped open
4964149.126.72.220 8407 tcp tcpwrapped open
4965149.126.72.220 8408 tcp tcpwrapped open
4966149.126.72.220 8409 tcp tcpwrapped open
4967149.126.72.220 8410 tcp tcpwrapped open
4968149.126.72.220 8411 tcp tcpwrapped open
4969149.126.72.220 8412 tcp tcpwrapped open
4970149.126.72.220 8413 tcp tcpwrapped open
4971149.126.72.220 8414 tcp tcpwrapped open
4972149.126.72.220 8415 tcp tcpwrapped open
4973149.126.72.220 8416 tcp tcpwrapped open
4974149.126.72.220 8417 tcp tcpwrapped open
4975149.126.72.220 8418 tcp tcpwrapped open
4976149.126.72.220 8419 tcp tcpwrapped open
4977149.126.72.220 8420 tcp tcpwrapped open
4978149.126.72.220 8421 tcp tcpwrapped open
4979149.126.72.220 8422 tcp tcpwrapped open
4980149.126.72.220 8423 tcp tcpwrapped open
4981149.126.72.220 8424 tcp tcpwrapped open
4982149.126.72.220 8425 tcp tcpwrapped open
4983149.126.72.220 8426 tcp tcpwrapped open
4984149.126.72.220 8427 tcp tcpwrapped open
4985149.126.72.220 8428 tcp tcpwrapped open
4986149.126.72.220 8429 tcp tcpwrapped open
4987149.126.72.220 8430 tcp tcpwrapped open
4988149.126.72.220 8431 tcp tcpwrapped open
4989149.126.72.220 8432 tcp tcpwrapped open
4990149.126.72.220 8433 tcp tcpwrapped open
4991149.126.72.220 8435 tcp tcpwrapped open
4992149.126.72.220 8440 tcp tcpwrapped open
4993149.126.72.220 8441 tcp tcpwrapped open
4994149.126.72.220 8442 tcp tcpwrapped open
4995149.126.72.220 8443 tcp tcpwrapped open
4996149.126.72.220 8444 tcp tcpwrapped open
4997149.126.72.220 8445 tcp tcpwrapped open
4998149.126.72.220 8446 tcp tcpwrapped open
4999149.126.72.220 8447 tcp tcpwrapped open
5000149.126.72.220 8448 tcp tcpwrapped open
5001149.126.72.220 8449 tcp tcpwrapped open
5002149.126.72.220 8450 tcp tcpwrapped open
5003149.126.72.220 8451 tcp tcpwrapped open
5004149.126.72.220 8452 tcp tcpwrapped open
5005149.126.72.220 8453 tcp tcpwrapped open
5006149.126.72.220 8454 tcp tcpwrapped open
5007149.126.72.220 8455 tcp tcpwrapped open
5008149.126.72.220 8456 tcp tcpwrapped open
5009149.126.72.220 8457 tcp tcpwrapped open
5010149.126.72.220 8458 tcp tcpwrapped open
5011149.126.72.220 8459 tcp tcpwrapped open
5012149.126.72.220 8460 tcp tcpwrapped open
5013149.126.72.220 8461 tcp tcpwrapped open
5014149.126.72.220 8462 tcp tcpwrapped open
5015149.126.72.220 8463 tcp tcpwrapped open
5016149.126.72.220 8464 tcp tcpwrapped open
5017149.126.72.220 8465 tcp tcpwrapped open
5018149.126.72.220 8466 tcp tcpwrapped open
5019149.126.72.220 8467 tcp tcpwrapped open
5020149.126.72.220 8470 tcp tcpwrapped open
5021149.126.72.220 8472 tcp tcpwrapped open
5022149.126.72.220 8473 tcp tcpwrapped open
5023149.126.72.220 8475 tcp tcpwrapped open
5024149.126.72.220 8480 tcp tcpwrapped open
5025149.126.72.220 8481 tcp tcpwrapped open
5026149.126.72.220 8482 tcp tcpwrapped open
5027149.126.72.220 8484 tcp tcpwrapped open
5028149.126.72.220 8485 tcp tcpwrapped open
5029149.126.72.220 8488 tcp tcpwrapped open
5030149.126.72.220 8493 tcp tcpwrapped open
5031149.126.72.220 8494 tcp tcpwrapped open
5032149.126.72.220 8500 tcp tcpwrapped open
5033149.126.72.220 8502 tcp tcpwrapped open
5034149.126.72.220 8503 tcp tcpwrapped open
5035149.126.72.220 8504 tcp tcpwrapped open
5036149.126.72.220 8505 tcp tcpwrapped open
5037149.126.72.220 8506 tcp tcpwrapped open
5038149.126.72.220 8510 tcp tcpwrapped open
5039149.126.72.220 8513 tcp tcpwrapped open
5040149.126.72.220 8514 tcp tcpwrapped open
5041149.126.72.220 8515 tcp tcpwrapped open
5042149.126.72.220 8519 tcp tcpwrapped open
5043149.126.72.220 8520 tcp tcpwrapped open
5044149.126.72.220 8521 tcp tcpwrapped open
5045149.126.72.220 8523 tcp tcpwrapped open
5046149.126.72.220 8524 tcp tcpwrapped open
5047149.126.72.220 8525 tcp tcpwrapped open
5048149.126.72.220 8526 tcp tcpwrapped open
5049149.126.72.220 8528 tcp tcpwrapped open
5050149.126.72.220 8529 tcp tcpwrapped open
5051149.126.72.220 8530 tcp tcpwrapped open
5052149.126.72.220 8531 tcp tcpwrapped open
5053149.126.72.220 8532 tcp tcpwrapped open
5054149.126.72.220 8533 tcp tcpwrapped open
5055149.126.72.220 8536 tcp tcpwrapped open
5056149.126.72.220 8540 tcp tcpwrapped open
5057149.126.72.220 8543 tcp tcpwrapped open
5058149.126.72.220 8544 tcp tcpwrapped open
5059149.126.72.220 8548 tcp tcpwrapped open
5060149.126.72.220 8549 tcp tcpwrapped open
5061149.126.72.220 8550 tcp tcpwrapped open
5062149.126.72.220 8551 tcp tcpwrapped open
5063149.126.72.220 8553 tcp tcpwrapped open
5064149.126.72.220 8556 tcp tcpwrapped open
5065149.126.72.220 8557 tcp tcpwrapped open
5066149.126.72.220 8558 tcp tcpwrapped open
5067149.126.72.220 8560 tcp tcpwrapped open
5068149.126.72.220 8561 tcp tcpwrapped open
5069149.126.72.220 8562 tcp tcpwrapped open
5070149.126.72.220 8563 tcp tcpwrapped open
5071149.126.72.220 8564 tcp tcpwrapped open
5072149.126.72.220 8565 tcp tcpwrapped open
5073149.126.72.220 8566 tcp tcpwrapped open
5074149.126.72.220 8567 tcp tcpwrapped open
5075149.126.72.220 8568 tcp tcpwrapped open
5076149.126.72.220 8569 tcp tcpwrapped open
5077149.126.72.220 8570 tcp tcpwrapped open
5078149.126.72.220 8571 tcp tcpwrapped open
5079149.126.72.220 8573 tcp tcpwrapped open
5080149.126.72.220 8574 tcp tcpwrapped open
5081149.126.72.220 8575 tcp tcpwrapped open
5082149.126.72.220 8576 tcp tcpwrapped open
5083149.126.72.220 8577 tcp tcpwrapped open
5084149.126.72.220 8578 tcp tcpwrapped open
5085149.126.72.220 8579 tcp tcpwrapped open
5086149.126.72.220 8580 tcp tcpwrapped open
5087149.126.72.220 8581 tcp tcpwrapped open
5088149.126.72.220 8582 tcp tcpwrapped open
5089149.126.72.220 8583 tcp tcpwrapped open
5090149.126.72.220 8585 tcp tcpwrapped open
5091149.126.72.220 8586 tcp tcpwrapped open
5092149.126.72.220 8588 tcp tcpwrapped open
5093149.126.72.220 8589 tcp tcpwrapped open
5094149.126.72.220 8590 tcp tcpwrapped open
5095149.126.72.220 8591 tcp tcpwrapped open
5096149.126.72.220 8592 tcp tcpwrapped open
5097149.126.72.220 8593 tcp tcpwrapped open
5098149.126.72.220 8594 tcp tcpwrapped open
5099149.126.72.220 8595 tcp tcpwrapped open
5100149.126.72.220 8596 tcp tcpwrapped open
5101149.126.72.220 8597 tcp tcpwrapped open
5102149.126.72.220 8598 tcp tcpwrapped open
5103149.126.72.220 8599 tcp tcpwrapped open
5104149.126.72.220 8600 tcp tcpwrapped open
5105149.126.72.220 8601 tcp tcpwrapped open
5106149.126.72.220 8605 tcp tcpwrapped open
5107149.126.72.220 8606 tcp tcpwrapped open
5108149.126.72.220 8630 tcp tcpwrapped open
5109149.126.72.220 8640 tcp tcpwrapped open
5110149.126.72.220 8641 tcp tcpwrapped open
5111149.126.72.220 8643 tcp tcpwrapped open
5112149.126.72.220 8663 tcp tcpwrapped open
5113149.126.72.220 8666 tcp tcpwrapped open
5114149.126.72.220 8686 tcp tcpwrapped open
5115149.126.72.220 8688 tcp tcpwrapped open
5116149.126.72.220 8700 tcp tcpwrapped open
5117149.126.72.220 8701 tcp tcpwrapped open
5118149.126.72.220 8702 tcp tcpwrapped open
5119149.126.72.220 8703 tcp tcpwrapped open
5120149.126.72.220 8704 tcp tcpwrapped open
5121149.126.72.220 8705 tcp tcpwrapped open
5122149.126.72.220 8706 tcp tcpwrapped open
5123149.126.72.220 8707 tcp tcpwrapped open
5124149.126.72.220 8708 tcp tcpwrapped open
5125149.126.72.220 8709 tcp tcpwrapped open
5126149.126.72.220 8723 tcp tcpwrapped open
5127149.126.72.220 8724 tcp tcpwrapped open
5128149.126.72.220 8731 tcp tcpwrapped open
5129149.126.72.220 8732 tcp tcpwrapped open
5130149.126.72.220 8764 tcp tcpwrapped open
5131149.126.72.220 8765 tcp tcpwrapped open
5132149.126.72.220 8766 tcp tcpwrapped open
5133149.126.72.220 8767 tcp tcpwrapped open
5134149.126.72.220 8771 tcp tcpwrapped open
5135149.126.72.220 8787 tcp tcpwrapped open
5136149.126.72.220 8788 tcp tcpwrapped open
5137149.126.72.220 8789 tcp tcpwrapped open
5138149.126.72.220 8790 tcp tcpwrapped open
5139149.126.72.220 8791 tcp tcpwrapped open
5140149.126.72.220 8800 tcp tcpwrapped open
5141149.126.72.220 8801 tcp tcpwrapped open
5142149.126.72.220 8802 tcp tcpwrapped open
5143149.126.72.220 8803 tcp tcpwrapped open
5144149.126.72.220 8804 tcp tcpwrapped open
5145149.126.72.220 8805 tcp tcpwrapped open
5146149.126.72.220 8806 tcp tcpwrapped open
5147149.126.72.220 8807 tcp tcpwrapped open
5148149.126.72.220 8808 tcp tcpwrapped open
5149149.126.72.220 8809 tcp tcpwrapped open
5150149.126.72.220 8810 tcp tcpwrapped open
5151149.126.72.220 8811 tcp tcpwrapped open
5152149.126.72.220 8812 tcp tcpwrapped open
5153149.126.72.220 8813 tcp tcpwrapped open
5154149.126.72.220 8814 tcp tcpwrapped open
5155149.126.72.220 8815 tcp tcpwrapped open
5156149.126.72.220 8816 tcp tcpwrapped open
5157149.126.72.220 8817 tcp tcpwrapped open
5158149.126.72.220 8818 tcp tcpwrapped open
5159149.126.72.220 8819 tcp tcpwrapped open
5160149.126.72.220 8820 tcp tcpwrapped open
5161149.126.72.220 8821 tcp tcpwrapped open
5162149.126.72.220 8822 tcp tcpwrapped open
5163149.126.72.220 8823 tcp tcpwrapped open
5164149.126.72.220 8824 tcp tcpwrapped open
5165149.126.72.220 8825 tcp tcpwrapped open
5166149.126.72.220 8826 tcp tcpwrapped open
5167149.126.72.220 8827 tcp tcpwrapped open
5168149.126.72.220 8828 tcp tcpwrapped open
5169149.126.72.220 8829 tcp tcpwrapped open
5170149.126.72.220 8830 tcp tcpwrapped open
5171149.126.72.220 8831 tcp tcpwrapped open
5172149.126.72.220 8832 tcp tcpwrapped open
5173149.126.72.220 8833 tcp tcpwrapped open
5174149.126.72.220 8834 tcp tcpwrapped open
5175149.126.72.220 8835 tcp tcpwrapped open
5176149.126.72.220 8836 tcp tcpwrapped open
5177149.126.72.220 8837 tcp tcpwrapped open
5178149.126.72.220 8838 tcp tcpwrapped open
5179149.126.72.220 8839 tcp tcpwrapped open
5180149.126.72.220 8840 tcp tcpwrapped open
5181149.126.72.220 8841 tcp tcpwrapped open
5182149.126.72.220 8842 tcp tcpwrapped open
5183149.126.72.220 8843 tcp tcpwrapped open
5184149.126.72.220 8844 tcp tcpwrapped open
5185149.126.72.220 8845 tcp tcpwrapped open
5186149.126.72.220 8846 tcp tcpwrapped open
5187149.126.72.220 8847 tcp tcpwrapped open
5188149.126.72.220 8848 tcp tcpwrapped open
5189149.126.72.220 8849 tcp tcpwrapped open
5190149.126.72.220 8850 tcp tcpwrapped open
5191149.126.72.220 8851 tcp tcpwrapped open
5192149.126.72.220 8852 tcp tcpwrapped open
5193149.126.72.220 8853 tcp tcpwrapped open
5194149.126.72.220 8854 tcp tcpwrapped open
5195149.126.72.220 8855 tcp tcpwrapped open
5196149.126.72.220 8856 tcp tcpwrapped open
5197149.126.72.220 8857 tcp tcpwrapped open
5198149.126.72.220 8858 tcp tcpwrapped open
5199149.126.72.220 8859 tcp tcpwrapped open
5200149.126.72.220 8860 tcp tcpwrapped open
5201149.126.72.220 8861 tcp tcpwrapped open
5202149.126.72.220 8862 tcp tcpwrapped open
5203149.126.72.220 8863 tcp tcpwrapped open
5204149.126.72.220 8864 tcp tcpwrapped open
5205149.126.72.220 8865 tcp tcpwrapped open
5206149.126.72.220 8866 tcp tcpwrapped open
5207149.126.72.220 8867 tcp tcpwrapped open
5208149.126.72.220 8868 tcp tcpwrapped open
5209149.126.72.220 8869 tcp tcpwrapped open
5210149.126.72.220 8870 tcp tcpwrapped open
5211149.126.72.220 8871 tcp tcpwrapped open
5212149.126.72.220 8872 tcp tcpwrapped open
5213149.126.72.220 8873 tcp tcpwrapped open
5214149.126.72.220 8874 tcp tcpwrapped open
5215149.126.72.220 8875 tcp tcpwrapped open
5216149.126.72.220 8876 tcp tcpwrapped open
5217149.126.72.220 8877 tcp tcpwrapped open
5218149.126.72.220 8878 tcp tcpwrapped open
5219149.126.72.220 8879 tcp tcpwrapped open
5220149.126.72.220 8880 tcp tcpwrapped open
5221149.126.72.220 8881 tcp tcpwrapped open
5222149.126.72.220 8882 tcp tcpwrapped open
5223149.126.72.220 8883 tcp tcpwrapped open
5224149.126.72.220 8884 tcp tcpwrapped open
5225149.126.72.220 8885 tcp tcpwrapped open
5226149.126.72.220 8887 tcp tcpwrapped open
5227149.126.72.220 8888 tcp tcpwrapped open
5228149.126.72.220 8889 tcp tcpwrapped open
5229149.126.72.220 8890 tcp tcpwrapped open
5230149.126.72.220 8891 tcp tcpwrapped open
5231149.126.72.220 8899 tcp tcpwrapped open
5232149.126.72.220 8900 tcp tcpwrapped open
5233149.126.72.220 8901 tcp tcpwrapped open
5234149.126.72.220 8902 tcp tcpwrapped open
5235149.126.72.220 8905 tcp tcpwrapped open
5236149.126.72.220 8906 tcp tcpwrapped open
5237149.126.72.220 8907 tcp tcpwrapped open
5238149.126.72.220 8908 tcp tcpwrapped open
5239149.126.72.220 8910 tcp tcpwrapped open
5240149.126.72.220 8911 tcp tcpwrapped open
5241149.126.72.220 8912 tcp tcpwrapped open
5242149.126.72.220 8913 tcp tcpwrapped open
5243149.126.72.220 8915 tcp tcpwrapped open
5244149.126.72.220 8916 tcp tcpwrapped open
5245149.126.72.220 8935 tcp tcpwrapped open
5246149.126.72.220 8943 tcp tcpwrapped open
5247149.126.72.220 8969 tcp tcpwrapped open
5248149.126.72.220 8988 tcp tcpwrapped open
5249149.126.72.220 8989 tcp tcpwrapped open
5250149.126.72.220 8999 tcp tcpwrapped open
5251149.126.72.220 9000 tcp tcpwrapped open
5252149.126.72.220 9001 tcp tcpwrapped open
5253149.126.72.220 9002 tcp tcpwrapped open
5254149.126.72.220 9003 tcp tcpwrapped open
5255149.126.72.220 9004 tcp tcpwrapped open
5256149.126.72.220 9005 tcp tcpwrapped open
5257149.126.72.220 9006 tcp tcpwrapped open
5258149.126.72.220 9007 tcp tcpwrapped open
5259149.126.72.220 9008 tcp tcpwrapped open
5260149.126.72.220 9009 tcp tcpwrapped open
5261149.126.72.220 9010 tcp tcpwrapped open
5262149.126.72.220 9011 tcp tcpwrapped open
5263149.126.72.220 9012 tcp tcpwrapped open
5264149.126.72.220 9013 tcp tcpwrapped open
5265149.126.72.220 9014 tcp tcpwrapped open
5266149.126.72.220 9015 tcp tcpwrapped open
5267149.126.72.220 9016 tcp tcpwrapped open
5268149.126.72.220 9017 tcp tcpwrapped open
5269149.126.72.220 9018 tcp tcpwrapped open
5270149.126.72.220 9019 tcp tcpwrapped open
5271149.126.72.220 9020 tcp tcpwrapped open
5272149.126.72.220 9021 tcp tcpwrapped open
5273149.126.72.220 9022 tcp tcpwrapped open
5274149.126.72.220 9023 tcp tcpwrapped open
5275149.126.72.220 9024 tcp tcpwrapped open
5276149.126.72.220 9025 tcp tcpwrapped open
5277149.126.72.220 9026 tcp tcpwrapped open
5278149.126.72.220 9027 tcp tcpwrapped open
5279149.126.72.220 9028 tcp tcpwrapped open
5280149.126.72.220 9029 tcp tcpwrapped open
5281149.126.72.220 9030 tcp tcpwrapped open
5282149.126.72.220 9031 tcp tcpwrapped open
5283149.126.72.220 9032 tcp tcpwrapped open
5284149.126.72.220 9033 tcp tcpwrapped open
5285149.126.72.220 9034 tcp tcpwrapped open
5286149.126.72.220 9035 tcp tcpwrapped open
5287149.126.72.220 9036 tcp tcpwrapped open
5288149.126.72.220 9037 tcp tcpwrapped open
5289149.126.72.220 9038 tcp tcpwrapped open
5290149.126.72.220 9039 tcp tcpwrapped open
5291149.126.72.220 9040 tcp tcpwrapped open
5292149.126.72.220 9041 tcp tcpwrapped open
5293149.126.72.220 9042 tcp tcpwrapped open
5294149.126.72.220 9043 tcp tcpwrapped open
5295149.126.72.220 9044 tcp tcpwrapped open
5296149.126.72.220 9045 tcp tcpwrapped open
5297149.126.72.220 9046 tcp tcpwrapped open
5298149.126.72.220 9047 tcp tcpwrapped open
5299149.126.72.220 9048 tcp tcpwrapped open
5300149.126.72.220 9049 tcp tcpwrapped open
5301149.126.72.220 9050 tcp tcpwrapped open
5302149.126.72.220 9051 tcp tcpwrapped open
5303149.126.72.220 9052 tcp tcpwrapped open
5304149.126.72.220 9058 tcp tcpwrapped open
5305149.126.72.220 9060 tcp tcpwrapped open
5306149.126.72.220 9061 tcp tcpwrapped open
5307149.126.72.220 9070 tcp tcpwrapped open
5308149.126.72.220 9080 tcp tcpwrapped open
5309149.126.72.220 9081 tcp tcpwrapped open
5310149.126.72.220 9082 tcp tcpwrapped open
5311149.126.72.220 9084 tcp tcpwrapped open
5312149.126.72.220 9085 tcp tcpwrapped open
5313149.126.72.220 9086 tcp tcpwrapped open
5314149.126.72.220 9088 tcp tcpwrapped open
5315149.126.72.220 9089 tcp tcpwrapped open
5316149.126.72.220 9090 tcp tcpwrapped open
5317149.126.72.220 9091 tcp tcpwrapped open
5318149.126.72.220 9092 tcp tcpwrapped open
5319149.126.72.220 9093 tcp tcpwrapped open
5320149.126.72.220 9094 tcp tcpwrapped open
5321149.126.72.220 9095 tcp tcpwrapped open
5322149.126.72.220 9096 tcp tcpwrapped open
5323149.126.72.220 9097 tcp tcpwrapped open
5324149.126.72.220 9098 tcp tcpwrapped open
5325149.126.72.220 9099 tcp tcpwrapped open
5326149.126.72.220 9100 tcp jetdirect open
5327149.126.72.220 9101 tcp jetdirect open
5328149.126.72.220 9102 tcp jetdirect open
5329149.126.72.220 9103 tcp jetdirect open
5330149.126.72.220 9104 tcp jetdirect open
5331149.126.72.220 9105 tcp jetdirect open
5332149.126.72.220 9106 tcp jetdirect open
5333149.126.72.220 9107 tcp jetdirect open
5334149.126.72.220 9108 tcp tcpwrapped open
5335149.126.72.220 9109 tcp tcpwrapped open
5336149.126.72.220 9110 tcp tcpwrapped open
5337149.126.72.220 9111 tcp tcpwrapped open
5338149.126.72.220 9136 tcp tcpwrapped open
5339149.126.72.220 9143 tcp tcpwrapped open
5340149.126.72.220 9189 tcp tcpwrapped open
5341149.126.72.220 9199 tcp tcpwrapped open
5342149.126.72.220 9200 tcp tcpwrapped open
5343149.126.72.220 9201 tcp tcpwrapped open
5344149.126.72.220 9202 tcp tcpwrapped open
5345149.126.72.220 9203 tcp tcpwrapped open
5346149.126.72.220 9204 tcp tcpwrapped open
5347149.126.72.220 9205 tcp tcpwrapped open
5348149.126.72.220 9206 tcp tcpwrapped open
5349149.126.72.220 9207 tcp tcpwrapped open
5350149.126.72.220 9208 tcp tcpwrapped open
5351149.126.72.220 9209 tcp tcpwrapped open
5352149.126.72.220 9210 tcp tcpwrapped open
5353149.126.72.220 9211 tcp tcpwrapped open
5354149.126.72.220 9212 tcp tcpwrapped open
5355149.126.72.220 9213 tcp tcpwrapped open
5356149.126.72.220 9214 tcp tcpwrapped open
5357149.126.72.220 9215 tcp tcpwrapped open
5358149.126.72.220 9216 tcp tcpwrapped open
5359149.126.72.220 9217 tcp tcpwrapped open
5360149.126.72.220 9218 tcp tcpwrapped open
5361149.126.72.220 9219 tcp tcpwrapped open
5362149.126.72.220 9220 tcp tcpwrapped open
5363149.126.72.220 9221 tcp tcpwrapped open
5364149.126.72.220 9236 tcp tcpwrapped open
5365149.126.72.220 9251 tcp tcpwrapped open
5366149.126.72.220 9289 tcp tcpwrapped open
5367149.126.72.220 9299 tcp tcpwrapped open
5368149.126.72.220 9300 tcp tcpwrapped open
5369149.126.72.220 9301 tcp tcpwrapped open
5370149.126.72.220 9302 tcp tcpwrapped open
5371149.126.72.220 9303 tcp tcpwrapped open
5372149.126.72.220 9304 tcp tcpwrapped open
5373149.126.72.220 9305 tcp tcpwrapped open
5374149.126.72.220 9306 tcp tcpwrapped open
5375149.126.72.220 9307 tcp tcpwrapped open
5376149.126.72.220 9308 tcp tcpwrapped open
5377149.126.72.220 9309 tcp tcpwrapped open
5378149.126.72.220 9310 tcp tcpwrapped open
5379149.126.72.220 9311 tcp tcpwrapped open
5380149.126.72.220 9350 tcp tcpwrapped open
5381149.126.72.220 9383 tcp tcpwrapped open
5382149.126.72.220 9387 tcp tcpwrapped open
5383149.126.72.220 9389 tcp tcpwrapped open
5384149.126.72.220 9433 tcp tcpwrapped open
5385149.126.72.220 9443 tcp tcpwrapped open
5386149.126.72.220 9444 tcp tcpwrapped open
5387149.126.72.220 9446 tcp tcpwrapped open
5388149.126.72.220 9447 tcp tcpwrapped open
5389149.126.72.220 9500 tcp tcpwrapped open
5390149.126.72.220 9510 tcp tcpwrapped open
5391149.126.72.220 9530 tcp tcpwrapped open
5392149.126.72.220 9550 tcp tcpwrapped open
5393149.126.72.220 9600 tcp tcpwrapped open
5394149.126.72.220 9663 tcp tcpwrapped open
5395149.126.72.220 9690 tcp tcpwrapped open
5396149.126.72.220 9704 tcp tcpwrapped open
5397149.126.72.220 9710 tcp tcpwrapped open
5398149.126.72.220 9711 tcp tcpwrapped open
5399149.126.72.220 9765 tcp tcpwrapped open
5400149.126.72.220 9773 tcp tcpwrapped open
5401149.126.72.220 9779 tcp tcpwrapped open
5402149.126.72.220 9800 tcp tcpwrapped open
5403149.126.72.220 9803 tcp tcpwrapped open
5404149.126.72.220 9804 tcp tcpwrapped open
5405149.126.72.220 9950 tcp tcpwrapped open
5406149.126.72.220 9991 tcp tcpwrapped open
5407149.126.72.220 9992 tcp tcpwrapped open
5408149.126.72.220 9993 tcp tcpwrapped open
5409149.126.72.220 9994 tcp tcpwrapped open
5410149.126.72.220 9997 tcp tcpwrapped open
5411149.126.72.220 9998 tcp tcpwrapped open
5412149.126.72.220 9999 tcp tcpwrapped open
5413149.126.72.220 10000 tcp tcpwrapped open
5414149.126.72.220 10001 tcp tcpwrapped open
5415149.126.72.220 10002 tcp tcpwrapped open
5416149.126.72.220 10003 tcp tcpwrapped open
5417149.126.72.220 10004 tcp tcpwrapped open
5418149.126.72.220 10005 tcp tcpwrapped open
5419149.126.72.220 10006 tcp tcpwrapped open
5420149.126.72.220 10007 tcp tcpwrapped open
5421149.126.72.220 10008 tcp tcpwrapped open
5422149.126.72.220 10009 tcp tcpwrapped open
5423149.126.72.220 10010 tcp tcpwrapped open
5424149.126.72.220 10011 tcp tcpwrapped open
5425149.126.72.220 10012 tcp tcpwrapped open
5426149.126.72.220 10013 tcp tcpwrapped open
5427149.126.72.220 10014 tcp tcpwrapped open
5428149.126.72.220 10015 tcp tcpwrapped open
5429149.126.72.220 10016 tcp tcpwrapped open
5430149.126.72.220 10017 tcp tcpwrapped open
5431149.126.72.220 10018 tcp tcpwrapped open
5432149.126.72.220 10019 tcp tcpwrapped open
5433149.126.72.220 10020 tcp tcpwrapped open
5434149.126.72.220 10021 tcp tcpwrapped open
5435149.126.72.220 10022 tcp tcpwrapped open
5436149.126.72.220 10023 tcp tcpwrapped open
5437149.126.72.220 10024 tcp tcpwrapped open
5438149.126.72.220 10025 tcp tcpwrapped open
5439149.126.72.220 10026 tcp tcpwrapped open
5440149.126.72.220 10027 tcp tcpwrapped open
5441149.126.72.220 10028 tcp tcpwrapped open
5442149.126.72.220 10029 tcp tcpwrapped open
5443149.126.72.220 10030 tcp tcpwrapped open
5444149.126.72.220 10031 tcp tcpwrapped open
5445149.126.72.220 10032 tcp tcpwrapped open
5446149.126.72.220 10033 tcp tcpwrapped open
5447149.126.72.220 10034 tcp tcpwrapped open
5448149.126.72.220 10035 tcp tcpwrapped open
5449149.126.72.220 10036 tcp tcpwrapped open
5450149.126.72.220 10037 tcp tcpwrapped open
5451149.126.72.220 10038 tcp tcpwrapped open
5452149.126.72.220 10039 tcp tcpwrapped open
5453149.126.72.220 10040 tcp tcpwrapped open
5454149.126.72.220 10041 tcp tcpwrapped open
5455149.126.72.220 10042 tcp tcpwrapped open
5456149.126.72.220 10043 tcp tcpwrapped open
5457149.126.72.220 10044 tcp tcpwrapped open
5458149.126.72.220 10045 tcp tcpwrapped open
5459149.126.72.220 10046 tcp tcpwrapped open
5460149.126.72.220 10047 tcp tcpwrapped open
5461149.126.72.220 10048 tcp tcpwrapped open
5462149.126.72.220 10049 tcp tcpwrapped open
5463149.126.72.220 10065 tcp tcpwrapped open
5464149.126.72.220 10071 tcp tcpwrapped open
5465149.126.72.220 10075 tcp tcpwrapped open
5466149.126.72.220 10082 tcp tcpwrapped open
5467149.126.72.220 10084 tcp tcpwrapped open
5468149.126.72.220 10100 tcp tcpwrapped open
5469149.126.72.220 10123 tcp tcpwrapped open
5470149.126.72.220 10200 tcp tcpwrapped open
5471149.126.72.220 10443 tcp tcpwrapped open
5472149.126.72.220 10444 tcp tcpwrapped open
5473149.126.72.220 10892 tcp tcpwrapped open
5474149.126.72.220 10894 tcp tcpwrapped open
5475149.126.72.220 11001 tcp tcpwrapped open
5476149.126.72.220 11002 tcp tcpwrapped open
5477149.126.72.220 11007 tcp tcpwrapped open
5478149.126.72.220 11027 tcp tcpwrapped open
5479149.126.72.220 11065 tcp tcpwrapped open
5480149.126.72.220 11075 tcp tcpwrapped open
5481149.126.72.220 11082 tcp tcpwrapped open
5482149.126.72.220 11084 tcp tcpwrapped open
5483149.126.72.220 11110 tcp tcpwrapped open
5484149.126.72.220 11182 tcp tcpwrapped open
5485149.126.72.220 11184 tcp tcpwrapped open
5486149.126.72.220 11443 tcp tcpwrapped open
5487149.126.72.220 12016 tcp tcpwrapped open
5488149.126.72.220 12082 tcp tcpwrapped open
5489149.126.72.220 12084 tcp tcpwrapped open
5490149.126.72.220 12103 tcp tcpwrapped open
5491149.126.72.220 12104 tcp tcpwrapped open
5492149.126.72.220 12105 tcp tcpwrapped open
5493149.126.72.220 12106 tcp tcpwrapped open
5494149.126.72.220 12107 tcp tcpwrapped open
5495149.126.72.220 12108 tcp tcpwrapped open
5496149.126.72.220 12109 tcp tcpwrapped open
5497149.126.72.220 12110 tcp tcpwrapped open
5498149.126.72.220 12111 tcp tcpwrapped open
5499149.126.72.220 12112 tcp tcpwrapped open
5500149.126.72.220 12113 tcp tcpwrapped open
5501149.126.72.220 12114 tcp tcpwrapped open
5502149.126.72.220 12115 tcp tcpwrapped open
5503149.126.72.220 12116 tcp tcpwrapped open
5504149.126.72.220 12117 tcp tcpwrapped open
5505149.126.72.220 12118 tcp tcpwrapped open
5506149.126.72.220 12119 tcp tcpwrapped open
5507149.126.72.220 12120 tcp tcpwrapped open
5508149.126.72.220 12121 tcp tcpwrapped open
5509149.126.72.220 12122 tcp tcpwrapped open
5510149.126.72.220 12123 tcp tcpwrapped open
5511149.126.72.220 12124 tcp tcpwrapped open
5512149.126.72.220 12125 tcp tcpwrapped open
5513149.126.72.220 12126 tcp tcpwrapped open
5514149.126.72.220 12127 tcp tcpwrapped open
5515149.126.72.220 12128 tcp tcpwrapped open
5516149.126.72.220 12129 tcp tcpwrapped open
5517149.126.72.220 12130 tcp tcpwrapped open
5518149.126.72.220 12131 tcp tcpwrapped open
5519149.126.72.220 12132 tcp tcpwrapped open
5520149.126.72.220 12133 tcp tcpwrapped open
5521149.126.72.220 12134 tcp tcpwrapped open
5522149.126.72.220 12135 tcp tcpwrapped open
5523149.126.72.220 12136 tcp tcpwrapped open
5524149.126.72.220 12137 tcp tcpwrapped open
5525149.126.72.220 12138 tcp tcpwrapped open
5526149.126.72.220 12139 tcp tcpwrapped open
5527149.126.72.220 12140 tcp tcpwrapped open
5528149.126.72.220 12141 tcp tcpwrapped open
5529149.126.72.220 12142 tcp tcpwrapped open
5530149.126.72.220 12143 tcp tcpwrapped open
5531149.126.72.220 12144 tcp tcpwrapped open
5532149.126.72.220 12145 tcp tcpwrapped open
5533149.126.72.220 12146 tcp tcpwrapped open
5534149.126.72.220 12147 tcp tcpwrapped open
5535149.126.72.220 12148 tcp tcpwrapped open
5536149.126.72.220 12149 tcp tcpwrapped open
5537149.126.72.220 12150 tcp tcpwrapped open
5538149.126.72.220 12151 tcp tcpwrapped open
5539149.126.72.220 12152 tcp tcpwrapped open
5540149.126.72.220 12153 tcp tcpwrapped open
5541149.126.72.220 12154 tcp tcpwrapped open
5542149.126.72.220 12155 tcp tcpwrapped open
5543149.126.72.220 12156 tcp tcpwrapped open
5544149.126.72.220 12157 tcp tcpwrapped open
5545149.126.72.220 12158 tcp tcpwrapped open
5546149.126.72.220 12159 tcp tcpwrapped open
5547149.126.72.220 12160 tcp tcpwrapped open
5548149.126.72.220 12161 tcp tcpwrapped open
5549149.126.72.220 12162 tcp tcpwrapped open
5550149.126.72.220 12163 tcp tcpwrapped open
5551149.126.72.220 12164 tcp tcpwrapped open
5552149.126.72.220 12165 tcp tcpwrapped open
5553149.126.72.220 12166 tcp tcpwrapped open
5554149.126.72.220 12167 tcp tcpwrapped open
5555149.126.72.220 12168 tcp tcpwrapped open
5556149.126.72.220 12169 tcp tcpwrapped open
5557149.126.72.220 12170 tcp tcpwrapped open
5558149.126.72.220 12171 tcp tcpwrapped open
5559149.126.72.220 12172 tcp tcpwrapped open
5560149.126.72.220 12173 tcp tcpwrapped open
5561149.126.72.220 12174 tcp tcpwrapped open
5562149.126.72.220 12175 tcp tcpwrapped open
5563149.126.72.220 12176 tcp tcpwrapped open
5564149.126.72.220 12177 tcp tcpwrapped open
5565149.126.72.220 12178 tcp tcpwrapped open
5566149.126.72.220 12179 tcp tcpwrapped open
5567149.126.72.220 12180 tcp tcpwrapped open
5568149.126.72.220 12181 tcp tcpwrapped open
5569149.126.72.220 12182 tcp tcpwrapped open
5570149.126.72.220 12183 tcp tcpwrapped open
5571149.126.72.220 12184 tcp tcpwrapped open
5572149.126.72.220 12185 tcp tcpwrapped open
5573149.126.72.220 12186 tcp tcpwrapped open
5574149.126.72.220 12187 tcp tcpwrapped open
5575149.126.72.220 12188 tcp tcpwrapped open
5576149.126.72.220 12189 tcp tcpwrapped open
5577149.126.72.220 12190 tcp tcpwrapped open
5578149.126.72.220 12191 tcp tcpwrapped open
5579149.126.72.220 12192 tcp tcpwrapped open
5580149.126.72.220 12193 tcp tcpwrapped open
5581149.126.72.220 12194 tcp tcpwrapped open
5582149.126.72.220 12195 tcp tcpwrapped open
5583149.126.72.220 12196 tcp tcpwrapped open
5584149.126.72.220 12197 tcp tcpwrapped open
5585149.126.72.220 12198 tcp tcpwrapped open
5586149.126.72.220 12199 tcp tcpwrapped open
5587149.126.72.220 12200 tcp tcpwrapped open
5588149.126.72.220 12201 tcp tcpwrapped open
5589149.126.72.220 12202 tcp tcpwrapped open
5590149.126.72.220 12203 tcp tcpwrapped open
5591149.126.72.220 12204 tcp tcpwrapped open
5592149.126.72.220 12205 tcp tcpwrapped open
5593149.126.72.220 12206 tcp tcpwrapped open
5594149.126.72.220 12207 tcp tcpwrapped open
5595149.126.72.220 12208 tcp tcpwrapped open
5596149.126.72.220 12209 tcp tcpwrapped open
5597149.126.72.220 12210 tcp tcpwrapped open
5598149.126.72.220 12211 tcp tcpwrapped open
5599149.126.72.220 12212 tcp tcpwrapped open
5600149.126.72.220 12213 tcp tcpwrapped open
5601149.126.72.220 12214 tcp tcpwrapped open
5602149.126.72.220 12215 tcp tcpwrapped open
5603149.126.72.220 12216 tcp tcpwrapped open
5604149.126.72.220 12217 tcp tcpwrapped open
5605149.126.72.220 12218 tcp tcpwrapped open
5606149.126.72.220 12219 tcp tcpwrapped open
5607149.126.72.220 12220 tcp tcpwrapped open
5608149.126.72.220 12221 tcp tcpwrapped open
5609149.126.72.220 12222 tcp tcpwrapped open
5610149.126.72.220 12223 tcp tcpwrapped open
5611149.126.72.220 12224 tcp tcpwrapped open
5612149.126.72.220 12225 tcp tcpwrapped open
5613149.126.72.220 12226 tcp tcpwrapped open
5614149.126.72.220 12227 tcp tcpwrapped open
5615149.126.72.220 12228 tcp tcpwrapped open
5616149.126.72.220 12229 tcp tcpwrapped open
5617149.126.72.220 12230 tcp tcpwrapped open
5618149.126.72.220 12231 tcp tcpwrapped open
5619149.126.72.220 12232 tcp tcpwrapped open
5620149.126.72.220 12233 tcp tcpwrapped open
5621149.126.72.220 12234 tcp tcpwrapped open
5622149.126.72.220 12235 tcp tcpwrapped open
5623149.126.72.220 12236 tcp tcpwrapped open
5624149.126.72.220 12237 tcp tcpwrapped open
5625149.126.72.220 12238 tcp tcpwrapped open
5626149.126.72.220 12239 tcp tcpwrapped open
5627149.126.72.220 12240 tcp tcpwrapped open
5628149.126.72.220 12241 tcp tcpwrapped open
5629149.126.72.220 12242 tcp tcpwrapped open
5630149.126.72.220 12243 tcp tcpwrapped open
5631149.126.72.220 12244 tcp tcpwrapped open
5632149.126.72.220 12245 tcp tcpwrapped open
5633149.126.72.220 12246 tcp tcpwrapped open
5634149.126.72.220 12247 tcp tcpwrapped open
5635149.126.72.220 12248 tcp tcpwrapped open
5636149.126.72.220 12249 tcp tcpwrapped open
5637149.126.72.220 12250 tcp tcpwrapped open
5638149.126.72.220 12251 tcp tcpwrapped open
5639149.126.72.220 12252 tcp tcpwrapped open
5640149.126.72.220 12253 tcp tcpwrapped open
5641149.126.72.220 12254 tcp tcpwrapped open
5642149.126.72.220 12255 tcp tcpwrapped open
5643149.126.72.220 12256 tcp tcpwrapped open
5644149.126.72.220 12257 tcp tcpwrapped open
5645149.126.72.220 12258 tcp tcpwrapped open
5646149.126.72.220 12259 tcp tcpwrapped open
5647149.126.72.220 12260 tcp tcpwrapped open
5648149.126.72.220 12261 tcp tcpwrapped open
5649149.126.72.220 12262 tcp tcpwrapped open
5650149.126.72.220 12263 tcp tcpwrapped open
5651149.126.72.220 12264 tcp tcpwrapped open
5652149.126.72.220 12265 tcp tcpwrapped open
5653149.126.72.220 12266 tcp tcpwrapped open
5654149.126.72.220 12267 tcp tcpwrapped open
5655149.126.72.220 12268 tcp tcpwrapped open
5656149.126.72.220 12269 tcp tcpwrapped open
5657149.126.72.220 12270 tcp tcpwrapped open
5658149.126.72.220 12271 tcp tcpwrapped open
5659149.126.72.220 12272 tcp tcpwrapped open
5660149.126.72.220 12273 tcp tcpwrapped open
5661149.126.72.220 12274 tcp tcpwrapped open
5662149.126.72.220 12275 tcp tcpwrapped open
5663149.126.72.220 12276 tcp tcpwrapped open
5664149.126.72.220 12277 tcp tcpwrapped open
5665149.126.72.220 12278 tcp tcpwrapped open
5666149.126.72.220 12279 tcp tcpwrapped open
5667149.126.72.220 12280 tcp tcpwrapped open
5668149.126.72.220 12281 tcp tcpwrapped open
5669149.126.72.220 12282 tcp tcpwrapped open
5670149.126.72.220 12283 tcp tcpwrapped open
5671149.126.72.220 12284 tcp tcpwrapped open
5672149.126.72.220 12285 tcp tcpwrapped open
5673149.126.72.220 12286 tcp tcpwrapped open
5674149.126.72.220 12287 tcp tcpwrapped open
5675149.126.72.220 12288 tcp tcpwrapped open
5676149.126.72.220 12289 tcp tcpwrapped open
5677149.126.72.220 12290 tcp tcpwrapped open
5678149.126.72.220 12291 tcp tcpwrapped open
5679149.126.72.220 12292 tcp tcpwrapped open
5680149.126.72.220 12293 tcp tcpwrapped open
5681149.126.72.220 12294 tcp tcpwrapped open
5682149.126.72.220 12295 tcp tcpwrapped open
5683149.126.72.220 12296 tcp tcpwrapped open
5684149.126.72.220 12297 tcp tcpwrapped open
5685149.126.72.220 12298 tcp tcpwrapped open
5686149.126.72.220 12299 tcp tcpwrapped open
5687149.126.72.220 12300 tcp tcpwrapped open
5688149.126.72.220 12301 tcp tcpwrapped open
5689149.126.72.220 12302 tcp tcpwrapped open
5690149.126.72.220 12303 tcp tcpwrapped open
5691149.126.72.220 12304 tcp tcpwrapped open
5692149.126.72.220 12305 tcp tcpwrapped open
5693149.126.72.220 12306 tcp tcpwrapped open
5694149.126.72.220 12307 tcp tcpwrapped open
5695149.126.72.220 12308 tcp tcpwrapped open
5696149.126.72.220 12309 tcp tcpwrapped open
5697149.126.72.220 12310 tcp tcpwrapped open
5698149.126.72.220 12311 tcp tcpwrapped open
5699149.126.72.220 12312 tcp tcpwrapped open
5700149.126.72.220 12313 tcp tcpwrapped open
5701149.126.72.220 12314 tcp tcpwrapped open
5702149.126.72.220 12315 tcp tcpwrapped open
5703149.126.72.220 12316 tcp tcpwrapped open
5704149.126.72.220 12317 tcp tcpwrapped open
5705149.126.72.220 12318 tcp tcpwrapped open
5706149.126.72.220 12319 tcp tcpwrapped open
5707149.126.72.220 12320 tcp tcpwrapped open
5708149.126.72.220 12321 tcp tcpwrapped open
5709149.126.72.220 12322 tcp tcpwrapped open
5710149.126.72.220 12323 tcp tcpwrapped open
5711149.126.72.220 12324 tcp tcpwrapped open
5712149.126.72.220 12325 tcp tcpwrapped open
5713149.126.72.220 12326 tcp tcpwrapped open
5714149.126.72.220 12327 tcp tcpwrapped open
5715149.126.72.220 12328 tcp tcpwrapped open
5716149.126.72.220 12329 tcp tcpwrapped open
5717149.126.72.220 12330 tcp tcpwrapped open
5718149.126.72.220 12331 tcp tcpwrapped open
5719149.126.72.220 12332 tcp tcpwrapped open
5720149.126.72.220 12333 tcp tcpwrapped open
5721149.126.72.220 12334 tcp tcpwrapped open
5722149.126.72.220 12335 tcp tcpwrapped open
5723149.126.72.220 12336 tcp tcpwrapped open
5724149.126.72.220 12337 tcp tcpwrapped open
5725149.126.72.220 12338 tcp tcpwrapped open
5726149.126.72.220 12339 tcp tcpwrapped open
5727149.126.72.220 12340 tcp tcpwrapped open
5728149.126.72.220 12341 tcp tcpwrapped open
5729149.126.72.220 12342 tcp tcpwrapped open
5730149.126.72.220 12343 tcp tcpwrapped open
5731149.126.72.220 12344 tcp tcpwrapped open
5732149.126.72.220 12345 tcp tcpwrapped open
5733149.126.72.220 12346 tcp tcpwrapped open
5734149.126.72.220 12347 tcp tcpwrapped open
5735149.126.72.220 12348 tcp tcpwrapped open
5736149.126.72.220 12349 tcp tcpwrapped open
5737149.126.72.220 12350 tcp tcpwrapped open
5738149.126.72.220 12351 tcp tcpwrapped open
5739149.126.72.220 12352 tcp tcpwrapped open
5740149.126.72.220 12353 tcp tcpwrapped open
5741149.126.72.220 12354 tcp tcpwrapped open
5742149.126.72.220 12355 tcp tcpwrapped open
5743149.126.72.220 12356 tcp tcpwrapped open
5744149.126.72.220 12357 tcp tcpwrapped open
5745149.126.72.220 12358 tcp tcpwrapped open
5746149.126.72.220 12359 tcp tcpwrapped open
5747149.126.72.220 12360 tcp tcpwrapped open
5748149.126.72.220 12361 tcp tcpwrapped open
5749149.126.72.220 12362 tcp tcpwrapped open
5750149.126.72.220 12363 tcp tcpwrapped open
5751149.126.72.220 12364 tcp tcpwrapped open
5752149.126.72.220 12365 tcp tcpwrapped open
5753149.126.72.220 12366 tcp tcpwrapped open
5754149.126.72.220 12367 tcp tcpwrapped open
5755149.126.72.220 12368 tcp tcpwrapped open
5756149.126.72.220 12369 tcp tcpwrapped open
5757149.126.72.220 12370 tcp tcpwrapped open
5758149.126.72.220 12371 tcp tcpwrapped open
5759149.126.72.220 12372 tcp tcpwrapped open
5760149.126.72.220 12373 tcp tcpwrapped open
5761149.126.72.220 12374 tcp tcpwrapped open
5762149.126.72.220 12375 tcp tcpwrapped open
5763149.126.72.220 12376 tcp tcpwrapped open
5764149.126.72.220 12377 tcp tcpwrapped open
5765149.126.72.220 12378 tcp tcpwrapped open
5766149.126.72.220 12379 tcp tcpwrapped open
5767149.126.72.220 12380 tcp tcpwrapped open
5768149.126.72.220 12381 tcp tcpwrapped open
5769149.126.72.220 12382 tcp tcpwrapped open
5770149.126.72.220 12383 tcp tcpwrapped open
5771149.126.72.220 12384 tcp tcpwrapped open
5772149.126.72.220 12385 tcp tcpwrapped open
5773149.126.72.220 12386 tcp tcpwrapped open
5774149.126.72.220 12387 tcp tcpwrapped open
5775149.126.72.220 12388 tcp tcpwrapped open
5776149.126.72.220 12389 tcp tcpwrapped open
5777149.126.72.220 12390 tcp tcpwrapped open
5778149.126.72.220 12391 tcp tcpwrapped open
5779149.126.72.220 12392 tcp tcpwrapped open
5780149.126.72.220 12393 tcp tcpwrapped open
5781149.126.72.220 12394 tcp tcpwrapped open
5782149.126.72.220 12395 tcp tcpwrapped open
5783149.126.72.220 12396 tcp tcpwrapped open
5784149.126.72.220 12397 tcp tcpwrapped open
5785149.126.72.220 12398 tcp tcpwrapped open
5786149.126.72.220 12399 tcp tcpwrapped open
5787149.126.72.220 12400 tcp tcpwrapped open
5788149.126.72.220 12401 tcp tcpwrapped open
5789149.126.72.220 12402 tcp tcpwrapped open
5790149.126.72.220 12403 tcp tcpwrapped open
5791149.126.72.220 12404 tcp tcpwrapped open
5792149.126.72.220 12405 tcp tcpwrapped open
5793149.126.72.220 12406 tcp tcpwrapped open
5794149.126.72.220 12407 tcp tcpwrapped open
5795149.126.72.220 12408 tcp tcpwrapped open
5796149.126.72.220 12409 tcp tcpwrapped open
5797149.126.72.220 12410 tcp tcpwrapped open
5798149.126.72.220 12411 tcp tcpwrapped open
5799149.126.72.220 12412 tcp tcpwrapped open
5800149.126.72.220 12413 tcp tcpwrapped open
5801149.126.72.220 12414 tcp tcpwrapped open
5802149.126.72.220 12415 tcp tcpwrapped open
5803149.126.72.220 12416 tcp tcpwrapped open
5804149.126.72.220 12417 tcp tcpwrapped open
5805149.126.72.220 12418 tcp tcpwrapped open
5806149.126.72.220 12419 tcp tcpwrapped open
5807149.126.72.220 12420 tcp tcpwrapped open
5808149.126.72.220 12421 tcp tcpwrapped open
5809149.126.72.220 12422 tcp tcpwrapped open
5810149.126.72.220 12423 tcp tcpwrapped open
5811149.126.72.220 12424 tcp tcpwrapped open
5812149.126.72.220 12425 tcp tcpwrapped open
5813149.126.72.220 12426 tcp tcpwrapped open
5814149.126.72.220 12427 tcp tcpwrapped open
5815149.126.72.220 12428 tcp tcpwrapped open
5816149.126.72.220 12429 tcp tcpwrapped open
5817149.126.72.220 12430 tcp tcpwrapped open
5818149.126.72.220 12431 tcp tcpwrapped open
5819149.126.72.220 12432 tcp tcpwrapped open
5820149.126.72.220 12433 tcp tcpwrapped open
5821149.126.72.220 12434 tcp tcpwrapped open
5822149.126.72.220 12435 tcp tcpwrapped open
5823149.126.72.220 12436 tcp tcpwrapped open
5824149.126.72.220 12437 tcp tcpwrapped open
5825149.126.72.220 12438 tcp tcpwrapped open
5826149.126.72.220 12439 tcp tcpwrapped open
5827149.126.72.220 12440 tcp tcpwrapped open
5828149.126.72.220 12441 tcp tcpwrapped open
5829149.126.72.220 12442 tcp tcpwrapped open
5830149.126.72.220 12443 tcp tcpwrapped open
5831149.126.72.220 12444 tcp tcpwrapped open
5832149.126.72.220 12445 tcp tcpwrapped open
5833149.126.72.220 12446 tcp tcpwrapped open
5834149.126.72.220 12447 tcp tcpwrapped open
5835149.126.72.220 12448 tcp tcpwrapped open
5836149.126.72.220 12449 tcp tcpwrapped open
5837149.126.72.220 12450 tcp tcpwrapped open
5838149.126.72.220 12451 tcp tcpwrapped open
5839149.126.72.220 12452 tcp tcpwrapped open
5840149.126.72.220 12453 tcp tcpwrapped open
5841149.126.72.220 12454 tcp tcpwrapped open
5842149.126.72.220 12455 tcp tcpwrapped open
5843149.126.72.220 12456 tcp tcpwrapped open
5844149.126.72.220 12457 tcp tcpwrapped open
5845149.126.72.220 12458 tcp tcpwrapped open
5846149.126.72.220 12459 tcp tcpwrapped open
5847149.126.72.220 12460 tcp tcpwrapped open
5848149.126.72.220 12461 tcp tcpwrapped open
5849149.126.72.220 12462 tcp tcpwrapped open
5850149.126.72.220 12463 tcp tcpwrapped open
5851149.126.72.220 12464 tcp tcpwrapped open
5852149.126.72.220 12465 tcp tcpwrapped open
5853149.126.72.220 12466 tcp tcpwrapped open
5854149.126.72.220 12467 tcp tcpwrapped open
5855149.126.72.220 12468 tcp tcpwrapped open
5856149.126.72.220 12469 tcp tcpwrapped open
5857149.126.72.220 12470 tcp tcpwrapped open
5858149.126.72.220 12471 tcp tcpwrapped open
5859149.126.72.220 12472 tcp tcpwrapped open
5860149.126.72.220 12473 tcp tcpwrapped open
5861149.126.72.220 12474 tcp tcpwrapped open
5862149.126.72.220 12475 tcp tcpwrapped open
5863149.126.72.220 12476 tcp tcpwrapped open
5864149.126.72.220 12477 tcp tcpwrapped open
5865149.126.72.220 12478 tcp tcpwrapped open
5866149.126.72.220 12479 tcp tcpwrapped open
5867149.126.72.220 12480 tcp tcpwrapped open
5868149.126.72.220 12481 tcp tcpwrapped open
5869149.126.72.220 12482 tcp tcpwrapped open
5870149.126.72.220 12483 tcp tcpwrapped open
5871149.126.72.220 12484 tcp tcpwrapped open
5872149.126.72.220 12485 tcp tcpwrapped open
5873149.126.72.220 12486 tcp tcpwrapped open
5874149.126.72.220 12487 tcp tcpwrapped open
5875149.126.72.220 12488 tcp tcpwrapped open
5876149.126.72.220 12489 tcp tcpwrapped open
5877149.126.72.220 12490 tcp tcpwrapped open
5878149.126.72.220 12491 tcp tcpwrapped open
5879149.126.72.220 12492 tcp tcpwrapped open
5880149.126.72.220 12493 tcp tcpwrapped open
5881149.126.72.220 12494 tcp tcpwrapped open
5882149.126.72.220 12495 tcp tcpwrapped open
5883149.126.72.220 12496 tcp tcpwrapped open
5884149.126.72.220 12497 tcp tcpwrapped open
5885149.126.72.220 12498 tcp tcpwrapped open
5886149.126.72.220 12499 tcp tcpwrapped open
5887149.126.72.220 12500 tcp tcpwrapped open
5888149.126.72.220 12501 tcp tcpwrapped open
5889149.126.72.220 12502 tcp tcpwrapped open
5890149.126.72.220 12503 tcp tcpwrapped open
5891149.126.72.220 12504 tcp tcpwrapped open
5892149.126.72.220 12505 tcp tcpwrapped open
5893149.126.72.220 12506 tcp tcpwrapped open
5894149.126.72.220 12507 tcp tcpwrapped open
5895149.126.72.220 12508 tcp tcpwrapped open
5896149.126.72.220 12509 tcp tcpwrapped open
5897149.126.72.220 12510 tcp tcpwrapped open
5898149.126.72.220 12511 tcp tcpwrapped open
5899149.126.72.220 12512 tcp tcpwrapped open
5900149.126.72.220 12513 tcp tcpwrapped open
5901149.126.72.220 12514 tcp tcpwrapped open
5902149.126.72.220 12515 tcp tcpwrapped open
5903149.126.72.220 12516 tcp tcpwrapped open
5904149.126.72.220 12517 tcp tcpwrapped open
5905149.126.72.220 12518 tcp tcpwrapped open
5906149.126.72.220 12519 tcp tcpwrapped open
5907149.126.72.220 12520 tcp tcpwrapped open
5908149.126.72.220 12521 tcp tcpwrapped open
5909149.126.72.220 12522 tcp tcpwrapped open
5910149.126.72.220 12523 tcp tcpwrapped open
5911149.126.72.220 12524 tcp tcpwrapped open
5912149.126.72.220 12525 tcp tcpwrapped open
5913149.126.72.220 12526 tcp tcpwrapped open
5914149.126.72.220 12527 tcp tcpwrapped open
5915149.126.72.220 12528 tcp tcpwrapped open
5916149.126.72.220 12529 tcp tcpwrapped open
5917149.126.72.220 12530 tcp tcpwrapped open
5918149.126.72.220 12531 tcp tcpwrapped open
5919149.126.72.220 12532 tcp tcpwrapped open
5920149.126.72.220 12533 tcp tcpwrapped open
5921149.126.72.220 12534 tcp tcpwrapped open
5922149.126.72.220 12535 tcp tcpwrapped open
5923149.126.72.220 12536 tcp tcpwrapped open
5924149.126.72.220 12537 tcp tcpwrapped open
5925149.126.72.220 12538 tcp tcpwrapped open
5926149.126.72.220 12539 tcp tcpwrapped open
5927149.126.72.220 12540 tcp tcpwrapped open
5928149.126.72.220 12541 tcp tcpwrapped open
5929149.126.72.220 12542 tcp tcpwrapped open
5930149.126.72.220 12543 tcp tcpwrapped open
5931149.126.72.220 12544 tcp tcpwrapped open
5932149.126.72.220 12545 tcp tcpwrapped open
5933149.126.72.220 12546 tcp tcpwrapped open
5934149.126.72.220 12547 tcp tcpwrapped open
5935149.126.72.220 12548 tcp tcpwrapped open
5936149.126.72.220 12549 tcp tcpwrapped open
5937149.126.72.220 12550 tcp tcpwrapped open
5938149.126.72.220 12551 tcp tcpwrapped open
5939149.126.72.220 12552 tcp tcpwrapped open
5940149.126.72.220 12553 tcp tcpwrapped open
5941149.126.72.220 12554 tcp tcpwrapped open
5942149.126.72.220 12555 tcp tcpwrapped open
5943149.126.72.220 12556 tcp tcpwrapped open
5944149.126.72.220 12557 tcp tcpwrapped open
5945149.126.72.220 12558 tcp tcpwrapped open
5946149.126.72.220 12559 tcp tcpwrapped open
5947149.126.72.220 12560 tcp tcpwrapped open
5948149.126.72.220 12561 tcp tcpwrapped open
5949149.126.72.220 12562 tcp tcpwrapped open
5950149.126.72.220 12563 tcp tcpwrapped open
5951149.126.72.220 12564 tcp tcpwrapped open
5952149.126.72.220 12565 tcp tcpwrapped open
5953149.126.72.220 12566 tcp tcpwrapped open
5954149.126.72.220 12567 tcp tcpwrapped open
5955149.126.72.220 12568 tcp tcpwrapped open
5956149.126.72.220 12569 tcp tcpwrapped open
5957149.126.72.220 12570 tcp tcpwrapped open
5958149.126.72.220 12571 tcp tcpwrapped open
5959149.126.72.220 12572 tcp tcpwrapped open
5960149.126.72.220 12573 tcp tcpwrapped open
5961149.126.72.220 12574 tcp tcpwrapped open
5962149.126.72.220 12575 tcp tcpwrapped open
5963149.126.72.220 12576 tcp tcpwrapped open
5964149.126.72.220 12577 tcp tcpwrapped open
5965149.126.72.220 12578 tcp tcpwrapped open
5966149.126.72.220 12579 tcp tcpwrapped open
5967149.126.72.220 12580 tcp tcpwrapped open
5968149.126.72.220 12581 tcp tcpwrapped open
5969149.126.72.220 12582 tcp tcpwrapped open
5970149.126.72.220 12583 tcp tcpwrapped open
5971149.126.72.220 12584 tcp tcpwrapped open
5972149.126.72.220 12585 tcp tcpwrapped open
5973149.126.72.220 12586 tcp tcpwrapped open
5974149.126.72.220 12587 tcp tcpwrapped open
5975149.126.72.220 12588 tcp tcpwrapped open
5976149.126.72.220 12589 tcp tcpwrapped open
5977149.126.72.220 12590 tcp tcpwrapped open
5978149.126.72.220 13082 tcp tcpwrapped open
5979149.126.72.220 13084 tcp tcpwrapped open
5980149.126.72.220 13333 tcp tcpwrapped open
5981149.126.72.220 13443 tcp tcpwrapped open
5982149.126.72.220 14006 tcp tcpwrapped open
5983149.126.72.220 14082 tcp tcpwrapped open
5984149.126.72.220 14084 tcp tcpwrapped open
5985149.126.72.220 14104 tcp tcpwrapped open
5986149.126.72.220 14130 tcp tcpwrapped open
5987149.126.72.220 14182 tcp tcpwrapped open
5988149.126.72.220 14184 tcp tcpwrapped open
5989149.126.72.220 14330 tcp tcpwrapped open
5990149.126.72.220 14443 tcp tcpwrapped open
5991149.126.72.220 14825 tcp tcpwrapped open
5992149.126.72.220 15002 tcp tcpwrapped open
5993149.126.72.220 15006 tcp tcpwrapped open
5994149.126.72.220 15082 tcp tcpwrapped open
5995149.126.72.220 15084 tcp tcpwrapped open
5996149.126.72.220 15151 tcp tcpwrapped open
5997149.126.72.220 15555 tcp tcpwrapped open
5998149.126.72.220 16000 tcp tcpwrapped open
5999149.126.72.220 16001 tcp tcpwrapped open
6000149.126.72.220 16015 tcp tcpwrapped open
6001149.126.72.220 16016 tcp tcpwrapped open
6002149.126.72.220 16017 tcp tcpwrapped open
6003149.126.72.220 16082 tcp tcpwrapped open
6004149.126.72.220 16084 tcp tcpwrapped open
6005149.126.72.220 16311 tcp tcpwrapped open
6006149.126.72.220 16316 tcp tcpwrapped open
6007149.126.72.220 16443 tcp tcpwrapped open
6008149.126.72.220 16800 tcp tcpwrapped open
6009149.126.72.220 16888 tcp tcpwrapped open
6010149.126.72.220 17082 tcp tcpwrapped open
6011149.126.72.220 17084 tcp tcpwrapped open
6012149.126.72.220 17182 tcp tcpwrapped open
6013149.126.72.220 17184 tcp tcpwrapped open
6014149.126.72.220 17770 tcp tcpwrapped open
6015149.126.72.220 17771 tcp tcpwrapped open
6016149.126.72.220 17772 tcp tcpwrapped open
6017149.126.72.220 17773 tcp tcpwrapped open
6018149.126.72.220 17774 tcp tcpwrapped open
6019149.126.72.220 17775 tcp tcpwrapped open
6020149.126.72.220 17776 tcp tcpwrapped open
6021149.126.72.220 17777 tcp tcpwrapped open
6022149.126.72.220 17778 tcp tcpwrapped open
6023149.126.72.220 17779 tcp tcpwrapped open
6024149.126.72.220 17780 tcp tcpwrapped open
6025149.126.72.220 18000 tcp tcpwrapped open
6026149.126.72.220 18001 tcp tcpwrapped open
6027149.126.72.220 18002 tcp tcpwrapped open
6028149.126.72.220 18003 tcp tcpwrapped open
6029149.126.72.220 18004 tcp tcpwrapped open
6030149.126.72.220 18005 tcp tcpwrapped open
6031149.126.72.220 18006 tcp tcpwrapped open
6032149.126.72.220 18007 tcp tcpwrapped open
6033149.126.72.220 18008 tcp tcpwrapped open
6034149.126.72.220 18009 tcp tcpwrapped open
6035149.126.72.220 18010 tcp tcpwrapped open
6036149.126.72.220 18011 tcp tcpwrapped open
6037149.126.72.220 18012 tcp tcpwrapped open
6038149.126.72.220 18013 tcp tcpwrapped open
6039149.126.72.220 18014 tcp tcpwrapped open
6040149.126.72.220 18015 tcp tcpwrapped open
6041149.126.72.220 18016 tcp tcpwrapped open
6042149.126.72.220 18017 tcp tcpwrapped open
6043149.126.72.220 18018 tcp tcpwrapped open
6044149.126.72.220 18019 tcp tcpwrapped open
6045149.126.72.220 18020 tcp tcpwrapped open
6046149.126.72.220 18021 tcp tcpwrapped open
6047149.126.72.220 18022 tcp tcpwrapped open
6048149.126.72.220 18023 tcp tcpwrapped open
6049149.126.72.220 18024 tcp tcpwrapped open
6050149.126.72.220 18025 tcp tcpwrapped open
6051149.126.72.220 18026 tcp tcpwrapped open
6052149.126.72.220 18027 tcp tcpwrapped open
6053149.126.72.220 18028 tcp tcpwrapped open
6054149.126.72.220 18029 tcp tcpwrapped open
6055149.126.72.220 18030 tcp tcpwrapped open
6056149.126.72.220 18031 tcp tcpwrapped open
6057149.126.72.220 18032 tcp tcpwrapped open
6058149.126.72.220 18033 tcp tcpwrapped open
6059149.126.72.220 18034 tcp tcpwrapped open
6060149.126.72.220 18035 tcp tcpwrapped open
6061149.126.72.220 18036 tcp tcpwrapped open
6062149.126.72.220 18037 tcp tcpwrapped open
6063149.126.72.220 18038 tcp tcpwrapped open
6064149.126.72.220 18039 tcp tcpwrapped open
6065149.126.72.220 18040 tcp tcpwrapped open
6066149.126.72.220 18041 tcp tcpwrapped open
6067149.126.72.220 18042 tcp tcpwrapped open
6068149.126.72.220 18043 tcp tcpwrapped open
6069149.126.72.220 18044 tcp tcpwrapped open
6070149.126.72.220 18045 tcp tcpwrapped open
6071149.126.72.220 18046 tcp tcpwrapped open
6072149.126.72.220 18047 tcp tcpwrapped open
6073149.126.72.220 18048 tcp tcpwrapped open
6074149.126.72.220 18049 tcp tcpwrapped open
6075149.126.72.220 18050 tcp tcpwrapped open
6076149.126.72.220 18051 tcp tcpwrapped open
6077149.126.72.220 18052 tcp tcpwrapped open
6078149.126.72.220 18053 tcp tcpwrapped open
6079149.126.72.220 18054 tcp tcpwrapped open
6080149.126.72.220 18055 tcp tcpwrapped open
6081149.126.72.220 18056 tcp tcpwrapped open
6082149.126.72.220 18057 tcp tcpwrapped open
6083149.126.72.220 18058 tcp tcpwrapped open
6084149.126.72.220 18059 tcp tcpwrapped open
6085149.126.72.220 18060 tcp tcpwrapped open
6086149.126.72.220 18061 tcp tcpwrapped open
6087149.126.72.220 18062 tcp tcpwrapped open
6088149.126.72.220 18063 tcp tcpwrapped open
6089149.126.72.220 18064 tcp tcpwrapped open
6090149.126.72.220 18065 tcp tcpwrapped open
6091149.126.72.220 18066 tcp tcpwrapped open
6092149.126.72.220 18067 tcp tcpwrapped open
6093149.126.72.220 18068 tcp tcpwrapped open
6094149.126.72.220 18069 tcp tcpwrapped open
6095149.126.72.220 18070 tcp tcpwrapped open
6096149.126.72.220 18071 tcp tcpwrapped open
6097149.126.72.220 18072 tcp tcpwrapped open
6098149.126.72.220 18073 tcp tcpwrapped open
6099149.126.72.220 18074 tcp tcpwrapped open
6100149.126.72.220 18075 tcp tcpwrapped open
6101149.126.72.220 18076 tcp tcpwrapped open
6102149.126.72.220 18077 tcp tcpwrapped open
6103149.126.72.220 18078 tcp tcpwrapped open
6104149.126.72.220 18079 tcp tcpwrapped open
6105149.126.72.220 18080 tcp tcpwrapped open
6106149.126.72.220 18081 tcp tcpwrapped open
6107149.126.72.220 18082 tcp tcpwrapped open
6108149.126.72.220 18083 tcp tcpwrapped open
6109149.126.72.220 18084 tcp tcpwrapped open
6110149.126.72.220 18085 tcp tcpwrapped open
6111149.126.72.220 18086 tcp tcpwrapped open
6112149.126.72.220 18087 tcp tcpwrapped open
6113149.126.72.220 18088 tcp tcpwrapped open
6114149.126.72.220 18089 tcp tcpwrapped open
6115149.126.72.220 18090 tcp tcpwrapped open
6116149.126.72.220 18091 tcp tcpwrapped open
6117149.126.72.220 18092 tcp tcpwrapped open
6118149.126.72.220 18093 tcp tcpwrapped open
6119149.126.72.220 18094 tcp tcpwrapped open
6120149.126.72.220 18095 tcp tcpwrapped open
6121149.126.72.220 18096 tcp tcpwrapped open
6122149.126.72.220 18097 tcp tcpwrapped open
6123149.126.72.220 18098 tcp tcpwrapped open
6124149.126.72.220 18099 tcp tcpwrapped open
6125149.126.72.220 18100 tcp tcpwrapped open
6126149.126.72.220 18101 tcp tcpwrapped open
6127149.126.72.220 18102 tcp tcpwrapped open
6128149.126.72.220 18103 tcp tcpwrapped open
6129149.126.72.220 18104 tcp tcpwrapped open
6130149.126.72.220 18105 tcp tcpwrapped open
6131149.126.72.220 18106 tcp tcpwrapped open
6132149.126.72.220 18107 tcp tcpwrapped open
6133149.126.72.220 18108 tcp tcpwrapped open
6134149.126.72.220 18109 tcp tcpwrapped open
6135149.126.72.220 18110 tcp tcpwrapped open
6136149.126.72.220 18111 tcp tcpwrapped open
6137149.126.72.220 18112 tcp tcpwrapped open
6138149.126.72.220 18113 tcp tcpwrapped open
6139149.126.72.220 18200 tcp tcpwrapped open
6140149.126.72.220 18239 tcp tcpwrapped open
6141149.126.72.220 18443 tcp tcpwrapped open
6142149.126.72.220 18802 tcp tcpwrapped open
6143149.126.72.220 19013 tcp tcpwrapped open
6144149.126.72.220 19014 tcp tcpwrapped open
6145149.126.72.220 19015 tcp tcpwrapped open
6146149.126.72.220 19016 tcp tcpwrapped open
6147149.126.72.220 19017 tcp tcpwrapped open
6148149.126.72.220 19022 tcp tcpwrapped open
6149149.126.72.220 19080 tcp tcpwrapped open
6150149.126.72.220 19082 tcp tcpwrapped open
6151149.126.72.220 19084 tcp tcpwrapped open
6152149.126.72.220 19443 tcp tcpwrapped open
6153149.126.72.220 20000 tcp tcpwrapped open
6154149.126.72.220 20001 tcp tcpwrapped open
6155149.126.72.220 20010 tcp tcpwrapped open
6156149.126.72.220 20020 tcp tcpwrapped open
6157149.126.72.220 20030 tcp tcpwrapped open
6158149.126.72.220 20040 tcp tcpwrapped open
6159149.126.72.220 20050 tcp tcpwrapped open
6160149.126.72.220 20053 tcp tcpwrapped open
6161149.126.72.220 20060 tcp tcpwrapped open
6162149.126.72.220 20070 tcp tcpwrapped open
6163149.126.72.220 20080 tcp tcpwrapped open
6164149.126.72.220 20082 tcp tcpwrapped open
6165149.126.72.220 20084 tcp tcpwrapped open
6166149.126.72.220 20090 tcp tcpwrapped open
6167149.126.72.220 20100 tcp tcpwrapped open
6168149.126.72.220 20106 tcp tcpwrapped open
6169149.126.72.220 20107 tcp tcpwrapped open
6170149.126.72.220 20110 tcp tcpwrapped open
6171149.126.72.220 20150 tcp tcpwrapped open
6172149.126.72.220 20182 tcp tcpwrapped open
6173149.126.72.220 20184 tcp tcpwrapped open
6174149.126.72.220 20185 tcp tcpwrapped open
6175149.126.72.220 20200 tcp tcpwrapped open
6176149.126.72.220 20208 tcp tcpwrapped open
6177149.126.72.220 20325 tcp tcpwrapped open
6178149.126.72.220 20500 tcp tcpwrapped open
6179149.126.72.220 20512 tcp tcpwrapped open
6180149.126.72.220 20600 tcp tcpwrapped open
6181149.126.72.220 20800 tcp tcpwrapped open
6182149.126.72.220 20892 tcp tcpwrapped open
6183149.126.72.220 20894 tcp tcpwrapped open
6184149.126.72.220 20900 tcp tcpwrapped open
6185149.126.72.220 21081 tcp tcpwrapped open
6186149.126.72.220 21082 tcp tcpwrapped open
6187149.126.72.220 21083 tcp tcpwrapped open
6188149.126.72.220 21084 tcp tcpwrapped open
6189149.126.72.220 21100 tcp tcpwrapped open
6190149.126.72.220 21200 tcp tcpwrapped open
6191149.126.72.220 21300 tcp tcpwrapped open
6192149.126.72.220 21357 tcp tcpwrapped open
6193149.126.72.220 21381 tcp tcpwrapped open
6194149.126.72.220 21400 tcp tcpwrapped open
6195149.126.72.220 21500 tcp tcpwrapped open
6196149.126.72.220 21935 tcp tcpwrapped open
6197149.126.72.220 22082 tcp tcpwrapped open
6198149.126.72.220 22084 tcp tcpwrapped open
6199149.126.72.220 22103 tcp tcpwrapped open
6200149.126.72.220 22107 tcp tcpwrapped open
6201149.126.72.220 22206 tcp tcpwrapped open
6202149.126.72.220 22345 tcp tcpwrapped open
6203149.126.72.220 22403 tcp tcpwrapped open
6204149.126.72.220 22609 tcp tcpwrapped open
6205149.126.72.220 22703 tcp tcpwrapped open
6206149.126.72.220 22705 tcp tcpwrapped open
6207149.126.72.220 23082 tcp tcpwrapped open
6208149.126.72.220 23084 tcp tcpwrapped open
6209149.126.72.220 23182 tcp tcpwrapped open
6210149.126.72.220 23184 tcp tcpwrapped open
6211149.126.72.220 24082 tcp tcpwrapped open
6212149.126.72.220 24084 tcp tcpwrapped open
6213149.126.72.220 24472 tcp tcpwrapped open
6214149.126.72.220 24510 tcp tcpwrapped open
6215149.126.72.220 25000 tcp tcpwrapped open
6216149.126.72.220 25001 tcp tcpwrapped open
6217149.126.72.220 25002 tcp tcpwrapped open
6218149.126.72.220 25003 tcp tcpwrapped open
6219149.126.72.220 25004 tcp tcpwrapped open
6220149.126.72.220 25005 tcp tcpwrapped open
6221149.126.72.220 25006 tcp tcpwrapped open
6222149.126.72.220 25007 tcp tcpwrapped open
6223149.126.72.220 25008 tcp tcpwrapped open
6224149.126.72.220 25009 tcp tcpwrapped open
6225149.126.72.220 25010 tcp tcpwrapped open
6226149.126.72.220 25082 tcp tcpwrapped open
6227149.126.72.220 25084 tcp tcpwrapped open
6228149.126.72.220 25782 tcp tcpwrapped open
6229149.126.72.220 25952 tcp tcpwrapped open
6230149.126.72.220 27571 tcp tcpwrapped open
6231149.126.72.220 28001 tcp tcpwrapped open
6232149.126.72.220 28080 tcp tcpwrapped open
6233149.126.72.220 28818 tcp tcpwrapped open
6234149.126.72.220 29798 tcp tcpwrapped open
6235149.126.72.220 29799 tcp tcpwrapped open
6236149.126.72.220 30000 tcp tcpwrapped open
6237149.126.72.220 30001 tcp tcpwrapped open
6238149.126.72.220 30003 tcp tcpwrapped open
6239149.126.72.220 30005 tcp tcpwrapped open
6240149.126.72.220 30007 tcp tcpwrapped open
6241149.126.72.220 30009 tcp tcpwrapped open
6242149.126.72.220 30011 tcp tcpwrapped open
6243149.126.72.220 30013 tcp tcpwrapped open
6244149.126.72.220 30015 tcp tcpwrapped open
6245149.126.72.220 30017 tcp tcpwrapped open
6246149.126.72.220 30019 tcp tcpwrapped open
6247149.126.72.220 30021 tcp tcpwrapped open
6248149.126.72.220 30050 tcp tcpwrapped open
6249149.126.72.220 30106 tcp tcpwrapped open
6250149.126.72.220 30110 tcp tcpwrapped open
6251149.126.72.220 30111 tcp tcpwrapped open
6252149.126.72.220 30112 tcp tcpwrapped open
6253149.126.72.220 30113 tcp tcpwrapped open
6254149.126.72.220 30120 tcp tcpwrapped open
6255149.126.72.220 30121 tcp tcpwrapped open
6256149.126.72.220 30122 tcp tcpwrapped open
6257149.126.72.220 30123 tcp tcpwrapped open
6258149.126.72.220 30452 tcp tcpwrapped open
6259149.126.72.220 30468 tcp tcpwrapped open
6260149.126.72.220 30473 tcp tcpwrapped open
6261149.126.72.220 30479 tcp tcpwrapped open
6262149.126.72.220 30501 tcp tcpwrapped open
6263149.126.72.220 30700 tcp tcpwrapped open
6264149.126.72.220 30701 tcp tcpwrapped open
6265149.126.72.220 30892 tcp tcpwrapped open
6266149.126.72.220 30894 tcp tcpwrapped open
6267149.126.72.220 31337 tcp tcpwrapped open
6268149.126.72.220 32101 tcp tcpwrapped open
6269149.126.72.220 32102 tcp tcpwrapped open
6270149.126.72.220 32202 tcp tcpwrapped open
6271149.126.72.220 32303 tcp tcpwrapped open
6272149.126.72.220 32443 tcp tcpwrapped open
6273149.126.72.220 32444 tcp tcpwrapped open
6274149.126.72.220 32746 tcp tcpwrapped open
6275149.126.72.220 32800 tcp tcpwrapped open
6276149.126.72.220 34225 tcp tcpwrapped open
6277149.126.72.220 34500 tcp tcpwrapped open
6278149.126.72.220 35522 tcp tcpwrapped open
6279149.126.72.220 35524 tcp tcpwrapped open
6280149.126.72.220 35531 tcp tcpwrapped open
6281149.126.72.220 35554 tcp tcpwrapped open
6282149.126.72.220 35559 tcp tcpwrapped open
6283149.126.72.220 35560 tcp tcpwrapped open
6284149.126.72.220 36982 tcp tcpwrapped open
6285149.126.72.220 36983 tcp tcpwrapped open
6286149.126.72.220 36984 tcp tcpwrapped open
6287149.126.72.220 37080 tcp tcpwrapped open
6288149.126.72.220 38880 tcp tcpwrapped open
6289149.126.72.220 39001 tcp tcpwrapped open
6290149.126.72.220 40070 tcp tcpwrapped open
6291149.126.72.220 40099 tcp tcpwrapped open
6292149.126.72.220 40892 tcp tcpwrapped open
6293149.126.72.220 40894 tcp tcpwrapped open
6294149.126.72.220 42208 tcp tcpwrapped open
6295149.126.72.220 42424 tcp tcpwrapped open
6296149.126.72.220 42901 tcp tcpwrapped open
6297149.126.72.220 43008 tcp tcpwrapped open
6298149.126.72.220 43009 tcp tcpwrapped open
6299149.126.72.220 43200 tcp tcpwrapped open
6300149.126.72.220 44100 tcp tcpwrapped open
6301149.126.72.220 44300 tcp tcpwrapped open
6302149.126.72.220 44301 tcp tcpwrapped open
6303149.126.72.220 44302 tcp tcpwrapped open
6304149.126.72.220 44303 tcp tcpwrapped open
6305149.126.72.220 44304 tcp tcpwrapped open
6306149.126.72.220 44305 tcp tcpwrapped open
6307149.126.72.220 44306 tcp tcpwrapped open
6308149.126.72.220 44307 tcp tcpwrapped open
6309149.126.72.220 44308 tcp tcpwrapped open
6310149.126.72.220 44309 tcp tcpwrapped open
6311149.126.72.220 44310 tcp tcpwrapped open
6312149.126.72.220 44320 tcp tcpwrapped open
6313149.126.72.220 44332 tcp tcpwrapped open
6314149.126.72.220 44333 tcp tcpwrapped open
6315149.126.72.220 44334 tcp tcpwrapped open
6316149.126.72.220 44336 tcp tcpwrapped open
6317149.126.72.220 44337 tcp tcpwrapped open
6318149.126.72.220 44340 tcp tcpwrapped open
6319149.126.72.220 44341 tcp tcpwrapped open
6320149.126.72.220 44345 tcp tcpwrapped open
6321149.126.72.220 44400 tcp tcpwrapped open
6322149.126.72.220 44410 tcp tcpwrapped open
6323149.126.72.220 44420 tcp tcpwrapped open
6324149.126.72.220 45000 tcp tcpwrapped open
6325149.126.72.220 45555 tcp tcpwrapped open
6326149.126.72.220 45666 tcp tcpwrapped open
6327149.126.72.220 45667 tcp tcpwrapped open
6328149.126.72.220 45668 tcp tcpwrapped open
6329149.126.72.220 45677 tcp tcpwrapped open
6330149.126.72.220 45777 tcp tcpwrapped open
6331149.126.72.220 45788 tcp tcpwrapped open
6332149.126.72.220 45821 tcp tcpwrapped open
6333149.126.72.220 45886 tcp tcpwrapped open
6334149.126.72.220 45888 tcp tcpwrapped open
6335149.126.72.220 46000 tcp tcpwrapped open
6336149.126.72.220 46443 tcp tcpwrapped open
6337149.126.72.220 46862 tcp tcpwrapped open
6338149.126.72.220 47000 tcp tcpwrapped open
6339149.126.72.220 47080 tcp tcpwrapped open
6340149.126.72.220 47534 tcp tcpwrapped open
6341149.126.72.220 48888 tcp tcpwrapped open
6342149.126.72.220 48889 tcp tcpwrapped open
6343149.126.72.220 49200 tcp tcpwrapped open
6344149.126.72.220 49210 tcp tcpwrapped open
6345149.126.72.220 49443 tcp tcpwrapped open
6346149.126.72.220 49682 tcp tcpwrapped open
6347149.126.72.220 49684 tcp tcpwrapped open
6348149.126.72.220 49686 tcp tcpwrapped open
6349149.126.72.220 49688 tcp tcpwrapped open
6350149.126.72.220 49690 tcp tcpwrapped open
6351149.126.72.220 49692 tcp tcpwrapped open
6352149.126.72.220 49694 tcp tcpwrapped open
6353149.126.72.220 50000 tcp tcpwrapped open
6354149.126.72.220 50001 tcp tcpwrapped open
6355149.126.72.220 50042 tcp tcpwrapped open
6356149.126.72.220 50050 tcp tcpwrapped open
6357149.126.72.220 50073 tcp tcpwrapped open
6358149.126.72.220 50085 tcp tcpwrapped open
6359149.126.72.220 50101 tcp tcpwrapped open
6360149.126.72.220 50102 tcp tcpwrapped open
6361149.126.72.220 50103 tcp tcpwrapped open
6362149.126.72.220 50104 tcp tcpwrapped open
6363149.126.72.220 50105 tcp tcpwrapped open
6364149.126.72.220 50106 tcp tcpwrapped open
6365149.126.72.220 50107 tcp tcpwrapped open
6366149.126.72.220 50112 tcp tcpwrapped open
6367149.126.72.220 50113 tcp tcpwrapped open
6368149.126.72.220 50122 tcp tcpwrapped open
6369149.126.72.220 50160 tcp tcpwrapped open
6370149.126.72.220 50443 tcp tcpwrapped open
6371149.126.72.220 51002 tcp tcpwrapped open
6372149.126.72.220 51003 tcp tcpwrapped open
6373149.126.72.220 51434 tcp tcpwrapped open
6374149.126.72.220 52010 tcp tcpwrapped open
6375149.126.72.220 52230 tcp tcpwrapped open
6376149.126.72.220 52311 tcp tcpwrapped open
6377149.126.72.220 52536 tcp tcpwrapped open
6378149.126.72.220 53480 tcp tcpwrapped open
6379149.126.72.220 53481 tcp tcpwrapped open
6380149.126.72.220 53482 tcp tcpwrapped open
6381149.126.72.220 53483 tcp tcpwrapped open
6382149.126.72.220 53484 tcp tcpwrapped open
6383149.126.72.220 53485 tcp tcpwrapped open
6384149.126.72.220 53490 tcp tcpwrapped open
6385149.126.72.220 53805 tcp tcpwrapped open
6386149.126.72.220 53806 tcp tcpwrapped open
6387149.126.72.220 54327 tcp tcpwrapped open
6388149.126.72.220 54490 tcp tcpwrapped open
6389149.126.72.220 54545 tcp tcpwrapped open
6390149.126.72.220 55055 tcp tcpwrapped open
6391149.126.72.220 55080 tcp tcpwrapped open
6392149.126.72.220 55081 tcp tcpwrapped open
6393149.126.72.220 55350 tcp tcpwrapped open
6394149.126.72.220 55388 tcp tcpwrapped open
6395149.126.72.220 55470 tcp tcpwrapped open
6396149.126.72.220 55475 tcp tcpwrapped open
6397149.126.72.220 55481 tcp tcpwrapped open
6398149.126.72.220 55490 tcp tcpwrapped open
6399149.126.72.220 57778 tcp tcpwrapped open
6400149.126.72.220 57779 tcp tcpwrapped open
6401149.126.72.220 57780 tcp tcpwrapped open
6402149.126.72.220 57781 tcp tcpwrapped open
6403149.126.72.220 57782 tcp tcpwrapped open
6404149.126.72.220 57783 tcp tcpwrapped open
6405149.126.72.220 57784 tcp tcpwrapped open
6406149.126.72.220 57785 tcp tcpwrapped open
6407149.126.72.220 57786 tcp tcpwrapped open
6408149.126.72.220 57787 tcp tcpwrapped open
6409149.126.72.220 57788 tcp tcpwrapped open
6410149.126.72.220 58443 tcp tcpwrapped open
6411149.126.72.220 58585 tcp tcpwrapped open
6412149.126.72.220 59012 tcp tcpwrapped open
6413149.126.72.220 59443 tcp tcpwrapped open
6414149.126.72.220 60021 tcp tcpwrapped open
6415149.126.72.220 60023 tcp tcpwrapped open
6416149.126.72.220 60443 tcp tcpwrapped open
6417149.126.72.220 62080 tcp tcpwrapped open
6418149.126.72.220 62237 tcp tcpwrapped open
6419149.126.72.220 62443 tcp tcpwrapped open
6420149.126.72.220 62865 tcp tcpwrapped open
6421149.126.72.220 63443 tcp tcpwrapped open
6422149.126.72.220 64477 tcp tcpwrapped open
6423149.126.72.220 64671 tcp tcpwrapped open
6424151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6425151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6426151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6427151.106.38.107 67 tcp dhcps filtered
6428151.106.38.107 67 udp dhcps unknown
6429151.106.38.107 68 tcp dhcpc filtered
6430151.106.38.107 68 udp dhcpc unknown
6431151.106.38.107 69 tcp tftp filtered
6432151.106.38.107 69 udp tftp unknown
6433151.106.38.107 88 tcp kerberos-sec filtered
6434151.106.38.107 88 udp kerberos-sec unknown
6435151.106.38.107 123 tcp ntp filtered
6436151.106.38.107 123 udp ntp unknown
6437151.106.38.107 137 tcp netbios-ns filtered
6438151.106.38.107 137 udp netbios-ns unknown
6439151.106.38.107 138 tcp netbios-dgm filtered
6440151.106.38.107 138 udp netbios-dgm unknown
6441151.106.38.107 139 tcp netbios-ssn filtered
6442151.106.38.107 139 udp netbios-ssn unknown
6443151.106.38.107 161 tcp snmp filtered
6444151.106.38.107 161 udp snmp unknown
6445151.106.38.107 162 tcp snmptrap filtered
6446151.106.38.107 162 udp snmptrap unknown
6447151.106.38.107 389 tcp ldap filtered
6448151.106.38.107 389 udp ldap unknown
6449151.106.38.107 520 tcp efs filtered
6450151.106.38.107 520 udp route unknown
6451151.106.38.107 2049 tcp nfs filtered
6452151.106.38.107 2049 udp nfs unknown
6453158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
6454158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
6455158.69.13.254 53 tcp domain open unknown banner: get lost
6456158.69.13.254 53 udp domain open unknown banner: get lost
6457158.69.13.254 67 tcp dhcps filtered
6458158.69.13.254 67 udp dhcps unknown
6459158.69.13.254 68 tcp dhcpc filtered
6460158.69.13.254 68 udp dhcpc unknown
6461158.69.13.254 69 tcp tftp filtered
6462158.69.13.254 69 udp tftp unknown
6463158.69.13.254 80 tcp http open nginx
6464158.69.13.254 88 tcp kerberos-sec filtered
6465158.69.13.254 88 udp kerberos-sec unknown
6466158.69.13.254 123 tcp ntp filtered
6467158.69.13.254 123 udp ntp unknown
6468158.69.13.254 137 tcp netbios-ns filtered
6469158.69.13.254 137 udp netbios-ns unknown
6470158.69.13.254 138 tcp netbios-dgm filtered
6471158.69.13.254 138 udp netbios-dgm unknown
6472158.69.13.254 139 tcp netbios-ssn filtered
6473158.69.13.254 139 udp netbios-ssn unknown
6474158.69.13.254 161 tcp snmp filtered
6475158.69.13.254 161 udp snmp unknown
6476158.69.13.254 162 tcp snmptrap filtered
6477158.69.13.254 162 udp snmptrap unknown
6478158.69.13.254 389 tcp ldap filtered
6479158.69.13.254 389 udp ldap unknown
6480158.69.13.254 443 tcp ssl/http open nginx
6481158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
6482158.69.13.254 520 tcp efs filtered
6483158.69.13.254 520 udp route unknown
6484158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
6485158.69.13.254 2049 tcp nfs filtered
6486158.69.13.254 2049 udp nfs unknown
6487158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
6488158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
6489162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
6490162.244.35.13 25 tcp open
6491162.244.35.13 53 tcp domain open ISC BIND 9.10.6
6492162.244.35.13 53 udp domain open ISC BIND 9.10.6
6493162.244.35.13 67 tcp dhcps closed
6494162.244.35.13 67 udp dhcps closed
6495162.244.35.13 68 tcp dhcpc closed
6496162.244.35.13 68 udp dhcpc closed
6497162.244.35.13 69 tcp tftp closed
6498162.244.35.13 69 udp tftp closed
6499162.244.35.13 88 tcp kerberos-sec closed
6500162.244.35.13 88 udp kerberos-sec closed
6501162.244.35.13 123 tcp ntp closed
6502162.244.35.13 123 udp ntp closed
6503162.244.35.13 137 tcp netbios-ns filtered
6504162.244.35.13 137 udp netbios-ns unknown
6505162.244.35.13 138 tcp netbios-dgm filtered
6506162.244.35.13 138 udp netbios-dgm unknown
6507162.244.35.13 139 tcp netbios-ssn filtered
6508162.244.35.13 139 udp netbios-ssn unknown
6509162.244.35.13 161 tcp snmp closed
6510162.244.35.13 161 udp snmp closed
6511162.244.35.13 162 tcp snmptrap closed
6512162.244.35.13 162 udp snmptrap closed
6513162.244.35.13 389 tcp ldap closed
6514162.244.35.13 389 udp ldap closed
6515162.244.35.13 520 tcp efs closed
6516162.244.35.13 520 udp route closed
6517162.244.35.13 2049 tcp nfs closed
6518162.244.35.13 2049 udp nfs closed
6519169.239.218.20 25 tcp smtp closed
6520169.239.218.20 53 tcp domain filtered
6521169.239.218.20 53 udp domain unknown
6522169.239.218.20 67 tcp dhcps filtered
6523169.239.218.20 67 udp dhcps unknown
6524169.239.218.20 68 tcp dhcpc filtered
6525169.239.218.20 68 udp dhcpc unknown
6526169.239.218.20 69 tcp tftp filtered
6527169.239.218.20 69 udp tftp unknown
6528169.239.218.20 88 tcp kerberos-sec filtered
6529169.239.218.20 88 udp kerberos-sec unknown
6530169.239.218.20 113 tcp ident closed
6531169.239.218.20 123 tcp ntp filtered
6532169.239.218.20 123 udp ntp unknown
6533169.239.218.20 137 tcp netbios-ns filtered
6534169.239.218.20 137 udp netbios-ns filtered
6535169.239.218.20 138 tcp netbios-dgm filtered
6536169.239.218.20 138 udp netbios-dgm filtered
6537169.239.218.20 139 tcp netbios-ssn closed
6538169.239.218.20 139 udp netbios-ssn unknown
6539169.239.218.20 161 tcp snmp filtered
6540169.239.218.20 161 udp snmp unknown
6541169.239.218.20 162 tcp snmptrap filtered
6542169.239.218.20 162 udp snmptrap unknown
6543169.239.218.20 389 tcp ldap filtered
6544169.239.218.20 389 udp ldap unknown
6545169.239.218.20 445 tcp microsoft-ds closed
6546169.239.218.20 520 tcp efs filtered
6547169.239.218.20 520 udp route unknown
6548169.239.218.20 2049 tcp nfs filtered
6549169.239.218.20 2049 udp nfs unknown
6550169.239.218.20 8008 tcp tcpwrapped open
6551173.214.244.169 53 tcp domain filtered
6552173.214.244.169 53 udp domain unknown
6553173.214.244.169 67 tcp dhcps filtered
6554173.214.244.169 67 udp dhcps unknown
6555173.214.244.169 68 tcp dhcpc filtered
6556173.214.244.169 68 udp dhcpc unknown
6557173.214.244.169 69 tcp tftp filtered
6558173.214.244.169 69 udp tftp unknown
6559173.214.244.169 88 tcp kerberos-sec filtered
6560173.214.244.169 88 udp kerberos-sec unknown
6561173.214.244.169 123 tcp ntp filtered
6562173.214.244.169 123 udp ntp unknown
6563173.214.244.169 137 tcp netbios-ns filtered
6564173.214.244.169 137 udp netbios-ns unknown
6565173.214.244.169 138 tcp netbios-dgm filtered
6566173.214.244.169 138 udp netbios-dgm unknown
6567173.214.244.169 139 tcp netbios-ssn filtered
6568173.214.244.169 139 udp netbios-ssn unknown
6569173.214.244.169 161 tcp snmp filtered
6570173.214.244.169 161 udp snmp unknown
6571173.214.244.169 162 tcp snmptrap filtered
6572173.214.244.169 162 udp snmptrap unknown
6573173.214.244.169 389 tcp ldap filtered
6574173.214.244.169 389 udp ldap unknown
6575173.214.244.169 520 tcp efs filtered
6576173.214.244.169 520 udp route unknown
6577173.214.244.169 2049 tcp nfs filtered
6578173.214.244.169 2049 udp nfs unknown
6579174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6580174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
6581174.142.53.51 25 tcp smtp closed
6582174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6583174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6584174.142.53.51 67 tcp dhcps filtered
6585174.142.53.51 67 udp dhcps unknown
6586174.142.53.51 68 tcp dhcpc filtered
6587174.142.53.51 68 udp dhcpc unknown
6588174.142.53.51 69 tcp tftp filtered
6589174.142.53.51 69 udp tftp unknown
6590174.142.53.51 88 tcp kerberos-sec filtered
6591174.142.53.51 88 udp kerberos-sec unknown
6592174.142.53.51 123 tcp ntp filtered
6593174.142.53.51 123 udp ntp unknown
6594174.142.53.51 137 tcp netbios-ns filtered
6595174.142.53.51 137 udp netbios-ns filtered
6596174.142.53.51 138 tcp netbios-dgm filtered
6597174.142.53.51 138 udp netbios-dgm filtered
6598174.142.53.51 139 tcp netbios-ssn closed
6599174.142.53.51 139 udp netbios-ssn unknown
6600174.142.53.51 161 tcp snmp filtered
6601174.142.53.51 161 udp snmp unknown
6602174.142.53.51 162 tcp snmptrap filtered
6603174.142.53.51 162 udp snmptrap unknown
6604174.142.53.51 389 tcp ldap filtered
6605174.142.53.51 389 udp ldap unknown
6606174.142.53.51 445 tcp microsoft-ds closed
6607174.142.53.51 520 tcp efs filtered
6608174.142.53.51 520 udp route unknown
6609174.142.53.51 2049 tcp nfs filtered
6610174.142.53.51 2049 udp nfs unknown
6611190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
6612190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6613190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
6614190.153.219.254 67 tcp dhcps filtered
6615190.153.219.254 67 udp dhcps unknown
6616190.153.219.254 68 tcp dhcpc filtered
6617190.153.219.254 68 udp dhcpc unknown
6618190.153.219.254 69 tcp tftp filtered
6619190.153.219.254 69 udp tftp unknown
6620190.153.219.254 88 tcp kerberos-sec filtered
6621190.153.219.254 88 udp kerberos-sec unknown
6622190.153.219.254 123 tcp ntp filtered
6623190.153.219.254 123 udp ntp unknown
6624190.153.219.254 137 tcp netbios-ns filtered
6625190.153.219.254 137 udp netbios-ns unknown
6626190.153.219.254 138 tcp netbios-dgm filtered
6627190.153.219.254 138 udp netbios-dgm unknown
6628190.153.219.254 139 tcp netbios-ssn filtered
6629190.153.219.254 139 udp netbios-ssn unknown
6630190.153.219.254 161 tcp snmp filtered
6631190.153.219.254 161 udp snmp unknown
6632190.153.219.254 162 tcp snmptrap filtered
6633190.153.219.254 162 udp snmptrap unknown
6634190.153.219.254 389 tcp ldap filtered
6635190.153.219.254 389 udp ldap unknown
6636190.153.219.254 520 tcp efs filtered
6637190.153.219.254 520 udp route unknown
6638190.153.219.254 2049 tcp nfs filtered
6639190.153.219.254 2049 udp nfs unknown
6640200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6641200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6642200.73.54.34 67 tcp dhcps filtered
6643200.73.54.34 67 udp dhcps unknown
6644200.73.54.34 68 tcp dhcpc filtered
6645200.73.54.34 68 udp dhcpc unknown
6646200.73.54.34 69 tcp tftp filtered
6647200.73.54.34 69 udp tftp unknown
6648200.73.54.34 88 tcp kerberos-sec filtered
6649200.73.54.34 88 udp kerberos-sec unknown
6650200.73.54.34 123 tcp ntp filtered
6651200.73.54.34 123 udp ntp unknown
6652200.73.54.34 137 tcp netbios-ns filtered
6653200.73.54.34 137 udp netbios-ns unknown
6654200.73.54.34 138 tcp netbios-dgm filtered
6655200.73.54.34 138 udp netbios-dgm unknown
6656200.73.54.34 139 tcp netbios-ssn filtered
6657200.73.54.34 139 udp netbios-ssn unknown
6658200.73.54.34 161 tcp snmp filtered
6659200.73.54.34 161 udp snmp unknown
6660200.73.54.34 162 tcp snmptrap filtered
6661200.73.54.34 162 udp snmptrap unknown
6662200.73.54.34 389 tcp ldap filtered
6663200.73.54.34 389 udp ldap unknown
6664200.73.54.34 520 tcp efs filtered
6665200.73.54.34 520 udp route unknown
6666200.73.54.34 2049 tcp nfs filtered
6667200.73.54.34 2049 udp nfs unknown
6668206.48.140.40 53 tcp domain filtered
6669206.48.140.40 53 udp domain unknown
6670206.48.140.40 67 tcp dhcps filtered
6671206.48.140.40 67 udp dhcps unknown
6672206.48.140.40 68 tcp dhcpc filtered
6673206.48.140.40 68 udp dhcpc unknown
6674206.48.140.40 69 tcp tftp filtered
6675206.48.140.40 69 udp tftp unknown
6676206.48.140.40 88 tcp kerberos-sec filtered
6677206.48.140.40 88 udp kerberos-sec unknown
6678206.48.140.40 123 tcp ntp filtered
6679206.48.140.40 123 udp ntp unknown
6680206.48.140.40 137 tcp netbios-ns filtered
6681206.48.140.40 137 udp netbios-ns unknown
6682206.48.140.40 138 tcp netbios-dgm filtered
6683206.48.140.40 138 udp netbios-dgm unknown
6684206.48.140.40 139 tcp netbios-ssn filtered
6685206.48.140.40 139 udp netbios-ssn unknown
6686206.48.140.40 161 tcp snmp filtered
6687206.48.140.40 161 udp snmp unknown
6688206.48.140.40 162 tcp snmptrap filtered
6689206.48.140.40 162 udp snmptrap unknown
6690206.48.140.40 389 tcp ldap filtered
6691206.48.140.40 389 udp ldap unknown
6692206.48.140.40 520 tcp efs filtered
6693206.48.140.40 520 udp route unknown
6694206.48.140.40 2049 tcp nfs filtered
6695206.48.140.40 2049 udp nfs unknown
6696207.246.147.189 53 tcp domain filtered
6697207.246.147.189 53 udp domain unknown
6698207.246.147.189 67 tcp dhcps filtered
6699207.246.147.189 67 udp dhcps unknown
6700207.246.147.189 68 tcp dhcpc filtered
6701207.246.147.189 68 udp dhcpc unknown
6702207.246.147.189 69 tcp tftp filtered
6703207.246.147.189 69 udp tftp unknown
6704207.246.147.189 80 tcp http open nginx
6705207.246.147.189 88 tcp kerberos-sec filtered
6706207.246.147.189 88 udp kerberos-sec unknown
6707207.246.147.189 123 tcp ntp filtered
6708207.246.147.189 123 udp ntp unknown
6709207.246.147.189 137 tcp netbios-ns filtered
6710207.246.147.189 137 udp netbios-ns unknown
6711207.246.147.189 138 tcp netbios-dgm filtered
6712207.246.147.189 138 udp netbios-dgm unknown
6713207.246.147.189 139 tcp netbios-ssn filtered
6714207.246.147.189 139 udp netbios-ssn unknown
6715207.246.147.189 161 tcp snmp filtered
6716207.246.147.189 161 udp snmp unknown
6717207.246.147.189 162 tcp snmptrap filtered
6718207.246.147.189 162 udp snmptrap unknown
6719207.246.147.189 389 tcp ldap filtered
6720207.246.147.189 389 udp ldap unknown
6721207.246.147.189 443 tcp ssl/http open nginx
6722207.246.147.189 520 tcp efs filtered
6723207.246.147.189 520 udp route unknown
6724207.246.147.189 2049 tcp nfs filtered
6725207.246.147.189 2049 udp nfs unknown
6726207.246.147.190 53 tcp domain filtered
6727207.246.147.190 53 udp domain unknown
6728207.246.147.190 67 tcp dhcps filtered
6729207.246.147.190 67 udp dhcps unknown
6730207.246.147.190 68 tcp dhcpc filtered
6731207.246.147.190 68 udp dhcpc unknown
6732207.246.147.190 69 tcp tftp filtered
6733207.246.147.190 69 udp tftp unknown
6734207.246.147.190 80 tcp http open nginx
6735207.246.147.190 88 tcp kerberos-sec filtered
6736207.246.147.190 88 udp kerberos-sec unknown
6737207.246.147.190 123 tcp ntp filtered
6738207.246.147.190 123 udp ntp unknown
6739207.246.147.190 137 tcp netbios-ns filtered
6740207.246.147.190 137 udp netbios-ns unknown
6741207.246.147.190 138 tcp netbios-dgm filtered
6742207.246.147.190 138 udp netbios-dgm filtered
6743207.246.147.190 139 tcp netbios-ssn filtered
6744207.246.147.190 139 udp netbios-ssn unknown
6745207.246.147.190 161 tcp snmp filtered
6746207.246.147.190 161 udp snmp unknown
6747207.246.147.190 162 tcp snmptrap filtered
6748207.246.147.190 162 udp snmptrap unknown
6749207.246.147.190 389 tcp ldap filtered
6750207.246.147.190 389 udp ldap unknown
6751207.246.147.190 443 tcp ssl/http open nginx
6752207.246.147.190 520 tcp efs filtered
6753207.246.147.190 520 udp route unknown
6754207.246.147.190 2049 tcp nfs filtered
6755207.246.147.190 2049 udp nfs unknown
6756207.246.147.247 53 tcp domain filtered
6757207.246.147.247 53 udp domain filtered
6758207.246.147.247 67 tcp dhcps filtered
6759207.246.147.247 67 udp dhcps unknown
6760207.246.147.247 68 tcp dhcpc filtered
6761207.246.147.247 68 udp dhcpc unknown
6762207.246.147.247 69 tcp tftp filtered
6763207.246.147.247 69 udp tftp unknown
6764207.246.147.247 80 tcp http open nginx
6765207.246.147.247 88 tcp kerberos-sec filtered
6766207.246.147.247 88 udp kerberos-sec unknown
6767207.246.147.247 123 tcp ntp filtered
6768207.246.147.247 123 udp ntp unknown
6769207.246.147.247 137 tcp netbios-ns filtered
6770207.246.147.247 137 udp netbios-ns filtered
6771207.246.147.247 138 tcp netbios-dgm filtered
6772207.246.147.247 138 udp netbios-dgm unknown
6773207.246.147.247 139 tcp netbios-ssn filtered
6774207.246.147.247 139 udp netbios-ssn unknown
6775207.246.147.247 161 tcp snmp filtered
6776207.246.147.247 161 udp snmp unknown
6777207.246.147.247 162 tcp snmptrap filtered
6778207.246.147.247 162 udp snmptrap unknown
6779207.246.147.247 389 tcp ldap filtered
6780207.246.147.247 389 udp ldap unknown
6781207.246.147.247 443 tcp ssl/http open nginx
6782207.246.147.247 520 tcp efs filtered
6783207.246.147.247 520 udp route unknown
6784207.246.147.247 2049 tcp nfs filtered
6785207.246.147.247 2049 udp nfs unknown
6786207.246.147.248 53 tcp domain filtered
6787207.246.147.248 53 udp domain unknown
6788207.246.147.248 67 tcp dhcps filtered
6789207.246.147.248 67 udp dhcps unknown
6790207.246.147.248 68 tcp dhcpc filtered
6791207.246.147.248 68 udp dhcpc unknown
6792207.246.147.248 69 tcp tftp filtered
6793207.246.147.248 69 udp tftp unknown
6794207.246.147.248 80 tcp http open nginx
6795207.246.147.248 88 tcp kerberos-sec filtered
6796207.246.147.248 88 udp kerberos-sec unknown
6797207.246.147.248 123 tcp ntp filtered
6798207.246.147.248 123 udp ntp unknown
6799207.246.147.248 137 tcp netbios-ns filtered
6800207.246.147.248 137 udp netbios-ns unknown
6801207.246.147.248 138 tcp netbios-dgm filtered
6802207.246.147.248 138 udp netbios-dgm unknown
6803207.246.147.248 139 tcp netbios-ssn filtered
6804207.246.147.248 139 udp netbios-ssn unknown
6805207.246.147.248 161 tcp snmp filtered
6806207.246.147.248 161 udp snmp unknown
6807207.246.147.248 162 tcp snmptrap filtered
6808207.246.147.248 162 udp snmptrap unknown
6809207.246.147.248 389 tcp ldap filtered
6810207.246.147.248 389 udp ldap unknown
6811207.246.147.248 443 tcp ssl/http open nginx
6812207.246.147.248 520 tcp efs filtered
6813207.246.147.248 520 udp route unknown
6814207.246.147.248 2049 tcp nfs filtered
6815207.246.147.248 2049 udp nfs unknown
6816211.13.196.135 25 tcp smtp closed
6817211.13.196.135 53 tcp domain filtered
6818211.13.196.135 53 udp domain unknown
6819211.13.196.135 67 tcp dhcps filtered
6820211.13.196.135 67 udp dhcps unknown
6821211.13.196.135 68 tcp dhcpc filtered
6822211.13.196.135 68 udp dhcpc unknown
6823211.13.196.135 69 tcp tftp filtered
6824211.13.196.135 69 udp tftp unknown
6825211.13.196.135 80 tcp http open Apache httpd
6826211.13.196.135 88 tcp kerberos-sec filtered
6827211.13.196.135 88 udp kerberos-sec unknown
6828211.13.196.135 113 tcp ident closed
6829211.13.196.135 123 tcp ntp filtered
6830211.13.196.135 123 udp ntp unknown
6831211.13.196.135 137 tcp netbios-ns filtered
6832211.13.196.135 137 udp netbios-ns filtered
6833211.13.196.135 138 tcp netbios-dgm filtered
6834211.13.196.135 138 udp netbios-dgm filtered
6835211.13.196.135 139 tcp netbios-ssn closed
6836211.13.196.135 139 udp netbios-ssn unknown
6837211.13.196.135 161 tcp snmp filtered
6838211.13.196.135 161 udp snmp unknown
6839211.13.196.135 162 tcp snmptrap filtered
6840211.13.196.135 162 udp snmptrap unknown
6841211.13.196.135 389 tcp ldap filtered
6842211.13.196.135 389 udp ldap unknown
6843211.13.196.135 443 tcp ssl/http open Apache httpd
6844211.13.196.135 445 tcp microsoft-ds closed
6845211.13.196.135 520 tcp efs filtered
6846211.13.196.135 520 udp route unknown
6847211.13.196.135 2049 tcp nfs filtered
6848211.13.196.135 2049 udp nfs unknown
6849218.45.5.97 25 tcp smtp closed
6850218.45.5.97 53 tcp domain filtered
6851218.45.5.97 53 udp domain unknown
6852218.45.5.97 67 tcp dhcps filtered
6853218.45.5.97 67 udp dhcps unknown
6854218.45.5.97 68 tcp dhcpc filtered
6855218.45.5.97 68 udp dhcpc unknown
6856218.45.5.97 69 tcp tftp filtered
6857218.45.5.97 69 udp tftp unknown
6858218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
6859218.45.5.97 88 tcp kerberos-sec filtered
6860218.45.5.97 88 udp kerberos-sec unknown
6861218.45.5.97 113 tcp ident closed
6862218.45.5.97 123 tcp ntp filtered
6863218.45.5.97 123 udp ntp unknown
6864218.45.5.97 137 tcp netbios-ns filtered
6865218.45.5.97 137 udp netbios-ns filtered
6866218.45.5.97 138 tcp netbios-dgm filtered
6867218.45.5.97 138 udp netbios-dgm filtered
6868218.45.5.97 139 tcp netbios-ssn closed
6869218.45.5.97 139 udp netbios-ssn unknown
6870218.45.5.97 161 tcp snmp filtered
6871218.45.5.97 161 udp snmp unknown
6872218.45.5.97 162 tcp snmptrap filtered
6873218.45.5.97 162 udp snmptrap unknown
6874218.45.5.97 389 tcp ldap filtered
6875218.45.5.97 389 udp ldap unknown
6876218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
6877218.45.5.97 445 tcp microsoft-ds closed
6878218.45.5.97 520 tcp efs filtered
6879218.45.5.97 520 udp route unknown
6880218.45.5.97 2049 tcp nfs filtered
6881218.45.5.97 2049 udp nfs unknown
6882#######################################################################################################################################
6883Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-28 18:25 EST
6884Nmap scan report for 206.48.140.40
6885Host is up (0.36s latency).
6886Not shown: 998 filtered ports
6887PORT STATE SERVICE VERSION
688880/tcp open http Microsoft IIS httpd 7.5
6889|_http-server-header: Microsoft-IIS/7.5
6890| vulscan: VulDB - https://vuldb.com:
6891| [68404] Microsoft IIS 7.5 Error Message mypage cross site scripting
6892| [6924] Microsoft IIS 7.5 Log File Permission information disclosure
6893| [5623] Microsoft IIS up to 7.5 File Name Tilde privilege escalation
6894| [4234] Microsoft IIS 7.5 FTP Server Telnet IAC Character Heap-based denial of service
6895| [4179] Microsoft IIS 7.5 FastCGI Request Header memory corruption
6896| [98097] Microsoft IIS 7.0/7.5/8.0/8.5/10 /uncpath/ cross site scripting
6897| [6925] Microsoft IIS 7.0/7.5 FTP Command information disclosure
6898| [4484] Microsoft Windows Phone 7.5 SMS Service denial of service
6899|
6900| MITRE CVE - https://cve.mitre.org:
6901| [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
6902| [CVE-2012-2531] Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka "Password Disclosure Vulnerability."
6903| [CVE-2010-3972] Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
6904| [CVE-2010-2730] Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
6905| [CVE-2010-1899] Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
6906| [CVE-2010-1256] Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
6907| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
6908| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
6909| [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
6910| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
6911| [CVE-2009-2521] Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
6912| [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
6913| [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
6914| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
6915| [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
6916| [CVE-2007-1278] Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root.
6917| [CVE-2006-5858] Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.
6918| [CVE-2006-5028] Directory traversal vulnerability in filemanager/filemanager.php in SWsoft Plesk 7.5 Reload and Plesk 7.6 for Microsoft Windows allows remote attackers to list arbitrary directories via a ../ (dot dot slash) in the file parameter in a chdir action.
6919| [CVE-2006-0363] The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE.
6920|
6921| SecurityFocus - https://www.securityfocus.com/bid/:
6922| [55569] Microsoft Windows Phone 7 SSL Certificate 'Common Name' Validation Security Bypass Vulnerability
6923| [28820] Microsoft Works 7 'WkImgSrv.dll' ActiveX Control Remote Code Execution Vulnerability
6924| [28498] Microsoft Internet Explorer 7 Popup Window Address Bar URI Spoofing Vulnerability
6925| [24483] Microsoft Internet Explorer 7 HTTP Authentication International Domain Name Spoofing Weakness
6926| [20728] Microsoft Internet Explorer 7 Popup Window Address Bar Spoofing Weakness
6927| [18736] Microsoft Internet Explorer 7 Denial of Service Vulnerability
6928| [5877] Microsoft SQL Server 7.0/2000 DBCC Buffer Overflow Vulnerability
6929| [4108] Microsoft Visual C++ 7/Visual C++.Net Buffer Overflow Protection Weakness
6930| [1714] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
6931| [1444] Microsoft SQL Server 7.0 Stored Procedure Vulnerability
6932| [1281] Microsoft SQL Server 7.0 System Administrator Password Disclosure Vulnerability
6933| [817] Microsoft SQL Server 7.0 NULL Data DoS Vulnerability
6934| [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
6935| [86059] Microsoft IIS CVE-1999-0561 Remote Security Vulnerability
6936| [56440] Microsoft IIS FTP Service CVE-2012-2532 Remote Command Injection Vulnerability
6937| [56439] Microsoft IIS CVE-2012-2531 Password Information Disclosure Vulnerability
6938| [54276] Microsoft IIS Multiple FTP Command Request Denial of Service Vulnerability
6939| [54251] Microsoft IIS File Enumeration Weakness
6940| [53906] Microsoft IIS Authentication Bypass and Source Code Disclosure Vulnerabilities
6941| [45542] Microsoft IIS FTP Service Remote Buffer Overflow Vulnerability
6942| [43140] Microsoft IIS Repeated Parameter Request Denial of Service Vulnerability
6943| [43138] Microsoft IIS Request Header Buffer Overflow Vulnerability
6944| [41314] Microsoft IIS 5.1 Alternate Data Stream Authentication Bypass Vulnerability
6945| [40573] Microsoft IIS Authentication Remote Code Execution Vulnerability
6946| [37460] RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability
6947| [36276] RETIRED: Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
6948| [36273] Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
6949| [36189] Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability
6950| [35232] Microsoft IIS 5.0 WebDAV Authentication Bypass Vulnerability
6951| [34993] Microsoft IIS Unicode Requests to WebDAV Multiple Authentication Bypass Vulnerabilities
6952| [33374] Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
6953| [27101] Microsoft IIS File Change Notification Local Privilege Escalation Vulnerability
6954| [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
6955| [18858] Microsoft IIS ASP Remote Code Execution Vulnerability
6956| [14764] Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
6957| [10706] Microsoft IIS 4 Redirect Remote Buffer Overflow Vulnerability
6958| [9660] Microsoft IIS Unspecified Remote Denial Of Service Vulnerability
6959| [9313] Microsoft IIS Failure To Log Undocumented TRACK Requests Vulnerability
6960| [8244] Microsoft Multiple IIS 6.0 Web Admin Vulnerabilities
6961| [8092] Microsoft IIS _VTI_BOT Malicious WebBot Elevated Permissions Vulnerability
6962| [8035] Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability
6963| [7735] Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
6964| [7734] Microsoft IIS SSINC.DLL Server Side Includes Buffer Overflow Vulnerability
6965| [7733] Microsoft IIS ASP Header Denial Of Service Vulnerability
6966| [7731] Microsoft IIS Redirection Error Page Cross-Site Scripting Vulnerability
6967| [7492] Microsoft IIS User Existence Disclosure Vulnerability
6968| [6795] Microsoft IIS False Logging Weakness
6969| [6789] Microsoft IIS Malformed HTTP Get Request Denial Of Service Vulnerability
6970| [6072] Microsoft IIS Administrative Pages Cross Site Scripting Vulnerabilities
6971| [6071] Microsoft IIS Script Source Access File Upload Vulnerability
6972| [6070] Microsoft IIS WebDAV Denial Of Service Vulnerability
6973| [6069] Microsoft IIS Out Of Process Privilege Escalation Vulnerability
6974| [6068] Multiple Microsoft IIS Vulnerabilities
6975| [5907] Microsoft IIS Malformed HTTP HOST Header Field Denial Of Service Vulnerability
6976| [5900] Microsoft IIS IDC Extension Cross Site Scripting Vulnerability
6977| [5213] Microsoft IIS SMTP Service Encapsulated SMTP Address Vulnerability
6978| [4855] Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability
6979| [4846] Microsoft IIS 5.0 Denial Of Service Vulnerability
6980| [4543] Microsoft IIS CodeBrws.ASP File Extension Check Out By One Vulnerability
6981| [4525] Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability
6982| [4490] Microsoft IIS Chunked Encoding Heap Overflow Variant Vulnerability
6983| [4487] Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability
6984| [4486] Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability
6985| [4485] Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability
6986| [4483] Microsoft IIS Help File Search Cross Site Scripting Vulnerability
6987| [4482] Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
6988| [4479] Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability
6989| [4478] Microsoft IIS ASP Server-Side Include Buffer Overflow Vulnerability
6990| [4476] Microsoft IIS HTTP Header Field Delimiter Buffer Overflow Vulnerability
6991| [4474] Microsoft IIS HTR ISAPI Extension Buffer Overflow Vulnerability
6992| [4235] Microsoft IIS Authentication Method Disclosure Vulnerability
6993| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
6994| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
6995| [3667] Microsoft IIS False Content-Length Field DoS Vulnerability
6996| [3195] Microsoft IIS MIME Header Denial of Service Vulnerability
6997| [3194] Microsoft IIS WebDAV Invalid Request Denial of Service Vulnerability
6998| [3193] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
6999| [3191] Microsoft IIS 4.0 URL Redirection DoS Vulnerability
7000| [3190] Microsoft IIS SSI Buffer Overrun Privelege Elevation Vulnerability
7001| [2977] Microsoft IIS Device File Remote DoS Vulnerability
7002| [2973] Microsoft IIS Device File Local DoS Vulnerability
7003| [2909] Microsoft IIS Unicode .asp Source Code Disclosure Vulnerability
7004| [2719] Microsoft IIS Various Domain User Account Access Vulnerability
7005| [2717] Microsoft IIS FTP Denial of Service Vulnerability
7006| [2690] Microsoft IIS WebDAV 'Propfind' Server Restart Vulnerability
7007| [2674] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
7008| [2654] Microsoft IIS Long URL Denial of Service Vulnerability
7009| [2483] Microsoft IIS WebDAV 'Search' Denial of Service Vulnerability
7010| [2453] Microsoft IIS WebDAV Denial of Service Vulnerability
7011| [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
7012| [2440] Microsoft IIS Multiple Invalid URL Request DoS Vulnerability
7013| [2313] Microsoft IIS File Fragment Disclosure Vulnerability
7014| [2280] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
7015| [2218] Microsoft IIS '../..' Denial of Service Vulnerability
7016| [2144] Microsoft IIS Front Page Server Extension DoS Vulnerability
7017| [2110] Microsoft IIS 4.0 IISADMPWD Proxied Password Attack
7018| [2100] Microsoft IIS Far East Edition DBCS File Disclosure Vulnerability
7019| [2074] Microsoft IIS Appended Dot Script Source Disclosure Vulnerability
7020| [1912] Microsoft IIS Executable File Parsing Vulnerability
7021| [1911] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
7022| [1832] Microsoft IIS 4.0/5.0 Session ID Cookie Disclosure Vulnerability
7023| [1819] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
7024| [1818] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
7025| [1814] Microsoft IIS 3.0 %2e ASP Source Disclosure Vulnerability
7026| [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
7027| [1806] Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability
7028| [1756] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
7029| [1642] Microsoft NT 4.0 and IIS 4.0 Invalid URL Request DoS Vulnerability
7030| [1595] Microsoft IIS Cross Site Scripting .shtml Vulnerability
7031| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
7032| [1578] Microsoft IIS 5.0 Translate: f Source Disclosure Vulnerability
7033| [1565] Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability
7034| [1499] Microsoft IIS Internal IP Address Disclosure Vulnerability
7035| [1488] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
7036| [1476] Microsoft IIS 3.0 .htr Missing Variable Denial of Service Vulnerability
7037| [1193] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
7038| [1191] Microsoft IIS 4.0/5.0 Malformed .htr Request Vulnerability
7039| [1190] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
7040| [1101] Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability
7041| [1081] Microsoft IIS UNC Mapped Virtual Host Vulnerability
7042| [1066] Microsoft IIS 4.0 Chunked Transfer Encoding Buffer Overflow Vulnerability
7043| [1065] Microsoft IIS UNC Path Disclosure Vulnerability
7044| [886] Microsoft IIS Escape Character Parsing Vulnerability
7045| [882] Microsoft IIS Virtual Directory Naming Vulnerability
7046| [658] Microsoft IIS FTP NO ACCESS Read/Delete File Vulnerability
7047| [657] Microsoft IIS 4.0 Domain Resolution Vulnerability
7048| [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
7049| [190] Microsoft VisualInterDev 6.0 - IIS4- Management With No Authentication Vulnerability
7050|
7051| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7052| [78620] Microsoft Windows Phone 7 domain name spoofing
7053| [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
7054| [29670] Microsoft Internet Explorer 7 is installed
7055| [76716] Microsoft IIS FTP denial of service
7056| [76664] Microsoft IIS tilde information disclosure
7057| [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
7058| [58864] Microsoft Internet Information Services (IIS) authentication code execution
7059| [55031] Microsoft Internet Information Services (IIS) filenames security bypass
7060| [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
7061| [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
7062| [52243] Microsoft IIS With .NET Path Disclosure
7063| [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
7064| [52240] Microsoft IIS Sample Application Physical Path Disclosure
7065| [52233] Microsoft IIS With .NET Path Disclosure
7066| [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
7067| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
7068| [42899] Microsoft IIS HTTP request smuggling
7069| [39235] Microsoft IIS root folders file change notification privilege escalation
7070| [39230] Microsoft IIS HTML encoded ASP code execution
7071| [34434] Microsoft IIS Hit-highlighting security bypass
7072| [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
7073| [32074] Microsoft IIS iissamples directory present
7074| [31644] Microsoft IIS Web server access.cnf file detected
7075| [31642] Microsoft IIS Web server service.cnf file detected
7076| [31638] Microsoft IIS Web server svcacl.cnf file detected
7077| [31630] Microsoft Internet Information Services IISAdmin directory detected
7078| [27854] Microsoft IIS ASP cache virtual server information disclosure
7079| [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
7080| [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
7081| [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
7082| [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
7083| [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
7084| [13116] Microsoft IIS MS03-018 patch is not installed on the system
7085| [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
7086| [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
7087| [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
7088| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
7089| [12100] Microsoft IIS long WebDAV requests containing XML denial of service
7090| [12099] Microsoft IIS Response.AddHeader denial of service
7091| [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
7092| [12097] Microsoft IIS redirect error cross-site scripting
7093| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
7094| [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
7095| [11537] Microsoft IIS WebDAV service is running on the system
7096| [11533] Microsoft IIS WebDAV long request buffer overflow
7097| [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
7098| [10504] Microsoft IIS script source access could be bypassed to upload .COM files
7099| [10503] Microsoft IIS WebDAV memory allocation denial of service
7100| [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
7101| [10501] Microsoft IIS administrative Web pages cross-site scripting
7102| [10370] Microsoft IIS HTTP HOST header denial of service
7103| [10294] Microsoft IIS .idc extension error message cross-site scripting
7104| [10184] Microsoft IIS 5.0 resource utilization denial of service
7105| [9791] Microsoft Exchange IIS license exhaustion denial of service
7106| [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
7107| [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
7108| [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
7109| [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
7110| [8811] Microsoft IIS MS02-018 patch is not installed on the system
7111| [8804] Microsoft IIS redirected URL error cross-site scripting
7112| [8803] Microsoft IIS HTTP error page cross-site scripting
7113| [8802] Microsoft IIS Help File search cross-site scripting
7114| [8801] Microsoft IIS FTP session status request denial of service
7115| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
7116| [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
7117| [8798] Microsoft IIS SSI safety check buffer overflow
7118| [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
7119| [8796] Microsoft IIS ASP data transfer heap buffer overflow
7120| [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
7121| [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
7122| [8385] Microsoft IIS specially-crafted request reveals IP address
7123| [8382] Microsoft IIS authentication error messages reveal configuration information
7124| [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
7125| [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
7126| [8056] Microsoft IIS is running on the system
7127| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
7128| [7691] Microsoft IIS HTTP GET request with false "
7129| [7640] Microsoft IIS is present on the system
7130| [7613] Microsoft IIS allows attackers to create fake log entries
7131| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
7132| [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
7133| [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
7134| [7202] Microsoft IIS 4.0/5.0 escaped percent found
7135| [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
7136| [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
7137| [6995] Microsoft IIS %u Unicode wide character encoding detected
7138| [6994] Microsoft IIS %u Unicode encoding detected
7139| [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
7140| [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
7141| [6983] Microsoft IIS invalid MIME header denial of service
7142| [6982] Microsoft IIS WebDAV long invalid request denial of service
7143| [6981] Microsoft IIS URL redirection denial of service
7144| [6963] Microsoft IIS HTTPS connection could reveal internal IP address
7145| [6858] Microsoft IIS cross-site scripting patch denial of service
7146| [6800] Microsoft IIS device file request can crash the ASP processor
7147| [6742] Microsoft IIS reveals .asp source code with Unicode extensions
7148| [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
7149| [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
7150| [6545] Microsoft IIS FTP weak domain authentication
7151| [6535] Microsoft IIS FTP wildcard processing function denial of service
7152| [6534] Microsoft IIS URL decoding error could allow remote code execution
7153| [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
7154| [6205] Microsoft IIS WebDAV denial of service
7155| [6171] Microsoft IIS and Exchange malformed URL request denial of service
7156| [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
7157| [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
7158| [5823] Microsoft IIS Web form submission denial of service
7159| [5729] Microsoft IIS Far East editions file disclosure
7160| [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
7161| [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
7162| [5441] Microsoft IIS .htw cross-site scripting
7163| [5377] Microsoft IIS Unicode translation error allows remote command execution
7164| [5335] Microsoft IIS Index Server directory traversal
7165| [5202] Microsoft IIS invalid URL allows attackers to crash service
7166| [5156] Microsoft IIS Cross-Site Scripting
7167| [5106] Microsoft IIS 4.0 discloses internal IP addresses
7168| [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
7169| [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
7170| [4960] Microsoft IIS on Win2kPro security button restriction
7171| [4951] Microsoft IIS absent directory browser argument
7172| [4790] Microsoft IIS \mailroot\pickup directory denial of service
7173| [4757] Microsoft IIS server-side includes (SSI) #exec directive
7174| [4558] Microsoft IIS is installed on a domain controller
7175| [4448] Microsoft IIS ISM.DLL could allow users to read file contents
7176| [4430] Microsoft IIS malformed URL extension data denial of service
7177| [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
7178| [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
7179| [4279] Microsoft IIS escape characters denial of service
7180| [4204] Microsoft IIS virtual UNC share source read
7181| [4183] Microsoft IIS could disclose path of network shares
7182| [4117] Microsoft IIS chunked encoding post or put denial of service
7183| [3986] Microsoft IIS ASP could be used to gain sensitive information
7184| [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
7185| [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
7186| [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
7187| [2675] Microsoft IIS 4.0 samples installation on Web server
7188| [2673] Microsoft IIS samples installation on Web server
7189| [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
7190| [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
7191| [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
7192| [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
7193| [2662] Microsoft IIS CGI overflow
7194| [2412] Microsoft IIS account is member of Domain Users
7195| [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
7196| [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
7197| [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
7198| [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
7199| [2229] Microsoft IIS ExAir sample site denial of service
7200| [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
7201| [1823] Microsoft IIS long GET request denial of service
7202| [1735] Microsoft IIS with Visual InterDev no authentication
7203| [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
7204| [1654] Microsoft IIS remote FTP buffer overflow
7205| [1638] Microsoft IIS crashes processing some GET commands
7206| [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
7207| [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
7208| [1273] Microsoft IIS special characters allowed in shell
7209| [1272] Microsoft IIS CGI scripts run as system
7210| [1271] Microsoft IIS version 2 installed
7211| [1270] Microsoft IIS incorrect permissions on restricted item
7212| [1269] Microsoft IIS incorrect Web permissions
7213| [1268] Microsoft IIS SSI #exec enabled
7214| [1216] Microsoft IIS SSL patch not applied
7215| [1215] Microsoft IIS Passive FTP patch not applied
7216| [1212] Microsoft IIS unauthorized ODBC data access with RDS
7217| [1125] Microsoft IIS ASP DATA issue could reveal source code
7218| [949] Microsoft IIS server script debugging enabled
7219| [948] Microsoft IIS samples installed on Web server
7220| [936] Microsoft IIS NTFS insecure permissions
7221| [935] Microsoft IIS executable paths
7222| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
7223| [336] Microsoft IIS ASP dot bug
7224| [256] Microsoft IIS can be remotely crashed by excessively long client requests
7225| [7] Microsoft IIS ASP source visible
7226|
7227| Exploit-DB - https://www.exploit-db.com:
7228| [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
7229| [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
7230|
7231| OpenVAS (Nessus) - http://www.openvas.org:
7232| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
7233| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
7234| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
7235| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
7236| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
7237| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
7238| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
7239| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
7240| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
7241| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
7242| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
7243| [100952] Microsoft IIS FTPd NLST stack overflow
7244| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
7245| [10680] Test Microsoft IIS Source Fragment Disclosure
7246| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
7247| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
7248| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
7249| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
7250| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
7251| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
7252| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
7253| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
7254| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
7255| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
7256| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
7257| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
7258| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
7259| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
7260| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
7261| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
7262| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
7263| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
7264| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
7265| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
7266| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
7267| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
7268| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
7269| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
7270| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
7271| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
7272| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
7273| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
7274| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
7275| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
7276| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
7277| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
7278| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
7279| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
7280| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
7281| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
7282| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
7283| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
7284| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
7285| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
7286| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
7287| [902798] Microsoft SMB Signing Enabled and Not Required At Server
7288| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
7289| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
7290| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
7291| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
7292| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
7293| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
7294| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
7295| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
7296| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
7297| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
7298| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
7299| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
7300| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
7301| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
7302| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
7303| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
7304| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
7305| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
7306| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
7307| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
7308| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
7309| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
7310| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
7311| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
7312| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
7313| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
7314| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
7315| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
7316| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
7317| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
7318| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
7319| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
7320| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
7321| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
7322| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
7323| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
7324| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
7325| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
7326| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
7327| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
7328| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
7329| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
7330| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
7331| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
7332| [902518] Microsoft .NET Framework Security Bypass Vulnerability
7333| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
7334| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
7335| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
7336| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
7337| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
7338| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
7339| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
7340| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
7341| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
7342| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
7343| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
7344| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
7345| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
7346| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
7347| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
7348| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
7349| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
7350| [902425] Microsoft Windows SMB Accessible Shares
7351| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
7352| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
7353| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
7354| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
7355| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
7356| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
7357| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
7358| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
7359| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
7360| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
7361| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
7362| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
7363| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
7364| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
7365| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
7366| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
7367| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
7368| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
7369| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
7370| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
7371| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
7372| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
7373| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
7374| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
7375| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
7376| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
7377| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
7378| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
7379| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
7380| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
7381| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
7382| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
7383| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
7384| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
7385| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
7386| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
7387| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
7388| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
7389| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
7390| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
7391| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
7392| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7393| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
7394| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
7395| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
7396| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
7397| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
7398| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
7399| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
7400| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
7401| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
7402| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
7403| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
7404| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
7405| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
7406| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
7407| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
7408| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
7409| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
7410| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
7411| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
7412| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
7413| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
7414| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
7415| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
7416| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
7417| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
7418| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
7419| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
7420| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
7421| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
7422| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
7423| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
7424| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
7425| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
7426| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
7427| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
7428| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
7429| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
7430| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
7431| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
7432| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
7433| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
7434| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
7435| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
7436| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
7437| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
7438| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
7439| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
7440| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
7441| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
7442| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
7443| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
7444| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
7445| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
7446| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
7447| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
7448| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
7449| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
7450| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
7451| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
7452| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
7453| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
7454| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
7455| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7456| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
7457| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
7458| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
7459| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
7460| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
7461| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
7462| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
7463| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
7464| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
7465| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
7466| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
7467| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
7468| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
7469| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
7470| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
7471| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
7472| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
7473| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
7474| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
7475| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
7476| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
7477| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7478| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
7479| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
7480| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
7481| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
7482| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
7483| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
7484| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
7485| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
7486| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
7487| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
7488| [900808] Microsoft Visual Products Version Detection
7489| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
7490| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
7491| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
7492| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
7493| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
7494| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
7495| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
7496| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
7497| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
7498| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
7499| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
7500| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
7501| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
7502| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
7503| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
7504| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
7505| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
7506| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
7507| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
7508| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
7509| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
7510| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
7511| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
7512| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
7513| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
7514| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
7515| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
7516| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
7517| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
7518| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
7519| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
7520| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
7521| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
7522| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
7523| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
7524| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
7525| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
7526| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
7527| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
7528| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
7529| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
7530| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
7531| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
7532| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
7533| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
7534| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
7535| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
7536| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
7537| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
7538| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
7539| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
7540| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
7541| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
7542| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
7543| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
7544| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
7545| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
7546| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
7547| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
7548| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
7549| [900173] Microsoft Windows Media Player Version Detection
7550| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
7551| [900170] Microsoft iExplorer '&NBSP
7552| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
7553| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
7554| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
7555| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
7556| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
7557| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
7558| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
7559| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
7560| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
7561| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
7562| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
7563| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
7564| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
7565| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
7566| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
7567| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
7568| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
7569| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
7570| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
7571| [900025] Microsoft Office Version Detection
7572| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
7573| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
7574| [855384] Solaris Update for snmp/mibiisa 108870-36
7575| [855273] Solaris Update for snmp/mibiisa 108869-36
7576| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
7577| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
7578| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
7579| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
7580| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
7581| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
7582| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
7583| [802726] Microsoft SMB Signing Disabled
7584| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
7585| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
7586| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
7587| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
7588| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
7589| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
7590| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
7591| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
7592| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
7593| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
7594| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
7595| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
7596| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
7597| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
7598| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
7599| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
7600| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
7601| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
7602| [801934] Microsoft Silverlight Version Detection
7603| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
7604| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
7605| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
7606| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
7607| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
7608| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
7609| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
7610| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
7611| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
7612| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
7613| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
7614| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
7615| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
7616| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
7617| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
7618| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
7619| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
7620| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
7621| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
7622| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
7623| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
7624| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
7625| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
7626| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
7627| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
7628| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
7629| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
7630| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
7631| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
7632| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
7633| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
7634| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
7635| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
7636| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
7637| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
7638| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
7639| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
7640| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
7641| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
7642| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
7643| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
7644| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
7645| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
7646| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
7647| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
7648| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
7649| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
7650| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
7651| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
7652| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
7653| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
7654| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
7655| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
7656| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
7657| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
7658| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
7659| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
7660| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
7661| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
7662| [800742] Microsoft Internet Explorer Unspecified vulnerability
7663| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
7664| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
7665| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
7666| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
7667| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
7668| [800504] Microsoft Windows XP SP3 denial of service vulnerability
7669| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
7670| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
7671| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
7672| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
7673| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
7674| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
7675| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
7676| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
7677| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
7678| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
7679| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
7680| [800331] Microsoft Windows Live Messenger Client Version Detection
7681| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
7682| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
7683| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
7684| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
7685| [800217] Microsoft Money Version Detection
7686| [800209] Microsoft Internet Explorer Version Detection (Win)
7687| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
7688| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
7689| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
7690| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
7691| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
7692| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
7693| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
7694| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
7695| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
7696| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
7697| [101017] Microsoft MS03-018 security check
7698| [101016] Microsoft MS03-022 security check
7699| [101015] Microsoft MS03-034 security check
7700| [101014] Microsoft MS00-078 security check
7701| [101012] Microsoft MS03-051 security check
7702| [101010] Microsoft Security Bulletin MS05-004
7703| [101009] Microsoft Security Bulletin MS06-033
7704| [101007] Microsoft dotNET version grabber
7705| [101006] Microsoft Security Bulletin MS06-056
7706| [101005] Microsoft Security Bulletin MS07-040
7707| [101004] Microsoft MS04-017 security check
7708| [101003] Microsoft MS00-058 security check
7709| [101000] Microsoft MS00-060 security check
7710| [100950] Microsoft DNS server internal hostname disclosure detection
7711| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
7712| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
7713| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
7714| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
7715| [100062] Microsoft Remote Desktop Protocol Detection
7716| [90024] Windows Vulnerability in Microsoft Jet Database Engine
7717| [80007] Microsoft MS00-06 security check
7718| [13752] Denial of Service (DoS) in Microsoft SMS Client
7719| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
7720| [11874] IIS Service Pack - 404
7721| [11808] Microsoft RPC Interface Buffer Overrun (823980)
7722| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
7723| [11217] Microsoft's SQL Version Query
7724| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
7725| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
7726| [11142] IIS XSS via IDC error
7727| [11067] Microsoft's SQL Hello Overflow
7728| [11003] IIS Possible Compromise
7729| [10993] IIS ASP.NET Application Trace Enabled
7730| [10991] IIS Global.asa Retrieval
7731| [10936] IIS XSS via 404 error
7732| [10862] Microsoft's SQL Server Brute Force
7733| [10755] Microsoft Exchange Public Folders Information Leak
7734| [10732] IIS 5.0 WebDav Memory Leakage
7735| [10699] IIS FrontPage DoS II
7736| [10695] IIS .IDA ISAPI filter applied
7737| [10674] Microsoft's SQL UDP Info Query
7738| [10673] Microsoft's SQL Blank Password
7739| [10671] IIS Remote Command Execution
7740| [10667] IIS 5.0 PROPFIND Vulnerability
7741| [10661] IIS 5 .printer ISAPI filter applied
7742| [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
7743| [10585] IIS FrontPage DoS
7744| [10576] Check for dangerous IIS default files
7745| [10575] Check for IIS .cnf file leakage
7746| [10573] IIS 5.0 Sample App reveals physical path of web root
7747| [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
7748| [10537] IIS directory traversal
7749| [10492] IIS IDA/IDQ Path Disclosure
7750| [10491] ASP/ASA source using Microsoft Translate f: bug
7751| [10144] Microsoft SQL TCP/IP listener is running
7752|
7753| SecurityTracker - https://www.securitytracker.com:
7754| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
7755| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
7756| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
7757| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
7758| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
7759| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
7760| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
7761| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
7762| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
7763| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
7764| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
7765| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
7766| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
7767| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
7768| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
7769| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
7770| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
7771| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
7772| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
7773| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
7774| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
7775| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
7776| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
7777| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
7778| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
7779| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
7780| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
7781| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
7782| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
7783| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
7784| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
7785| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
7786| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
7787| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
7788| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
7789| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
7790| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
7791| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
7792| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
7793| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
7794| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
7795| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
7796| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
7797| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
7798| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
7799| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
7800| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
7801| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
7802| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
7803| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
7804| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
7805| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
7806| [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7807| [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
7808| [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
7809| [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
7810| [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
7811| [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
7812| [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
7813| [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7814| [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7815| [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7816| [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7817| [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
7818| [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
7819| [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
7820| [1028560] Microsoft Visio Discloses Information to Remote Users
7821| [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
7822| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
7823| [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
7824| [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
7825| [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
7826| [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
7827| [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7828| [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
7829| [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
7830| [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
7831| [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
7832| [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
7833| [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
7834| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
7835| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
7836| [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7837| [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
7838| [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
7839| [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
7840| [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
7841| [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7842| [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
7843| [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
7844| [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
7845| [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
7846| [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7847| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
7848| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
7849| [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
7850| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
7851| [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
7852| [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
7853| [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
7854| [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
7855| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
7856| [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
7857| [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7858| [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
7859| [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
7860| [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7861| [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
7862| [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7863| [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7864| [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7865| [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7866| [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
7867| [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
7868| [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
7869| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
7870| [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
7871| [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
7872| [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
7873| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
7874| [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
7875| [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
7876| [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7877| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
7878| [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7879| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7880| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7881| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7882| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7883| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7884| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7885| [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
7886| [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
7887| [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
7888| [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
7889| [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
7890| [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
7891| [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
7892| [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
7893| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
7894| [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
7895| [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
7896| [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
7897| [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
7898| [1027114] Microsoft Windows Includes Some Invalid Certificates
7899| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
7900| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
7901| [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7902| [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
7903| [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
7904| [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
7905| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
7906| [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
7907| [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
7908| [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
7909| [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
7910| [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
7911| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7912| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7913| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7914| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7915| [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
7916| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7917| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
7918| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
7919| [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
7920| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
7921| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
7922| [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
7923| [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
7924| [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
7925| [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
7926| [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
7927| [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
7928| [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
7929| [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
7930| [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
7931| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
7932| [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
7933| [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
7934| [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
7935| [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
7936| [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
7937| [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
7938| [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
7939| [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
7940| [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
7941| [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
7942| [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7943| [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
7944| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
7945| [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
7946| [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
7947| [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
7948| [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
7949| [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
7950| [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
7951| [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
7952| [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
7953| [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
7954| [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
7955| [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
7956| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
7957| [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
7958| [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
7959| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
7960| [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7961| [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
7962| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
7963| [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
7964| [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
7965| [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
7966| [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
7967| [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
7968| [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
7969| [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
7970| [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
7971| [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
7972| [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
7973| [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
7974| [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
7975| [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
7976| [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
7977| [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
7978| [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
7979| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
7980| [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
7981| [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
7982| [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
7983| [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
7984| [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7985| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
7986| [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
7987| [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
7988| [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
7989| [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
7990| [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
7991| [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
7992| [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
7993| [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
7994| [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
7995| [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
7996| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
7997| [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
7998| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
7999| [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
8000| [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
8001| [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
8002| [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
8003| [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
8004| [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
8005| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
8006| [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
8007| [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
8008| [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
8009| [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
8010| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
8011| [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8012| [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
8013| [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
8014| [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
8015| [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8016| [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8017| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
8018| [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
8019| [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
8020| [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
8021| [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
8022| [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
8023| [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
8024| [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
8025| [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
8026| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
8027| [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
8028| [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
8029| [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
8030| [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
8031| [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
8032| [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
8033| [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
8034| [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
8035| [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
8036| [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
8037| [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
8038| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
8039| [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
8040| [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
8041| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8042| [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
8043| [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
8044| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
8045| [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
8046| [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
8047| [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
8048| [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
8049| [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
8050| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
8051| [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
8052| [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
8053| [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
8054| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
8055| [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
8056| [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
8057| [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
8058| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
8059| [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
8060| [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
8061| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
8062| [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
8063| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
8064| [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
8065| [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
8066| [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
8067| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8068| [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
8069| [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
8070| [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
8071| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
8072| [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
8073| [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
8074| [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
8075| [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
8076| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
8077| [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
8078| [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
8079| [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
8080| [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
8081| [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
8082| [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
8083| [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
8084| [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
8085| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
8086| [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
8087| [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
8088| [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
8089| [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
8090| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
8091| [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
8092| [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
8093| [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
8094| [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
8095| [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
8096| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
8097| [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
8098| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
8099| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
8100| [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
8101| [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
8102| [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
8103| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
8104| [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
8105| [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
8106| [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8107| [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
8108| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
8109| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
8110| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
8111| [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
8112| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
8113| [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
8114| [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
8115| [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
8116| [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
8117| [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
8118| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
8119| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
8120| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8121| [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
8122| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
8123| [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
8124| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
8125| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
8126| [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
8127| [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
8128| [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
8129| [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
8130| [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
8131| [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
8132| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
8133| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
8134| [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
8135| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
8136| [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
8137| [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
8138| [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
8139| [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
8140| [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8141| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
8142| [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
8143| [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
8144| [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
8145| [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
8146| [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
8147| [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
8148| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
8149| [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
8150| [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
8151| [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8152| [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
8153| [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8154| [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
8155| [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
8156| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
8157| [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
8158| [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
8159| [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
8160| [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
8161| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
8162| [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
8163| [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
8164| [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
8165| [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8166| [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
8167| [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8168| [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
8169| [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
8170| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
8171| [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
8172| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
8173| [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
8174| [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
8175| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
8176| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
8177| [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
8178| [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
8179| [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
8180| [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
8181| [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
8182| [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
8183| [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
8184| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
8185| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
8186| [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
8187| [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
8188| [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
8189| [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
8190| [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
8191| [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
8192| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
8193| [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
8194| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
8195| [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
8196| [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
8197| [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
8198| [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
8199| [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
8200| [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
8201| [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
8202| [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
8203| [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
8204| [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8205| [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
8206| [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
8207| [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
8208| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
8209| [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
8210| [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
8211| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
8212| [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
8213| [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
8214| [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
8215| [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
8216| [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
8217| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
8218| [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
8219| [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
8220| [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
8221| [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
8222| [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
8223| [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
8224| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
8225| [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
8226| [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
8227| [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
8228| [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
8229| [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
8230| [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
8231| [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
8232| [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
8233| [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
8234| [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
8235| [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
8236| [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
8237| [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
8238| [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
8239| [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
8240| [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
8241| [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
8242| [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
8243| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
8244| [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
8245| [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
8246| [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
8247| [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
8248| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
8249| [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8250| [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
8251| [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
8252| [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
8253| [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
8254| [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
8255| [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
8256| [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
8257| [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
8258| [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
8259| [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
8260| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
8261| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
8262| [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
8263| [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
8264| [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
8265| [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
8266| [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
8267| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
8268| [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
8269| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8270| [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
8271| [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
8272| [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
8273| [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
8274| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
8275| [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
8276| [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8277| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8278| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
8279| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
8280| [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
8281| [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
8282| [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8283| [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
8284| [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
8285| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
8286| [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8287| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
8288| [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
8289| [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
8290| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
8291| [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
8292| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
8293| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
8294| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
8295| [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
8296| [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
8297| [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
8298| [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
8299| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
8300| [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
8301| [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
8302| [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
8303| [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
8304| [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
8305| [1017752] Adobe JRun IIS Connector Bug Lets Remote Users Deny Service
8306| [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
8307| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
8308| [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
8309| [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
8310| [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8311| [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8312| [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8313| [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
8314| [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8315| [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8316| [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
8317| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
8318| [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
8319| [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
8320| [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
8321| [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
8322| [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
8323| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
8324| [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
8325| [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
8326| [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
8327| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
8328| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
8329| [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
8330| [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
8331| [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
8332| [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
8333| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
8334| [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
8335| [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
8336| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
8337| [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
8338| [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8339| [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
8340| [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
8341| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
8342| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
8343| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
8344| [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
8345| [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
8346| [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
8347| [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
8348| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
8349| [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
8350| [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
8351| [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
8352| [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
8353| [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8354| [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
8355| [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
8356| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
8357| [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
8358| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
8359| [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
8360| [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
8361| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
8362| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
8363| [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
8364| [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
8365| [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
8366| [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
8367| [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
8368| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
8369| [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
8370| [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
8371| [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
8372| [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
8373| [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
8374| [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
8375| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
8376| [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
8377| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
8378| [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
8379| [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
8380| [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
8381| [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
8382| [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
8383| [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
8384| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
8385| [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
8386| [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
8387| [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
8388| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
8389| [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8390| [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
8391| [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
8392| [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
8393| [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
8394| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
8395| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
8396| [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
8397| [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
8398| [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
8399| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
8400| [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
8401| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
8402| [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
8403| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
8404| [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
8405| [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
8406| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
8407| [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
8408| [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
8409| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
8410| [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
8411| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
8412| [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
8413| [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
8414| [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
8415| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8416| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
8417| [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
8418| [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
8419| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
8420| [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
8421| [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
8422| [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
8423| [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
8424| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
8425| [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
8426| [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
8427| [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
8428| [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
8429| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
8430| [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
8431| [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
8432| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
8433| [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
8434| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
8435| [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
8436| [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
8437| [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
8438| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
8439| [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
8440| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
8441| [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
8442| [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
8443| [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
8444| [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
8445| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
8446| [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
8447| [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
8448| [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
8449| [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
8450| [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
8451| [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
8452| [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
8453| [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
8454| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
8455| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
8456| [1014501] Hosting Controller 'IISActions.asp' Script Lets Remote Authenticated Users Add Domains/Subdomains
8457| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
8458| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
8459| [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
8460| [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
8461| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
8462| [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
8463| [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
8464| [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
8465| [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
8466| [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
8467| [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
8468| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
8469| [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
8470| [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
8471| [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
8472| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
8473| [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
8474| [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
8475| [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
8476| [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
8477| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
8478| [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
8479| [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
8480| [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
8481| [1013724] RSA Authentication Agent for Web for IIS Input Validation Bug Lets Remote Users Conduct Cross-Site Scripting Attacks
8482| [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
8483| [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
8484| [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
8485| [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
8486| [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
8487| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
8488| [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
8489| [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
8490| [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
8491| [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
8492| [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
8493| [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
8494| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
8495| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
8496| [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
8497| [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
8498| [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
8499| [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
8500| [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
8501| [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
8502| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
8503| [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
8504| [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
8505| [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
8506| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
8507| [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
8508| [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
8509| [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
8510| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
8511| [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
8512| [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
8513| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
8514| [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
8515| [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
8516| [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
8517| [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
8518| [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
8519| [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
8520| [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
8521| [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
8522| [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
8523| [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
8524| [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
8525| [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
8526| [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
8527| [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
8528| [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
8529| [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
8530| [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
8531| [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
8532| [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
8533| [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
8534| [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
8535| [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
8536| [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
8537| [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
8538| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
8539| [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
8540| [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
8541| [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
8542| [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
8543| [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
8544| [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
8545| [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
8546| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
8547| [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
8548| [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
8549| [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
8550| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
8551| [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
8552| [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
8553| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
8554| [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
8555| [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
8556| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
8557| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
8558| [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
8559| [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
8560| [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
8561| [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
8562| [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
8563| [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
8564| [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
8565| [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8566| [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8567| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8568| [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
8569| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
8570| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
8571| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
8572| [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
8573| [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
8574| [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
8575| [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
8576| [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
8577| [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
8578| [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
8579| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
8580| [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
8581| [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
8582| [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
8583| [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
8584| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
8585| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
8586| [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
8587| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
8588| [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
8589| [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
8590| [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
8591| [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
8592| [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
8593| [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
8594| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
8595| [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
8596| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
8597| [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
8598| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
8599| [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
8600| [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
8601| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
8602| [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
8603| [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
8604| [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
8605| [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
8606| [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
8607| [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
8608| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
8609| [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
8610| [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
8611| [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
8612| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
8613| [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
8614| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
8615| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
8616| [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
8617| [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
8618| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
8619| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
8620| [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
8621| [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
8622| [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
8623| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
8624| [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
8625| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
8626| [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
8627| [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
8628| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
8629| [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
8630| [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
8631| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
8632| [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
8633| [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
8634| [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
8635| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
8636| [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
8637| [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
8638| [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
8639| [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
8640| [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
8641| [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
8642| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
8643| [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
8644| [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
8645| [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
8646| [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
8647| [1008586] Microsoft Office Security Features Can Be Bypassed
8648| [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
8649| [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
8650| [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
8651| [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
8652| [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
8653| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
8654| [1008425] Microsoft IE Does Not Properly Display Some URLs
8655| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
8656| [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
8657| [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
8658| [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
8659| [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
8660| [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
8661| [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
8662| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
8663| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
8664| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
8665| [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
8666| [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
8667| [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
8668| [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
8669| [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
8670| [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
8671| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
8672| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
8673| [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
8674| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
8675| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
8676| [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
8677| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
8678| [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
8679| [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
8680| [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
8681| [1007651] RealSecure Server Sensor Unicode Flaw Lets Remote Users Crash the IIS Web Service
8682| [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
8683| [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8684| [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
8685| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
8686| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
8687| [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
8688| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
8689| [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
8690| [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
8691| [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
8692| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
8693| [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
8694| [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
8695| [1007364] IISShield May Fail to Drop a Specific Malformed HTTP Request
8696| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
8697| [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
8698| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
8699| [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
8700| [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
8701| [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
8702| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
8703| [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
8704| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
8705| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
8706| [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
8707| [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
8708| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
8709| [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8710| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
8711| [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
8712| [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
8713| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
8714| [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
8715| [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
8716| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
8717| [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
8718| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
8719| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
8720| [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
8721| [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
8722| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
8723| [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
8724| [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
8725| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
8726| [1006894] iisCART2000 Upload Authentication Error Lets Remote Users Upload and Execute Arbitrary Scripts
8727| [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
8728| [1006829] iisPROTECT Input Validation Hole Lets Remote Users Execute SQL Stored Procedures
8729| [1006815] iisPROTECT Lets Remote Users Access Protected Files Using URL Encoding
8730| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
8731| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
8732| [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
8733| [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
8734| [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
8735| [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
8736| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
8737| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
8738| [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
8739| [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
8740| [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
8741| [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
8742| [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
8743| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
8744| [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
8745| [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
8746| [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
8747| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
8748| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
8749| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
8750| [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
8751| [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
8752| [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
8753| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
8754| [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
8755| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
8756| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
8757| [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
8758| [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
8759| [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
8760| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
8761| [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
8762| [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
8763| [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
8764| [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
8765| [1006023] ColdFusion MX Configuration Error When Used With IIS and NT Authentication May Grant Unauthorized Access to Remote Authenticated Users
8766| [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
8767| [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
8768| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
8769| [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
8770| [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
8771| [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
8772| [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
8773| [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
8774| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
8775| [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
8776| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
8777| [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
8778| [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
8779| [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
8780| [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
8781| [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
8782| [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
8783| [1005627] IISPop EMail Server Can Be Crashed By Remote Users
8784| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
8785| [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
8786| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
8787| [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
8788| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
8789| [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
8790| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
8791| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
8792| [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
8793| [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
8794| [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
8795| [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
8796| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
8797| [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
8798| [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
8799| [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
8800| [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
8801| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
8802| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
8803| [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
8804| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
8805| [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
8806| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
8807| [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
8808| [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
8809| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
8810| [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
8811| [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
8812| [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
8813| [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
8814| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
8815| [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
8816| [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
8817| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
8818| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
8819| [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
8820| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
8821| [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
8822| [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
8823| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
8824| [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
8825| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
8826| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
8827| [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
8828| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
8829| [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
8830| [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
8831| [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
8832| [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
8833| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
8834| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
8835| [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
8836| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
8837| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
8838| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
8839| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
8840| [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
8841| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
8842| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
8843| [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
8844| [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
8845| [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
8846| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
8847| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
8848| [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
8849| [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
8850| [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
8851| [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
8852| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
8853| [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
8854| [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
8855| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
8856| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
8857| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
8858| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
8859| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
8860| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
8861| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
8862| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
8863| [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
8864| [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
8865| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
8866| [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
8867| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
8868| [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
8869| [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
8870| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
8871| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
8872| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
8873| [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
8874| [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
8875| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
8876| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8877| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8878| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
8879| [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
8880| [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
8881| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
8882| [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
8883| [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
8884| [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
8885| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
8886| [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
8887| [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
8888| [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
8889| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
8890| [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
8891| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
8892| [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
8893| [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
8894| [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
8895| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
8896| [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
8897| [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
8898| [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
8899| [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
8900| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
8901| [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
8902| [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
8903| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
8904| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
8905| [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
8906| [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
8907| [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
8908| [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
8909| [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
8910| [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
8911| [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
8912| [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
8913| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
8914| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
8915| [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
8916| [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
8917| [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
8918| [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
8919| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
8920| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
8921| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
8922| [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
8923| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
8924| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
8925| [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
8926| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
8927| [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
8928| [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
8929| [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
8930| [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
8931| [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
8932| [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
8933| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
8934| [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
8935| [1003538] NetWin CWMail Web-Mail Server Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With the Privileges of the IIS Web Server
8936| [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
8937| [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
8938| [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
8939| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
8940| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
8941| [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
8942| [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
8943| [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
8944| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
8945| [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
8946| [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
8947| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
8948| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
8949| [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
8950| [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
8951| [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
8952| [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
8953| [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
8954| [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
8955| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
8956| [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
8957| [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
8958| [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
8959| [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
8960| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
8961| [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
8962| [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
8963| [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
8964| [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
8965| [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
8966| [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
8967| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
8968| [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
8969| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
8970| [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
8971| [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
8972| [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
8973| [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
8974| [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
8975| [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
8976| [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
8977| [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
8978| [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
8979| [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
8980| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
8981| [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
8982| [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
8983| [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
8984| [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
8985| [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
8986| [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
8987| [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
8988| [1002773] Titan Application Firewall for IIS Web Server Fails to Decode URLs, Letting Remote Users Bypass URL-based Firewall Restrictions
8989| [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
8990| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
8991| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
8992| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
8993| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
8994| [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
8995| [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
8996| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
8997| [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
8998| [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
8999| [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
9000| [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
9001| [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
9002| [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
9003| [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
9004| [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
9005| [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
9006| [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
9007| [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
9008| [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
9009| [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
9010| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
9011| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
9012| [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
9013| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
9014| [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
9015| [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
9016| [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
9017| [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
9018| [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
9019| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
9020| [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
9021| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
9022| [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
9023| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
9024| [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
9025| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
9026| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
9027| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
9028| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
9029| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
9030| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
9031| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
9032| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
9033| [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
9034| [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
9035| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
9036| [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
9037| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
9038| [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
9039| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
9040| [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
9041| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
9042| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
9043| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
9044| [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
9045| [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
9046| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
9047| [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
9048| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
9049| [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
9050| [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
9051| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
9052| [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
9053| [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
9054| [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
9055| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
9056| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
9057| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
9058| [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
9059| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
9060| [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
9061| [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
9062| [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
9063| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
9064| [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
9065| [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
9066| [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
9067| [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
9068| [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
9069| [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
9070| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
9071| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
9072| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
9073| [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
9074| [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
9075| [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
9076| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
9077| [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
9078| [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
9079| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
9080| [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
9081| [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
9082| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
9083| [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
9084| [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
9085| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
9086| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
9087| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
9088|
9089| OSVDB - http://www.osvdb.org:
9090| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
9091| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
9092| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
9093| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
9094| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
9095| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
9096| [87262] Microsoft IIS FTP Command Injection Information Disclosure
9097| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
9098| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
9099| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
9100| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
9101| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
9102| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
9103| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
9104| [71856] Microsoft IIS Status Header Handling Remote Overflow
9105| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
9106| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
9107| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
9108| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
9109| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
9110| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
9111| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
9112| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
9113| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
9114| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
9115| [59892] Microsoft IIS Malformed Host Header Remote DoS
9116| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
9117| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
9118| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
9119| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
9120| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
9121| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
9122| [55269] Microsoft IIS Traversal GET Request Remote DoS
9123| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
9124| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
9125| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
9126| [52238] Microsoft IIS IDC Extension XSS
9127| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
9128| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
9129| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
9130| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
9131| [43451] Microsoft IIS HTTP Request Smuggling
9132| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
9133| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
9134| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
9135| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
9136| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
9137| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
9138| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
9139| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
9140| [27152] Microsoft Windows IIS ASP Page Processing Overflow
9141| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
9142| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
9143| [21805] Microsoft IIS Crafted URL Remote DoS
9144| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
9145| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
9146| [17124] Microsoft IIS Malformed WebDAV Request DoS
9147| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
9148| [17122] Microsoft IIS Permission Weakness .COM File Upload
9149| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
9150| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
9151| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
9152| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
9153| [13760] Microsoft IIS Malformed URL Request DoS
9154| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
9155| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
9156| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
9157| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
9158| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
9159| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
9160| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
9161| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
9162| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
9163| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
9164| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
9165| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
9166| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
9167| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
9168| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
9169| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
9170| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
9171| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
9172| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
9173| [11257] Microsoft IIS Malformed GET Request DoS
9174| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
9175| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
9176| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
9177| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
9178| [9200] Microsoft IIS Unspecified XSS Variant
9179| [9199] Microsoft IIS shtml.dll XSS
9180| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
9181| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
9182| [7737] Microsoft IIS ASP Redirection Function XSS
9183| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
9184| [5851] Microsoft IIS Single Dot Source Code Disclosure
9185| [5736] Microsoft IIS Relative Path System Privilege Escalation
9186| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
9187| [5633] Microsoft IIS Invalid WebDAV Request DoS
9188| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
9189| [5584] Microsoft IIS URL Redirection Malformed Length DoS
9190| [5566] Microsoft IIS Form_VBScript.asp XSS
9191| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
9192| [4864] Microsoft IIS TRACK Logging Failure
9193| [4863] Microsoft IIS Active Server Page Header DoS
9194| [4791] Microsoft IIS Response Object DoS
9195| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
9196| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
9197| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
9198| [3500] Microsoft IIS fpcount.exe Remote Overflow
9199| [3341] Microsoft IIS Redirect Response XSS
9200| [3339] Microsoft IIS HTTP Error Page XSS
9201| [3338] Microsoft IIS Help File XSS
9202| [3328] Microsoft IIS FTP Status Request DoS
9203| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
9204| [3325] Microsoft IIS HTR ISAPI Overflow
9205| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
9206| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
9207| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
9208| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
9209| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
9210| [3231] Microsoft IIS Log Bypass
9211| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
9212| [1931] Microsoft IIS MIME Content-Type Header DoS
9213| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
9214| [1826] Microsoft IIS Domain Guest Account Disclosure
9215| [1824] Microsoft IIS FTP DoS
9216| [1804] Microsoft IIS Long Request Parsing Remote DoS
9217| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
9218| [1750] Microsoft IIS File Fragment Disclosure
9219| [1543] Microsoft NT/IIS Invalid URL Request DoS
9220| [1504] Microsoft IIS File Permission Canonicalization Bypass
9221| [1465] Microsoft IIS .htr Missing Variable DoS
9222| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
9223| [1322] Microsoft IIS Malformed .htr Request DoS
9224| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
9225| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
9226| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
9227| [1170] Microsoft IIS Escape Character URL Access Bypass
9228| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
9229| [1082] Microsoft IIS Domain Resolution Access Bypass
9230| [1041] Microsoft IIS Malformed HTTP Request Header DoS
9231| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
9232| [930] Microsoft IIS Shared ASP Cache Information Disclosure
9233| [929] Microsoft IIS FTP Server NLST Command Overflow
9234| [928] Microsoft IIS Long Request Log Evasion
9235| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
9236| [814] Microsoft IIS global.asa Remote Information Disclosure
9237| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
9238| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
9239| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
9240| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
9241| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
9242| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
9243| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
9244| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
9245| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
9246| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
9247| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
9248| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
9249| [473] Microsoft IIS Multiple .cnf File Information Disclosure
9250| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
9251| [470] Microsoft IIS Form_JScript.asp XSS
9252| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
9253| [436] Microsoft IIS Unicode Remote Command Execution
9254| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
9255| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
9256| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
9257| [308] Microsoft IIS Malformed File Extension URL DoS
9258| [285] Microsoft IIS repost.asp File Upload
9259| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
9260| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
9261| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
9262| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
9263| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
9264| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
9265| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
9266| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
9267| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
9268| [98] Microsoft IIS perl.exe HTTP Path Disclosure
9269| [97] Microsoft IIS ISM.DLL HTR Request Overflow
9270| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
9271| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
9272| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
9273| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
9274| [2] Microsoft IIS ExAir search.asp Direct Request DoS
9275|_
9276443/tcp open ssl/http Microsoft IIS httpd 7.5
9277| vulscan: VulDB - https://vuldb.com:
9278| [68404] Microsoft IIS 7.5 Error Message mypage cross site scripting
9279| [6924] Microsoft IIS 7.5 Log File Permission information disclosure
9280| [5623] Microsoft IIS up to 7.5 File Name Tilde privilege escalation
9281| [4234] Microsoft IIS 7.5 FTP Server Telnet IAC Character Heap-based denial of service
9282| [4179] Microsoft IIS 7.5 FastCGI Request Header memory corruption
9283| [98097] Microsoft IIS 7.0/7.5/8.0/8.5/10 /uncpath/ cross site scripting
9284| [6925] Microsoft IIS 7.0/7.5 FTP Command information disclosure
9285| [4484] Microsoft Windows Phone 7.5 SMS Service denial of service
9286|
9287| MITRE CVE - https://cve.mitre.org:
9288| [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
9289| [CVE-2012-2531] Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka "Password Disclosure Vulnerability."
9290| [CVE-2010-3972] Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
9291| [CVE-2010-2730] Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
9292| [CVE-2010-1899] Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
9293| [CVE-2010-1256] Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
9294| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
9295| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
9296| [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
9297| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
9298| [CVE-2009-2521] Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
9299| [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
9300| [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
9301| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
9302| [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
9303| [CVE-2007-1278] Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root.
9304| [CVE-2006-5858] Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.
9305| [CVE-2006-5028] Directory traversal vulnerability in filemanager/filemanager.php in SWsoft Plesk 7.5 Reload and Plesk 7.6 for Microsoft Windows allows remote attackers to list arbitrary directories via a ../ (dot dot slash) in the file parameter in a chdir action.
9306| [CVE-2006-0363] The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE.
9307|
9308| SecurityFocus - https://www.securityfocus.com/bid/:
9309| [55569] Microsoft Windows Phone 7 SSL Certificate 'Common Name' Validation Security Bypass Vulnerability
9310| [28820] Microsoft Works 7 'WkImgSrv.dll' ActiveX Control Remote Code Execution Vulnerability
9311| [28498] Microsoft Internet Explorer 7 Popup Window Address Bar URI Spoofing Vulnerability
9312| [24483] Microsoft Internet Explorer 7 HTTP Authentication International Domain Name Spoofing Weakness
9313| [20728] Microsoft Internet Explorer 7 Popup Window Address Bar Spoofing Weakness
9314| [18736] Microsoft Internet Explorer 7 Denial of Service Vulnerability
9315| [5877] Microsoft SQL Server 7.0/2000 DBCC Buffer Overflow Vulnerability
9316| [4108] Microsoft Visual C++ 7/Visual C++.Net Buffer Overflow Protection Weakness
9317| [1714] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
9318| [1444] Microsoft SQL Server 7.0 Stored Procedure Vulnerability
9319| [1281] Microsoft SQL Server 7.0 System Administrator Password Disclosure Vulnerability
9320| [817] Microsoft SQL Server 7.0 NULL Data DoS Vulnerability
9321| [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
9322| [86059] Microsoft IIS CVE-1999-0561 Remote Security Vulnerability
9323| [56440] Microsoft IIS FTP Service CVE-2012-2532 Remote Command Injection Vulnerability
9324| [56439] Microsoft IIS CVE-2012-2531 Password Information Disclosure Vulnerability
9325| [54276] Microsoft IIS Multiple FTP Command Request Denial of Service Vulnerability
9326| [54251] Microsoft IIS File Enumeration Weakness
9327| [53906] Microsoft IIS Authentication Bypass and Source Code Disclosure Vulnerabilities
9328| [45542] Microsoft IIS FTP Service Remote Buffer Overflow Vulnerability
9329| [43140] Microsoft IIS Repeated Parameter Request Denial of Service Vulnerability
9330| [43138] Microsoft IIS Request Header Buffer Overflow Vulnerability
9331| [41314] Microsoft IIS 5.1 Alternate Data Stream Authentication Bypass Vulnerability
9332| [40573] Microsoft IIS Authentication Remote Code Execution Vulnerability
9333| [37460] RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability
9334| [36276] RETIRED: Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
9335| [36273] Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
9336| [36189] Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability
9337| [35232] Microsoft IIS 5.0 WebDAV Authentication Bypass Vulnerability
9338| [34993] Microsoft IIS Unicode Requests to WebDAV Multiple Authentication Bypass Vulnerabilities
9339| [33374] Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
9340| [27101] Microsoft IIS File Change Notification Local Privilege Escalation Vulnerability
9341| [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
9342| [18858] Microsoft IIS ASP Remote Code Execution Vulnerability
9343| [14764] Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
9344| [10706] Microsoft IIS 4 Redirect Remote Buffer Overflow Vulnerability
9345| [9660] Microsoft IIS Unspecified Remote Denial Of Service Vulnerability
9346| [9313] Microsoft IIS Failure To Log Undocumented TRACK Requests Vulnerability
9347| [8244] Microsoft Multiple IIS 6.0 Web Admin Vulnerabilities
9348| [8092] Microsoft IIS _VTI_BOT Malicious WebBot Elevated Permissions Vulnerability
9349| [8035] Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability
9350| [7735] Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
9351| [7734] Microsoft IIS SSINC.DLL Server Side Includes Buffer Overflow Vulnerability
9352| [7733] Microsoft IIS ASP Header Denial Of Service Vulnerability
9353| [7731] Microsoft IIS Redirection Error Page Cross-Site Scripting Vulnerability
9354| [7492] Microsoft IIS User Existence Disclosure Vulnerability
9355| [6795] Microsoft IIS False Logging Weakness
9356| [6789] Microsoft IIS Malformed HTTP Get Request Denial Of Service Vulnerability
9357| [6072] Microsoft IIS Administrative Pages Cross Site Scripting Vulnerabilities
9358| [6071] Microsoft IIS Script Source Access File Upload Vulnerability
9359| [6070] Microsoft IIS WebDAV Denial Of Service Vulnerability
9360| [6069] Microsoft IIS Out Of Process Privilege Escalation Vulnerability
9361| [6068] Multiple Microsoft IIS Vulnerabilities
9362| [5907] Microsoft IIS Malformed HTTP HOST Header Field Denial Of Service Vulnerability
9363| [5900] Microsoft IIS IDC Extension Cross Site Scripting Vulnerability
9364| [5213] Microsoft IIS SMTP Service Encapsulated SMTP Address Vulnerability
9365| [4855] Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability
9366| [4846] Microsoft IIS 5.0 Denial Of Service Vulnerability
9367| [4543] Microsoft IIS CodeBrws.ASP File Extension Check Out By One Vulnerability
9368| [4525] Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability
9369| [4490] Microsoft IIS Chunked Encoding Heap Overflow Variant Vulnerability
9370| [4487] Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability
9371| [4486] Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability
9372| [4485] Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability
9373| [4483] Microsoft IIS Help File Search Cross Site Scripting Vulnerability
9374| [4482] Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
9375| [4479] Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability
9376| [4478] Microsoft IIS ASP Server-Side Include Buffer Overflow Vulnerability
9377| [4476] Microsoft IIS HTTP Header Field Delimiter Buffer Overflow Vulnerability
9378| [4474] Microsoft IIS HTR ISAPI Extension Buffer Overflow Vulnerability
9379| [4235] Microsoft IIS Authentication Method Disclosure Vulnerability
9380| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
9381| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
9382| [3667] Microsoft IIS False Content-Length Field DoS Vulnerability
9383| [3195] Microsoft IIS MIME Header Denial of Service Vulnerability
9384| [3194] Microsoft IIS WebDAV Invalid Request Denial of Service Vulnerability
9385| [3193] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
9386| [3191] Microsoft IIS 4.0 URL Redirection DoS Vulnerability
9387| [3190] Microsoft IIS SSI Buffer Overrun Privelege Elevation Vulnerability
9388| [2977] Microsoft IIS Device File Remote DoS Vulnerability
9389| [2973] Microsoft IIS Device File Local DoS Vulnerability
9390| [2909] Microsoft IIS Unicode .asp Source Code Disclosure Vulnerability
9391| [2719] Microsoft IIS Various Domain User Account Access Vulnerability
9392| [2717] Microsoft IIS FTP Denial of Service Vulnerability
9393| [2690] Microsoft IIS WebDAV 'Propfind' Server Restart Vulnerability
9394| [2674] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
9395| [2654] Microsoft IIS Long URL Denial of Service Vulnerability
9396| [2483] Microsoft IIS WebDAV 'Search' Denial of Service Vulnerability
9397| [2453] Microsoft IIS WebDAV Denial of Service Vulnerability
9398| [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
9399| [2440] Microsoft IIS Multiple Invalid URL Request DoS Vulnerability
9400| [2313] Microsoft IIS File Fragment Disclosure Vulnerability
9401| [2280] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
9402| [2218] Microsoft IIS '../..' Denial of Service Vulnerability
9403| [2144] Microsoft IIS Front Page Server Extension DoS Vulnerability
9404| [2110] Microsoft IIS 4.0 IISADMPWD Proxied Password Attack
9405| [2100] Microsoft IIS Far East Edition DBCS File Disclosure Vulnerability
9406| [2074] Microsoft IIS Appended Dot Script Source Disclosure Vulnerability
9407| [1912] Microsoft IIS Executable File Parsing Vulnerability
9408| [1911] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
9409| [1832] Microsoft IIS 4.0/5.0 Session ID Cookie Disclosure Vulnerability
9410| [1819] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
9411| [1818] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
9412| [1814] Microsoft IIS 3.0 %2e ASP Source Disclosure Vulnerability
9413| [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
9414| [1806] Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability
9415| [1756] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
9416| [1642] Microsoft NT 4.0 and IIS 4.0 Invalid URL Request DoS Vulnerability
9417| [1595] Microsoft IIS Cross Site Scripting .shtml Vulnerability
9418| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
9419| [1578] Microsoft IIS 5.0 Translate: f Source Disclosure Vulnerability
9420| [1565] Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability
9421| [1499] Microsoft IIS Internal IP Address Disclosure Vulnerability
9422| [1488] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
9423| [1476] Microsoft IIS 3.0 .htr Missing Variable Denial of Service Vulnerability
9424| [1193] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
9425| [1191] Microsoft IIS 4.0/5.0 Malformed .htr Request Vulnerability
9426| [1190] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
9427| [1101] Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability
9428| [1081] Microsoft IIS UNC Mapped Virtual Host Vulnerability
9429| [1066] Microsoft IIS 4.0 Chunked Transfer Encoding Buffer Overflow Vulnerability
9430| [1065] Microsoft IIS UNC Path Disclosure Vulnerability
9431| [886] Microsoft IIS Escape Character Parsing Vulnerability
9432| [882] Microsoft IIS Virtual Directory Naming Vulnerability
9433| [658] Microsoft IIS FTP NO ACCESS Read/Delete File Vulnerability
9434| [657] Microsoft IIS 4.0 Domain Resolution Vulnerability
9435| [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
9436| [190] Microsoft VisualInterDev 6.0 - IIS4- Management With No Authentication Vulnerability
9437|
9438| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9439| [78620] Microsoft Windows Phone 7 domain name spoofing
9440| [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
9441| [29670] Microsoft Internet Explorer 7 is installed
9442| [76716] Microsoft IIS FTP denial of service
9443| [76664] Microsoft IIS tilde information disclosure
9444| [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
9445| [58864] Microsoft Internet Information Services (IIS) authentication code execution
9446| [55031] Microsoft Internet Information Services (IIS) filenames security bypass
9447| [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
9448| [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
9449| [52243] Microsoft IIS With .NET Path Disclosure
9450| [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
9451| [52240] Microsoft IIS Sample Application Physical Path Disclosure
9452| [52233] Microsoft IIS With .NET Path Disclosure
9453| [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
9454| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
9455| [42899] Microsoft IIS HTTP request smuggling
9456| [39235] Microsoft IIS root folders file change notification privilege escalation
9457| [39230] Microsoft IIS HTML encoded ASP code execution
9458| [34434] Microsoft IIS Hit-highlighting security bypass
9459| [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
9460| [32074] Microsoft IIS iissamples directory present
9461| [31644] Microsoft IIS Web server access.cnf file detected
9462| [31642] Microsoft IIS Web server service.cnf file detected
9463| [31638] Microsoft IIS Web server svcacl.cnf file detected
9464| [31630] Microsoft Internet Information Services IISAdmin directory detected
9465| [27854] Microsoft IIS ASP cache virtual server information disclosure
9466| [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
9467| [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
9468| [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
9469| [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
9470| [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
9471| [13116] Microsoft IIS MS03-018 patch is not installed on the system
9472| [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
9473| [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
9474| [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
9475| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
9476| [12100] Microsoft IIS long WebDAV requests containing XML denial of service
9477| [12099] Microsoft IIS Response.AddHeader denial of service
9478| [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
9479| [12097] Microsoft IIS redirect error cross-site scripting
9480| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
9481| [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
9482| [11537] Microsoft IIS WebDAV service is running on the system
9483| [11533] Microsoft IIS WebDAV long request buffer overflow
9484| [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
9485| [10504] Microsoft IIS script source access could be bypassed to upload .COM files
9486| [10503] Microsoft IIS WebDAV memory allocation denial of service
9487| [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
9488| [10501] Microsoft IIS administrative Web pages cross-site scripting
9489| [10370] Microsoft IIS HTTP HOST header denial of service
9490| [10294] Microsoft IIS .idc extension error message cross-site scripting
9491| [10184] Microsoft IIS 5.0 resource utilization denial of service
9492| [9791] Microsoft Exchange IIS license exhaustion denial of service
9493| [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
9494| [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
9495| [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
9496| [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
9497| [8811] Microsoft IIS MS02-018 patch is not installed on the system
9498| [8804] Microsoft IIS redirected URL error cross-site scripting
9499| [8803] Microsoft IIS HTTP error page cross-site scripting
9500| [8802] Microsoft IIS Help File search cross-site scripting
9501| [8801] Microsoft IIS FTP session status request denial of service
9502| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
9503| [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
9504| [8798] Microsoft IIS SSI safety check buffer overflow
9505| [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
9506| [8796] Microsoft IIS ASP data transfer heap buffer overflow
9507| [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
9508| [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
9509| [8385] Microsoft IIS specially-crafted request reveals IP address
9510| [8382] Microsoft IIS authentication error messages reveal configuration information
9511| [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
9512| [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
9513| [8056] Microsoft IIS is running on the system
9514| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
9515| [7691] Microsoft IIS HTTP GET request with false "
9516| [7640] Microsoft IIS is present on the system
9517| [7613] Microsoft IIS allows attackers to create fake log entries
9518| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
9519| [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
9520| [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
9521| [7202] Microsoft IIS 4.0/5.0 escaped percent found
9522| [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
9523| [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
9524| [6995] Microsoft IIS %u Unicode wide character encoding detected
9525| [6994] Microsoft IIS %u Unicode encoding detected
9526| [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
9527| [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
9528| [6983] Microsoft IIS invalid MIME header denial of service
9529| [6982] Microsoft IIS WebDAV long invalid request denial of service
9530| [6981] Microsoft IIS URL redirection denial of service
9531| [6963] Microsoft IIS HTTPS connection could reveal internal IP address
9532| [6858] Microsoft IIS cross-site scripting patch denial of service
9533| [6800] Microsoft IIS device file request can crash the ASP processor
9534| [6742] Microsoft IIS reveals .asp source code with Unicode extensions
9535| [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
9536| [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
9537| [6545] Microsoft IIS FTP weak domain authentication
9538| [6535] Microsoft IIS FTP wildcard processing function denial of service
9539| [6534] Microsoft IIS URL decoding error could allow remote code execution
9540| [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
9541| [6205] Microsoft IIS WebDAV denial of service
9542| [6171] Microsoft IIS and Exchange malformed URL request denial of service
9543| [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
9544| [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
9545| [5823] Microsoft IIS Web form submission denial of service
9546| [5729] Microsoft IIS Far East editions file disclosure
9547| [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
9548| [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
9549| [5441] Microsoft IIS .htw cross-site scripting
9550| [5377] Microsoft IIS Unicode translation error allows remote command execution
9551| [5335] Microsoft IIS Index Server directory traversal
9552| [5202] Microsoft IIS invalid URL allows attackers to crash service
9553| [5156] Microsoft IIS Cross-Site Scripting
9554| [5106] Microsoft IIS 4.0 discloses internal IP addresses
9555| [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
9556| [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
9557| [4960] Microsoft IIS on Win2kPro security button restriction
9558| [4951] Microsoft IIS absent directory browser argument
9559| [4790] Microsoft IIS \mailroot\pickup directory denial of service
9560| [4757] Microsoft IIS server-side includes (SSI) #exec directive
9561| [4558] Microsoft IIS is installed on a domain controller
9562| [4448] Microsoft IIS ISM.DLL could allow users to read file contents
9563| [4430] Microsoft IIS malformed URL extension data denial of service
9564| [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
9565| [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
9566| [4279] Microsoft IIS escape characters denial of service
9567| [4204] Microsoft IIS virtual UNC share source read
9568| [4183] Microsoft IIS could disclose path of network shares
9569| [4117] Microsoft IIS chunked encoding post or put denial of service
9570| [3986] Microsoft IIS ASP could be used to gain sensitive information
9571| [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
9572| [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
9573| [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
9574| [2675] Microsoft IIS 4.0 samples installation on Web server
9575| [2673] Microsoft IIS samples installation on Web server
9576| [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
9577| [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
9578| [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
9579| [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
9580| [2662] Microsoft IIS CGI overflow
9581| [2412] Microsoft IIS account is member of Domain Users
9582| [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
9583| [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
9584| [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
9585| [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
9586| [2229] Microsoft IIS ExAir sample site denial of service
9587| [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
9588| [1823] Microsoft IIS long GET request denial of service
9589| [1735] Microsoft IIS with Visual InterDev no authentication
9590| [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
9591| [1654] Microsoft IIS remote FTP buffer overflow
9592| [1638] Microsoft IIS crashes processing some GET commands
9593| [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
9594| [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
9595| [1273] Microsoft IIS special characters allowed in shell
9596| [1272] Microsoft IIS CGI scripts run as system
9597| [1271] Microsoft IIS version 2 installed
9598| [1270] Microsoft IIS incorrect permissions on restricted item
9599| [1269] Microsoft IIS incorrect Web permissions
9600| [1268] Microsoft IIS SSI #exec enabled
9601| [1216] Microsoft IIS SSL patch not applied
9602| [1215] Microsoft IIS Passive FTP patch not applied
9603| [1212] Microsoft IIS unauthorized ODBC data access with RDS
9604| [1125] Microsoft IIS ASP DATA issue could reveal source code
9605| [949] Microsoft IIS server script debugging enabled
9606| [948] Microsoft IIS samples installed on Web server
9607| [936] Microsoft IIS NTFS insecure permissions
9608| [935] Microsoft IIS executable paths
9609| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
9610| [336] Microsoft IIS ASP dot bug
9611| [256] Microsoft IIS can be remotely crashed by excessively long client requests
9612| [7] Microsoft IIS ASP source visible
9613|
9614| Exploit-DB - https://www.exploit-db.com:
9615| [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
9616| [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
9617|
9618| OpenVAS (Nessus) - http://www.openvas.org:
9619| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
9620| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
9621| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
9622| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
9623| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
9624| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
9625| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
9626| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
9627| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
9628| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
9629| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
9630| [100952] Microsoft IIS FTPd NLST stack overflow
9631| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
9632| [10680] Test Microsoft IIS Source Fragment Disclosure
9633| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
9634| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
9635| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
9636| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
9637| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
9638| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
9639| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
9640| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
9641| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
9642| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
9643| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
9644| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
9645| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
9646| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
9647| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
9648| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
9649| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
9650| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
9651| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
9652| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
9653| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
9654| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
9655| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
9656| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
9657| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
9658| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
9659| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
9660| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
9661| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
9662| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
9663| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
9664| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
9665| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
9666| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
9667| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
9668| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
9669| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
9670| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
9671| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
9672| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
9673| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
9674| [902798] Microsoft SMB Signing Enabled and Not Required At Server
9675| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
9676| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
9677| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
9678| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
9679| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
9680| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
9681| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
9682| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
9683| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
9684| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
9685| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
9686| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
9687| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
9688| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
9689| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
9690| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
9691| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
9692| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
9693| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
9694| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
9695| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
9696| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
9697| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
9698| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
9699| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
9700| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
9701| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
9702| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
9703| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
9704| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
9705| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
9706| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
9707| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
9708| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
9709| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
9710| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
9711| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
9712| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
9713| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
9714| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
9715| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
9716| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
9717| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
9718| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
9719| [902518] Microsoft .NET Framework Security Bypass Vulnerability
9720| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
9721| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
9722| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
9723| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
9724| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
9725| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
9726| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
9727| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
9728| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
9729| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
9730| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
9731| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
9732| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
9733| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
9734| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
9735| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
9736| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
9737| [902425] Microsoft Windows SMB Accessible Shares
9738| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
9739| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
9740| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
9741| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
9742| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
9743| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
9744| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
9745| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
9746| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
9747| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
9748| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
9749| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
9750| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
9751| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
9752| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
9753| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
9754| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
9755| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
9756| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
9757| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
9758| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
9759| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
9760| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
9761| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
9762| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
9763| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
9764| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
9765| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
9766| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
9767| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
9768| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
9769| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
9770| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
9771| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
9772| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
9773| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
9774| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
9775| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
9776| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
9777| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
9778| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
9779| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
9780| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
9781| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
9782| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
9783| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
9784| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
9785| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
9786| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
9787| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
9788| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
9789| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
9790| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
9791| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
9792| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
9793| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
9794| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
9795| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
9796| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
9797| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
9798| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
9799| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
9800| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
9801| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
9802| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
9803| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
9804| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
9805| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
9806| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
9807| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
9808| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
9809| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
9810| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
9811| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
9812| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
9813| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
9814| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
9815| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
9816| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
9817| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
9818| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
9819| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
9820| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
9821| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
9822| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
9823| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
9824| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
9825| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
9826| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
9827| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
9828| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
9829| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
9830| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
9831| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
9832| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
9833| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
9834| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
9835| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
9836| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
9837| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
9838| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
9839| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
9840| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
9841| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
9842| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
9843| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
9844| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
9845| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
9846| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
9847| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
9848| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
9849| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
9850| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
9851| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
9852| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
9853| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
9854| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
9855| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
9856| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
9857| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
9858| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
9859| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
9860| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
9861| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
9862| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
9863| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
9864| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
9865| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
9866| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
9867| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
9868| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
9869| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
9870| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
9871| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
9872| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
9873| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
9874| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
9875| [900808] Microsoft Visual Products Version Detection
9876| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
9877| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
9878| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
9879| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
9880| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
9881| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
9882| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
9883| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
9884| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
9885| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
9886| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
9887| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
9888| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
9889| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
9890| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
9891| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
9892| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
9893| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
9894| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
9895| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
9896| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
9897| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
9898| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
9899| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
9900| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
9901| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
9902| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
9903| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
9904| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
9905| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
9906| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
9907| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
9908| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
9909| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
9910| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
9911| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
9912| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
9913| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
9914| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
9915| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
9916| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
9917| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
9918| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
9919| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
9920| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
9921| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
9922| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
9923| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
9924| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
9925| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
9926| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
9927| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
9928| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
9929| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
9930| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
9931| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
9932| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
9933| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
9934| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
9935| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
9936| [900173] Microsoft Windows Media Player Version Detection
9937| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
9938| [900170] Microsoft iExplorer '&NBSP
9939| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
9940| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
9941| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
9942| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
9943| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
9944| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
9945| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
9946| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
9947| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
9948| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
9949| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
9950| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
9951| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
9952| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
9953| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
9954| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
9955| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
9956| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
9957| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
9958| [900025] Microsoft Office Version Detection
9959| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
9960| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
9961| [855384] Solaris Update for snmp/mibiisa 108870-36
9962| [855273] Solaris Update for snmp/mibiisa 108869-36
9963| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
9964| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
9965| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
9966| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
9967| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
9968| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
9969| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
9970| [802726] Microsoft SMB Signing Disabled
9971| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
9972| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
9973| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
9974| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
9975| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
9976| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
9977| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
9978| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
9979| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
9980| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
9981| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
9982| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
9983| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
9984| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
9985| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
9986| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
9987| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
9988| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
9989| [801934] Microsoft Silverlight Version Detection
9990| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
9991| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
9992| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
9993| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
9994| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
9995| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
9996| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
9997| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
9998| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
9999| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
10000| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
10001| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
10002| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
10003| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
10004| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
10005| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
10006| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
10007| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
10008| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
10009| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
10010| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
10011| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
10012| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
10013| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
10014| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
10015| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
10016| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
10017| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
10018| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
10019| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
10020| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
10021| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
10022| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
10023| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
10024| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
10025| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
10026| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
10027| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
10028| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
10029| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
10030| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
10031| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
10032| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
10033| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
10034| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
10035| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
10036| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
10037| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
10038| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
10039| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
10040| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
10041| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
10042| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
10043| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
10044| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
10045| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
10046| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
10047| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
10048| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
10049| [800742] Microsoft Internet Explorer Unspecified vulnerability
10050| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
10051| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
10052| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
10053| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
10054| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
10055| [800504] Microsoft Windows XP SP3 denial of service vulnerability
10056| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
10057| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
10058| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
10059| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
10060| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
10061| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
10062| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
10063| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
10064| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
10065| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
10066| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
10067| [800331] Microsoft Windows Live Messenger Client Version Detection
10068| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
10069| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
10070| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
10071| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
10072| [800217] Microsoft Money Version Detection
10073| [800209] Microsoft Internet Explorer Version Detection (Win)
10074| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
10075| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
10076| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
10077| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
10078| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
10079| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
10080| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
10081| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
10082| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
10083| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
10084| [101017] Microsoft MS03-018 security check
10085| [101016] Microsoft MS03-022 security check
10086| [101015] Microsoft MS03-034 security check
10087| [101014] Microsoft MS00-078 security check
10088| [101012] Microsoft MS03-051 security check
10089| [101010] Microsoft Security Bulletin MS05-004
10090| [101009] Microsoft Security Bulletin MS06-033
10091| [101007] Microsoft dotNET version grabber
10092| [101006] Microsoft Security Bulletin MS06-056
10093| [101005] Microsoft Security Bulletin MS07-040
10094| [101004] Microsoft MS04-017 security check
10095| [101003] Microsoft MS00-058 security check
10096| [101000] Microsoft MS00-060 security check
10097| [100950] Microsoft DNS server internal hostname disclosure detection
10098| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
10099| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
10100| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
10101| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
10102| [100062] Microsoft Remote Desktop Protocol Detection
10103| [90024] Windows Vulnerability in Microsoft Jet Database Engine
10104| [80007] Microsoft MS00-06 security check
10105| [13752] Denial of Service (DoS) in Microsoft SMS Client
10106| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
10107| [11874] IIS Service Pack - 404
10108| [11808] Microsoft RPC Interface Buffer Overrun (823980)
10109| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
10110| [11217] Microsoft's SQL Version Query
10111| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
10112| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
10113| [11142] IIS XSS via IDC error
10114| [11067] Microsoft's SQL Hello Overflow
10115| [11003] IIS Possible Compromise
10116| [10993] IIS ASP.NET Application Trace Enabled
10117| [10991] IIS Global.asa Retrieval
10118| [10936] IIS XSS via 404 error
10119| [10862] Microsoft's SQL Server Brute Force
10120| [10755] Microsoft Exchange Public Folders Information Leak
10121| [10732] IIS 5.0 WebDav Memory Leakage
10122| [10699] IIS FrontPage DoS II
10123| [10695] IIS .IDA ISAPI filter applied
10124| [10674] Microsoft's SQL UDP Info Query
10125| [10673] Microsoft's SQL Blank Password
10126| [10671] IIS Remote Command Execution
10127| [10667] IIS 5.0 PROPFIND Vulnerability
10128| [10661] IIS 5 .printer ISAPI filter applied
10129| [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
10130| [10585] IIS FrontPage DoS
10131| [10576] Check for dangerous IIS default files
10132| [10575] Check for IIS .cnf file leakage
10133| [10573] IIS 5.0 Sample App reveals physical path of web root
10134| [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
10135| [10537] IIS directory traversal
10136| [10492] IIS IDA/IDQ Path Disclosure
10137| [10491] ASP/ASA source using Microsoft Translate f: bug
10138| [10144] Microsoft SQL TCP/IP listener is running
10139|
10140| SecurityTracker - https://www.securitytracker.com:
10141| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
10142| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
10143| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
10144| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
10145| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
10146| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
10147| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
10148| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
10149| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
10150| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
10151| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
10152| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
10153| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
10154| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
10155| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
10156| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
10157| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
10158| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
10159| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
10160| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
10161| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
10162| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
10163| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
10164| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
10165| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
10166| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
10167| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
10168| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
10169| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
10170| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
10171| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
10172| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
10173| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
10174| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
10175| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
10176| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
10177| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
10178| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
10179| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
10180| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
10181| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
10182| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
10183| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
10184| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
10185| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
10186| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
10187| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
10188| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
10189| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
10190| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
10191| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
10192| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
10193| [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10194| [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
10195| [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
10196| [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
10197| [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
10198| [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
10199| [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
10200| [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
10201| [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
10202| [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
10203| [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
10204| [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
10205| [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
10206| [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
10207| [1028560] Microsoft Visio Discloses Information to Remote Users
10208| [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
10209| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
10210| [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
10211| [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
10212| [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
10213| [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
10214| [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
10215| [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
10216| [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
10217| [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
10218| [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
10219| [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
10220| [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
10221| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
10222| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
10223| [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
10224| [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
10225| [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
10226| [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
10227| [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
10228| [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
10229| [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
10230| [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
10231| [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
10232| [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
10233| [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10234| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
10235| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
10236| [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
10237| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
10238| [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
10239| [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
10240| [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
10241| [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
10242| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
10243| [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
10244| [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
10245| [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
10246| [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
10247| [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
10248| [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
10249| [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
10250| [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
10251| [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
10252| [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
10253| [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
10254| [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
10255| [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
10256| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
10257| [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
10258| [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
10259| [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
10260| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
10261| [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
10262| [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
10263| [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10264| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
10265| [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
10266| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10267| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10268| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10269| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10270| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10271| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10272| [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
10273| [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
10274| [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
10275| [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
10276| [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
10277| [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
10278| [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
10279| [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
10280| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
10281| [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
10282| [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
10283| [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
10284| [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
10285| [1027114] Microsoft Windows Includes Some Invalid Certificates
10286| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
10287| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
10288| [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10289| [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
10290| [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
10291| [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
10292| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
10293| [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
10294| [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
10295| [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
10296| [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
10297| [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
10298| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10299| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10300| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10301| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10302| [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
10303| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10304| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
10305| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
10306| [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
10307| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
10308| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
10309| [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
10310| [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
10311| [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
10312| [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
10313| [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
10314| [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
10315| [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
10316| [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
10317| [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
10318| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
10319| [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
10320| [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
10321| [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
10322| [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
10323| [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
10324| [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
10325| [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
10326| [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
10327| [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
10328| [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
10329| [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10330| [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
10331| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
10332| [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
10333| [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
10334| [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
10335| [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
10336| [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
10337| [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
10338| [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
10339| [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
10340| [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
10341| [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
10342| [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
10343| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
10344| [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
10345| [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
10346| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
10347| [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
10348| [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
10349| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
10350| [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
10351| [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
10352| [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
10353| [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
10354| [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
10355| [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
10356| [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
10357| [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
10358| [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
10359| [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
10360| [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
10361| [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
10362| [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
10363| [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
10364| [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
10365| [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
10366| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
10367| [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
10368| [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
10369| [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
10370| [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
10371| [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
10372| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
10373| [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
10374| [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
10375| [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10376| [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
10377| [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
10378| [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
10379| [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
10380| [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
10381| [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
10382| [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
10383| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
10384| [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
10385| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
10386| [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
10387| [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
10388| [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
10389| [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
10390| [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
10391| [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
10392| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
10393| [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
10394| [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
10395| [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
10396| [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
10397| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
10398| [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
10399| [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
10400| [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
10401| [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
10402| [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10403| [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10404| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
10405| [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
10406| [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
10407| [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
10408| [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
10409| [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
10410| [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
10411| [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
10412| [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
10413| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
10414| [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
10415| [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
10416| [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
10417| [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
10418| [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
10419| [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
10420| [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
10421| [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
10422| [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
10423| [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
10424| [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
10425| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
10426| [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
10427| [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
10428| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
10429| [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
10430| [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
10431| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
10432| [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
10433| [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
10434| [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
10435| [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
10436| [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
10437| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
10438| [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
10439| [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
10440| [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
10441| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
10442| [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
10443| [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
10444| [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
10445| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
10446| [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
10447| [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
10448| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
10449| [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
10450| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
10451| [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
10452| [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
10453| [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
10454| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10455| [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
10456| [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
10457| [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
10458| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
10459| [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
10460| [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
10461| [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
10462| [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
10463| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
10464| [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
10465| [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
10466| [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
10467| [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
10468| [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
10469| [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
10470| [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
10471| [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
10472| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
10473| [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
10474| [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
10475| [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
10476| [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
10477| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
10478| [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
10479| [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
10480| [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
10481| [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
10482| [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
10483| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
10484| [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
10485| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
10486| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
10487| [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
10488| [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
10489| [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
10490| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
10491| [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
10492| [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
10493| [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10494| [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
10495| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
10496| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
10497| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
10498| [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
10499| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
10500| [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
10501| [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
10502| [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
10503| [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
10504| [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
10505| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
10506| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
10507| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10508| [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
10509| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
10510| [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
10511| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
10512| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
10513| [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
10514| [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
10515| [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
10516| [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
10517| [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
10518| [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
10519| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
10520| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
10521| [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
10522| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
10523| [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
10524| [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
10525| [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
10526| [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
10527| [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
10528| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
10529| [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
10530| [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
10531| [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
10532| [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
10533| [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
10534| [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
10535| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
10536| [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
10537| [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
10538| [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
10539| [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
10540| [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
10541| [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
10542| [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
10543| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
10544| [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
10545| [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
10546| [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
10547| [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
10548| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
10549| [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
10550| [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
10551| [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
10552| [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
10553| [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
10554| [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10555| [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
10556| [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
10557| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
10558| [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
10559| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
10560| [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
10561| [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
10562| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
10563| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
10564| [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
10565| [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
10566| [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
10567| [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
10568| [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
10569| [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
10570| [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
10571| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
10572| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
10573| [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
10574| [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
10575| [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
10576| [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
10577| [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
10578| [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
10579| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
10580| [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
10581| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
10582| [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
10583| [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
10584| [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
10585| [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
10586| [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
10587| [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
10588| [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
10589| [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
10590| [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
10591| [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10592| [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
10593| [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
10594| [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
10595| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
10596| [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
10597| [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
10598| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
10599| [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
10600| [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
10601| [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
10602| [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
10603| [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
10604| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
10605| [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
10606| [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
10607| [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
10608| [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
10609| [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
10610| [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
10611| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
10612| [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
10613| [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
10614| [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
10615| [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
10616| [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
10617| [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
10618| [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
10619| [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
10620| [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
10621| [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
10622| [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
10623| [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
10624| [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
10625| [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
10626| [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
10627| [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
10628| [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
10629| [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
10630| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
10631| [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
10632| [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
10633| [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
10634| [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
10635| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
10636| [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
10637| [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
10638| [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
10639| [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
10640| [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
10641| [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
10642| [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
10643| [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
10644| [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
10645| [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
10646| [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
10647| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
10648| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
10649| [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
10650| [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
10651| [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
10652| [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
10653| [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
10654| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
10655| [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
10656| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10657| [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
10658| [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
10659| [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
10660| [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
10661| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
10662| [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
10663| [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
10664| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10665| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
10666| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
10667| [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
10668| [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
10669| [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10670| [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
10671| [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
10672| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
10673| [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
10674| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
10675| [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
10676| [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
10677| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
10678| [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
10679| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
10680| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
10681| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
10682| [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
10683| [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
10684| [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
10685| [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
10686| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
10687| [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
10688| [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
10689| [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
10690| [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
10691| [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
10692| [1017752] Adobe JRun IIS Connector Bug Lets Remote Users Deny Service
10693| [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
10694| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
10695| [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
10696| [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
10697| [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10698| [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10699| [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10700| [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
10701| [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10702| [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10703| [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
10704| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
10705| [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
10706| [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
10707| [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
10708| [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
10709| [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
10710| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
10711| [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
10712| [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
10713| [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
10714| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
10715| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
10716| [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
10717| [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
10718| [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
10719| [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
10720| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
10721| [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
10722| [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
10723| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
10724| [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
10725| [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
10726| [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
10727| [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
10728| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
10729| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
10730| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
10731| [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
10732| [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
10733| [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
10734| [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
10735| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
10736| [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
10737| [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
10738| [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
10739| [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
10740| [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
10741| [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
10742| [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
10743| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
10744| [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
10745| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
10746| [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
10747| [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
10748| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
10749| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
10750| [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
10751| [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
10752| [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
10753| [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
10754| [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
10755| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
10756| [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
10757| [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
10758| [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
10759| [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
10760| [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
10761| [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
10762| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
10763| [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
10764| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
10765| [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
10766| [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
10767| [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
10768| [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
10769| [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
10770| [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
10771| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
10772| [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
10773| [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
10774| [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
10775| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
10776| [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
10777| [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
10778| [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
10779| [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
10780| [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
10781| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
10782| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
10783| [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
10784| [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
10785| [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
10786| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
10787| [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
10788| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
10789| [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
10790| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
10791| [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
10792| [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
10793| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
10794| [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
10795| [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
10796| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
10797| [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
10798| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
10799| [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
10800| [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
10801| [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
10802| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
10803| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
10804| [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
10805| [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
10806| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
10807| [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
10808| [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
10809| [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
10810| [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
10811| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
10812| [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
10813| [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
10814| [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
10815| [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
10816| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
10817| [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
10818| [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
10819| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
10820| [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
10821| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
10822| [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
10823| [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
10824| [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
10825| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
10826| [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
10827| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
10828| [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
10829| [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
10830| [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
10831| [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
10832| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
10833| [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
10834| [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
10835| [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
10836| [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
10837| [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
10838| [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
10839| [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
10840| [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
10841| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
10842| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
10843| [1014501] Hosting Controller 'IISActions.asp' Script Lets Remote Authenticated Users Add Domains/Subdomains
10844| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
10845| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
10846| [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
10847| [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
10848| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
10849| [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
10850| [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
10851| [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
10852| [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
10853| [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
10854| [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
10855| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
10856| [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
10857| [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
10858| [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
10859| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
10860| [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
10861| [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
10862| [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
10863| [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
10864| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
10865| [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
10866| [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
10867| [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
10868| [1013724] RSA Authentication Agent for Web for IIS Input Validation Bug Lets Remote Users Conduct Cross-Site Scripting Attacks
10869| [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
10870| [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
10871| [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
10872| [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
10873| [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
10874| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
10875| [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
10876| [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
10877| [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
10878| [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
10879| [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
10880| [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
10881| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
10882| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
10883| [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
10884| [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
10885| [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
10886| [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
10887| [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
10888| [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
10889| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
10890| [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
10891| [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
10892| [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
10893| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
10894| [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
10895| [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
10896| [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
10897| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
10898| [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
10899| [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
10900| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
10901| [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
10902| [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
10903| [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
10904| [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
10905| [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
10906| [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
10907| [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
10908| [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
10909| [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
10910| [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
10911| [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
10912| [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
10913| [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
10914| [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
10915| [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
10916| [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
10917| [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
10918| [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
10919| [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
10920| [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
10921| [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
10922| [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
10923| [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
10924| [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
10925| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
10926| [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
10927| [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
10928| [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
10929| [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
10930| [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
10931| [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
10932| [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
10933| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
10934| [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
10935| [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
10936| [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
10937| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
10938| [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
10939| [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
10940| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
10941| [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
10942| [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
10943| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
10944| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
10945| [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
10946| [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
10947| [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
10948| [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
10949| [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
10950| [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
10951| [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
10952| [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
10953| [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
10954| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
10955| [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
10956| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
10957| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
10958| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
10959| [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
10960| [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
10961| [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
10962| [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
10963| [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
10964| [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
10965| [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
10966| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
10967| [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
10968| [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
10969| [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
10970| [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
10971| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
10972| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
10973| [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
10974| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
10975| [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
10976| [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
10977| [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
10978| [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
10979| [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
10980| [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
10981| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
10982| [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
10983| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
10984| [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
10985| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
10986| [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
10987| [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
10988| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
10989| [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
10990| [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
10991| [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
10992| [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
10993| [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
10994| [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
10995| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
10996| [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
10997| [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
10998| [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
10999| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
11000| [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
11001| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
11002| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
11003| [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
11004| [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
11005| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
11006| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
11007| [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
11008| [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
11009| [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
11010| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
11011| [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
11012| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
11013| [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
11014| [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
11015| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
11016| [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
11017| [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
11018| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
11019| [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
11020| [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
11021| [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
11022| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
11023| [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
11024| [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
11025| [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
11026| [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
11027| [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
11028| [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
11029| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
11030| [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
11031| [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
11032| [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
11033| [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
11034| [1008586] Microsoft Office Security Features Can Be Bypassed
11035| [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
11036| [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
11037| [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
11038| [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
11039| [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
11040| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
11041| [1008425] Microsoft IE Does Not Properly Display Some URLs
11042| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
11043| [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
11044| [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
11045| [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
11046| [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
11047| [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
11048| [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
11049| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
11050| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
11051| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
11052| [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
11053| [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
11054| [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
11055| [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
11056| [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
11057| [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
11058| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
11059| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
11060| [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
11061| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
11062| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
11063| [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
11064| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
11065| [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
11066| [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
11067| [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
11068| [1007651] RealSecure Server Sensor Unicode Flaw Lets Remote Users Crash the IIS Web Service
11069| [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
11070| [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
11071| [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
11072| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
11073| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
11074| [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
11075| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
11076| [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
11077| [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
11078| [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
11079| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
11080| [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
11081| [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
11082| [1007364] IISShield May Fail to Drop a Specific Malformed HTTP Request
11083| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
11084| [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
11085| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
11086| [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
11087| [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
11088| [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
11089| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
11090| [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
11091| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
11092| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
11093| [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
11094| [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
11095| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
11096| [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
11097| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
11098| [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
11099| [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
11100| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
11101| [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
11102| [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
11103| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
11104| [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
11105| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
11106| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
11107| [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
11108| [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
11109| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
11110| [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
11111| [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
11112| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
11113| [1006894] iisCART2000 Upload Authentication Error Lets Remote Users Upload and Execute Arbitrary Scripts
11114| [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
11115| [1006829] iisPROTECT Input Validation Hole Lets Remote Users Execute SQL Stored Procedures
11116| [1006815] iisPROTECT Lets Remote Users Access Protected Files Using URL Encoding
11117| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
11118| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
11119| [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
11120| [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
11121| [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
11122| [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
11123| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
11124| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
11125| [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
11126| [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
11127| [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
11128| [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
11129| [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
11130| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
11131| [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
11132| [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
11133| [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
11134| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
11135| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
11136| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
11137| [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
11138| [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
11139| [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
11140| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
11141| [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
11142| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
11143| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
11144| [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
11145| [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
11146| [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
11147| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
11148| [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
11149| [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
11150| [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
11151| [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
11152| [1006023] ColdFusion MX Configuration Error When Used With IIS and NT Authentication May Grant Unauthorized Access to Remote Authenticated Users
11153| [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
11154| [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
11155| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
11156| [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
11157| [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
11158| [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
11159| [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
11160| [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
11161| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
11162| [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
11163| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
11164| [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
11165| [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
11166| [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
11167| [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
11168| [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
11169| [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
11170| [1005627] IISPop EMail Server Can Be Crashed By Remote Users
11171| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
11172| [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
11173| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
11174| [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
11175| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
11176| [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
11177| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
11178| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
11179| [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
11180| [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
11181| [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
11182| [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
11183| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
11184| [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
11185| [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
11186| [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
11187| [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
11188| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
11189| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
11190| [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
11191| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
11192| [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
11193| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
11194| [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
11195| [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
11196| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
11197| [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
11198| [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
11199| [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
11200| [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
11201| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
11202| [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
11203| [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
11204| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
11205| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
11206| [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
11207| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
11208| [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
11209| [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
11210| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
11211| [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
11212| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
11213| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
11214| [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
11215| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
11216| [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
11217| [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
11218| [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
11219| [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
11220| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
11221| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
11222| [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
11223| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
11224| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
11225| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
11226| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
11227| [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
11228| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
11229| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
11230| [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
11231| [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
11232| [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
11233| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
11234| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
11235| [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
11236| [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
11237| [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
11238| [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
11239| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
11240| [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
11241| [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
11242| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
11243| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
11244| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
11245| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
11246| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
11247| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
11248| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
11249| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
11250| [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
11251| [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
11252| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
11253| [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
11254| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
11255| [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
11256| [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
11257| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
11258| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
11259| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
11260| [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
11261| [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
11262| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
11263| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
11264| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
11265| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
11266| [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
11267| [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
11268| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
11269| [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
11270| [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
11271| [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
11272| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
11273| [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
11274| [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
11275| [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
11276| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
11277| [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
11278| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
11279| [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
11280| [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
11281| [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
11282| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
11283| [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
11284| [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
11285| [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
11286| [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
11287| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
11288| [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
11289| [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
11290| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
11291| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
11292| [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
11293| [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
11294| [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
11295| [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
11296| [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
11297| [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
11298| [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
11299| [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
11300| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
11301| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
11302| [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
11303| [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
11304| [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
11305| [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
11306| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
11307| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
11308| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
11309| [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
11310| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
11311| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
11312| [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
11313| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
11314| [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
11315| [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
11316| [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
11317| [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
11318| [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
11319| [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
11320| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
11321| [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
11322| [1003538] NetWin CWMail Web-Mail Server Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With the Privileges of the IIS Web Server
11323| [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
11324| [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
11325| [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
11326| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
11327| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
11328| [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
11329| [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
11330| [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
11331| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
11332| [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
11333| [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
11334| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
11335| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
11336| [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
11337| [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
11338| [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
11339| [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
11340| [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
11341| [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
11342| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
11343| [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
11344| [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
11345| [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
11346| [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
11347| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
11348| [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
11349| [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
11350| [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
11351| [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
11352| [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
11353| [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
11354| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
11355| [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
11356| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
11357| [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
11358| [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
11359| [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
11360| [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
11361| [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
11362| [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
11363| [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
11364| [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
11365| [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
11366| [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
11367| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
11368| [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
11369| [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
11370| [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
11371| [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
11372| [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
11373| [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
11374| [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
11375| [1002773] Titan Application Firewall for IIS Web Server Fails to Decode URLs, Letting Remote Users Bypass URL-based Firewall Restrictions
11376| [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
11377| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
11378| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
11379| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
11380| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
11381| [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
11382| [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
11383| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
11384| [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
11385| [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
11386| [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
11387| [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
11388| [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
11389| [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
11390| [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
11391| [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
11392| [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
11393| [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
11394| [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
11395| [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
11396| [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
11397| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
11398| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
11399| [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
11400| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
11401| [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
11402| [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
11403| [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
11404| [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
11405| [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
11406| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
11407| [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
11408| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
11409| [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
11410| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
11411| [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
11412| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
11413| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
11414| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
11415| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
11416| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
11417| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
11418| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
11419| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
11420| [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
11421| [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
11422| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
11423| [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
11424| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
11425| [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
11426| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
11427| [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
11428| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
11429| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
11430| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
11431| [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
11432| [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
11433| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
11434| [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
11435| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
11436| [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
11437| [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
11438| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
11439| [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
11440| [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
11441| [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
11442| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
11443| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
11444| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
11445| [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
11446| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
11447| [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
11448| [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
11449| [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
11450| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
11451| [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
11452| [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
11453| [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
11454| [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
11455| [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
11456| [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
11457| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
11458| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
11459| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
11460| [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
11461| [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
11462| [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
11463| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
11464| [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
11465| [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
11466| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
11467| [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
11468| [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
11469| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
11470| [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
11471| [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
11472| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
11473| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
11474| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
11475|
11476| OSVDB - http://www.osvdb.org:
11477| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
11478| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
11479| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
11480| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
11481| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
11482| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
11483| [87262] Microsoft IIS FTP Command Injection Information Disclosure
11484| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
11485| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
11486| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
11487| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
11488| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
11489| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
11490| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
11491| [71856] Microsoft IIS Status Header Handling Remote Overflow
11492| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
11493| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
11494| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
11495| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
11496| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
11497| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
11498| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
11499| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
11500| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
11501| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
11502| [59892] Microsoft IIS Malformed Host Header Remote DoS
11503| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
11504| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
11505| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
11506| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
11507| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
11508| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
11509| [55269] Microsoft IIS Traversal GET Request Remote DoS
11510| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
11511| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
11512| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
11513| [52238] Microsoft IIS IDC Extension XSS
11514| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
11515| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
11516| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
11517| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
11518| [43451] Microsoft IIS HTTP Request Smuggling
11519| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
11520| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
11521| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
11522| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
11523| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
11524| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
11525| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
11526| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
11527| [27152] Microsoft Windows IIS ASP Page Processing Overflow
11528| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
11529| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
11530| [21805] Microsoft IIS Crafted URL Remote DoS
11531| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
11532| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
11533| [17124] Microsoft IIS Malformed WebDAV Request DoS
11534| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
11535| [17122] Microsoft IIS Permission Weakness .COM File Upload
11536| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
11537| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
11538| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
11539| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
11540| [13760] Microsoft IIS Malformed URL Request DoS
11541| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
11542| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
11543| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
11544| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
11545| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
11546| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
11547| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
11548| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
11549| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
11550| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
11551| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
11552| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
11553| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
11554| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
11555| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
11556| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
11557| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
11558| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
11559| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
11560| [11257] Microsoft IIS Malformed GET Request DoS
11561| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
11562| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
11563| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
11564| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
11565| [9200] Microsoft IIS Unspecified XSS Variant
11566| [9199] Microsoft IIS shtml.dll XSS
11567| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
11568| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
11569| [7737] Microsoft IIS ASP Redirection Function XSS
11570| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
11571| [5851] Microsoft IIS Single Dot Source Code Disclosure
11572| [5736] Microsoft IIS Relative Path System Privilege Escalation
11573| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
11574| [5633] Microsoft IIS Invalid WebDAV Request DoS
11575| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
11576| [5584] Microsoft IIS URL Redirection Malformed Length DoS
11577| [5566] Microsoft IIS Form_VBScript.asp XSS
11578| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
11579| [4864] Microsoft IIS TRACK Logging Failure
11580| [4863] Microsoft IIS Active Server Page Header DoS
11581| [4791] Microsoft IIS Response Object DoS
11582| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
11583| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
11584| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
11585| [3500] Microsoft IIS fpcount.exe Remote Overflow
11586| [3341] Microsoft IIS Redirect Response XSS
11587| [3339] Microsoft IIS HTTP Error Page XSS
11588| [3338] Microsoft IIS Help File XSS
11589| [3328] Microsoft IIS FTP Status Request DoS
11590| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
11591| [3325] Microsoft IIS HTR ISAPI Overflow
11592| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
11593| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
11594| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
11595| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
11596| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
11597| [3231] Microsoft IIS Log Bypass
11598| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
11599| [1931] Microsoft IIS MIME Content-Type Header DoS
11600| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
11601| [1826] Microsoft IIS Domain Guest Account Disclosure
11602| [1824] Microsoft IIS FTP DoS
11603| [1804] Microsoft IIS Long Request Parsing Remote DoS
11604| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
11605| [1750] Microsoft IIS File Fragment Disclosure
11606| [1543] Microsoft NT/IIS Invalid URL Request DoS
11607| [1504] Microsoft IIS File Permission Canonicalization Bypass
11608| [1465] Microsoft IIS .htr Missing Variable DoS
11609| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
11610| [1322] Microsoft IIS Malformed .htr Request DoS
11611| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
11612| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
11613| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
11614| [1170] Microsoft IIS Escape Character URL Access Bypass
11615| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
11616| [1082] Microsoft IIS Domain Resolution Access Bypass
11617| [1041] Microsoft IIS Malformed HTTP Request Header DoS
11618| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
11619| [930] Microsoft IIS Shared ASP Cache Information Disclosure
11620| [929] Microsoft IIS FTP Server NLST Command Overflow
11621| [928] Microsoft IIS Long Request Log Evasion
11622| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
11623| [814] Microsoft IIS global.asa Remote Information Disclosure
11624| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
11625| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
11626| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
11627| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
11628| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
11629| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
11630| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
11631| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
11632| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
11633| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
11634| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
11635| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
11636| [473] Microsoft IIS Multiple .cnf File Information Disclosure
11637| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
11638| [470] Microsoft IIS Form_JScript.asp XSS
11639| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
11640| [436] Microsoft IIS Unicode Remote Command Execution
11641| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
11642| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
11643| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
11644| [308] Microsoft IIS Malformed File Extension URL DoS
11645| [285] Microsoft IIS repost.asp File Upload
11646| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
11647| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
11648| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
11649| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
11650| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
11651| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
11652| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
11653| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
11654| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
11655| [98] Microsoft IIS perl.exe HTTP Path Disclosure
11656| [97] Microsoft IIS ISM.DLL HTR Request Overflow
11657| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
11658| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
11659| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
11660| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
11661| [2] Microsoft IIS ExAir search.asp Direct Request DoS
11662|_
11663Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
11664###################################################################################################################################
11665 Anonymous JTSEC #OpChili Full Recon #37